Browse Definitions :
Definition

zombie VM

A zombie VM is a virtual machine that is created, often for a particular purpose, and is forgotten when it is no longer needed for that purpose. As a result, the VM continues to consume resources while performing no useful work. The proliferation of zombie VMs in a data center is one of the main causes of virtualization sprawl.

Virtual machines can be created quickly and easily and only use a very small portion of the physical infrastructure's resources to run. When virtual instances are created faster than they are removed, however, the result is virtualization sprawl. The irony of virtualization sprawl is that it can cancel out the benefits that make virtualization attractive and cost-effective in the first place, costing the company money by tying up operating system licenses, servers and database resources without adding any value.

How to find zombie VMs

Most zombie VMs are simply temporary virtual servers  that have been forgotten due to lax tracking procedures. Ideally, the creation of each VM should be documented, along with its purpose and owner. When a VM is no longer required, it should be removed. Once virtualization sprawl has occurred, it becomes necessary to differentiate zombie VMs from the productive ones. Indications of a zombie VM include an absence of recent support tickets and low CPU, network and disk utilization.

Zombie prevention requires both policies and software tools. Management policies should be put in place to guide the creation and retention of VMs and storage instances. Then software tools can be used to identify VM instance owners, report on recent usage and specify how long resources have been idle. Ideally, VM governance tools will raise an alert when a machine rests unused for a defined period of time and automatically spin down the zombie and recover its licenses.

Watch an introduction to VM sprawl management with Virtualization Manager:

The zombie VM's physical counterpart in the data center is the  zombie server
This was last updated in April 2018

Continue Reading About zombie VM

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a ...

  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close