Опрос
Вы участвуете в программе Windows Insider?
Популярные новости
Обсуждаемые новости

Microsoft выпустила Windows Server 16237 в рамках Windows Server Insider Program

Напечатать страницу
15.07.2017 16:53 | Avanzato

Корпорация Microsoft запустила программу Windows Server Insider Program, выпустив первую серверную превью-сборку 16237. Цель данной превью-сборки серверной системы такая же, как и в случае с Windows 10, компания хочет получить как можно большую обратную связь, но теперь не от обычных пользователей, а от IT-профессионалов.

Задачи и цели администраторов и других IT специалистов, которым может быть интересен ранний взгляд на следующую платформу Windows Server, безусловно отличаются от потребностей обычных пользователей. Скачать превью-сборку серверной платформы можно по данной ссылке, но вам так же, как и в случае с Windows 10, необходимо быть участником программы Windows Insider.

Persistent Memory can now be exposed to Hyper-V VMs:

  • In this build, NTFS-formatted direct access volumes that are created on non-volatile DIMMs can now be exposed Hyper-V VMs. This enables Hyper-V VMs to leverage the low-latency performance benefits of Persistent Memory devices.
  • Virtualized Persistent Memory (vPMEM) is enabled by creating a VHD file (.vhdpmem) on a direct access volume on a host, adding a vPMEM Controller to a VM, and adding the created device (.vhdpmem) to a VM. Using vhdpmem files on direct access volumes on a host to back vPMEM enables allocation flexibility and leverages a familiar management model for adding disks to VMs.
  • PowerShell can be used for the creation and management of Virtualized Persistent Memory.

Battery Passthrough:

  • With new additions to Set-VM, a PowerShell cmdlet, you can now enable and disable Battery Passthrough, a new feature. Battery Passthrough let your VMs have the same battery state as the host they are on. To use this feature of Set-VM, use the flag -BatteryPassthroughEnabled {$true, $false}. This option is only available for version 8.2 virtual machines.

Improvements to Container Networking: 

  • This build introduces enhancements to container networking to better support Kubernetes by adding support for multiple containers (w/out Hyper-V isolation) to a single Pod (Network Compartment) as well as only requiring a single endpoint per Pod for all traffic types (e.g. ingress and East-West)
  • The Host Networking Service (HNS) now has support for creating ACL, NAT, and Load Balancing network policies for Container endpoints for fine-grained policy application.

RDMA for Trusted Guests:

  • This build includes several enhancements for (Trusted) Guest RDMA to enable low-latency storage access with zero CPU usage by Trusted Guest VMs - this is ideal for running Windows File Servers in a Guest to accelerate file serving. Requires updated NIC drivers.

Improvements to Software Defined Networking:

  • Encryption can be enabled for virtual network subnets to protect your traffic from anyone with physical access to the wire, including network administrators.
  • Failover time for SDN gateways is improved. Now, you will observe much faster failover times for the gateways, even with high number of connections.
  • Access control lists can be applied for infrastructure on logical subnets.

Improvements in Networking transports:

  • 2X throughput improvement for single connection TCP and UDP performance in low latency intra-datacenter scenarios
  • Default congestion control algorithm CUBIC for high speed networks

 Improvements in HTTP(s):

  • SSL throttling to enable predictable service for established connections, in the face of high incoming SSL traffic.
  • Deterministic certificate updates for HTTPS enabling greater service availability.

Improvements in time accuracy:

  • Pressing EU regulations in 2018 require strict time precision and traceability.  Win32tm improvements in RS3 support greater time accuracy, and jitter is removed from the measurements that calibrate the service.
  • New system event logging lets you archive time service data to support traceability compliance.
  • System center monitoring now includes a new rule which lets you detect when a machine in your environment is out of compliance.

Nano Server optimized for Containers:

  • Nano Server is now a container only option and optimized for containers, more information is available in the Delivering continuous innovation with Windows Server blog post.  To optimize for containers, several features were removed that were in the Nano Server base image in Windows Server 2016, these include WMI, PowerShell, .NET Core, and the Servicing stack, which has significantly reduced the image size.

Server Core base image optimizations:

  • The Windows Server Core base image has been optimized saving over 20% download and on disk space.


Known issues 

  • Local vs remote management: Some command-line tools and PowerShell modules may not be available for use locally on a Server Core installation. To remotely manage Server Core by using the full set of GUI tools, command-line tools, and PowerShell modules, use Remote Server Administration Tools for Windows 10, available for download from the preceding link.
  • If a user attempts to update to the latest OS build on a device that has .NET Framework 3.5 installed, the update may fail because of a side-by-side (SXS) assembly missing error (0x80073701), and the device will roll back to the previous build. To work around this issue, uninstall .NET Framework 3.5, perform the OS update, and then reinstall .NET Framework 3.5. (The last step is optional if the user does not have apps that are dependent on .NET Framework 3.5.)
  • Some devices using a common 64-bit chip architecture may not be able to update to the latest OS build because of an unexpected error (E_UNEXPECTED, error code 0x8000FFFF).
  • An app may become unresponsive because of an application hang end task error (0xCFFFFFFF) in the Windows firewall API library (FirewallAPI.dll), which occurs when the library is blocked on an advanced local procedure call (ALPC) while attempting to diagnose a connection failure and retrieve information during network isolation.
  • Cluster Sets: A couple of key functionalities to enable end-to-end testing of Cluster Sets scenarios are not present in this build, so defer all evaluation of this scenario to a future build.
  • Bugcheck during volume creation: A stop error may occur during volume creation in a cluster. The recommended workaround is, after restarting the computer, to delete the volume and try creation again.
  • Bugcheck during volume repair:  A stop error may occur during volume repair in a cluster. The recommended workaround is to restart the computer. No corruption or data loss is expected.
  • AEP is not supported in this build.
  • Clone support for Hyper-V isolated containers does not work, this can be disabled temporarily and will be fixed in subsequent Insider Preview builds. See the Insider section on http://aka.ms/containers for more details

Комментарии

Комментариев нет...
Для возможности комментировать войдите в 1 клик через

По теме

Акции MSFT
420.55 0.00
Акции торгуются с 17:30 до 00:00 по Москве
Все права принадлежат © ms insider @thevista.ru, 2022
Сайт является источником уникальной информации о семействе операционных систем Windows и других продуктах Microsoft. Перепечатка материалов возможна только с разрешения редакции.
Работает на WMS 2.34 (Страница создана за 0.137 секунд (Общее время SQL: 0.121 секунд - SQL запросов: 53 - Среднее время SQL: 0.00228 секунд))
Top.Mail.Ru