Utilizing vSphere features, resource controls for VM priority

After you implement virtualization for your customers it is important to define the priorities for their virtual machines (VMs). If you do not, your customers may find that their critical applications now run slower than before. Setting up resource controls can be a valuable service that VARs can offer their customers. The value can be two-fold: it helps to define customer priorities so that mission-critical VMs get access to the resources they need to run their workloads, and it allows VARs to show their customers the benefits of virtualization.

Here we will learn the resource control features in vSphere and how solutions providers can use them to set up a virtualized infrastructure that works for their customers.

Read the full 2-part article (Part 1, Part 2) at searchsystemschannel.com…

Share This:

Top eight VMware vSphere backup best practices

When it comes to backing up virtual machines in VMware vSphere, you need to leverage the strengths of virtualization to maximize your backup efficiency. You also need to know what to back up as well as how to back it up. In addition, you can’t use the same principles that you use in a traditional environment to back up a virtual environment. The following are eight vSphere backup best practices.

Read the full article at searchdatabackup.com…

Share This:

VCenter Update Manager installation and configuration

When it comes to patching and updating ESX and ESXi hosts and VMs, solution providers have several options. Remote and local command line utilities are used to update hosts and VMs, and standalone applications, such as the vSphere Host Update Utility and vCenter Update Manager, are also helpful.

While command line utilities are just as effective as standalone applications, many customers prefer to use application clients for hosting and patching. Using command line utilities can be tedious, and solution providers must know proper syntaxes to use them properly. On the other hand, application clients are easier to use and have more features, such as the ability to schedule when updates are applied.

Read the full article at searchsystemschannel.com…

Share This:

The vLaunchpad – hacked!

Early Sunday morning I was alerted by a tweet DM from @terrafx that the vLaunchpad website was hacked and was displaying a turkish hacker page. The vLaunchpad is one of 5 web sites that I have hosted with godaddy.com, this one is on their Linux grid computing platform (cloud). I quickly checked the site and everything looked OK to me so I investigated further. I started browsing the web server and found a suspicious file in the root directory called x.txt. After downloading it to my PC and opening it I found the following HTML code:

vpad-1

Obviously this was a malicious file that was displaying the page that people were seeing after the hack occurred. I wasn’t sure what all happened so I started looking at date/time stamps to see if any other files were altered and also checking through some of the key wordpress php files. Seeing nothing else malicious I contacted godaddy that didn’t know anything about it. So I investigated further and found a nifty tool inside their web-based control center that allows you to interact with all the files on the website. There is a history button in their web based file manager that lets you go back to scheduled snapshots that occur automatically on the website. Once you pick a date it shows you any files that have changed, been added or deleted from the current file listing. I picked the date of the attack and here’s what I saw:

vpad-2The listing showed 4 files deleted and one file modified, so obviously something happened. This capability is pretty cool because if a hack occurs you can see exactly what files have been changed. I really didn’t find out much else besides that but I wanted to know how the hack occured, there really was only 3 reasons that I could think of, a compromised password (wordpress or ftp), wordpress vulnerability or a web server vulnerability. Two were within my control, I had pretty strong wordpress/ftp passwords so I didn’t think that was the cause and my wordpress version was fairly update to date. The web server was beyond my control as it is godaddy’s responsibility. I wanted to eliminate ftp as a cause so I asked godaddy for the ftp logs for the last few days. Once I got those I saw nothing but my IP address in them after the hack occurred so I was back to either WordPress or the web server being the cause. I pushed godaddy for more information, basically blaming the web server for the attack and I finally got an answer from them:

vpad-3Apparently using compromised SSH accounts (you can enable SSH on godaddy websites) and exploiting a vulnerability in the GNU C Library that is part of Linux operating systems, an attacker was able to execute and upload code to many customers websites that were running on the server, mine happened to be one of them. So it looks like what happened is that after godaddy was alerted to the hack, they went in and cleaned everything up on their own without involving their customers which would explain why everything looked normal when I check the website after I was alerted. It looks like they restored the original files, renamed the malicious file to x.txt and deleted the extra files that were put on the web server. If I hadn’t been alerted about it I probably would of never known the hack occurred. Thanks to godaddy’s quick response the hack was quickly identified and fixed.

The hack did serve as a wake up call though and if you have a wordpress blog make sure you do frequent backups, especially of the database. I kick off the database backup from the godaddy control panel than ftp all wordpress files including the db backup file to my local PC. There are also plugins that you can use to help automate this. There are also a variety of security plugins that you can install on your wordpress site. Here’s a few good links to dealing with a wordpress hack and how to better secure your wordpress website.

Share This:

Virtual security: New attack vectors, new ballgame

When it comes to securing virtual environments, you have to take different measures from those for traditional physical security.

With virtual security, new attack vectors –that is, the means by which a hacker gains control of a server OS — must be protected to prevent breaches. Because of these vectors — and thus risks — virtual security requires you to secure the host and each virtual machine (VM).

In this tip, we cover the kinds of attacks you should be concerned about as you develop a virtualization security strategy as well as considerations and best practices for the various components of your infrastructure.

Physical security
There are many physical attack vectors, from physical consoles to a guest OS to the applications that run on an OS. To secure a physical system, you must have a locked data center that restricts access to the console. Next, you secure the operating system and applications, and finally, you implement security controls — such as a firewall — at the network layer. With virtual security, these breaches still apply, but there are other avenues by which an attacker can gain access to a VM.

Read the full article at searchservervirtualization.com (Part 1 of a 2-part article)

Also read Part 2: Virtual network security best practices

Share This:

Why does vendor lock-in get such a bad rap?

In the context of virtualization, vendor lock-in often has negative connotations. But if a company provides solid products and support, this practice of purchasing the bulk of your data center components from a single vendor can be beneficial.

Few vendors have the product lineup to supply every facet of a data center infrastructure, with the exception of Dell Inc., Hewlett-Packard Co., and IBM. But many vendors can fill most IT needs and then bridge the gaps through strategic partnerships. VMware Inc., for example, has teamed up with EMC Corp. and Cisco Systems Inc. to form the Virtual Computing Environment (VCE) coalition. Together, these providers have bundled servers, storage and virtualization capabilities into a single product, which essentially locks customers into their vertical stack.

This tip offers a new way of thinking about vendor lock-in. It covers the pros and cons of this approach to building your virtual infrastructure and provides advice for those who choose a single-vendor approach in a virtual environment.

Read the full article at searchvmware.com…

Share This:

Using virtual hardware metrics to hit a performance home run

Virtualization is often a game of numbers. As you choose virtual hardware, you have to consider some important metrics, such as the number of virtual machines (VMs) that reside on a host or logical unit number (LUN).

If you haven’t determined what these numbers should look like in your environment, your infrastructure will likely suffer from poor performance. This tip highlights key virtual hardware statistics to consider, which include consolidation ratios and virtual CPU counts. As you design and configure a VMware vSphere infrastructure, these performance metrics help prevent an infrastructure from becoming resource starved.

Read the full article at SearchVMware.com…

Share This:

10 tips for managing storage for virtual servers and virtual desktops

cover_vol9_iss9

Server and desktop virtualization have provided relatively easy ways to consolidate and conserve, allowing a reduction in physical systems. But these technologies have also introduced problems for data storage managers who need to effectively configure their storage resources to meet the needs of a consolidated infrastructure.

Server virtualization typically concentrates the workloads of many servers onto a few shared storage devices, often creating bottlenecks as many virtual machines (VMs) compete for storage resources. With desktop virtualization this concentration becomes even denser as many more desktops are typically running on a single host. As a result, managing storage in a virtual environment is an ongoing challenge that usually requires the combined efforts of desktop, server, virtualization and storage administrators to ensure that virtualized servers and desktops perform well. Here are 10 tips to help you better manage your storage in virtual environments.

Read the full article at searchstorage.com…

Share This: