Virtualization Technology News and Information
White Papers
White Papers Search Results
Showing 1 - 7 of 7 white papers, page 1 of 1.
How to Build a SANless SQL Server Failover Cluster Instance in Google Cloud Platform
This white paper walks through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the Google Cloud Platform (GCP)
If you are going to host SQL Server on the Google Cloud Platform (GCP) you will want to make sure it is highly available with a SQL Failover Cluster. One of the best and most economical ways to do that is to build a SQL Server Failover Cluster Instance (FCI). In this guide, we will walk through the steps to build a two-node failover cluster between two instances in the same region, but in different Zones, within the GCP.
vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

Mastering vSphere – Best Practices, Optimizing Configurations & More
Do you regularly work with vSphere? If so, this free eBook is for you. Learn how to leverage best practices for the most popular features contained within the vSphere platform and boost your productivity using tips and tricks learnt direct from an experienced VMware trainer and highly qualified professional. In this eBook, vExpert Ryan Birk shows you how to master: Advanced Deployment Scenarios using Auto-Deploy Shared Storage Performance Monitoring and Troubleshooting Host Network configurati

If you’re here to gather some of the best practices surrounding vSphere, you’ve come to the right place! Mastering vSphere: Best Practices, Optimizing Configurations & More, the free eBook authored by me, Ryan Birk, is the product of many years working with vSphere as well as teaching others in a professional capacity. In my extensive career as a VMware consultant and teacher (I’m a VMware Certified Instructor) I have worked with people of all competence levels and been asked hundreds - if not thousands - of questions on vSphere. I was approached to write this eBook to put that experience to use to help people currently working with vSphere step up their game and reach that next level. As such, this eBook assumes readers already have a basic understanding of vSphere and will cover the best practices for four key aspects of any vSphere environment.

The best practices covered here will focus largely on management and configuration solutions so should remain relevant for quite some time. However, with that said, things are constantly changing in IT, so I would always recommend obtaining the most up-to-date information from VMware KBs and official documentation especially regarding specific versions of tools and software updates. This eBook is divided into several sections, and although I would advise reading the whole eBook as most elements relate to others, you might want to just focus on a certain area you’re having trouble with. If so, jump to the section you want read about.

Before we begin, I want to note that in a VMware environment, it’s always best to try to keep things simple. Far too often I have seen environments be thrown off the tracks by trying to do too much at once. I try to live by the mentality of “keeping your environment boring” – in other words, keeping your host configurations the same, storage configurations the same and network configurations the same. I don’t mean duplicate IP addresses, but the hosts need identical port groups, access to the same storage networks, etc. Consistency is the name of the game and is key to solving unexpected problems down the line. Furthermore, it enables smooth scalability - when you move from a single host configuration to a cluster configuration, having the same configurations will make live migrations and high availability far easier to configure without having to significantly re-work the entire infrastructure. Now the scene has been set, let’s get started!

Office 365 / Microsoft 365: The Essential Companion Guide
Office 365 and Microsoft 365 contain truly powerful applications that can significantly boost productivity in the workplace. However, there’s a lot on offer so we’ve put together a comprehensive companion guide to ensure you get the most out of your investment! This free 85-page eBook, written by Microsoft Certified Trainer Paul Schnackenburg, covers everything from basic descriptions, to installation, migration, use-cases, and best practices for all features within the Office/Microsoft 365 sui

Welcome to this free eBook on Office 365 and Microsoft 365 brought to you by Altaro Software. We’re going to show you how to get the most out of these powerful cloud packages and improve your business. This book follows an informal reference format providing an overview of the most powerful applications of each platform’s feature set in addition to links directing to supporting information and further reading if you want to dig further into a specific topic. The intended audience for this book is administrators and IT staff who are either preparing to migrate to Office/Microsoft 365 or who have already migrated and who need to get the lay of the land. If you’re a developer looking to create applications and services on top of the Microsoft 365 platform, this book is not for you. If you’re a business decision-maker, rather than a technical implementer, this book will give you a good introduction to what you can expect when your organization has been migrated to the cloud and ways you can adopt various services in Microsoft 365 to improve the efficiency of your business.


We’ll cover the differences (and why one might be more appropriate for you than the other) in more detail later but to start off let’s just clarify what each software package encompasses in a nutshell. Office 365 (from now on referred to as O365) 7 is an email collaboration and a host of other services provided as a Software as a Service (SaaS) whereas Microsoft 365 (M365) is Office 365 plus Azure Active Directory Premium, Intune – cloud-based management of devices and security and Windows 10 Enterprise. Both are per user-based subscription services that require no (or very little) infrastructure deployments on-premises.

Make the Move: Linux Desktops with Cloud Access Software
Gone are the days where hosting Linux desktops on-premises is the only way to ensure uncompromised customization, choice and control. You can host Linux desktops & applications remotely and visualize them to further security, flexibility and performance. Learn why IT teams are virtualizing Linux.

Make the Move: Linux Remote Desktops Made Easy

Securely run Linux applications and desktops from the cloud or your data center.

Download this guide and learn...

  • Why organizations are virtualizing Linux desktops & applications
  • How different industries are leveraging remote Linux desktops & applications
  • What your organization can do to begin this journey

Spotcheck Inspection with Stratusphere UX
This whitepaper defines an inspection technique―and the necessary broad-stroke steps to perform a limited health check of an existing platform or architecture. The paper defines and provides a practical-use example that will help you to execute a SpotCheck inspection using Liquidware’s Stratusphere UX.
The ability to meet user expectations and deliver the appropriate user-experience in a shared host and storage infrastructure can be a complex and challenging task. Further, the variability in deployment (settings and overall supportive infrastructure) on platforms such as VMware View and Citrix XenApp and XenDesktop make these architectures complex and difficult to troubleshoot and optimize. This whitepaper defines an inspection technique―and the necessary broad-stroke steps to perform a limited health check of an existing platform or architecture. The paper defines and provides a practical-use example that will help you to execute a SpotCheck inspection using Liquidware’s Stratusphere UX.
Blast Radius Identification and Isolation
Security teams need access to actionable information about everything in the network—where devices are located, how they interact, and all relevant details about their configuration and state. With the Forward Networks blast radius feature, they have the ability to not only isolate devices and cut off paths after an attack, but they can also prevent hosts from being vulnerable to attackers in the first place.

When looking to identify and isolate compromised network hosts, the following questions are important to answer promptly and accurately:

  • What are all the possible paths attackers can take from the compromised host?
  • What ports can they access?
  • What objects are along these paths, and what do those devices touch?
  • Is it possible for the attackers to move laterally in the network to reach critical systems or exfiltrate data to the internet?
The Forward Enterprise blast radius feature allows security operations professionals to answer those questions with one click. They can get detailed information about a compromised host, all the other devices reachable by that compromised host, and all possible traffic flows.

Once the exposure is identified, isolating the devices is a much simpler and faster process. Read the use case for more details, including an example of how the blast radius feature can locate the host device and document in seconds every destination, protocol, and L4 port it could possibly reach.