Mrz 242017
 

This month’s massive outage of Amazon Web Services&#rsquo; S3 (Simple Storage Service) platform, was if nothing else a reminder to us all that we need to have Disaster Recovery plans we can count on. This week we bring in one of VMware’s Disaster Recovery experts, GS Khalsa to discuss various aspects of Availability and Disaster

The post vSpeaking Podcast Episode 39: Disaster Recovery with GS Khalsa appeared first on Virtual Blocks.

Mrz 242017
 

The recently certified IBM Storage Enhancements for vSphere Web Client Plug-in is one of the most popular VMware integration points that our storage customers use today. Easily deployed, it allows our customers to enable VMware administrators to independently and centrally manage IBM storage resources in their VMware environments, consistent with their application needs.

THE CERTIFIED SOLUTION CAPABILITIES:

IBM Storage Enhancements for vSphere Web Client Plug-in enables VMware administrators to easily provision, delete, rename, resize, map, and unmap a volume within an abstracted service defined by the storage administrator with all capabilities (compression, quality of service, etc.) defined for that storage service. Secondly, it provides substantial granularity of information about volumes, including Virtual Volumes. IBM&#rsquo;s integrated solution also supports all IBM block storage offerings and is part of IBM&#rsquo;s end to end support for VMware integrations. The capabilities are easily delivered through IBM Spectrum Control Base Edition, a single IBM integration platform supporting VMware solutions.

 

BENEFITS: What are the benefits of IBM Storage Enhancements for vSphere Plug-in?

The VMware-certified solution from IBM reduces complexity of managing volumes, avoids inconsistences, and improves efficiency:

  • Reduces the complexity of managing volumes from multiple storage systems and types
  • Avoids inconsistencies created by using multiple plug-ins
  • Improves efficiency by reducing the time to deploy and manage individual plug-ins for each storage system

IBM Storage Enhancements for vSphere Web Client Plug-in, in conjunction with IBM Spectrum Control Base Edition, facilitates better decision making and troubleshooting for customers through advanced monitoring capabilities and easily accessed, highly detailed information about an array and its components. The IBM solution also minimizes administrative overhead through simplified self-provisioning and volume related tasks, freeing VMware administrators for more productive work. Together the capabilities enable an easier shift to cost-effective software defined data center and hybrid cloud solutions by reducing dependencies on other teams and empowering people to get their work done.

 

IBM Storage Enhancements for vSphere Web Client Plug-in brings further customer value by offering fast, easy, unified deployment and installation by means of a single point of VMware solutions integration across IBM storage systems and software-defined storage offerings. Certification for this vSphere integration point is part of the comprehensive end to end IBM support for VMware products, as driven through their longstanding commitment to the Technology Alliance Partner program and as a key design partner supporting VMware solutions, helping our joint customers meet a full range of needs under one umbrella.

 

For more information, go to IBM Knowledge Center https://ibm.biz/BdiXhp

 

VIDEO: Let&#rsquo;s take a look at IBM Storage Enhancements for vSphere Web Client Plug-in in action!

https://youtu.be/tf-0LGABZK8

VMWARE’S WEB CLIENT PLUG-IN CERTIFICATION PROGRAM:

Many companies are building and certifying their plug-in. Through VMware certification partners can ensure a better end user experience and have the trusted VMware brand behind their plug-in. Look for new partner web client plug-in certifications in 2017! Thanks to all of our partners for supporting the VMware vSphere web client plug-in certification and partner program.

 

For more information, view the links below:

VMware&#rsquo;s Solution Exchange (VSX): https://solutionexchange.vmware.com/store/vsphere/web-client-plug-in

vCenter website for vSphere web client plug-ins: http://www.vmware.com/products/vcenter-server.html

Social Media Channels: vSphere YouTube Channel: VMwarevSphere and Twitter: @VMwarevSphere

vSphere Fling for developing plug-ins: https://labs.vmware.com/flings/vsphere-html5-web-client

The post IBM STORAGE ENHANCEMENTS FOR vSPHERE WEB CLIENT PLUG-IN SOLUTION appeared first on VMware vSphere Blog.

Mrz 242017
 

Access and review the updated Development Fund Guidelines to help align your marketing plans with the right investment. The comprehensive guide provides details on DF eligible activities and claiming requirements.

The post FY18 Development Fund Guidelines Available appeared first on Partner News.

Mrz 242017
 

In can be tempting to create a new account if you can&#rsquo;t remember your previous information, or if you&#rsquo;ve changed email addresses due to a job change. But, that leads to multiple accounts which causes its own set of problems down the line.

Instead, here are some simple ways to find your old account information.

First, click the &#rsquo;login help&#rdquo; link from the VMware Education or Certification log in screen.

From that page you can request to have your password or user name sent to you. If you don&#rsquo;t remember either one, start by requesting your user name, then use that information to request the password.

If you no longer have access to your old email account, then please email our support team for further assistance.

 

The post Certification Insights: Forgotten Password appeared first on VMware Education & Certification.

Mrz 242017
 
Google plans to ramp up Android security in 2017. Google shared in a security year in review post this week that, &#rsquo;About half of devices in use at the end of 2016 had not received a platform security update in the previous year.&#rdquo; To improve that number, Google plans to make it easier for both […]]> Google plans to ramp up Android security in 2017.

Google shared in a security year in review post this week that, &#rsquo;About half of devices in use at the end of 2016 had not received a platform security update in the previous year.&#rdquo; To improve that number, Google plans to make it easier for both manufacturers and their more than 1.4 billion users to deploy and apply security patches this year.

Google also noted that, &#rsquo;Google Play continues to be the safest place for Android users to download their apps.&#rdquo; Devices that downloaded apps only from Google Play had a year-over-year decrease in Potentially Harmful Apps (PHAs) installed, while total Android devices showed a slight increase in PHAs present.

SIY: Secure It Yourself.

It&#rsquo;s about time all smartphone users take mobile security seriously. So we rounded up seven simple ways to secure your smartphone, plus special considerations for enterprise IT admins. Step one, disk encryption …

VMware AirWatch is certified secure.

AirWatch mobile device management (MDM) and the AirWatch MDM Agent underwent rigorous testing last month and earned NIAP Common Criteria Certification. We&#rsquo;re delighted to provide technology that meets the highest regulatory standards and strictest security requirements.

Welcome to admin&#rsquo;s adventures in enrollment land.

Do you feel like you&#rsquo;re going down a rabbit hole figuring out Apple Device Enrollment Program (DEP) configurations for iOS enrollment? Follow one of these four common enrollment scenarios, along with the AirWatch settings for each recommended by our expert.

This isn&#rsquo;t a popularity contest, but …

Apple iPhone 6s was the best-selling smartphone of 2016, according to an IHS Markit analysis. Samsung smartphones also accounted for half of the 10 most popular devices of 2016.

Here&#rsquo;s the game plan:

  • Attending the VMware-sponsored mobility track at Enterprise Connectin Orlando? Find us at booth 1007 at the expo, March 27–29.
  • Join VMware and KuppingerCole this Tuesday for a webinar on Creating Secure and Unified Next-Generation Workspaces.
  • Starting March 30, we&#rsquo;re kicking off our free, interactive hands-on labs where you&#rsquo;ll get step-by-step guidance on AirWatch and Workspace ONE. Register for a VMware SociaLab in your city.
  • Discover your path to VMware Workspace ONE using AirWatch during our April 12 webinar. Register to Achieve Your Digital Workspace Goals: Episode 2.
  • Last week, we announced a new AirWatch release. Now, sign up for our webinar to see the enhancements in AirWatch 9.1 on April 19.
  • Act fast to catch EUC Insights 2017 on demand!
    • EUC Insights 2017 AMER
    • EUC Insights 2017 APJ
    • EUC Insights 2017 EMEA
Mrz 242017
 

Un approccio Cross-Cloud può offrire libertà, scelta e controllo sul cloud e aiutare le aziende ad accelerare il proprio percorso di digital transformation. Tuttavia, gestire in sicurezza e colmare il gap fra cloud diversi, gestendo al tempo stesso rischi, costi e sicurezza, può risultare difficile.

Richard Munro, Chief Technologist and Technical Director for vCloud Air EMEA di VMware, spiega come aiutare le aziende nella digital transformation con la Cross-Cloud Architecture di VMware. In questa serie di video, Richard illustra i vantaggi di un approccio Cross-Cloud nel supportare tutte le line of business a guidare l&#rsquo;innovazione e raggiungere i propri obiettivi.

Video #1: come possono le aziende modernizzare la propria infrastruttura IT con l&#rsquo;approccio Cross-Cloud?

Digital transformation, cloud transformation, business transformation – da dove devono partire le aziende? Scopri come un approccio Cross-Cloud unificato e integrato all&#rsquo;infrastruttura IT può aiutare le organizzazioni a iniziare la propria trasformazione.

Video #2: trasformare la sicurezza: come può aiutare l&#rsquo;architettura Cross-Cloud?

La sicurezza nelle moderne organizzazioni richiede una visione funzionale del profilo di rischio di ogni applicazione e la dichiarazione esatta di come ogni singola applicazione verrà protetta. Scopri come la Cross-Cloud Architecture di VMware con NSX può aiutarti a proteggere la tua azienda attraverso le piattaforme, le applicazioni e i cloud.

Video #3: come puoi abilitare il tuo Digital Workspace?

La tua forza lavoro vuole semplicità quando diventa mobile. Vuole libertà di scelta del proprio dispositivo mobile e del modo in cui accedere, ma l&#rsquo;IT ha ancora bisogno di qualche controllo. Ascolta cosa dice Richard Munro a proposito di come la Cross-Cloud Architecture di VMware può portare libertà e controllo nel Digital Workspace, consentendo all&#rsquo;IT di regolare l&#rsquo;ambiente senza ostacolare le persone che invece sta cercando di agevolare.

Video #4: che impatto avrà il public cloud sull&#rsquo;azienda del futuro?

Come può l&#rsquo;IT contribuire al piano 2020 di un&#rsquo;organizzazione? I servizi di cloud pubblico diventeranno parte di questo piano. Scopri come puoi integrare i cloud pubblici e scomporre i processi e i silos per aiutare la tua azienda a raggiungere i propri obiettivi di trasformazione.

Vuoi saperne di più su come la Cross-Cloud Architecture di VMware può aiutarti nel tuo percorso verso il cloud? Visita la nostra pagine Cross-Cloud Radius.

Vuoi iniziare il tuo percorso? Leggi il nostro eBook, &#rsquo;Network Virtualization for Dummies&#rdquo; e porta il tuo network nel futuro. Scaricalo qui.

 

 

 

 

 

Mrz 242017
 

In Part 1 of this blog series, you were introduced to the VMware User Environment Manager Application Profiler. In Part 2 we will profile a popular video playback application called VLC Media Player, capture specific application settings, apply these as predefined settings when an end user launches the application, and explore troubleshooting techniques as needed.

Introduction

Configuring a specific toolbar layout, setting a region-specific language, disabling automatic updates—these are just a few of many reasons IT might want to configure predefined application settings. Unfortunately, this is not always a simple task. Software vendors store configuration data in a variety of locations, and various packaging and deployment technologies have their own methods for customizing application settings.

VMware User Environment Manager provides an easy and consistent way to apply and enforce predefined settings for all your Windows applications. We will use the Application Profiler tool to capture these settings.

Environment

Installing Application Profiler and performing the initial profiling process is outside the scope of this blog post, and is well-documented in the VMware User Environment Manager Application Profiler Administration Guide. This blog post will focus on the advanced scenario of troubleshooting a profiled application.

The following describes the configuration used to profile VLC. For a comprehensive list of supported operating systems for Application Profiler, see the VMware User Environment Manager Application Profiler Administration Guide.

Application Packaging and Profiling Machine Configuration (Profiling VM)

The application packaging and profiling machine (also called the profiling VM) is configured with the following:

  • Windows 10 Anniversary Update (AU) VM.
  • VMware App Volumes Agent version 2.12.
  • VMware User Environment Manager Application Profiler version 9.1.
  • svc-profiler domain account has local administrative privileges.

 

The App Volumes Agent is an optional component, and is part of the VMware End-User-Computing JMP Solution. This agent is included so the same VM can be used to build an App Volumes AppStack for application deployment, and to profile the application for personalization with User Environment Manager. If you would like to learn more, or include App Volumes in your environment, refer to the App Volumes Reviewer&#rsquo;s Guide.

End-User Machine Configuration

The end-user machine in this example has the following configuration:

  • Windows 10 AU
  • VMware App Volumes Agent version 2.12.
  • VMware User Environment Manager FlexEngine version 9.1.
  • jspencer is a standard end user domain account.

Application Profiling

VLC Media Player version 2.2.4 was captured to an App Volumes AppStack using all default installation options. The AppStack was then used to deliver VLC to the profiling VM. During the User Environment Manager application profiling process, the View > Playlist setting was selected for the default view.

Note: Playlist is the item being selected. Docked Playlist is a default setting, independent of Playlist.

Upon completion of the profiling process, we see that the configuration change was written to the file system, in the %AppData%\vlc folder.

Selecting Config File with Predefined Settings from Application Profiler produces four files:

  • INI – User Environment Manager configuration file containing the import and export locations. This file defines the parameters for User Environment Manager to manage the application.
  • ICO – Icon used by User Environment Manager Management Console and the Self-Support tool.
  • FLAG – Flag file for FlexEngine, when DirectFlex is enabled (default).
  • ZIP – Contains the predefined user settings.

I prefer to modify the Default Save Path so saved files are automatically added to User Environment Manager.

While you may be tempted to open and edit the ZIP file directly from Windows Explorer, it is critical that the Edit Profile Archive button be used instead. User Environment Manager uses the standard ZIP file format to prevent the creation of proprietary file formats, but the writes to and reads from the ZIP files are optimized for performance. Using tools outside of User Environment Manager to edit these ZIP files makes them unreadable by FlexEngine.

By editing the profile archive, we can browse the contents and make changes as needed.

Notice that VLC uses an INI file to record the user settings. When View > Playlist was selected during application profiling, playlist-visible=true was recorded in the INI. However, there are a number of additional settings that were automatically recorded in the INI.

When configuring predefined application settings, user settings that are stored in an INI file may result in different behavior than user settings stored in registry keys. We will come back to predefined settings later in this post.

For now, we are going to take a step back and run the application profiling process again for VLC. This time, View > Playlist is selected, and Tools > Preferences > Menus Language is configured for French.

Upon completion of the profiling process, we see that the configuration changes were written to the file system, in the %AppData%\vlc folder, and to the registry, in HKCU\Software\VideoLAN.

When we edit the profile archive this time, we see both AppData and Registry folders.

While it is not a common practice for application vendors, this version of VLC Media Player stores the language setting in the registry, while a variety of other user settings are stored in an INI file.

As mentioned in Part 1 of this series on the Application Profiler it is important to &#rsquo;know thine app.&#rdquo;

Configuring and Applying Predefined Settings

To configure and apply the predefined settings, we use the User Environment Manager Management Console.

The VMware User Environment Manager Administration Guide provides a detailed description of the four types of predefined settings you can choose from. For our purposes, we will configure VLC Media Player predefined settings to Partially Enforced Settings. Partially Enforced Settings are applied after the user profile archive has been imported. This effectively merges the user personal settings with the partially enforced settings. In case of a conflict, the partially enforced settings win and overwrite the user personal settings.

To test our configuration, I will log in to a View instant-clone desktop in as jspencer. The same App Volumes AppStack that was used to deliver VLC to the application-packaging VM is used to dynamically deliver VLC to the VM when I log in. When I launch VLC for the first time, the menus are in French, and the interface is configured for Playlist view. Success!

While logged in as jspencer, I will disable the Playlist view, change the language to American English, and clear all of the check boxes on this preferences page.

Based on the way the Partially Enforced Settings option is designed to behave, we would expect the following behavior the next time VLC is opened by jspencer:

  • The menus will be in French and the Playlist view will be enabled. This is because both settings were configured during application profiling, and applied as partially enforced predefined settings.
  • The check boxes cleared on the preferences page will remain cleared. This is because these settings are not specified by the predefined settings, and are therefore user settings that will be stored in the user-profile archive.

After closing and re-opening the application, we see that all of my changes were discarded, including the check boxes on the preferences page. This is not what we expected!

But why did this happen?

We are seeing the result of an application storing its user settings in an INI file. To understand this, let us look at the workflow when a user logs in to a Windows desktop with User Environment Manager enabled.

  1. User logs in.
  2. User profile archive, including any custom user settings, is imported to Windows.
  3. Predefined application settings are imported to Windows.

User Environment Manager behaves differently during Step 3 depending on whether the application settings are stored in the registry or in an INI file.

User Environment Manager can parse individual registry settings. You might think of this as merging only the specified, predefined registry keys to the Windows registry. In our test case, only the language setting is forced on the end user by the predefined application settings registry import. Any other user settings that happen to get recorded in HKCU\Software\VideoLAN are preserved for the end user. This enables IT to enforce specific application settings, while granting the end user flexibility to customize and preserve any other settings.

When applications store configuration data in files (INI,XML, or others), User Environment Manager can only overwrite the entire file. In our test case, the Playlist view predefined setting is stored in an INI file. That file is part of the predefined applications settings that are applied after the user profile archive is imported. The user jspencer made several changes (cleared check boxes) to the preferences page, which were stored in that same INI file. Going back to the previous workflow, the problem becomes apparent.

  1. User login.
  2. User profile archive, including the INI file customized per the user settings, is imported to Windows.
  3. Predefined application settings, including a copy of the INI file created during the application profiling process, overwrites the INI file imported in Step 2.

Another Issue with Text Files

Even though I am logged in to the end-user VM as jspencer, browsing to the VLC application settings INI shows a value that includes the user name (svc-profiler) of the account that was used during the application profiling process.

The intended behavior is for this line to be populated with the user name of the currently logged-in user—jspencer in this case.

User Environment Manager supports using placeholders to accommodate variables in text files.

Editing the profile archive allows us to modify the text file manually. In this case, I have replaced jspencer with the system variable %username%. See the User Environment Manager Administration Guide for proper syntax and usage.

Now when jspencer runs the application, the user name is properly reflected in the INI.

Conclusion

The following is a brief summary of the application profiling concepts and practices covered in this blog post, which you can apply to your own applications.

  • Always use the Application Profiler or the User Environment Manager tools to edit a profile archive ZIP
  • Applications might store user settings in the registry, in files, or both. Taking the time to fully understand the way your application behaves (&#rsquo;know thine app&#rdquo;) will ensure successful application profiling.
  • When applications store user settings in an INI file, the intended behavior of partially enforced predefined settings might
  • When applications store user settings in a file, values from the profiling VM or profiling user account might be preserved in the predefined application settings. Placeholders enable the use of system variables to address this possibility.

 

The post Profiling Applications with VMware User Environment Manager, Part 2: Applying and Troubleshooting Predefined Settings appeared first on VMware End-User Computing Blog.

Mrz 242017
 

In 2011 Marc Andreessen made his now famous statement, “Software is Eating the World&#rdquo;; a wild claim at the time, but one that proved to be highly prescient. This declaration has become the underpinning of how VMware delivers solutions that enable our customers to be more agile, efficient and innovative with their IT operations – through software.

When we launched our vision for a Software Defined Data Center (SDDC) in May of 2012, we said it would enable IT transformation through security, automation, management control, and services choice in a way that translated to greater simplicity, programmability, and consistency across various customer IT environments. We executed on that vision in partnership with the technology and open source ecosystem so that customers would have the best of breed approach when transitioning to a modern software infrastructure.

The explosion of cloud and container services has driven a significant need for scalable, automated and policy-driven networking across heterogeneous environments in a way that can only be realized through software abstraction. Foundational to network virtualization, the virtual switch has become a strategic component for delivering fast, agile infrastructure.

In line with how we&#rsquo;ve executed and delivered on our SDDC vision, we are now seeing our customers converge on a networking standard. They are telling us that their preferred model of the virtual switch is to use the natively available virtual switch in the hypervisor and program it using APIs as required. The adoption of native virtual switch as part of comprehensive network virtualization deployments is accelerating, and the primary reasons are for operational simplicity, security, and pace of new feature advancements. In fact, we&#rsquo;ve found that VMware&#rsquo;s native virtual switch implementation has become the de facto standard for greater than 99% of vSphere customers today.

Moving forward, VMware will have a single virtual switch strategy that focuses on two sets of native virtual switch offerings – VMware vSphere® Standard Switch (VSS) and vSphere Distributed Switch™ (VDS) for VMware vSphere, and the Open virtual switch (OVS). This strategy is about investing in the priorities of our customers and simplifying the platform to create the best, most secure experience possible.

By using the native virtual switch on the platform, customers simplify their IT landscape by reducing their upgrade times, streamline their support, deploy new features more quickly, and prepare themselves for the next wave of change agents.

This strategy is particularly significant as enterprises continue to move towards new agile models driven by developers building next-generation applications and running cloud services. These customers are going from on-premises private clouds, to public clouds, to cross-cloud architectures. Standardizing on software across all of these – beginning with the native virtual switch – helps our customers make the transition to their digital future.

Milin

The post Software is Eating the Network: Going Native on Network Virtualization appeared first on The Network Virtualization Blog.

Mrz 242017
 

Co-author Bhumik Patel – Partner Architect, VMware Overview Today, we are pleased to announce the much awaited support for VMware vSAN on Cisco UCS blade as an All-Flash ReadyNode. This enables a new vSAN blade platform on Cisco in addition to a number of vSAN Ready Nodes already supported on the UCS C-Series

The post Cisco UCS Blades Powered by VMware vSAN appeared first on Virtual Blocks.

Mrz 242017
 

Co-author Bhumik Patel – Partner Architect, VMware Overview Today, we are pleased to announce the much awaited support for VMware vSAN on Cisco UCS blade as an All-Flash ReadyNode. This enables a new vSAN blade platform on Cisco in addition to a number of vSAN Ready Nodes already supported on the UCS C-Series

The post Cisco UCS Blades Powered by VMware vSAN appeared first on Virtual Blocks.

Mrz 242017
 

VMware is aware of the following reported issues affecting Windows Server 2012 and 2008 Guest Operating Systems on VMware vSphere:

  • The Windows Receive Side Scaling (RSS) feature is not functional on virtual machines running VMware Tools versions 9.10.0 up to 10.1.5
  • Any Windows Virtual Machine running these versions of the VMware Tools will experience increase in rate of “Received Dropped Packets”, caused by the fact that all network traffic will be serviced by only one CPU in the Guest.
  • This condition results in performance degradation for the applications and services hosted on the affected Virtual Machine.

VMware is working on creating a fix for this issues.

In the meantime, customers who are experiencing the issue described above are encourage to downgrade the VMware Tools version on the affected VM to version 9.4.15.

VMware Tools are available for download Here

The post RUSH POST: VMware Tools and RSS Incompatibility Issues appeared first on Virtualize Business Critical Applications.

Mrz 242017
 

By: Lora Johnson

 

Hardware serves as the foundation for your IT stack, and if your hardware devices aren&#rsquo;t performing at optimal levels, your networks, applications and storage ultimately suffers. For your Dell EMC PowerEdge servers, extending your monitoring to see more metrics can give you the visibility that you need to clearly understand issues, simplifying troubleshooting and eliminating mean-time-to-innocence (MTTI) hunts.

In this blog post, I&#rsquo;ll highlight the top metrics we recommend monitoring in order to optimize your Dell EMC PowerEdge performance.

 

Server Temperatures

Monitoring server temperatures gives you important insight into one of the most important baseline metrics for server performance. Taking it one step further and integrating this monitoring into alerts and recommendations gives you actionable information.

Figure 1: Example of an Analysis Badge with insight into capacity issues in the Blue Medora Management Pack for Dell EMC PowerEdge

 

Within Blue Medora&#rsquo;s Dell EMC PowerEdge Management Pack for vRealize Operations, you can extend your server temperature monitoring to include capacity definitions. As a result, you can set specific thresholds to indicate when you receive alerts and notifications.

 

For Dell EMC PowerEdge, this is commonly used for server temperatures. Set your threshold for a temperature just below one that causes performance issues — when temperatures rise, you receive a notification so you can quickly troubleshoot before the temperature change triggers other alerts or issues within your servers, or even other layers of the IT stack.

 

Device Relationships

Hardware issues trickle down to other layers of the IT stack and can quickly wreak havoc on performance. Understanding how your devices are interacting with each other can simplify the troubleshooting process — making it easier to pinpoint issues faster, before they impact the rest of the IT stack.

 

Within your Dell EMC PowerEdge servers, there are a number of relationships that you can monitor and track, including:

  • Dell EMC Chassis
  • Dell EMC Blade Server
  • Dell EMC Rack Server
  • Dell EMC Chassis Power Supply
  • Dell EMC Rack Power Supply

 

Device Performance

When issues do arise, teams often spend a great deal of time tracking down the cause of the issue. MTTI hunts can lead to finger pointing and significant delays in actually figuring out what may be causing the performance issue. Is it network traffic is too high? Are there I/O bottlenecks?

Figure 2: Dell EMC PowerEdge Server Performance Dashboard

 

Insight into key performance indicators around device performance for your Dell EMC PowerEdge workloads can eliminate MTTI hunts and give you immediate indication if there are issues occurring among these resources.

 

Some key metrics to monitor include:

  • Power supply input/output
  • Device status
  • Usage (e.g., cumulative, peak, last peak, minimum)
  • Volts, amps and watts reading
  • Server power

 

Disk, Memory and Processor Usage

Drilling down into the disk and memory usage across your Dell EMC PowerEdge servers serves as one of the best ways to determine what may be causing performance issues. Bottlenecks are often the most common cause for concern, which generate when too much disk and memory space are leveraged for other processes. As a result, your CPU lags — resulting in slow input/output operations and a negative impact on your end-user experience.

 

Alert Count

Not all alerts are created equal and when it comes to managing your servers, you can get inundated with notifications when issues arise. Within vRealize Operations and Blue Medora&#rsquo;s Management Pack for Dell EMC PowerEdge, you can set thresholds so that you are only notified when the highest priority alerts occur.

Figure 3: Example of an alert in the Dell EMC PowerEdge Management Pack

 

The alert count gives you insight into key trends that may be occurring with your servers. For instance, if you frequently receive notifications that your device status is unavailable, it may indicate that your device may be faltering. With the ability to track alert counts, you can track the frequency and any increases that may indicate a larger issue with your specific device.

 

To learn more about the Dell EMC PowerEdge Management Pack from Blue Medora or to download a free trial, please visit the True Visibility Suite for VMware vRealize Operations page on Blue Medora&#rsquo;s website.

 

The post Optimize Dell EMC PowerEdge Performance with 5 Key Metrics appeared first on VMware Cloud Management.

Mrz 242017
 

If you’re one of my 1441 twitter followersor an avid reader of trade publications from the Asia-Pacific region, you may have noticed I started a new job last week. After two-plus years as CTO for Networking at VMware, I’ve now taken on the role of CTO for APJ (Asia, Pacific and Japan). My new job […]

The post And Now For Something Completely Different appeared first on VMware | CTO Blog.

Mrz 242017
 

According to a recent end-user survey conducted by 451 Research, 64 percent of organizations have already implemented a cloud-based disaster recovery (DR) solution; up from 46 percent in Q4 20141.

 

While the public cloud can offer a reliable, cost-effective DR option with a &#lsquo;pay as you go&#rsquo; consumption model and the ability to provide near real-time data center replication, not all public cloud DR solutions are designed with the same technical specifications, nor do they provide the same level of protection.

 

Here&#rsquo;s a short list of what to consider when considering cloud-based DR:

 

Availability
High availability of business-critical workloads—even in the event of a disaster or an outage—is quickly becoming the new normal. But protecting your complete IT infrastructure to provide this level of availability can be cost-prohibitive.

 

Many organizations group applications into &#lsquo;tiers&#rsquo; based on business priority, and savvy IT leaders design unique strategies to meet specific RTO and RPO strategies for each tier. To do so, you&#rsquo;ll need a flexible cloud-based DR solution that can support tiering strategies for business-critical applications, commonly run applications, and occasional use applications.

 

Networking
Modern enterprises are complex, and even seemingly simple networking requests can take time. Imagine going through potentially months of work planning your move to the cloud only to then learn that your networking team needs months of time to prepare.

 

For some organizations, an IPSec connection is enough to meet their requirements. Most, however, require a direct connect circuit due to VM size, security and networking functionality.

 

Security and Compliance
The most effective way to meet security needs in the cloud is to mirror on-premises policies, thereby eliminating any inconsistencies. With encryption and key management software designed specifically to address the unique requirements of private, public and hybrid clouds, you can be confident that data is secure.

 

Many cloud providers state what compliances they adhere to or support, but do not explain which services adhere to them. You may need to purchase a premium service to get the compliance level your business needs. It&#rsquo;s important to understand if compliances are provided in a provider’s standard multi-tenant environment, or if they are only available in a premium-level service offering.

 

Some of the more common security and compliance programs are: ISO/IEC 27001 (Global), HIPAA, Cloud Security Alliance CAIQ, and UK G-Cloud 8.

 

VMware vCloud Air Disaster Recovery
Across multiple industries, VMware vSphere® users leverage VMware vCloud® AirTM Disaster Recovery to build or scale their disaster recovery solutions.

 

Because vCloud Air is built on the trusted technology of vSphere, it mirrors on-premises architecture in the public cloud—providing a standby disaster recovery site where vSphere workloads and data are replicated to avoid extended application downtime in the event of a disaster. vCloud Air offers a portfolio of solutions that scale your cloud environment and network topology along with your disaster recovery needs, including the recently launched enterprise-grade Dedicated Disaster Recovery offering.

 

VMware vCloud Air Dedicated Disaster Recovery seamlessly integrates and manages on-premises and cloud networks as a single network. Customers can migrate their on premises firewalls and security policies to the recovery cloud using SD-WAN optimization and Hybrid DMZ reference architectures. This helps enterprises meet their unique compliance and security requirements.

With vCloud Air you can confidently spin up a replicated environment on demand, and know that your vSphere architecture and your financial investments are protected.

 

Ready to learn more about what vCloud Air Disaster Recovery can add to your disaster recovery strategy.

 


1Cloud-Based Disaster Recovery in 2016 and Beyond, 451 Research, November 2016

The post What to Consider When Considering Cloud-based Disaster Recovery appeared first on VMware vCloud.

Mrz 232017
 

If you access your NSX NFR licenses through the Nicira portal, be aware, we have standardized the entitlement and distribution of NSX Not for Resale (NFR) licenses, providing you with a single location to manage all NFR licenses through ‘My VMware’.

The post NSX NFR Licenses Migrated to MyVMware appeared first on Partner News.