Browse Definitions :
Definition

VM automation

VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. An important goal of VM automation is to minimize human errors and reduce the amount of time it takes for information technology administrators to manage a large, logical infrastructure.

VM automation tools can help with the completion of routine tasks, as well as the Migration and placement of VMs. Placement is the process of determining where each virtual machine will operate and who will be its host. Migration involves balancing data and processing loads by moving VMs to optimize the use of host memory and processing power.

VM automation has many benefits but it's not suited to every workload or environment. While it works well for the creation and management of large numbers of VMs but for smaller organizations, the work and cost of tools required to implement VM automation can be detrimental to the cost-efficiency of the VMs themselves in a small environment. Tools built specifically for the automating virtual machine management at the enterprise level include VMWare vSphere PowerCLI and the VMWare vRealize Suite.

VM automation levels

The automation level for a virtual machine can be changed in the settings of software such as vSphere and levels of automation can be customized within different VMs. Possible levels include:

  • Manual - The system makes recommendations but does not implement them until the user manually makes the changes.
  • Fully automated - The system immediately implements changes.
  • Partially automated - The system makes some changes such as placement, or which host a virtual machine is nested within, but only suggests others, such as migration, or how various VMs are moved around in order to load balance a larger network.
  • Disabled - The system does not suggest or change anything.
This was last updated in July 2019

Continue Reading About VM automation

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

Close