Escolar Documentos
Profissional Documentos
Cultura Documentos
OS Related
Windows 2003 supports 64 bit version OS
Windows 2003 supports SharePoint services
Windows 2003 supports Volume Shadow Copies
Windows 2003 supports increased security for Internet connections
Windows 2003 has Automated System Recovery (ASR) feature
Windows 2003 has Inbuilt firewall.
Windows Server 2003 introduces the concept of a Majority Node Set. This allows server clusters
to be built without using the shared disk for the quorum. This enables you to build and configure
geographically dispersed clusters.
Windows 2000 supports IPV4 whereas 2003 supports both IPV4 & IPV6
Windows 2000 supports only 8 processors and 64 GB RAM whereas 2003 supports up to 64
processors and max of 512GB RAM.
Windows 2000 supports 4-node clustering and 2003 supports 8-node clustering
Windows 2000 - IIS 5 and windows 2003 – IIS 6
Windows 2000 doesn't support Dot net whereas 2003 Supports Microsoft .NET 1.1(2.0 in R2)
Windows 2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise,
Datacenter and Web server Editions.
Windows 2000 server gives only 90 days trial version of Terminal server. But windows server
2003 gives 120 days trial version.
Windows 2000 server has 10 user limit when accessing the shared folder at the same time,
whereas there is no limit in windows 2003 server
The default permission for a shared folder in Windows Server 2003 is the now only READ
permission granted to the ‘everyone’ group.
Introduction of DNS Stub zones in windows 2003.
NOTE: 64-bit systems offer direct access to more virtual and physical memory than 32-bit systems
and process more data per clock cycle, enabling more scalable, higher performing computing
solutions.
Active Directory Federation Service - Active Directory Federation Service extends the Active
Directory to the Web.
Quota management - In R2, quotas can be applied at the folder level, not just at the volume level.
Furthermore, you can do things like apply a quota across a set of folders. You can even structure
the quota so that Windows does not allow a folder to grow beyond a certain size, regardless of
who owns the files within the folder. You can now restrict folder content by file type. For example,
imagine that in the past you have had problems with users storing their collection of MP3 files on
your servers.
Hardware Management - You can use Windows Remote Management (WinRM) to manage
server hardware remotely across firewalls and monitor conditions on servers that are offline.
MMC 3.0 –
SharePoint Central Administration – Web browser interface for managing your server
Storage Management for SANs - Storage Manager for SANs is a new Microsoft Management
Console (MMC) snap-in that helps you create and manage logical unit numbers (LUNs) on fibre
channel and iSCSI disk drive subsystems in your storage area network (SAN). Storage Manager
for SANs can be used on storage subsystems that support Virtual Disk Server (VDS).
Where is the i386 folder for Windows Server 2008 after the installation?
There is no i386 folder on server 2008. It is replaced by SOURCES folder
Memory Dumps
Types, configure, & troubleshoot if not created
Complete memory dump(It contains all information from kernel and user mode address spaces
that was in physical memory at the time of the dump(paging file on boot volume sufficient to hold
all the physical RAM plus 1 megabyte, previous file overwritten if 2nd time dump occurs))
Kernel memory dump(records only the kernel memory & must have between 150MB-2GB of PF
space, previous file overwritten if 2nd time dump occurs)
Small memory dump (64 KB) - records the smallest set of useful information & requires PF size of
about 2MB, new files are created each time dump occurs and are stored in %System Root%\
Minidump.
Complete memory dump option, can also be enabled by manually setting the registry entry under the
following registry subkey to 1
"HKEY_LOCAL_MACHINE\SYSTEM\Current Control Set\ Control\Crash
Control\CrashDumpEnabled"
Methods to generate a manual kernel dump file or a complete memory dump file - Using Keyboard,
hold right CTRL key and pressing the SCROLL LOCK key two times or Generate NMI option using
ILO
NOTE: By default, ‘complete memory dump’ is disabled. You can enable the option if the computer
has more than 2 GB of physical RAM
NOTE: Windows 2008 has different process of enabling Complete Memory Dump. Additional MS
hotfixes need to be installed to effectively enable the dump option
Save Workspace so that you need not again enter the symbols paths from next time. Run "!analyze
-v" to debug the DMP file
Which default MS tool is used to connect to a server in the absence of ILO/3rd party tool?
You can use Windows Remote Management (WinRM) to manage server hardware remotely across
firewalls and monitor conditions on servers that are offline. This was introduced with Windows 2003
R2. WinRM provides a command-line interface for common management tasks and a scripting
application programming interface (API) for writing Windows Script Host-based system administration
scripts.
Using WinRM, you can write scripts to monitor and control the state of server hardware by
communicating with a Baseboard Management Controller (BMC). A BMC is a separate micro-
controller with its own network adapter that is connected to the processor board of a server and can
monitor conditions even when the server is off or malfunctioning. A new Windows Management
Interface (WMI) provider for Intelligent Platform Management Interface (IPMI) exposes six new WMI
classes for accessing BMC information with scripts.
WinRM is not installed by default with Windows Server 2003 R2. To install it, open Add or Remove
Programs from Control Panel, and click Add/Remove Windows Components.
Beeps Meaning
Steady, short beeps Power supply may be bad
Long continuous
Memory failure
beep tone
Steady, long beeps Power supply bad
No beep Power supply bad, system not plugged in, or power not turned on
If everything seems to be functioning correctly there may be a problem with the
No beep
'beeper' itself. The system will normally beep one short beep.
One long, two short
Video card failure
beeps
NOTES:
The SYSTEM volume is the partition from which the boot process starts, containing the MBR, boot
sector, NTLDR, NTDETECT.COM & BOOT.INI
The BOOT volume is the partition which contains the Windows folder - this can be a logical partition
Poolmon
Memory Pool Monitor (Poolmon.exe) displays data that the operating system collects about memory
allocations from the system paged and nonpaged kernel pools and about the memory pools used for
Terminal Services sessions. The data is grouped by pool allocation tag. This information can be used
by Microsoft Technical Support to find kernel mode memory leaks.
A memory leak is caused by an application or by a process that allocates memory for use but that
does not free the memory when the application or process finishes. Therefore, available memory is
completely used over time. Frequently, this condition causes the system to stop functioning correctly.
Below ID’s will be logged,
RIS can be used only for clean installations and can't be used to upgrade a previous version of
Windows. On Windows 2003, two services are required to provide Remote Installation Services:
DHCP and Remote Installation Service. The Remote Installation Server doubles as a proxy DHCP
server to provide Boot Server and Filename instructions to clients. Remote Installation Service utilizes
UDP port 4011 to provide clients the contents of each page the OS Chooser displays. Additionally,
this service can provide drivers to clients; it is often used to provide the workstation's network card
driver, which is required to launch the OS Chooser and mount the share where images are stored.
CLUSTERING
What is clustering and types of clustering?
A cluster is a group of computers, called nodes that function as a single computer/system to provide
high availability and high fault tolerance for applications or services. If one member of the cluster (the
node) is unavailable, the other computers carry the load so that applications or services are always
(with a small interruption) available. Typical uses for server clusters include file servers, print servers,
database servers, and messaging servers.
Cluster categorizations
There are four forms of clustering wherein each form caters to a specific need. They are; Load
Balancing, High Availability, Grid Computing and Compute Clusters.
Load-balancing clusters
Load balancing allows you to combine two or more computers into a cluster. You can use NLB to
distribute workloads (TCP/IP requests) across the cluster nodes in order to support a larger number
of simultaneous users.Load balancing enhances the performance of the servers, leads to their optimal
utilization and ensures that no single server is overwhelmed. Load balancing is particularly important
for busy networks, where it is difficult to predict the number of requests that will be issued to a server.
Requests initiated from the user are managed by, and distribute the load among the group of servers,
which is also known as a server cluster. All the application configurations across these servers should
be the same.
One of the most common applications of load balancing is to provide a single Internet service from
multiple servers, sometimes known as a server farm. Commonly, load-balanced systems include
popular web sites, large Internet Relay Chat networks, high-bandwidth File Transfer Protocol sites,
Network News Transfer Protocol (NNTP) servers and Domain Name System (DNS) servers.
Compute clusters
Compute cluster is basically a type of clustering wherein the nodes are connected together or have an
active relationship so that it could achieve the desired computation. The advantage of compute cluster
is based on the fact that it utilizes each node to reach the right computation. Compute clusters are
often used in highly complicated computations wherein a single computer will not have the ability to
provide the right output. These types of computer clusters are usually used for scientific and
mathematical purposes as these fields require heavy calculations.
On the other hand, compute cluster might run into the problem of stability. Since each node will be
required to compute separately, each node might not be working well which could jeopardize the
entire operation. That means maintenance is always a priority in each node since the nodes has an
important functions to do to ensure success of the computation.
Grid Computing
Grid computing is a type of computer clustering wherein the nodes have different functions but they
do not communicate with each other. Compared to compute clustering, grid computing is more
versatile as each node could have a completely different set of functions. Maintenance on grid
computing is relatively easy since troubleshooting is only based per node. Other functions might
continue working while the failed node could be replaced or fixed.
On the other hand, grid computing might not provide the speed of computing when compared to
compute clusters. Since each node is independent, it will take a lot of time before the specific
calculation is achieved. It might even have the same problem with compute clustering wherein one
node could jeopardize the whole computation because of its inability to function on time.
NLB (network load balancing) cluster for balancing load between servers. This cluster will not
provide any high availability. Usually preferable at edge servers like web or proxy.
Server Cluster - This provides High availability by configuring active-active or active-passive cluster.
In 2 node active-passive cluster one node will be active and one node will be stand by. When active
server fails the application will FAILOVER to stand by server automatically. When the original server
backs we need to FAILBACK the application
Quorum: A shared storage need to provide for all servers which keeps information about clustered
application and session state and is useful in FAILOVER situation. This is very important if Quorum
disk fails entire cluster will fails.
Heartbeat: Heartbeat is a private connectivity between the servers in the cluster, which is used to
identify the status of other servers in cluster.
Application Clustering
Before you can install any applications into clustering, you must first install Windows Server clustering
services.
Cluster configuration
Steps to configure prior to actual cluster installation
Double check to ensure that all the nodes are working properly and are configured identically
(hardware, software, drivers, etc.).
Check to see that each node can see the data and Quorum drives on the shared array or SAN.
Remember, only one node can be on at a time until Windows 2003 clustering is installed.
Verify that none of the nodes has been configured as a Domain Controller.
Check to verify that all drives are NTFS and are not compressed.
Ensure that the public and private networks are properly installed and configured.
Ping each node in the public and private networks to ensure that you have good network
connections. Also ping the Domain Controller and DNS server to verify that they are available.
Verify that you have disabled NetBIOS for all private network cards.
Verify that there are no network shares on any of the shared drives.
Check all of the error logs to ensure there are no nasty surprises. If there are, resolve them before
proceeding with the cluster installation.
Check to verify that no antivirus software has been installed on the nodes. Antivirus software can
reduce the availability of clusters and must not be installed on them. If you want to check for
possible viruses on a cluster, you can always install the software on a non-node and then run
scans on the cluster nodes remotely.
Check to verify that the Windows Cryptographic Service Provider is enabled on each of the
nodes.
Check to verify that the Windows Task Scheduler service is running on each of the nodes.
If you intend to run SQL Server 2005 Reporting Services, you must then install IIS 6.0 and
ASP .NET 2.0 on each node of the cluster
If you intend to use SQL Server encryption, install the server certificate with the fully qualified
DNS name of the virtual server on all nodes in the cluster.
Add the SQL Server and Clustering service accounts to the Local Administrators group of all the
nodes in the cluster.
Installing Cluster
How to recover a crashed quorum disk?
To recover from a corrupted quorum log or quorum disk
1. If the Cluster service is running, open Computer Management.
2. In the console tree, double-click Services and Applications, and then click Services.
3. In the details pane, click Cluster Service.
4. On the Action menu, click Stop.
5. Repeat steps 1, 2, 3, and 4 for all nodes.
6. If you have a backup of the quorum log, restore the log by following the instructions in "Backing up
and restoring server clusters" in Related Topics.
7. If you do not have a backup, select any given node. Make sure that Cluster Service is highlighted in
the details pane, and then on the Action menu, click Properties.
Under Service status, in Start parameters, specify /fixquorum, and then click Start.
8. Switch from the problematic quorum disk to another quorum resource.
For more information, see "To use a different disk for the quorum resource" in Related Topics.
9. In Cluster Administrator, bring the new quorum resource disk online.
For information about how to do this, see "To bring a resource online" in Related Topics.
10. Click Start, click Run, and type a command with the following syntax:
cluster [ClusterName] res QuorumDiskResourceName /maint:on
11. Run Chkdsk, using the switches /f and /r, on the quorum resource disk to determine whether the
disk is corrupted.
If corruption is detected on the disk, check the system log in Event Viewer for possible hardware
errors.
Under Service status, in Start parameters, specify /resetquorumlog, and then click Start.
This restores the quorum log from the node's local database.
Important
• The Cluster service must be started by clicking Start on the service control panel. You cannot
click OK or Apply to commit these changes as this does not preserve the /resetquorumlog
parameter.
16. Restart the Cluster service on all other nodes.
Notes
• To perform this procedure, you must be a member of the Administrators group on the local computer,
or you must have been delegated the appropriate authority. If the computer is joined to a domain,
members of the Domain Admins group might be able to perform this procedure. As a security best
practice, consider using Run as to perform this procedure.
• To open Computer Management, click Start, click Control Panel, double-click Administrative
Tools, and then double-click Computer Management.
• The quorum disk must be formatted with the NTFS file system.
• If none of the nodes are running, or one node fails while you are changing the quorum resource, only
the running nodes are able to form the cluster, and the offline node is only able to join the cluster.
After the offline node has joined the cluster, all nodes are again able to form or join the cluster. This
design prevents the offline node from forming the cluster using the old quorum resource.
• Optionally, after step 13 above, you can use the ClusterRecovery tool, available in the Microsoft
Windows Server 2003 Resource Kit, to restore the registry checkpoint files.
If you need a larger cluster you can you can create multiple NLB clusters, and use round robin DNS to
load balance between each cluster.
Can I run mixed clusters containing both physical servers and VMs as NLB nodes?
Yes. However, all servers and Virtual Machines (VMs) must be on the same VLAN and IP subnet.
Patch deployment
We use Patchlink from Lumension to deploy the patches. All the patches are first downloaded to the
Patchlink server and a Patchlink client is installed on all clients so that they can communicate with the
Patchlink server. We push the patches from the server to the clients.
On 2nd Tuesday each month MS releases the critical patches.
We first deploy the same on test servers (hosting various applications like citrix, SQL, MS-Exchange,
DC etc) and monitor for few days for any issues arising from the deployment.
We then schedule the same on Dev servers (after raising a change and informing the box owners)
After this we target the Prod servers
After each deployment we do a checkout from OS perspective and ask the application owners to
checkout from app perspective.
If any issues are observed after the deployment, further troubleshooting is done to identify the
problematic patch by uninstalling them one by one.
OS is not accessible & from console we can see it is blue screened. What is the first step you
take?
If it is blue screened check if it is generating a memory dump and if so, allow it to finish completing the
dump. Later if we are unable to get any logs for cause of BSOD, we can use this memory dump to
analyze and find the root cause of the BSOD.
If there is no memory dump getting generated and host stuck, power cycle it to get it back online.
Where are the documents and settings for the roaming profile stored?
All the documents and environmental settings for the roaming user are stored locally on the system,
and, when the user logs off, all changes to the locally stored profile are copied to the shared server
folder. Therefore, the first time a roaming user logs on to a new system the logon process may take
some time, depending on how large his profile folder is.
Where are the settings for all the users stored on a given machine?
\Document and Settings\All Users
I have a file to which the user has access, but he has no folder permission to read it. Can he
access it?
It is possible for a user to navigate to a file for which he does not have folder permission. This involves
simply knowing the path of the file object. Even if the user can’t drill down the file/folder tree using My
Computer, he can still gain access to the file using the Universal Naming Convention (UNC). The best
way to start would be to type the full path of a file into Run… window.
You need to automatically install an app, but MSI file is not available. What do you do?
A .zap text file can be used to add applications using the Software Installer, rather than the Windows
Installer.
Others
service desk tools..
itsm
Servicenow
Daily Activities
Shift Lead
Queue Manager
Alerts
Escalation from shift members