Vsphere Virtual Machine Administration

Total Page:16

File Type:pdf, Size:1020Kb

Vsphere Virtual Machine Administration vSphere Virtual Machine Administration Update 2 Modified on 12 JULY 2021 VMware vSphere 6.7 VMware ESXi 6.7 vCenter Server 6.7 vSphere Virtual Machine Administration You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About vSphere Virtual Machine Administration 10 1 Updated Information 12 2 Introduction to VMware vSphere Virtual Machines 13 Virtual Machine Files 13 Virtual Machines and the Virtual Infrastructure 14 Virtual Machine Lifecycle 15 Virtual Machine Components 16 Virtual Machine Hardware Available to vSphere Virtual Machines 17 Virtual Machine Options 19 The vSphere Client and the vSphere Web Client 21 Where to Go From Here 21 3 Deploying Virtual Machines 23 Create a Virtual Machine with the New Virtual Machine Wizard 24 Clone a Virtual Machine to a Template 27 Clone a Virtual Machine to a Template in the vSphere Web Client 30 Deploy a Virtual Machine from a Template 33 Deploy a Virtual Machine from a Template in the vSphere Web Client 37 Clone an Existing Virtual Machine 41 Clone an Existing Virtual Machine in the vSphere Web Client 45 Cloning a Virtual Machine with Instant Clone 49 Clone a Template to a Template 50 Clone a Template to a Template in the vSphere Web Client 53 Convert a Template to a Virtual Machine 56 4 Deploying OVF and OVA Templates 58 OVF and OVA File Formats and Templates 58 Deploy an OVF or OVA Template 59 Export an OVF Template 61 Browse VMware Virtual Appliance Marketplace 62 5 Using Content Libraries 63 Hierarchical Inheritance of Permissions for Content Libraries 64 Content Library Administrator Role 66 Create a Library 66 Edit a Content Library 68 VMware, Inc. 3 vSphere Virtual Machine Administration Managing a Publisher Local Library 70 Create a Subscription for a Local Library 72 Publish the Contents of a Library to a Subscriber 73 Publish a Single Template to a Subscription 74 Delete a Subscription 75 Managing a Subscribed Library 75 Synchronize a Subscribed Content Library 77 Synchronize a Library Item in a Subscribed Library 78 Populating Libraries with Content 78 Import Items to a Content Library 79 Clone a vApp to a Template in a Content Library 80 Clone a Virtual Machine or a Virtual Machine Template to a Template in a Content Library 81 Clone Library Items from One Library to Another Library 82 Working with Items in a Library 83 Templates in Content Libraries 83 Update a Content Library Item 86 Export an Item from a Content Library to Your Local Computer 86 Clone Library Items from One Library to Another Library 87 Edit a Content Library Item 88 Delete a Content Library Item or Item Content 88 Creating Virtual Machines and vApps from Templates in a Content Library 90 Deploy a Virtual Machine from an OVF Template in a Content Library 90 Deploy a Virtual Machine From an OVF Template in a Content Library in the vSphere Web Client 92 Deploy a Virtual Machine from a VM Template in a Content Library 95 Create New vApp From a Template in a Content Library 99 6 Configuring Virtual Machine Hardware 100 Virtual Machine Compatibility 100 Set the Default Compatibility for Virtual Machine Creation 102 Schedule a Compatibility Upgrade for a Single Virtual Machine 103 Change the Default Virtual Machine Compatibility Setting 104 Hardware Features Available with Virtual Machine Compatibility Settings 105 Virtual CPU Configuration 109 Virtual CPU Limitations 110 Configuring Multicore Virtual CPUs 111 Enable CPU Hot Add 112 Change the Number of Virtual CPUs 113 Allocate CPU Resources 114 Change CPU Identification Mask Settings 114 Expose VMware Hardware Assisted Virtualization 115 VMware, Inc. 4 vSphere Virtual Machine Administration Enable Virtual CPU Performance Counters 116 Configure Processor Scheduling Affinity 117 Change CPU/MMU Virtualization Settings 117 Virtual Memory Configuration 118 Change the Memory Configuration 118 Allocate Memory Resources 119 Change Memory Hot Add Settings 120 Managing Persistent Memory 121 Virtual Disk Configuration 124 About Virtual Disk Provisioning Policies 124 Large Capacity Virtual Disk Conditions and Limitations 125 Change the Virtual Disk Configuration 126 Use Disk Shares to Prioritize Virtual Machines 127 Configure Flash Read Cache for a Virtual Machine 128 Determine the Virtual Disk Format and Convert a Virtual Disk from the Thin Provision Format to a Thick Provision Format 129 Add a Hard Disk to a Virtual Machine 130 SCSI and SATA Storage Controller Conditions, Limitations, and Compatibility 136 Add a SATA Controller 139 Add a SCSI Controller to a Virtual Machine 140 Add a Paravirtualized SCSI Adapter 141 Add an NVMe Controller 141 Change the SCSI Controller Configuration 142 Virtual Machine Network Configuration 144 Network Adapter Basics 144 Network Adapters and Legacy Virtual Machines 146 Change the Virtual Machine Network Adapter Configuration 146 Add a Network Adapter to a Virtual Machine 147 Parallel and Serial Port Configuration 149 Other Virtual Machine Device Configuration 158 Change the CD/DVD Drive Configuration 158 Add or Modify a Virtual Machine CD or DVD Drive 162 Change the Floppy Drive Configuration in the vSphere Web Client 163 Add a Floppy Drive to a Virtual Machine in the vSphere Web Client 164 Add and Configure a SCSI Device 165 Add a PCI Device 166 Configuring 3D Graphics 167 Add an NVIDIA GRID vGPU to a Virtual Machine 171 USB Configuration from an ESXi Host to a Virtual Machine 172 USB Autoconnect Feature 173 vSphere Features Available with USB Passthrough 174 Configuring USB Devices for vMotion 174 VMware, Inc. 5 vSphere Virtual Machine Administration Avoiding Data Loss with USB Devices 175 Connecting USB Devices to an ESXi Host 175 Add USB Devices to an ESXi Host 177 Add a USB Controller to a Virtual Machine 177 Add USB Devices from an ESXi Host to a Virtual Machine 179 Remove USB Devices That Are Connected Through an ESXi Host 180 Remove USB Devices from an ESXi Host 180 USB Configuration from a Client Computer to a Virtual Machine 181 Connecting USB Devices to a Client Computer 182 Connect a USB Device to a Client Computer 183 Add a USB Controller to a Virtual Machine 184 Add USB Devices from a Client Computer to a Virtual Machine 185 Remove USB Devices That Are Connected Through a Client Computer 186 Remove a USB Controller from a Virtual Machine 187 Add a Shared Smart Card Reader to Virtual Machines 188 Securing Virtual Machines with Virtual Trusted Platform Module 189 Enable Virtual Trusted Platform Module for an Existing Virtual Machine 190 Remove Virtual Trusted Platform Module from a Virtual Machine 191 7 Configuring Virtual Machine Options 192 Virtual Machine Options Overview 192 General Virtual Machine Options 193 Change the Virtual Machine Name 193 View the Virtual Machine Configuration and Working File Location 194 Change the Configured Guest Operating System 194 Configuring User Mappings on Guest Operating Systems 195 View Existing SSO User Mappings 196 Add SSO users to Guest Operating Systems 196 Remove SSO Users from Guest Operating Systems 197 VMware Remote Console Options 198 Change the Virtual Machine Console Options for Remote Users 198 Configure Virtual Machine Encryption Options 198 Encrypt an Existing Virtual Machine or Virtual Disk 198 Decrypt an Encrypted Virtual Machine or Virtual Disk 200 Virtual Machine Power Management Options 201 Manage Power Management Settings for a Virtual Machine 201 Configuring VMware Tools Options 202 Configure the Virtual Machine Power States 202 Virtualization Based Security 204 Enable Virtualization-based Security on an Existing Virtual Machine 204 Enable Virtualization-based Security on the Guest Operating System 205 VMware, Inc. 6 vSphere Virtual Machine Administration Disable Virtualization-based Security 205 Identify VBS-Enabled Virtual Machines 206 Configuring Virtual Machine Boot Options 206 Enable or Disable UEFI Secure Boot for a Virtual Machine 206 Delay the Boot Sequence 208 Configuring Virtual Machine Advanced Options 208 Disable Virtual Machine Acceleration 209 Enable Virtual Machine Logging 209 Configure Virtual Machine Debugging and Statistics 210 Change the Swap File Location 210 Edit Configuration File Parameters 211 Configure Fibre Channel NPIV Settings 212 8 Managing Multi-Tiered Applications with vSphere vApp 214 Create a vApp 215 Perform vApp Power Operations 216 Create or Add an Object to a vApp 217 Clone a vApp 218 Edit vApp Notes 219 Configure vApp Properties 219 Configure vApp Properties in the vSphere Web Client 220 Edit vApp Settings 221 Configure vApp CPU and Memory Resources 222 View Unrecognized OVF Sections in the vSphere Web Client 223 Configure vApp IP Allocation Policy 224 Configure vApp Startup and Shutdown Options 225 Configure vApp Product Properties 226 View vApp License Agreements 226 Add a Network Protocol Profile 227 Associate a Port Group with a Network Protocol Profile in the vSphere Web Client 229 Assign a Port Group or Network to a Network Protocol Profile 230 Use a Network Protocol Profile to Allocate IP Addresses to a Virtual Machine or vApp 231 Virtual Machine vApp Options 232 Enable vApp Options for a Virtual Machine 233 Edit Application Properties and OVF Deployment Options for a Virtual Machine 233 OVF Authoring Options for a Virtual Machine 235 9 Monitoring Solutions with the vCenter Solutions Manager 241 View Solutions 241 vSphere ESX Agent Manager 242 Monitoring Agent Health Status
Recommended publications
  • Oracle VM Virtualbox User Manual
    Oracle VM VirtualBox R User Manual Version 5.1.20 c 2004-2017 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 11 1.1 Why is virtualization useful?............................. 12 1.2 Some terminology................................... 12 1.3 Features overview................................... 13 1.4 Supported host operating systems.......................... 15 1.5 Installing VirtualBox and extension packs...................... 16 1.6 Starting VirtualBox.................................. 17 1.7 Creating your first virtual machine......................... 18 1.8 Running your virtual machine............................ 21 1.8.1 Starting a new VM for the first time.................... 21 1.8.2 Capturing and releasing keyboard and mouse.............. 22 1.8.3 Typing special characters.......................... 23 1.8.4 Changing removable media......................... 24 1.8.5 Resizing the machine’s window...................... 24 1.8.6 Saving the state of the machine...................... 25 1.9 Using VM groups................................... 26 1.10 Snapshots....................................... 26 1.10.1 Taking, restoring and deleting snapshots................. 27 1.10.2 Snapshot contents.............................. 28 1.11 Virtual machine configuration............................ 29 1.12 Removing virtual machines.............................. 30 1.13 Cloning virtual machines............................... 30 1.14 Importing and exporting virtual machines..................... 31 1.15 Global Settings...................................
    [Show full text]
  • Vmware Vsphere the Leader in Virtualized Infrastructure and Your First Step to Application Modernization
    DATASHEET VMware vSphere The leader in virtualized infrastructure and your first step to application modernization AT A GLANCE Why VMware vSphere®? VMware vSphere® is the industry vSphere 7 is the biggest release of vSphere in over a decade. With the latest release, VMware W leading compute virtualization platform. E ® vSphereN vSp withher eVMware 7 wit hTanzu Tan™z enablesu millions of IT administrators across the globe to get started with Kubernetes workloads within an hour1. vSphere 7 has been rearchitected with Modernize the 70 million+ workloads running on vSphere native Kubernetes for application modernization. Developers can’t afford infrastructure that slows them down – I P A businesses rely on developers to rapidly s e Run tim e S e rvice s Infra stru cture S e rvice s t develop and deploy applications to e n Developer r Tanzu Kubernetes Grid Network Storage accelerate digital transformation. On the e vCenter b Service Service Service Server u other hand, IT teams are challenged to K deliver modern infrastructure that Intrinsic Security & Lifecycle Management supports modern container-based application development, including the IT Admin Compute Networking Storage services and tools to build new applications. Deliver Developer- Align Dev Ops and Simplify cloud FIGURE 1: VMware revSpheready infra withstru cTanzuture 2 IT Teams operations Using vSphere 7, customers and ® partners can now deliver a developer- vSphere 7 has beenConfid erearchitectedntial │ ©2020 VMware, Inc. with native Kubernetes to enable IT Admins to use vCenter Server11 ready infrastructure, scale without to operate Kubernetes clusters through namespaces. VMware vSphere with Tanzu allows IT Admins to operate with their existing skillset and deliver a self-service access to infrastructure for the Dev compromise and simplify operations.
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2018 KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St. Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Pasunuru, Srinath Reddy, "KVM Based Virtualization and Remote Management" (2018). Culminating Projects in Information Assurance. 53. https://repository.stcloudstate.edu/msia_etds/53 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. 1 KVM Based Virtualization and Remote Management by Srinath Reddy Pasunuru A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance May, 2018 Starred Paper Committee Susantha Herath, Chairperson Ezzat Kirmani Sneh Kalia 2 Abstract In the recent past, cloud computing is the most significant shifts and Kernel Virtual Machine (KVM) is the most commonly deployed hypervisor which are used in the IaaS layer of the cloud computing systems. The Hypervisor is the one which provides the complete virtualization environment which will intend to virtualize as much as hardware and systems which will include the CPUs, Memory, network interfaces and so on. Because of the virtualization technologies such as the KVM and others such as ESXi, there has been a significant decrease in the usage if the resources and decrease in the costs involved.
    [Show full text]
  • Performance Best Practices for Vmware Workstation Vmware Workstation 7.0
    Performance Best Practices for VMware Workstation VMware Workstation 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000294-00 Performance Best Practices for VMware Workstation You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] Copyright © 2007–2009 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 5 Terminology 5 Intended Audience 5 Document Feedback 5 Technical Support and Education Resources 5 Online and Telephone Support 5 Support Offerings 5 VMware Professional Services 6 1 Hardware for VMware Workstation 7 CPUs for VMware Workstation 7 Hyperthreading 7 Hardware-Assisted Virtualization 7 Hardware-Assisted CPU Virtualization (Intel VT-x and AMD AMD-V)
    [Show full text]
  • Survey on Virtualization with Xen Hypervisor
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 8, October - 2012 Survey On Virtualization With Xen Hypervisor Mr.Tejas P.Bhatt*1, Asst.Prof.Pinal.J.Patel#2 * C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India. # C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India Abstract In the cloud computing, there is one virtual machine that need them. For this reason, cloud computing has also can created and put it out on the physical machine with been described as "on-demand computing." The Internet providing the ideas using the hypervisors. So the is utilized as a vehicle but it is not the cloud. Google, Amazon, eBay, etc utilize cloud technologies to provide virtualization technology has limit security capabilities in services via the Internet. The cloud technologies are an order to secure wide area environment such as the cloud. operating technology built on a vast number of computers While consolidating physical to virtual machines using that provide a service [1]. Google as a best example of Xen hypervisor, we want to be able to deploy and manage cloud computing. What happens when you type and virtual machines in the same way we manage and deploy search something on Google? Have you ever thought physical machines. For operators and support people about this? Does your PC go through all that information, there should be no difference between virtual and sorts it out for you and display all the relevant results? IJERTNo, it doesn’t. Otherwise, you would wait much longer physical installations Therefore, the development of a for a simple results page to display.
    [Show full text]
  • Performance Analysis of Selected Hypervisors (Virtual Machine Monitors - Vmms) Waldemar Graniszewski, Adam Arciszewski
    INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2016, VOL. 62, NO. 3, PP. 231–236 Manuscript received August 12, 2016; revised September, 2016. DOI: 10.1515/eletel-2016-0031 Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs) Waldemar Graniszewski, Adam Arciszewski Abstract—Virtualization of operating systems and network results for CPU, NIC, kernel compilation time and storage infrastructure plays an important role in current IT projects. benchmarks’ tests are presented in Section IV. Finally, in With the number of services running on different hardware Section V, we draw some conclusions. resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their II. BACKGROUND AND RELATED WORK competitors. In this paper we evaluate performance of different In this section we present some general background for solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard virtualisation technology (in Subsection II-A) and a short benchmark tools to compare efficiency of main hardware com- review of related work (in Subsection II-B). ponents, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented. A. Background Keywords—virtualisation, virtualmachines, benchmark, per- As mentioned earlier, in Section I, cloud computing and formance, hypervisor, virtual machine monitor, vmm services provided by data centers require robust software for their operation. With data center server consolidation, the I. INTRODUCTION portability of each solution plays an important role. In the N recent years the most popular IT projects have been last decade both proprietary software like VMware ESXi, Mi- I based on cloud computing.
    [Show full text]
  • Information Guide for Managing Vmware Esxi : Vmware, Inc
    INFORMATION GUIDE Managing VMware ESXi VMWARE INFORMATION GUIDE Table of Contents Introduction ............................................................................................................ 3 Deployment ........................................................................................................... 3 Large-Scale Standardized Deployment ............................................................. 4 Interactive and Scripted Management ................................................................. 5 VI Client .............................................................................................................. 5 Remote Command Line Interfaces .................................................................... 6 File Management ............................................................................................... 7 Remote Command Line Interface and ESX 3 ..................................................... 8 Third-Party Management Applications ................................................................. 8 Common Information Model ............................................................................. 8 VI API .................................................................................................................. 8 SNMP .................................................................................................................. 9 System Image Design ............................................................................................. 10 Patching and Upgrading
    [Show full text]
  • A Comparison of Virtual Lab Solutions for Online Cyber Security Education
    Communications of the IIMA Volume 12 Issue 4 Article 6 2012 A Comparison of Virtual Lab Solutions for Online Cyber Security Education Joon Son California State University, San Bernardino Chinedum Irrechukwu University of Maryland University College Patrick Fitzgibbons University of Maryland University College Follow this and additional works at: https://scholarworks.lib.csusb.edu/ciima Recommended Citation Son, Joon; Irrechukwu, Chinedum; and Fitzgibbons, Patrick (2012) "A Comparison of Virtual Lab Solutions for Online Cyber Security Education ," Communications of the IIMA: Vol. 12 : Iss. 4 , Article 6. Available at: https://scholarworks.lib.csusb.edu/ciima/vol12/iss4/6 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Communications of the IIMA by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Virtual Lab for Online Cyber Security Education Son, Irrechukwu & Fitzgibbons Virtual Lab for Online Cyber Security Education Joon Son California State University, San Bernardino [email protected] Chinedum Irrechukwu University of Maryland University College (UMUC) [email protected] Patrick Fitzgibbons University of Maryland University College (UMUC) [email protected] ABSTRACT In this paper the authors describe their experience of designing a virtual lab architecture capable of providing hundreds of students with a hands on learning experience in support of an online educational setting. The authors discuss alternative approaches of designing a virtual lab and address the criteria in selecting the optimal deployment method. The authors conclude that virtualization offers a significant instructional advantage in delivering a cost effective and flexible hands on learning experience.
    [Show full text]
  • Virtualizationoverview
    VMWAREW H WHITEI T E PPAPERA P E R Virtualization Overview 1 VMWARE WHITE PAPER Table of Contents Introduction .............................................................................................................................................. 3 Virtualization in a Nutshell ................................................................................................................... 3 Virtualization Approaches .................................................................................................................... 4 Virtualization for Server Consolidation and Containment ........................................................... 7 How Virtualization Complements New-Generation Hardware .................................................. 8 Para-virtualization ................................................................................................................................... 8 VMware’s Virtualization Portfolio ........................................................................................................ 9 Glossary ..................................................................................................................................................... 10 2 VMWARE WHITE PAPER Virtualization Overview Introduction Virtualization in a Nutshell Among the leading business challenges confronting CIOs and Simply put, virtualization is an idea whose time has come. IT managers today are: cost-effective utilization of IT infrastruc- The term virtualization broadly describes the separation
    [Show full text]
  • Vcenter Server and Host Management
    vCenter Server and Host Management 02 APR 2020 Modified on 13 AUG 2020 VMware vSphere 7.0 VMware ESXi 7.0 vCenter Server 7.0 vCenter Server and Host Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About VMware vCenter Server and Host Management 9 Updated Information 10 1 vSphere Concepts and Features 11 Virtualization Basics 11 Physical Topology of vSphere Data Center 12 vSphere Software Components 13 Client Interfaces for vSphere 16 vSphere Managed Inventory Objects 16 Optional vCenter Server Components 18 vCenter Server Plug-Ins 19 2 Using the vSphere Client 21 Log In to vCenter Server by Using the vSphere Client 22 Use the vSphere Client Navigator 23 Manage Client Plug-Ins 23 Monitor Client Plugins 24 Install the VMware Enhanced Authentication Plug-in 24 Refresh Data 25 Searching the Inventory 25 Perform a Quick Search 26 Save, Run, Rename, and Delete a Search 26 Sort the vSphere Client Inventory 27 Drag Objects 28 Export Lists 28 Attach File to Service Request 29 Keyboard Shortcuts 29 Inventory Keyboard Shortcuts 29 Provide Feedback with the vSphere Client 30 Start, Stop, and Restart Services 30 3 Using Enhanced Linked Mode 32 4 Configuring Hosts in vCenter Server 33 Host Configuration 33 Configure the Boot Device on an ESXi Host 33 Configure Agent VM Settings 34 VMware, Inc. 3 vCenter
    [Show full text]