You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article provides a comprehensive guide to troubleshoot common issues encountered with Hyper-V virtual machines (VMs). It focuses on resolving problems related to device integration (such as mouse, keyboard, GPU, or USB), migration, and enhanced session mode. These issues may arise following platform upgrades, changes in cluster configurations, or migrations from other hypervisors, like VMware. Addressing these problems is critical to maintaining VM usability, ensuring network connectivity, and supporting business operations.
15
+
This article provides a comprehensive guide to troubleshoot common issues encountered with Hyper-V virtual machines (VMs). It focuses on resolving problems related to device integration (such as mouse, keyboard, graphics processing unit (GPU), or USB), migration, and enhanced session mode. These issues might arise following platform upgrades, changes in cluster configurations, or migrations from other hypervisors, like VMware. Addressing these problems is critical to maintaining VM usability, ensuring network connectivity, and supporting business operations.
16
16
17
-
## Symptoms
18
-
19
-
### End-user symptoms
17
+
## End-user symptoms
20
18
21
19
- Mouse movements appear inverted vertically in Linux guest VMs after upgrading to Windows 11.
22
20
- Mouse and keyboard become unresponsive in Windows 11 VMs when using Enhanced Session Mode.
23
21
- Failure to perform live migration of VMs with Trusted Platform Module (TPM) enabled.
24
-
- VMs assigned to VLANs lose network connectivity.
22
+
- VMs assigned to virtual local area networks (VLANs) lose network connectivity.
25
23
- Inability to connect USB devices or GPU cards to VMs after migration from VMware.
26
24
- VMs experience frequent, random reboots or unexpected connectivity loss to business applications.
27
25
28
-
### Technical/system symptoms
29
-
30
-
-**Error messages or Event IDs**: - “Failed to remove checkpoint. (Virtual machine ID …)”
- Event ID 1069 (Failover Clustering): Cluster resource failure.
35
+
- Event ID 41 (Kernel-Power): System rebooted without a clean shutdown.
36
+
- Event ID 18502 (Hyper-V-Worker): VM was turned off.
37
+
- Event ID 3056 (Hyper-V-Worker): NUMA topology mismatch warning.
38
+
- Event ID 1106 (Hyper-V VMMS): Access violation (c0000005) during live migration.
39
+
- Reliability Monitor shows repeated System Center Virtual Machine Manager (SCVMM) agent crashes.
40
+
40
41
- Inability to uninstall VMware Tools after migration to Hyper-V.
41
-
- VMs hang or become unresponsive, with high CPU usage by services like WMI or LSASS.
42
+
- VMs hang or become unresponsive, with high CPU usage by services like Windows Management Instrumentation (WMI) or Local Security Authority Subsystem Service (LSASS).
42
43
- Hyper-V Manager displays orphaned checkpoints that block backups.
43
44
44
-
## Cause
45
+
## Cause 1: Input and device integration failures
45
46
46
-
### Input and device integration failures
47
+
- Operating system (OS) or hypervisor compatibility: Upgrading the host OS (for example, to Windows 11, version 24H2) might introduce changes in Hyper-V integration services, leading to input inversion or loss, especially in non-Windows guest VMs.
48
+
- Enhanced Session Mode: Protocol or driver issues might disrupt input device functionality within Enhanced Session Mode on Windows 11 VMs.
49
+
- Migration from VMware: Incomplete or incompatible removal of VMware Tools or differences in device passthrough (for example, USB or GPU) between VMware and Hyper-V might cause connectivity and performance problems.
47
50
48
-
-**OS/Hypervisor compatibility**: Upgrading the host OS (for example, to Windows 11 24H2) may introduce changes in Hyper-V integration services, leading to input inversion or loss, especially in non-Windows guest VMs.
49
-
-**Enhanced Session Mode**: Protocol or driver issues may disrupt input device functionality within Enhanced Session Mode on Windows 11 VMs.
50
-
-**Migration from VMware**: Incomplete or incompatible removal of VMware Tools or differences in device passthrough (for example, USB or GPU) between VMware and Hyper-V may cause connectivity and performance problems.
51
+
### Resolution: Input and device integration issues
51
52
52
-
###Migration and cluster failures
53
+
#### A. Mouse or keyboard issues in guest VMs
53
54
54
-
-**TPM/shielded VM certificate misconfiguration**: Missing or improperly transferred shielding certificates can prevent live migration for TPM-enabled VMs.
55
-
-**VLAN/network configuration**: Physical switch port misconfigurations or legacy network teaming setups may isolate VMs after VLAN assignment.
56
-
-**VM configuration version**: Outdated VM configuration versions may be incompatible with newer Hyper-V hosts, leading to migration failures.
57
-
-**Heartbeat integration**: High CPU usage, resource exhaustion, or application hangs within VMs may trigger cluster heartbeat failures, resulting in forced restarts.
55
+
- For inverted mouse input in Linux guest VMs on Windows 11, version 24H2, revert the host OS to Windows 11, version 23H2 until a permanent fix is available.
56
+
- To resolve Enhanced Session Mode input loss in Windows 11 VMs, follow these steps:
58
57
59
-
### File system and storage issues
58
+
1. Open **Hyper-V Manager**.
59
+
2. Navigate to **Hyper-V Settings** > **Enhanced Session Mode Policy**.
60
+
3. Uncheck **Allow enhanced session mode** to disable the feature.
61
+
4. Test input functionality in standard session mode.
60
62
61
-
-**Orphaned checkpoints**: Incomplete merge operations can leave behind phantom checkpoint files, blocking backups or checkpoint deletions.
62
-
-**File system corruption**: Issues with storage or the file system may disrupt checkpoint removal or VHD chain updates.
63
+
#### B. USB or GPU passthrough after VMware migration
63
64
64
-
### Application-level and third-party integration
65
+
- USB devices:
65
66
66
-
-**Monitoring/agent crashes**: Third-party monitoring or agent software (such as SCVMM or Zenoss) may fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
67
+
- Use Remote Desktop USB redirection or Enhanced Session Mode for supported OSs.
68
+
- Alternatively, configure a network USB solution as Hyper-V doesn't natively support direct USB passthrough.
67
69
68
-
## Resolution
70
+
- GPU assignment: Use Discrete Device Assignment (DDA):
69
71
70
-
### 1. Input and device integration issues
72
+
- Follow guidance from [Deploying graphics devices using DDA](/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
73
+
- Confirm hardware, drivers, and VM configuration support for DDA.
71
74
72
-
#### A. Mouse/keyboard issues in guest VMs
75
+
#### C. Uninstalling VMware tools
73
76
74
-
- For inverted mouse input in Linux guest VMs on Windows 11 24H2, revert the host OS to Windows 11 23H2 until a permanent fix is available.
75
-
- To resolve Enhanced Session Mode input loss in Windows 11 VMs: 1. Open **Hyper-V Manager**.
76
-
2. Navigate to **Hyper-V Settings > Enhanced Session Mode Policy**.
77
-
3. Uncheck **Allow enhanced session mode** to disable the feature.
78
-
4. Test input functionality in standard session mode.
77
+
Use PowerShell scripts, like **Uninstall-VMwareTools.ps1** from GitHub, to forcibly remove VMware tools and associated services after migration.
79
78
80
-
#### B. USB/GPU passthrough after VMware migration
79
+
##Cause 2: Migration and cluster failures
81
80
82
-
-**USB devices**: - Use Remote Desktop USB redirection or Enhanced Session Mode for supported OSs.
83
-
- Alternatively, configure a network USB solution as Hyper-V does not natively support direct USB passthrough.
84
-
-**GPU assignment**: Use Discrete Device Assignment (DDA): - Follow guidance from [Deploying graphics devices using DDA](https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
85
-
- Confirm hardware, drivers, and VM configuration support for DDA.
81
+
-TPM/shielded VM certificate misconfiguration: Missing or improperly transferred shielding certificates can prevent live migration for TPM-enabled VMs.
82
+
- VLAN/network configuration: Physical switch port misconfigurations or legacy network teaming setups might isolate VMs after VLAN assignment.
83
+
-VM configuration version: Outdated VM configuration versions might be incompatible with newer Hyper-V hosts, leading to migration failures.
84
+
- Heartbeat integration: High CPU usage, resource exhaustion, or application hangs within VMs might trigger cluster heartbeat failures, resulting in forced restarts.
86
85
87
-
#### C. Uninstalling VMware Tools
86
+
###Resolution: Migration and cluster issues
88
87
89
-
- Use PowerShell scripts, like Uninstall-VMwareTools.ps1 from GitHub, to forcibly remove VMware Tools and associated services after migration.
88
+
#### A. TPM/shielded VM migration failures
90
89
91
-
### 2. Migration and cluster issues
90
+
1. On the source node, list shielded VM certificates by using the following command:
92
91
93
-
#### A. TPM/shielded VM migration failures
92
+
```console
93
+
bashcertutil -store "Shielded VM Local Certificates"
94
+
```
94
95
95
-
1. On the source node, list Shielded VM certificates:bashcertutil -store "Shielded VM Local Certificates"
96
-
2. Export encryption and signing certificates:
96
+
2. Export encryption and signing certificates by using the following commands:
97
97
98
-
```plaintext
98
+
```console
99
99
certutil -exportPFX -p <password> "Shielded VM Local Certificates" <SerialNumber> c:\cert-VMEncryption.pfx
100
100
certutil -exportPFX -p <password> "Shielded VM Local Certificates" <SerialNumber> c:\cert-VMSigning.pfx
101
101
```
102
-
3. Import certificates on the target node:```bashcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMEncryption.pfxcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMSigning.pfx
102
+
103
+
3. Import certificates on the target node by using the following command:
104
+
105
+
```console
106
+
bashcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMEncryption.pfxcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMSigning.pfx
107
+
```
103
108
104
109
#### B. VLAN/network connectivity
105
110
@@ -109,79 +114,108 @@ This article provides a comprehensive guide to troubleshoot common issues encoun
109
114
110
115
#### C. VM configuration version
111
116
112
-
- Update the VM configuration:
117
+
Update the VM configuration by using the following cmdlet:
113
118
114
-
```plaintext
115
-
Update-VMVersion -Name <VMName>
116
-
```
117
-
- After updating, test live migration. If issues persist, shut down the VM, perform a quick migration, and then restart.
119
+
```powershell
120
+
Update-VMVersion -Name <VMName>
121
+
```
122
+
123
+
After the updating, test live migration. If issues persist, shut down the VM, perform a quick migration, and then restart.
118
124
119
125
#### D. Cluster/heartbeat-related reboots
120
126
121
-
- If VMs are rebooted due to heartbeat failures: 1. Disable the Heartbeat Integration Service for affected VMs: - Go to **VM settings > Integration Services**.
122
-
- Uncheck **Heartbeat**.
123
-
2. Monitor VM stability. If high CPU usage (for example, by WMI or LSASS) is detected, investigate resource usage.
124
-
3. Collect memory dumps for analysis:```bashDebug-VM -Name -InjectNonMaskableInterrupt -Force
127
+
If VMs are rebooted due to heartbeat failures, follow these steps:
125
128
126
-
### 3. File system, storage, and checkpoint failures
129
+
1. Disable the Heartbeat Integration Service for affected VMs:
130
+
1. Go to **VM settings > Integration Services**.
131
+
2. Uncheck **Heartbeat**.
132
+
2. Monitor VM stability. If high CPU usage (for example, by WMI or LSASS) is detected, investigate resource usage.
133
+
3. Collect memory dumps for analysis by using the following command:
127
134
128
-
#### A. Orphaned/phantom checkpoints
135
+
```console
136
+
-Name -InjectNonMaskableInterrupt -Force
137
+
```
138
+
139
+
## Cause 3: File system and storage issues
140
+
141
+
- Orphaned checkpoints: Incomplete merge operations can leave behind phantom checkpoint files, blocking backups or checkpoint deletions.
142
+
- File system corruption: Issues with storage or the file system might disrupt checkpoint removal or VHD chain updates.
143
+
144
+
### Resolution: File system, storage, and checkpoint failures
145
+
146
+
#### Orphaned/phantom checkpoints
129
147
130
148
1. Create a new checkpoint for the affected VM.
131
149
2. Export the latest checkpoint to a safe location.
132
150
3. Delete the VM from Hyper-V Manager.
133
151
4. Import the VM back into Hyper-V using the restore option. For clusters, remove the VM from the cluster, recreate it with the same configuration, attach the existing VHD/VHDX, and add it back to the cluster.
134
152
5. Inspect checkpoints using PowerShell:
135
153
136
-
```plaintext
154
+
```powershell
137
155
Get-VM -Name <VMName> | Get-VMSnapshot
138
156
Get-VHDChain -Path <path-to-vhdx>
139
157
```
158
+
140
159
6. Use tools like Process Monitor (procmon) to trace file access and verify system integrity.
141
160
142
-
### 4. Application-level and third-party integration issues
161
+
## Cause 4: Application-level and third-party integration
162
+
163
+
- Monitoring/agent crashes: Third-party monitoring or agent software (such as SCVMM or Zenoss) might fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
164
+
165
+
### Resolution: Application-level and third-party integration issues
143
166
144
-
- If monitoring or agent integration fails: - Verify WMI and WINRM configurations on hosts.
145
-
- Review application logs for authentication errors, such as GSS challenge failures.
146
-
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
167
+
- If monitoring or agent integration fails:
147
168
148
-
### 5. General remediation and prevention
169
+
- Verify WMI and WINRM configurations on hosts.
170
+
- Review application logs for authentication errors, such as GSS challenge failures.
171
+
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
172
+
173
+
## General remediation and prevention
149
174
150
175
- Apply the latest Windows updates and cluster patches.
151
176
- Regularly monitor storage infrastructure to prevent file system corruption.
152
177
- Maintain up-to-date documentation of VM configurations, certificates, and network settings.
153
-
- For security vulnerabilities, ensure correct revocation policies and registry settings:```bashSet-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name EnableVirtualizationBasedSecurity -Value 0 -Type DWordRestart-Computer
178
+
- For security vulnerabilities, ensure correct revocation policies and registry settings by using the following command:
0 commit comments