Browse Definitions :
Definition

zombie VM

A zombie VM is a virtual machine that is created, often for a particular purpose, and is forgotten when it is no longer needed for that purpose. As a result, the VM continues to consume resources while performing no useful work. The proliferation of zombie VMs in a data center is one of the main causes of virtualization sprawl.

Virtual machines can be created quickly and easily and only use a very small portion of the physical infrastructure's resources to run. When virtual instances are created faster than they are removed, however, the result is virtualization sprawl. The irony of virtualization sprawl is that it can cancel out the benefits that make virtualization attractive and cost-effective in the first place, costing the company money by tying up operating system licenses, servers and database resources without adding any value.

How to find zombie VMs

Most zombie VMs are simply temporary virtual servers  that have been forgotten due to lax tracking procedures. Ideally, the creation of each VM should be documented, along with its purpose and owner. When a VM is no longer required, it should be removed. Once virtualization sprawl has occurred, it becomes necessary to differentiate zombie VMs from the productive ones. Indications of a zombie VM include an absence of recent support tickets and low CPU, network and disk utilization.

Zombie prevention requires both policies and software tools. Management policies should be put in place to guide the creation and retention of VMs and storage instances. Then software tools can be used to identify VM instance owners, report on recent usage and specify how long resources have been idle. Ideally, VM governance tools will raise an alert when a machine rests unused for a defined period of time and automatically spin down the zombie and recover its licenses.

Watch an introduction to VM sprawl management with Virtualization Manager:

The zombie VM's physical counterpart in the data center is the  zombie server
This was last updated in April 2018

Continue Reading About zombie VM

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close