Browsing Posts in Highlights

Reading Time: 2 minutes VMware® vCenter Converter Standalone provides an easy-to-use solution that automates the process of creating VMware virtual machines from physical machines (running Windows and Linux) and from other virtual machine formats. Actually the most recent version remain the Converter 6.6 updated on Feb, 22 2024. Considering that one of my most requested article was VMware Converter guest OS support, I decide to make an updated version.

Reading Time: 2 minutes Like every hardware and software components, before apply a VMware vSphere upgrade or update you have to check all compatibility aspects. One is related to the backup software that can be critical because you may loose the capability to perform backup and/or restore. For Veeam Backup & Replication there is a specific Veeam KB (KB 2443) that provides information about compatibility between VMware vSphere and Veeam Backup & Replication.

Reading Time: 3 minutes Veeam Backup Catalog is a feature of Veeam Backup & Replication that stands for VM guest OS file indexing. Veeam Guest Catalog service on backup server works as a local catalog service. It collects index data for backup jobs on this specific backup server and stores this data locally in the Veeam Backup Catalog folder. By default, the indexing data is stored in the VBRCatalog folder on the backup server. Veeam Backup & Replication creates the folder on a volume with the maximum amount of free space, for example, C:\VBRCatalog.

Reading Time: 3 minutes CentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux. Note that CentOS Linux is not a product of Red Hat and does not have Red Hat support. But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the […]

Reading Time: 5 minutes Lot of storage, cloud and backup solutions are promising some kind of data immutability. Of course, immutability is an important key capability, but it does not imply automatically that your solution is secure (or more secure). It can give a false sense of security if not implemented properly. When misconfigured, it is possible to delete supposedly immutable data, for example, by manipulating time/date settings on the storage device to bypass retention enforcement mechanisms.

Reading Time: 2 minutes Diffent products are implementing a security model called “four-eyes principle” (also know as the two-person rule). For example Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

Reading Time: 4 minutes Software as a service (SaaS) is one of the possible cloud models and has become more and more used also from the enterprises. For example, most of the companies are using a SaaS solution for email, intead of build and manage their own mail servers.

© 2024-2011 vInfrastructure Blog | Disclaimer & Copyright