VMware Backup Best Practices Checklist
When performing backups of VMware virtual machines, it is best to make sure that backup procedures follow best practices. It is often helpful to have a checklist of sorts when…
Virtualization, Cloud, DevOps, Reviews
When performing backups of VMware virtual machines, it is best to make sure that backup procedures follow best practices. It is often helpful to have a checklist of sorts when…
For most virtualization admins who have spent any time in the trenches with administering virtual environments, snapshots are just a bad thing for most use cases, especially production workloads. We…
Successfully deploying and managing virtual desktop infrastructure or VDI can depend on picking the right VDI Solution management software. Whether it relates to repurposing old PCs as VDI clients or…
NAKIVO is certainly blazing a trail of very quick release iterations and adding new features at a rapid pace. NAKIVO just announced the release of NAKIVO Backup & Replication 7.3…
Microsoft has certainly been headed in a very cool direction in the past couple of years and have definitely embraced the Linux community and interoperability between Microsoft Windows and Linux.…
We have covered the Avago/LSI StorCLI in past posts and how extremely useful it can be loaded on ESXi servers that have DAS volumes being presented with an Avago/LSI RAID…
Let’s face it, syslog collection is not as exciting as other things we would like to be doing as administrators, but often it is a necessary evil that we have…
VMware Virtual Machine Storage Policies fall under the realm of Storage Policy Based Management that assists with virtual machine provisioning. When defined, Storage Based Policies define which type(s) of storage…
We have covered in detail how to in general provision an FTP server using FileZilla for the purposes of targeting for our VCSA 6.5 backups. However, to take this a…
Deploying virtual machines is a basic part of VMware vSphere administration. Virtual machines are deployed, cloned, etc. Customizing the guest operating system can be a very labor intensive set of…