Feeds

Virtualization minnow goes agnostic

Thinks broad and deep

Beginner's guide to SSL certificates

With VirtualIQ Pro 3, VMware's ESX Server, ESXi, VMware Server, and GSX Server hypervisors are all supported. So, too, is XenServer from Citrix, Hyper-V for Windows Server 2008 from Microsoft as well as Virtual Server 2005 R2, the Oracle VM standalone implementation of the Xen hypervisor, and the integrated Xen in SLES 10 from Novell. Red Hat is conspicuously absent from support, of course, as is the KVM hypervisor that Red Hat is shifting to as it moves away from Xen.

VirtualIQ Pro 3 has three components. A web console for managing VMs and hypervisors, data collection servers - written in a variety of languages, tuned for particular hypervisors and operating systems - and a database for storing the information about the VMs and hypervisors.

The bulk of VirtualIQ Pro is written in Java, according to Pabari, with some other languages used for data collection. The program is agentless, which is something a lot of IT shops are looking for because no one wants the overhead of an agent running on VMs, and can be installed on a Windows or Linux box.

The tool does physical and virtual machine asset discovery and builds an inventory of what is out there on the network. It also includes a physical-to-virtual (P2V) migration analyzer, which suggests workloads that might be virtualized and where they might be deployed given the physical servers and licensed hypervisors, and analytics for the virtual environments that helps admins cope with resource bottlenecks.

Mighty push

VirtualIQ Pro also includes a policy engine that can be used to provision, shut down, start or migrate VMs automatically. The tool also has role-based access to give different levels of access to different users. For instance, programmers might be able to deploy a test stack of software, but not deploy to production machines.

VirtualIQ Pro 3 is available now, and is priced $199 per processor socket. The tool is not open source, but a freeware version that can support up to five machines or 25 VMs for as long as a year is available for tire-kickers and cheapskates.

Marinez said that with VirtualIQ Pro 3, the company is now ready to do a big push because it supports enough hypervisors at the same time as companies are starting to use multiple hypervisors. The company has about 30 paying customers, and has had 700 downloads of its prior products.

It is a beginning. ®

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.