Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Mike Preston
  • Mike Preston
  • March 29, 2018

Using the Microsoft Certificate Authority to get rid of those self-signed certs

Most every application we run in our datacenters today provides some sort of web-based interface.  The push to move to HTML5, API driven GUIs is a good one – we can access things from anywhere, using any device or browser.  The problem being we are also seeing a push for security, more specifically ensuring that all our web accessible interfaces are running through SSL and only accessed through https. To get around this administrators can go out and purchase a certificate from a trusted authority, however this could get pretty expensive if you start adding up all of the self-signed certificates within your environment.  Another answer – the Microsoft Certificate Server.

Read more
Romain Serre
  • Romain Serre
  • March 28, 2018

Configure Live Migration in Hyper-V clusters

In part of my job, I audit some Hyper-V clusters to remediate issues such as Live Migration. Most of the time, Live Migration part is not well configured. For example, the wrong network is selected or authentication is left to CredSSP. In this topic, I’ll show you how I configure Live Migration in Hyper-V clusters (S2D or not).

Read more
Mikhail Rodionov
  • Mikhail Rodionov
  • March 27, 2018

SQL AlwaysOn

I guess once you will read through this article you will also notice how this technology is shaped out of familiar building blocks, but what I also hope for is that you will get a grasp of what is AlwaysOn, and get a basic understanding of how it works. I will fully cover installation and configuration of SQL Server AlwaysOn environment (using new and shiny SQL Server 2017) in my next article while focusing on technology overview here.

Read more
Dmitriy Dolgiy
  • Dmitriy Dolgiy
  • March 23, 2018

The idea Behind Node Fairness in Hyper-V: How it works and why you need it?

How does it work?

Being triggered, the Node Fairness service determines the current workload on the cluster hosts. If needed, it automatically migrates VMs to the less loaded host.

After the start, the cluster service checks the host for two factors:

  • If the average host CPU load exceeds the tolerated threshold
  • If the average host memory utilization is higher than the tolerated threshold

In case either of these criteria is met, the VM gets live migrated to the less loaded host. Neither guest system nor services do experience any downtime.

Read more
Kevin Soltow
  • Kevin Soltow
  • March 23, 2018

Looking for the most affordable cloud storage? AWS vs Azure vs Backblaze B2

What was a privilege of enterprises just a few years ago, now becomes a common thing for companies of all sizes – I’m talking about cloud. The number of cloud storage providers grows, delivering various solutions that fit the needs of different organizations in terms of features and prices. Moreover, the competition in the cloud market is getting tougher, making cloud storage providers cut their prices just to stay afloat. Therefore, cloud becomes a really great alternative to purchasing more physical storage or compute resources to maintain data and applications. However, despite there is a wide range of cloud offerings, we still struggle with choosing a cloud provider that offers us storage we need without charging us a steep price in the end of the billing period. So today, we’ll have a closer look at some public cloud providers to decide on the cheapest storage.

Read more
Alex Samoylenko
  • Alex Samoylenko
  • March 22, 2018

Generating a Support Bundle: How to Retrieve Virtual Infrastructure Logs from VMware vCenter and ESXi Servers

One day, any VMware administrator may require the so-called “support bundle” which contains log-files, diagnostic information, and performance metrics. Taken together, these parameters allow troubleshooting VMware vSphere. The bundle provides VMware GSS (Global Support Services) the insight into virtualized environment configuration which allows them to resolve issues, when a client submits a support ticket with this bundle attached.

Read more
Nicolas Prigent
  • Nicolas Prigent
  • March 21, 2018

How to DevOps with Azure?

In this article, I will not explain what is and what is not DevOps. I just want to describe how to implement a DevOps Project in your Azure subscription through the new service called “DevOps Projects”. This new service has been released in November 2017. The “DevOps Projects” service allows you to deploy and monitor your application in Azure. Visual Studio Team Services and Team Foundation Services are Microsoft’s DevOps solutions for Azure. I’m not a VS or TFS expert, but as you will see, implementing DevOps with Azure is very straightforward. Microsoft says that you can implement your project in less than 5 minutes! Let’s see if it’s true.

Read more
Scott Alan Miller
  • Scott Alan Miller
  • March 20, 2018

RAID Today

You may have heard that RAID is no longer applicable for enterprise storage: that it’s time had passed. RAID has dominated enterprise storage for decades and, while not a hot topic of conversation today, it remains a key strategic approach for businesses to consider. To some degree, it is true, RAID is no longer the singular answer to enterprise storage that it once was.  For decades it was unchallenged as a technology and as an approach, and so reigned alone – a foregone conclusion in a giant sea of storage.  Today, RAIN has joined the space and is a viable alternative to RAID in many scenarios.  But just because RAIN is newer and the darling of storage conversations does not mean that RAIN will simply displace RAID nor that RAID’s position of importance has been eliminated.  Not at all.

Read more
Gary Williams
  • Gary Williams
  • March 15, 2018

Demystifying HTTPS

This blog is going to be all about the secure certificate side of things, by setting these headers you reduce the chances of certain types of probes and attacks from being successful. The server itself and whatever applications you are running on it still need to be upgraded and configured to reduce the chances of someone gaining unauthorised access to your systems.

Read more