Access your Pro+ Content below.
Better configuration management strategies for IT pros
This article is part of the July 2009, Vol. 12 issue of Virtual Data Center
Years ago the notion of system configuration meant that IT shops made sure they had appropriate hardware characteristics, operating system versions and patch levels. Today’s proliferation of virtual machines (VMs) has dramatically expanded the concept to include every server element, including hardware setups, hypervisor patching, and the makeup of every VM image. In many cases, every machine must share a common, well documented configuration to meet disaster recovery and business continuance needs as well as to demonstrate regulatory compliance. But the sheer number of VMs in a modern data center makes manual configuration almost impossible. So administrators routinely use configuration management tools to exercise fast and accurate control over an increasingly dynamic computing environment. Configuration management is the broad practice of knowing and controlling how systems are set up throughout their lifecycle. Configuration management traditionally starts at the hardware level and tracks system devices through purchase, ...
Access this Pro+ Content for Free!
Features in this issue
Pick the best tool to maintain efficient and cost-effective operation in today’s virtual data centers.
If you approach virtual environment security by viewing elements such as a hypervisor and management applications in isolation, you invite breaches and risk. This tip outlines three common risks to virtual environments and how to prevent them.
Plan ahead with a virtual desktop infrastructure strategy that will yield more bang for the buck.