Flylib.com
Configuring VMware ESX Server 2.5 (Vol 1)
Configuring VMware ESX Server 2.5 (Vol 1)
ISBN: 1597490199
EAN: 2147483647
Year: 2005
Pages: 173
Authors:
Al Muller
,
Seburn Wilson
BUY ON AMAZON
Virtualization with VMware ESX Server
Table of Contents
Copyright
Acknowledgments
Coauthors
Contributing Authors
Foreword
About This Book
About Callisma
Chapter 1. The Joy of ESX
Section 1.1. Introduction
Section 1.2. Target Audience
Section 1.3. VMware Terms and Concepts
Section 1.4. Summary
Section 1.5. Solutions Fast Track
Section 1.6. Frequently Asked Questions
Chapter 2. Installation
Section 2.1. Introduction
Section 2.2. Pre-installation Tasks
Section 2.3. Performing the Installation
Section 2.4. Summary
Section 2.5. Solutions Fast Track
Section 2.6. Frequently Asked Questions
Chapter 3. Configuring a Virtual Machine, Gold Builds, and Clones
Section 3.1. Introduction
Section 3.2. Virtual Machine Basics
Section 3.3. Configuring a Virtual Machine
Section 3.4. Gold Builds and Clones
Section 3.5. Modify Your Master
Section 3.6. Summary
Section 3.7. Solutions Fast Track
Section 3.8. Frequently Asked Questions
Chapter 4. Advanced Configurations
Section 4.1. Introduction
Section 4.2. Network Traffic Shaping
Section 4.3. Disk Bandwidth
Section 4.4. CPU Management, Affinity
Section 4.5. NUMA and ProcessorMemory Affinity
Section 4.6. Raw Device Mapping
Section 4.7. Clusters
Section 4.8. Summary
Section 4.9. Solutions Fast Track
Section 4.10. Frequently Asked Questions
Chapter 5. Virtual Networking
Section 5.1. Introduction
Section 5.2. Virtual Switches
Section 5.3. Physical and Virtual NICS
Section 5.4. MAC Addresses
Section 5.5. Port Groups and VLANs
Section 5.6. Networking Tools
Section 5.7. Summary
Section 5.8. Solutions Fast Track
Section 5.9. Frequently Asked Questions
Chapter 6. Physical-to-Virtual Migrations
Section 6.1. Introduction
Section 6.2. P-to-V Terms
Section 6.3. P-to-V for Free
Section 6.4. cat Your Hard Drive
Section 6.5. BartPE
Section 6.6. VMware P2V Assistant 2
Section 6.7. Platespin PowerP2V
Section 6.8. P-to-V Conclusion
Section 6.9. Summary
Section 6.10. Solutions Fast Track
Section 6.11. Frequently Asked Questions
Chapter 7. Server Consolidation
Section 7.1. Introduction
Section 7.2. Server Consolidation and Virtualization Defined
Section 7.3. Business Case and Technical Requirements
Section 7.4. Developing Your Project Methodology
Section 7.5. Summary
Section 7.6. Solutions Fast Track
Section 7.7. Frequently Asked Questions
Chapter 8. Cool Tools for a Virtual Infrastructure
Section 8.1. Introduction
Section 8.2. ISO Images and WinISO
Section 8.3. WinSCP
Section 8.4. PuTTY
Section 8.5. NewSID
Section 8.6. Platespin s PowerP2V and PowerRecon
Section 8.7. VirtualCenterVmotion
Section 8.8. vmkfstools and vmware-cmd
Section 8.9. VMware Tools
Section 8.10. Summary
Section 8.11. Solutions Fast Track
Section 8.12. Frequently Asked Questions
Chapter 9. Administering a Virtual Infrastructure
Section 9.1. Introduction
Section 9.2. VMware Tools for Managing the Virtual Infrastructure
Section 9.3. Understanding VirtualCenter Terms and Concepts
Section 9.4. Installation and Configuration of VirtualCenter 1.2
Section 9.5. Using VirtualCenter to Administer Your Virtual Infrastructure
Section 9.6. Using the Management Interface and Service Console to Administer the Virtual Infrastructure
Section 9.7. Summary
Section 9.8. Solutions Fast Track
Section 9.9. Frequently Asked Questions
Chapter 10. Best Practices, Gotchas, and Common Problems
Section 10.1. Introduction
Section 10.2. Best Practices
Section 10.3. Gotchas
Section 10.4. Common Problems
Section 10.5. Summary
Section 10.6. Solutions Fast Track
Section 10.7. Frequently Asked Questions
Chapter 11. VMware Under the Covers
Section 11.1. Introduction
Section 11.2. Understanding the ESX Server File and Directory Structure
Section 11.3. The ESX Server Boot Process
Section 11.4. Interaction between the Service Console, VMkernel, and Virtual Machines
Section 11.5. Summary
Section 11.6. Solutions Fast Track
Section 11.7. Frequently Asked Questions
Chapter 12. Backup Strategies for ESX Server and Virtual Machines
Section 12.1. Introduction
Section 12.2. Backing Up the Service Console
Section 12.3. Backing Up Virtual Machines
Section 12.4. Best Practices
Section 12.5. Summary
Section 12.6. Solutions Fast Track
Section 12.7. Frequently Asked Questions
Chapter 13. Common and Necessary Command-Line Interface (CLI) Commands
Section 13.1. Introduction
Section 13.2. Using the Command-Line Interface
Section 13.3. Configuring and Managing ESX Server Service Console from the Command Line
Section 13.4. Managing Virtual Machines from the Command Line
Section 13.5. Summary
Section 13.6. Solutions Fast Track
Section 13.7. Frequently Asked Questions
Chapter 14. A Peek at the Future: It s Totally Cool
Section 14.1. Introduction
Section 14.2. Evolved Virtually You Have Become
Section 14.3. Bigger and Badder Brains
Section 14.4. ESX Server 3.0Better the Beta
Section 14.5. Faultless Fault Tolerance
Section 14.6. The Rise of Utility Computing
Section 14.7. Your Moment of Xen
Section 14.8. Microsoft Virtual ServerWatch Your Six
Section 14.9. Virtual Storage Is the Place to Live
Section 14.10. Summary
Section 14.11. Solutions Fast Track
Section 14.12. Frequently Asked Questions
Appendix A. Recommended Reading
Section A.1. Guides
Section A.2. Books
Section A.3. White Papers
Section A.4. Web Sites
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
Configuring VMware ESX Server 2.5 (Vol 1)
ISBN: 1597490199
EAN: 2147483647
Year: 2005
Pages: 173
Authors:
Al Muller
,
Seburn Wilson
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
Inside Network Security Assessment: Guarding Your IT Infrastructure
Introduction to Assessing Network Vulnerabilities
Risk Terminology
Understanding the Attacker
Level III Assessments
Audit and Compliance
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
WebLogic: The Definitive Guide
HTTP Access Logs
Using WebLogics RMI
WebLogic-Specific Configuration Options
Configuring Entity Beans
Managing Domains
SQL Hacks
Hack 55. Import Someone Elses Data
Hack 66. Use Optimistic Locking
Hack 74. Compare and Synchronize Tables
Hack 86. Set Up Queuing in the Database
Hack 93. Auto-Create Database Users
Visual C# 2005 How to Program (2nd Edition)
Class View and Object Browser
Session Tracking
Self-Review Exercises
J.4. Class Keypad
Appendix L. Simple Types
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies