Welcome!

Agile Computing Authors: Liz McMillan, John Basso, Kevin Benedict, Dana Gardner, Elizabeth White

Related Topics: @CloudExpo, Java IoT, Microsoft Cloud, Linux Containers, Containers Expo Blog, Agile Computing

@CloudExpo: Blog Post

Modernizing Your Infrastructure with Hybrid #Cloud | Part 8

Hyper-V over SMB

imageIn today’s post in the modernizing your infrastructure with Hybrid Cloud series, I am going to talk about Hyper-V over SMB, which we introduced in Windows Server 2012.  It is also important to note that you can use storage spaces to house your SMB share that Hyper-V will leveraged.  In Part 7 I talked about storage spaces:  Modernizing Your Infrastructure with Hybrid Cloud - Storage Spaces in Windows Server 2012 R2 (Part7)

With Windows Server 2012 R2, we have improved the SMB protocol and it is a new version SMB 3.02.  I will start this article with a quick review of SMB 3.0 and talk about the improvements that can be found in SMB 3.02 which is included in Windows Server 2012 R2

SMB 3.0 Review

In Windows Server 2012 we introduced the next version of SMB 3.0.  The SMB protocol, essentially allows applications or the user of an applications to access files and other remote server side resources.   This allows the basic operations like working with files, reading, writing, accessing…etc.   It can also communicate with any server program that is set up to receive an SMB client request.   Two of the most important features we introduced into SMB are Microsoft SQL Server over SMB  and Hyper-V over SMB (we will get to that in a second).  We also included  several other new features:

  • SMB Transparent Failover
  • SMB Scale Out
  • SMB Multichannel
  • SMB Direct
  • Performance Counters for server applications
  • Performance optimizations (Improved)
  • SMB-specific Windows PowerShell cmdlets
  • SMB Encryption
  • SMB Directory Leasing

I wrote about these in a post I did a while back:
31 Days of Our Favorite Things- SMB 3.0 the Glue in Windows Server 2012 (Part 17 of 31)

SMB 3.02 Quick Look

In Windows Server 2012 R2 we have updated SMB to version  3.02.  A good list of what is new can be found here: What's New in SMB. There are several new and improved functionalities in the protocol including:

  • Improved performance of SMB Direct (SMB over RDMA)
  • Improved SMB event messages
  • VHDX files as shared storage for guest clustering
  • Hyper-V Live Migration over SMB
  • Improved SMB bandwidth management
  • Support for multiple SMB instances on a Scale-Out File Server
  • SMB 1.0 is now an optional feature

Probably the most important enhancement we put into the SMB 3.02 protocol is the ability to do Automatic rebalancing of Scale-Out File Server clients!

In SMB 3.0 we had the ability to use Scale-Out-File Servers.  In Windows Server 2012, SMB clients would be randomly directed via DNS Round Robin to a node of the cluster.  Then once that node was selected they would use that for all the shares they wanted to access and all their traffic would be going to that particular file server.  With Automatic rebalancing of Scale-Out File Server clients change how they connect to file servers. SMB client connections are tracked per file share (instead of per server), and clients are then redirected to the cluster node with the best access to the volume used by the file share. This improves efficiency by reducing redirection traffic between file server nodes. Clients are redirected following an initial connection and when cluster storage is reconfigured.  What that essentially means is the client will leverage the best server for the file share they are looking to use.  Jose Barreto wrote an excellent post going into some great comparisons for this new feature:  Automatic SMB Scale-Out Rebalancing in Windows Server 2012 R2

If you want to learn more about SMB 3.02, my buddy Keith wrote a great post here: Why R2- Your Next SAN with SMB 3.02 Scale-out File Servers

Hyper-V over SMB
Now let’s take this to next level with Hyper-V.  In Windows Server 2012 R2 you can now store virtual machine files, such as configuration, Virtual hard disk (VHD) files, and snapshots, in file shares over the SMB 3.0 protocol. This can be used for both stand-alone file servers and clustered file servers that use Hyper-V together with shared file storage for the cluster.  By leveraging two new features of SMB 3.0 (SMB Direct and SMB Multichannel) on a file server hosting the VHDX drives for your Hyper-V cluster, you can see storage performance on your Hyper-V guests that approaches that of a built-in server storage.  Not only that, but those Hyper-V guests enjoy the resiliency of a failover network to help avoid any outages.    Taking this even a step further with your virtual machine stored on an SMB file share. You can then perform a live migration on this virtual machine, running between non-clustered Hyper‑V hosts while the virtual machine’s storage remains on the central SMB share. This lets you use the benefits of virtual machine mobility without investing in clustering infrastructure. Hosting providers and similar environments frequently need this capability.   All provided courtesy of this wonderful protocol and take a look at the graphic for some examples:

image

Configuring Hyper-V over SMB
Overall the process of creating a virtual machine on an SMB is very straight forward:

  1. Install the Hyper-V role on a Windows Server 2012 R2 machine
  2. Install the File Services role on a Windows Server 2012 R2 machine
  3. Create an SMB file share and set permissions.
  4. Create a virtual machine and virtual machine hard disk on the file share, use a UNC path for the location i.e. \\servername\sharename

Then viola you’re done!  The only tricky part and really it is not that tricky is to set permissions on the share and the NTFS folder.   For this to work properly, you will need to set full permissions on the NTFS folder for the following accounts:

  • Hyper-V Administrator
  • Computer Account(s) of the Hyper-V hosts
  • If Hyper-V is clustered you will also need the Hyper-V Cluster Account (CNO)

The reason I mention security is because of traditional SAN and NAS solutions.  These solutions commonly use some type of security system to help ensure that only authorized hosts have access to shared storage – such as LUN masking in Fiber Channel SANs, initiator lists in iSCSI SANs and access lists for NFS NAS devices.

With SMB 3.02, we’ve streamlined the security model used to provide authorized access to shared storage by aligning it to the well-understood NTFS security capabilities already used in many organizations for securing application data.

Here is a great video talking about some of the considerations when doing Hyper-V over SMB:

Using PowerShell for Hyper-V over SMB

You can do this easily enough in PowerShell.  The following sequence will create a folder on the F: drive called VMS.  In step 2 you will create a share and set full access permissions for the administrator account HAdmin in the Dom domain, two Hyper-V hosts (HV1, HV2 and since this is on a cluster, HVC for the cluster host:

  1. Create Folder 
    • MD F:\VMS
  2. Create Share
    • New-SmbShare -Name VMS -Path F:\VMS -FullAccess Dom\HAdmin, Dom\HV1$, Dom\HV2$, Dom\HVC$
      -Note: the $ after the names designates those as computer names so we can use them in this command.
  3. Apply Share permissions to NTFS Folder permissions: 
    • (Get-SmbShare –Name VMS).PresetPathAcl | Set-Acl

I hoped you enjoyed this post and please check out the full series here:

http://aka.ms/ModernCloud

More Stories By Matt Hester

Matt Hester is a Senior Information Technology Professional Evangelist for Microsoft. Matt has been involved in the IT Pro community for over 20 years. Matt is a skilled and experienced evangelist presenting to audiences nationally and internationally. Prior to joining Microsoft Matt was a highly successful Microsoft Certified Trainer for over 8 years. After joining Microsoft, Matt has continued to be heavily involved in IT Pro community as an IT Pro Evangelist. In his role at Microsoft Matt has presented to audiences in excess of 5000 and as small as 10. Matt has written 4 articles for TechNet magazine. In addition Matt has published 3 books:

You can contact Matt off his blog at http://aka.ms/matthester

@ThingsExpo Stories
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.