hypervisor HA

hypervisor HA

In the classic data center, it was necessary to deploy a clustering solution to provide High Availability for critical services, such as email and databases.

However, in the VDC there are High Availability features integrated into the hypervisor layer to provide some, if not all, of the failover capabilities.

In general, hypervisor HA provides a very similar amount of redundancy that an OS cluster did in a classic data center. In the event of a service or server failure, the OS cluster would restart processing on another node in the cluster. The hypervisor performs a similar function by restarting a failed VM on the same hypervisor or another hypervisor in the cluster. However, one component that may not be identical is the ability to detect a service failure.

Can your hypervisor detect that a service, such as Microsoft Exchange, has failed on a VM and trigger a restart of the VM? While most OSs have internal processes to restart failed services, they will typically only do so
for a finite number of times before stopping. The time to restart a VM on another node will vary based on a number of factors, such as the number of services, utilization of the hypervisor, etc. This amount of time may or may not be more than restarting just the services on another cluster node. If your hypervisor has a hot standby feature, where a synchronized copy of the VM is kept on another hypervisor, the failover time is almost instantaneous. However, there may be other restrictions that should be considered in this type of environment.

Deploying an OS cluster within a hypervisor environment is generally a bit more complex, as there are certain disk configurations that are required for clusters. Since the hypervisor typically masks much of that configuration from the VM, special considerations must be taken into account. Also, deploying services into a cluster usually requires additional IP addresses, DNS names, and other network components to allow that service to float between the cluster nodes. The time to restart the services on another node should be considered against the amount of time to restart the entire VM. However, the cluster will natively be able to detect a service failure and trigger a restart.

Examine the maximum number of cluster nodes that the OS supports. You may need to have multiple clusters configured for your services, which can complicate the environment even further. Finally, be aware of how failback is configured, especially if you are using both hypervisor HA and OS Clusters. If the cluster is configured to fail the resource back immediately, then when the VM is restarted, the service will experience another outage to return to normal operating status.

For application clusters, or applications that are configured with redundant components, be sure that the redundant copies are stored on different hypervisors so that a server failure doesn’t impact the entire application. Depending on how the application is configured, you may or may not want to use hypervisor HA as well. If the application has an automated failback mechanism, you may not want to use hypervisor HA, since that could also cause service disruption during the failback process. If the failback can be controlled, then you may want to use Hypervisor HA or some other process to restart
the VM so that if the second node fails, you do not lose the service entirely.

To view or add a comment, sign in

More articles by ossama rashad

  • Cloud-native application protection platforms (CNAPPs)

    A unified and tightly integrated set of security and compliance capabilities designed to secure and protect…

    1 Comment
  • knowledge factor

    The knowledge factor, in a security context, is a category of authentication credentials consisting of information that…

  • IT Security that Keeps Up with Business and IT Operations

    Today’s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements of the…

  • Cyber-security Strategy and Implementation Plan (CSIP)

    On October 30, 2015, President Obama and Federal CIO Tony Scott introduced the Cybersecurity Strategy and…

  • Storage Virtualization

    Storage Virtualization, at both the block and file level, provides a good way to scale and environment beyond a single…

  • Next-Generation Firewall – NGFW “Two”

    Passive DNS DNS traffic exists in nearly every organization, creating an overwhelming ocean of data that security teams…

  • Next-Generation Firewall – NGFW “One”

    Early to mid-90s Firewalls were little more than filtering rule sets on routers. As more organizations connected to the…

    1 Comment
  • Vendor lock-in

    Vendor lock-in makes a customer dependent on a vendor for hardware or software, creating a situation where they are…

  • Data Center Networking, What's Changed?

    During the past 12 months, we have seen the market stabilize and many enterprises focus on executing the first steps of…

    3 Comments
  • Single and multiple hypervisors

    Listed are some of the benefits and trade-offs between using single and multiple hypervisors: Simplified management – a…

    1 Comment

Others also viewed

Explore content categories