In virtual environments, VMs often get turned off and forgotten.
The Powered Off VMs category identifies virtual machines that have been powered off for an extended period. It is recommended to delete these VMs, since they have been powered off for a long time. Users must manually perform this operation. The operation cannot be reverted, and therefore, it should not be automated.
The Powered Off VMs view includes the following elements:
Virtual Machine. Name assigned to the VM. | |
Volumes. Combines the volume name and the relevant cluster name. | |
Size. Size of the powered off VM. | |
Powered Off For. Number of days the VM has been powered off. | |
The Search for a Virtual Machine box is located on the top left corner of the table. It allows you to search the environment for a specific virtual machine, by entering its name in the search box. The VMs matching the search criteria are displayed in the Virtual Machines table.
Creating a checkpoint in a virtual environment does not create a complete copy of the original VM disk file, rather it only copies the delta between disks. A checkpoint file contains only a change log of the original virtual disk. The Checkpoint category identifies the checkpoints taken in your environment that have not been modified for an extended period, and allows you to reclaim them, if necessary.
The Checkpoints view includes the following elements:
Virtual Machine. VM name and checkpoint name. | |
Description. Checkpoint description. May indicate why the checkpoint was created. | |
Reclaim Size. Size of the checkpoint. | |
Last Modified. Number of days passed since the checkpoint file was last modified. | |
Checkpoints Count. Number of checkpoints. | |
Volumes. Combines the volume name and the relevant cluster name. | |
Recommendations. Recommends removing the unused checkpoint file. | |
The Search box is located on the top left corner of the table. It allows you to search the environment for a specific VM or checkpoint file, by entering its name in the search box. The VMs matching the search criteria are displayed in the Virtual Machines table.
The Potential Zombie VMs category identifies those VMs by analyzing CPU, memory, network, and disk throughput for consistent usage over an extended period. It allows you to reclaim them, if necessary.
The Potential Zombie VMs view includes the following elements:
Virtual Machine. Name assigned to the VM. | |
CPU. CPU utilization. | |
Memory. Memory amount that the zombie VM is wasting. | |
Disk Throughput. Throughput speed of the zombie VM’s disk. | |
Network. Network speed of the zombie VM. | |
Recommendations. Recommends removing the potential zombie files. | |
The Search for a Virtual Machine box is located on the top left corner of the table. It allows you to search the environment for a specific virtual machine, by entering its name in the search box. The VMs matching the search criteria are displayed in the Virtual Machines table.
The VM Configuration category allows you to search for VMs with duplicate VMIDs (bios IDs), and provides recommendations for remediation.
The VM Configuration view includes the following elements:
Name. Configuration name. | |
Virtual Center. Virtual center name. | |
Creation Date. Date and time when the configuration was created. | |
Template. Set to Yes if it is a template; set to No if it is a VM. | |
Recommendation. Recommends changes to the configuration. | |
The Search for a Virtual Machine box is located on the top left corner of the table. It allows you to search the environment for a specific VM configuration, by entering its name in the search box. The configurations matching the search criteria are displayed in the VM Configuration optimization table.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. 利用規約 プライバシー Cookie Preference Center