Free Webinar
November 15 | 11am PT / 2pm ET
VMware & StarWind: Guarantee data safety and constant applications availability
Speaker: Alexey Khorolets, Pre-Sales Engineer, StarWind
Posted by Alex Bykovskyi on October 25, 2018
StarWind Virtual SAN for vSphere Linux Software RAID configuration

The present series of articles describes StarWind Virtual SAN for vSphere edition. In the first article, I talked about what StarWind Virtual SAN for vSphere is and how to set it up on the hardware RAID. StarWind Virtual SAN for vSphere is not just a simple Windows VM but a ready-to-go Linux-based VM. Using StarWind VSAN for vSphere, the process of deploying VMs, providing storage, connecting it, and creating highly available VMs becomes as easy as ABC.

Learn More

Posted by Paolo Valsecchi on October 11, 2018
Migrate On-Premises Virtual Machines to AWS

AWS Server Migration Server (SMS) allows the migration of one or multiple on-premises virtual machines to AWS in an easy way from a single pane of glass. The SMS service allows to schedule and automate replications needed to easily manage server migrations.

Learn More

Posted by Alex Bykovskyi on September 25, 2018
StarWind Virtual SAN for vSphere

In this article, I discuss what StarWind Virtual SAN for vSphere is and how to set it up on the hardware RAID. StarWind VSAN for vSphere is a Software-Defined Storage solution that is designed specifically for vSphere environments. It comes as a preconfigured VM template, so just a couple of quick steps are needed to start running your vSphere environment on StarWind VSAN: download the solution, deploy it, and “play”. Here, I want to share some tips and tricks on working with VSAN for vSphere.

Learn More

Posted by Andrea Mauro on August 9, 2018
Security threats in a virtual environment

Security is typically a hot-topic due also to several regulations and compliant rules and laws. But more important, a security breach can have huge collateral effects, also if no data has been stoled, or compromised. But, for example, a “simple” DoS attack that makes a service not available can have a bad effect on the reputation of a B2C company. This post will try to give an idea of some possible security threads in a virtual environment based on VMware vSphere (but several concepts are quite general also for other virtualization platforms) and some possible approaches to minimize the effect or prevent the attacks.

Learn More

Posted by Askar Kopbayev on July 26, 2018
Hybrid Cloud Extension – Part 2

If you ever worked with vSphere, you definitely used at least one of those. However, in HCX they are used with Secure Proxy. All migration traffic is proxied via HCX WAN Interconnect appliance (WAN-IX). Deployed WAN-IX simulates new ESXi host under local vCenter. You can actually see it in the Web Client inventory. From the point of view of vCenter and other ESXi host the WAN-IX is just another regular host.

Learn More

Posted by Alex Samoylenko on June 28, 2018
VMware Skyline – Advanced Technical Support for Large Virtualized Environments

For some reason, VMware Skyline is not common knowledge for VMware vSphere admins and VMware products users on the whole. Skyline is VMware proactive support technology allowing to provide advanced technical support for VMware vSphere products (including vSAN 6.6 and later) and VMware NSX. Soon, some other products will be supported. But wait, what is this service actually for? To make that thing clear for everyone, I’d like to shed light on VMware Skyline in this article.

Learn More

Posted by Vladyslav Savchenko on June 26, 2018
Secure your data for good with Challenge Handshake Authentication Protocol

Today we will look at one of them – Challenge Handshake Authentication Protocol or CHAP. Before we start, let me tell you a few words about CHAP. Challenge Handshake Authentication Protocol (CHAP) is a network login protocol that uses a challenge-response mechanism. You can use CHAP authentication to restrict iSCSI access to volumes and snapshots to hosts that supply the correct account name and password (or “secret”) combination. Using CHAP authentication can facilitate management of access controls because it restricts the access through account names and passwords, instead of IP addresses or iSCSI initiator names.

Learn More

Posted by Alex Samoylenko on March 22, 2018
Generating a Support Bundle: How to Retrieve Virtual Infrastructure Logs from VMware vCenter and ESXi Servers

One day, any VMware administrator may require the so-called “support bundle” which contains log-files, diagnostic information, and performance metrics. Taken together, these parameters allow troubleshooting VMware vSphere. The bundle provides VMware GSS (Global Support Services) the insight into virtualized environment configuration which allows them to resolve issues, when a client submits a support ticket with this bundle attached.

Learn More

Posted by Andrea Mauro on March 13, 2018
CLI vs. GUI for VMware Admins

The term User Interface (UI) is used for specifying how a user interacts with a specific device, or software. CLI and GUI are two different types of possible user interfaces. Let’s analyze those different approaches and the pro and cons of them, using the VMware vSphere environment as an example.

Learn More

Posted by Andrea Mauro on January 31, 2018
Why upgrade to VMware vSphere 6.5 (or why not)

VMware vSphere 6.5 is the latest version of the enterprise server virtual platform from VMware, but the new beta it’s already there for testers. Actually the next version it’s (in the beta). If you are building a new infrastructure from scratch the latest stable version is probably the best choices (for most cases); but what about if you have an old environment and you plan to upgrade it?

Learn More