raywoo - Fotolia
Hardware profiles in Microsoft System Center Virtual Machine Manager 2012 R2 accomplish a couple of different things. First and foremost, they establish hardware allocations for virtual machines. A Microsoft Virtual Machine Manager hardware profile can be thought of as a hardware provisioning template. When a new virtual machine is created, its hardware allocation can be configured manually or it can be based on an existing hardware profile. As such, hardware profiles are designed to reduce the amount of work involved in creating virtual machines (or to allow for automatic virtual machine creation), while also ensuring that virtual machines are provisioned in an uniform manner.
Virtual machine storage can be configured as a part of a hardware profile, but the exact storage configuration options that are available vary based on a couple of factors. The first of these factors is the virtual machine generation. When you create a new hardware profile, you are asked to designate this. Generation 1 hardware profiles expose an IDE controller, a SCSI controller and a virtual DVD drive. If you choose to create a Generation 2 hardware profile, a SCSI controller is created, as is a virtual DVD drive, but the virtual DVD drive can be linked only to an ISO file, not to a physical DVD drive. Virtual hard disks are not created as a part of a hardware profile regardless of generation.
Getting to know System Center
What is System Center Virtual Machine Manager 2012?
Microsoft System Center quick take: Virtual Machine Manager 2012
Although the storage options exposed through the hardware profile do not change based on the hypervisor selected, a hardware profile cannot be validated if it contains virtual storage hardware provisioning options that are not compatible with the hypervisor selected in the "compatibility" section.
What's different with the new Hyper-V VHDX disk format?
Dig Deeper on Storage architecture and strategy
Related Q&A from Brien Posey
When backing up SAP HANA databases, having the right tools for the organization is critical. Data snapshots are one option, but not the only one ... Continue Reading
Public bucket access is a prevalent and discussed S3 security issue. However, there are several other important security measures to take, including ... Continue Reading
Tape still plays a key role in backup, including offline protection from ransomware. What are some key improvements that will keep tape backup ... Continue Reading