?
Solved

vSphere 5.5 vMotion between different CPU's: E5-2620, E5-2640 & E5620

Posted on 2015-02-18
3
Medium Priority
?
331 Views
Last Modified: 2016-11-23
Guys,

We're looking to establish a new HA cluster with Essentials plus license - using 3 different hosts:
•      Proliant DL360 G7 - 2x Xeon E5620 CPU's 2.4 Ghz (8 cores total)

•      Proliant DL360 G8 - 2x Xeon E5-2640 CPU's 2.5 Ghz (12 cores total)

•      Dell Power Edge R720 - 1x E5-2620 CPU

My question is; will I be able to run vMotion (live migration) between those different CPU's?

Thanks in advance
0
Comment
Question by:IT_Group1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 35

Accepted Solution

by:
Seth Simmons earned 1000 total points
ID: 40617542
yes
a place where i used to be had servers in a cluster with a few different xeon models and vmotion worked fine
the guest only detected a new cpu and said it found new hardware but continued to work fine

problem comes in where you have amd and intel systems
the model doesn't matter but have to be from the same architecture; all intel or all amd

this article has many questions around vmotion you might find useful

http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1005764#AMD-Intel
0
 
LVL 123

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 1000 total points
ID: 40618581
Yes but you will need to enable an EVC profile baseline.

That will work but check if your VMs will be affected.

Enabling EVC can reduce VM performance if VM need instruction sets common to newer processors.
0
 

Author Closing Comment

by:IT_Group1
ID: 40899011
Thanks !
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If we need to check who deleted a Virtual Machine from our vCenter. Looking this task in logs can be painful and spend lot of time, so the best way to check this is in the vCenter DB. Just connect to vCenter DB(default DB should be VCDB and using…
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question