Zombie VM from whatis .com
|
A zombie
VM is a virtual machine that is created, often for a particular
purpose, and is forgotten when it is no longer needed for that purpose. As a
result, the VM continues to consume resources while performing no useful
work. The proliferation of zombie VMs in a data center is one of the main
causes of virtualization sprawl.
Virtual
machines can be created quickly and easily and only use a very small portion
of the physical infrastructure's resources to run. When virtual instances are
created faster than they are removed, however, the result is virtualization
sprawl. The irony of virtualization sprawl is that it can cancel out the
benefits that make virtualization attractive and cost-effective in the first
place, costing the company money by tying up operating system licenses,
servers and database resources without adding any value.
Most zombie VMs are simply temporary
virtual servers that have been forgotten due to lax tracking procedures.
Ideally, the creation of each VM should be documented, along with its purpose
and owner. When a VM is no longer required, it should be removed. Once
virtualization sprawl has occurred, it becomes necessary to differentiate
zombie VMs from the productive ones. Indications of a zombie VM include an
absence of recent support tickets and low CPU, network and disk utilization.
Zombie prevention requires both policies
and software tools. Management policies should be put in place to guide the
creation and retention of VMs and storage instances. Then, software tools can
be used to identify VM instance owners, report on recent usage and specify
how long resources have been idle. Ideally, VM governance tools will raise an
alert when a machine rests unused for a defined period of time and
automatically spin down the zombie and recover its licenses.
The zombie
VM's physical counterpart in the data center is the zombie server.
|
|
National
Cyber Awareness System:
04/09/2018 06:29 AM EDT
Original release date: April 09,
2018
The US-CERT
Cyber Security Bulletin provides a summary of new vulnerabilities that have
been recorded by the National
Institute of Standards and Technology (NIST) National
Vulnerability Database (NVD) in the past week. The NVD is sponsored
by the Department
of Homeland Security (DHS) National Cybersecurity and Communications Integration
Center (NCCIC) / United States Computer Emergency Readiness Team
(US-CERT). For modified or updated entries, please visit the NVD,
which contains historical vulnerability information. |
+++++++++++++++++++++
Good Netiquette
And A Green Internet To All! =====================================================================
Tabula Rosa Systems - Tabula Rosa
Systems (TRS) is dedicated to providing Best of Breed Technology and
Best of Class Professional Services to our Clients. We have a portfolio of products which we
have selected for their capabilities, viability and value. TRS provides
product, design, implementation and support services on all products that we
represent. Additionally, TRS provides expertise in Network Analysis, eBusiness
Application Profiling, ePolicy and eBusiness Troubleshooting.
We can be contacted at:
sales@tabularosa.net
or 609 818 1802.
===============================================================
In addition to
this blog, Netiquette IQ has a
website with great assets which are being added to on a regular basis. I have
authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive
Guide to Improve, Enhance and Add Power to Your Email". My new book,
“You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That
Job!” has just been published and will be followed by a trilogy of books on
Netiquette for young people. You can view my profile, reviews of the book and
content excerpts at:
Anyone who
would like to review the book and have it posted on my blog or website, please
contact me paul@netiquetteiq.com.
In
addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established
Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the
International Business Etiquette and Protocol Group and Minding Manners among
others. I regularly consult for the Gerson Lehrman Group, a worldwide network
of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous
publications and I have presented to groups such as The Breakfast Club of
NJ
and PSG of Mercer County
No comments:
Post a Comment