Skip to main content

Novell optimizes its SuSe for VMware ESX

WALTHAM, Mass., June 16 /PRNewswire/ -- Novell(R) announced today it is collaborating with VMware to improve Linux performance in VMware environments by incorporating support for the VMware Virtual Machine Interface (VMI) into the SUSE(R) Linux Enterprise kernel. Demonstrating their commitment to provide open interoperability and optimization for virtualized environments, the companies have worked together to optimize SUSE Linux Enterprise for the VMware platform.

"Customers are looking to interchangeably deploy their server operating systems and their related workloads on both physical and virtual servers," said Al Gillen, research vice president, System Software at IDC. "The goal of any hypervisor is to deliver the flexibility of virtualization accompanied by the performance delivered by a physical deployment. This joint effort directly addresses those requirements for SUSE Linux Enterprise customers."

Announced at VMworld in September 2007, the enhancements have been in development for the past nine months, and the code was released as part of SUSE Linux Enterprise 10 SP2 in May 2008.

Improved Performance

As part of this collaboration, Novell has modified the SUSE Linux Enterprise kernel to support the VMware Virtual Machine Interface (VMI), a communication mechanism between the guest operating system and hypervisor that simplifies the task of virtualization. Adding VMI patches to SUSE Linux Enterprise Server improves its efficiency as a virtualized operating system when running on VMI-compliant infrastructure and offers better interoperability by allowing the same kernel to run on physical machines. This simplifies virtualization and makes SUSE Linux Enterprise Server a more efficient guest operating system when running on VMI-compliant hypervisors.



Link

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!