Browsing Posts in Highlights

Reading Time: 5 minutesVMware vSphere has a guest customization feature to change some guest OS setting for VMs that are cloned of deployed from template. For example to change the computer name, network settings, or timezone settings. Customizing guest operating systems helps prevent conflicts that occur if virtual machines with identical settings are deployed, for example conflicts due to duplicate computer names. For Linux based VM there are two diffent type of guest OS customization engines: But which one is used and which could be preferred?

Reading Time: 2 minutesSoftware for Open Networking in the Cloud (SONiC) is is a free and open source network operating system based on Linux. SONiC is the open networking solution used in Microsoft’s Azure Cloud: is the networking switch software used in the lower layer of Azure Datacenter fabric (TOR and Aggregation).

Reading Time: 3 minutesA Data Processing Unit (DPU) is a programmable computer processor that is usally tightly integrates a general-purpose CPU with network interface card (NIC) hardware. Sometimes they are called “IPUs” (for “Infrastructure Processing Unit”) or “SmartNICs” (because actually they are implemented in some special Network Interface Cards).

Reading Time: 3 minutesAfter cloning VMs that are running “recent” version of Ubuntu as Guest Operating System (OS) from VM template or a parent VM, the new VMs acquire the same DHCP IP addresses from the DHCP server, no matter if guest customization is applied or not… also if the two VMs have different MAC addressess. And doesn’t matter the type of hypervisor that you are using… but, of course, VMware has documented this issue in this article: Cloned VM acquires the same DHCP IP address towards guest customization process (KB 82229).

Reading Time: 2 minutesGreenfield and brownfield are terms usually used in factory planning and facilities engineering to describe two different approaches to developing or expanding manufacturing facilities. But they are also used in IT to define different deployment scenarios.

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

Reading Time: 2 minutesSome years ago, I’ve published a post about the Hyperconverged infrastructure market share (2018)… but what about now? How HCI has grow? HCI has become a hot topic with several vendors that aim to be a leader in this area, or with several “magic quadrants” that try to define who is in.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright