Episodes
You can use Traceflow to inspect the path of a packet as it travels from one logical port on the logical network to another logical port on the same network. Traceflow traces the transport node-level path of a packet injected at a logical port. The trace packet traverses the logical switch overlay, but is not visible to interfaces attached to the logical switch. In other words, no packet is actually delivered to the test packet’s intended recipients. You can use the port connection tool to...
Published 02/13/19
The .vmsn file includes the current configuration (.vmx) and bios setting (.nvram). The memory is stored in the .vmem file.
Published 01/08/19
The Universal Distributed Logical Router is installed in the kernel of every ESXi host, as such it requires a VM to provide the control plane. The universal distributed logical router Control VM is the control plane component of the routing process, providing communication between NSX Manager and NSX Controller cluster through the User World Agent. NSX Manager sends logical interface information to the Control VM and NSX Controller cluster, and the Control VM sends routing updates to the...
Published 03/26/18
Context- aware firewall enhances the visibility at the application level and helps to override the problem of application permeability. Visibility at the application layer helps you to monitor the workloads better from a resource, compliance, and security point of view. Firewall rules cannot consume application IDs. Context-aware firewall identifies applications and enforces a micro-segmentation for EAST-WEST traffic, independent of the port that the application uses. Context-aware or...
Published 01/19/18
If your dashboard is indicating that a host is not in a healthy state, you can capture packets for that particular host for further troubleshooting. You can capture packets using the new Packet Capture tool, to help diagnose and solve network related problems. You can create a packet capture session for required hosts on the NSX Manager using the Packet Capture tool. After the packets are captured, the file is available to download. Maximum of 16 sessions and total of 400 MB files are...
Published 01/18/18
With vSphere Virtual Machine Encryption, you can create encrypted virtual machines and encrypt existing virtual machines. Because all virtual machine files with sensitive information are encrypted, the virtual machine is protected. Only administrators with encryption privileges can perform encryption and decryption tasks. An external KMS, the vCenter Server system, and your ESXi hosts are contributing to the vSphere Virtual Machine Encryption solution. After vCenter Server is connected to...
Published 12/08/17
The resxtop and esxtop command-line utilities provide a detailed look at how ESXi uses resources in real time. Also, esxtop displays information about the state of the physical server running an ESXi Server. It lists CPU utilization for each physical processor, memory utilization, and disk and network bandwidth for each network and disk device available to the ESX Server machine. Furthermore, esxtop lists CPU and memory utilization for each individual VMkernel world. Memory utilization is...
Published 11/22/17
You can use the Projects feature in vRealize Operations Manager to plan for capacity allocations and upgrades in your virtual environment, or to optimize your existing resources. To plan your upcoming capacity needs, you create a project that anticipates forthcoming changes that affect the capacity of your objects. In addition to creating projects to plan for hardware changes or virtual infrastructure changes, you can create custom profiles and custom data centers to help forecast your...
Published 11/22/17
Each object is composed of a set of components, determined by capabilities that are in use in the VM Storage Policy. For example, with Primary level of failures to tolerate set to 1, vSAN ensures that the protection components, such as replicas and witnesses, are placed on separate hosts in the vSAN cluster, where each replica is an object component. In addition, in the same policy, if the Number of disk stripes per object configured to two or more, vSAN also stripes the object across...
Published 11/11/17
The NSX Manager contains many tools to help customers in conjunction with Global Support Services to resolve operational issues. The NSX for vSphere 6.x product features a customized command line interface that covers most of the basics that the user interface does and a little bit more. On occasion, it may become necessary to use a regular unix command line interpreter (shell) to be able to deal with unanticipated configuration issues. In these cases it is required that customers use this...
Published 10/12/17
VMware strongly recommends that you configure SSL certificates for authentication of View Connection Server instances, security servers, and View Composer service instances. A default SSL server certificate is generated when you install View Connection Server instances, security servers, or View Composer instances. You can use the default certificate for testing purposes. Replace the default certificate as soon as possible. The default certificate is not signed by a Certificate Authority...
Published 09/27/17
With the Cloud Pod Architecture feature, you can link together multiple View pods to provide a single large desktop and application brokering and management environment. A View pod consists of a set of View Connection Server instances, shared storage, a database server, and the vSphere and network infrastructures required to host desktop virtual machines and application pools. In a traditional View implementation, you manage each pod independently. With the Cloud Pod Architecture feature,...
Published 09/21/17
You can set up vRealize Automation to use an external vRealize Orchestrator server. System administrators can configure the default vRealize Orchestrator server globally for all tenants. Tenant administrators can configure the vRealize Orchestrator server only for their tenants
Published 08/30/17
For many years, I was a big fan of Asymetrix Toolbook and Visual Basic. I won’s say I’m an experienced programmer but I knew my way around (remember the vmClient). Since Visual Basic doesn’t run on a Mac, I did some research and have found a good cross platform alternative called Xojo, it’s a a development tool for creating powerful, native applications for desktop, web, iOS, and Raspberry Pi.  The only problem I had is how to I talk to vSphere? Version 6.5 has a REST API and Xojo is...
Published 08/10/17
This video explains how to enable the RabbitMQ management interface on the vRealize Automation Appliance and shows how to subscribe to a que from Orchestrator.
Published 08/08/17
The API commands in the vCenter Server Appliance let you perform various administrative tasks in the vCenter Server Appliance. The API commands are provided by appliance management service in the vCenter Server Appliance. You can edit time synchronization settings, monitor processes and services, set up the SNMP settings, and so
Published 01/18/17
VMworld 2016 Barcelona
Published 10/24/16
VMworld 2016 Barcelona
Published 10/24/16
VMworld 2016 Barcelona
Published 10/24/16
VMworld 2016 Barcelona
Published 10/24/16
VMworld 2016 Barcelona
Published 10/24/16