Access "Considerations for V2V and V2P workload migrations"
This article is part of the February 2011, Vol. 31 issue of How to make the transition from physical to virtual and back
This tip is the second in a two-part series on virtual migrations. Read part one about management tips for planning P2V migrations. Once a virtualization layer is in place, pre-existing workloads must make the transition from physical servers to virtual servers. Virtual workloads may also need to make a transition from one virtualization platform to another as platforms are upgraded or swapped out over time. And although the assumption might be that virtual machines (VMs) never go back, there are cases when a workload may make the transition back to a physical server. This tip takes a closer look at the considerations and caveats in virtual-to-virtual (V2V) and virtual-to-physical (V2P) workload transitions, as well as important factors to note for disaster recovery. From virtual to virtual Although migrating workloads from physical to virtual is quite common, the move from virtual to virtual is a bit more complicated. There are generally only three situations that require V2V migration: the current virtualization platform is upgraded or patched to a ... Access >>>
Premium Content for Free.
Considerations for V2V and V2P workload migrations
by Stephen J. Bigelow, Senior Technology Editor
Although there are few situations in which V2V or V2P migrations are necessary, administrators needing to make these moves must be prepared to handle unique challenges.
Inside the capacity management process: Resource supply and demand
by Greg Shields, Contributor
Keep your servers up to snuff by ensuring that resources have been optimally allocated. Understanding resource supply and demand is the key to a strong capacity management process.
- Considerations for V2V and V2P workload migrations by Stephen J. Bigelow, Senior Technology Editor
Virtual security: New attack vectors, new ballgame
by Eric Siebert
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities.
- Virtual security: New attack vectors, new ballgame by Eric Siebert
More Premium Content Accessible For Free
Admins are gaining better insight into server and VM performance data, but what do they do with it? We are beginning to see a push for tools that can...
Virtualization admins' top concern is no longer choosing a hypervisor -- it's choosing the right tools that will help with management, improve VM ...
As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar ...