Books & Videos

Table of Contents

  1. Designing a Successful XenServer Deployment

    1. Chapter 1 What Is a XenServer?

      1. The Xen Hypervisor
      2. Tooling for Xen Virtualization
    2. Chapter 2 Core Architecture and Critical Components

      1. XenServer Isn’t Linux, but dom0 Is
      2. XenCenter: A Graphical Xen Management Tool
      3. Core Processes
      4. Critical Configuration Files
      5. XenServer Object Relationships
    3. Chapter 3 Installing XenServer

      1. Manual Installation
      2. Unattended Installation
      3. Boot from SAN
      4. Supplemental Packs
      5. Third-Party Driver Disks
    4. Chapter 4 Design Assumptions Impacting Deployment

      1. Pooled Hosts Versus Standalone Hosts
      2. Defining a Management Paradigm
      3. Hardware Compatibility
      4. Shared Versus Local Storage
      5. Storage I/O Operations Per Second (IOPS)
      6. Memory Management
      7. Planning for Infrastructure Failure
    5. Chapter 5 Deployment Blueprint

      1. Start with Storage
      2. Define Network Topologies
    6. Chapter 6 Understanding Guest VM Types

      1. HVM Guests
      2. PV Guests
      3. Microsoft Windows in XenServer
      4. HVM versus Linux PV
  2. Management Recipes

    1. Chapter 7 Installation Recipes

      1. Manual Installation
      2. Creating a Bootable USB Device
      3. Unattended Installation
      4. Boot from SAN
      5. Installation of Supplemental Packs
      6. Driver Disks
      7. Slipstreaming Drivers and Supplemental Packs
    2. Chapter 8 Planning for Upgrades

      1. Security Patches
      2. Learning of a New Hotfix or Patch
      3. Determine if a Hotfix Is Present
      4. Applying Patches to XenServer
    3. Chapter 9 Log Management

      1. Log Configuration
      2. Log Rotation
      3. Log Aggregation
      4. Throttling SNMP ACKs
    4. Chapter 10 Backup Strategies

      1. Backup dom0
      2. Pool and XAPI Database Backup
      3. VM Backup
      4. Metadata Backup and Restore
      5. Portable Storage Repositories
    5. Chapter 11 User Management

      1. Enabling Roles Based Authentication
      2. Configuring Users
      3. Removing Users
      4. Disable External Authentication
      5. Privileged (Root) Password Recovery
    6. Chapter 12 SSL Certificates

      1. Apply a Commercial Certificate
      2. Create a New Self-Signed Certificate
    7. Chapter 13 Hardware Maintenance

      1. Upgrades, Support, and Hardware
      2. Storage
      3. Networking
      4. Hosts