SCVMM R2 Operations Management nine: adding non-trusted Hyper-V hosts and clusters

Source: Internet
Author: User
Tags fully qualified domain name

SCVMM R2 Operations Management nine: adding non-trusted Hyper-V hosts and clusters

In our previous blog post, we have explained how to add trusted Hyper-V hosts and clusters to SCVMM, and I believe everyone has a more profound understanding, so today's blog post come and talk to you: How to add a host or cluster that is not trusted Hyper-V.

You can use the following procedure to add a Hyper-V host or Hyper-V host cluster for an untrusted Active Directory domain as a managed Hyper-V host in Virtual machine Manager. During the installation of the agent service, VMM generates a certificate that is used to encrypt the communication with the host. When VMM adds a host, the certificate is automatically imported into the trusted certificate store of the VMM Management Server.

Note: You cannot perform a local installation of the VMM agent on a computer that is located in an untrusted domain. You must follow the procedures in VMM to perform a remote agent installation.

Prerequisite

1. If you use Group Policy to configure Windows remote management (WinRM) settings, be aware that VMM does not support configuring WinRM Group Policy settings (services or clients) on hosts that are located in untrusted Active Directory domains. If the WinRM Group Policy setting is enabled, the installation of the VMM agent may fail. (The WinRM policy setting is located in the computer Configuration \ Administrative Templates \ Windows components \ Windows Remote Management (WinRM) node of the Local Group Policy Editor or the Group Policy Management Console (GPMC). )

2. Although not a necessary prerequisite, you can create a run as account before you begin this procedure. (You can also create the account in the process.) The run as account must have administrative permissions on all hosts that you want to add.

Experiment Preparation:

Create a run as account "untrusted Hyper-V host":

Click "Settings"----"Create a Run as account":

650) this.width=650; "Width=" 644 "height=" 387 "title=" clip_image002 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image002" src= "http://s3.51cto.com/wyfs02/M02/6F/77/wKioL1Wd2dyRl59mAAFWlB-1ZiI618.jpg" border= "0"/ >

Enter the name "untrusted Hyper-V host" and the appropriate user name and password, click OK.

650) this.width=650; "Width=" 644 "height=" 480 "title=" clip_image004 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image004" src= "http://s3.51cto.com/wyfs02/M02/6F/7B/wKiom1Wd2Aywvc4yAAFPOY6-gLw542.jpg" border= "0"/ >

Ok, the preparation is done, let's see how to add an "untrusted Hyper-V host":

To add a Hyper-V host in an untrusted Active Directory domain, follow these steps:

1. Open the "Construction" workspace:

650) this.width=650; "Width=" 644 "height=" 388 "title=" clip_image006 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image006" src= "http://s3.51cto.com/wyfs02/M00/6F/7B/wKiom1Wd2AyRJrlMAAG1z6HgnxI052.jpg" border= "0"/ >

2. In the fabric pane, click Servers:

650) this.width=650; "Width=" 644 "height=" 387 "title=" clip_image008 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image008" src= "http://s3.51cto.com/wyfs02/M01/6F/7B/wKiom1Wd2AzizUvEAAFIXUURvYE064.jpg" border= "0"/ >

3. On the Home tab, in the Add Group, click Add Resource, and then click Hyper-V Hosts and clusters, the Add Resource Wizard opens:

650) this.width=650; "Width=" 644 "height=" 388 "title=" clip_image010 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image010" src= "http://s3.51cto.com/wyfs02/M02/6F/7B/wKiom1Wd2AzCK41bAAF25o2XOW4286.jpg" border= "0"/ >

4. On the Resource Location page, click Windows Server Computers in a non-trusted Active Directory domain, and then click Next.

650) this.width=650; "width=" 580 "height=" 484 "title=" clip_image012 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image012" src= "http://s3.51cto.com/wyfs02/M00/6F/7B/wKiom1Wd2A3Cy78dAAF4BgzeOxE448.jpg" border= "0"/ >

5. On the Credentials page, next to the Run as Account box, click Browse, click the Run as account that has administrative permissions on the host that you want to add, click OK, and then click Next:

650) this.width=650; "Width=" 578 "height=" 484 "title=" clip_image014 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image014" src= "http://s3.51cto.com/wyfs02/M01/6F/7B/wKiom1Wd2A2RqQUwAAGsFx4zffk200.jpg" border= "0"/ >

If you do not have a run as account, click Browse, and then click Create Run as account in the Select Run As Account dialog box:

650) this.width=650; "Width=" 501 "height=" 484 "title=" clip_image015 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image015" src= "http://s3.51cto.com/wyfs02/M02/6F/7B/wKiom1Wd2A3hF0hQAAFu2xVXzO0957.jpg" border= "0"/ >

Because I created a new run as account when I was ready to work, just select "Untrusted Hyper-V host" and click Next:

650) this.width=650; "Width=" 578 "height=" 484 "title=" clip_image017 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image017" src= "http://s3.51cto.com/wyfs02/M00/6F/7B/wKiom1Wd2A2hKWwnAAFKgtPNqPA355.jpg" border= "0"/ >

6. On the target Resources page, in the fully qualified domain name (FQDN) or IP address box, enter the FQDN or IP address of the Hyper-V host or Hyper-V host cluster that you want to add, and then click Add

Attention:

1. If you are adding a Hyper-V host cluster, you can specify the cluster name or the name of one of the cluster nodes, and if successful, the host will be listed under computer name.

2. To add multiple hosts repeat this step and click Next when you are finished.

For example, enter vmm-01.wyz.com, where wyz.com is the name of an untrusted domain, click Next:

650) this.width=650; "Width=" 575 "height=" 484 "title=" clip_image019 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image019" src= "http://s3.51cto.com/wyfs02/M01/6F/77/wKioL1Wd2d7j5yDOAAFFz0K-qbA809.jpg" border= "0"/ >

7. On the Host Settings page, do the following:

A. In the host group list, click the host group for which you want to assign a master or host cluster.

B. In the Add the following path box, enter the path on the host where you want to store the virtual machine files that are deployed on the host, and then click Add. Repeat this step if you want to add multiple paths. Note the following behavior: If you leave this box blank, the default path,%systemdrive%\programdata\microsoft\windows\hyper-v, is used. Note that it is best not to add the default path on the drive where the operating system files are located.

? If you specify a path that does not exist, the path is created automatically.

? When you add a host cluster, do not arbitrarily specify a default virtual machine path for the standalone host. For host clusters, VMM automatically manages the paths available to virtual machines on the shared storage that is available to the host cluster.

C. Click "Next" when you are finished.

650) this.width=650; "Width=" 576 "height=" 484 "title=" clip_image021 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image021" src= "http://s3.51cto.com/wyfs02/M02/6F/77/wKioL1Wd2jTw2-RnAAFlbIkPP3k794.jpg" border= "0"/ >

7. On the summary page, confirm the settings, and then click Finish.

650) this.width=650; "Width=" 575 "height=" 484 "title=" clip_image023 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image023" src= "http://s3.51cto.com/wyfs02/M00/6F/77/wKioL1Wd2jTjHOBLAAE_w6ouJg0825.jpg" border= "0"/ >

The Jobs dialog box appears to display the job status. Make sure that the status of the job is completed, and then close the dialog box.

650) this.width=650; "Width=" 644 "height=" 443 "title=" clip_image025 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image025" src= "http://s3.51cto.com/wyfs02/M01/6F/77/wKioL1Wd2jSyRKTPAAJLHB1L4hk969.jpg" border= "0"/ >

As you can see, the addition of untrusted hosts has been completed:

650) this.width=650; "Width=" 644 "height=" 445 "title=" clip_image027 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image027" src= "http://s3.51cto.com/wyfs02/M02/6F/77/wKioL1Wd2jSS2rf0AAImc_XNTe8002.jpg" border= "0"/ >

8. To verify that the host was successfully added, in the Fabric pane, expand the host group in which you want to add the hosts, click Host, and then verify that the host status is normal in the hosts pane.

650) this.width=650; "Width=" 644 "height=" 393 "title=" clip_image029 "style=" padding-top:0px;padding-right:0px; Padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;background-image:none; " alt= "clip_image029" src= "http://s3.51cto.com/wyfs02/M00/6F/77/wKioL1Wd2jTyok2QAAF4zROtR0E672.jpg" border= "0"/ >

As you can see, add untrusted hosts or cluster operations and finish!

Ok, here we are today's experiment is over!

This article is from the "Wu Yuzhang Microsoft blog" blog, make sure to keep this source http://wuyvzhang.blog.51cto.com/9992636/1672421

SCVMM R2 Operations Management nine: adding non-trusted Hyper-V hosts and clusters

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.