Access "Considerations for V2V and V2P workload migrations"
This article is part of the February 2011, Vol. 31 issue of How to make the transition from physical to virtual and back
This tip is the second in a two-part series on virtual migrations. Read part one about management tips for planning P2V migrations. Once a virtualization layer is in place, pre-existing workloads must make the transition from physical servers to virtual servers. Virtual workloads may also need to make a transition from one virtualization platform to another as platforms are upgraded or swapped out over time. And although the assumption might be that virtual machines (VMs) never go back, there are cases when a workload may make the transition back to a physical server. This tip takes a closer look at the considerations and caveats in virtual-to-virtual (V2V) and virtual-to-physical (V2P) workload transitions, as well as important factors to note for disaster recovery. From virtual to virtual Although migrating workloads from physical to virtual is quite common, the move from virtual to virtual is a bit more complicated. There are generally only three situations that require V2V migration: the current virtualization platform is upgraded or patched to a ... Access >>>
Premium Content for Free.
Considerations for V2V and V2P workload migrations
by Stephen J. Bigelow, Senior Technology Editor
Although there are few situations in which V2V or V2P migrations are necessary, administrators needing to make these moves must be prepared to handle unique challenges.
Inside the capacity management process: Resource supply and demand
by Greg Shields, Contributor
Keep your servers up to snuff by ensuring that resources have been optimally allocated. Understanding resource supply and demand is the key to a strong capacity management process.
- Considerations for V2V and V2P workload migrations by Stephen J. Bigelow, Senior Technology Editor
Virtual security: New attack vectors, new ballgame
by Eric Siebert, Contributor
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities.
- Virtual security: New attack vectors, new ballgame by Eric Siebert, Contributor
More Premium Content Accessible For Free
The benefits of server virtualization have been widely accepted, but companies may still have reservations about virtualizing applications that ...
Convincing top management of the benefits of server virtualization is crucial to the success of your virtualization project. This expert e-guide ...
After briefly considering public cloud computing, many companies are opting for private models instead. This expert IT handbook provides an in-depth ...