Category: BPS: Life Cycle & Patch Management

BlogPost Series: LCM of VMware vSphere & HPE Hardware – Final Conclusion (Part 5)

Final Conclusion Like I said in the beginning of the blogpost series, Life Cycle & Patch Management is a difficult topic. Which can become a big headache when there are so many dependencies within the environment, especially if it hasn’t been maintained for a while. The bigger the Jump, the more difficult it gets. Therefore, …read more →

Read more

BlogPost Series: LCM of VMware vSphere & HPE Hardware – Global LCM Plan & Order of Upgrading (Part 4)

Intro We’ve viewed the different tools that help to manage a HPE stack and if and how we could integrate VUM with this. We also discussed that consistency with virtualization & infrastructure is one of the most important things for having reliable operations, and that you need some sort of reporting tool that can give …read more →

Read more

BlogPost Series: LCM of VMware vSphere & HPE Hardware – Scripts & Reporting Tools (Part 3)

Intro We’ve viewed the different tools that help to manage a HPE stack and if and how we could integrate VUM with this. During the project and our research, we found out that it is really difficult to see if the VIBs that are being deployed, are consistent with all the ESXi hosts of the …read more →

Read more

BlogPost Series: LCM of VMware vSphere & HPE Hardware – LCM Tools Comparison & Review (Part 2)

Intro Life Cycle & Patch Management, can be achieved with different tools and methods with HPE and VMware. However, the number of available tools that can be used for LCM, can make it quite confusing of how and when these tools should be used. Especially when you install the CIM agent on the ESXi host, …read more →

Read more

BlogPost Series: LCM of VMware vSphere & HPE Hardware – Basics (Part 1)

Intro Life Cycle & Patch Management within organizations can be a difficult topic. Mostly because of the broad set of software and hardware that can and should be included in a Life Cycle & Patch Management strategy. Still, due to the constantly changing landscape within the IT, this becomes more and more important. Security breaches …read more →

Read more