Book Image

VMware vSphere 6.x Datacenter Design Cookbook - Second Edition

By : Hersey Cartwright, kim bottu
Book Image

VMware vSphere 6.x Datacenter Design Cookbook - Second Edition

By: Hersey Cartwright, kim bottu

Overview of this book

VMware is the industry leader in data center virtualization. The vSphere 6.x suite of products provides a robust and resilient platform to virtualize server and application workloads. With the release of 6.x a whole range of new features has come along such as ESXi Security enhancements, fault tolerance, high availability enhancements, and virtual volumes, thus simplifying the secure management of resources, the availability of applications, and performance enhancements of workloads deployed in the virtualized datacenter. This book provides recipes to create a virtual datacenter design using the features of vSphere 6.x by guiding you through the process of identifying the design factors and applying them to the logical and physical design process. You’ll follow steps that walk you through the design process from beginning to end, right from the discovery process to creating the conceptual design; calculating the resource requirements of the logical storage, compute, and network design; mapping the logical requirements to a physical design; security design; and finally creating the design documentation. The recipes in this book provide guidance on making design decisions to ensure the successful creation, and ultimately the successful implementation, of a VMware vSphere 6.x virtual data center design.
Table of Contents (19 chapters)
VMware vSphere 6.x Datacenter Design Cookbook Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Identifying design risks


Risks include anything that may prevent the design from satisfying the requirements.

Design risks include the following:

  • Technical risks

  • Operational risks

  • Financial risks

Risks are often introduced through constraints or assumptions that have not been proven. Risks resulting from assumptions are mitigated by validating them.

How to do it...

Throughout the design process, design decisions should mitigate or minimize risks by following this process:

  1. Identify any risks associated with the design requirements or assumptions.

  2. Validate assumptions to reduce the risks associated with them.

  3. Determine how design decisions will help mitigate or minimize risks.

How it works...

There are a few risks in the design based on the discovery information, assumption, and constraints.

As part of the discovery process, the following risk was noted:

  • Currently, there is no shared storage. The current system and infrastructure administrators are unfamiliar with the shared storage concepts and protocols...