Cover image of Online VMware Training
(10)
Education

Online VMware Training

Updated 6 days ago

Education
Read more

Eric Sloof has been working in the information technology for nearly 20 years and has built up an extensive expertise in virtualized environments, storage and networking. Currently he’s an active VMware Certified Instructor. Besides teaching and consultancy, he’s an active member of the VMware community and VMware has rewarded him with the vExpert title. His website NTPRO.NL is voted as one of the best VMware blogs year after year. Eric has delivered several well received User Group sessions. His presentations at the VMworld are top session. He's also a co-host at VMworld TV.

Read more

Eric Sloof has been working in the information technology for nearly 20 years and has built up an extensive expertise in virtualized environments, storage and networking. Currently he’s an active VMware Certified Instructor. Besides teaching and consultancy, he’s an active member of the VMware community and VMware has rewarded him with the vExpert title. His website NTPRO.NL is voted as one of the best VMware blogs year after year. Eric has delivered several well received User Group sessions. His presentations at the VMworld are top session. He's also a co-host at VMworld TV.

iTunes Ratings

10 Ratings
Average Ratings
7
0
0
1
2

iTunes Ratings

10 Ratings
Average Ratings
7
0
0
1
2

Listen to:

Cover image of Online VMware Training

Online VMware Training

Updated 6 days ago

Read more

Eric Sloof has been working in the information technology for nearly 20 years and has built up an extensive expertise in virtualized environments, storage and networking. Currently he’s an active VMware Certified Instructor. Besides teaching and consultancy, he’s an active member of the VMware community and VMware has rewarded him with the vExpert title. His website NTPRO.NL is voted as one of the best VMware blogs year after year. Eric has delivered several well received User Group sessions. His presentations at the VMworld are top session. He's also a co-host at VMworld TV.

VMworld 2018 Europe - Day 4 Daily Wrap

Podcast cover
Read more

Jan 08 2019

1min

Play

VMworld 2018 Europe - Opening Video

Podcast cover
Read more

Jan 08 2019

2mins

Play

NSX east west traffic optimization with the DLR

Podcast cover
Read more
The Universal Distributed Logical Router is installed in the kernel of every ESXi host, as such it requires a VM to provide the control plane.

The universal distributed logical router Control VM is the control plane component of the routing process, providing communication between NSX Manager and NSX Controller cluster through the User World Agent.

NSX Manager sends logical interface information to the Control VM and NSX Controller cluster, and the Control VM sends routing updates to the NSX Controller cluster.

Mar 25 2018

3mins

Play

Demo of the VMware NSX 6.4 Context-Aware Firewall

Podcast cover
Read more
Context- aware firewall enhances the visibility at the application level and helps to override the problem of application permeability. Visibility at the application layer helps you to monitor the workloads better from a resource, compliance, and security point of view.

Firewall rules cannot consume application IDs. Context-aware firewall identifies applications and enforces a micro-segmentation for EAST-WEST traffic, independent of the port that the application uses. Context-aware or application-based firewall rules can be defined by defining Layer 7 service objects.

Jan 19 2018

6mins

Play

How to configure encryption in your vSphere 6.5 environment

Podcast cover
Read more
With vSphere Virtual Machine Encryption, you can create encrypted virtual machines and encrypt existing virtual machines. Because all virtual machine files with sensitive information are encrypted, the virtual machine is protected. Only administrators with encryption privileges can perform encryption and decryption tasks.

An external KMS, the vCenter Server system, and your ESXi hosts are contributing to the vSphere Virtual Machine Encryption solution.

After vCenter Server is connected to the KMS, users with the required privileges can create encrypted virtual machines and disks. Those users can also perform other encryption tasks such as encrypting existing virtual machines and decrypting encrypted virtual machines.

When you create an encrypted virtual machine from the vSphere Web Client, all virtual disks are encrypted. You can later add disks and set their encryption policies. You cannot add an encrypted disk to a virtual machine that is not encrypted, and you cannot encrypt a disk if the virtual machine is not encrypted.

Dec 08 2017

6mins

Play

Using esxtop to Troubleshoot Performance Problems

Podcast cover
Read more
The resxtop and esxtop command-line utilities provide a detailed look at how ESXi uses resources in real time. Also, esxtop displays information about the state of the physical server running an ESXi Server.

It lists CPU utilization for each physical processor, memory utilization, and disk and network bandwidth for each network and disk device available to the ESX Server machine. Furthermore, esxtop lists CPU and memory utilization for each individual VMkernel world.

Memory utilization is characterized by the type of memory (for example, shared, private, or swapped) that is being consumed. These CPU and memory statistics let you monitor the resource utilization for each of your virtual machines.

Nov 22 2017

11mins

Play

VMware vSAN 6.6 Witnesses, Components and Votes

Podcast cover
Read more
Each object is composed of a set of components, determined by capabilities that are in use in the VM Storage Policy. For example, with Primary level of failures to tolerate set to 1, vSAN ensures that the protection components, such as replicas and witnesses, are placed on separate hosts in the vSAN cluster, where each replica is an object component. In addition, in the same policy, if the Number of disk stripes per object configured to two or more, vSAN also stripes the object across multiple capacity devices and each stripe is considered a component of the specified object.

Nov 11 2017

20mins

Play

Configuring SSL Certificates for View Servers

Podcast cover
Read more
VMware strongly recommends that you configure SSL certificates for authentication of View Connection Server instances, security servers, and View Composer service instances.

A default SSL server certificate is generated when you install View Connection Server instances, security servers, or View Composer instances. You can use the default certificate for testing purposes.

Replace the default certificate as soon as possible. The default certificate is not signed by a Certificate Authority (CA). Use of certificates that are not signed by a CA can allow untrusted parties to intercept traffic by masquerading as your server.

Sep 27 2017

9mins

Play

Building an App in Xojo that talks to the vSphere 6.5 REST API

Podcast cover
Read more
For many years, I was a big fan of Asymetrix Toolbook and Visual Basic. I won’s say I’m an experienced programmer but I knew my way around (remember the vmClient).

Since Visual Basic doesn’t run on a Mac, I did some research and have found a good cross platform alternative called Xojo, it’s a a development tool for creating powerful, native applications for desktop, web, iOS, and Raspberry Pi. 

The only problem I had is how to I talk to vSphere? Version 6.5 has a REST API and Xojo is equipped with a rest socket. Just connect those two together and let the fun begin.

In this video, I’ll explain how to create your own cross platform applications in Xojo and access the vSphere 6.5 REST API through the Xojo rest socket. This allows you to list, create, and power-on virtual machines and all the other stuff from your own user interface. Xojo and vSphere we got a lift off.

Aug 10 2017

7mins

Play

Enable RabbitMQ management on vRealize Automation

Podcast cover
Read more
This video explains how to enable the RabbitMQ management interface on the vRealize Automation Appliance and shows how to subscribe to a que from Orchestrator.

Aug 08 2017

14mins

Play

API Commands in the vCenter Server Appliance Shell

Podcast cover
Read more
The API commands in the vCenter Server Appliance let you perform various administrative tasks in the vCenter Server Appliance. The API commands are provided by appliance management service in the vCenter Server Appliance. You can edit time synchronization settings, monitor processes and services, set up the SNMP settings, and so

Jan 18 2017

3mins

Play

vSphere 6 vMotion

Podcast cover
Read more
Virtual machine migrations between VMware vCenter Server instances

Mar 25 2015

1min

Play

Installation Cisco Nexus 1000V Release 42(1)SV1(51)

Podcast cover
Read more
The Cisco Nexus 1000V is compatible with any upstream physical access layer switch that is Ethernet standard compliant, including the Catalyst 6500 series switch, Cisco Nexus switches, and switches from other network vendors. The Cisco Nexus 1000V is compatible with any server hardware listed in the VMware Hardware Compatibility List (HCL). Cisco and VMware jointly designed APIs that produced the Cisco Nexus 1000V. The Cisco Nexus 1000V is a distributed virtual switch solution that is fully integrated within the VMware virtual infrastructure, including VMware vCenter for the virtualization administrator. This solution offloads the configuration of the virtual switch and port groups to the network administrator to enforce a consistent data center network policy. In this release Java applications are introduced for VSM and VEM installation.

Feb 21 2012

13mins

Play

Configure vSphere SRM Replication for a Single Virtual Machine

Podcast cover
Read more
vSphere Replication (VR) uses replication technologies included in ESX Servers with the assistance of virtual appliances to replicate virtual machines between sites. VR is provided by vSphere Replication Servers (VR Servers or VRS). VR Servers are managed by the vSphere Replication Managment Server (VRMS). Both VRMS and VR Servers are virtual appliances. VRMS provides a way to manage VR Servers across multiple hosts. If you are using VR, you must establish at least one vSphere Replication Server and exactly one VRMS at the recovery site. To enable replication in both directions, you must deploy exactly one VRMS at each site and at least one VRS at each site. You may want to create multiple VR Servers at each site if multiple servers are required to meet your load balancing needs for replication of virtual machines. Each VRMS must be registered with a corresponding vCenter Server. For example, the primary site VRMS must be registered with the primary site vCenter Servers.Both the VRMS and VRS appliances provide a virtual appliance management interface (VAMI). These interfaces can be used to configure the VRMS database, as well as network settings, public-key certificates, and passwords for the appliances. Before using VR, you need to configure the VR infrastructure including having managed IP defined in runtime settings at both sites and having a VRMS database installed. This video provides useful guidance to help ensure you complete the installation and configuration process correctly. When installing SRM, be certain to select the VR option. If you have installed SRM and want to add VR, you can add that option by running the installer again. So, here are the steps for configure-ring vSphere SRM Replication for a Single Virtual Machine.1. On the vSphere Client Home page, click VMs and Templates. 2. Browse the inventory to find the single virtual machine to be replicated using VR. Right-click the virtual machine and click vSphere Replication.3. In the Replication Settings page, configure general replication settings. These settings include the disk file location to which the virtual machine is replicated on the recovery site, how often the virtual machine is replicated, and how the guest OS is quiesced. Use the Recovery Point Objective (RPO) slider or enter a value to configure the maximum amount of data that can be lost during the recovery. The available range is from 15 minutes to 24 hours. For example, a recovery point objective of one hour seeks to ensure that the virtual machine loses no more than one hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network bandwidth is consumed keeping the replica synchronized. The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows XP or later. Linux does not support quiescing. If no target file location is specified or if you want to override the default determined by the datastore mappings, click Browse to select a target location for the virtual machine.

Feb 01 2012

11mins

Play

Configure ESXi host swapping to a solid-state disk

Podcast cover
Read more
In this video I’ll show you how SDD storage is detected by the ESXi host after adding a new datastore. You will also learn how to configure VMware ESXi host swapping and redirecting virtual machine swap files to solid state storage.

Jan 29 2012

10mins

Play

Installing vCenter Server 5.0

Podcast cover
Read more
VMware vCenter Server allows you to centrally manage hosts from either a physical or virtual Windows machine, and enables the use of advanced features such as vSphere Distributed Resource Scheduler (DRS), vSphere High Availability (HA), vSphere vMotion, vSphere Storage vMotion, and vSphere Auto Deploy. You can install vCenter Server in a Microsoft Windows virtual machine that runs on an ESXi host. Deploying the vCenter Server system in the virtual machine has the following advantages:- You can provide high availability for the vCenter Server system by using vSphere HA.- You can migrate the VM containing vCenter from one host to another.- You can create snapshots of the vCenter Server virtual machine.- Rather than dedicating a separate server to the vCenter Server system, you can place it in a virtual machine running on the same host where your other virtual machines run.This video will show you how to install VMware vCenter Server 5.0 in a virtual machine 13 simple steps.

Jan 24 2012

13mins

Play

Troubleshooting VMware vSphere vDSwitches

Podcast cover
Read more
A vNetwork Distributed Switch (vDS) functions as a single virtual switch across all associated hosts. This enables you to set network configurations that span across all member hosts, and allows virtual machines to maintain consistent network configuration as they migrate across multiple hosts.

In this video I'll show you how to troubleshoot and configure vNetwork Distributed Switch Network Adapters. The vNetwork Distributed Switch networking view of the host configuration page displays the configuration of the host’s associated vNetwork Distributed Switches and allows you to configure the vNetwork Distributed Switch network adapters and uplink ports.

For each host associated with a vNetwork Distributed Switch, you must assign physical network adapters, or uplinks, to the vNetwork Distributed Switch. You can assign one uplink on each host per uplink port on the vNetwork Distributed Switch.

Dec 20 2011

8mins

Play

NetFlow

Podcast cover
Read more
NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and prevention, networking forensics, and SOX compliance. NetFlow sends aggregated networking flow data to a third‐party collector (an appliance or server). The collector and analyzer report on various information such as the current top flows consuming the most bandwidth in a particular virtual switch, which IP addresses are behaving irregularly, and the number of bytes a particular virtual machine has sent and received in the past 24 hours. NetFlow is a mature technology, developed by Cisco, that is widely supported by third‐party collectors. NetFlow enables visibility into virtual machine traffic in a virtualized datacenter.

ManageEngine NetFlow Analyzer is a web-based bandwidth monitoring tool that collects NetFlow data exported from routing devices, and uses it to analyze and report on IP traffic across the network. With instant reports on top applications, protocols, conversations, and hosts, NetFlow Analyzer gives you valuable insight into bandwidth usage in your enterprise without the complexity and expense involved in a traditional WAN analysis setup.

Aug 13 2011

9mins

Play

vSphere 5 Video - ESXi Firewall Configuration

Podcast cover
Read more
ESXi includes a firewall between the management interface and the network. To ensure the integrity of the host, VMware has reduced the number of firewall ports that are open by default. The ESXi firewall is enabled by default. At installation time, the firewall is configured to block incoming and outgoing traffic, except traffic for the default services. The firewall also allows Internet Control Message Protocol (ICMP) pings and communication with DHCP and DNS (UDP only) clients.

From the host Security Profile panel, you can configure firewall properties for this host. The Secuirty Profile panel lists the incoming and outgoing connections for the firewall and the port each service uses. The panel also displays the IP addresses that are allowed to connect for each service. You can modify the list of services and the allowed IP addresses for each service.

You can add supported services and management agents that are required to operate the host by adding ruleset files to the ESXi firewall configuration file directory /etc/vmware/firewall/. You open or close ports for these services by enabling or disabling the service on the host's security profile in the vSphere Client.

Jul 12 2011

3mins

Play

Configure SNMP for ESX

Podcast cover
Read more
ESX/ESXi includes an SNMP agent embedded in hostd that can both send traps and receive polling requests. such as GET requests. This agent is referred to as the embedded SNMP agent. By default, the embedded SNMP agent is disabled. To enable it, you must configure it using the vSphere CLI command vicfg-snmp. In this video I'll show you how to enable the SNMP agent.

Feb 07 2011

3mins

Play

Video - ZeroTier - The ethernet switch for planet earth

Podcast cover
Read more
ZeroTier is a distributed network hypervisor built atop a cryptographically secure global peer to peer network. It provides advanced network virtualization and management capabilities on par with an enterprise SDN switch, but across both local and wide area networks and connecting almost any kind of app or device.

Sep 11 2019

11mins

Play

NSX-T - Trace the Path of a Packet with Traceflow

Podcast cover
Read more
You can use Traceflow to inspect the path of a packet as it travels from one logical port on the logical network to another logical port on the same network. Traceflow traces the transport node-level path of a packet injected at a logical port. The trace packet traverses the logical switch overlay, but is not visible to interfaces attached to the logical switch. In other words, no packet is actually delivered to the test packet’s intended recipients. You can use the port connection tool to quickly visualize and troubleshoot the connection between two VMs.

Feb 13 2019

12mins

Play

Deep-dive into the VMware vSphere 6.7 VMSN snapshot file

Podcast cover
Read more
The .vmsn file includes the current configuration (.vmx) and bios setting (.nvram). The memory is stored in the .vmem file.

Jan 08 2019

10mins

Play

VMworld 2018 Europe - Day 3 Daily Wrap (1080p).mp4

Podcast cover
Read more

Jan 08 2019

2mins

Play

VMworld 2018 Europe - Day 4 Daily Wrap

Podcast cover
Read more

Jan 08 2019

1min

Play

VMworld 2018 Europe - Day 2 Daily Wrap

Podcast cover
Read more

Jan 08 2019

2mins

Play

VMworld 2018 Europe - Opening Video

Podcast cover
Read more

Jan 08 2019

2mins

Play

NSX east west traffic optimization with the DLR

Podcast cover
Read more
The Universal Distributed Logical Router is installed in the kernel of every ESXi host, as such it requires a VM to provide the control plane.

The universal distributed logical router Control VM is the control plane component of the routing process, providing communication between NSX Manager and NSX Controller cluster through the User World Agent.

NSX Manager sends logical interface information to the Control VM and NSX Controller cluster, and the Control VM sends routing updates to the NSX Controller cluster.

Mar 25 2018

3mins

Play

Demo of the VMware NSX 6.4 Context-Aware Firewall

Podcast cover
Read more
Context- aware firewall enhances the visibility at the application level and helps to override the problem of application permeability. Visibility at the application layer helps you to monitor the workloads better from a resource, compliance, and security point of view.

Firewall rules cannot consume application IDs. Context-aware firewall identifies applications and enforces a micro-segmentation for EAST-WEST traffic, independent of the port that the application uses. Context-aware or application-based firewall rules can be defined by defining Layer 7 service objects.

Jan 19 2018

6mins

Play

Demo of the new NSX 6.4 Packet Capture Tool

Podcast cover
Read more
If your dashboard is indicating that a host is not in a healthy state, you can capture packets for that particular host for further troubleshooting. You can capture packets using the new Packet Capture tool, to help diagnose and solve network related problems.

You can create a packet capture session for required hosts on the NSX Manager using the Packet Capture tool. After the packets are captured, the file is available to download.

Maximum of 16 sessions and total of 400 MB files are available to download. If you want to start a new session after reaching maximum session, you must clean the older sessions.

Your session remains active for 10 minutes, and the existing session is removed one hour after the session was created. If you restart NSX, all the existing sessions are cleared.

Jan 18 2018

4mins

Play

How to configure encryption in your vSphere 6.5 environment

Podcast cover
Read more
With vSphere Virtual Machine Encryption, you can create encrypted virtual machines and encrypt existing virtual machines. Because all virtual machine files with sensitive information are encrypted, the virtual machine is protected. Only administrators with encryption privileges can perform encryption and decryption tasks.

An external KMS, the vCenter Server system, and your ESXi hosts are contributing to the vSphere Virtual Machine Encryption solution.

After vCenter Server is connected to the KMS, users with the required privileges can create encrypted virtual machines and disks. Those users can also perform other encryption tasks such as encrypting existing virtual machines and decrypting encrypted virtual machines.

When you create an encrypted virtual machine from the vSphere Web Client, all virtual disks are encrypted. You can later add disks and set their encryption policies. You cannot add an encrypted disk to a virtual machine that is not encrypted, and you cannot encrypt a disk if the virtual machine is not encrypted.

Dec 08 2017

6mins

Play

Using esxtop to Troubleshoot Performance Problems

Podcast cover
Read more
The resxtop and esxtop command-line utilities provide a detailed look at how ESXi uses resources in real time. Also, esxtop displays information about the state of the physical server running an ESXi Server.

It lists CPU utilization for each physical processor, memory utilization, and disk and network bandwidth for each network and disk device available to the ESX Server machine. Furthermore, esxtop lists CPU and memory utilization for each individual VMkernel world.

Memory utilization is characterized by the type of memory (for example, shared, private, or swapped) that is being consumed. These CPU and memory statistics let you monitor the resource utilization for each of your virtual machines.

Nov 22 2017

11mins

Play

Planning the Capacity Using vRealize Operations Manager 6.6

Podcast cover
Read more
You can use the Projects feature in vRealize Operations Manager to plan for capacity allocations and upgrades in your virtual environment, or to optimize your existing resources. To plan your upcoming capacity needs, you create a project that anticipates forthcoming changes that affect the capacity of your objects.

In addition to creating projects to plan for hardware changes or virtual infrastructure changes, you can create custom profiles and custom data centers to help forecast your capacity needs.

With custom profiles, you can determine how many instances of an object can fit in your environment depending on the available capacity and configuration. With custom data centers, you can see capacity analytics and badge computations based on the objects contained in the custom data center.

Nov 22 2017

5mins

Play

VMware vSAN 6.6 Witnesses, Components and Votes

Podcast cover
Read more
Each object is composed of a set of components, determined by capabilities that are in use in the VM Storage Policy. For example, with Primary level of failures to tolerate set to 1, vSAN ensures that the protection components, such as replicas and witnesses, are placed on separate hosts in the vSAN cluster, where each replica is an object component. In addition, in the same policy, if the Number of disk stripes per object configured to two or more, vSAN also stripes the object across multiple capacity devices and each stripe is considered a component of the specified object.

Nov 11 2017

20mins

Play

Tech Support (root) Access in NSX for vSphere 6.x

Podcast cover
Read more
The NSX Manager contains many tools to help customers in conjunction with Global Support Services to resolve operational issues. The NSX for vSphere 6.x product features a customized command line interface that covers most of the basics that the user interface does and a little bit more.

On occasion, it may become necessary to use a regular unix command line interpreter (shell) to be able to deal with unanticipated configuration issues. In these cases it is required that customers use this shell in conjunction with tech support to avoid inadvertently changing the virtual appliance in such a way that we can no longer support it properly.

Oct 12 2017

3mins

Play

Configuring SSL Certificates for View Servers

Podcast cover
Read more
VMware strongly recommends that you configure SSL certificates for authentication of View Connection Server instances, security servers, and View Composer service instances.

A default SSL server certificate is generated when you install View Connection Server instances, security servers, or View Composer instances. You can use the default certificate for testing purposes.

Replace the default certificate as soon as possible. The default certificate is not signed by a Certificate Authority (CA). Use of certificates that are not signed by a CA can allow untrusted parties to intercept traffic by masquerading as your server.

Sep 27 2017

9mins

Play

Configuring and Managing a Horizon View 7 Cloud Pod Architecture Environment

Podcast cover
Read more
With the Cloud Pod Architecture feature, you can link together multiple View pods to provide a single large desktop and application brokering and management environment.

A View pod consists of a set of View Connection Server instances, shared storage, a database server, and the vSphere and network infrastructures required to host desktop virtual machines and application pools. In a traditional View implementation, you manage each pod independently. With the Cloud Pod Architecture feature, you can join together multiple pods to form a single View implementation called a pod federation.

A pod federation can span multiple sites and datacenters and simultaneously simplify the administration effort required to manage a large-scale View deployment.

In this video, two previously standalone View pods in different datacenters are joined together to form a single pod federation. An end user in this environment can connect to a View Connection Server instance in the Student-Desktop datacenter and receive a desktop or application in the SA data center.

Sep 21 2017

10mins

Play

Configure an External vRealize Orchestrator Server

Podcast cover
Read more
You can set up vRealize Automation to use an external vRealize Orchestrator server. System administrators can configure the default vRealize Orchestrator server globally for all tenants. Tenant administrators can configure the vRealize Orchestrator server only for their tenants

Aug 30 2017

10mins

Play

Building an App in Xojo that talks to the vSphere 6.5 REST API

Podcast cover
Read more
For many years, I was a big fan of Asymetrix Toolbook and Visual Basic. I won’s say I’m an experienced programmer but I knew my way around (remember the vmClient).

Since Visual Basic doesn’t run on a Mac, I did some research and have found a good cross platform alternative called Xojo, it’s a a development tool for creating powerful, native applications for desktop, web, iOS, and Raspberry Pi. 

The only problem I had is how to I talk to vSphere? Version 6.5 has a REST API and Xojo is equipped with a rest socket. Just connect those two together and let the fun begin.

In this video, I’ll explain how to create your own cross platform applications in Xojo and access the vSphere 6.5 REST API through the Xojo rest socket. This allows you to list, create, and power-on virtual machines and all the other stuff from your own user interface. Xojo and vSphere we got a lift off.

Aug 10 2017

7mins

Play

Enable RabbitMQ management on vRealize Automation

Podcast cover
Read more
This video explains how to enable the RabbitMQ management interface on the vRealize Automation Appliance and shows how to subscribe to a que from Orchestrator.

Aug 08 2017

14mins

Play