VMware has recently posted an article up on its Communities site in the Business Critical Applications section about monitoring SQL Servers that are supporting a business critical application running in a vSphere environment. If this is how VMware thinks critical infrastructure services (database servers, applications servers, web servers, messaging servers, etc.) that support business critical applications should be monitored then it is no wonder that so many customers are struggling to get their business critical application virtualized. Continue reading Monitoring SQL Server Performance on VMware vSphere
At a gathering in San Francisco Intel has demonstrated a new chip design that uses 3D transistors to improve circuit density, provide for a path to more powerful chips while also keeping power requirements low. This reinvention of the transistor promises to allow Moore’s law to continue to be extended for the foreseeable future. Continue reading Intel goes for 3D Transistors – Extends Moore’s Law Yet Again
One of the basic tenants of virtualization security is to protect the management components of your virtualization hosts by placing these all important components on a separate network. These components often include management servers such as SCOM, vCenter, XenCenter, VirtManager, etc. as well as the management appliances of your virtualization hosts. In essence, the use of a properly configured, firewalled, and monitored virtualization management network would be the simplest and most effective security measure that can be made to day within any virtual environment. A message shared by Citrix, VMware, myself, and many others.
The problem is that not everything is as black and white as security folks desire. If we implement performance and other management tools, we often need to expose part of our all important virtualization management network to others. But how do we do this safely, securely, with minimal impact to usability? Why do we need to this is also another question. You just have to take one look at the Virtualization ASsessment TOolkit (Vasto) to realize the importance of this security requirement. But the question still exists, how do you implement other necessary tools within your virtual environment without impacting usability? Which we discussed on the May 5th Virtualization Security Podcast. Continue reading Security of Performance and Management tools within the Virtual Environment
VMTurbo has broken some significant new ground in terms of what is available for free in a virtual appliance that manages the performance and capacity of VMware vSphere environments. This new free tool is not time limited, nor is it limited in terms of the size of the environment that it can address. Continue reading VMTurbo Breaks New Ground for Free vSphere Monitoring Tools
In “Cloud SLAs Are Worthless But Does this Matter?“, we concluded that there are some significant differences in how SLA’s are perceived between those being in place with an IT organization and those offered by a public cloud vendor. The principle difference appears to be that an IT SLA is an agreement that an IT organization strives to honor, in contrast to a public cloud SLA which is more of a marketing statement designed so that the cloud vendor can never violate it. Continue reading So What Should a Cloud SLA Look Like?
BMC has announced that they have bought Coradiant, the leader in web applications performance management. Coradiant specialized in helping IT organizations understand the performance (response time) of their business critical and performance critical web applications. This allows IT organizations to be proactive in the management of the infrastructure supporting these applications leading to fewer brownouts and outages. Continue reading News: BMC buys Coradiant