Solved

performance tuning with server 2008 and HyperV

Posted on 2008-10-29
1
232 Views
Last Modified: 2013-11-29
I have a 2000 server running Exchange and Terminal Services on a P3-based computer with SCSI drives and 2 gig of RAM. There are no performance issues at all with the system currently.  I would like to virtualize it so that is running as a virtual session under 2008 64 bit version with HyperV and the latest greatest hardware platform and 8 gig of RAM. On paper the specs of the new hardware system - quadcore 2.83 MhZ and Raptor drives - are approximately 3 or 4 times as powerful as the old system so there would be a dramatic performance improvement if I ran the old system  native   on the new hardware. What kind of performance hit would I take virtualizing it?  As long as it's as fast after virtualization as the old system that's fine.  Again, there is no need at all for performance improvement.
0
Comment
Question by:lineonecorp
1 Comment
 
LVL 13

Accepted Solution

by:
brent_caskey earned 125 total points
Comment Utility
You should see performance gains with what you are doing. The overhead on Hyper-V is extremely low. QLogic stated that they only see a 3% decrease in speed with their HBAs when comparing a "regular" server to a Hyper-V VM. So, the upgrade in physical hardware will make the VM perform much faster.

Here are some references that I would recommend reading prior to Hyper-V deployment:
http://download.microsoft.com/download/8/1/5/81556693-1f05-494a-8d45-cdeeb6d735e0/HyperV_Deploy.doc

http://technet.microsoft.com/en-us/library/cc732470.aspx

If you want to maximize performance on the Hyper-V server, the following is a great document: http://www.microsoft.com/whdc/system/sysperf/Perf_tun_srv.mspx (See Performance Tuning for Virtualization Servers)


0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Nowadays, Virtual Machines are used equally by small and large scale organizations. However the issue is that VMDK files are also prone to corruption. So, in this article we are looking at how to recover VMDK files from hard disk of host operating s…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now