{"id":99,"date":"2017-08-16T09:37:39","date_gmt":"2017-08-16T09:37:39","guid":{"rendered":"https:\/\/secureethics.com\/?p=99"},"modified":"2018-08-04T08:27:29","modified_gmt":"2018-08-04T08:27:29","slug":"how-to-extend-lvm-volume-group-on-ubuntu","status":"publish","type":"post","link":"https:\/\/secureethics.com\/?p=99","title":{"rendered":"How to add virtual hard disk in Virtual Machine on VMware"},"content":{"rendered":"<p><strong>Step 1 :<\/strong><\/p>\n<p>We have to add the physical Hard disk or Virtual hard disk into server, If you are using Vmware exsi Hyper-visor server , Just login exsi server through Vsphere client and <strong>Select the VM<\/strong> then, Right click on virtual machine &#8220;<strong>edit settings&#8221; <\/strong>or<strong> &#8220;Edit virtual machine settings&#8221;<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-104 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-245x300.png\" alt=\"\" width=\"322\" height=\"395\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-245x300.png 245w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1.png 340w\" sizes=\"auto, (max-width: 322px) 100vw, 322px\" \/><\/p>\n<p>Step 2 :<\/p>\n<p>Click\u00a0 &#8220;<strong>Add<\/strong>&#8221; and then select &#8220;Hard Disk&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-105 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-300x124.png\" alt=\"\" width=\"577\" height=\"239\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-300x124.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-520x215.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2.png 692w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/p>\n<p><strong>Step 3 :<\/strong><\/p>\n<p>Select the <strong>&#8220;Hard Disk&#8221;, <\/strong>then click<strong> &#8220;Next&#8221;<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-111 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-300x237.png\" alt=\"\" width=\"691\" height=\"546\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-300x237.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-520x411.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3.png 649w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><\/p>\n<p><strong>Step 4 :<\/strong><\/p>\n<p>Select\u00a0 &#8220;<strong>Create a new\u00a0 Virtual disk<\/strong>&#8221; OR \u00a0If you have RAW Hard disk LUN, you can select &#8220;<strong>Raw device Mapping<\/strong>&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-112 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-300x237.png\" alt=\"\" width=\"682\" height=\"539\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-300x237.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-520x410.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4.png 652w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/p>\n<p><strong>Step 5 :<\/strong><\/p>\n<p>You can set HDD &#8220;<strong>Disk Size&#8221;<\/strong>, then\u00a0 select &#8220;<strong>Disk Provisioning&#8221;<\/strong> which is suitable for your environment and then select &#8220;<strong>Location&#8221;<\/strong> of datastore<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-113 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-300x236.png\" alt=\"\" width=\"667\" height=\"525\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-300x236.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-520x408.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5.png 656w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p><strong>Step 6 :<\/strong><\/p>\n<p>Click &#8220;<strong>Next<\/strong>&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-114 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-300x237.png\" alt=\"\" width=\"668\" height=\"528\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-300x237.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-520x411.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6.png 653w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/p>\n<p><strong>Step 7 :<\/strong><\/p>\n<p>Click &#8220;<strong>Finish<\/strong>&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-115 aligncenter\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-300x238.png\" alt=\"\" width=\"696\" height=\"553\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-300x238.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-520x412.png 520w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Step 1 : We have to add the physical Hard disk or Virtual hard disk into server, If you are using Vmware exsi Hyper-visor server , Just login exsi server through Vsphere client and Select the VM then, Right click&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,11],"tags":[],"class_list":["post-99","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-virtualization","category-vmware"],"_links":{"self":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=99"}],"version-history":[{"count":0,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/99\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/media\/112"}],"wp:attachment":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=99"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=99"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}