Abstract:
In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.
Abstract:
Architectures for computing clusters with enhanced scalability and fault isolation capabilities are described. The enhanced capabilities are enabled by partitioning hosts of the clusters into multiple storage domains of the cluster. Each of the hosts includes processing and storage resources. The resources are logically partitioned into a processing layer and a storage layer of the cluster. The processing layer includes a virtualized processing resource for each of the storage domains. The storage layer includes a virtualized datastore for each of the storage domains. The processing layer provides users with access to virtualized machines (VMs). The storage layer provides the VMs with access to virtualized datastores of the associated storage domain. The aggregated resources of the host computing devices within the cluster may be employed to instantiate the processing layer and the storage layer of the cluster.
Abstract:
The present disclosure relates to bootstrapping an encrypted single node VSAN cluster. One method includes receiving a request to create an encrypted VSAN cluster from a single host in a software-defined datacenter, deploying a virtual server on a VSAN datastore of the software-defined datacenter, registering a native key provider (NKP) in the virtual server, creating an empty VSAN cluster encrypted by the NKP, adding the single host to the encrypted empty cluster to create a one-host encrypted cluster, registering a KMIP KMS in the virtual server, switching encryption of the one-host encrypted cluster from the NKP to the KMIP KMS, and adding another host to the one-host encrypted cluster to create the encrypted cluster.
Abstract:
In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.
Abstract:
An example method to deploy a web client plugin in a virtualized computing environment may include obtaining information identifying a virtual machine at a management entity and generating configuration information that includes the information identifying the virtual machine. The method may further include registering, with the management entity, the configuration information to deploy the web client plugin as a web client extension. The registration is performed such that, in response to an access to the virtual machine via the web client plugin, the web client plugin is able to automatically identify the virtual machine based on the configuration information.
Abstract:
In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.
Abstract:
In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.
Abstract:
An example method is provided to perform policy-based data placement in a virtualized computing environment. The method may comprise receiving a request to create a virtual disk for a virtual machine in the virtualized computing environment. The request may include a usage type associated with the virtual disk. The method may further comprise, based on a data placement policy associated with the usage type, determining a datastore on which to place the virtual disk and to store data of the usage type associated with the virtual disk.