Reading Time: 3 minutes

One of the big news of the vSphere 8.0.3 (8.0 Update 3) version if the ability of live patch ESXi without reboot the host and without migrate the workloads!

With the new Live Patching capability in ESXi, customers can address critical bugs in the virtual machine execution environment  and apply patches to all components without reboot or VM evacuation.

Virtual machines are Fast-Suspend-Resumed (FSR) as part of the host remediation process, for this reason this new feature is not compatible with some specific cases (like VM protected by vSphere FT or VM with PCI passthough).

continue reading…
Reading Time: 4 minutes

VMware vSphere Clustering Service (vCLS) was introduced in the vSphere 7 Update 1 release with the idea of creating a decoupled and distributed control plane for clustering services in vSphere.

In the first release, a subset of DRS capabilities was using the new vCLS feature and starting with vCenter 7.0.1, VMware vSphere Distributed Resource Scheduler (vSphere DRS) cannot function if vSphere Cluster Services VMs are not present in each vSphere cluster.

continue reading…
Reading Time: 4 minutes

VMware Cloud Foundation (VCF) is a way to simplify the path to a modernized private cloud, integrating compute, storage, networking, and management into a unified software-defined data center platform.

VMware by Broadcom has just launched VCF 5.2 on June 25, 2024, and will be Generally Available on
July 22, 2024.

This launch is not just a product update; it’s an evolution designed to address your most pressing needs while aligning with our strategic initiatives: modernizing infrastructure, enhancing cloud experience for developers, and ensuring security and resilience.

continue reading…
Reading Time: 9 minutes

VMware by Broadcom has just released vSphere 8.0 Update 3 (8.0.3).

Note that ESXi 8.0 Update 3 release is an Initial Availability (IA) (and went in GA on on 07/26/2024). The vCenter Server 8.0 Update 3 release instead is a General Availability (GA). For more information on the vSphere 8.0 IA/GA Release Model of vSphere Update releases, see The vSphere 8 Release Model Evolves.

Before planning any type of update, remember to check the entire hardware and software compatibility and, at least, could be safe wait for ESXi in GA. And don’t forget backup programs, actually none of them will officially support VMware vSphere 8.0.3.

continue reading…
Reading Time: 3 minutes

CentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux.

Note that CentOS Linux is not a Red Hat product and does not have Red Hat support.

But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the upstream development platform for upcoming Red Hat Enterprise Linux releases. That mean that will be no more alligned to the production version of Red Hat Enterprise.

continue reading…
Reading Time: 5 minutes

Lot of storage, cloud and backup solutions are promising some kind of data immutability.

Of course, immutability is an important key capability, but it does not imply automatically that your solution is secure (or more secure).

It can give a false sense of security if not implemented properly. When misconfigured, it is possible to delete supposedly immutable data, for example, by manipulating time/date settings on the storage device to bypass retention enforcement mechanisms.

continue reading…
Reading Time: 2 minutes

Diffent products are implementing a security model called “four-eyes principle“, also know as the two-person rule or also multi-user authorization (MUA).

In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations.

But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

continue reading…
© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright