Are you trying to choose between Standard or production checkpoints in Hyper-V?
This guide is for you.
Standard or Production checkpoints can help us export our data in cases of crash. Therefore, it can make a better backup that is closer to the state of the system when the checkpoint is created. Production checkpoints require a virtual machine to start from an offline state to restore the checkpoint.
Here at Ibmi Media, as part of our Server Management Services, we regularly help our Customers to perform Hyper-V related queries.
Standard or Production checkpoints help us store our data in case of an unexpected crash or failure.
Production checkpoints are "point in time" images of a virtual machine that we can restore later. This is accomplished by using backup technology within the guest to create the checkpoint.
On the other hand, standard checkpoints capture the state, data, and hardware configuration of a running virtual machine. They can be useful if we need to recreate a specific state or condition of a running virtual machine so that we can troubleshoot a problem.
Before we choose between standard or production checkpoints in Hyper-V let us discuss the two checkpoints. Moving ahead, let us look into the various aspects of this concept.
i. Initially, in Hyper-V Manager, right-click the virtual machine and click Settings.
ii. Under the Management section, select Checkpoints.
iii. Then select either production checkpoints or standard checkpoints.
iv. To store the checkpoint configuration files in a different place, change them in the Checkpoint File Location section.
v. Finally, click Apply to save the changes. Once done, click OK to close the dialog box.
If we pick production checkpoints, we can also specify whether the host should take a standard checkpoint in case it cannot take a production checkpoint.
Only Production Checkpoints support on guests that run Active Directory Domain Services role (Domain Controller) or Active Directory Lightweight Directory Services role.
A Hyper-V checkpoint is an unchanging point in the lifespan of a virtual machine. We can use the virtual machine as ordinary, however, the checkpoint is protected from any changes that are made to the virtual machine.
It isolates from nearly anything about a virtual machine that can alter.
The following is a generic description that applies to both standard and production checkpoints:
1. The checkpointing service creates copies of the virtual machine’s configuration files and places them in the virtual machine’s Checkpoint File Location.
2. It creates a differencing disk for every VHD[X] file connecting to the virtual machine.
3. Checkpoint creation ignores pass-through disks entirely.
4. The virtual machine continues to operate from the original configuration files and reads unchanged data from the original VHD[X] file(s).
We cannot use Hyper-V checkpoints as backups. By definition, a backup is a duplication of data. Checkpoints do not duplicate data.
Instead, we can export a checkpoint that is a duplicate of the data and therefore qualifies as a backup.
Nonetheless, checkpoint exports confuse many people. Some think that AVHDX files belong to checkpoints. So, they naturally assume that trading a checkpoint will capture all of the data in the AVHDX. Unfortunately, the premise is incorrect.
The AVHDX does not belong to the checkpoint; it belongs to the active virtual machine. If we export the checkpoint, we get everything up to where the checkpoint was taken, but nothing after.
If we want export occurrences after the checkpoint, then we need to either export the active state of the virtual machine or take another checkpoint and export that.
On the other hand, to get only the changed data, we will need to dig into the API. Since these changes represent raw data blocks, we need basic programming skills.
After we create a checkpoint there are three operations that we can use to manage it:
1. Apply a Checkpoint
When we "apply" a checkpoint, it becomes the active state of the virtual machine. When we use the GUI to apply a checkpoint, we are given an opportunity to capture the current active state in another checkpoint.
If we decline, the occurrences between the latest checkpoint and the active state of the virtual machine are permanently lost.
Apply has two primary uses:
i. We want to work with the virtual machine as it was when a particular checkpoint was taken. Here, it encourages to take another checkpoint when prompted.
ii. We do not like the current state of the virtual machine and would like to use a different state. In this case, the encouragement to take another checkpoint is not as strong.
2. Revert a Checkpoint
"Revert" is exactly like "Apply" except:
i. We cannot choose the checkpoint. Revert always applies the most recent checkpoint.
ii. We are not given an option to checkpoint the current state. It is permanently lost.
It has one use:
When the immediately preceding checkpoint is where we want to be and we do not care to keep the current state, Revert is superior to Apply.
3. Delete a Checkpoint
If we delete a checkpoint, it would destroy the VHDX files, configuration files in \Snapshot.
However, it does literally delete the files in the \Snapshot folder that represent any configuration differences.
"Merge" describes what happens when we “delete” a checkpoint. Data in the source VHDX and AVHDX files combine back into the source VHDX files. No data is deleted.
The hypervisor knows something is going on in the VM because of all the CPU and memory and I/O activity. So, snapshots/checkpoints essentially freeze the virtual machine’s activity at a certain point in time.
Anything that happens after the snapshot does not capture in the snapshot. Because the hypervisor does not know what is happening inside the virtual machine, it just locks these resources as they were at that time. This is a "standard" checkpoint.
The new, "production" checkpoints rely on not-so-recent advances in hypervisor technology. Most, including Hyper-V, now have some technique for reaching into the "black box" and interacting with specially-designed components running inside.
For Hyper-V, these are called "Integration Services" for Windows and “Integration Components” for Linux. One of those services is the Backup service, which in turn interacts with the Volume Shadow Copy Service, which most of us know simply as "VSS".
VSS is a gateway between backup applications and the operating system. It provides the ability for applications to cease all I/O and flush outstanding data and operations from memory to disk so that the backup does not miss anything.
The most important thing to know about VSS's is that not all applications take advantage of it. That is where we draw the distinction between "standard" and “production” checkpoints.
Standard checkpoints capture the active state of the virtual machine’s CPU activity and the active state of the virtual machine's memory.
Basically, the virtual machine exactly as it was when the checkpoint was taken.
Unlike standard checkpoints, production checkpoints do not capture anything else. Instead, they trigger VSS in the guest.
A VSS writer will carry out whatever operations the writer designs it to perform.
For example, Microsoft Exchange will commit its logs to the store. Windows will also stop in-flight I/Os from occurring and flush file system queues.
However, it does not protect Active CPU operations and the memory state in any way.
A Standard checkpoint is preferable when all of the following are true about an application that we wish to protect in the virtual machine:
i. The application is not VSS-aware.
ii. It actively manipulates data in VHDX by the virtual machine OR performs in-memory operations that must not be lost.
iii. The application is active when we take the checkpoint.
Similarly, we should choose Production checkpoints over Standard checkpoints when the following conditions apply to the application that we want to protect:
i. The application is VSS-aware
ii. It is passive, operating in a read-only state, or serving data from a remote machine.
iii. The application stops
A Production checkpoint would be a good choice for an Apache web server that acts as a front-end for a remote SQL server.
There are some applications whose virtual machines should never be checkpointed:
i. Active Directory Domain Servers in multiple domain controller environments.
ii. A Standard checkpoint of a domain controller in a multi-DC environment has the possibility of causing a USN rollback.
If the environment is complex enough to justify multiple domain controllers, then they should not run anything that would justify using Hyper-V checkpoints at all.
Cluster members.
This restriction applies fairly equally to applications protected by Microsoft Failover Clusters and non-Microsoft clustering technologies. Checkpoints could cause the equivalent of USN rollbacks in those applications.
When these applications synchronize to other members, those other members are not going to bother tracking the status of anything prior to that synchronization point.
If we must checkpoint for some reason, stop the cluster and shut down all other members first.
Applications with innate replication.
If the application is doing something to synchronize local data with other applications on other servers, it is not a good use for any checkpoints unless we ensure that a reversion does not negatively impact the other members or their data.
When a virtual machine with a Production checkpoint reverts, it is at least aware that something happened. That “something” is generally equivalent to restoring from a full backup.
One benefit for Production checkpoints is that they are smaller for running virtual machines than Standard checkpoints.
Production virtual machines do not need a memory state, so they do not save a copy of it. Standard checkpoints keep an on-disk copy of the exact state of the virtual machine's memory at the moment of capture.
In previous versions, the only thing that we could change is the placement of checkpoint files. In 2016 (including Windows 10 Client Hyper-V), we can:
i. Disable checkpoints for a virtual machine entirely.
ii. Choose between Standard or Production checkpoints.
iii. Allow a Standard checkpoint to create when a Production checkpoint operation fails.
iv. Choose where to place a virtual machine’s checkpoint files. However, AVHD[X]s are always in the same location as their VHD[X] parents.
By default, every virtual machine enables for Production checkpoints with the Standard fallback.
i. We can also use PowerShell, which is ideal for bulk operations. The cmdlet is Set-VM.
ii. The parameter selection for checkpoint type is, easily enough, -CheckpointType. It accepts values of Disabled, Standard, Production, and ProductionOnly.
iii. Use the SnapshotFileLocation parameter to tell it where it places the configuration and state information files.
This article will guide on how to choose between #Standard or #production #checkpoints in Hyper-V. We also look into the various aspects of standard and production checkpoints.
Hyper-V checkpoints allow IT #administrators to easily save the existing state of a virtual machine before any changes are made so that if a problem crops up due to the changes, the VM can revert to its previous state. A #snapshot of the virtual machine #memory state is not taken when using a production checkpoint.
To Change checkpoints to production or standard checkpoints:
1. In Hyper-V Manager, right-click the virtual machine and click Settings.
2. Under the Management section, select Checkpoints.
3. Select either production checkpoints or standard checkpoints.