Book Image

VMware vSphere Security Cookbook

By : Michael Greer
Book Image

VMware vSphere Security Cookbook

By: Michael Greer

Overview of this book

Table of Contents (20 chapters)
VMware vSphere Security Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring virtual machine resource isolation


Monitoring the guest virtual machine might not seem to have a direct impact on security; however, should a VM spin out of control and go unchecked, it can have severe performance impact on neighboring VMs as well as the host. Without a mechanism to control or contain VMs, the potential to cause a Denial of Service (DoS) condition exists. In addition, excessive I/O can not only adversely affect the performance of VMs on the same host, but also affect the VMs on any number of hosts that use the same shared storage where the problem VM resides.

Getting ready

In order to proceed with this set of steps, we must be logged in to vSphere Web Client with a user account in the administrators group. There must also be a VM in the inventory to add to a resource pool.

How to do it…

In this recipe, we'll be adding a new resource pool and configuring the values to ensure that the virtual machines in the pool won't have any adverse effect on the compute resources...