AcloudA
How to install a custom graphics card to the ESXi guest hypervisor.
Posted by Veniamin Kireev on April 3, 2018
No ratings yet.

Since version 5.5, VMware has broken something inside, and a normal GTX series video card from Nvidia required a certain understanding HowTo do this (in my case it’s NVIDIA QUADRO K600).

There is an opinion that this is connected with the appearance of a line of video cards GRID from Nvidia, created for virtualization.

In this article, we show you How To install a custom graphics card to the ESXi guest hypervisor.

result - added graphic card

Learn More

Please rate this

Configuring NIC Teaming in ESXi 6.5 upd 1.
Posted by Veniamin Kireev on March 21, 2018
No ratings yet.

A NIC team can share a load of traffic between physical and virtual networks among some or all of its members, as well as provide passive failover in the event of a hardware failure or network outage.

To utilize NIC teaming, two or more network adapters must be uplinked to a virtual switch. The main advantages of NIC teaming are:

  • Increased network capacity for the virtual switch hosting the team.
  • Passive failover in the event one of the adapters in the team goes down.

WEB GUI ESXi - Virtual switches

Learn More

Please rate this

VMware ESXi 6.5 Update 1 – vSwitch Error
Posted by Veniamin Kireev on March 6, 2018
No ratings yet.

On my work, I needed to install ESXi on our Server HP Proliant DL360 G6 server. Going to configure the network, I needed to add adapters to vSwitch but something went wrong and I got the error says to me – “You do not have free adapters to add to vSwitch”.

There are no free physical adapters to attach to this virtual switch - Error

Learn More

Please rate this

Building a Cluster based on VMware (part III)
Posted by Veniamin Kireev on February 19, 2018
No ratings yet.

This is the third and the last article in the series related to How to build a Cluster based on VMware. In the first article, we saw Cluster Technologies types and understand how to install VMware ESXi, in the second article we look at how to deploy the vCenter Server Appliance (VCSA) 6.5., and now we will look at how to configure VMware HA Cluster.

Scheme of VMware vSphere Cluster

Learn More

Please rate this

Building a Cluster based on VMware (part II)
Posted by Veniamin Kireev on February 6, 2018
No ratings yet.

In the previous article “Building a Cluster based on VMware (part I) we saw Cluster Technologies types and understand how to install VMware ESXi. To create a cluster of ESXi hosts, we need to install vCentre. In this part, we’ll look at how to deploy the vCenter Server Appliance (VCSA) 6.5

Scheme of VMware vSphere Cluster

Learn More

Please rate this

Building a Cluster based on VMware (part I)
Posted by Veniamin Kireev on January 29, 2018
No ratings yet.

To build a cluster, VMware uses from 2x to 32x ESXi servers that are managed using vCenter. To build a cluster, you also need a shared store. It can be implemented with VMware vSAN or with storage support providing access via Fiber Channel, iSCSI or NFS. The storage stores the virtual machine files that are available to all the cluster hosts at the same time. It is due to the overall storage and independence of the virtual machine from the physical platform that rapid migration/recovery of virtual machines is achieved.

Scheme of VMware vSphere Cluster

Learn More

Please rate this

Generation and Use of Virtual Credit Cards for Registration with Cloud Providers (GCP, AZURE, AWS)
Posted by Veniamin Kireev on June 19, 2017
No ratings yet.

Anonymity Secured Virtual Credit Card

Anonymity has been a vital issue since the very emergence of the Internet. Though anonymity is not something that was invented with the Internet.

People always resort to it in order to achieve various goals, such as to hide their real names, obtain a more unbiased evaluation of their messages or creations, protect the privacy of people in scientific studies, etc. This issue has gained more attention due to a spread of social networks and online services, which has prompted governments in many countries to adopt laws that both protect anonymity in certain circumstances and require disclosure of personal information, while explicitly forbidding anonymity in other situations.

Learn More

Please rate this