Re-Structured Documentation
This commit is contained in:
66
Workflows/Windows/Change Windows Edition.md
Normal file
66
Workflows/Windows/Change Windows Edition.md
Normal file
@ -0,0 +1,66 @@
|
||||
# Changing Windows Editions
|
||||
### Changing Editions:
|
||||
Windows Server: `DISM /ONLINE /set-edition:serverstandard /productkey:AAAAA-BBBBB-CCCCC-DDDDD-EEEEE /AcceptEula`
|
||||
|
||||
Windows (Home/Pro): `DISM /ONLINE /set-edition:professional /productkey:AAAAA-BBBBB-CCCCC-DDDDD-EEEEE /AcceptEula`
|
||||
|
||||
### Force Activation / Edition Switcher:
|
||||
`irm https://get.activated.win | iex`
|
||||
|
||||
## Generic Install Keys
|
||||
### Windows 10
|
||||
| Windows Edition | RTM Generic Key (Retail) | [**KMS Client Setup Key**](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj612867(v%3dws.11)) |
|
||||
| :--- | :--- | :--- |
|
||||
| Windows 10 Home | YTMG3-N6DKC-DKB77-7M9GH-8HVX7 | TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 |
|
||||
| Windows 10 Home N | 4CPRK-NM3K3-X6XXQ-RXX86-WXCHW | 3KHY7-WNT83-DGQKR-F7HPR-844BM |
|
||||
| Windows 10 Home Single Language | BT79Q-G7N6G-PGBYW-4YWX6-6F4BT | 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH |
|
||||
| Windows 10 Pro | VK7JG-NPHTM-C97JM-9MPGT-3V66T | W269N-WFGWX-YVC9B-4J6C9-T83GX |
|
||||
| Windows 10 Pro N | 2B87N-8KFHP-DKV6R-Y2C8J-PKCKT | MH37W-N47XK-V7XM9-C7227-GCQG9 |
|
||||
| Windows 10 Pro for Workstations | DXG7C-N36C4-C4HTG-X4T3X-2YV77 | NRG8B-VKK3Q-CXVCJ-9G2XF-6Q84J |
|
||||
| Windows 10 Pro N for Workstations | WYPNQ-8C467-V2W6J-TX4WX-WT2RQ | 9FNHH-K3HBT-3W4TD-6383H-6XYWF |
|
||||
| Windows 10 S | 3NF4D-GF9GY-63VKH-QRC3V-7QW8P | |
|
||||
| Windows 10 Education | YNMGQ-8RYV3-4PGQ3-C8XTP-7CFBY | NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 |
|
||||
| Windows 10 Education N | 84NGF-MHBT6-FXBX8-QWJK7-DRR8H | 2WH4N-8QGBV-H22JP-CT43Q-MDWWJ |
|
||||
| Windows 10 Pro Education | 8PTT6-RNW4C-6V7J2-C2D3X-MHBPB | 6TP4R-GNPTD-KYYHQ-7B7DP-J447Y |
|
||||
| Windows 10 Pro Education N | GJTYN-HDMQY-FRR76-HVGC7-QPF8P | YVWGF-BXNMC-HTQYQ-CPQ99-66QFC |
|
||||
| Windows 10 Enterprise | XGVPP-NMH47-7TTHJ-W3FW7-8HV2C | NPPR9-FWDCX-D2C8J-H872K-2YT43 |
|
||||
| Windows 10 Enterprise G | | YYVX9-NTFWV-6MDM3-9PT4T-4M68B |
|
||||
| Windows 10 Enterprise G N | FW7NV-4T673-HF4VX-9X4MM-B4H4T | 44RPN-FTY23-9VTTB-MP9BX-T84FV |
|
||||
| Windows 10 Enterprise N | WGGHN-J84D6-QYCPR-T7PJ7-X766F | DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4 |
|
||||
| Windows 10 Enterprise S | NK96Y-D9CD8-W44CQ-R8YTK-DYJWX | FWN7H-PF93Q-4GGP8-M8RF3-MDWWW |
|
||||
| Windows 10 Enterprise 2015 LTSB | | WNMTR-4C88C-JK8YV-HQ7T2-76DF9 |
|
||||
| Windows 10 Enterprise 2015 LTSB N | | 2F77B-TNFGY-69QQF-B8YKP-D69TJ |
|
||||
| Windows 10 Enterprise LTSB 2016 | | DCPHK-NFMTC-H88MJ-PFHPY-QJ4BJ |
|
||||
| Windows 10 Enterprise N LTSB 2016 | RW7WN-FMT44-KRGBK-G44WK-QV7YK | QFFDN-GRT3P-VKWWX-X7T3R-8B639 |
|
||||
| Windows 10 Enterprise LTSC 2019 | | M7XTQ-FN8P6-TTKYV-9D4CC-J462D |
|
||||
| Windows 10 Enterprise N LTSC 2019 | | 92NFX-8DJQP-P6BBQ-THF9C-7CG2H |
|
||||
| Windows 10 Home | 37GNV-YCQVD-38XP9-T848R-FC2HD | | |
|
||||
| Windows 10 Home N | 33CY4-NPKCC-V98JP-42G8W-VH636 | | |
|
||||
| Windows 10 Pro | NF6HC-QH89W-F8WYV-WWXV4-WFG6P | | |
|
||||
| Windows 10 Pro N | NH7W7-BMC3R-4W9XT-94B6D-TCQG3 | | |
|
||||
| Windows 10 SL | NTRHT-XTHTG-GBWCG-4MTMP-HH64C | | |
|
||||
| Windows 10 CHN SL | 7B6NC-V3438-TRQG7-8TCCX-H6DDY | | |
|
||||
| Windows 10 Home | 46J3N-RY6B3-BJFDY-VBFT9-V22HG | | |
|
||||
| Windows 10 Home N | PGGM7-N77TC-KVR98-D82KJ-DGPHV | | |
|
||||
| Windows 10 Pro | RHGJR-N7FVY-Q3B8F-KBQ6V-46YP4 | | |
|
||||
| Windows 10 Pro N | 2KMWQ-NRH27-DV92J-J9GGT-TJF9R | | |
|
||||
| Windows 10 SL | GH37Y-TNG7X-PP2TK-CMRMT-D3WV4 | | |
|
||||
| Windows 10 CHN SL | 68WP7-N2JMW-B676K-WR24Q-9D7YC | | |
|
||||
|
||||
|
||||
### Windows Server
|
||||
| Windows Edition | RTM Generic Key (Retail) | [**KMS Client Setup Key**](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj612867(v%3dws.11)) |
|
||||
| :--- | :--- | :--- |
|
||||
| Windows Server 2016 Datacenter | | CB7KF-BWN84-R7R2Y-793K2-8XDDG |
|
||||
| Windows Server 2016 Standard | | WC2BQ-8NRM3-FDDYY-2BFGV-KHKQY |
|
||||
| Windows Server 2016 Essentials | | JCKRF-N37P4-C2D82-9YXRT-4M63B |
|
||||
| Windows Server 2019 Datacenter | | WMDGN-G9PQG-XVVXX-R3X43-63DFG |
|
||||
| Windows Server 2019 Standard | | N69G4-B89J2-4G8F4-WWYCC-J464C |
|
||||
| Windows Server 2019 Essentials | | WVDHN-86M7X-466P6-VHXV7-YY726 |
|
||||
| Windows Server 2022 Standard | | VDYBN-27WPP-V4HQT-9VMD4-VMK7H |
|
||||
| Windows Server 2022 Datacenter Azure | | NTBV8-9K7Q8-V27C6-M2BTV-KHMXV |
|
||||
| Windows Server 2022 Datacenter | | WX4NM-KYWYW-QJJR4-XV3QB-6VM33 |
|
||||
|
||||
## Additional Reference Documentation:
|
||||
https://www.tenforums.com/tutorials/95922-generic-product-keys-install-windows-10-editions.html
|
||||
[https://learn.microsoft.com/en-us/windows-server/get-started/kms-client-activation-keys](https://learn.microsoft.com/en-us/windows-server/get-started/kms-client-activation-keys)
|
@ -0,0 +1,13 @@
|
||||
**Purpose:** You may find that Windows 11 does not allow you to install it with a local account. This is a documented case of Microsoft attempting to push Microsoft accounts, and can be bypassed by following the workflow below:
|
||||
|
||||
## Initial Boot to Windows 11 Installer
|
||||
- Begin installing the OS as normal, selecting the region/language
|
||||
- Before you accept the EULA, press `SHIFT+F10` to open the Administrative Command Prompt
|
||||
- Type `OOBE\BYPASSNRO` > This will reboot the computer back into the installer
|
||||
|
||||
## Second Boot to Windows 11 Installer
|
||||
- When prompted for an internet connection, select `I don't have Internet`
|
||||
- Set up the local administrator account as normal and finish the OS installation process
|
||||
|
||||
!!! warning "Disconnect Internet"
|
||||
To ensure a clean installation devoid of additional issues, make sure to disconnect the physical/virtual network from the device before proceeding to install Windows 11 as normal. This time, you will not be prompted to login with a Microsoft account.
|
@ -0,0 +1,27 @@
|
||||
**Purpose**:
|
||||
To deploy a shortcut to the desktop pointing to a network share's root path. (e.g. `\\storage.bunny-lab.io`). There is a quirk with how Windows handles network shares and shortcuts and doesn't like when you point the shortcut to a root UNC path.
|
||||
|
||||
### Group Policy Location
|
||||
``` mermaid
|
||||
graph LR
|
||||
A[Create Group Policy] --> B[User Configuration]
|
||||
B --> C[Preferences]
|
||||
C --> D[Windows Settings]
|
||||
D --> E[Shortcuts]
|
||||
```
|
||||
|
||||
### Group Policy Settings
|
||||
- **Action**: `Update`
|
||||
- **Name**: `<FriendlyName>`
|
||||
- **Target Type**: `File System Object`
|
||||
- **Location**: `Desktop`
|
||||
- **Target Path**: `C:\windows\explorer.exe`
|
||||
- **Arguments**: `\\storage.bunny-lab.io`
|
||||
- **Start In**: `<Blank>`
|
||||
- **Shortcut Key**: `<None>`
|
||||
- **Run**: `Normal Window`
|
||||
- **Icon File Path**: `%SystemRoot%\System32\SHELL32.dll`
|
||||
- **Icon Index**: `9`
|
||||
|
||||
### Additional Notes
|
||||
Navigate to the "**Common**" tab in the properties of the shortcut, and check the "**Run in logged-on user's security context (user policy option)**".
|
12
Workflows/Windows/Windows Server/LDAP Settings.md
Normal file
12
Workflows/Windows/Windows Server/LDAP Settings.md
Normal file
@ -0,0 +1,12 @@
|
||||
**Purpose**: LDAP settings are used in various services from privacyIDEA to Nextcloud. This will outline the basic parameters in my homelab that are necessary to make it function.
|
||||
|
||||
| **Field** | **Value** | **Description** |
|
||||
| :--- | :--- | :--- |
|
||||
| Server Address(s) | `ldap://bunny-dc-01.bunny-lab.io` / `192.168.3.8`, `ldap://bunny-db-02.bunny.lab.io` / `192.168.3.9` | Domain Controllers |
|
||||
| Port | `389` | Unencrypted LDAP |
|
||||
| STARTTLS | `Disabled` | |
|
||||
| Base DN | `CN=Users,DC=bunny-lab,DC=io` | This is where users are pulled from |
|
||||
| User / Bind DN | `CN=Nicole Rappe,CN=Users,DC=bunny-lab,DC=io` | This is the domain admin used to connect to LDAP |
|
||||
| User / Bind Password | `<Password for User / Bind DN>` | Domain Credentials for Domain Admin account |
|
||||
| Login Attribute | ` LDAP Filter: (&(&(|(objectclass=person))(|(|(memberof=CN=Domain Users,CN=Users,DC=bunny-lab,DC=io)(primaryGroupID=513))))(samaccountname=%uid)) ` | Used by Nextcloud |
|
||||
| Login Attribute | `(sAMAccountName=*)(objectCategory=person)` | Used by PrivacyIDEA |
|
@ -0,0 +1,22 @@
|
||||
**Purpose**: Sometimes you may find that you need to convert a `.crt` or `.pem` certificate file into a `.pfx` file that Microsoft IIS Server Manager can import for something like Exchange Server or another custom IIS-based server.
|
||||
|
||||
# Download the Certificate Files
|
||||
This step will vary based on how you are obtaining the certificates. The primary thing to focus on is making sure you have the certificate file and the private key.
|
||||
```jsx title="Certificate Folder Structure"
|
||||
certificate.crt
|
||||
certificate.pem
|
||||
gd-g2_iis_intermediates.p7b
|
||||
private.key
|
||||
```
|
||||
|
||||
# Convert using OpenSSL
|
||||
You will need a linux machine such as Ubuntu 22.04LTS, or to download the Windows equivelant of OpenSSL in order to run the necessary commands to convert and package the files into a `.pfx` file that IIS Server Manager can use.
|
||||
!!! note
|
||||
You need to make sure that all of the certificate files as well as private key are in the same folder (to keep things simple) during the conversion process. **It will prompt you to enter a password for the PFX file, choose anything you want.**
|
||||
|
||||
```jsx title="OpenSSL Conversion Command"
|
||||
openssl pkcs12 -export -out IIS-Certificate.pfx -inkey private.key -in gd-g2_iis_intermediates.p7b -in certificate.crt
|
||||
```
|
||||
|
||||
!!! tip
|
||||
You can rename the files anything you want for organizational purposes. Afterall, they are just plaintext files. For example, you could rename `gd-g2_iis_intermediates.p7b` to `intermediate.bundle` and it would still work without issue in the command. During the import phase in IIS Server Manager, you can check a box to enable Exporting the certificate, effectively reverse-engineering it back into a certificate and private key.
|
@ -0,0 +1,119 @@
|
||||
**Purpose**: Deploying a Windows Server Node into the Hyper-V Failover Cluster is an essential part of rebuilding and expanding the backbone of my homelab. The documentation below goes over the process of setting up a bare-metal host from scratch and integrating it into the Hyper-V Failover Cluster.
|
||||
|
||||
!!! note "Prerequisites & Assumptions"
|
||||
This document assumes you are have installed and are running a bare-metal Hewlett-Packard Enterprise server with iLO (Integrated Lights Out) with the latest build of **Windows Server 2022 Datacenter (Desktop Experience)**.
|
||||
|
||||
This document also assumes that you are adding an additional server node to an existing Hyper-V Failover Cluster. This document does not outline the exact process of setting up a Hyper-V Failover Cluster from-scratch, setting up a domain, DNS server, etc. Those are assumed to already exist in the environment. Your domain controller(s) need to be online and accessible from the Failover Cluster node you are building for things to work correctly.
|
||||
|
||||
Download the newest build ISO of Windows Server 2022 at the [Microsoft Evaluation Center](https://go.microsoft.com/fwlink/p/?linkid=2195686&clcid=0x409&culture=en-us&country=us)
|
||||
|
||||
### Enable Remote Desktop
|
||||
Enable remote desktop however you can, but just be sure to disable NLA, see the notes below for details.
|
||||
!!! warning "Disable NLA (Network Level Authentication)"
|
||||
Ensure that "Allow Connections only from computers running Remote Desktop with Network Level Authentication" is un-checked. This is important because if you are running a Hyper-V Failover Cluster, if the domain controller(s) are not running, you may be effectively locked out from using Remote Desktop to access the failover cluster's nodes, forcing you to use iLO or a physical console into the server to log in and bootstrap the cluster's Guest VMs online.
|
||||
|
||||
This step can be disregarded if the domain controller(s) exist outside of the Hyper-V Failover Cluster.
|
||||
|
||||
``` powershell
|
||||
# Enable Remote Desktop (NLA-Disabled)
|
||||
Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" -Value 0
|
||||
Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication" -Value 0 Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
|
||||
```
|
||||
|
||||
### Provision Server Roles, Activate, and Domain Join
|
||||
``` powershell
|
||||
# Rename the server
|
||||
Rename-Computer BUNNY-NODE-02
|
||||
|
||||
# Install Hyper-V, Failover, and MPIO Server Roles
|
||||
Install-WindowsFeature -Name Hyper-V, Failover-Clustering, Multipath-IO -IncludeManagementTools
|
||||
|
||||
# Change edition of Windows (Then Reboot)
|
||||
irm https://get.activated.win | iex
|
||||
|
||||
# Force activate server (KMS38)
|
||||
irm https://get.activated.win | iex
|
||||
|
||||
# Configure DNS Servers
|
||||
Get-NetAdapter | Where-Object { $_.Status -eq 'Up' } | ForEach-Object { Set-DnsClientServerAddress -InterfaceIndex $_.InterfaceIndex -ServerAddresses ("192.168.3.25","192.168.3.26") }
|
||||
|
||||
# Domain-join the server
|
||||
Add-Computer BUNNY-LAB.io
|
||||
|
||||
# Restart the Server
|
||||
Restart-Computer
|
||||
```
|
||||
|
||||
## Failover Cluster Configuration
|
||||
### Configure Cluster SET Networking
|
||||
!!! note "Disable Embedded Ports"
|
||||
We want to only use the 10GbE Cluster_SET network for both virtual machines and the virtualization host itself. This ensures that **all** traffic goes through the 10GbE team. Disable all other non-10GbE network adapters.
|
||||
You will need to start off by configuring a Switch Embedded Teaming (SET) team. This is the backbone that the server will use for all Guest VM traffic as well as remote-desktop access to the server node itself. You will need to rename the network adapters to make management easier.
|
||||
|
||||
- Navigate to "Network Connections" then "Change Adapter Options"
|
||||
* Rename the network adapters with simpler names. e.g. (`Ethernet 1` becomes `Port_1`)
|
||||
* For the sake of demonstration, assume there are 2 10GbE NICs (`Port_1` and `Port_2`)
|
||||
|
||||
``` powershell
|
||||
# Create Switch Embedded Teaming (SET) team
|
||||
New-VMSwitch -Name Cluster_SET -NetAdapterName Port_1, Port_2 -EnableEmbeddedTeaming $true
|
||||
|
||||
# Disable IPv4 and IPv6 on all other network adapters
|
||||
Get-NetAdapter | Where-Object { $_.Name -ne "vEthernet (Cluster_SET)" } | ForEach-Object { Set-NetAdapterBinding -Name $_.Name -ComponentID "ms_tcpip" -Enabled $false; Set-NetAdapterBinding -Name $_.Name -ComponentID "ms_tcpip6" -Enabled $false }
|
||||
|
||||
# Set IP Address of Cluster_SET for host-access and clustering
|
||||
New-NetIPAddress -InterfaceAlias "vEthernet (Cluster_SET)" -IPAddress 192.168.3.5 -PrefixLength 24 -DefaultGateway 192.168.3.1
|
||||
Set-DnsClientServerAddress -InterfaceAlias "vEthernet (Cluster_SET)" -ServerAddresses ("192.168.3.25","192.168.3.26")
|
||||
```
|
||||
### Configure iSCSI Initiator to Connect to TrueNAS Core Server
|
||||
At this point, now that we have verified that the 10GbE NICs can ping their respective iSCSI target server IP addresses, we can add them to the iSCSI Initiator in Server Manager which will allow us to mount the cluster storage for the Hyper-V Failover Cluster.
|
||||
|
||||
- Open **Server Manager > MPIO**
|
||||
* Navigate to the "Discover Multi-Paths" tab
|
||||
* Check the "Add support for iSCSI devices" checkbox
|
||||
* Click the "Add" button
|
||||
|
||||
- Open **TrueNAS Core Server**
|
||||
* Navigate to the [TrueNAS Core server](http://192.168.3.3) and add the "Initiator Name" seen on the "Configuration" tab of the iSCSI Initiator on the Virtualization Host to the `Sharing > iSCSI > Initiator Groups` > "iSCSI-Connected Servers"
|
||||
|
||||
- Open **iSCSI Initiator**
|
||||
* Click on the "Discovery" tab
|
||||
* Click the "Discover Portal" button
|
||||
* Enter the IP addresses of "192.168.3.3". Leave the port as "3260".
|
||||
* Example Initiator Name: `iqn.1991-05.com.microsoft:bunny-node-02.bunny-lab.io`
|
||||
* Click the "Targets" tab to go back to the main page
|
||||
* Click the "Refresh" button to display available iSCSI Targets
|
||||
* Click on the first iSCSI Target `iqn.2005-10.org.moon-storage-01.ctl:iscsi-cluster-storage` then click the "Connect" button
|
||||
* Check the "Enable Multi-Path" checkbox
|
||||
* Click the "Advanced" button
|
||||
* Click the "OK" button
|
||||
* Navigate to "Disk Management" to bring the iSCSI drives "Online" (Dont do anything after this in Disk Management)
|
||||
|
||||
## Initialize and Join to Existing Failover-Cluster
|
||||
### Validate Server is Ready to Join Cluster
|
||||
Now it is time to set up the Failover Cluster itself so we can join the server to the existing cluster.
|
||||
|
||||
- Open **Server Manager**
|
||||
* Click on the "Tools" dropdown menu
|
||||
* Click on "Failover Cluster Manager"
|
||||
* Click the "Validate Configuration" button in the middle of the window that appears
|
||||
* Click "Next"
|
||||
* Enter Server Name: `BUNNY-NODE-02.bunny-lab.io`
|
||||
* Click the "Add" button, then "Next"
|
||||
* Ensure "Run All Tests (Recommended)" is selected, then click "Next", then click "Next" to start.
|
||||
### Join Server to Failover Cluster
|
||||
* On the left-hand side, right-click on the "Failover Cluster Manager" in the tree
|
||||
* Click on "Connect to Cluster"
|
||||
* Enter `USAGI-CLUSTER.bunny-lab.io`
|
||||
* Click "OK"
|
||||
* Expand "USAGI-CLUSTER.bunny-lab.io" on the left-hand tree
|
||||
* Right-click on "Nodes"
|
||||
* Click "Add Node..."
|
||||
* Click "Next"
|
||||
* Enter Server Name: `BUNNY-NODE-02.bunny-lab.io`
|
||||
* Click the "Add" button, then "Next"
|
||||
* Ensure that "Run Configuration Validation Tests" radio box is checked, then click "Next"
|
||||
* Validate that the node was successfully added to the Hyper-V Failover Cluster
|
||||
|
||||
## Cleanup & Final Touches
|
||||
Ensure that you run all available Windows Updates before delegating guest VM roles to the new server in the failover cluster. This ensures you are up-to-date before you become reliant on the server for production operations.
|
@ -0,0 +1,80 @@
|
||||
**Purpose**: If you run an environment with multiple Hyper-V: Failover Clusters, for the purpose of Hyper-V: Failover Cluster Replication via a `Hyper-V Replica Broker` role installed on a host within the Failover Cluster, sometimes a GuestVM will fail to replicate itself to the replica cluster, and in those cases, it may not be able to recover on its own. This guide attempts to outline the process to rebuild replication for GuestVMs on a one-by-one basis.
|
||||
|
||||
!!! note "Assumptions"
|
||||
This guide assumes you have two Hyper-V Failover Clusters, for the sake of the guide, we will refer to the Production cluster as `CLUSTER-01` and the Replication cluster as `CLUSTER-02`. This guide also assumes that Replication was set up beforehand, and does not include instructions on how to deploy a Replica Broker (at this time).
|
||||
|
||||
## Production Cluster - CLUSTER-01
|
||||
### Locate the GuestVM
|
||||
You need to start by locating the GuestVM in the Production cluster, CLUSTER-01. You will know you found the VM if the "Replication Health" is either `Unhealthy`, `Warning`, or `Critical`.
|
||||
### Remove Replication from GuestVM
|
||||
- Within a node of the Hyper-V: Failover Cluster Manager
|
||||
- Right-Click the GuestVM
|
||||
- Navigate to "**Replication > Remove Replication**"
|
||||
- Confirm the removal by clicking the "**Yes**" button. You will know if it removed replication when the "Replication State" of the GuestVM is `Not enabled`
|
||||
|
||||
## Replication Cluster - CLUSTER-02
|
||||
### Note the storage GUID of the GuestVM in the replication cluster
|
||||
- Within a node of the replication cluster's Hyper-V: Failover Cluster Manager
|
||||
- Right-Click the same GuestVM and click "Manage..." `This will open Hyper-V Manager`
|
||||
- Right-Click the GuestVM and click "Settings..."
|
||||
- Navigate to "**ISCSI Controller**"
|
||||
- Click on one of the Virtual Disks attached to the replica VM, and note the full folder path for later. e.g. `C:\ClusterStorage\Volume1\HYPER-V REPLICA\VIRTUAL HARD DISKS\020C9A30-EB02-41F3-8D8B-3561C4521182`
|
||||
|
||||
!!! warning "Noting the GUID of the GuestVM"
|
||||
You need to note the folder location so you have the GUID. Without the GUID, cleaning up the old storage associated with the GuestVM replica files will be much more difficult / time-consuming. Note it down somewhere safe, and reference it later in this guide.
|
||||
|
||||
### Delete the GuestVM from the Replication Cluster
|
||||
Now that you have noted the GUID of the storage folder of the GuestVM, we can safely move onto removing the GuestVM from the replication cluster.
|
||||
|
||||
- Within a node of the replication cluster's Hyper-V: Failover Cluster Manager
|
||||
- Right-Click the GuestVM
|
||||
- Navigate to "**Replication > Remove Replication**"
|
||||
- Confirm the removal by clicking the "**Yes**" button. You will know if it removed replication when the "Replication State" of the GuestVM is `Not enabled`
|
||||
- Right-Click the GuestVM (again) `You will see that "Enable Replication" is an option now, indicating it was successfully removed.`
|
||||
|
||||
!!! note "Replica Checkpoint Merges"
|
||||
When you removed replication, there may have been replication checkpoints that automatically try to merge together with a `Merge in Progress` status. Just let it finish before moving forward.
|
||||
|
||||
- Within the same node of the replication cluster's Hyper-V: Failover Cluster Manager `Switch back from Hyper-V Manager`
|
||||
- Right-Click the GuestVM and click "**Remove**"
|
||||
- Confirm the action by clicking the "**Yes**" button
|
||||
|
||||
### Delete the GuestVM manually from Hyper-V Manager on all replication cluster hosts
|
||||
At this point in time, we need to remove the GuestVM from all of the servers in the cluster. Just because we removed it from the Hyper-V: Failover Cluster did not remove it from the cluster's nodes. We can automate part of this work by opening Hyper-V Manager on the same Failover Node we have been working on thus far, and from there we can connect the rest of the replication nodes to the manager to have one place to connect to all of the nodes, avoiding hopping between servers.
|
||||
|
||||
- Open Hyper-V Manager
|
||||
- Right-Click "Hyper-V Manager" on the left-hand navigation menu
|
||||
- Click "Connect to Server..."
|
||||
- Type the names of every node in the replication cluster to connect to each of them, repeating the two steps above for every node
|
||||
- Remove GuestVM from the node it appears on
|
||||
- On one of the replication cluster nodes, we will see the GuestVM listed, we are going to Right-Click the GuestVM and select "**Delete**"
|
||||
|
||||
### Delete the GuestVM's replicated VHDX storage from replication ClusterStorage
|
||||
Now we need to clean up the storage left behind by the replication cluster.
|
||||
|
||||
- Within a node of the replication cluster
|
||||
- Navigate to `C:\ClusterStorage\Volume1\HYPER-V REPLICA\VIRTUAL HARD DISKS`
|
||||
- Delete the entire GUID folder noted in the previous steps. `e.g. 020C9A30-EB02-41F3-8D8B-3561C4521182`
|
||||
|
||||
## Production Cluster - CLUSTER-01
|
||||
### Re-Enable Replication on GuestVM in Cluster-01 (Production Cluster)
|
||||
At this point, we have disabled replication for the GuestVM and cleaned up traces of it in the replication cluster. Now we need to re-enable replication on the GuestVM back in the production cluster.
|
||||
|
||||
- Within a node of the production Hyper-V: Failover Cluster Manager
|
||||
- Right-Click the GuestVM
|
||||
- Navigate to "**Replication > Enable Replication...**"
|
||||
- Click "Next"
|
||||
- For the "**Replica Server**", enter the name of the role of the Hyper-V Replica Broker role in the (replication cluster's) Failover Cluster. `e.g. CLUSTER-02-REPL`, then click "Next"
|
||||
- Click the "Select Certificate" button, since the Broker was configured with Certificate-based authentication instead of Kerberos (in this example environment). It will prompt you to accept the certificate by clicking "OK". (e.g. `HV Replica Root CA`), then click "Next"
|
||||
- Make sure every drive you want replicated is checked, then click "Next"
|
||||
- Replication Frequency: `5 Minutes`, then click "Next"
|
||||
- Additional Recovery Points: `Maintain only the latest recovery point`, then click "Next"
|
||||
- Initial Replication Method: `Send initial copy over the network`
|
||||
- Schedule Initial Replication: `Start replication immediately`
|
||||
- Click "Next"
|
||||
- Click "Finish"
|
||||
|
||||
!!! success "Replication Enabled"
|
||||
If everything was successful, you will see a dialog box named "Enable replication for `<GuestVM>`" with a message similar to the following: "Replica virtual machine `<GuestVM>` was successfully created on the specified Replica server `<Node-in-Replication-Cluster>`.
|
||||
|
||||
At this point, you can click "Close" to finish the process. Under the GuestVM details, you will see "Replication State": `Initial Replication in Progress`.
|
Reference in New Issue
Block a user