Introduction |
|
xxi | |
|
Chapter 1 An Introduction to Designing VMware Environments |
|
|
1 | (14) |
|
|
1 | (4) |
|
The Facets of vSphere Design |
|
|
5 | (4) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (5) |
|
Gathering and Defining Functional Requirements |
|
|
9 | (1) |
|
Assessing the Environment |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Performing the Implementation |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (34) |
|
|
15 | (1) |
|
|
16 | (9) |
|
Installation Design Options |
|
|
18 | (5) |
|
Post-Installation Design Options |
|
|
23 | (2) |
|
|
25 | (15) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
ESXi Flavors: Installable and Embedded |
|
|
28 | (4) |
|
|
32 | (8) |
|
|
40 | (4) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (2) |
|
|
44 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (3) |
|
Chapter 3 Designing the Management Layer |
|
|
49 | (30) |
|
Components of the Management Layer |
|
|
49 | (9) |
|
|
49 | (1) |
|
Choosing the Operating System for your vCenter |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (5) |
|
Sizing Your vCenter Server |
|
|
58 | (5) |
|
|
58 | (1) |
|
Using a Remote or Local Server |
|
|
58 | (2) |
|
Number of Objects Managed |
|
|
60 | (1) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (4) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (2) |
|
|
67 | (1) |
|
vCenter: Virtual or Physical |
|
|
68 | (2) |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
70 | (6) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (2) |
|
Chapter 4 Server Hardware |
|
|
79 | (40) |
|
|
79 | (11) |
|
Factors in Selecting Hardware |
|
|
80 | (3) |
|
|
83 | (2) |
|
|
85 | (3) |
|
Differentiating Among Vendors |
|
|
88 | (2) |
|
|
90 | (13) |
|
|
90 | (3) |
|
|
93 | (6) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (5) |
|
|
106 | (1) |
|
Advantages of Scaling Out |
|
|
107 | (1) |
|
Scaling Is a Matter of Perspective |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Blade Servers vs. Rack Servers |
|
|
110 | (5) |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Alternative Hardware Approaches |
|
|
115 | (2) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (2) |
|
Chapter 5 Designing your Network |
|
|
119 | (26) |
|
Designing with Redundancy |
|
|
119 | (6) |
|
|
120 | (4) |
|
Network Switches (pSwitches) |
|
|
124 | (1) |
|
|
125 | (3) |
|
|
125 | (1) |
|
|
126 | (1) |
|
IP Storage Network Traffic |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (3) |
|
Guest OS Network Teaming and Virtual Machine Port Groups |
|
|
130 | (1) |
|
|
130 | (3) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (2) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Port Groups, Management, and VMkernel |
|
|
137 | (1) |
|
Naming and IP Conventions |
|
|
138 | (1) |
|
|
139 | (4) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (44) |
|
Dimensions of Storage Design |
|
|
145 | (5) |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
150 | (9) |
|
|
150 | (3) |
|
Estimating Capacity Requirements |
|
|
153 | (1) |
|
|
153 | (1) |
|
Large or Small Datastores? |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Designing for Performance |
|
|
159 | (10) |
|
Measuring Storage Performance |
|
|
159 | (1) |
|
How to Calculate a Disk's IOPS |
|
|
160 | (1) |
|
What Can Affect a Storage Array's IOPS? |
|
|
160 | (8) |
|
Measuring Your Existing IOPS Usage |
|
|
168 | (1) |
|
Local Storage vs. Shared Storage |
|
|
169 | (3) |
|
|
169 | (2) |
|
What About Local Shared Storage? |
|
|
171 | (1) |
|
|
172 | (1) |
|
Choosing a Network Protocol |
|
|
172 | (11) |
|
|
174 | (2) |
|
|
176 | (3) |
|
|
179 | (3) |
|
Protocol Choice at the End of the Day |
|
|
182 | (1) |
|
|
183 | (3) |
|
|
183 | (3) |
|
|
186 | (1) |
|
|
186 | (3) |
|
Chapter 7 Virtual Machines |
|
|
189 | (48) |
|
Components of a Virtual Machine |
|
|
189 | (19) |
|
Base Virtual Machine Hardware |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (7) |
|
Removing or Disabling Unused Hardware |
|
|
199 | (1) |
|
|
199 | (5) |
|
|
204 | (4) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Virtual Machine Network Design |
|
|
209 | (4) |
|
|
209 | (3) |
|
|
212 | (1) |
|
|
212 | (1) |
|
Virtual Machine Storage Design |
|
|
213 | (6) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (5) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Optimizing the Guest for the Hypervisor |
|
|
223 | (1) |
|
Clones, Templates, and vApps |
|
|
224 | (5) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
Virtual Machine Availability |
|
|
229 | (6) |
|
|
229 | (3) |
|
Third-Party VM Clustering |
|
|
232 | (3) |
|
|
235 | (2) |
|
Chapter 8 Datacenter Design |
|
|
237 | (42) |
|
vSphere Inveritory Structure |
|
|
237 | (4) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (2) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (1) |
|
Distributed Resource Scheduling |
|
|
247 | (11) |
|
|
247 | (4) |
|
|
251 | (3) |
|
Distributed Power Management |
|
|
254 | (4) |
|
High Availability and Clustering |
|
|
258 | (18) |
|
|
258 | (9) |
|
VM and Application Monitoring |
|
|
267 | (2) |
|
|
269 | (7) |
|
|
276 | (3) |
|
Chapter 9 Designing with Security in Mind |
|
|
279 | (26) |
|
Why Is Security Important? |
|
|
279 | (1) |
|
|
279 | (2) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Shell Access to the ESX Host |
|
|
281 | (3) |
|
|
281 | (1) |
|
|
281 | (3) |
|
|
284 | (3) |
|
|
284 | (1) |
|
|
284 | (3) |
|
|
287 | (2) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (3) |
|
|
289 | (1) |
|
|
289 | (3) |
|
|
292 | (2) |
|
|
292 | (1) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (2) |
|
|
297 | (1) |
|
|
298 | (1) |
|
Security in vCenter Linked Mode |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
Firewalls in Your Virtual Infrastructure |
|
|
300 | (3) |
|
|
301 | (1) |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Chapter 10 Monitoring and Capacity Planning |
|
|
305 | (20) |
|
|
305 | (1) |
|
Building Monitoring into the Design |
|
|
306 | (9) |
|
Determining the Tools to Use |
|
|
306 | (5) |
|
Selecting the Items to Monitor |
|
|
311 | (2) |
|
|
313 | (1) |
|
Taking Action on Thresholds |
|
|
314 | (1) |
|
|
315 | (1) |
|
Incorporating Capacity Planning in the Design |
|
|
315 | (7) |
|
Planning Before Virtualization |
|
|
316 | (3) |
|
Planning During Virtualization |
|
|
319 | (3) |
|
|
322 | (3) |
|
Chapter 11 Bringing It All Together |
|
|
325 | (14) |
|
|
325 | (4) |
|
Business Overview for XYZ Widgets |
|
|
325 | (2) |
|
Hypervisor Selection (VMware ESX vs. VMware ESXi) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Shared Storage Configuration |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
Monitoring and Capacity Planning |
|
|
329 | (1) |
|
|
329 | (9) |
|
Hypervisor Selection (VMware ESX vs. VMware ESXi) |
|
|
329 | (1) |
|
|
330 | (2) |
|
|
332 | (1) |
|
|
333 | (2) |
|
Shared Storage Configuration |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
Monitoring and Capacity Planning |
|
|
338 | (1) |
|
|
338 | (1) |
Index |
|
339 | |