Vcenter Server and Host Management

Total Page:16

File Type:pdf, Size:1020Kb

Vcenter Server and Host Management vCenter Server and Host Management Update 2 Modified on 01 APR 2021 VMware vSphere 6.7 VMware ESXi 6.7 vCenter Server 6.7 vCenter Server and Host Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About VMware vCenter Server and Host Management 11 Updated Information 12 1 vSphere Concepts and Features 13 Virtualization Basics 13 Physical Topology of vSphere Data Center 14 vSphere Software Components 15 Client Interfaces for vSphere 18 vSphere Managed Inventory Objects 18 Optional vCenter Server Components 21 vCenter Server Plug-Ins 22 2 Using the vSphere Client 24 Log In to vCenter Server by Using the vSphere Client 25 Manage the Login Message to the vSphere Client Login Page 26 Use the vSphere Client Navigator 27 Customize the User Interface 28 Rearrange the Components of the User Interface 28 Customize the User Interface by Using the Layout Settings Menu 29 Disable the vSphere Web Client Customizable User Interface Feature 29 Disable the Related Objects Tabs 29 Manage Client Plug-Ins 30 Monitor Client Plugins 30 Install the VMware Enhanced Authentication Plug-in 30 Pause and Resume a Task in Progress in the vSphere Web Client 31 Refresh Data 31 Searching the Inventory 32 Perform a Quick Search 32 Perform a Simple Search 33 Perform an Advanced Search in the vSphere Web Client 33 Save, Run, Rename, and Delete a Search 34 Use Quick Filters 35 Quick Filters Available for vSphere Objects in the vSphere Web Client 35 View Recent Objects 37 Configure the vSphere Web Client Timeout Value 38 Remove Stored User Data 39 Drag Objects 39 VMware, Inc. 3 vCenter Server and Host Management Export Lists 40 Attach File to Service Request 40 Keyboard Shortcuts 41 Inventory Keyboard Shortcuts 41 Create a Scheduled Task with a Keyboard Shortcut 41 Provide Feedback with the vSphere Client 42 3 Configuring vCenter Server 43 Configure License Settings for vCenter Server 44 Configuring Statistics Settings 45 Configure Statistics Collection Intervals in the vSphere Client 45 Data Collection Levels 47 Configure Runtime Settings for vCenter Server 48 Configure User Directory Settings 49 Configure Mail Sender Settings 50 Configure SNMP Settings 50 View Port Settings 51 Configure Timeout Settings 52 Configure Logging Options 52 Configure Database Settings 53 Verifying SSL Certificates for Legacy Hosts 54 Configure Advanced Settings 55 Send a Message to Other Logged In Users 55 Edit the Settings of Services 56 Start, Stop, and Restart Services 57 Start, Stop, and Restart Services in the vSphere Web Client 57 Configuring Services in the vSphere Web Client 58 Auto Deploy Service 60 Content Library Service 60 Transfer Service Properties 62 VMware Open Virtualization Format Service 63 Image Builder Service 63 VMware Performance Charts Service 63 VMware vSphere Authentication Proxy 65 VMware vSphere ESXi Dump Collector 65 VMware vSphere Update Manager 65 vAPI Endpoint 66 4 Using Enhanced Linked Mode 70 5 Configuring Communication Among ESXi, vCenter Server, and the vSphere Web Client 71 VMware, Inc. 4 vCenter Server and Host Management 6 Configuring Hosts and vCenter Server 72 Host Configuration 72 Configure the Boot Device on an ESXi Host 72 Configure Agent VM Settings 73 Set Advanced Host Attributes 73 Synchronizing Clocks on the vSphere Network 74 Edit Time Configuration for a Host 75 7 Configuring Customer Experience Improvement Program 76 Categories of Information That VMware Receives 76 Join the Customer Experience Improvement Program in the vSphere Web Client 76 8 Organizing Your Inventory 78 Create Data Centers 79 Add a Host 80 Create a Folder 81 Creating Clusters 82 Create Clusters in the vSphere Client 82 Add Hosts to a Cluster in the vSphere Client 84 Configure a Cluster in the vSphere Client 85 Extending Clusters 87 Extend a Cluster without Host Networking Configuration 87 Extend a Cluster with Host Networking Configuration 88 9 vSphere Tags and Attributes 90 Migrate Custom Attributes to Tags 91 Create, Edit, or Delete a Tag Category 92 Create, Edit, or Delete a Tag 93 Assign or Remove a Tag 94 Add Permissions for Tags and Tag Categories 94 Tagging Best Practices 95 Custom Attributes in the vSphere Web Client 96 Add and Edit Custom Attributes 96 10 License Management and Reporting 98 Licensing Terminology and Definitions 99 The License Service in vSphere 6.7 100 Licensing for Environments with vCenter Server Systems 6.0 and Later, and 5.5 101 Licensing for Products in vSphere 101 Licensing for ESXi Hosts 102 Licensing for vCenter Server 103 VMware, Inc. 5 vCenter Server and Host Management Licensing for Clusters with Enabled vSAN 104 Suite Licensing 105 Licensing for VMware vCloud® Suite 105 Licensing for vSphere® with Operations Management 105 Licensing for the VMware vSphere® Platinum Edition 106 Managing Licenses 106 Create New Licenses 106 Configuring License Settings for Assets in the vSphere Web Client 107 Set Assets to Evaluation Mode 112 Rename a License 113 Remove Licenses 113 Viewing Licensing Information 114 View Licensing Information About the vSphere Environment 114 View Available Licenses and Features About a Product 115 View the Features Тhat an Asset Uses 116 View the License Key of the License 116 View the Licensed Features for an Asset 117 Export Licensing Information in the vSphere Environment 117 Generating Reports for License Use in the vSphere Web Client 118 View the License Usage for Multiple Products in the vSphere Web Client 119 View License Usage Details for a Single Product in the vSphere Web Client 119 Export a License Usage Report in the vSphere Web Client 120 Synchronizing Licenses with Your Customer Connect Account 121 Synchronize Licenses 121 Using CSV Files 127 Using Generated Recommendation Reports 128 vCenter Server Domain Repoint License Considerations 130 11 Working with Tasks 131 View Tasks 131 Schedule Tasks 131 Create a Scheduled Task in the vSphere Client 132 Create a Scheduled Task in the vSphere Web Client 134 Edit a Scheduled Task 136 Remove a Scheduled Task 137 12 Managing Hosts with vCenter Server in the vSphere Client 138 Disconnecting and Reconnecting a Host in the vSphere Client 138 Disconnect a Managed Host in the vSphere Client 138 Reconnect a Managed Host in the vSphere Client 139 Reconnecting Hosts After Changes to the vCenter Server SSL Certificate in the vSphere Client 139 VMware, Inc. 6 vCenter Server and Host Management Remove a Host from a Cluster in the vSphere Client 139 Remove a Managed Host from vCenter Server in the vSphere Client 140 Reboot or Shut Down an ESXi Host 141 13 Migrating Virtual Machines 143 Cold Migration 145 Migration with vMotion 146 Host Configuration for vMotion 147 Encrypted vSphere vMotion 150 Virtual Machine Conditions and Limitations for vMotion 152 Migration with vMotion in Environments Without Shared Storage 154 Migration Between vCenter Server Systems 155 Migration with Storage vMotion 157 Storage vMotion Requirements and Limitations 158 CPU Compatibility and EVC 159 CPU Compatibility Scenarios 159 CPU Families and Feature Sets 160 About Enhanced vMotion Compatibility 161 EVC Requirements for Hosts 161 Create an EVC Cluster 162 Enable EVC on an Existing Cluster 163 Change the EVC Mode for a Cluster 163 Determine the EVC Mode of a Virtual Machine 165 Determine the EVC Mode that a Host Supports 166 Prepare Clusters for AMD Processors Without 3DNow! 167 CPU Compatibility Masks 168 View CPUID Details for an EVC Cluster 168 Migrate a Powered-Off or Suspended Virtual Machine in the vSphere Web Client 169 Migrate a Virtual Machine to a New Compute Resource 171 Migrate a Virtual Machine to a New Compute Resource and Storage in the vSphere Web Client 174 Migrate a Virtual Machine to New Storage in the vSphere Web Client 177 Place vMotion Traffic on the vMotion TCP/IP Stack of an ESXi Host 179 Place Traffic for Cold Migration on the Provisioning TCP/IP Stack 181 Limits on Simultaneous Migrations 183 About Migration Compatibility Checks 184 14 Working with the Developer Center 186 Using the API Explorer 186 Retrieve APIs Using API Explorer 186 Using Code Capture 187 Record Actions Using Code Capture 187 VMware, Inc. 7 vCenter Server and Host Management 15 Automating Management Tasks by Using vRealize Orchestrator 189 Concepts of Workflows 189 Performing Administration Tasks on the vSphere Objects 190 Configure the Default vRealize Orchestrator 191 Managing Associations of Workflows with vSphere Inventory Objects 192 Associate Workflows with vSphere Inventory Object Types 192 Edit the Associations of Workflows with vSphere Objects 193 Export the Associations of Workflows with vSphere Objects 193 Import the Association of Workflows with vSphere Objects 194 Working with Workflows 195 Run Workflows on vSphere Inventory Objects 195 View Information About Workflow Runs 196 View Information About the Runs of a Specific Workflow 197 View Workflows That Are Waiting for User Interaction 197 Searching for Workflows 198 Scheduling Workflows 199 Workflows for Managing Inventory Objects 202 Cluster and Compute Resource Workflows 202 Guest Operation Files Workflows 203 Guest Operation Processes Workflows 204 Custom Attributes Workflows 205 Data Center Workflows 205 Datastore and Files Workflows 206 Data Center Folder Management Workflows 206 Host Folder Management Workflows 207 Virtual Machine Folder Management Workflows 207 Basic Host Management Workflows 207 Host Power Management Workflows 208 Host Registration Management Workflows 208 Networking Workflows 209 Distributed Virtual Port Group Workflows 209 Distributed Virtual Switch Workflows 209 Standard Virtual Switch Workflows 210 Resource Pool Workflows 211 Storage Workflows 211 Storage DRS Workflows 212 Basic Virtual Machine Management Workflows 213 Clone Workflows 215 Linked Clone Workflows 215 Linux Customization Clone Workflows 216 Tools Clone Workflows 216 VMware, Inc.
Recommended publications
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • Dm-X: Protecting Volume-Level Integrity for Cloud Volumes and Local
    dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices Anrin Chakraborti Bhushan Jain Jan Kasiak Stony Brook University Stony Brook University & Stony Brook University UNC, Chapel Hill Tao Zhang Donald Porter Radu Sion Stony Brook University & Stony Brook University & Stony Brook University UNC, Chapel Hill UNC, Chapel Hill ABSTRACT on Amazon’s Virtual Private Cloud (VPC) [2] (which provides The verified boot feature in recent Android devices, which strong security guarantees through network isolation) store deploys dm-verity, has been overwhelmingly successful in elim- data on untrusted storage devices residing in the public cloud. inating the extremely popular Android smart phone rooting For example, Amazon VPC file systems, object stores, and movement [25]. Unfortunately, dm-verity integrity guarantees databases reside on virtual block devices in the Amazon are read-only and do not extend to writable volumes. Elastic Block Storage (EBS). This paper introduces a new device mapper, dm-x, that This allows numerous attack vectors for a malicious cloud efficiently (fast) and reliably (metadata journaling) assures provider/untrusted software running on the server. For in- volume-level integrity for entire, writable volumes. In a direct stance, to ensure SEC-mandated assurances of end-to-end disk setup, dm-x overheads are around 6-35% over ext4 on the integrity, banks need to guarantee that the external cloud raw volume while offering additional integrity guarantees. For storage service is unable to remove log entries documenting cloud storage (Amazon EBS), dm-x overheads are negligible. financial transactions. Yet, without integrity of the storage device, a malicious cloud storage service could remove logs of a coordinated attack.
    [Show full text]
  • Vmware Vsphere the Leader in Virtualized Infrastructure and Your First Step to Application Modernization
    DATASHEET VMware vSphere The leader in virtualized infrastructure and your first step to application modernization AT A GLANCE Why VMware vSphere®? VMware vSphere® is the industry vSphere 7 is the biggest release of vSphere in over a decade. With the latest release, VMware W leading compute virtualization platform. E ® vSphereN vSp withher eVMware 7 wit hTanzu Tan™z enablesu millions of IT administrators across the globe to get started with Kubernetes workloads within an hour1. vSphere 7 has been rearchitected with Modernize the 70 million+ workloads running on vSphere native Kubernetes for application modernization. Developers can’t afford infrastructure that slows them down – I P A businesses rely on developers to rapidly s e Run tim e S e rvice s Infra stru cture S e rvice s t develop and deploy applications to e n Developer r Tanzu Kubernetes Grid Network Storage accelerate digital transformation. On the e vCenter b Service Service Service Server u other hand, IT teams are challenged to K deliver modern infrastructure that Intrinsic Security & Lifecycle Management supports modern container-based application development, including the IT Admin Compute Networking Storage services and tools to build new applications. Deliver Developer- Align Dev Ops and Simplify cloud FIGURE 1: VMware revSpheready infra withstru cTanzuture 2 IT Teams operations Using vSphere 7, customers and ® partners can now deliver a developer- vSphere 7 has beenConfid erearchitectedntial │ ©2020 VMware, Inc. with native Kubernetes to enable IT Admins to use vCenter Server11 ready infrastructure, scale without to operate Kubernetes clusters through namespaces. VMware vSphere with Tanzu allows IT Admins to operate with their existing skillset and deliver a self-service access to infrastructure for the Dev compromise and simplify operations.
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • Survey on Virtualization with Xen Hypervisor
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 8, October - 2012 Survey On Virtualization With Xen Hypervisor Mr.Tejas P.Bhatt*1, Asst.Prof.Pinal.J.Patel#2 * C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India. # C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India Abstract In the cloud computing, there is one virtual machine that need them. For this reason, cloud computing has also can created and put it out on the physical machine with been described as "on-demand computing." The Internet providing the ideas using the hypervisors. So the is utilized as a vehicle but it is not the cloud. Google, Amazon, eBay, etc utilize cloud technologies to provide virtualization technology has limit security capabilities in services via the Internet. The cloud technologies are an order to secure wide area environment such as the cloud. operating technology built on a vast number of computers While consolidating physical to virtual machines using that provide a service [1]. Google as a best example of Xen hypervisor, we want to be able to deploy and manage cloud computing. What happens when you type and virtual machines in the same way we manage and deploy search something on Google? Have you ever thought physical machines. For operators and support people about this? Does your PC go through all that information, there should be no difference between virtual and sorts it out for you and display all the relevant results? IJERTNo, it doesn’t. Otherwise, you would wait much longer physical installations Therefore, the development of a for a simple results page to display.
    [Show full text]
  • Performance Analysis of Selected Hypervisors (Virtual Machine Monitors - Vmms) Waldemar Graniszewski, Adam Arciszewski
    INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2016, VOL. 62, NO. 3, PP. 231–236 Manuscript received August 12, 2016; revised September, 2016. DOI: 10.1515/eletel-2016-0031 Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs) Waldemar Graniszewski, Adam Arciszewski Abstract—Virtualization of operating systems and network results for CPU, NIC, kernel compilation time and storage infrastructure plays an important role in current IT projects. benchmarks’ tests are presented in Section IV. Finally, in With the number of services running on different hardware Section V, we draw some conclusions. resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their II. BACKGROUND AND RELATED WORK competitors. In this paper we evaluate performance of different In this section we present some general background for solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard virtualisation technology (in Subsection II-A) and a short benchmark tools to compare efficiency of main hardware com- review of related work (in Subsection II-B). ponents, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented. A. Background Keywords—virtualisation, virtualmachines, benchmark, per- As mentioned earlier, in Section I, cloud computing and formance, hypervisor, virtual machine monitor, vmm services provided by data centers require robust software for their operation. With data center server consolidation, the I. INTRODUCTION portability of each solution plays an important role. In the N recent years the most popular IT projects have been last decade both proprietary software like VMware ESXi, Mi- I based on cloud computing.
    [Show full text]
  • Information Guide for Managing Vmware Esxi : Vmware, Inc
    INFORMATION GUIDE Managing VMware ESXi VMWARE INFORMATION GUIDE Table of Contents Introduction ............................................................................................................ 3 Deployment ........................................................................................................... 3 Large-Scale Standardized Deployment ............................................................. 4 Interactive and Scripted Management ................................................................. 5 VI Client .............................................................................................................. 5 Remote Command Line Interfaces .................................................................... 6 File Management ............................................................................................... 7 Remote Command Line Interface and ESX 3 ..................................................... 8 Third-Party Management Applications ................................................................. 8 Common Information Model ............................................................................. 8 VI API .................................................................................................................. 8 SNMP .................................................................................................................. 9 System Image Design ............................................................................................. 10 Patching and Upgrading
    [Show full text]
  • A Comparison of Virtual Lab Solutions for Online Cyber Security Education
    Communications of the IIMA Volume 12 Issue 4 Article 6 2012 A Comparison of Virtual Lab Solutions for Online Cyber Security Education Joon Son California State University, San Bernardino Chinedum Irrechukwu University of Maryland University College Patrick Fitzgibbons University of Maryland University College Follow this and additional works at: https://scholarworks.lib.csusb.edu/ciima Recommended Citation Son, Joon; Irrechukwu, Chinedum; and Fitzgibbons, Patrick (2012) "A Comparison of Virtual Lab Solutions for Online Cyber Security Education ," Communications of the IIMA: Vol. 12 : Iss. 4 , Article 6. Available at: https://scholarworks.lib.csusb.edu/ciima/vol12/iss4/6 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Communications of the IIMA by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Virtual Lab for Online Cyber Security Education Son, Irrechukwu & Fitzgibbons Virtual Lab for Online Cyber Security Education Joon Son California State University, San Bernardino [email protected] Chinedum Irrechukwu University of Maryland University College (UMUC) [email protected] Patrick Fitzgibbons University of Maryland University College (UMUC) [email protected] ABSTRACT In this paper the authors describe their experience of designing a virtual lab architecture capable of providing hundreds of students with a hands on learning experience in support of an online educational setting. The authors discuss alternative approaches of designing a virtual lab and address the criteria in selecting the optimal deployment method. The authors conclude that virtualization offers a significant instructional advantage in delivering a cost effective and flexible hands on learning experience.
    [Show full text]
  • Vcenter Server and Host Management
    vCenter Server and Host Management 02 APR 2020 Modified on 13 AUG 2020 VMware vSphere 7.0 VMware ESXi 7.0 vCenter Server 7.0 vCenter Server and Host Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About VMware vCenter Server and Host Management 9 Updated Information 10 1 vSphere Concepts and Features 11 Virtualization Basics 11 Physical Topology of vSphere Data Center 12 vSphere Software Components 13 Client Interfaces for vSphere 16 vSphere Managed Inventory Objects 16 Optional vCenter Server Components 18 vCenter Server Plug-Ins 19 2 Using the vSphere Client 21 Log In to vCenter Server by Using the vSphere Client 22 Use the vSphere Client Navigator 23 Manage Client Plug-Ins 23 Monitor Client Plugins 24 Install the VMware Enhanced Authentication Plug-in 24 Refresh Data 25 Searching the Inventory 25 Perform a Quick Search 26 Save, Run, Rename, and Delete a Search 26 Sort the vSphere Client Inventory 27 Drag Objects 28 Export Lists 28 Attach File to Service Request 29 Keyboard Shortcuts 29 Inventory Keyboard Shortcuts 29 Provide Feedback with the vSphere Client 30 Start, Stop, and Restart Services 30 3 Using Enhanced Linked Mode 32 4 Configuring Hosts in vCenter Server 33 Host Configuration 33 Configure the Boot Device on an ESXi Host 33 Configure Agent VM Settings 34 VMware, Inc. 3 vCenter
    [Show full text]
  • SGI™ Propack 1.3 for Linux™ Start Here
    SGI™ ProPack 1.3 for Linux™ Start Here Document Number 007-4062-005 © 1999—2000 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED AND RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the Government is subject to restrictions as set forth in the Rights in Data clause at FAR 52.227-14 and/or in similar or successor clauses in the FAR, or in the DOD, DOE or NASA FAR Supplements. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/ manufacturer is SGI, 1600 Amphitheatre Pkwy., Mountain View, CA 94043-1351. Silicon Graphics is a registered trademark and SGI and SGI ProPack for Linux are trademarks of Silicon Graphics, Inc. Intel is a trademark of Intel Corporation. Linux is a trademark of Linus Torvalds. NCR is a trademark of NCR Corporation. NFS is a trademark of Sun Microsystems, Inc. Oracle is a trademark of Oracle Corporation. Red Hat is a registered trademark and RPM is a trademark of Red Hat, Inc. SuSE is a trademark of SuSE Inc. TurboLinux is a trademark of TurboLinux, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. SGI™ ProPack 1.3 for Linux™ Start Here Document Number 007-4062-005 Contents List of Tables v About This Guide vii Reader Comments vii 1. Release Features 1 Feature Overview 2 Qualified Drivers 3 Patches and Changes to Base Linux Distributions 3 2.
    [Show full text]
  • Mos - Virtualization
    MOS - VIRTUALIZATION Tobias Stumpf, Marcus H¨ahnel WS 2017/18 Goals Give you an overview about: • virtualization and virtual machines in general, • hardware virtualization on x86, • our research regarding virtualization. We will not discuss: • lots and lots of details, • language runtimes, • how to use XEN/KVM/. MOS - Virtualization slide 3 What is Virtualization? Outline What is Virtualization? Very Short History Virtualization on x86 Example: L4Linux Example: NOVA Example: Karma VMM MOS - Virtualization slide 4 What is Virtualization? Starting Point You want to write a new operating system that is • secure, • trustworthy, • small, • fast, • fancy. but . MOS - Virtualization slide 5 What is Virtualization? Commodity Applications Users expect to run all the software they are used to (\legacy"): • browsers, • Word, • iTunes, • certified business applications, • new (Windows/DirectX) and ancient (DOS) games. Porting or rewriting all is infeasible! MOS - Virtualization slide 6 What is Virtualization? One Solution: Virtualization \By virtualizing a commodity OS [...] we gain support for legacy applications, and devices we don't want to write drivers for." \All this allows the research community to finally escape the straitjacket of POSIX or Windows compatibility [...]" Roscoe:2007:HV:1361397.1361401 MOS - Virtualization slide 7 What is Virtualization? Virtualization virtual existing in essence or effect though not in actual fact http://wordnetweb.princeton.edu \All problems in computer science can be solved by another level of indirection." David Wheeler MOS - Virtualization slide 8 What is Virtualization? Emulation Suppose you develop for a system G (guest, e.g. an ARM-based phone) on your workstation H (host, e.g., an x86 PC). An emulator for G running on H precisely emulates G's • CPU, • memory subsystem, and • I/O devices.
    [Show full text]
  • Draft NISTIR 8221
    Withdrawn Draft Warning Notice The attached draft document has been withdrawn, and is provided solely for historical purposes. It has been superseded by the document identified below. Withdrawal Date June 5, 2019 Original Release Date September 21, 2018 Superseding Document Status Final Series/Number NISTIR 8221 Title A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data Publication Date June 2019 DOI https://doi.org/10.6028/NIST.IR.8221 CSRC URL https://csrc.nist.gov/publications/detail/nistir/8221/final Additional Information 1 Draft NISTIR 8221 2 3 A Methodology for Determining 4 Forensic Data Requirements for 5 Detecting Hypervisor Attacks 6 7 8 Ramaswamy Chandramouli 9 Anoop Singhal 10 Duminda Wijesekera 11 Changwei Liu 12 13 14 Draft NISTIR 8221 15 16 A Methodology for Determining 17 Forensic Data Requirements for 18 Detecting Hypervisor Attacks 19 20 Ramaswamy Chandramouli 21 Anoop Singhal 22 Duminda Wijesekera 23 Changwei Liu 24 Computer Security Division 25 Information Technology Laboratory 26 27 28 29 30 31 32 33 34 35 36 September 2018 37 38 39 40 41 U.S. Department of Commerce 42 Wilbur L. Ross, Jr., Secretary 43 44 National Institute of Standards and Technology 45 Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology 46 47 National Institute of Standards and Technology Internal Report 8221 48 27 pages (September 2018) 49 50 51 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 52 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 53 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 54 available for the purpose.
    [Show full text]