VMworld 2018 Europe - Day 4 Daily Wrap
8 Jan 2019
VMworld 2018 Europe - Opening Video
8 Jan 2019
NSX east west traffic optimization with the DLR
The Universal Distributed Logical Router is installed in the kernel of every ESXi host, as such it requires a VM to provide the control plane.The universal distributed logical router Control VM is the control plane component of the routing process, providing communication between NSX Manager and NSX Controller cluster through the User World Agent.NSX Manager sends logical interface information to the Control VM and NSX Controller cluster, and the Control VM sends routing updates to the NSX Controller cluster.
25 Mar 2018
Demo of the VMware NSX 6.4 Context-Aware Firewall
Context- aware firewall enhances the visibility at the application level and helps to override the problem of application permeability. Visibility at the application layer helps you to monitor the workloads better from a resource, compliance, and security point of view.Firewall rules cannot consume application IDs. Context-aware firewall identifies applications and enforces a micro-segmentation for EAST-WEST traffic, independent of the port that the application uses. Context-aware or application-based firewall rules can be defined by defining Layer 7 service objects.
19 Jan 2018
Most Popular Podcasts
How to configure encryption in your vSphere 6.5 environment
With vSphere Virtual Machine Encryption, you can create encrypted virtual machines and encrypt existing virtual machines. Because all virtual machine files with sensitive information are encrypted, the virtual machine is protected. Only administrators with encryption privileges can perform encryption and decryption tasks.An external KMS, the vCenter Server system, and your ESXi hosts are contributing to the vSphere Virtual Machine Encryption solution.After vCenter Server is connected to the KMS, users with the required privileges can create encrypted virtual machines and disks. Those users can also perform other encryption tasks such as encrypting existing virtual machines and decrypting encrypted virtual machines.When you create an encrypted virtual machine from the vSphere Web Client, all virtual disks are encrypted. You can later add disks and set their encryption policies. You cannot add an encrypted disk to a virtual machine that is not encrypted, and you cannot encrypt a disk if the virtual machine is not encrypted.
8 Dec 2017
Using esxtop to Troubleshoot Performance Problems
The resxtop and esxtop command-line utilities provide a detailed look at how ESXi uses resources in real time. Also, esxtop displays information about the state of the physical server running an ESXi Server.It lists CPU utilization for each physical processor, memory utilization, and disk and network bandwidth for each network and disk device available to the ESX Server machine. Furthermore, esxtop lists CPU and memory utilization for each individual VMkernel world.Memory utilization is characterized by the type of memory (for example, shared, private, or swapped) that is being consumed. These CPU and memory statistics let you monitor the resource utilization for each of your virtual machines.
22 Nov 2017
VMware vSAN 6.6 Witnesses, Components and Votes
Each object is composed of a set of components, determined by capabilities that are in use in the VM Storage Policy. For example, with Primary level of failures to tolerate set to 1, vSAN ensures that the protection components, such as replicas and witnesses, are placed on separate hosts in the vSAN cluster, where each replica is an object component. In addition, in the same policy, if the Number of disk stripes per object configured to two or more, vSAN also stripes the object across multiple capacity devices and each stripe is considered a component of the specified object.
11 Nov 2017
Configuring SSL Certificates for View Servers
VMware strongly recommends that you configure SSL certificates for authentication of View Connection Server instances, security servers, and View Composer service instances.A default SSL server certificate is generated when you install View Connection Server instances, security servers, or View Composer instances. You can use the default certificate for testing purposes.Replace the default certificate as soon as possible. The default certificate is not signed by a Certificate Authority (CA). Use of certificates that are not signed by a CA can allow untrusted parties to intercept traffic by masquerading as your server.
27 Sep 2017
Building an App in Xojo that talks to the vSphere 6.5 REST API
For many years, I was a big fan of Asymetrix Toolbook and Visual Basic. I won’s say I’m an experienced programmer but I knew my way around (remember the vmClient). Since Visual Basic doesn’t run on a Mac, I did some research and have found a good cross platform alternative called Xojo, it’s a a development tool for creating powerful, native applications for desktop, web, iOS, and Raspberry Pi. The only problem I had is how to I talk to vSphere? Version 6.5 has a REST API and Xojo is equipped with a rest socket. Just connect those two together and let the fun begin.In this video, I’ll explain how to create your own cross platform applications in Xojo and access the vSphere 6.5 REST API through the Xojo rest socket. This allows you to list, create, and power-on virtual machines and all the other stuff from your own user interface. Xojo and vSphere we got a lift off.
10 Aug 2017
Enable RabbitMQ management on vRealize Automation
This video explains how to enable the RabbitMQ management interface on the vRealize Automation Appliance and shows how to subscribe to a que from Orchestrator.
8 Aug 2017
API Commands in the vCenter Server Appliance Shell
The API commands in the vCenter Server Appliance let you perform various administrative tasks in the vCenter Server Appliance. The API commands are provided by appliance management service in the vCenter Server Appliance. You can edit time synchronization settings, monitor processes and services, set up the SNMP settings, and so
18 Jan 2017
vSphere 6 vMotion
Virtual machine migrations between VMware vCenter Server instances
25 Mar 2015
Installation Cisco Nexus 1000V Release 42(1)SV1(51)
The Cisco Nexus 1000V is compatible with any upstream physical access layer switch that is Ethernet standard compliant, including the Catalyst 6500 series switch, Cisco Nexus switches, and switches from other network vendors. The Cisco Nexus 1000V is compatible with any server hardware listed in the VMware Hardware Compatibility List (HCL). Cisco and VMware jointly designed APIs that produced the Cisco Nexus 1000V. The Cisco Nexus 1000V is a distributed virtual switch solution that is fully integrated within the VMware virtual infrastructure, including VMware vCenter for the virtualization administrator. This solution offloads the configuration of the virtual switch and port groups to the network administrator to enforce a consistent data center network policy. In this release Java applications are introduced for VSM and VEM installation.
21 Feb 2012
Configure vSphere SRM Replication for a Single Virtual Machine
vSphere Replication (VR) uses replication technologies included in ESX Servers with the assistance of virtual appliances to replicate virtual machines between sites. VR is provided by vSphere Replication Servers (VR Servers or VRS). VR Servers are managed by the vSphere Replication Managment Server (VRMS). Both VRMS and VR Servers are virtual appliances. VRMS provides a way to manage VR Servers across multiple hosts. If you are using VR, you must establish at least one vSphere Replication Server and exactly one VRMS at the recovery site. To enable replication in both directions, you must deploy exactly one VRMS at each site and at least one VRS at each site. You may want to create multiple VR Servers at each site if multiple servers are required to meet your load balancing needs for replication of virtual machines. Each VRMS must be registered with a corresponding vCenter Server. For example, the primary site VRMS must be registered with the primary site vCenter Servers.Both the VRMS and VRS appliances provide a virtual appliance management interface (VAMI). These interfaces can be used to configure the VRMS database, as well as network settings, public-key certificates, and passwords for the appliances. Before using VR, you need to configure the VR infrastructure including having managed IP defined in runtime settings at both sites and having a VRMS database installed. This video provides useful guidance to help ensure you complete the installation and configuration process correctly. When installing SRM, be certain to select the VR option. If you have installed SRM and want to add VR, you can add that option by running the installer again. So, here are the steps for configure-ring vSphere SRM Replication for a Single Virtual Machine.1. On the vSphere Client Home page, click VMs and Templates. 2. Browse the inventory to find the single virtual machine to be replicated using VR. Right-click the virtual machine and click vSphere Replication.3. In the Replication Settings page, configure general replication settings. These settings include the disk file location to which the virtual machine is replicated on the recovery site, how often the virtual machine is replicated, and how the guest OS is quiesced. Use the Recovery Point Objective (RPO) slider or enter a value to configure the maximum amount of data that can be lost during the recovery. The available range is from 15 minutes to 24 hours. For example, a recovery point objective of one hour seeks to ensure that the virtual machine loses no more than one hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network bandwidth is consumed keeping the replica synchronized. The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows XP or later. Linux does not support quiescing. If no target file location is specified or if you want to override the default determined by the datastore mappings, click Browse to select a target location for the virtual machine.
1 Feb 2012
Configure ESXi host swapping to a solid-state disk
In this video I’ll show you how SDD storage is detected by the ESXi host after adding a new datastore. You will also learn how to configure VMware ESXi host swapping and redirecting virtual machine swap files to solid state storage.
29 Jan 2012
Installing vCenter Server 5.0
VMware vCenter Server allows you to centrally manage hosts from either a physical or virtual Windows machine, and enables the use of advanced features such as vSphere Distributed Resource Scheduler (DRS), vSphere High Availability (HA), vSphere vMotion, vSphere Storage vMotion, and vSphere Auto Deploy. You can install vCenter Server in a Microsoft Windows virtual machine that runs on an ESXi host. Deploying the vCenter Server system in the virtual machine has the following advantages:- You can provide high availability for the vCenter Server system by using vSphere HA.- You can migrate the VM containing vCenter from one host to another.- You can create snapshots of the vCenter Server virtual machine.- Rather than dedicating a separate server to the vCenter Server system, you can place it in a virtual machine running on the same host where your other virtual machines run.This video will show you how to install VMware vCenter Server 5.0 in a virtual machine 13 simple steps.
24 Jan 2012
Troubleshooting VMware vSphere vDSwitches
A vNetwork Distributed Switch (vDS) functions as a single virtual switch across all associated hosts. This enables you to set network configurations that span across all member hosts, and allows virtual machines to maintain consistent network configuration as they migrate across multiple hosts. In this video I'll show you how to troubleshoot and configure vNetwork Distributed Switch Network Adapters. The vNetwork Distributed Switch networking view of the host configuration page displays the configuration of the host’s associated vNetwork Distributed Switches and allows you to configure the vNetwork Distributed Switch network adapters and uplink ports.For each host associated with a vNetwork Distributed Switch, you must assign physical network adapters, or uplinks, to the vNetwork Distributed Switch. You can assign one uplink on each host per uplink port on the vNetwork Distributed Switch.
20 Dec 2011
NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and prevention, networking forensics, and SOX compliance. NetFlow sends aggregated networking flow data to a third‐party collector (an appliance or server). The collector and analyzer report on various information such as the current top flows consuming the most bandwidth in a particular virtual switch, which IP addresses are behaving irregularly, and the number of bytes a particular virtual machine has sent and received in the past 24 hours. NetFlow is a mature technology, developed by Cisco, that is widely supported by third‐party collectors. NetFlow enables visibility into virtual machine traffic in a virtualized datacenter.ManageEngine NetFlow Analyzer is a web-based bandwidth monitoring tool that collects NetFlow data exported from routing devices, and uses it to analyze and report on IP traffic across the network. With instant reports on top applications, protocols, conversations, and hosts, NetFlow Analyzer gives you valuable insight into bandwidth usage in your enterprise without the complexity and expense involved in a traditional WAN analysis setup.
13 Aug 2011
vSphere 5 Video - ESXi Firewall Configuration
ESXi includes a firewall between the management interface and the network. To ensure the integrity of the host, VMware has reduced the number of firewall ports that are open by default. The ESXi firewall is enabled by default. At installation time, the firewall is configured to block incoming and outgoing traffic, except traffic for the default services. The firewall also allows Internet Control Message Protocol (ICMP) pings and communication with DHCP and DNS (UDP only) clients.From the host Security Profile panel, you can configure firewall properties for this host. The Secuirty Profile panel lists the incoming and outgoing connections for the firewall and the port each service uses. The panel also displays the IP addresses that are allowed to connect for each service. You can modify the list of services and the allowed IP addresses for each service.You can add supported services and management agents that are required to operate the host by adding ruleset files to the ESXi firewall configuration file directory /etc/vmware/firewall/. You open or close ports for these services by enabling or disabling the service on the host's security profile in the vSphere Client.
12 Jul 2011
Configure SNMP for ESX
ESX/ESXi includes an SNMP agent embedded in hostd that can both send traps and receive polling requests. such as GET requests. This agent is referred to as the embedded SNMP agent. By default, the embedded SNMP agent is disabled. To enable it, you must configure it using the vSphere CLI command vicfg-snmp. In this video I'll show you how to enable the SNMP agent.
7 Feb 2011