Explore information related to vmware

KVM hypervisor How it Works

This article will guide you on how the KVM #hypervisor works. Basically, KVM is a type-2 hypervisor (installed on top of another OS, in this case some flavor of #Linux). 

It runs, however, like a type-1 hypervisor and can provide the power and functionality of even the most complex and powerful type-1 hypervisors, depending on the tools that are used with the KVM package itself.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V).

Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images.

1. The main difference between Type 1 vs. Type 2 hypervisors is that Type 1 runs on bare metal and Type 2 runs on top of an operating system. 

2. Each hypervisor type also has its own pros and cons and specific use cases.

3. Xen is better than #KVM in terms of virtual storage support, high availability, enhanced security, virtual network support, power management, fault tolerance, real-time support, and virtual CPU scalability.

4. A Type 1 hypervisor takes the place of the host operating system. 

5. Type 1 hypervisors are highly efficient because they have direct access to physical hardware. 

6. This also increases their security, because there is nothing in between them and the CPU that an attacker could compromise.

Read More



OnApp Cloud

This article will guide you on OnApp cloud. You will also learn about its dashboard and features. 

OnApp Enterprise is a complete on-premises cloud solution for SMBs and enterprises. 

It makes private and hybrid cloud easier to manage and easier to scale. 

OnApp clouds can be created on almost any commodity x64 infrastructure, and across heterogeneous compute and storage hardware.


The features of OnApp cloud comprise of:

1. Public, private & hybrid cloud, plus VPS

2. Xen, KVM & VMware, plus Amazon EC2

3. Storage, backup and disaster recovery

4. Smart servers & bare metal servers

5. Global cloud & CDN through OnApp federation

6. CPU, disk, IOPS,RAM, servers, networks & more


OnApp is used:

i. By Telcos, MSPs and other service providers to create, manage and sell their own IaaS cloud products - either using their own datacenter infrastructure, third party infrastructure or hyperscale infrastructure.

ii. OnApp is used by hosts, telcos, MSPs, CDN vendors and other service providers to sell public/private/hybrid cloud services; and by enterprises for on-premise private & hybrid public/private cloud.

Read More



Reset Windows Administrator Password from Hyper-V

This article will guide you on steps to reset the forgotten #Windows Administrator password from Hyper-V using an #ISO file.

Microsoft's Hyper-V virtualization can greatly reduce cost of operations. By purchasing a few very powerful #servers you can virtualize all or most of your entire infrastructure while reducing the cost of #hardware and maintenance.

To Reset Lost Admin Password for Hyper-V Virtual #Machine:

1. Select the administrator account, then click the Reset Password button to reset the password to blank. 

2. Click the Restart button to reboot the virtual machine, you are able to log in to the administrator account with a blank password.

Read More



Steps to Deploy Virtual Machines in RHEV Environment

This article will guide you on how to #deploy #virtual #machines in the #RHEV environment and also on #Linux and #Windows virtual machines.

A Virtual Machine (#VM) is a compute resource that uses software instead of a physical computer to run programs and deploy apps. One or more virtual "guest" #machines run on a physical "host" machine.

The main purpose of VMs is to operate multiple operating systems at the same time, from the same piece of hardware. Without virtualization, operating multiple systems — like Windows and Linux — would require two separate physical units.

The two basic types of virtual machines are process and system VMs:

1. A process virtual machine allows you to run a single process as an application on a host machine. 

2. A system virtual machine is a fully virtualized #VM designed to be a substitute for a physical machine.

Your virtual machine internet connection goes through your computer and through your router. So they can track your router's #IP address, and possibly track you down at least to your city, if not to individual street or house.

Read More



Standard and Production Checkpoints in Hyper-V

This article will guide on how to choose between #Standard or #production #checkpoints in Hyper-V. We also look into the various aspects of standard and production checkpoints.

Hyper-V checkpoints allow IT #administrators to easily save the existing state of a virtual machine before any changes are made so that if a problem crops up due to the changes, the VM can revert to its previous state. A #snapshot of the virtual machine #memory state is not taken when using a production checkpoint.

To Change checkpoints to production or standard checkpoints:

1. In Hyper-V Manager, right-click the virtual machine and click Settings. 

2. Under the Management section, select Checkpoints. 

3. Select either production checkpoints or standard checkpoints.

Read More



Guide to install Red Hat Enterprise Linux 7 3

This article will guide you on the step by step process to install Red Hat Enterprise Linux 7.3. This involves completing the “Installation Summary” window along with the installation of #VMware #Workstation and creation of a virtual machine.

Red Hat® Enterprise Linux® is the world's leading enterprise #Linux platform. * It's an open source operating system (#OS). It's the foundation from which you can scale existing apps—and roll out emerging technologies—across bare-metal, virtual, container, and all types of cloud environments.

Read More



Monitoring VMware with Nagios XI

This article will guide you on the steps to Monitor VMware with #Nagios.
To Monitor the VMware host
i. Enter the Address, Username and Password of your #ESX / #ESXi host.
ii. Select Monitor the #VMware #Host.
iii. Click Next to go to Step 2.
iv. On step 2 you will configure all of the options for #monitoring.

Read More



Selecting the number of vCPUs and Cores for a Virtual Machine

This articles will guide you when selecting the number of vCPUs and Cores for a Virtual Machine which depends on the operating system used and some other factors.

Basically, When Selecting the Number of #vCPUs and #Cores for a Virtual Machine, you can use all CPU #resources allocated to a virtual machine, it must see one 8 core #processor, 2 vCPUs with 4 cores each or 1 vCPU with 4 cores in two threads instead of 8 vCPUs.

Read More



Detecting Memory Overcommit in the Guest OS

This article will guide you on how to go about detecting Memory Overcommit in the Guest #OS.

#Memory overcommit is a #hypervisor feature that allows us to allocate to virtual #machines more memory than is available on a physical #host.

Read More



Install and Configure Free VMware Hypervisor

This article will guide you on the process to Configure Free VMware Hypervisor, to create a virtual #machine, and install a guest operating system.

“VMware vSphere Hypervisor #VMware #vSphere #Hypervisor is a free product that provides a simple and easy way to get started with #virtualization at no cost.

Read More



Invalid State of a Virtual Machine on VMWare ESXi

This article will guide you on the steps to resolve the Invalid State of a Virtual Machine on VMWare #ESXi error which relates to #orphaned virtual machines.

A virtual machine can show up as invalid or orphaned in these situations. After a vMotion or #VMware DRS migration. After a VMware HA #host failure occurs, or after the #ESX host comes out of maintenance mode. A virtual machine is deleted outside of vCenter Server. #vCenter Server is restarted while a migration is in progress.

Read More



VMWare vCenter Self-Signed Certificate Warning

This article will guide you on the steps to remove VMWare vCenter Self-Signed Certificate Warning.

Read More



VMWare how to find VMS by IP or MAC address

This tutorial will guide you on how to easily find VMS by IP or mac address.

Read More



Steps to kill an unresponsive Virtual Machine

This article will guide you through the steps to kill an unresponsive Virtual Machine in VMWare ESXi.

Read More



Set up SNMP VMWare ESXi 5 5

This article will guide you on the steps to follow to configure SNMP VMWare ESXi 5.5.

Read More



vCenter installation on ESXi Host

This article will guide you on how to install vCenter Server on a physical server or a virtual machine running Windows.

Read More



Vmware virtual machine disks consolidation is needed error

This guide will help you to fix the warning error experienced in the process of deleting a snapshot, the snapshot VMDK files or logs have not been deleted correctly.

Read More



Tips to fix unable to unmount delete VMFS Datastore the resource is in use

This guide will help to fix VMWare error "unable to unmount/delete vmfs datastore: the resource is in use" which occurs when trying to remove an empty VMFS Datastore in VMWare vSphere.

Read More



Vmware operation failed to upload to datastore

This guide will help you to fix errors ecountered while trying to upload or copy files to the VMFS Datastore in VMware vSphere (6.7) using the “Upload Files” button in the vSphere Client interface.

Read More



Solution to error VMWare virtual machine disks consolidation is needed

This article will help you to fix the warning error "VMWare: virtual machine disks consolidation is needed" experienced when trying to delete a snapshot, the snapshot VMDK files or logs have not been deleted correctly.

Read More



Fix Unable to access file since it is locked error on vmware

This article will guide you through the steps you need to take to fix the VMWare "Unable to access a file since it is locked" error by restarting the Management Agent or ESXi host.

Read More



Fix no such device error when using ethtool

Ethtool is a great utility for Linux kernel-based operating system which helps to display and modify some important parameters of network interface controllers and their device drivers.

Read More