当前位置:网站首页>VMware virtual machines export hard disk vmdk files using esxi
VMware virtual machines export hard disk vmdk files using esxi
2022-04-23 11:53:00 【wx5a98a78793203】
1. scene ,esxi The server is down , Back up vmdk file , I want to find a machine to replace , Or move to another esxi machine .( It is suggested to build a shared storage cluster , This situation can be avoided )
2. Create a new virtual machine , The hard disk needs to be as big as or larger than the original machine ,
After adding the original hard disk to the virtual machine .
- Prepare one pe iso file , Give virtual cd Use , Set up a virtual cd The first to start , Boot to PE Environmental Science

Pop up and select allow
4. Generally, the old hard disk loaded is unreadable
You need to use the partition tool to migrate the old hard disk data to the new hard disk
5. After the partition replication is completed , Need to fix the boot
6. After repair, restart the system
7.esxi The principle of migration is the same , load PE stay PE Environment operation repair .
版权声明
本文为[wx5a98a78793203]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231045057012.html
边栏推荐
- 配电房远程综合监控系统在10kV预制舱项目中的应用
- 1. Construction of electron development environment
- 5个免费音频素材网站,建议收藏
- QT 64 bit static version display gif
- Redis optimization series (II) redis master-slave principle and master-slave common configuration
- IM 体系结构:CPU架构:SIMD向量处理(IM-2.3)
- Laravel always returns JSON response
- Step function of activation function
- Siri gave the most embarrassing social death moment of the year
- 力扣-70.爬楼梯
猜你喜欢
Yunna | how to manage the company's fixed assets and how to manage fixed assets
探究机器人教育的器材与教学
怎么进行固定资产盘点,资产盘点报告如何一键生成
《通用数据保护条例》(GDPR)系列解读三:欧洲子公司如何向国内母公司回传数据?
C# F23. Stringsimilarity Library: String repeatability, text similarity, anti plagiarism
Tan Xiang, CEO of Kechuang · Pera software: the essence of zero trust is digital security. To B should also deeply study the user's mind
After the MySQL router is reinstalled, it reconnects to the cluster for boot - a problem that has been configured in this host before
Laravel adds custom helper functions
科创人·派拉软件CEO谭翔:零信任本质是数字安全,To B也要深研用户心智
Study notes of C [8] SQL [1]
随机推荐
The fourth chapter is to enable the filling object of IM and enable ADO for im column storage (IM 4.8)
2022 love analysis · panoramic report of industrial Internet manufacturers
激活函数之relu函数
Laravel admin time range selector daterange default value problem
远程访问家里的树莓派(上)
Application of remote integrated monitoring system in power distribution room in 10kV prefabricated cabin project
第四章 为IM 启用填充对象之启用和禁用列(IM-4.3 第三部分)
The fourth chapter is the enable and disable columns of IM enabled fill objects (Part III of im-4.3)
Docker MySQL master-slave backup
[Web 每日一练] 八色拼图(float)
Nacos Basics (5): getting started with Nacos configuration
Chapter 4 is a tutorial on forced filling of in memory objects with IM enabled filling objects (IM 4.7)
第四章 为IM 启用填充对象之在NO INMEMORY表上指定INMEMORY列属性:示例(IM-4.4 第四部分)
docker MySQL主从备份
Nacos Foundation (8): login management
零钱兑换II——【LeetCode】
第四章 为IM 启用填充对象之启用和禁用表空间的IM列存储(IM 4.5)
Chapter 4 specifies the attribute of the inmemory column on the no inmemory table for im enabled filling objects: examples (Part IV of im-4.4)
AcWing 1874. Moo encryption (enumeration, hash)
Optimize connections using connection groups (IM 6)