Sep 282016
 

During mydiscussions with multiple customers in last few months, it seemedwe discussed only about one major point. It wasto decide between installation type of Distributed vs Simple Architecture. More often than not I have seen customers choosing a deployment model not based on careful considerations but based on what the general belief is. This blog tries to shed light on the considerations that should be made before making the decision between Distributed vs Simple Architecture. Any Solution Architect or Virtualization Architect should read this blog to discuss on the above point.

The general belief:

I have met enough customers to safely assume that more than90% of times a customer asks us for a Distributed Architectureirrespectiveof the size of the environment or total uptime required from the solution.I agree to the fact that it undoubtedly has it’s own benefits like removing single point of failure. Butthe question is should we always choose Distributed Architecture simply because we can or for the stated reason or are there any other careful considerations involved?

My point is, it depends, and you will be surprised to know howmany times I may recommend a simple install over a distributed environment.

Before you think I am talking totally baseless point, let us check the reasons for me saying so.

 

First point ofconsideration:
In most of the cases, all the management components do not directly affect therunning workload. So a downtime of the management components should not have adirect impact to your existing running environment. During that time, you will not be ableto manage or do new things in your environment. But this in no way is impacting yourcurrent SLA for the already running workload. This should be fine in most cases, but if someone has a public cloud and the main management portal goes down obviously it has bigger impact on business and should be avoided. This fact is more prominent in VMwareenvironments.For example, let’s consider the following situations.

  • vCenter or PSC or both goes down– Existing VM’s keep running, no newdeployment or management is possible. In case of vRA with vCenter, no new deployment atcloud level is possible as well, but the Cloud portal works. Even all the features like HA, Networking (distributed) etc. all continue working. Remember this is your main management component in VMware virtualization environment.
  • vRealize Automation components go down– Cloud portal is not available,existing workloads keeps running. You can still SSH or RDP to the VM’s hosted in cloud. End users operations are not hampered.

Here I am considering only these two cases as these two are responsible for building Virtualized and Cloud environment respectively. So from above, I can safely assume that availability of the management components are critical but does not immediately affect my already running workload.

Second Point ofconsideration:

Next, let’s explore both these deployment Architectures and their general effect more closely.

 

Distributed Architecture: FirstLet’s check the implications of a Distributed Architecturemore closely.

Most of the times, because of the following two reasons this Architecture is chosen.

  1. To remove a single point of failure (increaseavailability)
  2. To support a larger environment (if a singlenode can support say 10000 elements then 2 nodes will support 20000 elements- load balancing)

A lot of times point two is not applicable. Very few of the cases you would find a customer exceeding the technical limitation of a product.

For example, how many times you have actually seen a single vCenter serversupporting 1000 ESXi hosts and 15000 powered off VM’s in production? Or for that matter a single vCenter appliance taking care of 10000 powered on VM’s? I am yet to see one. Did you ever see a single ESXi host supporting 1024 VM’s or 4096 vCPU’s deployed in that host? Have you ever seen any customer who is actually touching or nearing to the technical limitations of a VMware Product? I doubt and would love to see one.

Besides, if you have an environment this big, then definitely Distributed Architecture is THE WAY for you.

Coming back to the point, hence it seems, the majority of timesthe reason a Distributed Architecture is chosen is to remove a single point offailure thus increasing availability.

So let’s consider a fully distributed architecture for a cloud environment built on vRealize Automation and see the effects it has on the environment..

For a fully distributed architecture of vRealize Automation,we need the following number of components:

  • Deployed vRA appliance – 2+
  • IaaS web server – 2+
  • IaaS Manager Service Server – 2+
  • IaaS DEM Server – 1+
  • Agent Server – 1+

The number beside the component denotes the minimum number of nodes required for Distributed Architecture.

A total of minimum of 8+ servers are required only for vRealize Automation (with HA in DEM and Agent, you need more or overlap the roles). Also for database you need the following.

  • MSSQL Server in HA mode – 2+

On top of that, if you consider the distributed vCenter environment, then you have thefollowing requirements:

  • PSC – 2+
  • vCenter – 2+

So a total of 14+ VM’s. Of course I am stating the extreme case here and in all probability actual production environment will have less number of servers with overlapping features. But if you have a really big environment then this is the number.

All these components will have Load Balancer in front. So architecturallyvCenter environment looks like following:

vCenter Deployment- Distributed Architecture

 

Or more precisely and in more details:

vCenter Deployment – Distributed Architecture with Load Balancer

 

And the vRealize Automation environment should be as given below:

vRealize Automation Deployment – Distributed Architecture

 

The direct effect:

The placement of a Load Balancer in this architecture has a lot of effect in thisenvironment. Let’s consider a physical load balancer in traditionalenvironment, i.e. somewhere upstream after firewall (at least 2 or 3 hops awayfrom the host on which the VM resides).

Now,let’s check how a normal user request for a VM is handled. A user request comesto the front Load Balancer (LB) and based on the decision, it goes to the respective vRealize Automation appliance.From there it again goes out to LB and comes back to a IaaS webserver. Next the request again goes outto LB and based on the decision a Manager server is chosenand finally goes for DEM. The same story applies when the VM creation requestgoes out to vCenter, it reaches LB for choosing PSC and then vCenter node.

In all, considering all these multiple HOPS to LB think howmany extra hops are taking place simply because of the nature of the deployment architecture. Consideringthe number of extra hops consider the performance effect on the overall response time.

Simple deployment architecture:
Now let’s consider the effects of a simple deployment architecture. For ourdiscussion let’s consider the number of supported elements is well within thecapability of a single node. In all probability, a simple architecture will have a single node for every component of the solution.

So nowa request will not have to make so many roundtrips to LB. So for obvious reasons, response time should be higher than a fully distributed architecture. So you get higher performance.

But, the flip side is now you have a single point offailure. So let’s consider the different availability options to increase theoverall uptime of a simple single node deployment architecture.

  1. The first line of defense is underlying High Availability of Hypervisor with VMmonitoring option. Typically, a physical node failure is sensed within 12seconds and a restart takes place by 15 seconds. For the sake of discussion, let’s consider the OS and the application of the VM comes up within 5 minutes.Considering a node failover happens once in a month, total downtime is 5minutes in a total of 43200 minutes (considering 30-day month). That means youget an uptime of 99.988%. Same goes for VM hung situation or application hung situation, as we are monitoring at the VM level as well.
  2. Second line of defense is snapshot, if the OS or applicationgets corrupted we simply revert back to a snapshot. First let’s consider anexternal database is used, then there is not much change in the original VM, sorecovering from a snapshot is sufficient and say it requires 20 seconds. Sototal uptime is now 99.999%. But if internal database is used, then simply reverting toan earlier snapshot is not enough. In this case we need to revert to an earliersnapshot to recover the OS and then we need to restore the database from thebackup (we need to have a regular backup mechanism for the database). This willrequire more time, say 10 minutes. In that case your uptime is 99.977%(considering internal database and recovery time of 10 minutes).
  3. Third line of defense is backups. If everything getscorrupted then you need to restore entire appliance from a backup which saytake 30 minutes. So in this case you get a 99.931% uptime in a month.

So the final choice is based on required uptime. If the business can sustain a 99.931% uptime for management components (worst case scenario)and the total supported elements are well within the product limit range, then I willcertainly suggest a simple install because of the following reasons:

  • Simpler to manage
  • Simpler to update
  • Will perform better (as comparedto full distributed environment)
  • Better response time
  • Less complex

Conclusion:
At the end I would say, do not choose full distributed architecture simply because you can. Consider all the above points. Choosing asimple single node deployment architecture is not so bad after all.

Another point to note, if I need to build a fullydistributed environment then I would prefer using a virtual load balancer likeNSX Edge, which will be much closer to the VM’s than that of a physical onekept in a traditional architecture thus reducing round trip time.

I am simplifying an already complex topic and the final answer is, it all depends. Every environment and requirement is different and there is nosingle rule to follow, but do not discard a simple deployment architecture because ofthe “so called reasons”. Consider it seriously and it may be way better for yourenvironment than the distributed architecture. Till then Happy designing and let me know your view points.

Note: The above discussion is from a virtualization/cloud perspective. It does not apply to traditional physical datacenter as in that case, recovery time for a physical server failure is much higher. And you can not ensure SLA in that case.

 

The post Virtualization: Make an informed decision: Distributed vs Simple Architecture appeared first on VMware Cloud Management.

Sep 272016
 

Could not make Microsoft Ignite 2016? Here are three things we learned from Scott Guthrie’s keynote.

In his famous red shirt yesterday at Microsoft Ignite 2016, Microsoft EVP of Cloud and Enterprise Scott Guthrie empowered IT professionals to take the reins of digital transformation at their companies. Here are three of our favorite nuggets of wisdom from his keynote.

1. Don’t Forget: The Heart of Digital Transformation Is About Harnessing Technology

The driver’s seat is up for grabs when it comes to digital transformation. CEOs, CMOs and lines of business increasingly influence digital strategies. But remember it is you, IT experts, that live and breathe technology.

“You have the ability to make success stories, like the ones we heard this morning (referencing digital pioneers like BMW, Facebook and Rolls-Royce), happen in your organization,” Scott said. “The people who best know how to use technology—IT—are going to make it happen.”

Microsoft, Accenture, Avanade and Intel demo the Coop Supermarket of the Future at the Microsoft Ignite 2016 Expo.

2. Technology Is Not the Only Thing Changing

Sure, we see more screens per user and data increasing by zettabytes. But IT will also witness an influx of younger generations and freelancers in the workplace in the next few years.

What that means for Microsoft, Scott said, is that getting to a secure, productive enterprise is the new end goal. IT needs to focus on creating richer experiences for both customers and employees. We need “more personal computing.”

Cortana’s artificial intelligence is a key enabler for new productivity features in Microsoft’s products, including Tap for Word and Outlook or My Analytics for Office 365 (which now has over 70 million monthly active commercial users). Cortana now finds existing, relevant content in your organization whenever you create new content. Cortana also analyzes those reading your emails and when, so you can find the sweet spot on how to write and when to send emails.

3. Unprecedented Security Threats Call for Unprecedented Security Measures

We are living “in a world of unprecedented security challenges,” said Scott. The more tools and attack vectors we create, the more access points hackers have to corporate resources.

Microsoft devices are deconstructed and on display at the Microsoft Ignite 2016 Expo.

IT cannot just rely on old standbys for new threats. Scott told IT to lean in together and embrace new technologies to move forward. For instance, where do users spend 50% of their time at work? In a browser.

Microsoft’s new Windows Defender Application Guard for Microsoft Edge aims to secure the business-critical tool (and often overlooked pathway for malware). The virtualization-based solution allows admins to configure and distribute trusted site policies across the network, while containers quietly isolate malware.

Windows 10 has been adopted 115% faster than Windows 7, and now runs on over 400 million monthly active devices, said Scott. Security enhancements like this make Windows 10 the most secure version of Windows ever, he said.

Next:

  • You can watch the replays here of the Microsoft Ignite keynotes, or read our recap of Microsoft CEO Satya Nadella’s keynote here.
  • If you’re at the Atlanta conference, stop by booth #439 to meet the VMware AirWatch team.
  • Read the big news from VMware at Microsoft Ignite 2016 here.

Get a free demo of VMware AirWatch at Microsoft Ignite 2016. Visit booth #439.

The post 3 IT Lessons Learned at Microsoft Ignite 2016 appeared first on VMware End-User Computing Blog.

Sep 272016
 

Higher education is in the midst of fundamental changes, and as technology helps campuses better reach beyond their traditional physical borders, decision-makers expect IT to offer the solutions and leadership needed to deliver better services to students, staff, and researchers, while simplifying IT costs and responsibilities. That’s why educational institutions are turning to VMware vCloud® Air™ to empower institutions to strengthen and streamline IT control and capability, and eliminate the challenges of shadow technology governance while still meeting diverse computing needs of faculty and students. Sign up for our free one-hour webcast on September 29th to discover how vCloud Air uses public cloud to meet diverse needs with confidence and simplicity, and hear about Peirce College’s success with public cloud.

When open enrollment and an increasingly remote student body threatened to overwhelm Peirce College’s IT data center, they turned to vCloud Air to simultaneously increase IT performance, implement a disaster recovery strategy, and lower costs. Discover the driving factors

In this webcast you’ll learn the following:

  • Driving factors influencing higher education to move to cloud
  • Cloud options for higher education
  • Opportunities and benefits of the Cloud
  • A VMware vCloud Air Overview
  • Peirce College – Requirements, Scale, Disaster Recovery

Led by Paul Stephenson, VMware Technology Evangelist in the Americas Field Office of the CTO, discover how the vCloud Air portfolio is ideal for the needs of higher education, from effective distance learning to powerful back-end continuity and compliance capabilities.

Want to know how you can modernize your own IT infrastructure while staying within budget through vCloud Air solutions? Join us on 9/29 to find out how the hybrid cloud paired with a disaster recovery solution can improve your IT data center.

The post How Peirce College Prepared for Open Enrollment with VMware Public Cloud appeared first on VMware Cloud Blog.

Sep 272016
 

Effective this month, partners with a Management Operations Solution Competency will be placed on Provisional Status. These partners will have until February 28, 2017, to complete either version 2016 or 6 of the VSP-MO and VTSP-MO courses in order to continue to receive all program benefits. During the Provisional Status period, these partners will continue to receive VMware program benefits such as Solution Rewards. Don’t let your status expire.

The post Attn: Management Operations Solution Competent Partners appeared first on Partner News.

Sep 272016
 

Delivering the Digital Workspace with VMware

Date:Thursday, Sept. 29

Time:11 a.m.- 5 p.m. EDT

Host: DABCC’s Douglas Brown, vEXPERT, MVP, CTP

Why Attend

  • Sumit Dhawan, VMware expert blogger and End-User Computing (EUC) VP of desktop products, shares VMware’s overall vision and how EUC is a driving factor for the digital workspace.
  • Technical demonstrations showcase the latest VMware EUC technologies.
  • Live chat with Sumit, host Douglas Brown and other VMware experts during each session.
  • Experience all of the benefits of a full expo hallmannedby leading VMware integrators virtually.
  • Chance to win amazing prizes just by attending.

What You Can Expect

Register here to get access to the latest EUC news straight from VMworld, but that’s not all…

Join us from the comfort of your desk for an afternoon filled with amazing sessions. A dazzling virtual expo hall will also be filled with valuable information from key VMware Integration Partners.

  • Access to all content up to 60 days after the event, including presentation slides.
  • Interactive Q&A with VMware experts during each session.
  • Networking lounge to chat with fellow attendees, sponsors and speakers.
  • On-demand access to post event recordings.

Amazing Prizes

By attending sessions, you are automatically entered in to a drawing to win one of the following amazing prizes.

  • Apple iPhone 7
  • Apple iPad Pro 12.9” with Apple Pencil
  • Samsung Galaxy S7
  • Oculus Rift VR

A winner will be drawn from a list of all attendees for each session. You must be present to win.

Grand Prize

A Grand Prize will be award at the conclusion of the conference to the attendee with the most points. Points are earned by attending sessions, visiting sponsor booths, downloading sponsor assets, and/or participating in session chat room.

The Grand Prize winner is awarded an Intel NUC Skull Canyon! Clickherefor contest terms and conditions for participation.

Tell a Friend!

Make sure your colleagues don’t miss out. Send this page to your friends and colleagues, so they can experience the conference, too!

Because you liked this blog:

  • Free Analyst Whitepaper: The Digital Workspace Checklist
  • Watch Free: All the Breaking Digital Workspace News from VMworld U.S. 2016
  • 5 New Tools & Tech to Secure BYOD for the Digital Workspace

 

The post Free Virtual Event: Delivering the Digital Workspace with VMware appeared first on VMware End-User Computing Blog.

Sep 272016
 

C’est peu de dire que nous sommes rentrés dans l’ère de la mobilité. L’adoption des smartphones à grande échelle accompagnée de la prolifération d’applications mobiles a provoqué de profonds changements dans notre quotidien qui n’ont pas tardé à gagner les entreprises. Elles y ont vu l’opportunité d’augmenter l’autonomie et la productivité des employés. Revers de la médaille, avec cette grande souplesse et une utilisation de plus en plus fréquente d’équipements et d’applications personnels, les entreprises se sont heurtées rapidement à des enjeux de sécurité qui risquaient de se traduire par une réduction des fonctionnalités pour garantir la sécurité. Pourtant indéniablement le smartphone est devenu une extension du poste de travail. En brider l’usage revient à restreindre les capacités de travail de l’employé.

L’espace de travail numérique avec Workspace ONE. En tenant compte de ce dilemme VMware a développé sa vision de l’espace de travail digital («Digital Workspace») qui consiste à créer un environnement numérique de travail sécurisé sur les terminaux mobiles, susceptibles d’être utilisés par les employés de l’entreprise, et de fournir une expérience utilisateur uniforme. La mise en œuvre complète de cette vision repose sur Workspace ONE (annoncé en février 2016) qui intègre des fonctions de gestion d’identité, de gestion de terminaux (EMM Enterprise Mobility Management) et de fourniture d’applications en temps réel. La fonction EMM est assurée par le produit AirWatch qui gère déjà des millions d’équipement dans le monde et que les cabinets d’analyse IDC et Gartner ont positionné en tête de leur classement des produits EMM. Simplicité et sécurité sont enfin réconciliées avec Workspace ONE qui offre toute les garanties de sécurité en maintenant la qualité et l’uniformité de l’expérience utilisateur.

Une application store unifiée. Workspace One crée un catalogue d’applications accessible en cliquant sur l’icône Workspace. L’utilisateur retrouve ainsi toutes les applications dont il a besoin pour travailler. Les applications à usage professionnel sont isolées des autres. Des fonctionnalités additionnelles offertes par la «Workspace One Enterprise» pourront pousser plus loin l’isolation. Par exemple le logiciel Boxer de cette suite permet de créer un espace sécurisé et chiffré contenant les emails, les contacts et le calendrier.

Une authentification unique pour établir la confiance. Comme le souligne Thibaut Bellon notre directeur Avant-Vente, avec le «One touch mobile SSO (Single Sign On) l’utilisateur n’est plus contraint de s’identifier à chaque fois qu’il veut ouvrir une nouvelle application. Beaucoup d’applications peuvent être sécurisées simplement en se fiant au système d’identification de l’employé pour débloquer son smartphone ou sa tablette comme un PIN ou un service biométrique. Worspace One, avec VMware Identity manager et AirWatch, crée une expérience utilisateur sans couture entre poste de travail, web et mobile. Pour ce faire VMware utilise un système breveté Secure App Token System (SATS) qui établit la confiance entre l’utilisateur, le terminal, l’application et l’entreprise. Si un doute subsiste une action d’authentification supplémentaire eut être demandée avec un «VMware Verify» reposant sur une authentification multi-facteurs.

L’accès conditionnel. C’est sans aucun doute un des points clés de la solution Workspace One réalisé par le produit AirWatch. L’accès est conditionné à l’analyse de l’état du terminal mobile («device posture» en anglais). Nous avons tous téléchargé des applications ou des contenus sans être certains de leur qualité sans parlé des virus propagés à notre insu par l’ouverture d’un email ambigu. AirWatch va donc analyser les caractéristiques du terminal ainsi que les applications qu’il contient et bloquer l’accès si nécessaire. Afin d’augmenter les fonctions de sécurité, AirWatch dispose d’APIs pour permettre à un écosystème de spécialistes de la sécurité (Security Alliance) d’intégrer leurs produits avec AirWatch après un processus de validation

La sécurité du réseau jusqu’au datacenter avec NSX. Une intégration a été réalisée entre AirWatch et NSX. La sécurité est ainsi renforcée jusqu’au datacenter puisque NSX applique un modèle «Zero Trust» basé sur la micro-segmentation qui comme son nom l’indique cloisonne au plus petit niveau et évite ainsi à des malwares par exemple de se propager latéralement (trafic Est- Ouest) dans une architecture applicative

Au-delà du poste de travail la mobilité inclura les objets connectés. Le problème de la mobilité ne serait pas traité complètement si on ne tenait pas compte de l’internet des objets. Le phénomène des objets connectés touche tous les secteurs et pose bien sur des problèmes de sécurité. C’est donc assez logiquement que des fonctions d’AirWatch ont été étendues au domaine de l’internet des objets (IoT). On peut citer par exemple ce qui a été fait avec des distributeurs de boisson Coca Cola et avec des voitures connectées.

Billet écrit par Karim Djamai, Director Mobility France, suivez le sur son twitter ici

Sep 272016
 

C’est peu de dire que nous sommes rentrés dans l’ère de la mobilité. L’adoption des smartphones à grande échelle accompagnée de la prolifération d’applications mobiles a provoqué de profonds changements dans notre quotidien qui n’ont pas tardé à gagner les entreprises. Elles y ont vu l’opportunité d’augmenter l’autonomie et la productivité des employés. Revers de la médaille, avec cette grande souplesse et une utilisation de plus en plus fréquente d’équipements et d’applications personnels, les entreprises se sont heurtées rapidement à des enjeux de sécurité qui risquaient de se traduire par une réduction des fonctionnalités pour garantir la sécurité. Pourtant indéniablement le smartphone est devenu une extension du poste de travail. En brider l’usage revient à restreindre les capacités de travail de l’employé.

L’espace de travail numérique avec Workspace ONE. En tenant compte de ce dilemme VMware a développé sa vision de l’espace de travail digital («Digital Workspace») qui consiste à créer un environnement numérique de travail sécurisé sur les terminaux mobiles, susceptibles d’être utilisés par les employés de l’entreprise, et de fournir une expérience utilisateur uniforme. La mise en œuvre complète de cette vision repose sur Workspace ONE (annoncé en février 2016) qui intègre des fonctions de gestion d’identité, de gestion de terminaux (EMM Enterprise Mobility Management) et de fourniture d’applications en temps réel. La fonction EMM est assurée par le produit AirWatch qui gère déjà des millions d’équipement dans le monde et que les cabinets d’analyse IDC et Gartner ont positionné en tête de leur classement des produits EMM. Simplicité et sécurité sont enfin réconciliées avec Workspace ONE qui offre toute les garanties de sécurité en maintenant la qualité et l’uniformité de l’expérience utilisateur.

Une application store unifiée. Workspace One crée un catalogue d’applications accessible en cliquant sur l’icône Workspace. L’utilisateur retrouve ainsi toutes les applications dont il a besoin pour travailler. Les applications à usage professionnel sont isolées des autres. Des fonctionnalités additionnelles offertes par la «Workspace One Enterprise» pourront pousser plus loin l’isolation. Par exemple le logiciel Boxer de cette suite permet de créer un espace sécurisé et chiffré contenant les emails, les contacts et le calendrier.

Une authentification unique pour établir la confiance. Comme le souligne Thibaut Bellon notre directeur Avant-Vente, avec le «One touch mobile SSO (Single Sign On) l’utilisateur n’est plus contraint de s’identifier à chaque fois qu’il veut ouvrir une nouvelle application. Beaucoup d’applications peuvent être sécurisées simplement en se fiant au système d’identification de l’employé pour débloquer son smartphone ou sa tablette comme un PIN ou un service biométrique. Worspace One, avec VMware Identity manager et AirWatch, crée une expérience utilisateur sans couture entre poste de travail, web et mobile. Pour ce faire VMware utilise un système breveté Secure App Token System (SATS) qui établit la confiance entre l’utilisateur, le terminal, l’application et l’entreprise. Si un doute subsiste une action d’authentification supplémentaire eut être demandée avec un «VMware Verify» reposant sur une authentification multi-facteurs.

L’accès conditionnel. C’est sans aucun doute un des points clés de la solution Workspace One réalisé par le produit AirWatch. L’accès est conditionné à l’analyse de l’état du terminal mobile («device posture» en anglais). Nous avons tous téléchargé des applications ou des contenus sans être certains de leur qualité sans parlé des virus propagés à notre insu par l’ouverture d’un email ambigu. AirWatch va donc analyser les caractéristiques du terminal ainsi que les applications qu’il contient et bloquer l’accès si nécessaire. Afin d’augmenter les fonctions de sécurité, AirWatch dispose d’APIs pour permettre à un écosystème de spécialistes de la sécurité (Security Alliance) d’intégrer leurs produits avec AirWatch après un processus de validation

La sécurité du réseau jusqu’au datacenter avec NSX. Une intégration a été réalisée entre AirWatch et NSX. La sécurité est ainsi renforcée jusqu’au datacenter puisque NSX applique un modèle «Zero Trust» basé sur la micro-segmentation qui comme son nom l’indique cloisonne au plus petit niveau et évite ainsi à des malwares par exemple de se propager latéralement (trafic Est- Ouest) dans une architecture applicative

Au-delà du poste de travail la mobilité inclura les objets connectés. Le problème de la mobilité ne serait pas traité complètement si on ne tenait pas compte de l’internet des objets. Le phénomène des objets connectés touche tous les secteurs et pose bien sur des problèmes de sécurité. C’est donc assez logiquement que des fonctions d’AirWatch ont été étendues au domaine de l’internet des objets (IoT). On peut citer par exemple ce qui a été fait avec des distributeurs de boisson Coca Cola et avec des voitures connectées.

Billet écrit par Karim Djamai, Director Mobility France, suivez le sur son twitter ici

Sep 272016
 

VMworld 2016 Europe kicks off in less than one month! If you are registered to attend, theVMworld 2016 Europe Schedule Builderis your pass for getting a seat at the hottest sessions, labs, demos and discussions. It’s very easy to get started:

  1. Go to Content Catalog and browse for sessions of interest
  2. When you spot a session you’d like to pre-register for, click +
  3. If you’re not already logged in, you’ll be prompted for your VMworld account credentials

You can see all your reserved sessions by clicking the calendar icon in Content Catalog. You can also click the star to save a session as a favorite and come back later.

For those in town on Monday, October 17, we invite you to attend our Quick Talk on the Enterprise Learning Subscription – one of our newest training offerings:

Learning in the Cloud: VMware Education’s New Enterprise Learning Subscription (SDDC8945-QT)
Presenters: Education Services Team
Monday, October 17 at 15:00 – 15:30

We are bringing some of our most popular sessions to VMworld 2016 Europe. Based on the response in the US, these sessions will fill quickly. Claim your spot now!

vSphere Core 4 Performance Troubleshooting & Root Cause Analysis Part 1: CPU & RAM – INF8780
Presenter: Brett Guarino
Wednesday, October 19 at 15:30 – 16:30

vSphere Core 4 Performance Troubleshooting & Root Cause Analysis Part 2: Disk & Network (INF8701)
Presenter: Brett Guarino
Tuesday, October 18 at 15:30 – 16:30

These two sessions made the daily Top 10 List at VMworld 2016 US:

Troubleshooting 101 for Horizon (EUC8243)
Presenter: Linus Bourque
Tuesday, October 18 at 17:00-18:00

Troubleshooting vSphere 6: Tips & Tricks for the Real World (INF8755)
Presenter: Javier Menendez
Wednesday, October 19 at 12:30 – 13:30

The post Reserve Your Seat Now for Education Breakout Sessions at VMworld EMEA appeared first on VMware Education and Certification Blog.

Sep 272016
 

By: Ryan Cartwright, VMware Senior Systems Engineer & Joseph Griffiths, VCDX & Solutions Architect

On October 5th, we will be hosting a Getting More Out of vRealize Automation webinar called Day 2 Operations.

Cloud Management Platforms (CMP) are top of mind for almost every organization today. The driver toward CMP’s become more pronounced as public/hybrid cloud adoption becomes mainstream. As organizations embrace environments outside their own private cloud they quickly realize that they need tools to manage the cloud in order to encourage cost savings. Each cloud environment has its own presentation layer for providing the required functions. Different formats, GUI’s, API’s and terms create pockets of knowledge inside your organization. These pockets of knowledge become costly to maintain so organizations look to CMP’s to orchestrate, automate and standardize the user experience across clouds. User experience has become a key concern for IT; it’s a realization that how the user feels about IT is just as important as how IT operates.

Orchestration vs Automation

There are many definitions of orchestration vs automation. For the purpose of this post orchestration is defined as any operation that requires user input. For example, if you have a server provisioning workflow that requires human approval before provisioning or a workflow that migrates servers between cluster but requires inputs on source and destination clusters. Automation is a self-contained operation that does not require human interaction. Common examples of automation would be load balancing of resources between members of a cluster or automatic expansion of an operating system disk when full. Automation requires a higher level of validation and error checking in order to be autonomous. All human intelligence and possible variables have to be coded into the automation. Self-healing automated architecture represents the greatest cost savings, but requires people and process to change. Orchestration represents a significant milestone toward automation.

Once a task has been orchestrated it can be evaluated to identify if automation is possible. Using orchestration as a stepping stone for automation allows tasks to be broken into bit size chunks.

Quantifying business value

Most of the cloud management platform tools available today are focused on two moments in the service lifecycle: provisioning and de-provisioning. I believe this is because it’s easy to measure the impact of automating these two moments. Almost every organization can identify how long it takes to provision a server. Here is a common method used for measuring cloud provisioning by adding up the following:

  • Time to provision storage for the new server
  • Time to deploy an operating system
  • Time to deploy infrastructure services to the operating system
  • Time to provision accounts on the operating system
  • Time to deploy networking and firewall for base operation
  • Time to load application server on to operating system
  • Time to deploy code to application server
  • Time to validate application
  • Time to provide end users access to whole system

All of these metrics include potentially hundreds of steps including ITIL life cycle and many full time workers. On average customers identify it takes them a month to complete all of these steps. In order to quantify the cost of provisioning you can use this formula: Deployment time X Number of deployments a year = cost of provisioning. De-provisioning can take just as long. Normally the process of de-provisioning is not as clean and represents much more risk. De-provisioning could include:

  • Removal of machine
  • Removal of machine from agents and authentication domains
  • Removal of machine from firewall rules and networking
  • Removal of machine from load balancers
  • Removal of machine from CMDB
  • Removal of machine from asset management
  • Removal of machine from documentation

Almost all of these tasks represent risk since they require touching production environments to complete. Most of these steps are ignored because it’s very hard to identify which changes are connected directly to the server being decommissioned. Firewall rules and network configuration has a tendency to remain out of fear of removal. Consistency is notoriously bad with de-commissioning steps are often missed leaving an increasing pile of technical debt. Both of these processes are ripe for orchestration and automation but they represent a small portion of the life of a server.

Diagram 1.1

 

Diagram 1.1 illustrates the problem with focusing solely on day one or provisioning in your cloud management platform. The average server will spend less than 1% of its total life in provisioning and de-provisioning. It will spend years inside day two operations. During the provisioning and de-provisioning stages the service does not provide value to the business. It is only during the day two phase that it provides value to the business. This period represents the greatest rate of change and the greatest risk. Creating day two operations to standardize reduces risk and improves service availability. Day two operations are the greatest cost to IT organizations in the form of staff hours. Day two operations are fertile ground for operating expense savings and optimization. In order to quantify the cost of day two operations you need to have understanding of the following:

  • How often the task is done
  • How much time the task takes to complete
  • The steps and people required to complete the task
  • Complexity of the task
  • Risk associated with failure to complete the task in a timely fashion

These metrics allow you to quantify the value of orchestrating or automating any particular task. Once you have an understanding of the cost of the task justifying the time to automate becomes easy. These data points are often mined from ITSM tools. Tickets can track time to resolution and frequency of operations. It’s often easier to rewrite the process instead of duplicating it with orchestration. Years of caked on process make the original requirements often unrecognizable. Business value of orchestration and automation fall into a few categories:

  • A decrease in time to mission objectives
  • An increase in productivity or effectiveness
  • A reduction in operating expenses
  • A reduction in risk

It is critical that you identify the value of each task in these terms with associated cost savings. You can then quantify the value of each solution year over year to justify continued automation.

Storage Expand example

The getting more out of webinar vRealize Automation day two operations provides a simple example of the power of vRealize Automation when combined with vRealize Orchestrator. Each product addresses different logical functions to form a solution for day two operations. vRealize Automation provides service catalog and approval mechanisms while orchestration provides the programmatic functionality and API extensibility.

The example is simple:

  • The virtual machines are thin provisioned
  • The datastores are sized to support the currently allocated storage (thin) plus 20% overhead
  • The datastores are expanded on the array when free space is below 20%
  • Failure to expand the datastore results in server outages if the datastore runs out of space (VM in stunned and suspended until write space is available)

The process is done every morning and anytime that a datastore drops below 20% free and alarms.

The simplified process is provided in Diagram 1.2.

Diagram 1.2

 

The total amount of staff time spent manually doing the task each morning is 60 minutes across two different full time employees. This time does not mean it takes 60 minutes to complete it could take hours depending on other issues facing either team. During the time you are awaiting completion of the tasks you are in risk out outages. This problem resurfaces potentially many times a day sucking away staff time and efficiencies. Staff becomes very reactive awaiting failures instead of proactively solving the issues. In addition, incorrectly expanding a datastore with a raw device mapping device can result in data loss to production systems.

The business value for this workflow can be defined as:

  • 60 Minutes per day of savings in full time staff – reduction in operating expenses
  • Cost of interruption of staff – An increase in productivity
  • Risk of outages by failing to expand the datastore – A reduction in risk
  • Risk of data loss and outages by incorrectly expanding datastore – An improvement to productivity and reduction in operating expenses

The whole process is perfect for orchestration and eventually automation. In order to orchestrate we need to understand each step with inputs and outputs. Identification of this full process can stall or completely stop automation efforts. Organizations who have been successful with orchestration have chosen to focus on the minimally viable solution and then iterate through the process until it’s automated. For this example, we have broken it into three implementation steps:

  • Calculate new size and open a ticket for storage team to expand
  • Storage team expands the LUN
  • Virtualization team expands the datastore to the new size of the LUN

Each of these workflows can later be combined into a single workflow to automate the whole process. Each step should include ITIL processes for change. For the example I skipped the demonstrating the storage team expansion since it’s vendor specific.

Calculate new size

The process to calculate the new size requires two variables:

  • Resize_percent – This is the percent of free space we expect to have on a datastore at all times
  • Vmfs_to_expand – this is an composite array to hold the datastore names and size that need to be expanded

These variables feed into our process:

  • Scan all datastores
  • If any datastores is beyond 100 – resize_percent used then
    • Calculate new size of lun to equal 70% used in GB
    • Load the new size and name of datastore into array vmfs_to_expand
    • Potentially add additional information into vmfs_to_expand like WWID etc..
  • Open a ticket for the storage team to expand the lun

Notice how the first step of this orchestration assumes that the current process of manually expanding the LUN will continue. We are just going to automate submitting the request. This workflow alone saves us 20 minutes every day and potential errors. The code is simple and commented to add to understanding:

Once combined with a method to open tickets into your ITSM solution you have a 20 minute per day time saver. It’s also modular allowing you reuse it and combine with future workflows.

Expanding the datastore

Expanding the datastore represents the greatest risk of the process. When expanding a datastore it provides a list of all LUN’s that currently don’t have VMFS on them. This is not a problem unless you have raw device mappings which then show up in the expand list. Using them for the expand has two effects:

  • Data loss on the raw device drive
  • Your datastore you are expanding now uses extents to cross two luns with potential performance and disaster recovery challenges

Neither of these effects are desirable, but human error makes both very possible. Using vRealize Automation it’s possible to provide operations staff a list of datastores and a workflow to expand the datastores removing all risk from the process and saving 20 minutes per day. Choosing to expand a datastore that has not been expanded on the storage array has no effect. The first step is to build a workflow that takes a datastore name and attempts to expand it.

In order to make this user friendly we need to present a drop down of datastores inside vRealize Automation for the user to select. This is done with a vRealize Orchestrator action with the following code:

 

Using the action to provide the drop down allows you to have a user friendly safe method for expanding a datastore. We have now saved 35 minutes a day between two orchestrations. (Only 35 because you need 5 minutes to run the workflow)

Beyond these two workflows

If we can build orchestration to expand the storage LUN we then have every part of this task orchestrated. They could be combined to create an automation that can run every hour expanding datastores as needed. In order to automate a number of additional variables need to be considered:

  • Does the storage array have enough disk space for the expand?
  • Is there a maximum size for your datastores? If yes, what does the automation do in this situation?
  • Is there some storage that cannot be expanded for example NFS? What should we do with that storage?
  • Is there an organizational maximum number of virtual machines that we want on a single LUN? What should we do if that is exceeded?
  • Do you have public cloud resources that have to be treated differently?

Each of these questions lead into additional orchestration that leads to automation. Testing each automation as an orchestration allows us to vet out these challenges. Error checking and input validation with scriptable tasks are critical to solid well running automation. Using these techniques organizations can quickly gain operational cost savings from their cloud management platform across public and private clouds.

Call to Action

Hopefully this information gives you some ideas on what is possible with Day 2 Operations using vRealize Automation. Join us on October 5th for the presentation and Q&A discussion afterward! Click here to Register!

Visit www.vmware.com/go/getmoreto view the entireGetting More Out of VMware webinar series.

 

The post Getting More Out of vRealize Automation: Day 2 Operations appeared first on VMware Cloud Management.

Sep 262016
 

Continuing our unbroken tradition of releasing VMware Horizon FLEX every quarter since it debuted in 2014, we are proud to announce the General Availability of version 1.9.

For those not fully up to speed on FLEX, Horizon FLEX gives IT the flexibility to meet the needs of BYO (bring your own) and Mac users by marrying security, control and compliance of the local desktop with the flexibility of cloud-based deployment. Horizon FLEX delivers a reliable Windows or Linux experience to contractors, road warriors, developers, field workers and those affected by mergers, while controlling licensing costs, even when offline. It can extend the life of legacy applications using cloud-controlled local virtual desktops on modern hardware, and reduce the downtime and shipping costs associated with deploying new laptops.

The key to all this magic is an occasionally connected central policy server that dictates the behavior of remote hypervisors (Fusion Pro and Workstation Player). In version 1.9 we’ve focused on enhancing those policies to give you even more control.

  • MAC Address Assignment:You can now set a MAC address range on the FLEX server. As FLEX virtual machines come online and register with the FLEX server, the FLEX server will assign them the next MAC address in the range.
  • Network Policy: There is a new policy to specify the virtual network card settings. The administrator can set the connection to be bridged (new IP address for the virtual machine), network address translation (IP address shared with the host) or blocked completely. The administrator can also allow the end user to edit the setting.
  • Virtual Router Isolation: For customers whose users are on a corporate-managed router, they can limit the virtual machine (VM) connectivity directly to the router with no IP sharing.

Additionally, the remote VMs can now benefit from full VMware Mirage support for Windows 10, and from substantially better clients in the form of Fusion Pro 8.5 and Workstation Player 12.5

Horizon FLEX is available to download today. Try FLEX now in our free Hands On Lab.

The post Announcing VMware Horizon FLEX 1.9 appeared first on VMware End-User Computing Blog.

Sep 262016
 

One of my favorite announcements at VMworld happened to be about PowerCLI, of course! The big announcement was about its future availability on multiple platforms, including Linux and Mac OS X. This functionality has been one of the biggest requests the PowerCLI team has received over the years and it is extremely exciting that it’s finally coming!

The announcement actually happened during Alan Renouf and Luc Dekens’ session INF8092 titled: The Power Hour: Deep Dive, DevOps, and New Features of PowerCLI. The response in the room was amazing. Then, when Alan asked who would be planning on running PowerShell and PowerCLI on Linux and/or Mac OS, the amount of hands that went up was staggering. In fact, it was so staggering that Alan had to take a picture:

I would be remiss if I didn’t mention how this was all made possible by our friends at Microsoft. This past August, Microsoft actually open sourced PowerShell which in turn opened the ability for PowerCLI to be run on multiple platforms.

VMware, and PowerCLI in particular, were involved as special guests when Microsoft made the open source announcement. If you haven’t checked out the announcement video, it’s worth a watch. Pay particular attention around the 46-minute mark:

At this point, you’re probably looking for more details. PowerCLI Core, the multi-platform version of PowerCLI, will be released as a VMware Fling. However, it has not been made available as of yet. The PowerCLI Engineering team is, and has been, working extremely hard on preparing the release.

I’ve had a chance to play with an early version, and it’s amazing. They’ve done an excellent job and it really is just that cool. It still puts a smile on my face every time I do this:

In the meantime, here is a video showcasing the upcoming Fling:

If you want to watch Alan and Luc’s session INF8092 where the announcement was made and check out all the other awesome PowerCLI goodness that was made available at VMworld, the session is viewable today. It’s also worth mentioning that the session was voted into the Top Ten Sessions of the Day, so I would consider it a ‘must see’! Direct Access to the video available here.

The post PowerCLI Core Coming to a Fling Near You! appeared first on VMware PowerCLI Blog.

Sep 262016
 

By Neal Elinski, Solution Strategist

IT departments are responsible for every aspect of their cloud-based applications, but without full visibility and control over these workloads, as we often find in cloud environments, how can they fulfill those expectations? Everybody wants the operational benefits that come from a cloud, but no IT department is fully comfortable running their machines in a black box. If they can’t see what’s happening in the background, then how do they know that their workloads are running properly?

With vCloud Air, we have a few solutions to open up your cloud, so you can look behind the curtain to properly monitor, tune, and manage your environment to your specifications.

A clear view into your cloud-based workloads lets you take advantage of the benefits of cloud, without the common issues that come with a black box deployment. You can finally move faster and be more flexible. You can order datacenter capacity and receive it in hours, instead of weeks or months. You can have a digital presence in nearly any location in the world for a fraction of what it used to cost. You can even take advantage of extra services like microsegmented networks and zero downtime site-to-site migrations, all without changing the way you operate your existing data center. In short, you can make the most of cloud services when you have the transparency provided by vCloud Air.

Monitoring Options for vCloud Air

vCloud Air provides several free options for monitoring and managing your cloud environment:

  1. The vCloud Air Portal

In the portal today, you can see details about your Virtual Data Center, Virtual Machine, and Advanced Networking Service Gateway usage. All of these can help an admin with an ‘at a glance’ view of the live environment, along with any ‘on the fly’ modifications.

  1. Monitoring APIs

Outlined in the VMware vCloud Air Documentation Center, this public API allows users to pull environment metrics from vCloud Air and use them with their tool of choice. These range from low-level VM statistics to Edge Gateway networking metrics.

  1. vRealize Operations Management Pack for vCloud Air 3.0

Now available on the Solutions Exchange, the new vRealize Operations Management Pack for vCloud Air 3.0 is a free package that pulls 200 compute and storage metrics, 100 networking metrics, and additional Hybrid Cloud Manager metrics from vCloud Air. All of these are polled, archived, and analyzed by the vRealize Operations analytics engine to help you optimize and manage your vCloud Air environments, right alongside your existing vSphere environments.

A Closer Look at the Management Pack for vCloud Air

Let’s take a deeper look at the newly released 3.0 version of the Management Pack for vCloud Air.

After installing this free 30MB PAK file, your vRealize Operations Advanced or Enterprise instance will start polling the details on every one of your vCloud Air objects that it can find. This data gets as granular as individual virtual machine disk statistics like Read and Write latency:

Once a base set of metrics is collected, the system will start to analyze your data over time to create a baseline of ‘normal’ operation. Then, when triggered, the system will automatically and intelligently alert you to current anomalies and future risks. Alongside the standard notification methods, these messages and statistics will be displayed on one or more of the many prebuilt dashboards that are available and nearly identical to the vSphere and NSX dashboards that you may be used to:

If you need a different view of the data, then you can also create custom dashboards that may be useful for pinpointing problems across on- and off-prem environments. For example, if you have an application that is distributed across your vSphere environment and vCloud Air, you may wish to see the performance status for both environments at once. Custom dashboards can be extremely powerful to align with your specific projects and give you more intuitive information about the workloads you care about.

New to this version of the Management Pack, we help provide professionally formatted out-of-the-box reports on important aspects of your cloud, like Stressed or Oversized VMs, Network Services, and Migration Statistics.

These allow you to transform dashboard information into regular reports that can be published as a PDF or CSV file for easy sharing.

In addition to pulling metrics from vSphere, vCloud Air, and Advanced Networking Services Gateway objects, this newest version of the Management Pack can also poll VMware’s Hybrid Cloud Manager product. For those who are unfamiliar with this utility, it makes the task of extending your data center to vCloud Air simpler than ever before. Supporting bi-directional, zero-downtime migration of virtual machines between your data center and vCloud Air, customers can use Hybrid Cloud Manager to move workloads between on-prem and the cloud without disruption. To further minimize migration and operational complexity, you can also use this tool to stretch your on-prem Layer 2 networks over to vCloud Air, providing you with unified networking across sites. With the latest Management Pack for vCloud Air, beyond just pulling Hybrid Cloud Manager statistics, we’ll dynamically analyze and map any networks that you have extended to vCloud Air, building out and reporting on every major hop of your L2 Extended networks to help you monitor and troubleshoot your hybrid connections:

In the end, the free vRealize Operations Management Pack for vCloud Air opens up your cloud to provide the visibility that you need to control your cloud like your own datacenter, breaking apart the traditional black-box of cloud to provide unheard of transparency.

Do you need to see exactly how your VDCs, VMs, Networks, and Services are performing? We can help with that.

Do you need to isolate and troubleshoot a potential issue in your cloud? We can help with that.

Do you need to optimize your cloud? We can help with that.

Do you need to plan a migration to the cloud? We can help with that too.

What are you waiting for? To start the conversation on moving to the compatible cloud with industry leading transparency, reach out to us at http://vcloud.vmware.com/contact-sales.

Learn more about the new vRealize Operations Management Pack for vCloud Air at: https://solutionexchange.vmware.com/store/products/management-pack-for-vcloud-air-vchs.

View the full list of cloud services at vCloud.VMware.com.

For future updates, follow us on Twitter and Facebook at @vCloud and Facebook.com/VMwarevCloud

The post The Transparent Cloud with vRealize Operations appeared first on VMware Cloud Blog.

Sep 262016
 

Physical desktop architectures can be an obstacle to end-user mobility, but cost concerns and fears about complexity stop many organizations from embracing desktop and application virtualization.

This brief from the VMware Horizon team offers seven steps you can follow to ease some of these concerns, plus quick customer stories from companies like NetApp, Metro Health Hospital, and Hartlepool College.

Download the complete brief or visit the VMware End User Computing blog for more on this topic.

The post Seven Steps for Getting Started with Desktop Transformation appeared first on VMware Education and Certification Blog.

Sep 262016
 

Today at Microsoft Ignite 2016, VMware announced a new tool to simplify and accelerate your Windows 10 migration. TheSysTrack Desktop Assessment Service provides you with a comprehensive analysis of your end-user computing environment.

Read more now at the AirWatch Blog.

What will you learn from your SysTrack report? This quantitative analysis reveals end-user behavior patterns, software dependency and usage, web and network usage and information on your device inventory. With SysTrack, you’ll know how ready your end-user computing environment is for Windows 10. You’ll know where you can increase security, save costs and optimize the Windows 10 experience for end users.

Here’s a preview of what metrics SysTrack will provide.

You can try it now at assessment.vmware.com, or visit VMware at Microsoft Ignite 2016 atbooth #439 this week to learn more.

The post Windows 10 Migration Made Easy: Get Your Free Assessment Today! appeared first on VMware End-User Computing Blog.

Sep 262016
 

VMware Horizon 7
Applications and RDS Hosts Are Not Visible After an Upgrade from Horizon 6.2.3 to Horizon 7.x (2146862)
Date Published: 9/22/2016
Setting the RDS Host Operating System Version (2146850)
Date Published: 9/22/2016

VMware Horizon Client
RTAV stops working in Horizon Client after switching the frame size on the client system (2146967)
Date Published: 9/19/2016
Exclusive mode issues and limitations in Horizon Client for Mac OS X (2146968)
Date Published: 9/20/2016
Audio-in stops working in Horizon Client for Linux after you mute/unmute or disconnect/reconnect audio (2146970)
Date Published: 9/19/2016
baiMobile 301MP-LT smart card reader does not work with Horizon Client on an iOS 10 iPhone (2146982)
Date Published: 9/20/2016
ThinPrint Module TPview.dll causes the Horizon Client process to crash (2147013)
Date Published: 9/21/2016

VMware Horizon DaaS
Two factor authentication applied for internal connections in DaaS (2145378)
Date Published: 9/19/2016
VM Tools state (notRunning) is invalid for conversion (2146403)
Date Published: 9/23/2016
Adding the shared IP address of dtRAM for the tenant via Service Center Portal fails (2146774)
Date Published: 9/21/2016
“LDAP error code 49 data 530” when logging in to Enterprise Center or Desktop portal (2144288)
Date Published: 9/21/2016
“Not authenticated” error while connecting to Daas Desktops using View Client (2145984)
Date Published: 9/21/2016
DaaS appliance fails to power on during restoration or creation (2146563)
Date Published: 9/21/2016
Cannot disable/delete tenant or unassign compute resources from Service Center portal (2144341)
Date Published: 9/21/2016

VMware NSX for vSphere
Forwarding to destination fails when securelocaltrafficbyip value is changed in IPsec VPN (2144131)
Date Published: 9/21/2016
DNS Service shows as down after configuration on the NSX Edge (2145413)
Date Published: 9/19/2016
VM connectivity issues with error: Failed to fork child process (2146890)
Date Published: 9/23/2016
Anti-Affinity Rules are getting removed after re-deploying NSX Edge (2146972)
Date Published: 9/22/2016
Data path issues for VNIs with disconnected NSX Controller (2146973)
Date Published: 9/21/2016
VXLAN creation timeouts & failed to create virtualwires (2146148)
Date Published: 9/21/2016
Layer-2 firewall rules are not applied to an NSX for vSphere host (2144132)
Date Published: 9/19/2016
Recovering from an NSX Controller failure in NSX for vSphere 6.x (2144329)
Date Published: 9/20/2016
“host is unknown: host-15 return empty list” error in NSX Manager log (2145558)
Date Published: 9/19/2016
Deployment of Trend Micro SVM fails in NSX for vSphere (2146014)
Date Published: 9/21/2016

VMware User Environment Manager 
UEM reports “Either ‘-r’ or ‘-s’ must be specified.” when using App Volumes 2.11.0 (2146474)
Date Published: 9/21/2016

VMware vCenter Configuration Manager 
Exchange reports of vCenter Configuration Manager are not pulling data (2145352)
Date Published: 9/19/2016
VCM Collection fails with Error: Failed to initialize credential with principal tls (2146358)
Date Published: 9/21/2016

VMware vCenter Orchestrator Appliance
VMware Appliance Operating System Licensing (2147083)
Date Published: 9/23/2016

VMware vCenter Server
How to prevent forced lockout when the root account is still active (2147043)
Date Published: 9/21/2016
Upgrading to vCenter Server 6.0 fails with the error: Failed to uninstall product Error: 1602 (2146411)
Date Published: 9/19/2016
Adding new hosts to VDS fails after upgrade from NSX 6.2.1 to 6.2.x (2145764)
Date Published: 9/20/2016

VMware vCloud Air
IPSEC Tunnel goes down after adding 0.0.0.0/0 in peer subnet (2146943)
Date Published: 9/21/2016

VMware vRealize Automation
How to set up Windows repository for updating vRealize Appliance (2146969)
Date Published: 9/22/2016

VMware vRealize Business for Cloud Advanced
Troubleshooting the vCenter Server 5.5 storage synchronization failure in vRealize Business for Cloud (2147078)
Date Published: 9/23/2016
Troubleshooting vCenter Server data collection failure in vRealize Business for Cloud (2146836)
Date Published: 9/20/2016

VMware vRealize Operations Manager
Removing a Plug in from vRealize Operations Manager 6.1 or Higher (2147075)
Date Published: 9/23/2016
Adding a Node in vRealize Operations Manager 6.1 and Higher fails (2147076)
Date Published: 9/23/2016

VMware vSphere Data Protection
SSH keys do not change after the vSphere Data Protection deployment (2147069)
Date Published: 9/23/2016

 

The post New KB articles published for week ending 09/24/16 appeared first on KB Digest.