yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Be the Victor in the Hunger Games of Your Virtualization Environment
Thoughts From the Mind of a Previous VMware Admin (aka Game Master)

Thoughts From the Mind of a Previous VMware Admin (aka Game Master)

Do you ever feel like your Windows server is not performing well in the VMware environment, as if it were a sponsor-less contestant in the arena of the annual hunger games?  As a VMware admin and consultant I witnessed first hand the fine art of deception for presenting restricted resources to virtual machines.  An application owner or Windows admin would come to my cube or put in a help desk ticket asking for a new virtual machine.  They would often ask me for an insane amount of resources for this VM because the application vendor demanded it.  So just like in the Hunger Games, I would plop the new VM into the environment but at the same time I would unleash harsh conditions on the VM without the requestor ever knowing.  In my defense, I was kind of forced to be one Mean Game Master!

Memory Restrictions are like Surviving in the Arena with Heavy Wounds

To limit : something that bounds, restrains, or confines.

Windows administrators use Task Manager or other tools to gauge performance in virtual machines, and while this is great for looking into each process for CPU and Memory usage percentages, the data is highly inaccurate.  For instance, you can look at the resources tab and see that your virtual machine has 4GB of RAM.  Feeling confident in this number meeting the application requirements, you then fire up the application.  At first things seem to be humming along as if your chariot has entered the arena with trailing flames of speed, but then intermittently the application speed goes downhill with no apparent reason.  Chances are that your VM Admin(aka the Game Master) has implemented a obstacle in the arena known as a Memory Limit.

  • Ask your VM Admin for a screenshot of the Resources tab of the Virtual Machine, specifically the Memory settings area.
  • If you see that a value has been given other than the amount of RAM you expect, you are a victim of a Memory Limit.
  • The only good values on this screen would be the exact allocated memory or having the checkbox set for “Unlimited.”

So what does this mean to you?  Memory Limits are designed to aid VMware Admins in restricting the amount of physical memory actually allocated to virtual machines.   For instance, you request a 4GB of RAM machine but the VMware admin implements a 2GB limitation.  Your virtual machine is actually using what is known as a balloon mechanism so as to mask the memory limit from the operating system.  So as you gaze at the resources tab, you would see 4GB of RAM available for use, however in the background, you are paging the remaining necessary memory to disk!  The only “sponsor care package” you can receive in this scenario would be in the form of having insanely fast storage underlying the virtual machine disk files.

  • Plead with the Game Master to remove the constraints!
  • Set the Memory Limit to Unlimited or the exact amount of Memory Allocated.

Now if you have survived this long, we need to investigate the VMware ESX Host memory utilization.  How over-subscribed is the host holding your VMs? If many virtual machines are fighting for memory, the ESX Host will implement what is known as Memory Swapping. There is no tool built into the operating system that you the OS admin can use to detect this is occurring against your VM’s fight for power. If Memory Swapping is in fact occurring you now have a major issue.  All VMs on the host are experiencing latency when utilizing memory because a big chunk of that memory is virtualized on the host disk drives or Storage Area Network.

  • Petition for your workload to be moved to a less contentious host!

Continue reading in part 2 of this series here where I discuss more havoc in the arena surrounding processor restrictions!

About Tommy Patterson
Tommy Patterson began his virtualization adventure during the launch of VMware's ESX Server's initial release. At a time when most admins were only adopting virtualization as a lab-only solution, he pushed through the performance hurdles to quickly bring production applications into virtualization. Since the early 2000s, Tommy has spent most of his career in a consulting role providing assessments, engineering, planning, and implementation assistance to many members of the Fortune 500. Troubleshooting complicated scenarios, and incorporating best practices into customer's production virtualization systems has been his passion for many years. Now he share his knowledge of virtualization and cloud computing as a Technology Evangelist in the Microsoft US Developer and Platform Evangelism team.

Web 2.0 Latest News
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers