Solved

virtualizing Exchange and Oralce?

Posted on 2010-09-08
2
397 Views
Last Modified: 2012-05-10
Does anybody do that? Would you please describe your environment a little and your experience with performance difference if any?
0
Comment
Question by:PaperTiger
2 Comments
 
LVL 40

Accepted Solution

by:
coolsport00 earned 250 total points
ID: 33632235
I virtualize both Exchg 2K7 SP2 as well as SQL 2K5. I have a 2-host vSphere (ESX 4.x) cluster, with 32GB RAM on each host, and each host has dual quad-core CPUs. Overall I have about 20-25 VMs in the cluster, equally dispersed between hosts and I have absolutely no performance issues at all. I don't use MSCS. I backup my DBs with my traditional b/u solution (Avamar). For recovery, I have a b/u of my VMs using Veeam. I can easily do a simple restore of the VMs using Veeam if need be, then use Avamar to restore the DB data. Many admins virtualize their email/DB servers.

Regards,
~coolsport00

p.s. VMware has some whitepapers on performance of SQL and Exchg both. They actually had a session at EMC World on virtualizing Exchg 2010, using 1 vCPU and 8GB RAM for 1000 users and it ran well.....pretty impressive! Anyway...if you're wanting to virtualize one or both, you won't have any problems. Just make sure you have a moderately loaded host/server (CPU/RAM-wise). Hope that helps.
0
 
LVL 10

Assisted Solution

by:ddiazp
ddiazp earned 250 total points
ID: 33658103
We run 3 ESX Hosts each with 96GB of RAM, 16 CPU Cores; we have multiple Exchange and Oracle databases serving 3000 thousand concurrent users with no problem; Im sure lower hardware wouldnt have problems either. We also converted one server running exchange 2003 to a VM seamlessly; performance is top notch, no emails were lost and queues cleared quickly.

For Oracle, you should store your DB on dedicated SAN Datastore if available to avoid affecting other VMs I/O on the same host.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Will try to explain how to use the VMware feature TAGs in the VMs and create Veeam Backup Jobs using TAGs. Since this article is too long, I will create second article for the Veeam tasks.
HOW TO: Install and Configure VMware vSphere Hypervisor 6.5 (ESXi 6.5), Step by Step Tutorial with screenshots. From Download, Checking Media, to Completed Installation.
Teach the user how to install log collectors and how to configure ESXi 5.5 for remote logging Open console session and mount vCenter Server installer: Install vSphere Core Dump Collector: Install vSphere Syslog Collector: Open vSphere Client: Config…
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now