Browse Definitions :
Definition

zombie VM

A zombie VM is a virtual machine that is created, often for a particular purpose, and is forgotten when it is no longer needed for that purpose. As a result, the VM continues to consume resources while performing no useful work. The proliferation of zombie VMs in a data center is one of the main causes of virtualization sprawl.

Virtual machines can be created quickly and easily and only use a very small portion of the physical infrastructure's resources to run. When virtual instances are created faster than they are removed, however, the result is virtualization sprawl. The irony of virtualization sprawl is that it can cancel out the benefits that make virtualization attractive and cost-effective in the first place, costing the company money by tying up operating system licenses, servers and database resources without adding any value.

How to find zombie VMs

Most zombie VMs are simply temporary virtual servers  that have been forgotten due to lax tracking procedures. Ideally, the creation of each VM should be documented, along with its purpose and owner. When a VM is no longer required, it should be removed. Once virtualization sprawl has occurred, it becomes necessary to differentiate zombie VMs from the productive ones. Indications of a zombie VM include an absence of recent support tickets and low CPU, network and disk utilization.

Zombie prevention requires both policies and software tools. Management policies should be put in place to guide the creation and retention of VMs and storage instances. Then software tools can be used to identify VM instance owners, report on recent usage and specify how long resources have been idle. Ideally, VM governance tools will raise an alert when a machine rests unused for a defined period of time and automatically spin down the zombie and recover its licenses.

Watch an introduction to VM sprawl management with Virtualization Manager:

The zombie VM's physical counterpart in the data center is the  zombie server
This was last updated in April 2018

Continue Reading About zombie VM

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close