Sunday, February 19, 2012

Configuring Availability of Network Resources

Backing Up Data

Windows Server 2008 has an additional role installed called Windows Server Backup (WSB). Backup consists of a Microsoft Management Console (MMC) snap-in, command-line tools, and Windows PowerShell cmdlets.


New Windows Server Backup (WSB) Features
  • You can protect the entire server without using a separate backup and recovery technology
  • Backup entire server or selected volumes
  • Use wizards, tools, and the Complete PC Restore feature to assist in recovering a server
  • Easier to restore to a point in time
  • Can use Backup to provide application recovery
  • Improved scheduling utility
  • Better remote administration both from the GUI and through Windows PowerShell
  • Windows PowerShell brings us extensive command line support


The MMC snap-in is not available on Windows Server 2008 Standard operating system edition and all core installations. To manage backups on a Windows Server 2008 Standard, you must use the snap-in on another computer to manage the backups remotely. Or, you can use the command-line tools on the local computer.

Direct backup to tape is no longer supported and we now have to use network locations or DVD, removable media, or local storage.

You can use the Ntbackup.exe tool to mount tapes from previous backup versions in Windows Server 2000 and Windows Server 2003. However, you can not use it to create new backups on Windows Server 2008.


Permissions

By default, members in the following groups can backup and restore data on a server:

  • Administrators
  • Server Operators
  • Backup Operators

To increase security:

  • Custom groups that separate the backup and restore User Rights Assignments
  • Limit the number of users that belong to the default groups having backup and restore rights


Windows Server 2008 and Windows Server 2008 R2

Question: You have a network configured as a single Active Directory domain. All of your domain controllers run Windows Server 2008 R2. Several objects were accidentally deleted from Active Directory Domain Services. You need to recover the objects as quickly as possible. What is the first thing you should do in your recovery process?

Answer: Restart one domain controller in the Directory Services Restore Mode (DSRM). Then, perform an authoritative restore of the deleted objects. DSRM is used on a Microsoft Windows Domain Controller to take Active Directory offline. There is no reason to take all domain controllers offline and  this would interfere with network operations.

What is System State Data?


Windows Server 2008 does not backup and recover system state data by the same method as servers that run Windows Server 2003 or Windows Server 2000. Windows Server 2008 requires a backup of critical volumes rather than only backing up system state data.

The system components making up system state data depend on the server roles installed; the volumes that host the critical files the operating system and installed roles use. For example, if the machine is a domain controller, only the SYSVOL is backed up.



Component When is component included in System State?
Registry Always
Com+ and Class Registration database Always
Boot files, including system files Always
Active Directory Certificate Services database If it is a Certificate Services server
Active Directory Domain Services database If it is a domain
SYSVOL directory Only if a domain controller
Cluster service information If it is in a cluster
IIS Metadirectory If installed
System files under Windows Resource Protection Always


Optimizing Backup Performance


Windows Server Backup (WSB) performs a block level backup by writing to a virtual hard disk. That optimizes and increases performance, even if performing full backups on a constant basis.

You can choose one of the following settings available under the Configure Performance Settings option in the Actions pane of the Windows Server Backup:

  • Always perform full backup. Slows down the backup speed, but does not impact performance.
  • Always perform incremental backup. Increases backup speed, but does not impact performance.
  • Custom. You can configure each volume separately for full backup or incremental backup.

How is Data Restored?


The restore utility launches a wizard and must be installed by using the Initial Configuration Wizard or the Server Manager tool.

After data has been successfully backed up, you can use the Windows Server Backup Recover option in the Actions pane to recover volumes, folder, and files located on the local server, or a different server that you can connect to remotely.

Because we are using a block-level backup, in the back ground the virtual hard drive is mounted. We step through the wizard to restore data back to the server. 

Backup and Recovery

Specify a Backup Time


You can use the Backup Schedule Wizard located in the Windows Server Backup Actions pane to create a backup schedule. You have the ability to specify options and can backup the entire server or specific volumes only. You can schedule backups when you wish.

Demo – Installing an Configuring Windows Server Backup

  1. Start | Administrative Tools | Server Manager
  2. Highlight Features
  3. In the details pane, click on Add Features
  4. Check off the Window Server Backup Features
  5. Underneath Window Server Backup Features,you have:
    1. Windows Server Backup
    2. Command-line Tools (if you want command-line, you will also need Windows PowerShell. If you select Command-line, a dialog box pops-up giving you the option of installing the Windows PowerShell feature). In this example, we will add Windows PowerShell feature.
  6. Click Next
  7. Click Install
  8. Click Close
  9. Close Server Manager
  10. Go to Start | Administrative Tools | Windows Server Backup


  • The Volume Shadow Copy Service (VSS) is a built-in Windows mechanism that provides iterative (successive) versions of data. It provides a snapshot at a point-in-time.
  • Shadow copies can be used to:
    • Recover files
    • Review, save, or copy previous versions of files
Shadow copies are:


  • Enabled per volume
  • Not a replacement for your regular backups
  • Shadow copies are allocated storage limits versions
Question: You have some shared folders on a computer running Windows Server 2008 R2. You need to make sure users can recover recently overwritten or deleted files. What can you do?

Answer: Right click the Shared Folders in Computer Management, click All Tasks, and click Configure Shadow Copies. Go to the volume where the shared folders are located. Select Enable to enable shadow copies.
The end-user will have access to a file’s previous version on the Previous Versions tab of the file Properties. The user is able to view the previous version of the file and to copy a previous version of the file to a different location. The user can also recover the previous version of the file and overwrite the existing current version of the file.


Note that shadow copies maintain a maximum of 64 copies of a file. The copy schedule affects the amount of time that the oldest copies are deleted. Microsoft recommends writing shadow copies to a different volume on a different drive that the shared folders.

Shadow Copy Scheduling

The default schedule is 7:00 A.M. and noon each day.

Create a shadow copy schedule based on:

  • Volume of changes
  • Importance of changes
  • Storage limitations


Demo – Configure Shadow Copies (Server side)

  1. Go to Windows Explorer
  2. Right-click the D drive
  3. Select Properties
  4. Click on the Shadow Copies tab
  5. You will see the D drive highlighted. Choose Settings
    1. You can change the Storage area for the actual shadow copies.
    2. You can limit the size of the copy   Use limit:
    3. You can change the Schedule.
  6. Click OK
  7. Click OK
  8. Highlight the disk and you will see the Enable tab is greyed out to mean the shadow copy is now enabled
  9. If you want to perform a shadow copy now, click the Create Now button
  10. Click OK

Shadow Copies from the Client side

  • Windows XP and Windows 2000 Client computers must have the Previous Versions client installed (Windows 7, Vista and XP SP2+3)
  • Clients must use the share path to an object to show the Previous Versions tab (navigate to the share path and right-click on the file to see the Previous Versions option)
  • Shadow Copies do not replace regular backups

Note: if you have an older version of Windows XP or Windows 2000 SP3 or SP4, then you need a file called TWClient.msi. This can be found in the client’s directory of the Windows 2003 Server installation or downloaded free from Microsoft. This will allow the previous versions of the operating system to take advantage of the shadow copy.



Demo - Restore Shadow Copies on a Vista client

  1. Start | Run
  2. Type: \\nyc-dc1\shadow and click OK
  3. The client goes to the server and opens a document called ShadowTest
  4. Open the document and modify it in some way and then save the document
  5. Go to the Date modified column and right-click
  6. Select Restore previous versions. Optionally, if you go to Properties, prior to selecting Restore previous versions, you can see the File versions: and you can Open, Copy..., or Restore the file

Providing Server and Service Availability


How do you protect your servers from outages?

Fail-over clustering can be a great solution to a mission-critical application. If you lose one node in a cluster, then the passive node will fail-over and assume the responsibilities of the failed node. The interruption to the client/end-user is virtually un-noticeable. This allows you to repair the cluster, and then fail the failed cluster node back again.

Network Load Balancing (NLB) has had some significant enhancements in conjunction with ISA Server 2006. NLB provides us with the ability to load-balance and give us fault-tolerance with IP-based services, such as Web servers, Virtual Private Networking (VPN), Streaming Media, Terminal Services, Proxy, etc.

NLB Overview


When we install NLB as a network driver on our member servers or the host within a cluster, the computer must have only TCP/IP on the adapter. Do not add any other protocols to the adapter, for example, IPX. NLB allows for the creation of a cluster containing up to 32 computers, called cluster hosts. The NLB drivers effectively partition the client space among the cluster hosts. 

The client machine is only aware of the virtual IP and does not know it is communicating with multiple machines within the cluster. When the client initiates communication, it does it to the virtual IP. All the nodes in the cluster share the same virtual IP as well as their dedicated IP address. The client has a mapping to one of the nodes within the cluster, and only that node handles the client request and allows the request to propagate up to the TCP/IP protocol driver and eventually a server application. The other nodes within the NLB cluster drop that client’s request. If there is a failure in the NLB cluster, then the client request is handled by one of the other nodes within the NLB cluster. No new client requests are sent to the failed cluster host. Another host can be added to the cluster and will handle future client requests, seamlessly.

NLB is a Windows Server 2008 feature. Network Load Balancing is based on NDIS lightweight filter technology. Using NLB with Terminal Services offers increased availability, scalability, and load-balancing performance.

Windows Internals Book






Demo – Installing NLB

  1. Start | Administrative Tools | Server Manager
  2. Select Features
  3. In the details pane, select Add Features
  4. Check Network Load Balancing
  5. Click Next
  6. Select Install
  7. Click Close

Create NLB Cluster


There are three types of configuration:

  1. Host Parameters. Specify an id for each host in the NLB cluster. The host with the lowest numerical priority in the cluster, handles all of the network traffic not covered by a specific port rule. We can override the priorities by providing specific port ranges on the port rules tab.
  2. Cluster Parameters. This is where the IP address and subnet-mask is set up. The values have to be the same on all servers in the cluster. We also provide a full Internet name (FQDN) for the cluster. These parameters apply to a NLB cluster as a whole.
  3. Port Rules. Specify port rules to control traffic within the cluster. We can direct traffic to specific clusters within the array and we can set up filtering within the port-forwarding rules, in order to filter out certain types of traffic.

Note: You must be a member of the Administrators group on the host you are configuring, or you must have been delegated authority to use the NLB Manager. If you are configuring a cluster or host by running the NLB Manager on a computer that is not part of the cluster, you do not have to be an Administrator on that computer.

Demo – Configure an NLB Cluster

(How to create a enable NLB, how we create an NLB cluster, and how to add hosts to the cluster)

  1. Start | Administrative Tools | Network Load Balancing Manager
  2. Highlight Network Load Balancing Clusters and right-click select New Cluster
  3. New Cluster: Connect dialog box displays
  4. In the Host: text box, type: nyc-svr1 and click Connect
  5. In the Interfaces available for configuring a new cluster section, choose Local Area Connection
  6. Click Next
  7. We can click Add to add multiple IP address, set the Priority, and set the Initial host state (Started, Stopped, Suspended)
  8. Click Next
  9. Then we choose a cluster IP address. This is the virtual IP address used for the cluster. Click Add.
  10. You can add an Ipv4 or Ipv6 address. We will use Ipv4, 192.168.2.200. When we click on Subnet mask:, it fills in the default classful subnet mask. (You might need to modify this, if you are not using classful IP addresses)
  11. Click OK
  12. Click Next
  13. In the next dialog box, enter the Full Internet name: for the NLB cluster. We will enter web1.woodgrovebank.com. We can use one of several Cluster operation mode:
    1. Unicast (we will use this)
    2. Multicast
    3. IGMP multicast
  14. Click Next
  15. The Port Rules dialog box displays for TCP and UDP traffic
  16. Select Finish
  17. After returning to the main dialog box, right click on the web1.woodgrovebank.com and select Add Host to Cluster.
  18. In the Host: text box,type: nyc.dc1 and click Connect
  19. Click Next
  20. Notice the priority is 2
  21. Click Next
  22. You can set up port rules if you need to. Click Finish

What is a Failover Cluster?


A failover cluster is a group of independent computers that work together to increase availability of applications and services. They are physically cabled together and can be connected by software, also.

Improvements to Failover Clustering within Windows Server 2008

  • Validation feature ensures system, storage, and network configuration is suitable for a cluster
  • Support for globally unique identifier (GUID) partition table (GPT) disks in cluster storage
  • Cluster setup improvements to the wizard
  • Simplified configuration to manage the application interface
  • Improved stability and security, resulting in increased availability
  • Improved cluster communication with storage
  • Improvements to networking and security


Hardware Requirements

  • The additional hardware needed for Failover Clustering needs to be certified for use with Windows Server 2008
  • Additional network adapters and cabling so that we can create our private network between the nodes of our cluster
  • The operating system should be Windows Server 2008 Enterprise edition or later
  • Device controllers or appropriate adapters for storage
  • Storage


Best Practices

  • Properly secure the NLB hosts and load-balanced applications.
    • NLB does not provide additional security for the load-balanced hosts.
    • You must protect the NLB subnet from intrusion
  • Microsoft recommends two or more network adapters in each cluster when possible.
    • If the cluster is operating in the default unicast mode, NLB is unable to distinguish between single adapters on each host.
    • If you use two network adapters, as recommended, make sure you install Network Load Balancing on only one adapter.
    • Use only the TCP/IP network protocol on the cluster adapter.
  • Enable Network Load Balancing Manager logging:
    • The Network Load Balancing Manager (NLBM) can be configured to log each NLBM event. Enable NLBM logging by clicking Log Settings in the NLBM Options menu. Select the Enable logging check box, and specify a name and location for the log file.
    • The Network Load Balancing Manager log file must be properly secured, as it contains potentially sensitive info. By default, the log file inherits the directory’s security settings in which it is created, so you may need to change the permissions on the file to restrict read and write access to some individuals. Be aware the person using NLBM requires full control of the log file.
  • Verify the load-balanced app is started on all cluster hosts where the app is installed:
    • NLB does not start or stop applications

No comments:

Post a Comment

"Comment As:" anonymous if you would rather not sign into an account!