Virtualization

17K

Solutions

10K

Contributors

Virtualization is the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Virtualization is usually the creation of a system that executes separate from the underlying hardware resources, or the creation of an entire desktop for systems located elsewhere, similar to thin clients.

Share tech news, updates, or what's on your mind.

Sign up to Post

The task has taken me a year to figure out, so I would like to share tips with you, in case you run into the problem and come across this article, searching for it.
0
Cloud Class® Course: Certified Penetration Testing
LVL 12
Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

VMware Site Recovery Manager
The article describes step by step how to validate the SRA software certificate once installed on the Site Recovery Manager server. I hope it will be very useful for all administrators of virtualized environments.
0
The following article describes how to recreate the VMDK file of a virtual machine. It is important that this file is always in the datastore where the VM is stored, because if the VM is not present, it will not be able to turn on and an error I hope it is very useful for everyone.
1
LVL 128

Expert Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Comment Utility
@Nabeel Ahmed

I would recommend if you need URGENT attention to the issue I would Ask a related question.
0
LVL 6

Author Comment

by:R@f@r P@NC3R
Comment Utility
Hello

Please share the screens until the step you arrived, ask a question to help you.

regards...
0
Write My Paper
Virtualization software lets you run different versions of Windows, Ubuntu Linux and other versions of Linux all at the same time, rather than running each one directly from your computer's hard drive.
0

Expert Comment

by:Thomas Brown
Comment Utility
Incredible article! This subject is extremely intriguing and improtant as I would see it. Phenomenal output, Positive site, I really have examine a portion of the articles on your site right now, and that I adore your vogue. Much appreciated and please keep up the compelling work. It reminds me how I requested an exposition from https://essaycaptains.com/ I required short article about undergraduated training from my school classes yet didn't have room schedule-wise to compose it all alone so I chose to arrange it.
0
Can you run Linux on a Windows system? Yep. Here's how.
1
Want to create a VM? Here's how you do it.
0
VMware Converter
If you need to complete a Physical to Virtual (P2V), Virtual to Virtual (V2V) conversion to a VMware product (VMware Workstation, Player or VMware vSphere (ESXi) ) for FREE, then there is some good news...
0
400TB Disaggregate Cluster
Herein one will find an aggregate of some of my experience building and deploying virtualization stacks both in standalone, clustered Hyper-V, clustered Hyper-V with a Scale-Out File Server (SOFS) backend, and Storage Spaces Direct (S2D).
2
LVL 42

Author Comment

by:Philip Elder
Comment Utility
No worries at all and no need to apologize.

Thanks for that. I'll get the content back in shortly.
0
LVL 42

Author Comment

by:Philip Elder
Comment Utility
Thank you sir. :)
0
In this article will go through how to backup a vPostgres DB from a broken vCenter Appliance and restore to a new vCenter Appliance.
0
This article will explain How to fix Broken backup chain in Veeam Backup & Replication.
0
Powerful Yet Easy-to-Use Network Monitoring
Powerful Yet Easy-to-Use Network Monitoring

Identify excessive bandwidth utilization or unexpected application traffic with SolarWinds Bandwidth Analyzer Pack.

August and September have been big months for VMware—from VMworld last month to our new Course of the Month in VMware Professional - Data Center Virtualization. We reached out to Andrew Hancock, resident VMware vExpert, to have a more in-depth discussion about the growth of this field.
7
The ultimate Citrix XenDesktop 7.x internals cheat sheet!
What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down and start your ENTIRE Citrix environment.
0
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root account.
0
ONPAGE AND LOG.IZ
A look into Log Analysis and Effective Critical Alerting.
0
Lab Topology
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
1

Expert Comment

by:PriteshW
Comment Utility
Good Article, setup on my lab and works well.
0
Veeam Endpoint Recovery
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
4

Expert Comment

by:DanielNinkovic Ninkovic
Comment Utility
Hello, Is it safe to do this with a Domain Controller?
0
LVL 128

Author Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Comment Utility
You will need to post a question, so we can discuss this.
0
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
0
Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and use cases of email backups.
2
Last article we focus in how to VMware: How to create and use VMs TAGs – Part 1 so before follow this article and perform the next tasks, you should read the first article how to create the TAG before using them in Veeam Backup Jobs.
2
The Lifecycle Approach to Managing Security Policy
The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Will try to explain how to use the VMware feature TAGs in the VMs and create Veeam Backup Jobs using TAGs. Since this article is too long, I will create second article for the Veeam tasks.
0
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
0
When we have a dead host and we lose all connections to the ESXi, and we need to find a way to move all VMs from that dead ESXi host.
0
This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
0
It Is not possible to enable LLDP in vSwitch(at least is not supported by VMware), so in this article we will enable this, and also go trough how to enabled CDP and how to get this information in vSwitches and also in vDS.
0
LVL 25

Author Comment

by:Luciano Patrão
Comment Utility
Hi,

I have more articles waiting to be approved.

I will change the images, but this "new" tool to write articles is not very good.
0
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona.

Thanks David, for your detailed and honest evaluation!
0
LVL 5

Author Comment

by:Kimberley from Paessler
Comment Utility
Hi Ryan,

Thanks for your message.  I'll flesh it out a bit and then submit it again.

I have a related question:  If I have a topic/article/post that I only want to post to the Paessler Topics page, does it still go through independent review?  I tagged "paessler" on several articles, but haven't been asked to review or approve them.  Who decides what can appear on our topics page?

(um, to avoid confusion, yes, I'd like to post this article to several topics, after it meets the requirements for an article.  My question is more a hypothetical one, in case I have things to post only to the Paessler topics page at some point).

Thanks for your help!

Kimberley
0

Virtualization

17K

Solutions

10K

Contributors

Virtualization is the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Virtualization is usually the creation of a system that executes separate from the underlying hardware resources, or the creation of an entire desktop for systems located elsewhere, similar to thin clients.