Free Webinar
April 4 | 11am PT / 2pm ET
Does Windows Server 2019 really hit the spot?
Look into all storage options
Speaker: Orest Lesyuk, Pre-Sales Engineer, StarWind
Posted by Vladan Seget on March 7, 2019
The easiest way to upgrade your VMware vSphere Infrastructure in 3 Steps

Upgrading VMware vSphere infrastructure may seem a boring, tedious, and sometimes even difficult process. But that’s not true at all if you know about three steps you need to follow in order to avoid difficulties in updating. These steps are called pre-upgrade, upgrade, post -pgrade phases. What should be done at the pre-upgrade stage? How to choose the most appropriate upgrade scenario for your infrastructure and architecture? What steps should be taken after completing the infrastructure upgrade?

Learn More

Posted by Romain Serre on March 5, 2019
Getting started with Azure Migrate

Azure Migrate is an Azure tool that helps to plan the transition from VMware to Azure. Are you considering the possibility of lift-and-shift migrations? Or maybe are you at an early stage of migration assessment? The Azure Migrate service will help you assess whether your on-premises machines are suitable for working in Azure, get size recommendations for VMs, and estimate the cost of running on-premises machines in Azure. Do you have any doubts?

Learn More

Posted by Andrea Mauro on February 21, 2019
Changing the hardware resources on a running VM

Each virtual machine (VM) is a collection of resources provided by the infrastructure layer, usually organized in a pool of resources and assigned dynamically (or in some case statically) to each VM. VMs “see” a subset of physical resources in a form of virtual hardware components defined usually by the certain minimum elements. Adding hardware components can be useful in some cases, or they can be necessary for performing some basic operations, like, for example, installing the guest OS where a video driver, a keyboard and a mouse device are needed to use the remote console. That is why you should be aware of which hardware resources can be hot-add and which hot-remove.

Learn More

Posted by Alex Samoylenko on August 28, 2018
Persistent memory in VMware vSphere 6.7: what is it & how fast is it?

Persistent Memory (PMEM) support is introduced in the recently released VMware vSphere 6.7. This new non-volatile memory type covers the gap in performance between the random-access memory (RAM) and Flash/SSD. But, is PMEM really that fast? In this article, I take a closer look at what persistent memory is and its performance.

Learn More

Posted by Andrea Mauro on August 9, 2018
Security threats in a virtual environment

Security is typically a hot-topic due also to several regulations and compliant rules and laws. But more important, a security breach can have huge collateral effects, also if no data has been stoled, or compromised. But, for example, a “simple” DoS attack that makes a service not available can have a bad effect on the reputation of a B2C company. This post will try to give an idea of some possible security threads in a virtual environment based on VMware vSphere (but several concepts are quite general also for other virtualization platforms) and some possible approaches to minimize the effect or prevent the attacks.

Learn More

Posted by Askar Kopbayev on July 26, 2018
Hybrid Cloud Extension – Part 2

If you ever worked with vSphere, you definitely used at least one of those. However, in HCX they are used with Secure Proxy. All migration traffic is proxied via HCX WAN Interconnect appliance (WAN-IX). Deployed WAN-IX simulates new ESXi host under local vCenter. You can actually see it in the Web Client inventory. From the point of view of vCenter and other ESXi host the WAN-IX is just another regular host.

Learn More

Posted by Vladyslav Savchenko on June 26, 2018
Secure your data for good with Challenge Handshake Authentication Protocol

Today we will look at one of them – Challenge Handshake Authentication Protocol or CHAP. Before we start, let me tell you a few words about CHAP. Challenge Handshake Authentication Protocol (CHAP) is a network login protocol that uses a challenge-response mechanism. You can use CHAP authentication to restrict iSCSI access to volumes and snapshots to hosts that supply the correct account name and password (or “secret”) combination. Using CHAP authentication can facilitate management of access controls because it restricts the access through account names and passwords, instead of IP addresses or iSCSI initiator names.

Learn More

Posted by Ivan Ischenko on March 7, 2018
Creating ESXi VMs on the Windows based NFS share

Many words were said about NFS (Network File System), but what exactly NFS can give us? In general, NFS used as the ISO library or just simple network file share with easy access from any Windows or Linux based machine. However, starts from NFS 3.0 protocol can give us the good performance and can be as the shared storage for ESXi or any Linux based Hypervisors. In this article, I will create the NFS share on the Windows Server 2016 and then mount NFS share on the ESXi 6.5 and will create the VM on it.

Learn More

Posted by Alex Samoylenko on January 18, 2018
Why should you install the latest VMware vCenter 6.5 Update 1d /1e?

Throughout the last month, VMware has released two important updates for virtual infrastructure management server – VMware vCenter 6.5 Update 1d and 1e. Both updates have significantly improved the functionality of the vCenter management server, despite it’s just one more letter added to Update 1.

Learn More

Posted by Mike Preston on October 26, 2017
vSphere Upgrade Options

When it comes time for your vSphere upgrade there are many different approaches to how you perform the upgrades on your ESXi hosts.   An administrator who looks after a small cluster may update one way, whereas an administrator who looks after an enterprise with 1000s of hosts may opt to go another.  Also, depending on how your environment is deployed you might want to choose one method over another.  Factors such as a whether or not your hosts are managed by a vCenter server, whether or not they are members of a cluster – these things all impact the methods in which you chose to update to the latest version of ESXi.  Certainly, some methods are much more simplistic than others to perform, some offer more advantages when upgrading at scale, and some are more prone to user error – let’s take a look at each method of upgrading our hosts below and discuss the benefits and drawbacks of each…

Learn More