Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 11 March 2015

A reference architecture for implementing OpenStack on VMware vSphere


This technical whitepaper, a collaboration between Canonical and VMware, proposes a reference architecture for running OpenStack on VMware vSphere. It draws on experience both companies have in joint customer engagements, and lists some best practices and recommendations for getting the most out of existing enterprise IT infrastructure while benefiting from new and open technologies such as OpenStack.

This reference architecture is specific to OpenStack Havana and Ubuntu 12.04 LTS with vCenter 5.1 or greater.

Download Whitepaper

Related posts


Stefano Fioravanzo
3 March 2025

Experiment Tracking with MLFlow in Canonical’s Data Science Stack

Desktop Article

Welcome back, data scientists! In my previous post, we explored how easy it is to set up a machine learning environment with Canonical’s Data Science Stack (DSS) and run your first model using Hugging Face’s Smol Course. Today, let’s take it a step further with experiment tracking. Experimentation is at the heart of data science, ...


Amir Abdel Baki
28 February 2025

Life at Canonical: Akshara Pathak shares her experience as a new joiner in Customer Success

Ubuntu Article

As Canonical continues to grow, we have developed a unique onboarding process that enables our new hires to quickly settle and establish themselves in our globally distributed environment.  During your first few weeks, your manager will create an onboarding plan to introduce you to the business, your closest stakeholders and colleagues. Y ...


Luci Stanescu
28 February 2025

How to conduct a vulnerability assessment

Security Article

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in thi ...