VMware VLM3-ENG-CP User Guide - Page 172

Why Should I Fence Configurations?, How Does Fencing Work?

Page 172 highlights

VMware® Lab Manager User's Guide Why Should I Fence Configurations? Typically, you want to enable network fencing under these circumstances: „ You have a configuration with one or more servers, and you anticipate cloning the configuration numerous times. „ You have a configuration involving a difficult and complex setup, and cloning the configuration is an easier route than repeating the setup. With fencing, engineers can run multiple, independent tests on a configuration deployed multiple times. Fencing is particularly useful when a developer needs to examine a bug without interrupting or stopping ongoing testing on a configuration. Lab Manager also enables you to reproduce the bug at a later time if the developer is unavailable. The default number of concurrently deployed fenced configurations on a Managed Server system is 20. If you need more configurations, you can increase the number without any penalty. From a performance perspective, network fencing impacts the traffic flow between modules. Fencing requires a slightly higher number of resources on the Managed Server system, such as memory, CPU, networking, and virtual machine slots. If you enable fencing but never use it, these resources do not come into play. How Does Fencing Work? Virtual machines in a configuration have preconfigured (internal) IP addresses. When you deploy virtual machines in fenced mode, Lab Manager assigns a unique external IP address to each of these machines. Through these external addresses, virtual machines both inside and outside the fence can communicate with each other. Lab Manager uses a virtual router to route packets between these virtual machines. Lab Manager configures the virtual router when you deploy a fenced configuration and deletes it when you undeploy the configuration. Figure C‐1 illustrates configurations without fencing and with fencing. 172 VMware, Inc.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

VMware® Lab Manager User’s Guide
172
VMware, Inc.
Why Should I Fence Configurations?
Typically, you want to enable network fencing under these circumstances:
You have a configuration with one or more servers, and you anticipate cloning the
configuration numerous times.
You have a configuration involving a difficult and complex setup, and cloning the
configuration is an easier route than repeating the setup.
With fencing, engineers can run multiple, independent tests on a configuration
deployed multiple times. Fencing is particularly useful when a developer needs to
examine a bug without interrupting or stopping ongoing testing on a configuration.
Lab Manager also enables you to reproduce the bug at a later time if the developer is
unavailable.
The default number of concurrently deployed fenced configurations on a Managed
Server system is 20. If you need more configurations, you can increase the number
without any penalty.
From a performance perspective, network fencing impacts the traffic flow between
modules. Fencing requires a slightly higher number of resources on the Managed
Server system, such as memory, CPU, networking, and virtual machine slots. If you
enable fencing but never use it, these resources do not come into play.
How Does Fencing Work?
Virtual machines in a configuration have preconfigured (internal) IP addresses. When
you deploy virtual machines in fenced mode, Lab Manager assigns a unique external
IP address to each of these machines. Through these external addresses, virtual
machines both inside and outside the fence can communicate with each other. Lab
Manager uses a virtual router to route packets between these virtual machines. Lab
Manager configures the virtual router when you deploy a fenced configuration and
deletes it when you undeploy the configuration.
Figure C
1 illustrates configurations without fencing and with fencing.