POPULARITY
In this episode of the Security Swarm Podcast, host Andy and recurring guest, Paul, talk about the challenges and opportunities organizations face amidst the Broadcom acquisition of VMware. They discuss the steep price hikes for VMware licenses and the security vulnerabilities recently discovered in VMware products. This acquisition has prompted many businesses to consider alternative solutions, and the episode provides a comprehensive overview of the available options within the Microsoft ecosystem. They cover a range of migration strategies, including moving to the Microsoft ecosystem through Azure, Azure Stack HCI, and on-premises Hyper-V solutions. Andy and Paul offer valuable insights into ensuring a secure and seamless transition away from VMware, making this episode essential listening for IT professionals navigating these significant changes. Key takeaways: Broadcom's Acquisition of VMware is Causing Major Disruption due to massive license cost increases of 300-500% for many organizations. Microsoft Hyper-V is a Viable Alternative to VMware. It offers a mature, enterprise-ready hypervisor that can be a cost-effective replacement for VMware. Azure Stack HCI Provides an On-Premises VMware Alternative. It provides a hyperconverged infrastructure solution with Hyper-V at the core, along with integration to Azure services for management and modernization. Security pitfalls can arise when organizations rush to migrate away from VMware due to the Broadcom situation. Proper planning, understanding the security posture of the new platform, and ensuring critical configurations like backup are in place are essential to mitigate risks. Timestamps: (02:51) - Vulnerabilities in VMware (07:30) - Migrating to the Microsoft Ecosystem (13:38) - On-Premises Microsoft Options (38:45) - Security Considerations for Migrations (44:52) - Pragmatic Approach to Platform Selection Episode Resources: Microsoft and Broadcom to Support License Portability Paul's article on options for migrating from VMware to Microsoft VMware Sandbox Escape Bugs
Episode 154. Going back to Microsoft Hyper -V https://youtu.be/M0HNGXKH4oU --- Send in a voice message: https://anchor.fm/getajobintech/message Support this podcast: https://anchor.fm/getajobintech/support
Sponsor Circle CI Episode on CI/CD with Circle CI Show DetailsIn this episode, we cover the following topics: VMs vs containers - why revisit?Originally talked about this in episode 1 Got most of it right, but some inconsistencies/holes Let's revisit to fill in the gaps, and dive a whole LOT deeper this time around Types of virtualization Full virtualization ("virtual machines") Simulates enough hardware to allow an unmodified "guest" OS to be run in isolation Resources of computer are partitioned via hypervisor Examples:VMWare, Parallels, VirtualBox, Hyper-V Operating-system-level virtualization ("containers") Resources of computer are partitioned via the kernel"Guest" OSes share same running instance of OS as the host system Based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernelnamespaces and cgroups Examples:Docker, LXC, FreeBSD jails Hypervisors Also known as a Virtual Machine Manager (VMM) Creates and runs virtual machines It is a process that separates OS and apps from underlying physical hardware Multiple VMs share virtualized hardware resources When you create a new VM, the following happens: Hypervisor allocates memory and CPU space for VMs exclusive use Complete OS is installed onto the VM The VM's OS communicates with the hypervisor to perform tasks Host OS is able to see all physical hardware, whereas guest OS (VM) can only see hardware to which hypervisor has granted access Two types of hypervisors Type 1 (also called "native" or "bare metal" hypervisors) Run directly on the host's hardware to control the hardware and manage the guest VMsruns in ring 0 Are an OS themselves (simple OS on top of which you run VMs)the physical machine the hypervisor is running on serves only for virtualization purposesExceptions: Hyper-V, KVM ExamplesXen, Microsoft Hyper-V, VMware ESX/ESXi Type 2 (also called "hosted" hypervisors) Run on conventional OS, just like other apps Guest OS runs as a process on the host Hypervisor separates the guest OS from the host OS ExamplesVirtualBox, Parallels Protection levels (rings) x86 family of CPUs provide a range of protection levels also known as rings Ring 0 has the highest level privilege (kernel/supervisor) Ring 3 lowest level (applications) Hypervisor occupies ring 0 of CPU Kernels for any guest operating systems running on the system must run in less privileged CPU rings But most OS kernels are written explicitly to run in ring 0 Techniques to deal with this: Full virtualization hypervisor provides CPU emulation to handle ring 0 operations made by unmodified guest OS kernels emulation process requires both time and system resourcesinferior performance Paravirtualization Technique in which hypervisor provides an API and the OS of the guest VM calls that API Requires guest OS to be modified (to make API calls)Replace any privileged operations that will only run in ring 0 of the CPU with calls to the hypervisor ("hypercalls") Allows tasks to run in host OS (instead of in guest OS where performance would be worse) Hardware virtualization Requires a CPU with hardware virtualization extensions, such as Intel VT or AMD-VIntel virtualization (VT-x) Virtual Machine Extensions Adds ten new instructions VMPTRLD, VMPTRST, VMCLEAR, VMREAD, VMWRITE, VMCALL, VMLAUNCH, VMRESUME, VMXOFF, and VMXON. These instructions permit entering and exiting a virtual execution mode where the guest OS perceives itself as running with full privilege (ring 0), but the host OS remains protected. Reduces/eliminates any OS modifications in guest OS Provides an additional privilege mode above ring 0 in which the hypervisor can operateessentially leaving ring 0 available for unmodified guest OSes Better performance than paravirtualization Links Virtual machine Hypervisor What is a hypervisor? What Is A Hypervisor? Types Of Hypervisors 1 & 2 End SongTime for Trees - Sad Livin in the (New York) City - (David Last Remix)For a full transcription of this episode, please visit the episode webpage.We'd love to hear from you! You can reach us at: Web: https://mobycast.fm Voicemail: 844-818-0993 Email: ask@mobycast.fm Twitter: https://twitter.com/hashtag/mobycast
當我們觀察到,一個網路交換器的物理埠上面,學習到多重的MAC地址的時候,這個物理埠,有可能是連接到了另一套網路交換器,或者是,連接到了一個包含多重虛擬機器(Virtual Machine)的物理伺服器(Hypervisor)。如果我們能夠直接透過簡單的命令,找到哪些物理埠,跟虛擬機器有關,尤其是連接PC或是伺服器的埠,我們可以馬上指出來,哪些PC、伺服器上面,的確有虛擬機器的存在。這對我們數據中心的管理,將會是很有幫助的。我之前找到了一個Microsoft TechNet網站上面的資訊,內容是將常用的、預設分配給虛擬機器的MAC地址範圍的組織識別碼(Organizationally Unique Identifier, OUI)號碼,整理成一個對應表。其中,包含VMware、Xen、還有Microsoft。Microsoft Technet: How to Set the Static MAC Address Range for Virtual Network Devices Reserved For Prefixes VMware 00:05:6900:0C:2900:1C:1400:50:56 Microsoft 00:03:FF00:0D:3A00:12:5A00:15:5D00:17:FA00:1D:D800:50:F2 XenSource 00:16:3E 有了這個對照表之後,我們很容易就可以用命令,找出包含虛擬機器的物理埠。使用的命令很簡單,其實就是 “show mac-address-table interface”。我們看第一個例子。Switch# show mac-address-table interface f0/1Vlan Mac Address Type Ports---- ----------- -------- -----100 0015.5dXX.YYYY DYNAMIC Fa0/1100 0015.5dXX.ZZZZ DYNAMIC Fa0/1Total Mac Addresses for this criterion: 2Switch#根據以上的截圖,我們幾乎可以確定,FastEthernet0/1其實所連結的,是一套Microsoft Hyper-V的伺服器。我們還可以將命令做一點點的修改。例如,”show mac-address-table | include 0015.5d”。我們現在可以列出這個交換器,上面所有的Hyper-V伺服器裡面,虛擬機器的清單。例如下面第二個例子。Switch# show mac-address-table interface | include 0015.5d100 0015.5dXX.YYYY DYNAMIC Fa0/1100 0015.5dXX.ZZZZ DYNAMIC Fa0/1200 0015.5dWW.YYYY DYNAMIC Fa0/3200 0015.5dWW.ZZZZ DYNAMIC Fa0/4Switch#One more thing…我另外找到,一般在KVM上面,預設的MAC地址範圍是:QEMU's registered OUI (52:54:00)合併到前面的表格。新的表格如下: Reserved For Prefixes VMware 00:05:6900:0C:2900:1C:1400:50:56 Microsoft 00:03:FF00:0D:3A00:12:5A00:15:5D00:17:FA00:1D:D800:50:F2 XenSource 00:16:3E KVM (QEMU) 52:54:00 前面這些列表,所假設的,都是虛擬機器只使用各廠牌方案預設的、保留的MAC地址範圍。事實上,虛擬機器的管理者,很容易就可以透過各種設定,將MAC地址改換到其他的OUI範圍內。因此,這個方法,只能算是一個簡單的輔助的工具。使用時,需要注意它的限制。Welcome to virtualized world!吉野櫻下,仰望著天空玉淵潭公園,中國北京市
Use Red Hat solutions on Azure Introducing Red Hat Cloud Access for Microsoft Azure Government Congrats! Microsoft is the organization with the most open source contributors on GitHub for 2016! Red Hat Cloud Access for Red Hat Certified Cloud Providers like Azure and Azure Government Bi-directional support Red Hat Enterprise Linux guests supported on Microsoft Hyper-V Microsoft Windows and Windows Server guests supported on Red Hat Hypervisors Microsoft Azure Support Added To Red Hat CloudForms Tools DevNation Federal Microsoft showcases SQL Server, .NET Core on Red Hat Enterprise Linux deliverables OpenShift on Azure FISMA controls We Give Thanks Corey Sanders for being our special guest star! Special Guest: Corey Sanders.
In our 14th podcast we return to hyper converged systems and talk with Kelly Murphy, Founder and CTO of GridStore. Gridstore is a startup supplying hyper-coverged systems for Microsoft (Hyper-V) virtualization environments. Howard and I had a chance to talk with Gridstore at SFD4, just about a year ago. Gridstore has recently added an all-flash version of their … Continue reading "Graybeards talk hyper-convergence with Kelly Murphy, Founder & CTO, Gridstore"
Reimagining Windows: An In-Depth Look at Windows 8 for the Enterprise (Audio) - Channel 9
In today’s episode, Technical Evangelist Kevin Remde welcomes Microsoft MVP, Mitch Garvis to the show as they discuss how Windows 8 now includes Microsoft Hyper-V. Tune in as they discuss WHY you would want to use the power of Hyper-V virtualization on your desktop, laptop or tablet running Windows 8 Enterprise. [2:30] What is Hyper-V and what is it used for? [3:40] Why would anyone need that kind of power on their desktop? [5:10] What are some of the capabilities of Hyper-V running on Windows 8? [8:57] How do users interact with VMs? [12:04] Are there any special requirements for running Hyper-V on a Windows 8 machine? [16:41] How do users get started? Download the Windows 8 Enterprise Evaluation today and test your applications, hardware and deployment strategies with Windows 8.Resources:Windows 8 Enterprise Windows 8 Licensing The Springboard Series Blog Windows 8 Resources for IT Pros on Springboard Resources for Developers to Build Windows 8 Apps Windows 8 resources for partners on Microsoft Partner Network
Reimagining Windows: An In-Depth Look at Windows 8 for the Enterprise (HD) - Channel 9
In today’s episode, Technical Evangelist Kevin Remde welcomes Microsoft MVP, Mitch Garvis to the show as they discuss how Windows 8 now includes Microsoft Hyper-V. Tune in as they discuss WHY you would want to use the power of Hyper-V virtualization on your desktop, laptop or tablet running Windows 8 Enterprise. [2:30] What is Hyper-V and what is it used for? [3:40] Why would anyone need that kind of power on their desktop? [5:10] What are some of the capabilities of Hyper-V running on Windows 8? [8:57] How do users interact with VMs? [12:04] Are there any special requirements for running Hyper-V on a Windows 8 machine? [16:41] How do users get started? Download the Windows 8 Enterprise Evaluation today and test your applications, hardware and deployment strategies with Windows 8.Resources:Windows 8 Enterprise Windows 8 Licensing The Springboard Series Blog Windows 8 Resources for IT Pros on Springboard Resources for Developers to Build Windows 8 Apps Windows 8 resources for partners on Microsoft Partner Network
Reimagining Windows: An In-Depth Look at Windows 8 for the Enterprise (MP4) - Channel 9
In today’s episode, Technical Evangelist Kevin Remde welcomes Microsoft MVP, Mitch Garvis to the show as they discuss how Windows 8 now includes Microsoft Hyper-V. Tune in as they discuss WHY you would want to use the power of Hyper-V virtualization on your desktop, laptop or tablet running Windows 8 Enterprise. [2:30] What is Hyper-V and what is it used for? [3:40] Why would anyone need that kind of power on their desktop? [5:10] What are some of the capabilities of Hyper-V running on Windows 8? [8:57] How do users interact with VMs? [12:04] Are there any special requirements for running Hyper-V on a Windows 8 machine? [16:41] How do users get started? Download the Windows 8 Enterprise Evaluation today and test your applications, hardware and deployment strategies with Windows 8.Resources:Windows 8 Enterprise Windows 8 Licensing The Springboard Series Blog Windows 8 Resources for IT Pros on Springboard Resources for Developers to Build Windows 8 Apps Windows 8 resources for partners on Microsoft Partner Network
Sam talks to us about Microsoft Hyper-V version 3 and some of the new exciting features to expect - and how EMC will inteGrreat with these features. Also he discusses SQL 2012 and VSS.
Dan Morris, Senior Systems Engineer at WhiteWater West, shares his experience with NetApp and Microsoft Hyper-V. Topics include virtualizing Exchange to dramatically improve email reliability, using deduplication to reclaim space, and simplifying backup and recovery with NetApp.
Speciál pravidleného nedělního pořadu Týden Živě. Tentokráte jsme si pozvali šéfa IGNUM, se kterým jsme si povídali o doménách, hostingovém trhu u nás a o Microsoft Hyper-V technologii.Video: Týden Živě Speciál II
Patrick Rogers discusses how to increase operational efficiencies and scalability in your virtual environment by leveraging your existing NetApp(R) infrastructure for your Hyper-V(TM) deployment.