Virtual server (VM) hosting replaces the need for a physical server while enabling the flexibility of private cloud computing. ITS sets up a virtual machine with the memory, CPUs and disk space configuration requested, then installs the base operating system, configures the network and provides basic user access to the system. Included with the service is virtual machine hypervisor configuration, OS management/patching, and data protection and recovery. This reduces the time needed for systems administration and the cost associated with server hosting. You are responsible for the installation, security and management of your applications running on the server.
clustered enterprise class servers running VMware/ESX virtualization suite
supports Microsoft Windows or Red Hat Enterprise Linux operating systems
nightly backups of file systems are stored locally and offsite for 30 days
monthly Microsoft and Red Hat patches
Must have someone who has the skills and knowledge needed to manage and maintain their applications. In addition, they would need some basic system administration skills appropriate to the operating system running on their VM.
Departments must adhere to ITS vulnerability management standards which address requirements for systems and applications to be properly secured, patched, and protected from vulnerabilities. For specific details, see the ITS Vulnerability Management Standards.
ITS provisions the virtual machine with the memory, CPU, and disk space configuration requested by the customer.
ITS will install the base operating system (supported versions of Microsoft Windows or Red Hat Enterprise Linux) on the VM (virtual machine).
ITS will configure the network on the VM and provide basic user access to the system.
For Windows hosts on the enterprise AD, ITS will apply monthly Microsoft operating system patches.
For Red Hat Enterprise Linux hosts, ITS will apply Red Hat updates on a monthly basis.
The customer is responsible for their own applications – installation, configuration, management, and security. This includes adhering to the ITS Vulnerability Management standards
Local and offsite copies of file system backups are included in the service to protect against data center loss. Customers with databases on their hosts need to configure their own database backups. If those backups are written to the local file system, they will be included in the ITS provided file system backups.
Although offsite copies of data and snapshots are kept, this service will not be available in case of a disaster that involved loss of the data center. The offsite copies of the data would be available to restore from when suitable replacement infrastructure is made available.