Feeds

VMware vSphere Enterprise Plus: An El Reg deep dive

Trevor Pott feels the big business end of virtual machine giant

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

So you bought a couple of nodes last month - what happens when you order hundreds?

vMotion, Storage vMotion, DRS, distributed power management (DPM), host profiles and auto deploy are what I call "coalface tech". They are not technologies that reduce capital expenditure (capex) or provide a layer of risk management. They are the operational (opex) features that make the lives of systems administrators better. Selling opex to the pointy-haired boss is traditionally much harder than selling capex.

As the widgets that let us move VMs from one system to another without turning them off, vMotion and Storage vMotion should sell themselves. Hardware dies. Sometimes you have to upgrade a system to get better performance. In both cases the ease of vMotion saves an awful lot of systems administrator time. Your time – and the cost of system downtime – is worth more than the licences.

Indeed, I'd go so far as to say it justifies virtualisation all on its own, without any of the consolidation arguments that have been used for the past decade. Then again, I'm a sysadmin; I naturally favour opex arguments over capex ones.

DPM takes the chore of moving VMs to the smaller required number of hosts and powering off the unneeded hardware off of our hands. DPM could be sold as capex – lower power bills - but in reality, we'd have just written scripts to do what it does anyway. DRS is the automated load balancer; a function that VMware admins not blessed with Enterprise licences rapidly tire of. Even with the small networks I run, load balancing takes up far too much of my time; at scale, the opex savings could prove quite significant.

Host profiles and auto deploy disconnect the rack monkey from the hypervisor. Slap the first host onto your network and configure it the way you want. Save that configuration as a host profile; repeat for every host type you have. Set up auto deploy and not only will vSphere install the hypervisor on each new server it discovers, it will install the correct configuration as determined by your pre-set host profile. This isn't worth the cost of the licence if you only buy a host or two a year; it becomes mandatory if you start buying them by the hundreds.

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.