The physical computer composed of hardware components and software. A physical computer is required for computation processes associated with the implementation of software. Software is required for the operation of tasks such as virtualization.
A virtual machine (VM) is a software-based emulation of a physical computer. It runs an operating system and applications just like a real computer, but it does so inside a host system using virtualization technology.
The physical computer that provides the actual hardware is called a Host Machine.
The software layer that creates and runs virtual machines is called a Hypervisor.
There are 2 types of VM implementations:
Type 1 (bare-metal): Runs directly on hardware, without any underlying operating system. (e.g., VMware ESXi, Microsoft Hyper-V).
Type 2 (hosted): Runs inside an OS (e.g., VirtualBox, VMware Workstation).
Guest Machine (VM) – The virtual environment with its own OS, apps, and virtual hardware.
Virtual Machines virtualize the entire hardware and run their own guest operating system, making them ideal for running multiple different OSs on the same hardware and providing strong isolation. A VM is like renting a fully furnished apartment everything you need to live is included in the rental agreement.
Containers virtualize at the application layer, sharing the host OS kernel. A container is like renting a room where you share living accommodations with others.
The SysAuditor inventories or documents all the elements on physical hardware.
Instances of virtual machines are identified and captured as inventory elements.
A VM is identified based on CPU, OS, memory and other operational criteria.
Server sprawl—whether with virtual machines (VMs) or containers—occurs when unmanaged growth leads to excessive, underutilized, or forgotten instances, resulting in wasted resources, higher costs, and increased security risks.
Regularly tracking the number and status of VMs or containers is a best practice and a foundational step in preventing server sprawl, ensuring efficient, secure, and cost-effective infrastructure management.
Key reasons to track counts include:
Inventory Management: Maintaining an up-to-date inventory of all VMs and containers is essential for understanding their purpose, ownership, and operational state, which helps prevent unnecessary proliferation.
Resource Optimization: Tracking usage enables you to identify idle or underutilized instances, allowing for timely decommissioning or consolidation to optimize resource allocation and reduce costs.
Security and Compliance: Untracked instances may miss security updates or monitoring, increasing vulnerability and compliance risks.
Governance: Centralized tracking and reporting systems provide oversight, support approval workflows, and prevent unauthorized or untracked deployments
Analysis tree failure means we need to be able to track issues across both real or virtual hardware.
One needs to be able to determine whether difference between Type 1 or Type 2 VMs.
Performance issues are the result of multiple associated and related factors that need to be identifiable as part of the analysis tree.