VMware vSphere 6.7: das umfassende Handbuch
Gespeichert in:
Späterer Titel: | Wöhrmann, Bertram VMware vSphere 7 |
---|---|
Beteiligte Personen: | , , , , , , , |
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2018
|
Ausgabe: | 5., aktualisierte und erweiterte Auflage |
Schriftenreihe: | Rheinwerk Computing
|
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=73bfc785fa2545dbaf754eaac08a0ec6&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030578989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | unterschiedliche Auflagenbezeichnung auf dem Umschlag (5. aktualisierte und erweiterte Auflage) und im Buch (1. Auflage) ; Titelzusatz auf dem Umschlag: Installation, Konfiguration, Administration ; vCenter ESXi und vCenter-Add-ons, vSphere integrated Container, VMware Cloud Foundation, vCenter Server Appliance mit vCenter HA ; Software-Defined Datacenter mit VMware: Netzwerk- und Storage-Virtualisierung, Backup, Ausfallsicherheit, Monitoring |
Umfang: | 1277 Seiten Illustrationen 24 cm x 19 cm |
ISBN: | 9783836263368 383626336X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045189835 | ||
003 | DE-604 | ||
005 | 20211103 | ||
007 | t| | ||
008 | 180913s2018 gw a||| |||| 00||| ger d | ||
015 | |a 18,N23 |2 dnb | ||
016 | 7 | |a 1160196664 |2 DE-101 | |
020 | |a 9783836263368 |c : EUR 89.90 (DE), EUR 92.50 (AT), CHF 115.90 (freier Preis) |9 978-3-8362-6336-8 | ||
020 | |a 383626336X |9 3-8362-6336-X | ||
024 | 3 | |a 9783836263368 | |
028 | 5 | 2 | |a Bestellnummer: 459/06336 |
035 | |a (OCoLC)1056964077 | ||
035 | |a (DE-599)DNB1160196664 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-M347 |a DE-523 |a DE-522 |a DE-91G |a DE-Aug4 |a DE-355 |a DE-20 |a DE-859 |a DE-1049 |a DE-898 | ||
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a DAT 309f |2 stub | ||
100 | 1 | |a Wöhrmann, Bertram |e Verfasser |4 aut | |
245 | 1 | 0 | |a VMware vSphere 6.7 |b das umfassende Handbuch |c Bertram Wöhrmann, Jan Große, Günter Baumgart, Thomas Schönfeld, Dennis Zimmer, Urs Stephan Alder, Frank Wegner, Jens Söldner |
250 | |a 5., aktualisierte und erweiterte Auflage | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2018 | |
300 | |a 1277 Seiten |b Illustrationen |c 24 cm x 19 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Rheinwerk Computing | |
500 | |a unterschiedliche Auflagenbezeichnung auf dem Umschlag (5. aktualisierte und erweiterte Auflage) und im Buch (1. Auflage) ; Titelzusatz auf dem Umschlag: Installation, Konfiguration, Administration ; vCenter ESXi und vCenter-Add-ons, vSphere integrated Container, VMware Cloud Foundation, vCenter Server Appliance mit vCenter HA ; Software-Defined Datacenter mit VMware: Netzwerk- und Storage-Virtualisierung, Backup, Ausfallsicherheit, Monitoring | ||
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Virtualisierung |0 (DE-588)4839180-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareplattform |0 (DE-588)4702244-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a VMware vSphere |0 (DE-588)1034526332 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a VMware vSphere 6.7 |0 (DE-588)1177398036 |2 gnd |9 rswk-swf |
653 | |a Migration | ||
653 | |a vMotion | ||
653 | |a Storage Motion | ||
653 | |a VMware Virtual SAN | ||
653 | |a vCenter | ||
653 | |a ESXi | ||
653 | |a Virtuelle Maschinen | ||
653 | |a Hybrid Cloud | ||
653 | |a Cloud Foundation | ||
653 | |a Software-Defined Data-Center | ||
689 | 0 | 0 | |a VMware vSphere |0 (DE-588)1034526332 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Virtualisierung |0 (DE-588)4839180-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Softwareplattform |0 (DE-588)4702244-9 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a VMware vSphere 6.7 |0 (DE-588)1177398036 |D s |
689 | 5 | |5 DE-604 | |
700 | 1 | |a Baumgart, Günter |e Verfasser |0 (DE-588)1046955330 |4 aut | |
700 | 1 | |a Alder, Urs Stephan |e Verfasser |4 aut | |
700 | 1 | |a Große, Jan |e Verfasser |0 (DE-588)1088453023 |4 aut | |
700 | 1 | |a Schönfeld, Thomas |e Verfasser |0 (DE-588)1168832136 |4 aut | |
700 | 1 | |a Wegner, Frank |e Verfasser |0 (DE-588)116883242X |4 aut | |
700 | 1 | |a Soeldner, Jens-Henrik |d 1977- |e Verfasser |0 (DE-588)1052279538 |4 aut | |
700 | 1 | |a Zimmer, Dennis |e Verfasser |0 (DE-588)1021707171 |4 aut | |
710 | 2 | |a Galileo Press |0 (DE-588)1065964404 |4 pbl | |
780 | 0 | 0 | |i Vorangegangen ist |z 978-3-8362-3816-8 |
785 | 0 | 0 | |i Gefolgt von |a Wöhrmann, Bertram |t VMware vSphere 7 |b 6., aktualisierte und erweiterte Auflage |d 2021 |z 978-3-8362-7578-1 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=73bfc785fa2545dbaf754eaac08a0ec6&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030578989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030578989 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 309f 2015 A 1661(5) |
---|---|
DE-BY-TUM_katkey | 2380598 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040008852957 |
_version_ | 1821932523751473152 |
adam_text | INHALT
GELEITWORT, VORWORTE UND
DANKSAGUNGEN................................................................................
29
1 EINLEITUNG
37
1.1
SERVER-VIRTUALISIERUNG..................................................................................................
37
1.1.1 WAS IST SERVER-VIRTUALISIERUNG?
.......................................................................
37
1.1.2 WAS IST EINE VIRTUELLE MASCHINE?
.....................................................................
38
1.1.3 WARUM VIRTUALISIERT M
AN?...............................................................................
38
1.1.4 GIBT ES AUCH NACHTEILE?
...................................................................................
39
1.1.5 WELCHE ARTEN DER VIRTUALISIERUNG GIBT ES?
......................................................
40
1.2 DIE
VMWARE-PRODUKTFAMILIE........................................................................................
41
1.2.1 VMWARE W
ORKSTATION.......................................................................................
41
1.2.2 VMWARE WORKSTATION
PLAYER............................................................................
42
1.2.3 VMWARE FUSION UND VMWARE FUSION
PROFESSIONAL.......................................... 42
1.2.4 VMWARE VSPHERE HYPERVISOR
(ESXI).................................................................
42
1.2.5 VMWARE
ESXI....................................................................................................
43
1.2.6 VMWARE
VSPHERE..............................................................................................
43
1.3 EINFUEHRUNG IN DIE
VMWARE-SERVER-VIRTUALISIERUNG...................................................
43
1.3.1 VMWARE
ESXI....................................................................................................
44
1.3.2 VMWARE VCENTER
SERVER...................................................................................
44
1.3.3 VMWARE VSPHERE WEB CLIENT UND VMWARE VSPHERE C LIE N
T............................ 44
1.3.4 VMWARE VIRTUAL SYMMETRIE MULTI PROCESSING (SMP)
......................................
45
1.3.5 VMWARE VSPHERE VIRTUAL MACHINE FILE SYSTEM (VMFS)
..................................
45
1.3.6 VMWARE VIRTUAL SAN (VSAN)
............................................................................
45
1.3.7 VMWARE VSPHERE VIRTUAL VOLUMES
(VVOLS)..................................................... 45
1.3.8 VMWARE VSPHERE STORAGE THIN
PROVISIONING................................................... 46
1.3.9 VMWARE FAULT
TOLERANCE..................................................................................
46
1.3.10 VMWARE VSPHERE VMOTION UND STORAGE VM O TIO N
...........................................
46
1.3.11 VMWARE VSPHERE HIGH AVAILABILITY (H A
).......................................................... 46
1.3.12 VMWARE VSPHERE DISTRIBUTED RESOURCE SCHEDULER
(DRS)................................ 46
1.3.13 VMWARE VSPHERE DISTRIBUTED POWER MANAGEMENT (DPM)
............................
47
1.3.14 VMWARE VSPHERE STORAGE
DRS.........................................................................
47
1.3.15 VMWARE VSPHERE STORAGE
API..........................................................................
47
1.3.16 VMWARE VSPHERE STANDARD SWITCH (VSWITCH), DISTRIBUTED SWITCH
(DVSWITCH, VDS) UND PORT-GRUPPEN
..................................................................
47
1.3.17 VMWARE VSPHERE STORAGE I/O CONTROL UND VMWARE VSPHERE
NETWORK I/O CONTROL
.........................................................................................
48
1.3.18 VMWARE VSPHERE STORAGE POLICY-BASED MANAGEMENT (SPBM)
.......................
48
1.3.19 VMWARE VSPHERE FLASH READ CACHE (VFRC)
......................................................
48
1.3.20 VMWARE VSPHERE HOST-PROFILES
........................................................................
48
1.3.21 VMWARE VSPHERE VSHIELD
ENDPOINT..................................................................
48
1.3.22 VMWARE CLOUD ON AW
S.....................................................................................
48
1.3.23 VMWARE VSPHERE UPDATE MANAGER (VUM)
......................................................
48
1.3.24 VMWARE VSPHERE CONTENT
LIBRARY....................................................................
49
1.3.25 VMWARE VREALIZE
ORCHESTRATOR.........................................................................
49
1.3.26 VMWARE VSPHERE DATA PROTECTION (VDP) (END OF AVAILABILITY)
........................
49
1.3.27 VMWARE VSPHERE REPLICATION
...........................................................................
49
1.3.28 VMWARE VCENTER HIGH
AVAILABILITY...................................................................
49
1.3.29 VMWARE PLATFORM SERVICES CONTROLLER
(PSC)..................................................... 49
1.3.30 VMWARE VCENTER SERVER LINKED M
ODE.............................................................. 49
1.3.31 VMWARE HYBRID LINKED M O D E
...........................................................................
50
1.3.32 VMWARE VSPHERE AUTO
DEPLOY..........................................................................
50
1.3.33 VMWARE VSPHERE SDKS UND
TOOLS.....................................................................
50
1.3.34
VMWARE-VSPHERE-EDITIONEN.............................................................................
51
2 VSPHERE-ARCHITEKTUR
53
2.1 INFRASTRUKTURBESTANDTEILE EINES SOFTWARE-DEFINED DATACENTERS (SDDC)
...............
53
2.2
VSPHERE-HOST..................................................................................................................
54
2.2.1
HARDWARE..........................................................................................................
54
2.2.2 HARDWARE COMPATIBILITY LIST
(HCL)...................................................................
55
2.3 ARCHITEKTUR EINES VSPHERE-HOSTS
................................................................................
55
2.4 GRUNDLAGEN DER
CPU-VIRTUALISIERUNG...........................................................................
57
2.4.1
CPU-AFFINITAET.....................................................................................................
59
2.4.2
HYPERTHREADING.................................................................................................
59
2.4.3 VIRTUAL SMP
(VSMP)...........................................................................................
60
2.4.4 BEST
PRACTICES.....................................................................................................
65
2.5 GRUNDLAGEN DER
MEMORY-VIRTUALISIERUNG..................................................................
66
2.5.1 VIRTUAL MACHINE M EM
ORY............................................. 67
2.5.2 MEMORY-OVERHEAD
...........................................................................................
67
2.5.3
MEMORY-OVERCOMMITMENT..............................................................................
68
2.5.4 MEMORY-COMPRESSION
.....................................................................................
68
2.5.5 CONTENT-BASED
PAGE-SHARING...........................................................................
68
2.5.6
MEMORY-BALLOONING.........................................................................................
69
2.5.7
MEMORY-SWAPPING...........................................................................................
70
2.5.8 BEST
PRACTICES...................................................................................................
70
2.6 GRUNDLAGEN DER
HARDWAREVIRTUALISIERUNG.................................................................
71
2.7 MANAGEMENT EINER VIRTUELLEN
VSPHERE-LNFRASTRUKTUR............................................... 72
2.7.1 PLATFORM SERVICES CONTROLLER
(PSC)...................................................................
73
2.7.2 ENHANCED LINKED M
ODE....................................................................................
74
2.7.3 EMBEDDED LINKED M ODE
..................................................................................
78
2.7.4 VCENTER
SERVER..................................................................................................
78
2.8 MAXIMALE
AUSSTATTUNG.................................................................................................
92
3 VMOTION UND STORAGE VMOTION S?
3.1 VM
OTION..........................................................................................................................
99
3.1.1 DIE GRUNDSAETZLICHE FUNKTIONSWEISE VON VMOTION
..........................................
101
3.1.2 VORAUSSETZUNGEN FUER EIN ERFOLGREICHES VMOTION
............................................
106
3.1.3
VMOTION-SPEZIALFUNKTIONEN.............................................................................
114
3.1.4
BEDIENUNG........................................................................................................
136
3.1.5
SICHERHEIT..........................................................................................................
139
3.1.6
PROBLEMFAELLE.....................................................................................................
140
3.1.7 VMOTION CONFIGURATION MAXIMUMS UND SUPPORT
...........................................
147
3.1.8
LIZENZIERUNG.....................................................................................................
148
3.2 STORAGE VM O TIO N
...........................................................................................................
148
3.2.1 FUNKTIONSWEISE
................................................................................................
149
3.2.2
VORAUSSETZUNGEN.............................................................................................
154
3.2.3 STORAGE-VMOTION-FUNKTIONEN UND M ETHODEN
................................................
156
3.2.4
BEDIENUNG........................................................................................................
157
3.2.5
PROBLEMFAELLE.....................................................................................................
162
3.2.6
TROUBLESHOOTING...............................................................................................
164
3.2.7 STORAGE VMOTION CONFIGURATION M AXIM UM
S................................................... 165
3.2.8
LIZENZIERUNG.....................................................................................................
165
4.1
CLUSTER-OBJEKT...............................................................................................................
167
4.1.1 EINEN CLUSTER
ANLEGEN.......................................................................................
167
4.1.2 DER EVC-MODE (ENHANCED VMOTION COMPATIBILITY M ODE)
...............................
168
4.2
HA-CLUSTER......................................................................................................................
171
4.2.1 TECHNOLOGIE-UEBERSICHT
.....................................................................................
172
4.2.2 VORAUSSETZUNGEN FUER H A
..................................................................................
176
4.2.3
HA-KOMPONENTEN.............................................................................................
178
4.2.4 LIZENZIERUNG VON H
A..........................................................................................
178
4.2.5 EINRICHTUNG VON
HA...........................................................................................
178
4.2.6 GEMEINSAMER EINSATZ VON UNTERSCHIEDLICHEN
ESXI-VERSIONEN........................ 183
4.2.7 HA ADVANCED
OPTIONS.......................................................................................
183
4.2.8 VIRTUAL MACHINE O P
TIONS..................................................................................
187
4.2.9 DER HA-AGENT (ODER: WAS PASSIERT BEIM HINZUFUEGEN EINES ESXI-HOSTS
ZUM
HA-CLUSTER?)..............................................................................................
190
4.2.10 RECONFIGURE FOR VSPHERE H A
.............................................................................
192
4.2.11 DAS VERHALTEN EINES
HA-CLUSTERS......................................................................
192
4.2.12
HA-SLOT-BERECHNUNG.........................................................................................
193
4.2.13 HA-MASTER- UND
-SLAVE-AGENTS.........................................................................
195
4.2.14 HA-HOST-ISOLATION
.............................................................................................
196
4.2.15 HA UND GETRENNTE (DISCONNECTED)
ESXI-SERVER................................................. 197
4.2.16 HA UND DNS
......................................................................................................
198
4.2.17 HA IM VSPHERE-CLIENT (ODER: DER CLUSTER TREIBT S B U N
T...)................................ 198
4.2.18 HA-LIMITIERUNGEN M IT
VSPHERE.........................................................................
199
4.2.19 HA VIRTUAL MACHINE M
ONITORING.......................................................................
199
4.2.20 HOST-MONITORING DER STORAGE-ANBINDUNGEN
...................................................
203
4.3
DRS-CLUSTER....................................................................................................................
206
4.3.1 TECHNOLOGIE-UEBERSICHT
.....................................................................................
206
4.3.2 LIZENZIERUNG VON
DRS........................................................................................
208
4.3.3 EINEN DRS-CLUSTER
ANLEGEN...............................................................................
208
4.3.4 PRIORITAETEN-RANKING
..........................................................................................
209
4.3.5 DRS AUTOMATION
LEVEL......................................................................................
209
4.3.6 DRS GROUPS
MANAGER........................................................................................
213
4.3.7 DRS AFFINITY RULES
.............................................................................................
215
4.3.8 DRS VIRTUAL MACHINE OPTIONS
...........................................................................
219
4.3.9 DRS UND
RESSOURCEN-POOLS................................................................................
220
4.3.10 DRS UND DER
MAINTENANCE-MODUS...................................................................
220
4.3.11 DRS-LIMITIERUNGEN M IT
VSPHERE.......................................................................
221
4.3.12 DPM (DISTRIBUTED POWER
MANAGEMENT)..........................................................
221
4.3.13 HA UND DRS IN
KOMBINATION............................................................................
223
5 INSTALLATION VON ESXI UND VCENTER
225
5.1 VMWARE VSPHERE 6 .7
....................................................................................................
225
5.1.1
VMWARE-VSPHERE-SYSTEMVORAUSSETZUNGEN....................................................
225
5.1.2 DOWNLOAD DER
INSTALLATIONSMEDIEN.................................................................
228
5.1.3 VORDER INSTALLATION
..........................................................................................
230
5.1.4 LOKALE INSTALLATION
............................................................................................
231
5.1.5 DER ERSTE START VON VSPHERE 6 .7
.......................................................................
237
5.1.6 INSTALLATION UEBER DAS
NETZWERK........................................................................
239
5.1.7 INSTALLATION IM FCOE BZW. SAN
.........................................................................
239
5.1.8 INSTALLATION IN DER VIRTUELLEN M ASCHINE
...........................................................
241
5.2 UPGRADE AUF VSPHERE 6 .7
.............................................................................................
241
5.2.1 UPGRADE VON DER VERSION ESX 6.0 BZW. 6.5 AUF ESXI 6 .7
..................................
242
5.3 QUICK BOOT ESXI
............................................................................................................
249
5.4 INSTALLATION DES PLATFORM SERVICES CONTROLLER
...........................................................
250
5.4.1 INSTALLATION DES PSC ALS
APPLIANCE...................................................................
250
5.4.2 INSTALLATION DES PSC AUF WINDOW
S................................................................... 266
5.5 PATCHEN DES
PSC............................................................................................................
270
5.5.1 PATCHEN DER
PSC-APPLIANCE..............................................................................
270
5.5.2 PATCHEN DES PSC AUF
WINDOWS.........................................................................
272
5.6 UPGRADE DES
PSC............................................................................................................
272
5.6.1 UPGRADE DER
PSC-ARCHITEKTUR...........................................................................
272
5.6.2 UPGRADE DES PSC ALS
APPLIANCE........................................................................
274
5.6.3 UPGRADE DES PSC AUF
WINDOWS........................................................................
282
5.7 INSTALLATION DES VMWARE VSPHERE VCENTER
...............................................................
285
5.7.1 INSTALLATION DES VCENTER ALS
APPLIANCE............................................................
286
5.7.2 INSTALLATION VON VCENTER UNTER W INDOW
S........................................................ 302
5.8 PATCHEN DES VCENTER
SERVERS.......................................................................................
310
5.9 UPGRADE DES VCENTER
SERVERS......................................................................................
310
5.9.1 UPGRADE DER VCSA VON 6.0 BZW.
6.5................................................................. 311
5.9.2 VCENTER SERVER UPGRADE
(WINDOWS-BASIERT)....................................................
321
5.10 MIGRATION VOM WINDOWS-VCENTER ZUR VCENTER SERVER
APPLIANCE........................... 321
5.11 ALL-IN-ONE-LNSTALLATION VON VCENTER SERVER
............................................................... 328
5.11.1 VCENTER SERVER APPLIANCE ALL IN O N E
................................................................. 328
5.11.2 VCENTER SERVER WINDOWS ALL IN O N E
.................................................................
328
5.12 UPGRADE VCENTER SERVER ALL IN O N E
..............................................................................
328
5.13
VCENTER-SERVER-KOMPONENTEN.....................................................................................
329
5.13.1 INSTALLATION DES VCENTER UPDATE M
ANAGERS..................................................... 329
5.13.2 INSTALLATION DES DOWNLOAD-MANAGERS OHNE UPDATE M ANAGER
.......................
332
5.13.3 VMWARE VSPHERE REPLICATION
...........................................................................
334
5.13.4 VMWARE IMAGE BUILDER
.....................................................................................
336
5.13.5 VMWARE VSPHERE AUTHENTICATION
PROXY........................................................... 338
5.13.6 POWE RC
LI............................................................................................................
338
5.13.7
ZERTIFIKATE..........................................................................................................
342
5.14 VMWARE VCENTER CONVERTER
STANDALONE.....................................................................
349
5.15 HOCHVERFUEGBARKEIT FUER VCENTER SERVER UND
KOMPONENTEN...................................... 350
5.15.1 DER PLATFORM SERVICES CONTROLLER
......................................................................
351
5.15.2 VCENTER HA FUER DIE
VCSA...................................................................................
352
5.15.3 HOCH VERFUEGBARKEIT M IT EINEM MICROSOFT-CLUSTER FUER DAS VC
ENTER.................. 361
5.16
LIZENZIERUNG....................................................................................................................
361
5.16.1 LIZENZIERUNG VON
VSPHERE..................................................................................
362
6 VERWALTUNGSMOEGLICHKEITEN 363
6.1 DIE LOKALE HOST-KONSOLE
...............................................................................................
363
6.2 ZUGRIFF AUF DIE HOST-KONSOLE PER
SSH..........................................................................
364
6.3 DIE WEBOBERFLAECHE DES
HOSTS......................................................................................
365
6.4 DIE LOKALE
VCSA-KONSOLE...............................................................................................
366
6.5 ZUGRIFF AUF DIE VCSA PER
SSH........................................................................................
367
6.6 DIE WEBOBERFLAECHE DER
VCSA.......................................................................................
368
6.7 VSPHERE C
LIENT................................................................................................................
368
6.8 DER ESXI EMBEDDED HOST CLIENT - EINE
VSPHERE-CLIENT-ALTERNATIVE....................... 368
6.9 VSPHERE WEB
CLIENT.......................................................................................................
369
6.9.1 ADMINISTRATION DES
VCENTERS............................................................................
372
6.10 ADMINISTRATION UEBER MOBILE G E RAETE
...........................................................................
376
6.11 DER PLATFORM SERVICES CONTROLLER
.................................................................................
377
6.12 VCENTER
SERVER...............................................................................................................
377
6.12.1 ZUGRIFF AUF DEN VCENTER
SERVER.........................................................................
377
6.12.2 VERLINKEN VON VCENTER
SERVERN.........................................................................
378
6.12.3 HINZUFUEGEN VON ESXI-HOSTS ZUM
VCENTER....................................................... 379
6.12.4 VERWALTUNG VON
VSPHERE-HOSTS.......................................................................
380
6.12.5 WEITERE FUNKTIONEN DES VCENTER
SERVERS........................................................ 381
6.12.6 EINBINDUNG INS ACTIVE
DIRECTORY......................................................................
382
6.12.7 TROUBLESHOOTING DES VCENTER
SERVERS..............................................................
385
6.13 DAS REMOTE COMMAND-LINE
INTERFACE.......................................................................
387
6.14 VMWARE VSPHERE
POWERCU.........................................................................................
387
7 DAS NETZWERK IN VMWARE VSPHERE
391
7.1 GRUNDSAETZLICHE
PLANUNGSASPEKTE...............................................................................
391
7.1.1 GUTES NETZWERKDESIGN
....................................................................................
391
7.1.2 1- UND 10-GIGABIT-LAN UND DIE MAXIMALE ANZAHL PHYSISCHER NICS
...............
392
7.1.3 1- UND 10-GBIT-TECHNOLOGIE VERSUS LOAD-BALANCING UND
VERKEHRSMUSTERKONTROLLE.................................................................................
393
7.1.4 WIE VIEL BANDBREITE BENOETIGE ICH IN DER PRAXIS W
IRKLICH?................................ 393
7.1.5 VLANS ODER KEINE
VLANS?................................................................................
394
7.1.6 PHYSISCHE SWITCHES KOENNEN DIE LOAD-BALANCING-POLICY
BEEINFLUSSEN............. 395
7.1.7 LINKS ZWISCHEN DEN PHYSISCHEN
SWITCHES........................................................ 396
7.2 DIE PHYSISCHEN UND VIRTUELLEN
NETZWERKSCHICHTEN.................................................. 396
7.2.1
NETZWERKKARTEN................................................................................................
396
7.2.2
SWITCHES............................................................................................................
397
7.2.3 P O
RT...................................................................................................................
397
7.2.4 PORT G
ROUP........................................................................................................
397
7.3 DIE PHYSISCHEN NETZWERKKARTEN IM
HOST...................................................................
399
7.4 VSS UND VDS
- EINE
GEGENUEBERSTELLUNG.....................................................................
401
7.4.1 DIE EIGENSCHAFTEN DER VSWITCH-TYPEN IM UEBERBLICK
.......................................
402
7.4.2 DIE BEIDEN
VSWITCH-TYPEN...............................................................................
403
7.4.3 DER SWITCH-TEIL BEI VSS UND
VDS......................................................................
405
7.4.4 PORT GROUPS BEI VSS UND
VDS............................................................................
406
7.4.5 PORTS BEI VSS UND
VDS.......................................................................................
407
7.4.6 DIE
LAYER-2-SECURITY-POLICYS.............................................................................
407
7.4.7 TRAFFIC
SHAPING.................................................................................................
408
7.4.8 DIE VLAN-EINSTELLUNGEN DER
VSWITCH-TYPEN.................................................... 410
7.4.9 DIE NIC-TEAMING- UND DIE LOAD-BALANCING-POLICYS DER VSWITCH-TYPEN
.........
413
7.4.10 DIE ARBEITSWEISE DER LOAD-BALANCING-POLICYS
..................................................
414
7.4.11 CDP - CISCO DISCOVERY PROTOCOL DER VSWITCH-TYPEN
.........................................
420
7.4.12 CONFIGURATION MAXIMUMS FUER VSS UND VD S
..................................................... 421
7.5 ARBEITEN MIT DEM VNETWORK STANDARD SWITCH
(VSS)................................................. 422
7.5.1 DER VSS IST HOST-BEZOGEN
.................................................................................
422
7.5.2 DIE KONFIGURATIONSMOEGLICHKEITEN ZUM
VSS...................................................... 423
7.5.3 EINSTELLUNGEN AUF DEM SWITCH ODER DEN PORT
GROUPS...................................... 424
7.6 ARBEITEN MIT DEM VNETWORK DISTRIBUTED SWITCH (VDS)
............................................
426
7.6.1 DER VDS EXISTIERT IM VCENTER UND IM H OST
.......................................................
426
7.6.2 DIE KONFIGURATIONSMOEGLICHKEITEN DES
VDS....................................................... 427
7.6.3 EINSTELLMOEGLICHKEITEN AUF DEM VDS-SWITCH-TEIL
.............................................
430
7.6.4 PRIVATE VLANS
......................................................................
434
7.6.5 EINSTELLMOEGLICHKEITEN AUF DER DISTRIBUTED PORT GROUP
....................................
436
7.6.6 NETWORK I/O CONTROL
.........................................................................................
441
7.6.7 N ETFLOW
.............................................................................................................
445
7.6.8 PORT M
IRRORING....................................................................................................
449
7.7 DIE MIGRATION VON VSS AUF
VDS.....................................................................................
454
7.8 MANAGEMENT-NETZWERK
-
REPARATURFUNKTIONEN......................................................
463
7.9
ARCHITEKTUR-BEISPIELE.....................................................................................................
466
7.9.1 EMPFEHLUNGEN UND BEST
PRACTICES....................................................................
466
7.9.2 BEISPIEL AUF BASIS VERFUEGBARER PORTS IM
SERVER................................................. 471
7.9.3 BEISPIEL 1 - ESXI-HOSTS MIT ZWEI
NETZWERK-PORTS............................................ 471
7.9.4 BEISPIEL 2 - ESXI-HOSTS MIT VIER NETZWERK-PORTS
.............................................
472
7.9.5 BEISPIEL 3 - ESXI-HOSTS M IT SECHS
NETZWERK-PORTS........................................... 473
8 NETZWERKVIRTUALISIERUNG MIT VM WARE NSX DATA
CENTER FOR VSPHERE (NSX-V)
477
8.1 VMWARE NSX-V IM
UEBERBLICK.......................................................................................
478
8.1.1 FUNKTIONALITAETEN VON NSX-V IM UEBERBLICK
.......................................................
479
8.1.2
LIZENZIERUNG......................................................................................................
480
8.2 EXKURS: DAS
VXLAN-PROTOKOLL......................................................................................
480
8.2.1 WAS IST VXLAN UND WARUM WIRD ES
BENOETIGT?................................................. 481
8.2.2 DIE GRUNDIDEE VON VXLAN
................................................................................
481
8.3 DIE ARCHITEKTUR VON
NSX-V...........................................................................................
484
8.3.1 DIE VERWALTUNGSSCHICHT IN
NSX-V....................................................................
486
8.3.2 DIE STEUERSCHICHT IN
NSX-V..............................................................................
488
8.3.3 DIE DATENSCHICHT IN
NSX-V...............................................................................
489
8.3.4 DIE ROLLE DES PHYSISCHEN NETZWERKS FUER
NSX-V............................................... 490
8.3.5 CLOUD-MANAGEMENT-PLATTFORMEN ALS OPTIONALE ERWEITERUNG VON NSX-V
......
490
8.3.6 DIE NSX-V-ARCHITEKTUR IM GESAMTZUSAMMENHANG
.......................................
491
8.4 DIE KOMPONENTEN VON
NSX-V.....................................................................................
492
8.4.1 DER NSX M
ANAGER.............................................................................................
492
8.4.2 DER NSX CONTROLLER
CLUSTER...............................................................................
493
8.4.3 DAS VX
LAN-PROTOKOLL........................................................................................
493
8.4.4 DIE ESXI-SERVER UND DER DISTRIBUTED S W
ITCH.................................................... 493
8.4.5 DER DISTRIBUTED LOGICAL ROUTER (DLR)
............................................................... 493
8.4.6 DIE NSX EDGE SERVICE
GATEWAYS......................................................................
494
8.4.7 DIE
VXLAN-TRANSPORT-ZONE..............................................................................
494
8.4.8 DIE DISTRIBUTED FIREWALL
(DFW)........................................................................
494
8.5 DIE EINRICHTUNG VON NSX-V VORBEREITEN
....................................................................
495
8.5.1 FLARDWAREANFORDERUNGEN VON
NSX-V............................................................... 496
8.5.2 SOFTWAREANFORDERUNGEN VON NSX-V
................................................................
497
8.5.3 WEITERE ANFORDERUNGEN VON NSX-V
................................................................
497
8.6 DIE NSX-V-LNSTALLATION
................................................................................................
497
8.6.1 EINRICHTUNG DES NSX MANAGERS
.......................................................................
498
8.6.2 VERBINDUNG VON NSX MANAGER UND
VCENTER................................................... 502
8.6.3 BEREITSTELLUNG DER
NSX-CONTROLLER...................................................................
504
8.6.4 VORBEREITUNG DER ESXI-SERVER
..........................................................................
512
8.6.5 ABSCHLIESSEN DER GRUNDKONFIGURATION: DIE
VXLAN-EINRICHTUNG...................... 514
8.7 BENUTZUNG VON NSX-V ANHAND EINER BEISPIELHAFTEN NETZWERKTOPOLOGIE
............
524
8.7.1 ANLEGEN DER LOGISCHEN SWITCHES
......................................................................
526
8.7.2 VIRTUELLE MASCHINEN AUF LOGISCHE SWITCHES UMZIEHEN
...................................
529
8.7.3 DIE VXLAN-KONFIGURATION AUF KORREKTHEIT
PRUEFEN........................................... 532
8.7.4 EINEN DISTRIBUTED LOGICAL ROUTER FUER DAS EAST-WEST-ROUTING
ERSTELLEN
.........
534
8.7.5 EIN EDGE SERVICES GATEWAYS FUER DAS ROUTING DES NORTH-SOUTH-
NETZWERKVERKEHRS ERSTELLEN
.............................................................................
544
8.7.6 ERWEITERTE KONFIGURATION VON
DLR...................................................................
552
8.7.7 ERWEITERTE KONFIGURATION VON NSX EDGE SERVICES GATEWAYS (NSX
EDGES)
......
557
8.7.8 DIE DISTRIBUTED FIREWALL EINRICHTEN
.................................................................
564
8.8 ZUSAMMENFASSUNG UND
AUSBLICK................................................................................
569
9.1 LOKALE MEDIEN
..................................................................................
571
9.1.1
SATA...................................................................................................................
572
9.1.2 SCSI UND
SAS......................................................................................................
574
9.1.3 FIBRE-CHANNEL (FC)
............................................................................................
575
9.1.4 IDE
......................................................................................................................
575
9.1.5
SSD.....................................................................................................................
575
9.1.6
USB.....................................................................................................................
578
9.1.7
CACHE.................................................................................................................
579
9.2 DIE WAHL: BLOCK ODER
FILE?............................................................................................
579
9.3 STORAGE AREA NETWORK - WAS IST EIGENTLICH EIN SAN ?
...............................................
581
9.4 IN FIN IB A N D
.......................................................................................................................
583
9.5 K O M M U NIKA TION
.............................................................................................................
584
9.5.1 KOMMUNIKATIONSADAPTER
.................................................................................
584
9.5.2 DER IN ITIA TO
R.......................................................................................................
584
9.5.3 DAS
TARGET..........................................................................................................
588
9.5.4 LOGICAL UNIT NUMBER
(LUN)...............................................................................
589
9.5.5 PFAD MANAGEMENT (ACTIVE/ACTIVE, ACTIVE/PASSIVE)
..........................................
590
9.6
FC-SPEICHERNETZWERK.....................................................................................................
593
9.6.1 VORTEILE UND NACHTEILE
......................................................................................
594
9.6.2 SUPPORT-M
ATRIX.................................................................................................
595
9.6.3 SWITCH VS.
LOOP..................................................................................................
595
9.6.4
FABRIC.................................................................................................................
596
9.6.5
VERKABELUNG.......................................................................................................
596
9.6.6 Z
ONING................................................................................................................
597
9.6.7 M
APPING............................................................................................................
598
9.6.8 NPIV (N-PORT ID V
IRTUALIZATION).........................................................................
599
9.7
FCOE.................................................................................................................................
599
9.8
ISCSI-SPEICHERNETZWERK.................................................................................................
601
9.8.1 VORTEILE UND NACHTEILE
......................................................................................
602
9.8.2
KOMMUNIKATION.................................................................................................
603
9.8.3
IP-SAN-TRENNUNG...............................................................................................
604
9.9 N ETWORK FILE SYSTEM
(NFS)............................................................................................
605
9.10 FLASH-BASIERTER
SPEICHER................................................................................................
609
9.10.1
VMFS-DATASTORE................................................................................................
610
9.10.2
HOST-CACHE........................................................................................................
610
9.10.3 WESTERN DIGITAL SANDISK FUSIONIO FLASHSOFT
.............................................
611
9.11
VMWARE-STORAGE-ARCHITEKTUR.....................................................................................
614
9.11.1
VMKERNEL-STORAGE-STACK..................................................................................
615
9.11.2 VIRTUAL FLASH RESOURCE
CAPACITY.......................................................................
620
9.11.3
FESTPLATTENDATEIEN...........................................................................................
625
9.11.4 AUSLAGERUNGSDATEIEN
.......................................................................................
634
9.11.5 VMFS IM D
ETAIL.................................................................................................
636
9.11.6 VIRTUELLE MASCHINEN
.........................................................................................
650
9.11.7 VMWARE-SNAPSHOTS
.........................................................................................
654
9.11.8
VM-SPEICHERPROFILE..........................................................................................
658
9.12 VAAI
................................................................................................................................
659
9.12.1 VAAI-EINSCHRAENKUNGEN
....................................................................................
660
9.13 STORAGE I/O
CONTROL.......................................................................................................
661
9.13.1
VORAUSSETZUNGEN..............................................................................................
661
9.13.2
KONFIGURATION...................................................................................................
662
9.14
VASA...............................................................................................................................
665
9.15 VMWARE VSPHERE VIRTUAL
VOLUMES..............................................................................
666
9.15.1 SOFTWARE DEFINED STORAGE
...............................................................................
666
9.15.2 ARCHITEKTUR VON VIRTUAL VOLUMES
.....................................................................
668
9.15.3 VVOLS AN EINEM PRAKTISCHEN
BEISPIEL...............................................................
671
9.15.4
VVOL-BEST-PRACTICES..........................................................................................
679
9.16 BEST PRACTICES ZUM THEMA
STORAGE..............................................................................
682
9.16.1
RAID-LEISTUNGSFAEHIGKEIT...................................................................................
682
9.16.2
RAID-GROESSE.......................................................................................................
684
9.16.3 GESCHWINDIGKEIT VS.
KAPAZITAET.........................................................................
685
9.16.4
LUN-GROESSE........................................................................................................
686
9.16.5 RAID-REBUILD
...................................................................................................
687
9.17 RDMA
- REMOTE DIRECT MEMORY
ACCESS.....................................................................
687
9.18 PMEM
- PERSITANT MEMORY NVDIMM-UNTERSTUETZUNG
..............................
689
10 VM WARE VSAN SSI
10.1 DIE WICHTIGSTEN NEUERUNGEN IN VSAN 6 . 7
.................................................................
692
10.2 AUFBAU UND
KONZEPT....................................................................................................
693
10.2.1
VORAUSSETZUNGEN..............................................................................................
694
10.3 FUNKTIONEN UND
EIGENSCHAFTEN....................................................................................
696
10.3.1
VSAN-CACHE......................................................................................................
699
10.3.2 VSAN-GERAETE UND
DISK-GROUPS.........................................................................
700
10.3.3
SKALIERBARKEIT.....................................................................................................
700
10.3.4
RESSOURCENBEDARF.............................................................................................
701
10.3.5 DATENSCHUTZMECHANISMUS UND FAULT DOM AINS
..............................................
701
10.3.6 UEBERWACHUNG VON
VSAN...................................................................................
702
10.4 TOPOLOGIEN
......................................................................................................................
703
10.4.1
BASIS-TOPOLOGIE..................................................................................................
703
10.4.2 REMOTE UND BRANCH-OFFICE (ROBO)
..................................................................
703
10.4.3 VIRTUAL SAN STRETCHED
CLUSTER...........................................................................
704
10.4.4 TOPOLOGIE M IT DREI RECHENZENTREN
...................................................................
705
10.4.5
MULTI-PROZESSOR-FT............................................................................................
706
10.4.6
APPLIKATIONSCLUSTER............................................................................................
706
10.5
SIZING................................................................................................................................
707
10.5.1
KAPAZITAETSPLANUNG............................................................................................
707
10.5.2
NETZWERKVORAUSSETZUNGEN...............................................................................
707
10.6 EIN VSAN MIT BASIS-TOPOLOGIE EINRICHTEN
...................................................................
708
10.6.1
NETZWERKKONFIGURATION.....................................................................................
708
10.6.2 VSAN
EINRICHTEN.................................................................................................
715
10.7 VM STORAGE POLICIES FUER VIRTUAL SA N
............................................................................
721
10.7.1
TESTINSTALLATION...................................................................................................
724
10.8 VSAN
OBSERVER................................................................................................................
724
11 KONFIGURATION VON ESXI UND VCENTER
I N
11.1
HOST-PROFILE.....................................................................................................................
727
11.1.1 ERSTELLEN EINES
HOST-PROFILS...............................................................................
729
11.1.2 ANPASSEN EINES HOST-PROFILS
.............................................................................
730
11.1.3 HOST BZW. CLUSTER M IT EINEM PROFIL ASSOZIIEREN
...............................................
732
11.1.4 ANWENDEN EINES
HOST-PROFILS............................................................................
733
11.1.5
PROFILE-COMPLIANCE............................................................................................
734
11.2
NTP...................................................................................................................................
734
11.2.1 NTP UNTER ESXI
..................................................................................................
735
11.2.2 NTP IN DER VIRTUELLEN MASCHINE MITHILFE VON VMWARE TOOLS
EINSTELLEN ........... 737
11.2.3 PROBLEME M IT DER
ZEITSYNCHRONISATION.............................................................
738
11.3 D N S
..................................................................................................................................
741
11.3.1
ROUTING/GATEWAY...............................................................................................
741
11.4 EINRICHTUNG VON
RESSOURCEN-POOLS..............................................................................
742
11.4.1 ERSTELLUNG EINES RESSOURCEN-POOLS
................................................................
742
11.4.2
RESERVATION.....................................................................................................
743
11.4.3 L IM
IT................................................................................................................
744
11.4.4
EXPANDABLE.....................................................................................................
744
11.4.5
SHARES..............................................................................................................
745
11.5 VAAWARE V A P P
...............................................................................................................
746
11.5.1 ERSTELLEN EINER VA
PP........................................................................................
746
11.5.2 VERKNUEPFUNG EINER VAPP M IT VIRTUELLEN SERVERN
...........................................
748
11.5.3
VAPP-EINSTELLUNGEN.........................................................................................
750
11.5.4 KLONEN EINER VA P P
..........................................................................................
753
11.5.5 AUTOMATISCHES STARTEN UND STOPPEN DER VMS MIT DEM H OST
........................
755
11.6
VSPHERE-SECURITY...........................................................................................................
756
11.6.1 OEFFNEN UND SCHLIESSEN EINES PORTS M IT DEM VSPHERE WEB C LIENT
...................
760
11.6.2
HOSTABSICHERUNG.............................................................................................
761
11.7
LIZENZ-SERVER..................................................................................................................
763
11.7.1 KONFIGURATION DES
VCENTER-LIZENZ-SERVERS.....................................................
763
11.8 H ARDW
ARE........................................................................................................................
766
11.9 ERWEITERTE S O FTW A RE KON FIG URATIO N
.............................................................................
771
11.9.1 VIRTUAL
MACHINES.............................................................................................
771
11.9.2
SYSTEMEINSTELLUNGEN......................................................................................
772
11.10 VIRTUAL F LASH
...................................................................................................................
779
11.11
VCENTER-BERECHTIGUNGEN..............................................................................................
782
11.11.1
ROLLEN..............................................................................................................
784
11.11.2
BENUTZEREINRICHTEN........................................................................................
787
11.12
VCENTER-KONFIGURATIONSEINSTELLUNGEN.......................................................................
790
11.12.1
STATISTICS.........................................................................................................
791
11.12.2 DATENBANKEINSTELLUNGEN
...............................................................................
792
11.12.3 RUNTIME
SETTINGS............................................................................................
793
11.12.4 USER
DIRECTORY.................................................................................................
793
11.12.5 MAIL
.................................................................................................................
794
11.12.6 SNMP
RECEIVERS..............................................................................................
794
11.12.7
PORTS................................................................................................................
795
11.12.8 TIMEOUT
SETTINGS............................................................................................
796
11.12.9 LOGGING S
ETTINGS.............................................................................................
796
11.12.10 SSL SETTINGS
....................................................................................................
797
11.12.11
LICENSING.........................................................................................................
798
11.12.12 MESSAGE O FTHE D A Y
........................................................................................
798
11.12.13 ADVANCED
SETTINGS...........................................................................................
799
11.12.14 KEY MANAGEMENT
SERVER.................................................................................
800
11.12.15 STORAGE
PROVIDERS.............................................................................................
800
11.13 DAS MENUE IM HOME-SCREEN DES VCENTERS
..................................................................
801
11.13.1 CONTENT
LIBRARIES.............................................................................................
801
11.13.2 POLICIES AND
PROFILES.........................................................................................
804
11.13.3 VREALIZE
OPERATIONS.........................................................................................
809
11.13.4 UPDATE M
ANAGER.............................................................................................
809
11.13.5 TAGS & CUSTOM A TTRIB U TE
S..............................................................................
809
11.14 DAS
ADMINISTRATIONSMENUE............................................................................................
813
11.14.1 CLIENT
PLUG-INS..................................................................................................
814
11.14.2 CUSTOMER EXPERIENCE IMPROVMENT
PROGRAM.................................................. 815
11.14.3 SINGLE SIGN ON - USERS AND
GROUPS.................................................................
815
11.14.4 SINGLE SIGN ON -
(KONFIGURATION.......................................................................
816
11.14.5 VCENTER SERVER EXTENSIONS (FLASH CLIENT)
.......................................................
817
11.14.6 SYSTEM CONFIGURATION (FLASH-CLIENT)
..............................................................
818
11.14.7 SUPPORT
(FLASH-CLIENT)......................................................................................
818
11.15 WEITERE EINSTELLUNGEN AUF DER VCENTER-HOMEPAGE (FLASH-CLIENT)
.........................
820
11.15.1 UPDATE M
ANAGER.............................................................................................
820
11.15.2 VREALIZE OPERATIONS
MANAGER.........................................................................
820
11.15.3 VREALIZE
ORCHESTRATOR......................................................................................
822
11.15.4 HYBRID CLOUD M
ANAGER....................................................................................
822
11.16 MANAGEMENT DES PLATFORM SERVICES CONTROLLER (PSC)
...............................................
822
11.16.1 DIE DCUI (DIRECT CONSOLE USER INTERFACE) DES PSC
.........................................
822
11.16.2 DIE WEBOBERFLAECHE DES PSC
............................................................................
823
11.17 MANAGEMENT DER
VCSA.................................................................................................
824
11.17.1 DIE DCUI DER
VCSA..........................................................................................
824
11.18 DIE WEBOBERFLAECHE DER VCSA
.......................................................................................
825
11.19 EINEN ACCOUNT
ZURUECKSETZEN........................................................................................
826
12 KONFIGURATION VON VCENTER-ADD-ONS 827
12.1 DER VCENTER UPDATE M
ANAGER......................................................................................
827
12.1.1
INSTALLATION.......................................................................................................
828
12.1.2
KONFIGURATION..................................................................................................
829
12.1.3
HOST-BASELINES.................................................................................................
836
12.1.4
VM-BASELINES...................................................................................................
837
12.1.5 PATCH
REPOSITORY...............................................................................................
837
12.1.6 ESXI
IMAGES.......................................................................................................
838
12.1.7 DOWNLOAD VON
UPDATES....................................................................................
839
12.1.8 DOWNLOAD VON UPDATES AUF OFFLINE-UPDATE-MANAGER
...................................
840
12.1.9
BASELINES...........................................................................................................
844
12.1.10
EVENTS...............................................................................................................
851
12.1.11
NOTIFICATIONS.....................................................................................................
851
12.1.12 WEITERE KONFIGURATIONSMOEGLICHKEITEN
............................................................
851
12.2 VMWARE VCENTER LINKED M O D E
....................................................................................
852
12.3 VMWARE VSPHERE IMAGE
BUILDER.................................................................................
853
12.4 VMWARE AUTO
DEPLOY....................................................................................................
857
12.5 VMWARE VSPHERE REPLICATION
APPLIANCE....................................................................
863
12.6 VMWARE VCENTER CONVERTER
STANDALONE....................................................................
871
12.6.1 VMWARE VCENTER CONVERTER STANDALONE VERWENDEN
..................................
873
12.6.2 NACHARBEITEN NACH DER UEBERNAHME
................................................................
884
13 MONITORING SS?
13.1 PERFORMANCE-DATEN DES HOSTS IM VCENTER
................................................................
887
13.1.1
PERFORMANCE-MESSWERTE..................................................................................
894
13.1.2
CPU-PERFORMANCE.............................................................................................
894
13.1.3
MEMORY-PERFORMANCE......................................................................................
894
13.1.4
STORAGE-PERFORMANCE.......................................................................................
895
13.1.5
NETWORK-PERFORMANCE.....................................................................................
895
13.2 WEITERE MONITOR-FUNKTIONEN DES
VCENTERS...............................................................
895
13.2.1 ISSUES
................................................................................................................
899
13.2.2 TRIGGERED ALARM
S..............................................................................................
900
13.2.3
TASKS..................................................................................................................
900
13.2.4
EVENTS...............................................................................................................
901
13.2.5 SCHEDULED
TASKS...............................................................................................
902
13.2.6
SYSTEM-LOGS......................................................................................................
905
13.2.7
SESSIONS.............................................................................................................
908
13.2.8 VCENTER H A
........................................................................................................
909
13.2.9
PERFORMANCE.....................................................................................................
909
13.2.10 UPDATE M
ANAGER..............................................................................................
909
13.2.11 VSPHERE H
A........................................................................................................
909
13.2.12 PROFILE
COMPLIANCE...........................................................................................
911
13.2.13 RESOURCE RESERVATION
.......................................................................................
911
13.2.14 VSPHERE
DRS.......................................................................................................
912
13.2.15
POLICIES...............................................................................................................
913
13.2.16 U TILIZA TION
..........................................................................................................
913
13.2.17 HARDWARE H
EALTH...............................................................................................
914
13.2.18 HEALTH
................................................................................................................
915
13.2.19 SERVICE H
EALTH....................................................................................................
916
13.3 EINRICHTEN VON ALARM
EN.................................................................................................
917
13.4 S N M P
...............................................................................................................................
921
13.4.1 SNMP UNTER VM W
ARE........................................................................................
922
13.4.2 SNMP UNTER ESXI
...............................................................................................
923
13.4.3 SNMP IN GASTBETRIEBSSYSTEMEN
.......................................................................
924
13.5
LOG-DATEIEN-MANAGEMENT...........................................................................................
924
13.5.1 VMWARE ESXI DUMP COLLECTOR
..........................................................................
925
13.5.2 VSPHERE SYS LOG
COLLECTOR...................................................................................
926
13.6 VIRTUAL MACHINE
MONITORING..................................................................
930
13.7 DER FREIE VMWARE-LOGSERVER
SEXILOG..........................................................................
933
13.7.1 KONFIGURATION VON
SEXILOG............................................................................
934
13.8
RUNECAST..........................................................................................................................
936
13.8.1 INSTALLATION
........................................................................................................
936
13.8.2 KONFIGURATION
....................................................................................................
938
13.8.3 ANALYSE UND FEHLERSUCHE M IT
RUNECAST............................................................ 943
13.8.4 FAZIT
...................................................................................................................
945
13.9 OPVIZOR PERFORMANCE
ANALYZER....................................................................................
945
13.9.1 INSTALLATION
........................................................................................................
946
13.9.2 KONFIGURATION
....................................................................................................
947
13.9.3
NAVIGATION.........................................................................................................
949
13.9.4 GESAMTUEBERSICHT UEBER VMWARE VSPHERE
........................................................
951
13.9.5 VMWARE-PERFORMANCE IM D
ETAIL.......................................................................
956
13.9.6 STATISTIKEN UND
PLANUNG...................................................................................
958
13.9.7 FAZIT
...................................................................................................................
960
14 DATENSICHERUNG VON VSPHERE-UMGEBUNGEN
SEI
14.1
EINFUEHRUNG......................................................................................................................
961
14.1.1 ALLGEMEINES ZUR
DATENSICHERUNG......................................................................
962
14.1.2 DIE ZWEI TYPEN DER
DATENSICHERUNG.................................................................
963
14.1.3 STUFENWEISES
DATENSICHERUNGSKONZEPT...........................................................
964
14.2 GRUNDLAGEN DER D ATENSICHERUNG
................................................................................
965
14.2.1 DEDUPLIKATION
...................................................................................................
966
14.2.2 MEDIEN ZUR PHYSISCHEN
DATENSICHERUNG.........................................................
967
14.2.3 DATENKONSISTENZ VON VMS, DATENBANKEN UND APPLIKATIONEN
.......................
968
14.2.4 SICHERUNG VON MEHRSCHICHTIGEN APPLIKATIONEN ODER VAPPS
...........................
969
14.3 DIE FUE N F PRINZIPIEN EINER KONSEQUENTEN DATENSICHERUNG
.......................................
970
14.3.1
MEDIENBRUCH....................................................................................................
970
14.3.2
DATENKOPIEN.....................................................................................................
970
14.3.3
INDEXIERUNG.......................................................................................................
972
14.3.4
VALIDIERUNG.......................................................................................................
972
14.3.5
FUNKTIONSTRENNUNG..........................................................................................
973
14.4 VMWARE-WERKZEUGE ZUR DATENSICHERUNG
.................................................................
973
14.4.1 VMWARE
TOOLS...................................................................................................
974
14.4.2 VM-SNAPSHOTS
..................................................................................................
975
14.4.3 CHANGED BLOCK
TRACKING...................................................................................
976
14.5
DATENSICHERUNGSTOPOLOGIEN........................................................................................
977
14.5.1 TOPOLOGIEN ZUR LOKALEN
DATENSICHERUNG..........................................................
978
14.5.2 KONZEPTE FUER DIE DATENSICHERUNG UEBER ZWEI UND MEHR STANDORTE
UND IN DER
CLOUD...............................................................................................
979
14.5.3 BACKUP VS.
REPLIKATION......................................................................................
979
14.6 PLANUNG EINER DATENSICHERUNGSUM
GEBUNG...............................................................
981
14.6.1 FUNKTIONSUEBERSICHT ZU VEEAM BACKUP &
REPLIKATION..................................... 981
14.6.2 GENERELLE
RESSOURCENPLANUNG.........................................................................
982
14.6.3
DEPLOYMENT-METHODEN....................................................................................
990
14.6.4 DIMENSIONIERUNG VOM VEEAM BACKUP & REPLICATION-KOMPONENTEN
........
994
14.6.5 DER OPTIMALE BEREICH FUER DIE
DIMENSIONIERUNG.............................................. 997
14.6.6 WAS MAN NICHT MACHEN
SOLLTE..........................................................................
999
14.7
VEEAM-BACKUP-REPOSITORY..........................................................................................
1000
14.7.1 VERSCHIEDENE BACKUP-REPOSITORY-TYPEN
......................................................... 1000
14.7.2
SMB-BACKUP-REPOSITORY...................................................................................
1001
14.7.3 DEDUPLICATION APPLIANCES UND VTL ALS BACKUP-REPOSITORY
............................
1002
14.7.4 PRO-VM-BACKUP-DATEIEN
..................................................................................
1003
14.7.5
SCALE-OUT-BACKUP-REPOSITORYS..........................................................................
1005
14.7.6 BACKUP-FILE-PLACEMENT IM SCALE-OUT-BACKUP-REPOSITORY
...............................
1006
14.7.7 WINDOWS-SERVER-DEDUPLIKATION-SHARE ALS
BACKUP-REPOSITORY....................... 1007
14.8 VEEAM BACKUP & REPLICATION IN S TA LLIE RE N
.................................................................
1008
14.9 ERSTELLEN VON
BACKUPS...................................................................................................
1013
14.9.1 DEN ERSTEN BACKUP-JOB ERSTELLEN
.....................................................................
1013
14.9.2
BACKUP-METHODEN............................................................................................
1019
14.9.3
VERSCHLUESSELUNG.................................................................................................
1021
14.9.4 KOMPRIMIERUNG UND DEDUPLIKATION
................................................................. 1022
14.9.5 BACKUP-JOBS
.......................................................................................................
1023
14.9.6
BACKUP-COPY-JOBS.............................................................................................
1025
14.9.7 SPEICHERWARTUNG BEI DEFRAGMENTIERUNG DURCH INKREMENTEILE
BACKUPS........ 1026
14.9.8 APPLICATION-AWARE
PROCESSING..........................................................................
1026
14.10 ERSTELLEN VON
REPLIKATEN...............................................................................................
1028
14.11 WIEDERHERSTELLUNG AUS
BACKUPS..................................................................................
1029
14.11.1 VIRTUAL LAB
.......................................................................................................
1032
15 AUSFALLSICHERHEIT
1033
15.1 SICHERUNG
-
RUECKSICHERUNG...........................................................................................
1033
15.1.1 SICHERUNG DES VSPHERE-HOSTS
...........................................................................
1033
15.1.2 SICHERUNG VON VCENTER
SERVER...........................................................................
1034
15.2 AUSFALLSICHERHEIT FUER PSC BZW.
VCENTER.......................................................................
1046
15.2.1 EMBEDDED VCSA / SINGLE PSC M IT SINGLE VCENTER/SINGLE PSC M IT
MEHREREN
VCENTERN............................................................................................................
1046
15.2.2 REDUNDANTE PSCS / SINGLE VCENTER
...................................................................
1047
15.2.3 REDUNDANTE PSCS M IT UND OHNE LOADBALANCER / REDUNDANTES VC ENTER
.........
1047
15.2.4 VCENTER H A
........................................................................................................
1047
15.3 FAULT
TOLERANCE...............................................................................................................
1049
15.3.1 WIE FUNKTIONIERT FAULT
TOLERANCE?....................................................................
1050
15.3.2 TECHNISCHE
VORAUSSETZUNGEN...........................................................................
1052
15.3.3 TECHNISCHE EINSCHRAENKUNGEN
...........................................................................
1055
15.3.4 FAULT TOLERANCE FUER EINE VIRTUELLE MASCHINE AKTIVIEREN
...................................
1055
15.3.5 BEDIENUNG VON FAULT TOLERANCE FUER EINE VIRTUELLE MASCHINE
...........................
1059
15.3.6 SNAPSHOTS M IT
FT...............................................................................................
1060
15.3.7 WAS PASSIERT IM
FEHLERFALL?...............................................................................
1061
15.3.8 LIZENZIERUNG VON
FT...........................................................................................
1062
15.3.9 FAULT TOLERANCE LEGACY VERSION
........................................................................
1062
15.4 MICROSOFT CLUSTER SERVICE FUER VIRTUELLE MASCHINEN
....................................................
1062
15.5 VSPHERE
REPLICATION.......................................................................................................
1062
15.5.1 AKTIVIERUNG DES
REPLIKATS.................................................................................
1068
16.1 USE GASES ZUR AUTOMATISIERUNG IM UEBERBLICK
...........................................................
1071
16.1.1 BEREITSTELLUNG VON RESSOURCEN
........................................................................
1072
16.1.2 KONFIGURATIONSMANAGEMENT
..........................................................................
1072
16.1.3 AUTOMATISIERTES ERZEUGEN VON VIRTUELLEN MASCHINEN UND
APPLIKATIONSUMGEBUNGEN
...............................................................................
1072
16.1.4 CONTINUOUS INTEGRATION UND CONTINUOUS DELIVERY
.........................................
1072
16.1.5
SECURITY.............................................................................................................
1073
16.1.6 GOVERNANCE
......................................................................................................
1073
16.1.7 SELF-SERVICE-PORTALE
..........................................................................................
1073
16.2 TECHNISCHER
UEBERBLICK...................................................................................................
1073
16.2.1 VSPHERE MANAGEMENT
SDK..............................................................................
1074
16.2.2 VSPHERE SDK FUER PYTHON
...................................................................................
1077
16.2.3 DIE
VSPHERE-REST-API.......................................................................................
1079
16.2.4 VMWARE-MODUL FUER ANSIBLE
.............................................................................
1084
16.2.5 VMWARE POWERCU
............................................................................................
1086
16.2.6 VMWARE VREALIZE
ORCHESTRATOR........................................................................
1086
16.2.7 THIRD-PARTY
TOOLS..............................................................................................
1087
16.3
FAZIT.................................................................................................................................
1087
17 VIRTUELLE MASCHINEN IOS9
17.1
GRUNDLAGEN....................................................................................................................
1089
17.1.1 VIRTUELLE
HARDWARE...........................................................................................
1089
17.1.2 VIRTUELLE
MASCHINENDATEIEN.............................................................................
1098
17.1.3 VMWARE
TOOLS...................................................................................................
1099
17.2 KONFIGURATION DER VIRTUELLEN HARDWARE
.....................................................................
1100
17.2.1 AENDERN DER HARDWARE UND HOTPLUG
.................................................................
1100
17.2.2 CPU
...................................................................................................................
1100
17.2.3 ARBEITSSPEICHER - MEMORY-HOTPLUG
................................................................
1103
17.2.4 SCSI CONTROLLER-SCSI-BUS-SHARING
.................................................................
1103
17.2.5
FESTPLATTEN........................................................................................................
1103
17.2.6 NETZWERK -
MAC-ADRESSE................................................................................
1104
17.2.7 VIDEO
CARD.........................................................................................................
1104
17.2.8 DIRECTPATH I/O
PCI.............................................................................................
1105
17.3 OPTIONEN FUER DIE VIRTUELLEN
MASCHINEN......................................................................
1105
17.3.1 VM-NAMEN
AENDERN............................................................................................
1105
17.3.2 GASTBETRIEBSSYSTEM
ANPASSEN..........................................................................
1106
17.3.3
REMOTEKONSOLE..................................................................................................
1106
17.3.4
ENCRYPTION..........................................................................................................
1106
17.3.5 VMWARE
TOOLS....................................................................................................
1107
17.3.6
ZEITSYNCHRONISATION...........................................................................................
1108
17.3.7
ENERGIEVERWALTUNG............................................................................................
1109
17.3.8
STARTOPTIONEN....................................................................................................
1109
17.3.9 ERWEITERTE KONFIGURATION
..................................................................................
1110
17.3.10
FIBRE-CHANNEL-NPIV...........................................................................................
1112
17.4 VIRTUELLE MASCHINEN E RSTE LLE N
.......................................................................................
1112
17.4.1 ERSTELLEN EINER NEUEN VIRTUELLEN
MASCHINE....................................................... 1112
17.4.2 INSTALLIEREN DES GASTBETRIEBSSYSTEMS
..............................................................
1115
17.5 AKTUALISIEREN DER VIRTUELLEN H ARDW ARE
.......................................................................
1116
17.6
RESSOURCEN-MANAGEMENT.............................................................................................
1116
17.6.1
CPU.....................................................................................................................
1117
17.6.2
ARBEITSSPEICHER..................................................................................................
1119
17.6.3
FESTPLATTE...........................................................................................................
1121
17.6.4
NETZWERK............................................................................................................
1121
17.7
USB-GERAETE......................................................................................................................
1122
17.7.1
USB-KOMPONENTEN............................................................................................
1122
17.7.2 EIN USB-GERAET HINZUFUEGEN UND
ENTFERNEN........................................................ 1123
17.8 W
ECHSELMEDIEN..............................................................................................................
1131
17.8.1 DISKETTENLAUFWERK HINZUFUEGEN
........................................................................
1131
17.8.2 EINE DISKETTE M IT EINER VIRTUELLEN MASCHINE VERBINDEN
..................................
1132
17.8.3 CD/DVD-LAUFWERK ZUR VIRTUELLEN MASCHINE
HINZUFUEGEN................................. 1137
17.8.4 CD/DVD M IT VIRTUELLER MASCHINE VERBINDEN
....................................................
1139
17.9 BETRIEBSZUSTAENDE EINER VIRTUELLEN M ASCHINE
.............................................................
1144
17.10 SPEICHERRICHTLINIEN FUE R VIRTUELLE M
ASCHINEN...............................................................
1144
17.10.1 SPEICHERRICHTLINIEN
ZUWEISEN............................................................................
1145
17.10.2 COMPLIANCE DER SPEICHERRICHTLINIE PRUE FEN
........................................................ 1146
17.11 KONFIGURATION UND ANPASSUNG VON VIRTUELLEN M
ASCHINEN........................................ 1147
17.11.1
HOTPLUG..............................................................................................................
1148
17.11.2 HOTPLUG VON VIRTUELLEN
CPUS.............................................................................
1148
17.11.3 HOTPLUG VON
ARBEITSSPEICHER.............................................................................
1148
17.11.4 MAC-ADRESSE
AENDERN........................................................................................
1149
17.12 VMWARE T O O LS
.................................................................................................................
1151
17.12.1
ZEITSYNCHRONISATION..........................................................................................
1152
17.12.2 INSTALLATION DER VMWARE TOOLS UNTER W INDOW
S.............................................. 1152
17.12.3 INSTALLATION DER VMWARE TOOLS UNTER L IN U
X..................................................... 1154
17.12.4 DEN STATUS DER VMWARE TOOLS PRUEFEN
............................................................. 1155
17.12.5 AKTUALISIERUNG DER VMWARE
TOOLS....................................................................
1156
17.13 MIGRATION VON VIRTUELLEN
MASCHINEN..........................................................................
1159
17.13.1 VM OTIO N
.............................................................................................................
1159
17.13.2 STORAGE VMOTION
...............................................................................................
1159
17.13.3
HYBRID-MIGRATION..............................................................................................
1160
17.14
KLONE...............................................................................................................................
1160
17.14.1 EINEN KLON ERSTELLEN
.........................................................................................
1161
17.15
VORLAGEN.........................................................................................................................
1163
17.15.1 EINE VORLAGE AUS EINER VIRTUELLEN MASCHINE
ERSTELLEN..................................... 1163
17.15.2 EINE VORLAGE IN DIE BIBLIOTHEK IM PORTIEREN
.....................................................
1165
17.15.3 VM-VORLAGEN IN ORDNERN VERW ALTEN
................................................................
1166
17.15.4 EINE VIRTUELLE MASCHINE AUS EINER VORLAGE ERSTELLEN
.......................................
1166
17.16 DIE VIRTUELLE MASCHINE IM VMWARE VSPHERE CLIENT
..................................................
1167
17.16.1
UEBERSICHT..........................................................................................................
1167
17.16.2
UEBERWACHEN.....................................................................................................
1169
17.16.3
KONFIGURIEREN...................................................................................................
1174
17.16.4
BERECHTIGUNGEN................................................................................................
1177
17.16.5
DATENSPEICHER...................................................................................................
1177
17.16.6
NETZWERKE.........................................................................................................
1178
17.17
SNAPSHOTS.......................................................................................................................
1178
17.17.1 SNAPSHOT
ERSTELLEN............................................................................................
1180
17.17.2 SNAPSHOTS VERW
ALTEN........................................................................................
1180
17.17.3
SNAPSHOT-KONSOLIDIERUNG................................................................................
1182
17.18 VSPHERE
REPLICATION......................................................................................................
1183
17.19 ERWEITERTES VM -M ANAGEM ENT
....................................................................................
1184
17.19.1 PROZESSE EINER VIRTUELLEN MASCHINE BEENDEN
..................................................
1184
17.19.2 DIE LEISTUNG EINER VIRTUELLEN MASCHINE
UEBERPRUEFEN......................................... 1186
17.19.3 OPTIMIEREN VON VIRTUELLEN MASCHINEN
.........................................................
1188
18 VSPHERE INTEGRATED CONTAINERS IM
18.1
UEBERBLICK........................................................................................................................
1191
18.2
ARCHITEKTUR.....................................................................................................................
1193
18.2.1 HYPERVISOR UND VCENTER
SERVER.........................................................................
1194
18.2.2 VSPHERE INTEGRATED CONTAINERS APPLIANCE (VICA)
............................................ 1194
18.2.3 VSPHERE INTEGRATED CONTAINERS ENGINE
(VIC-ENGINE)....................................... 1194
18.2.4 VSPHERE INTEGRATED CONTAINERS VCENTER-PLUG-IN (VIC-UI-PLUG-IN)
................... 1195
18.2.5 VIRTUAL CONTAINER HOST
(VCH)............................................................................
1195
18.2.6 DOCKER-CLIENT
(DC)............................................................................................
1195
18.2.7 CONTAINER-VM (C-VM
)........................................................................................
1196
18.2.8 DAS NETZWERK DER VSPHERE INTEGRATED CONTAINERS
.........................................
1196
18.2.9 BENUTZERGRUPPEN DER VSPHERE INTEGRATED CONTAINERS (VIC)
...........................
1198
18.3
IMPLEMENTIERUNG...........................................................................................................
1199
18.3.1 KONFIGURATION DES HYPERVISORS (ESXI-HOST) FUER EINE VIC-UMGEBUNG
.............
1200
18.3.2 KONFIGURATION EINES VCENTER-SERVERS FUER EINE VIC-UMGEBUNG
.......................
1200
18.3.3 INSTALLATION UND EINRICHTUNG DER VSPHERE INTEGRATED CONTAINERS
APPLIANCE
(VICA)................................................................................................
1201
18.3.4 INSTALLATION UND EINRICHTUNG DER VIC-MASCHINE
..............................................
1204
18.3.5 INSTALLATION DES VIC-UI-PLUG-INS IN DEN VCENTER-SERVER
...................................
1207
18.3.6 VIRTUAL CONTAINER HOST
(VCH)............................................................................
1212
18.4 VERW
ALTUNG.....................................................................................................................
1222
18.4.1
DOCKER-KOMMANDOS.........................................................................................
1223
18.4.2 CONTAINER IN VIC VERW
ALTEN...............................................................................
1224
18.4.3 VIRTUAL CONTAINER HOST (VCH) IN VIC VERWALTEN
...............................................
1226
19 VM W ARE CLOUD FOUNDATION
1229
19.1 MODERNISIEREN SIE IHR RECHENZENTRUM
.......................................................................
1230
19.2 DIE
VORBEREITUNG............................................................................................................
1232
19.3 DIE
STANDARDARCHITEKTUR...............................................................................................
1233
19.4
INSTALLATION......................................................................................................................
1241
19.4.1 AUFBAU UND VERKABELUNG DER
HARDWARE.......................................................... 1241
19.4.2 IMAGING DER
HARDWARE......................................................................................
1242
19.4.3 ARCHITEKTUR DER
MANAGEMENT-WORKLOAD-DOMAIN...........................................
1245
19.5 BEREITSTELLUNG VON RESSOURCEN DURCH
WORKLOAD-DOMAINS....................................... 1247
19.5.1 ERSTELLUNG EINER VL-WORKLOAD-DOMAIN
.............................................................
1247
19.5.2 ARCHITEKTUR EINER
VL-WORKLOAD-DOMAIN...........................................................
1249
19.5.3 ANLEGEN EINER VIRTUELLEN M ASCHINE
..................................................................
1249
19.6
SYSTEMAKTUALISIERUNGEN...............................................................................................
1251
19.7 MEHRERE
STANDORTE........................................................................................................
1253
19.8 VERFUEGBARKEIT UND AUSFALLSICHERHEIT
..........................................................................
1254
19.8.1 ABSICHERUNG GEGEN DATENVERLUST DER MANAGEMENT-KOMPONENTEN
...............
1254
19.8.2 AUSFALL DES
GESAMTSYSTEMS.............................................................................
1255
19.8.3 AUSFALL EINZELNER SOFTWARE-KOMPONENTEN
...................................................... 1256
19.8.4 AUSFALL EINZELNER
SERVER....................................................................................
1256
19.8.5 AUSFALL EINZELNER RACKS
....................................................................................
1256
19.9
AUSBLICK..........................................................................................................................
1256
IN D E
X...........................................................................................................................................
1257
|
any_adam_object | 1 |
author | Wöhrmann, Bertram Baumgart, Günter Alder, Urs Stephan Große, Jan Schönfeld, Thomas Wegner, Frank Soeldner, Jens-Henrik 1977- Zimmer, Dennis |
author_GND | (DE-588)1046955330 (DE-588)1088453023 (DE-588)1168832136 (DE-588)116883242X (DE-588)1052279538 (DE-588)1021707171 |
author_facet | Wöhrmann, Bertram Baumgart, Günter Alder, Urs Stephan Große, Jan Schönfeld, Thomas Wegner, Frank Soeldner, Jens-Henrik 1977- Zimmer, Dennis |
author_role | aut aut aut aut aut aut aut aut |
author_sort | Wöhrmann, Bertram |
author_variant | b w bw g b gb u s a us usa j g jg t s ts f w fw j h s jhs d z dz |
building | Verbundindex |
bvnumber | BV045189835 |
classification_rvk | ST 261 |
classification_tum | DAT 309f |
ctrlnum | (OCoLC)1056964077 (DE-599)DNB1160196664 |
discipline | Informatik |
edition | 5., aktualisierte und erweiterte Auflage |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04097nam a2200865 c 4500</leader><controlfield tag="001">BV045189835</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211103 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180913s2018 gw a||| |||| 00||| ger d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">18,N23</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1160196664</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836263368</subfield><subfield code="c">: EUR 89.90 (DE), EUR 92.50 (AT), CHF 115.90 (freier Preis)</subfield><subfield code="9">978-3-8362-6336-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">383626336X</subfield><subfield code="9">3-8362-6336-X</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783836263368</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 459/06336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1056964077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1160196664</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 309f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wöhrmann, Bertram</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VMware vSphere 6.7</subfield><subfield code="b">das umfassende Handbuch</subfield><subfield code="c">Bertram Wöhrmann, Jan Große, Günter Baumgart, Thomas Schönfeld, Dennis Zimmer, Urs Stephan Alder, Frank Wegner, Jens Söldner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">5., aktualisierte und erweiterte Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1277 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm x 19 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">unterschiedliche Auflagenbezeichnung auf dem Umschlag (5. aktualisierte und erweiterte Auflage) und im Buch (1. Auflage) ; Titelzusatz auf dem Umschlag: Installation, Konfiguration, Administration ; vCenter ESXi und vCenter-Add-ons, vSphere integrated Container, VMware Cloud Foundation, vCenter Server Appliance mit vCenter HA ; Software-Defined Datacenter mit VMware: Netzwerk- und Storage-Virtualisierung, Backup, Ausfallsicherheit, Monitoring</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtualisierung</subfield><subfield code="0">(DE-588)4839180-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareplattform</subfield><subfield code="0">(DE-588)4702244-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">VMware vSphere</subfield><subfield code="0">(DE-588)1034526332</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">VMware vSphere 6.7</subfield><subfield code="0">(DE-588)1177398036</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Migration</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">vMotion</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Storage Motion</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">VMware Virtual SAN</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">vCenter</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ESXi</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Virtuelle Maschinen</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hybrid Cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Foundation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software-Defined Data-Center</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">VMware vSphere</subfield><subfield code="0">(DE-588)1034526332</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Virtualisierung</subfield><subfield code="0">(DE-588)4839180-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Softwareplattform</subfield><subfield code="0">(DE-588)4702244-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">VMware vSphere 6.7</subfield><subfield code="0">(DE-588)1177398036</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baumgart, Günter</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046955330</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alder, Urs Stephan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Große, Jan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1088453023</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schönfeld, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1168832136</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wegner, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)116883242X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Soeldner, Jens-Henrik</subfield><subfield code="d">1977-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1052279538</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zimmer, Dennis</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1021707171</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Galileo Press</subfield><subfield code="0">(DE-588)1065964404</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="780" ind1="0" ind2="0"><subfield code="i">Vorangegangen ist</subfield><subfield code="z">978-3-8362-3816-8</subfield></datafield><datafield tag="785" ind1="0" ind2="0"><subfield code="i">Gefolgt von</subfield><subfield code="a">Wöhrmann, Bertram</subfield><subfield code="t">VMware vSphere 7</subfield><subfield code="b">6., aktualisierte und erweiterte Auflage</subfield><subfield code="d">2021</subfield><subfield code="z">978-3-8362-7578-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=73bfc785fa2545dbaf754eaac08a0ec6&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030578989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030578989</subfield></datafield></record></collection> |
id | DE-604.BV045189835 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:20:17Z |
institution | BVB |
institution_GND | (DE-588)1065964404 |
isbn | 9783836263368 383626336X |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030578989 |
oclc_num | 1056964077 |
open_access_boolean | |
owner | DE-M347 DE-523 DE-522 DE-91G DE-BY-TUM DE-Aug4 DE-355 DE-BY-UBR DE-20 DE-859 DE-1049 DE-898 DE-BY-UBR |
owner_facet | DE-M347 DE-523 DE-522 DE-91G DE-BY-TUM DE-Aug4 DE-355 DE-BY-UBR DE-20 DE-859 DE-1049 DE-898 DE-BY-UBR |
physical | 1277 Seiten Illustrationen 24 cm x 19 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | Rheinwerk Computing |
spellingShingle | Wöhrmann, Bertram Baumgart, Günter Alder, Urs Stephan Große, Jan Schönfeld, Thomas Wegner, Frank Soeldner, Jens-Henrik 1977- Zimmer, Dennis VMware vSphere 6.7 das umfassende Handbuch Rechnernetz (DE-588)4070085-9 gnd Virtualisierung (DE-588)4839180-3 gnd Softwareplattform (DE-588)4702244-9 gnd Cloud Computing (DE-588)7623494-0 gnd VMware vSphere (DE-588)1034526332 gnd VMware vSphere 6.7 (DE-588)1177398036 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4839180-3 (DE-588)4702244-9 (DE-588)7623494-0 (DE-588)1034526332 (DE-588)1177398036 |
title | VMware vSphere 6.7 das umfassende Handbuch |
title_auth | VMware vSphere 6.7 das umfassende Handbuch |
title_exact_search | VMware vSphere 6.7 das umfassende Handbuch |
title_full | VMware vSphere 6.7 das umfassende Handbuch Bertram Wöhrmann, Jan Große, Günter Baumgart, Thomas Schönfeld, Dennis Zimmer, Urs Stephan Alder, Frank Wegner, Jens Söldner |
title_fullStr | VMware vSphere 6.7 das umfassende Handbuch Bertram Wöhrmann, Jan Große, Günter Baumgart, Thomas Schönfeld, Dennis Zimmer, Urs Stephan Alder, Frank Wegner, Jens Söldner |
title_full_unstemmed | VMware vSphere 6.7 das umfassende Handbuch Bertram Wöhrmann, Jan Große, Günter Baumgart, Thomas Schönfeld, Dennis Zimmer, Urs Stephan Alder, Frank Wegner, Jens Söldner |
title_new | Wöhrmann, Bertram VMware vSphere 7 |
title_short | VMware vSphere 6.7 |
title_sort | vmware vsphere 6 7 das umfassende handbuch |
title_sub | das umfassende Handbuch |
topic | Rechnernetz (DE-588)4070085-9 gnd Virtualisierung (DE-588)4839180-3 gnd Softwareplattform (DE-588)4702244-9 gnd Cloud Computing (DE-588)7623494-0 gnd VMware vSphere (DE-588)1034526332 gnd VMware vSphere 6.7 (DE-588)1177398036 gnd |
topic_facet | Rechnernetz Virtualisierung Softwareplattform Cloud Computing VMware vSphere VMware vSphere 6.7 |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=73bfc785fa2545dbaf754eaac08a0ec6&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030578989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wohrmannbertram vmwarevsphere67dasumfassendehandbuch AT baumgartgunter vmwarevsphere67dasumfassendehandbuch AT alderursstephan vmwarevsphere67dasumfassendehandbuch AT großejan vmwarevsphere67dasumfassendehandbuch AT schonfeldthomas vmwarevsphere67dasumfassendehandbuch AT wegnerfrank vmwarevsphere67dasumfassendehandbuch AT soeldnerjenshenrik vmwarevsphere67dasumfassendehandbuch AT zimmerdennis vmwarevsphere67dasumfassendehandbuch AT galileopress vmwarevsphere67dasumfassendehandbuch |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 309f 2015 A 1661(5) Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |