Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

Related Topics: Microsoft Cloud, Containers Expo Blog, Cognitive Computing , Silverlight, Agile Computing, @CloudExpo

Microsoft Cloud: Blog Post

Best Practices for Virtualizing Microsoft Exchange in Private Clouds

Resource-intensive scale-out nature of heavy duty workload requires special planning

In my Private Cloud talks with IT Pros, how best to virtualize Microsoft Exchange workloads, regardless of underlying hypervisor, has been a recurring hot topic area of discussion.  At Microsoft Tech Ed 2012, Jeff Mealiffe, Senior Program Manager on the Exchange team and responsible for Exchange virtualization guidance, delivered a great session on "Best Practices for Virtualizing Microsoft Exchange Server 2010".  This is a great resource to study when planning virtualized Exchange deployments! Below, I've included the following items to help you get started with virtualizing Exchange:

  • The recorded session video
  • A link to the downloadable slide deck
  • An indexed recap of my session notes
  • Links to additional tools and resources that I've personally found helpful

I'm definitely looking forward to building my next virtualized deployment of Exchange 2010 on Windows Server 2012 RTM when it releases on Sept 4th!  The increased VM resource densities in Hyper-V v3 of up to 64 virtual processors and 1TB RAM per virtual machine will be a big boost to virtualizing mission critical heavy-duty workloads like Exchange mailbox server roles and multi-role servers.

Download a copy of the session slide deck.

Session Notes with Video Index

  • Supported Exchange Virtualization Scenarios [ 4:00 ]
    • Exchange 2010 SP1 or later
    • Hyper-V or any hypervisor in the Server Virtualization Validation Program (SVVP) - link provided below.
  • Items Not Supported when Virtualizing Exchange [ 7:00 ]
    • Hypervisor snapshots
    • Differencing / Delta disks
    • CPU oversubscription in a ratio > 2:1
    • Applications running on the parent / root partition
    • VSS backups of VMs from root
    • NAS storage of virtual disk files
  • JetStress Support in Virtualized Environments [ 12:10 ]
    • Supported in VMs on Microsoft Windows Server 2008 R2 or later
    • Supported in VMs on Microsoft Hyper-V Server 2008 R2 or later
    • Supported in VMs on VMware ESX 4.1 or later
    • More Info - http://bit.ly/HP8G0f
  • Big Problems to Avoid for Production Exchange VMs [ 17:53 ]
    • Dynamic Memory / Memory Overcommit  [ 18:00 ]
    • VM Snapshots [ 31:57 ]
    • CPU Oversubscription [ 35:05 ]
  • Overview of Best Practices [ 38:05 ]
    • Hypervisor adds CPU overhead - 10-12% in our Exchange 2010 tests [ 39:22 ]
    • Size for physical and provide those resources to each VM [ 40:31 ]
    • Exchange is architected for scale-out scenarios, avoid "all eggs in one basket" [ 40:48 ]
  • Resource Sizing [ 43:16 ]
    • Start with physical sizing process - use calculator (listed below)
    • Account for virtualization overhead (10-12%)
    • Determine VM placement to account for HA
    • Size root servers, storage and network infrastructure
  • Guest VM sizing [ 47:18 ]
    • Size Mailbox role first - other role sizes factored from Mailbox server requirements
    • Considerations for use of Multi-role servers - Mailbox, Hub and CAS roles on single VM
  • Unified Messaging Sizing [ 49:08 ]
    • Min 4 Virtual Processors (VP)
    • VM with 4VP & 16GB memory can handle 40 concurrent calls with Voice Mail Preview (65 calls without)
  • Storage Decisions [ 52:47 ]
    • Exchange storage separate from Guest OS virtual disk physical storage
    • Must be fixed virtual disk, SCSI pass-through (RDM) or iSCSI (terminated at host or guest)
    • SCSI pass-through (RDM) recommended to host queues, DBs and logfile streams unless using Hyper-V Live Migration where CSV is recommended
    • Must be block-level storage - NAS volumes not supported
  • Virtual Processors [ 56:04 ]
    • Prefer smaller number of multi-core VMs vs many single-core VMs
    • Don't assume that a hyperthreaded (SMT) CPU is a full CPU core
  • Private Cloud [ 57:08 ]
    • Good model for providing virtual infrastructure resources to Exchange, but be careful with "dynamic" cloud capabilities
    • Be prepared to apply different resource management policies to Exchange VMs
  • Host-based Failover Clustering [ 59:41 ]
    • Not an "Exchange Aware" HA Solution - Does not provide HA in the event of storage failure / data corruption
    • If using, combine with DAG when possible to provide maximum HA - Admin can re-balance DAG after failover to redistribute
  • VM Live Migration and Exchange [ 01:04:50 ]
    • DAG does not need to be dynamically re-balanced
    • Use CSV rather than pass-through LUNS for all Mailbox VM storage
    • Consider relaxing cluster heartbeat timeouts (5 seconds = default, 30 seconds = max recommended)
    • Size network appropriately for Live Migration
  • VM Placement [ 01:08:26 ]
    • Don't co-locate DAG database copies on same physical hosts
    • Distribute VMs running same roles to different physical hosts
    • If not using multi-role VM's, consider isolating mailbox and hub role VMs on separate physical hosts if possible

Additional Tools and Resources

Build Your Lab! Build Your Lab! Download Windows Server 2012
Build Your Lab in the Cloud! Don’t Have a Lab? Build Your Lab in the Cloud with Windows Azure Virtual Machines
Join our "Early Experts" study group! Want to Get Certified? Join our Windows Server 2012 "Early Experts" Study Group
Like IT Pros ROCK! Do IT Pros ROCK? Please VOTE for us!

More Stories By Keith Mayer

Keith Mayer is a Technical Evangelist at Microsoft focused on Windows Infrastructure, Data Center Virtualization, Systems Management and Private Cloud. Keith has over 17 years of experience as a technical leader of complex IT projects, in diverse roles, such as Network Engineer, IT Manager, Technical Instructor and Consultant. He has consulted and trained thousands of IT professionals worldwide on the design and implementation of enterprise technology solutions.

Keith is currently certified on several Microsoft technologies, including System Center, Hyper-V, Windows, Windows Server, SharePoint and Exchange. He also holds other industry certifications from IBM, Cisco, Citrix, HP, CheckPoint, CompTIA and Interwoven.

Keith is the author of the IT Pros ROCK! Blog on Microsoft TechNet, voted as one of the Top 50 "Must Read" IT Blogs.

Keith also manages the Windows Server 2012 "Early Experts" Challenge - a FREE online study group for IT Pros interested in studying and preparing for certification on Windows Server 2012. Join us and become the next "Early Expert"!

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...