Vsphere Virtual Machine Administration Vmware Vsphere 6.5 Vmware Esxi 6.5 Vcenter Server 6.5

Total Page:16

File Type:pdf, Size:1020Kb

Vsphere Virtual Machine Administration Vmware Vsphere 6.5 Vmware Esxi 6.5 Vcenter Server 6.5 vSphere Virtual Machine Administration VMware vSphere 6.5 VMware ESXi 6.5 vCenter Server 6.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-002356-03 vSphere Virtual Machine Administration You can ®nd the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: docfeedback@vmware.com Copyright © 2009–2017 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About vSphere Virtual Machine Administration 7 Updated Information 9 1 Introduction to VMware vSphere Virtual Machines 11 What Is a Virtual Machine? 11 Virtual Machines and the Virtual Infrastructure 12 Virtual Machine Lifecycle 13 Virtual Machine Components 13 Virtual Machine Hardware Available to vSphere Virtual Machines 13 Virtual Machine Options and Resources 15 vSphere Web Client 16 vSphere Client 17 Where to Go From Here 17 2 Deploying Virtual Machines 19 About Provisioning Virtual Machines 19 Create a Virtual Machine Without a Template or Clone 20 Deploy a Virtual Machine from a Template 26 Clone a Virtual Machine 32 Clone a Virtual Machine to a Template in the vSphere Web Client 38 Clone a Template to a Template in the vSphere Web Client 42 Convert a Template to a Virtual Machine 45 Customizing Guest Operating Systems 47 3 Deploying OVF and OVA Templates 63 OVF and OVA File Formats and Templates 63 Deploy an OVF or OVA Template in the vSphere Web Client 64 Browse VMware Virtual Appliance Marketplace 67 Export an OVF Template 68 4 Using Content Libraries 69 Create a Library 71 Synchronize a Subscribed Library 72 Edit the Settings of a Local Library 73 Edit the Settings of a Subscribed Library 74 Delete a Content Library 74 Hierarchical Inheritance of Permissions for Content Libraries 75 Sample User Role for Working with Content Libraries 77 Populating Libraries with Content 77 Working with Items in a Library 81 VMware, Inc. 3 vSphere Virtual Machine Administration Creating Virtual Machines and vApps from Templates in a Content Library 84 5 Configuring Virtual Machine Hardware 87 Virtual Machine Compatibility 87 Virtual CPU Configuration 93 Virtual Memory Configuration 99 Network Virtual Machine Configuration 102 Parallel and Serial Port Configuration 106 Virtual Disk Configuration 113 SCSI and SATA Storage Controller Conditions, Limitations, and Compatibility 123 Other Virtual Machine Device Configuration 128 Reduce Memory Overhead for Virtual machines with 3D graphics Option 139 USB Configuration from an ESXi Host to a Virtual Machine 139 USB Configuration from a Client Computer to a Virtual Machine 146 Add a Shared Smart Card Reader to Virtual Machines 152 6 Configuring Virtual Machine Options 153 Virtual Machine Option Overview 153 Change the Virtual Machine Name 154 View the Virtual Machine Configuration and Working File Location 155 Change the Configured Guest Operating System 155 Configuring User Mappings on Guest Operating Systems 155 Change the Virtual Machine Console Options for Remote Users 157 Configure the Virtual Machine Power States 157 Manage Power Management Settings for a Virtual Machine 158 Enable or Disable UEFI Secure Boot for a Virtual Machine 159 Delay the Boot Sequence 160 Disable Virtual Machine Acceleration 161 Enable Virtual Machine Logging 161 Configure Virtual Machine Debugging and Statistics 161 Change the Swap File Location 162 Edit Configuration File Parameters 162 Configure Fibre Channel NPIV Settings 163 7 Managing Multi-Tiered Applications with vSphere vApp 165 Create a vApp 165 Create a Virtual Machine, Resource Pool, or Child vApp Inside a vApp 167 Add Virtual Machine or Child vApp to a vApp 167 Edit vApp Settings 167 Clone a vApp 172 Perform vApp Power Operations 173 Edit vApp Notes 174 Add a Network Protocol Profile 174 Virtual Machine vApp Options 178 8 Monitoring Solutions with the vCenter Solutions Manager 183 Viewing Solutions 183 Monitoring Agents 184 4 VMware, Inc. Contents 9 Managing Virtual Machines 185 Edit Virtual Machine Startup and Shutdown Settings 185 Install the VMware Enhanced Authentication Plug-in 187 Using a Virtual Machine Remote Console 187 Open the HTML 5 Remote Console 188 Install the VMware Remote Console Application 188 Using the VMware Remote Console Application 188 Answer Virtual Machine Questions 189 Adding and Removing Virtual Machines 189 Change the Template Name 191 Deleting Templates 191 Using Snapshots To Manage Virtual Machines 192 10 Upgrading Virtual Machines 203 Planning Downtime for Virtual Machines 204 Downtime for Upgrading Virtual Machines 204 Upgrade the Compatibility for Virtual Machines 205 Schedule a Compatibility Upgrade for Virtual Machines 206 11 Required Privileges for Common Tasks 207 Index 211 VMware, Inc. 5 vSphere Virtual Machine Administration 6 VMware, Inc. About vSphere Virtual Machine Administration vSphere Virtual Machine Administration describes how to create, configure, and manage virtual machines in the VMware vSphere® environment. In addition, this information provides introductions to the tasks that you can do within the system as well as cross-references to the information that describes the tasks. This information focuses on managing virtual machines in the VMware vSphere Web Client and includes the following information. n Creating and deploying virtual machines, templates, and clones n Deploying OVF templates n Configuring virtual machine hardware and options n Managing multitiered applications with VMware vSphere vApp n Monitoring solutions with the vCenter Solution Manager n Managing virtual machines, including using snapshots n Upgrading virtual machines vSphere Virtual Machine Administration covers VMware ESXi™ and VMware vCenter Server®. Intended Audience This information is written for experienced Windows or Linux system administrators who are familiar with virtualization. VMware, Inc. 7 vSphere Virtual Machine Administration 8 VMware, Inc. Updated Information This Updated Information is updated with each release of the product or when necessary. This table provides the update history of the vSphere Virtual Machine Administration. Revision Description EN-002356-03 n Updated NVMe Controller workflow “Add an NVMe Controller,” on page 126. n Updated prerequisites for adding a PCI device “Add a PCI Device in the vSphere Web Client,” on page 135 . EN-002356-02 n Removed references to VM-FEX in “Change the Virtual Machine Network Adapter Configuration,” on page 103 and “Add a Network Adapter to a Virtual Machine,” on page 104. EN-002356-01 n Added language to topic and subtopics to indicate that OVF processes also apply to OVA files “OVF and OVA File Formats and Templates,” on page 63. n The following limitation is no longer correct and has been removed from the “Large Capacity Virtual Disk Conditions and Limitations,” on page 114 topic: You cannot hot-extend virtual SATA disks, or any virtual disk if the capacity after extension is equal to or greater than 2TB. n Added reference to video in Chapter 3, “Deploying OVF and OVA Templates,” on page 63. n Added information about security certificates to “Export an OVF Template,” on page 68 and “Export Item from a Content Library to Your Local Computer,” on page 82. EN-002356-00 Initial release. VMware, Inc. 9 vSphere Virtual Machine Administration 10 VMware, Inc. Introduction to VMware vSphere Virtual Machines 1 Before you start creating and managing virtual machines, you benefit from some background information, for example, the virtual machine lifecycle, components, and VMware Tools. This chapter includes the following topics: n “What Is a Virtual Machine?,” on page 11 n “Virtual Machines and the Virtual Infrastructure,” on page 12 n “Virtual Machine Lifecycle,” on page 13 n “Virtual Machine Components,” on page 13 n “Virtual Machine Hardware Available to vSphere Virtual Machines,” on page 13 n “Virtual Machine Options and Resources,” on page 15 n “vSphere Web Client,” on page 16 n “vSphere Client,” on page 17 n “Where to Go From Here,” on page 17 What Is a Virtual Machine? A virtual machine is a software computer that, like a physical computer, runs an operating system and applications. The virtual machine consists of a set of specification and configuration files and is backed by the physical resources of a host. Every virtual machine has virtual devices that provide the same functionality as physical hardware are more portable, more secure, and easier to manage. A virtual machine consists of several files that are stored on a storage device. The key files are the configuration file, virtual disk file, NVRAM setting file, and log file. You configure virtual machine settings through the vSphere Web Client, one of the vSphere command-line interfaces (PowerCLI, vCLI) or the vSphere Web Services SDK. Caution Do not change, move, or delete virtual machine files without instructions from a VMware Technical Support representative. Table 1‑1. Virtual Machine Files File Usage Description .vmx vmname.vmx Virtual machine configuration file .vmxf vmname.vmxf Additional virtual machine configuration files .vmdk vmname.vmdk Virtual disk characteristics -flat.vmdk vmname-flat.vmdk Virtual machine data disk VMware, Inc. 11 vSphere Virtual Machine Administration
Recommended publications
  • Vmware Vsphere the Leader in Virtualized Infrastructure and Your First Step to Application Modernization
    DATASHEET VMware vSphere The leader in virtualized infrastructure and your first step to application modernization AT A GLANCE Why VMware vSphere®? VMware vSphere® is the industry vSphere 7 is the biggest release of vSphere in over a decade. With the latest release, VMware W leading compute virtualization platform. E ® vSphereN vSp withher eVMware 7 wit hTanzu Tan™z enablesu millions of IT administrators across the globe to get started with Kubernetes workloads within an hour1. vSphere 7 has been rearchitected with Modernize the 70 million+ workloads running on vSphere native Kubernetes for application modernization. Developers can’t afford infrastructure that slows them down – I P A businesses rely on developers to rapidly s e Run tim e S e rvice s Infra stru cture S e rvice s t develop and deploy applications to e n Developer r Tanzu Kubernetes Grid Network Storage accelerate digital transformation. On the e vCenter b Service Service Service Server u other hand, IT teams are challenged to K deliver modern infrastructure that Intrinsic Security & Lifecycle Management supports modern container-based application development, including the IT Admin Compute Networking Storage services and tools to build new applications. Deliver Developer- Align Dev Ops and Simplify cloud FIGURE 1: VMware revSpheready infra withstru cTanzuture 2 IT Teams operations Using vSphere 7, customers and ® partners can now deliver a developer- vSphere 7 has beenConfid erearchitectedntial │ ©2020 VMware, Inc. with native Kubernetes to enable IT Admins to use vCenter Server11 ready infrastructure, scale without to operate Kubernetes clusters through namespaces. VMware vSphere with Tanzu allows IT Admins to operate with their existing skillset and deliver a self-service access to infrastructure for the Dev compromise and simplify operations.
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2018 KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St. Cloud State University, spasunuru@stcloudstate.edu Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Pasunuru, Srinath Reddy, "KVM Based Virtualization and Remote Management" (2018). Culminating Projects in Information Assurance. 53. https://repository.stcloudstate.edu/msia_etds/53 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact rswexelbaum@stcloudstate.edu. 1 KVM Based Virtualization and Remote Management by Srinath Reddy Pasunuru A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance May, 2018 Starred Paper Committee Susantha Herath, Chairperson Ezzat Kirmani Sneh Kalia 2 Abstract In the recent past, cloud computing is the most significant shifts and Kernel Virtual Machine (KVM) is the most commonly deployed hypervisor which are used in the IaaS layer of the cloud computing systems. The Hypervisor is the one which provides the complete virtualization environment which will intend to virtualize as much as hardware and systems which will include the CPUs, Memory, network interfaces and so on. Because of the virtualization technologies such as the KVM and others such as ESXi, there has been a significant decrease in the usage if the resources and decrease in the costs involved.
    [Show full text]
  • Performance Best Practices for Vmware Workstation Vmware Workstation 7.0
    Performance Best Practices for VMware Workstation VMware Workstation 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000294-00 Performance Best Practices for VMware Workstation You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: docfeedback@vmware.com Copyright © 2007–2009 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 5 Terminology 5 Intended Audience 5 Document Feedback 5 Technical Support and Education Resources 5 Online and Telephone Support 5 Support Offerings 5 VMware Professional Services 6 1 Hardware for VMware Workstation 7 CPUs for VMware Workstation 7 Hyperthreading 7 Hardware-Assisted Virtualization 7 Hardware-Assisted CPU Virtualization (Intel VT-x and AMD AMD-V)
    [Show full text]
  • Survey on Virtualization with Xen Hypervisor
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 8, October - 2012 Survey On Virtualization With Xen Hypervisor Mr.Tejas P.Bhatt*1, Asst.Prof.Pinal.J.Patel#2 * C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India. # C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India Abstract In the cloud computing, there is one virtual machine that need them. For this reason, cloud computing has also can created and put it out on the physical machine with been described as "on-demand computing." The Internet providing the ideas using the hypervisors. So the is utilized as a vehicle but it is not the cloud. Google, Amazon, eBay, etc utilize cloud technologies to provide virtualization technology has limit security capabilities in services via the Internet. The cloud technologies are an order to secure wide area environment such as the cloud. operating technology built on a vast number of computers While consolidating physical to virtual machines using that provide a service [1]. Google as a best example of Xen hypervisor, we want to be able to deploy and manage cloud computing. What happens when you type and virtual machines in the same way we manage and deploy search something on Google? Have you ever thought physical machines. For operators and support people about this? Does your PC go through all that information, there should be no difference between virtual and sorts it out for you and display all the relevant results? IJERTNo, it doesn’t. Otherwise, you would wait much longer physical installations Therefore, the development of a for a simple results page to display.
    [Show full text]
  • Performance Analysis of Selected Hypervisors (Virtual Machine Monitors - Vmms) Waldemar Graniszewski, Adam Arciszewski
    INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2016, VOL. 62, NO. 3, PP. 231–236 Manuscript received August 12, 2016; revised September, 2016. DOI: 10.1515/eletel-2016-0031 Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs) Waldemar Graniszewski, Adam Arciszewski Abstract—Virtualization of operating systems and network results for CPU, NIC, kernel compilation time and storage infrastructure plays an important role in current IT projects. benchmarks’ tests are presented in Section IV. Finally, in With the number of services running on different hardware Section V, we draw some conclusions. resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their II. BACKGROUND AND RELATED WORK competitors. In this paper we evaluate performance of different In this section we present some general background for solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard virtualisation technology (in Subsection II-A) and a short benchmark tools to compare efficiency of main hardware com- review of related work (in Subsection II-B). ponents, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented. A. Background Keywords—virtualisation, virtualmachines, benchmark, per- As mentioned earlier, in Section I, cloud computing and formance, hypervisor, virtual machine monitor, vmm services provided by data centers require robust software for their operation. With data center server consolidation, the I. INTRODUCTION portability of each solution plays an important role. In the N recent years the most popular IT projects have been last decade both proprietary software like VMware ESXi, Mi- I based on cloud computing.
    [Show full text]
  • Information Guide for Managing Vmware Esxi : Vmware, Inc
    INFORMATION GUIDE Managing VMware ESXi VMWARE INFORMATION GUIDE Table of Contents Introduction ............................................................................................................ 3 Deployment ........................................................................................................... 3 Large-Scale Standardized Deployment ............................................................. 4 Interactive and Scripted Management ................................................................. 5 VI Client .............................................................................................................. 5 Remote Command Line Interfaces .................................................................... 6 File Management ............................................................................................... 7 Remote Command Line Interface and ESX 3 ..................................................... 8 Third-Party Management Applications ................................................................. 8 Common Information Model ............................................................................. 8 VI API .................................................................................................................. 8 SNMP .................................................................................................................. 9 System Image Design ............................................................................................. 10 Patching and Upgrading
    [Show full text]
  • A Comparison of Virtual Lab Solutions for Online Cyber Security Education
    Communications of the IIMA Volume 12 Issue 4 Article 6 2012 A Comparison of Virtual Lab Solutions for Online Cyber Security Education Joon Son California State University, San Bernardino Chinedum Irrechukwu University of Maryland University College Patrick Fitzgibbons University of Maryland University College Follow this and additional works at: https://scholarworks.lib.csusb.edu/ciima Recommended Citation Son, Joon; Irrechukwu, Chinedum; and Fitzgibbons, Patrick (2012) "A Comparison of Virtual Lab Solutions for Online Cyber Security Education ," Communications of the IIMA: Vol. 12 : Iss. 4 , Article 6. Available at: https://scholarworks.lib.csusb.edu/ciima/vol12/iss4/6 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Communications of the IIMA by an authorized editor of CSUSB ScholarWorks. For more information, please contact scholarworks@csusb.edu. Virtual Lab for Online Cyber Security Education Son, Irrechukwu & Fitzgibbons Virtual Lab for Online Cyber Security Education Joon Son California State University, San Bernardino json@csusb.edu Chinedum Irrechukwu University of Maryland University College (UMUC) cirrechukwu@umuc.edu Patrick Fitzgibbons University of Maryland University College (UMUC) Patrick.fitzgibbons@umuc.edu ABSTRACT In this paper the authors describe their experience of designing a virtual lab architecture capable of providing hundreds of students with a hands on learning experience in support of an online educational setting. The authors discuss alternative approaches of designing a virtual lab and address the criteria in selecting the optimal deployment method. The authors conclude that virtualization offers a significant instructional advantage in delivering a cost effective and flexible hands on learning experience.
    [Show full text]
  • Virtualizationoverview
    VMWAREW H WHITEI T E PPAPERA P E R Virtualization Overview 1 VMWARE WHITE PAPER Table of Contents Introduction .............................................................................................................................................. 3 Virtualization in a Nutshell ................................................................................................................... 3 Virtualization Approaches .................................................................................................................... 4 Virtualization for Server Consolidation and Containment ........................................................... 7 How Virtualization Complements New-Generation Hardware .................................................. 8 Para-virtualization ................................................................................................................................... 8 VMware’s Virtualization Portfolio ........................................................................................................ 9 Glossary ..................................................................................................................................................... 10 2 VMWARE WHITE PAPER Virtualization Overview Introduction Virtualization in a Nutshell Among the leading business challenges confronting CIOs and Simply put, virtualization is an idea whose time has come. IT managers today are: cost-effective utilization of IT infrastruc- The term virtualization broadly describes the separation
    [Show full text]
  • Vcenter Server and Host Management
    vCenter Server and Host Management 02 APR 2020 Modified on 13 AUG 2020 VMware vSphere 7.0 VMware ESXi 7.0 vCenter Server 7.0 vCenter Server and Host Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About VMware vCenter Server and Host Management 9 Updated Information 10 1 vSphere Concepts and Features 11 Virtualization Basics 11 Physical Topology of vSphere Data Center 12 vSphere Software Components 13 Client Interfaces for vSphere 16 vSphere Managed Inventory Objects 16 Optional vCenter Server Components 18 vCenter Server Plug-Ins 19 2 Using the vSphere Client 21 Log In to vCenter Server by Using the vSphere Client 22 Use the vSphere Client Navigator 23 Manage Client Plug-Ins 23 Monitor Client Plugins 24 Install the VMware Enhanced Authentication Plug-in 24 Refresh Data 25 Searching the Inventory 25 Perform a Quick Search 26 Save, Run, Rename, and Delete a Search 26 Sort the vSphere Client Inventory 27 Drag Objects 28 Export Lists 28 Attach File to Service Request 29 Keyboard Shortcuts 29 Inventory Keyboard Shortcuts 29 Provide Feedback with the vSphere Client 30 Start, Stop, and Restart Services 30 3 Using Enhanced Linked Mode 32 4 Configuring Hosts in vCenter Server 33 Host Configuration 33 Configure the Boot Device on an ESXi Host 33 Configure Agent VM Settings 34 VMware, Inc. 3 vCenter
    [Show full text]
  • Mos - Virtualization
    MOS - VIRTUALIZATION Tobias Stumpf, Marcus H¨ahnel WS 2017/18 Goals Give you an overview about: • virtualization and virtual machines in general, • hardware virtualization on x86, • our research regarding virtualization. We will not discuss: • lots and lots of details, • language runtimes, • how to use XEN/KVM/. MOS - Virtualization slide 3 What is Virtualization? Outline What is Virtualization? Very Short History Virtualization on x86 Example: L4Linux Example: NOVA Example: Karma VMM MOS - Virtualization slide 4 What is Virtualization? Starting Point You want to write a new operating system that is • secure, • trustworthy, • small, • fast, • fancy. but . MOS - Virtualization slide 5 What is Virtualization? Commodity Applications Users expect to run all the software they are used to (\legacy"): • browsers, • Word, • iTunes, • certified business applications, • new (Windows/DirectX) and ancient (DOS) games. Porting or rewriting all is infeasible! MOS - Virtualization slide 6 What is Virtualization? One Solution: Virtualization \By virtualizing a commodity OS [...] we gain support for legacy applications, and devices we don't want to write drivers for." \All this allows the research community to finally escape the straitjacket of POSIX or Windows compatibility [...]" Roscoe:2007:HV:1361397.1361401 MOS - Virtualization slide 7 What is Virtualization? Virtualization virtual existing in essence or effect though not in actual fact http://wordnetweb.princeton.edu \All problems in computer science can be solved by another level of indirection." David Wheeler MOS - Virtualization slide 8 What is Virtualization? Emulation Suppose you develop for a system G (guest, e.g. an ARM-based phone) on your workstation H (host, e.g., an x86 PC). An emulator for G running on H precisely emulates G's • CPU, • memory subsystem, and • I/O devices.
    [Show full text]
  • Draft NISTIR 8221
    Withdrawn Draft Warning Notice The attached draft document has been withdrawn, and is provided solely for historical purposes. It has been superseded by the document identified below. Withdrawal Date June 5, 2019 Original Release Date September 21, 2018 Superseding Document Status Final Series/Number NISTIR 8221 Title A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data Publication Date June 2019 DOI https://doi.org/10.6028/NIST.IR.8221 CSRC URL https://csrc.nist.gov/publications/detail/nistir/8221/final Additional Information 1 Draft NISTIR 8221 2 3 A Methodology for Determining 4 Forensic Data Requirements for 5 Detecting Hypervisor Attacks 6 7 8 Ramaswamy Chandramouli 9 Anoop Singhal 10 Duminda Wijesekera 11 Changwei Liu 12 13 14 Draft NISTIR 8221 15 16 A Methodology for Determining 17 Forensic Data Requirements for 18 Detecting Hypervisor Attacks 19 20 Ramaswamy Chandramouli 21 Anoop Singhal 22 Duminda Wijesekera 23 Changwei Liu 24 Computer Security Division 25 Information Technology Laboratory 26 27 28 29 30 31 32 33 34 35 36 September 2018 37 38 39 40 41 U.S. Department of Commerce 42 Wilbur L. Ross, Jr., Secretary 43 44 National Institute of Standards and Technology 45 Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology 46 47 National Institute of Standards and Technology Internal Report 8221 48 27 pages (September 2018) 49 50 51 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 52 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 53 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 54 available for the purpose.
    [Show full text]