Nested virtualization in Azure Lab Services
Nested virtualization enables you to create a lab in Azure Lab Services that contains a multi-VM environment. You can use nested virtualization to provide lab users with multiple, related virtual machines as part of a lab. For example, running a lab about networking with GNS3, IT administration, or ethical hacking might require multiple VMs that can communicate with each other. This article explains the concepts, considerations, and recommendations for nested virtualization in Azure Lab Services.
What is nested virtualization?
Nested virtualization enables you to create and run virtual machines (guest VM) within a virtual machine (host VM). Nested virtualization is enabled through Hyper-V, and is only available on Windows-based lab VMs. You can run both Windows-based and Linux-based guest VMs inside the lab VM.
For more information about nested virtualization, see the following articles:
Considerations
Before setting up a lab with nested virtualization, here are a few things to take into consideration.
Not all VM sizes support nested virtualization. When you create a new lab, select the Medium (Nested virtualization) or Large (Nested virtualization) VM size for your lab.
Choose a size that provides good performance for both the host (lab VM) and guest VMs (VMs inside the lab VM). Make sure the size you choose can run the host VM and any Hyper-V machines at the same time.
The host VM requires extra configuration to let the guest machines have internet connectivity.
Guest VMs don't have access to Azure resources, such as DNS servers, on the Azure virtual network.
Hyper-V guest VMs are licensed as independent machines. For information about licensing for Microsoft operation systems and products, see Microsoft Licensing. Check licensing agreements for any other software you use, before installing it on the template VM or guest VMs.
Virtualization applications other than Hyper-V aren't supported for nested virtualization. This includes any software that requires hardware virtualization extensions.
Enable nested virtualization for a lab
You can enable nested virtualization and create nested Hyper-V VMs on the template VM. When you publish the lab, each lab user has a lab VM that already contains the nested virtual machines.
To enable nested virtualization for a lab:
Connect to the template VM by using a remote desktop client
Enable nested virtualization on the template VM operating system.
Enable the Hyper-V role: the Hyper-V role must be enabled for the creation and running of VMs inside the template VM.
Enable DHCP (optional): when the template VM has the DHCP role enabled, the VMs inside the template VM get an IP address automatically assigned to them.
Create a NAT network for the nested VMs: set up a Network Address Translation (NAT) network to allow the VMs inside the template VM to have internet access and communicate with each other.
Note
The NAT network created on the Lab Services VM will allow a Hyper-V VM to access the internet and other Hyper-V VMs on the same Lab Services VM. The Hyper-V VM won't be able to access Azure resources, such as DNS servers, on an Azure virtual network.
Use Hyper-V manager to create the nested virtual machines inside the template VM.
Note
Make sure to select the option to create a template virtual machine when you create a lab that requires nested virtualization.
Follow these steps to enable nested virtualization on a template VM.
Connect to a nested VM in another lab VM
You can connect to a lab VM from another lab VM or a nested VM without any extra configuration. However, to connect to a nested VM that is hosted in another lab VM, requires adding a static mapping to the NAT instance with the Add-NetNatStaticMapping PowerShell cmdlet.
Note
The ping command to test connectivity from or to a nested VM doesn't work.
Note
The static mapping only works when you use private IP addresses. The VM that the lab user is connecting from must be a lab VM, or the VM has to be on the same network if using advanced networking.
Example scenarios
Consider the following sample lab setup:
Lab VM 1 (Windows Server 2022, IP 10.0.0.8)
- Nested VM 1-1 (Ubuntu 20.04, IP 192.168.0.102)
- Nested VM 1-2 (Windows 11, IP 192.168.0.103, remote desktop enabled and allowed)
Lab VM 2 (Windows Server 2022, IP 10.0.0.9)
- Nested VM 2-1 (Ubuntu 20.04, IP 192.168.0.102)
- Nested VM 2-2 (Windows 11, IP 192.168.0.103, remote desktop enabled and allowed)
To connect with SSH from lab VM 2 to nested lab VM 1-1:
On lab VM 1, add a static mapping:
Add-NetNatStaticMapping -NatName "LabServicesNat" -Protocol TCP -ExternalIPAddress 0.0.0.0 -InternalIPAddress 192.168.0.102 -InternalPort 22 -ExternalPort 23
On lab VM 2, connect using SSH:
ssh user1@10.0.0.8 -p 23
To connect with RDP from lab VM 2, or its nested VMs, to nested lab VM 1-2:
On lab VM 1, add a static mapping:
Add-NetNatStaticMapping -NatName "LabServicesNat" -Protocol TCP -ExternalIPAddress 0.0.0.0 -InternalIPAddress 192.168.0.103 -InternalPort 3389 -ExternalPort 3390
On lab VM 2, or its nested VMs, connect using RDP to
10.0.0.8:3390
Important
Include
~\
in front of the user name. For example,~\Administrator
or~\user1
.
Recommendations
Non-admin user
You may choose to create a non-admin user when creating your lab. There are a few things to note when using nested virtualization with a non-admin account.
- To be able to start or stop VMs, the non-admin user must be added to Hyper-V Administrators group.
- The non-admin user can't mount drives.
- The Hyper-V VM files must be saved in a location accessible to the non-admin user.
Processor compatibility
The nested virtualization VM sizes may use different processors as shown in the following table:
Size | Series | Processor |
---|---|---|
Medium (nested virtualization) | Standard_D4s_v4 | 3rd Generation Intel® Xeon® Platinum 8370C (Ice Lake) or the Intel® Xeon® Platinum 8272CL (Cascade Lake) |
Large (nested virtualization) | Standard_D8s_v4 | 3rd Generation Intel® Xeon® Platinum 8370C (Ice Lake) or the Intel® Xeon® Platinum 8272CL (Cascade Lake) |
Each time that a template VM or a lab VM is stopped and started, the underlying processor type might change. To help ensure that nested VMs work consistently across processors, try enabling processor compatibility mode on the nested VMs. It's recommended to enable Processor Compatibility mode on the template VM's nested VMs before publishing or exporting the image.
You should also test the performance of the nested VMs with the Processor Compatibility mode enabled to ensure performance isn't negatively impacted. For more information, see ramifications of using processor compatibility mode.
Automatically shut down nested VMs
To avoid data corruption in the nested virtual machines when the lab VM shuts down, configure the nested VMs to automatically shut down when the lab VM shuts down.
Learn how you can use the Set-VM
PowerShell command to configure the shutdown auto stop action for a nested VM.
Use VHDX disk format for nested VMs
When you create the nested virtual machines, choose the VHDX file format for the virtual hard disks to save disk space on the lab VM.
Configure the number of vCPUs for nested VMs
By default, when you create the nested virtual machine, only one virtual CPU (vCPU) is assigned. Depending on the operating system, and software of the nested VM, you might have to increase the number of vCPUs. For more information about managing and setting nested VM CPU resources, see Hyper-V processor performance or Set-VM PowerShell cmdlet.
Configure the assigned memory for nested VMs
When you create the nested virtual machine, the minimum assigned memory might not be sufficient for the operating system and installed software of the nested VM. You might have to increase the minimum amount of assigned memory for the nested VM. For more information about managing and setting nested VM CPU resources, see Hyper-V Host CPU Resource Management or Set-VM PowerShell cmdlet.
Best practices for running Linux on Hyper-V
The following resources provide more best practices for running Linux or FreeBSD on Hyper-V:
Next steps
Feedback
Submit and view feedback for