{"id":1302,"date":"2018-01-09T10:11:16","date_gmt":"2018-01-09T08:11:16","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1302"},"modified":"2018-01-05T10:19:32","modified_gmt":"2018-01-05T08:19:32","slug":"monitor-virtualized-environments-with-nagios-and-icinga","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/","title":{"rendered":"Monitor virtualized environments with Nagios and Icinga"},"content":{"rendered":"<p>As easy as real servers today can be converted into virtual machines, as fast as the overview is lost.\u00a0With special monitoring adapted for virtual environments, you keep track of things.<\/p>\n<p>Virtualization is a technology that has been in the data center for many years and has its origins in host partitioning in the mainframe environment.\u00a0Already over 35 years ago, IBM has laid a significant foundation here with various mainframe LPARs.\u00a0Today, virtualization is an indispensable part of the data center, and many modern architectural concepts such as cloud computing would be inconceivable without this basic technology.<\/p>\n<p>Because new virtual machines can be rolled out quickly and easily, the basic principles of good IT management in everyday life sometimes fall behind.\u00a0For example, the necessary entries in the Configuration Management Database (CMDB) are forgotten, no documentation is created, or the admission to monitoring is postponed to later.<\/p>\n<p><a id=\"eztoc0_0_1\" name=\"eztoc0_0_1\"><\/a><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#Requirements_for_IT_service_management\" title=\"Requirements for IT service management\">Requirements for IT service management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#What_makes_a_virtualized_system_special\" title=\"What makes a virtualized system special?\">What makes a virtualized system special?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#Container_or_system_and_paravirtualization\" title=\"Container or system and paravirtualization\">Container or system and paravirtualization<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#Monitoring_Open_VZ_and_Solaris_Zones\" title=\"Monitoring Open VZ and Solaris Zones\">Monitoring Open VZ and Solaris Zones<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#Xen_and_KVM\" title=\"Xen and KVM\">Xen and KVM<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#VMware\" title=\"VMware\">VMware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#processing\" title=\"processing\">processing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/monitor-virtualized-environments-with-nagios-and-icinga\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h4><span class=\"ez-toc-section\" id=\"Requirements_for_IT_service_management\"><\/span>Requirements for IT service management<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Especially the monitoring of the available resources and compliance with the agreed service levels should be a core competence of IT operations and should also deal flexibly with the new requirements.\u00a0For the free monitoring systems Nagios and Icinga, there are a variety of plug-ins to monitor the available virtualization solutions and also to detect long-term capacity bottlenecks.\u00a0This article introduces solutions to monitor virtualized environments and identify changes.<\/p>\n<p><a id=\"eztoc0_0_2\" name=\"eztoc0_0_2\"><\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"What_makes_a_virtualized_system_special\"><\/span>What makes a virtualized system special?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>First of all, the question arises as to what makes a virtual system so special.\u00a0After all, the fixed allocation of resources to a virtualized system seems to require the same basic monitoring as usual.\u00a0But what is usually, what should really be monitored at the operating system level?\u00a0In order not only to detect failures, but to avoid them as far as possible, the hard disk usually offers the most potential, so the monitoring of the free space, but also of the I \/ Os per second should be given special attention: Nagios can with the plugin \u00bb\u00a0<code>check_disk<\/code>\u00abRecognize disk utilization and later use the data for capacity management.\u00a0A very useful extension of the disk check is the monitoring of the disk I \/ O.\u00a0This can\u00a0easily be determined\u00a0with the appropriate plugin \u00bb\u00a0<code>check_diskio<\/code>\u00ab\u00a0and also provided with alarm thresholds.\u00a0Increased Disk I \/ O is often evident days or weeks before other problems, as today&#8217;s systems are more memory-bound than CPU-bound.<\/p>\n<p>Although NRPE (Nagios Remote Plugin Executer) is standard in many environments, SSH should be preferred.\u00a0Reasons are firewall awareness, updates by the respective operating system provider but above all the proven handling of keys and configuration in the Linux and Unix environment.<\/p>\n<p>While the mentioned plugins are designed for Unix and Linux systems, the admin can also monitor load and I \/ O load on Windows systems.\u00a0The most common way is to use the NSClient ++ agent\u00a0and the corresponding server plugins \u00bb\u00a0<code>check_nt<\/code>\u00ab\u00a0or \u00bb\u00a0<code>check_nrpe<\/code>\u00ab.\u00a0The query is then made using the available Windows counters:<\/p>\n<pre class=\"auto\">check_nrpe -H $ HOSTADDRESS $ -c CheckCounter \r\n-a \"\\\\ System \\\\ File Data Operations \/ Sec\" \r\nShowAll MaxWarn = 20000 MaxCrit = 30000<\/pre>\n<p>In addition to \u00bb\u00a0<code>check_disk<\/code>\u00ab, the monitoring of certain processes also serves to avoid errors.\u00a0Standard\u00a0plugins\u00a0like &#8221;\u00a0<code>check_proc<\/code>&#8221;\u00a0\u00a0and the Checkprocstate module of NSClient ++\u00a0help.\u00a0For example, on Windows it is possible to monitor the maximum number of specific processes in order to identify possible errors in good time:<\/p>\n<pre class=\"auto\">check_nrpe -H IP -p 5666 -c CheckProcState\r\n -a MaxCritCount = 50 app.exe = started<\/pre>\n<p>In addition, monitoring systems can, of course, monitor a large number of other services and services.\u00a0In the relevant portals of the German community\u00a0and various wikis\u00a0\u00a0are countless examples, thanks to the great popularity of Nagios and Icinga.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Container_or_system_and_paravirtualization\"><\/span>Container or system and paravirtualization<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The type of monitoring depends heavily on the virtualization solution used.\u00a0While container-based technologies such as Open VZ, Linux Vserver, or Solaris Zones provide closed runtime environments without starting an additional operating system core, system and paravirtualization, as with VMware, Xen, or KVM, only releases a certain pool of resources.\u00a0The host system then has to take care of their own use and controls the resources provided regardless of the virtualization environment.\u00a0This also shows the big difference in possible surveillance scenarios.\u00a0While containerized solutions mostly represent homogeneous system environments, paravirtualization may lead to different host systems.<\/p>\n<p><a id=\"eztoc0_0_2\" name=\"eztoc0_0_2\"><\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"Monitoring_Open_VZ_and_Solaris_Zones\"><\/span>Monitoring Open VZ and Solaris Zones<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Open VZ can provide additional containers based on a patched Linux kernel.\u00a0For each container, Open VZ creates a corresponding structure in the proc area of the Linux system.\u00a0While in previous versions there were some modest areas such as &#8221;\u00a0<code>\/proc\/user_beancounters<\/code>&#8220;, &#8221;\u00a0<code>\/proc\/user_beancounters_sub<\/code>&#8221; and &#8221;\u00a0<code>\/proc\/user_beancounters_debug<\/code>&#8220;, in the current versions they can be found in a hierarchical structure.<\/p>\n<p>Sorted by UID of the container, all counters are listed and can be easily viewed with file system commands.\u00a0Based on the example plug-in in the Open VZ wiki, Robert Nelson has developed \u00bb\u00a0<code>check_openvz<\/code>\u00ab\u00a0.\u00a0With threshold values, the administrator can\u00a0monitor\u00a0the overshooting of corresponding limits, such as &#8221;\u00a0<code>kmemsize<\/code>&#8221; and &#8221;\u00a0<code>numproc<\/code>&#8220;, and adapt the configuration to the actual resources required.\u00a0Solaris Zones can only be\u00a0<code>zoneadm<\/code>monitored by\u00a0monitoring the hosted operating system using the \u00bb\u00a0\u00ab command.\u00a0With &#8221;\u00a0<code>check_zones<\/code>&#8220;a wrapper plugin is available that facilitates the call and outputs the status of the zones.\u00a0An interesting alternative is the use of \u00bb<code>prtstat -Z<\/code>&#8220;There<\/p>\n<div id=\"article_l1\" class=\"box listingbox\">\n<div class=\"boxname\">\n<p>Listing 1<\/p>\n<\/div>\n<div class=\"boxtitle\">\n<p><span class=\"filename\">prstat<\/span><\/p>\n<\/div>\n<pre class=\"auto\">#prstat -Z\r\n# PID USERNAME SIZE RSS STATE PRI NICE TIME CPU PROCESS \/ NLWP\r\n# 173 daemon 17M 11M sleep 59 0 3:18:42 0.2% rcapd \/ 1\r\n# 17676 apl 6916K 3468K cpu4 59 0 0:00:00 0.1% prstat \/ 1\r\n# ...\r\n# ZONEID NPROC SWAP RSS MEMORY TIME CPU ZONE $\r\n# 0 48 470M 482M 1.5% 4:05:57 0.0% global $\r\n# 3 85 2295M 2369M 7.2% 0:36:36 0.0% refapp1 $\r\n# 6 74 13G 3273M 10% 16:51:18 0.0% refdb1 $\r\n# Total: 207 processes, 709 lwps, load averages: 0.05, 0.06, 0.11 $<\/pre>\n<\/div>\n<p>This allows the administrator to determine information about CPU and memory consumption in the individual virtual machines globally, access to the zone itself is not absolutely necessary.\u00a0The two plug-ins\u00a0\u00a0for CPU and Memory are just simple shell scripts, but they can also handle warning thresholds.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Xen_and_KVM\"><\/span>Xen and KVM<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>While the underlying concepts of Xen and KVM are completely different, they do share the support of Libvirt.\u00a0Libvirt is a Red Hat-sponsored toolkit for communicating with various virtualization technologies.\u00a0In addition to Xen, KVM and Virtualbox, it also supports OpenVZ and VMWare ESX and GSX.\u00a0Based on this API, \u00bb\u00a0<code>nagios-virt<\/code>\u00ab\u00a0\u00a0has been\u00a0created to assist the user in configuring the appropriate host and service definitions for Libvirt systems.<\/p>\n<p>Although the last update of the project has been around for some time, its functionality is still in place.\u00a0Likewise on the basis of Libvirt and the command \u00bb\u00a0<code>virsh<\/code>\u00ab the monitoring takes place with the help of the plugin \u00bb\u00a0<code>check_virsh<\/code>\u00ab\u00a0\u00a0.\u00a0The output of the plugin is unfortunately neither English nor German, but easy to adapt.\u00a0For Xen there is additionally \u00bb\u00a0<code>check_xenvm<\/code>\u00ab\u00a0.\u00a0It evaluates\u00a0<code>xm list<\/code>the appropriate Xen status\u00a0using the &#8221;\u00a0&#8221;\u00a0command\u00a0and outputs it formatted.\u00a0If a system is being monitored at the time of the live migration, the plugin will also display it.<\/p>\n<p><a id=\"eztoc0_0_2\" name=\"eztoc0_0_2\"><\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"VMware\"><\/span>VMware<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>VMware has been on the market for over 10 years and is a veteran of virtualization.\u00a0To show the different possibilities of monitoring, it is important to differentiate the different product lines.\u00a0While VMware Server (formerly VMware GSX) requires its own host system based on Linux or Windows, VMware ESX Server provides its own Linux kernel, which does not need a standalone host system to expand its drivers.\u00a0On top of that, if required, there is also Vcenter, which enables the central administration of several ESX servers as well as live migration (Vmotion).<\/p>\n<p>The two most comprehensive plugins are \u00bb\u00a0<code>check_esx3<\/code>\u00ab\u00a0and \u00bb\u00a0<code>check_vmware3<\/code>\u00ab\u00a0\u00a0.\u00a0Both plugins access the VMware information using the VMware Perl API and can be parameterized in a variety of ways.\u00a0The main difference between the two plugins is the support for heartbeat by &#8221;\u00a0<code>check_vmware3<\/code>&#8221; to determine the exact system status and the support of regular expressions when specifying hostnames (\u00a0Figure 1\u00a0).\u00a0For example, the virtual machines of specific customers or system groups can be specifically monitored.\u00a0If the appropriate VMware tools are installed in the guest system, the plugin can \u00bb<code>check_esx3<\/code>\u00abGet detailed performance information and measure the performance through the host system as described in the Solaris Zone.\u00a0Installing a special agent in the guest is therefore superfluous.<\/p>\n<div id=\"article_f1\" class=\"object-center\"><a title=\"Figure 1: The VMware plug-in can monitor virtualization hosts and individual virtual machines.\" href=\"https:\/\/i0.wp.com\/www.admin-magazin.de\/var\/ezflow_site\/storage\/images\/das-heft\/2010\/05\/ueberwachung-von-virtualisierten-umgebungen-mit-nagios-und-icinga\/abbildung-12\/24381-1-ger-DE\/Abbildung-11_lightbox.png\" rel=\"lightbox[image] noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.admin-magazin.de\/var\/ezflow_site\/storage\/images\/das-heft\/2010\/05\/ueberwachung-von-virtualisierten-umgebungen-mit-nagios-und-icinga\/abbildung-12\/24381-1-ger-DE\/Abbildung-11_large.png?w=750\" alt=\"\" \/><\/a><\/div>\n<div class=\"object-center\"><span class=\"attribute-caption\">Figure 1: The VMware plug-in can monitor virtualization hosts and individual virtual machines.<\/span><\/div>\n<div>\n<h4><span class=\"ez-toc-section\" id=\"processing\"><\/span>processing<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Crucial to meaningful alerting and meaningful reporting of virtualized environments is the proper configuration and distribution of host and service objects into appropriate host and service groups.\u00a0Checking the availability of a virtual machine via the host system is no substitute for extensive monitoring of the virtualized system.\u00a0On the one hand, the view of the guest system is not independent of the network and can therefore lead to falsified availability results.\u00a0On the other hand, the configuration of service dependencies to other services is somewhat difficult if necessary.<\/p>\n<p>The correlation of performance information of a host system is really exciting.\u00a0For example, influences from overlapping resource allocation, such as memory ballooning or the use of VCPUs, can be identified, and guests can be moved to other host systems if necessary.\u00a0Graphical processing of the plug-in results using PNP4Nagios\u00a0\u00a0or the Grapher Netways\u00a0also\u00a0facilitates long-term analysis and allows early identification of capacity\u00a0bottlenecks\u00a0.<\/p>\n<p><a id=\"eztoc0_0_2\" name=\"eztoc0_0_2\"><\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The user benefits from the use of Nagios and Icinga of probably the largest and most active open source monitoring community in the monitoring world and can therefore fall back on a variety of plugins and extensions.\u00a0Especially Xen, KVM and VWware offer detailed query options via Libvirt or in-house APIs, which can easily be implemented by extending existing plugins.<\/p>\n<p>The monitoring of the virtualization platform and the virtualized system should complement each other optimally, as the performance provided almost always depends on the function of the real system and not the virtualization environment.\u00a0Virtualization platform monitoring, in conjunction with the other basic checks, provides a clear picture of dependencies and identifies potential bottlenecks on the host system before they can be identified in the guest system.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As easy as real servers today can be converted into virtual machines, as fast as the overview is lost.\u00a0With special monitoring adapted for virtual environments, you keep track of things. Virtualization is a technology that has been in the data center for many years and has its origins in host<\/p>\n","protected":false},"author":3,"featured_media":1303,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[25,5,3],"tags":[],"class_list":["post-1302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news","category-knowledgebase","category-tutorial-how-to"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/Captura-de-pantalla-2012-11-12-a-las-18.20.51.png?fit=800%2C378&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-l0","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":789,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-attack-on-virtual-machines\/","url_meta":{"origin":1302,"position":0},"title":"MALWARE ATTACK ON VIRTUAL MACHINES","author":"Daniel Draga","date":"December 6, 2016","format":false,"excerpt":"Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward. \u00a0 Enterprises are increasingly adopting virtualization technology, according\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/mobile-malware_126852062-thumb-380xauto-2252.jpg?fit=380%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":260,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/introduction-to-virtualization\/","url_meta":{"origin":1302,"position":1},"title":"Introduction To Virtualization","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"At the beginning, before the dawn of time\u00a0 there was emulation.(overly exaggerated) \u00a0Emulation,\u00a0the virtual machine simulates the complete hardware in software. This allows an operating system for one computer architecture to be run on the architecture that the emulator is written for. Sine all operations are run in software, emulation\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":705,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/what-is-network-function-virtualisation-nfv\/","url_meta":{"origin":1302,"position":2},"title":"WHAT IS NETWORK FUNCTION VIRTUALISATION (NFV)?","author":"Daniel Draga","date":"October 14, 2016","format":false,"excerpt":"Network Function Virtualisation (NFV) In computer science, network function virtualisation (NFV) is a network architecture concept which uses the technologies of IT virtualisation. It is used to virtualise entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. 1. Fast standard\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/123.png?fit=464%2C266&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":97,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/what-is-the-difference-between-kvm-and-openvz-virtualization\/","url_meta":{"origin":1302,"position":3},"title":"What is the difference between KVM and OpenVZ virtualization?","author":"Virtono","date":"July 18, 2016","format":false,"excerpt":"\u00a0 VS \u00a0What is the difference between KVM and OpenVZ? Usually this question arises when a person is looking for a Virtual Private Server, it\u2019s a dilemma, isn\u2019t it? Weighing the pros and cons but one thing that should be kept in mind is that out of these two, there\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/1-2.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/1-2.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/1-2.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/1-2.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":676,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/data-security-in-cloud-computing\/","url_meta":{"origin":1302,"position":4},"title":"Data Security in Cloud Computing","author":"Daniel Draga","date":"October 3, 2016","format":false,"excerpt":"\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. . \u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2283,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/introduction-to-docker-containers-vms\/","url_meta":{"origin":1302,"position":5},"title":"Introduction to Docker, Containers &#038; VMs","author":"Shreyash Sharma","date":"March 6, 2021","format":false,"excerpt":"In this introductory section, we will go over the need for virtualisation, the necessity which gave birth to it. We will cover a brief history and how the future looks for this industry. If you want to get hands-on real-world experience with understanding and deploying Docker Containers. Or if you\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2021\/02\/461265-docker-containers.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2021\/02\/461265-docker-containers.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2021\/02\/461265-docker-containers.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2021\/02\/461265-docker-containers.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2021\/02\/461265-docker-containers.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1302"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1302\/revisions"}],"predecessor-version":[{"id":1304,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1302\/revisions\/1304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1303"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}