Jan 182017
 

vSAN cache recommendations for vSAN 5.5 were 10% of used capacity. With the addition of all all flash in 6.0 it stayed at 10% andCormac here explains the math behind this.Now if you look closely you&#rsquo;ll notice a few issues as vSAN and flash drives have progressed. The 10% ratio guidelines was based on a

The post Designing vSAN Disk groups – All Flash Cache Ratio Update appeared first on Virtual Blocks.

Jan 182017
 

VMware vCenter Orchestrator API
vRO REST API authorization using Oauth2.0 Authentication (2148518)
Date Published: 1/11/2017

VMware vCenter Orchestrator Appliance
Error “UNLICENSED!” shows in vRealize Orchestrator Client when a license is applied (2148519)
Date Published: 1/9/2017

VMware vCenter Server
Migrating from vCenter Server 6.0 to VCSA 6.5 fails with the error: unquoted carriage return found in data (2148219)
Date Published: 1/11/2017
Error-“Logon failure: the user has not been granted the requested logon type at this computer” (2148054)
Date Published: 1/9/2017

VMware vCenter Server Appliance
Logging in to the vCenter Server Appliance fails with the error “Failed to authenticate user” (2147174)
Date Published: 1/12/2017
“No hosts data available” error in the Hardware Status tab after upgrading to vCenter Server 6.5 (2148520)
Date Published: 1/12/2017

My VMware
Locating the Entitlement Account number for new orders (2148565)
Date Published: 1/13/2017

VMware App Volumes
AppVolumes Writables and Nested Groups (2148426)
Date Published: 1/10/2017

VMware ESXi
Unable to rename the iSCSI initiator on the ESXi host” (2146492)
Date Published: 1/10/2017
OSPF stops sending Hello packets when IGMP snooping enabled(2147922)
Date Published: 1/11/2017
Increasing the size of an existing virtual disk fails with the error:The disk extend operation failed: <Reason> (2148366)
Date Published: 1/11/2017
Changing the Storage Policy of a VM fails with error: The scheduling parameter change failed (2148490)
Date Published: 1/13/2017
FCoE Boot from SAN (BFS) Limitations for uEFI BIOS (2148531)
Date Published: 1/12/2017
Keyboard layout does not apply to secondary keyboard (2148556)
Date Published: 1/13/2017
ESXi host fails with the error: PANIC bora/vmkernel/main/dlmalloc.c:xxxx – Corruption in dlmalloc (2147888)
Date Published: 1/10/2017
ESXi host fails with a PSOD #PF Exception 14 after NVIDIA spinlock allocation failure (2145707)
Date Published: 1/11/2017
UEFI Secure Boot with vSphere Auto Deploy (2148532)
Date Published: 1/11/2017

VMware vRealize Automation
Pairing vRealize Automation adapter version 2.1.4 fails in vRealize Operations Manager (2148414)
Date Published: 1/12/2017

VMware vRealize Log Insight
No events, tasks and alarms are received from vCenter in Log Insight 3.6 (2147969)
Date Published: 1/13/2017
Outage or performance degradation in vRealize Log Insight (2148280)
Date Published: 1/10/2017

VMware vRealize Network Insight
VMware vRealize Network Insight 3.2.0, Patch P1-201612160001 (2148516)
Date Published: 1/9/2017

VMware vRealize Operations Manager
Repair accidental corruption of persistence.properties (2142107)
Date Published: 1/12/2017
Missing relationships between sessions and virtual machines in vRealize Operations Manager 6.x (2148192)
Date Published: 1/10/2017
Management pack for storage devices fails to register Fabric CIM Server in vRealize Operations Manager (2148234)
Date Published: 1/12/2017
Remote Collector fails to stay connected in vRealize Operations Manager 6.2.x (2148394)
Date Published: 1/11/2017
Enable (Force) listed for EPOPs metric in vRealize Operations Manager (2148413)
Date Published: 1/11/2017

VMware vRealize Operations Manager
Logs cause remote collector to run out of disk space (2144249)
Date Published: 1/11/2017

VMware vRealize Orchestrator
vCO plugin error in vCO Inventory Edge (2148554)
Date Published: 1/13/2017

VMware vSAN
Understanding the Proactive Storage Stress Test for vSAN (2147074)
Date Published: 1/13/2017
ESXi host fails to rejoin VMware vSAN cluster following reboot (2148122)
Date Published: 1/11/2017

 

The post New KB articles published for week ending 01/14/17 appeared first on Support Insider.

Jan 182017
 

Our popular EUC Insights online event. And for 2017, it’s bigger than ever. Click here to register today!

Join us online Feb. 15 to be the first to experience the latest and greatest product innovations, plus:

  • Action-packed keynote starring companies on the bleeding edge of the digital workspace movement;
  • 6 powerful session tracks, including app and desktop virtualization, Windows 10 management and endpoint security;
  • Tech-based breakout sessions tailored to your interests;
  • New virtual Hands-On Labs; and
  • Much, more more.

Click here to register today!

The post Registration Is Open! EUC Insights 2017 appeared first on VMware End-User Computing Blog.

Jan 182017
 
In my recent blog post, I touched upon the common, or single, experience strategy and how identity is the new perimeter for that strategy in the enterprise. Today, I want to take a deeper dive into what it means. How exactly does identity define your users&#rsquo; experiences? How can companies take advantage of this to […]]> In my recent blog post, I touched upon the common, or single, experience strategy and how identity is the new perimeter for that strategy in the enterprise. Today, I want to take a deeper dive into what it means. How exactly does identity define your users&#rsquo; experiences? How can companies take advantage of this to create delight while securely enabling users?

Identity Management Yesterday & Today

Identity management has always been about who a user is. It allows a company to verify that when a user wants to access data, they know who they are. In recent times, identity is about more than who the person is. Identity encompasses where they are and what device they are using.

Enterprise mobility devices and tools have matured in the last few years so that it is possible to use many form factors and instruments on the device to authenticate who someone is. The user can apply biometrics, possession and location to prove who they are. A company can, based upon this proffer of identification, decide what data a user can access and what they can do with that data.

[Related: Unification of EMM and Identity Management Makes Securing Personal Devices Easier]

Examples of Identity-Defined Security Perimeters

An example of this is an iPhone.

  • First, a user may enroll that iPhone into an enterprise mobility management (EMM) solution that puts a certificate on the device so that the device is known and associated with the user.
  • Then, TouchID can be enabled on that device so the user does not have to type a password to use the device or apps on the device.
  • The device&#rsquo;s location can also be used to make sure that the person is where they should be. A user who works in Boston but appears to be logging in from China may not be the person that they claim to be.

A company should normally have an access policy that defines what data a person can see and use based upon these many factors, which starts with their identity. For example:

  • A pharmaceutical company may decide that research data should only be viewed while a scientist is on the actual research site or lab but allow the scientist to look at their email anywhere.
  • A company with a location in the EU (where General Data Protection Regulation, GDPR, is going into effect) may decide that much of their local data can only be accessed while in that country/region, and users outside that region shouldn&#rsquo;t be able to look at it.
  • A user who has proven their identity but is using an insecure device may not be allowed to access sensitive data at all.

At a pharmaceutical company, an identity-defined security perimeter means a scientist may be restricted to view research data only while in the lab but may be able to view email anywhere.

It becomes very easy to see how a company can define their perimeter for their information through identity. It becomes about what a person should accessandwhere and how they access that data. Additionally, IT is now able to classify data and specify what sorts of protection each class needs.

[Related: The Frontiers for EMM: Identity, Windows Apps & the Digital Workspace]

Identity & the Single User Experience

Once you have your security perimeter defined, you can begin to formulate your single experience strategy. It starts with designing for mobile first and what some people would say is mobile only.

The truth, though, is that mobile only doesn’t actually mean mobile only, it means focusing on the user experience and delivering that experience in focused chunks. We can see this in many of the apps developed for smartphones that delight users today. Instead of being monolithic, they allow a user to process data in bite-sized chunks and work on the immediate task. They no longer have to dig through menus to find the function that they need to get their work done.

The goal of a single experience strategy is to start with a workflow and build your apps around the data that the user needs. Instead of being an all-encompassing app, it becomes an all-encompassing workflow where the form follows the function. When an app is designed this way for a smartphone and then moved to a tablet, it can now use the larger screen and possible attached keyboard of the tablet to offer more functionality, but still stays focused. When that same app is moved to the laptop or PC, the focus stays with it, but the experience changes to accommodate the features of that PC.

This doesn&#rsquo;t require that you build the app for the smartphone first but that you build with the same strategic focus so you can provide that similar (not necessarily identical) experience to the user, and they become comfortable using the tool of their choice. All people bring their own biases into the choice of devices that they use, and the situations they are in will influence them, as well. It is easier to use a phone or tablet when moving around versus when standing still near a table or desk when a PC or laptop may be a better choice.

Paired with a mobile-first design strategy, identity-defined security enables a single, secure experience across users’ devices of choice.

Allowing users to take advantage of a single common experience using the device of their choice while ensuring that their data is secure is what you get when you combine identity with a mobile-first design strategy. This is the core of what VMware Workspace ONE is enabling.

Read more:

  • Is Your Business Mobility Strategy Based on a Single Device?
  • The Digital Workspace Journey: VMware Workspace ONE
  • Monumental AirWatch 9.0 & Workspace ONE Updates Bring the Digital Workspace to Life
Jan 182017
 

Par Magdeleine Bourgoin, Directrice Technique, VMware France

La technologie blockchain déferle sur le secteur bancaire. Entre initiatives éparses, fintechs ambitieuses et partenariats innovants, le secteur se passionne pour le sujet mais il est difficile de s&#rsquo;y retrouver.

« Blockchain. » Le mot est sur toutes les lèvres des spécialistes et décideurs de la finance, depuis plusieurs mois déjà. Certains frétillent, d&#rsquo;autres tremblent mais personne n&#rsquo;y est insensible. C&#rsquo;est que le potentiel disruptif de la technologie blockchain est immense. L&#rsquo;ensemble des métiers basés sur le recueil de transactions sera impacté, dans les années – sinon les mois – à venir.

Avec la blockchain, la robotisation des opérations connaît un coup d&#rsquo;accélérateur sans précédent. Les tâches manuelles d&#rsquo;enregistrement ou de validation des transactions sont désormais entièrement prises en charge dans cette base de données sécurisées et distribuées entre plusieurs utilisateurs. Le risque pour une banque de se voir court-circuiter par un nouvel acteur est donc réel. Mais dès lors, comment identifier les initiatives à suivre de près?

Vers des blockchains privées

Les banques devraient définitivement se tourner vers des blockchains à accès restreint où seuls des utilisateurs autorisés contribuent à sa construction. Comme pour le Cloud privé, ces blockchains «privées» permettent aux acteurs traditionnels de garder la main sur leurs activités, en toute sécurité. Il s&#rsquo;agit d&#rsquo;ailleurs d&#rsquo;un chantier important pour nos équipes recherche et développement (R&D) qui travaillent sur cette problématique depuis plusieurs mois déjà.

Le projet Hyperledger : à la recherche d&#rsquo;un standard sécurisé

Sous l&#rsquo;égide de la Linux Foundation et en partenariat avec J.P. Morgan, Accenture, Cisco, IBM et nous-mêmes, le projet Hyperledger poursuit un objectif ambitieux : établir des standards d&#rsquo;interactions entre les différentes blockchains – qui communiquent, pour le moment, difficilement. Cet « hyper-registre » permettra aux différentes banques de faire communiquer plus facilement, plus rapidement et de manière plus sécurisée leurs blockchains, qu&#rsquo;elles soient internes (dédiées aux transactions immobilières, aux compensations internationales, etc.) ou externes (d&#rsquo;un établissement financier à l&#rsquo;autre). De quoi rassurer une partie des sceptiques.

Les infrastructures informatiques : de l&#rsquo;urgence d&#rsquo;anticiper les transformations

Reste à adapter l&#rsquo;infrastructure informatique à cette transformation massive de la banque. Construire des blockchains privées demandera de nouvelles ressources IT importantes en interne pour supporter ces nouvelles opérations via, notamment, des logiciels en open source. Pour prendre ce virage dans les meilleures conditions, il est temps d&#rsquo;arrêter la boulimie de hardware et de s&#rsquo;orienter vers une logique «software-defined». En d&#rsquo;autres mots, les banques devront adopter le modèle des fintechs.

 

Crédit image – Fotolia / AA+W

Jan 182017
 

Guest post byHarvey Smith, Manager, UK & Ireland Strategic Partner Team at VMware

For many of VMware&#rsquo;s customers, digital transformation will remain one of their key priorities in 2017, and beyond. Whether that&#rsquo;s providing true mobile working to employees or delivering a Cross-Cloud Architecture that brings freedom and control to IT and competitive business advantages, the opportunities for our customers are endless. A key part of this is the VMware partner community, which is playing a vital role in making this a reality for our customers. As part of our ongoing series of partner blog posts, we spoke to Harvey Smith, Manager, UK & Ireland Strategic Partner Team at VMware about the opportunities offered by digital transformation in 2017.

&#lsquo;Digital business&#rsquo; is no longer a term that&#rsquo;s only relevant to a fraction of organizations. We are in a world where even the most traditional businesses are being disrupted by new entrants. For a number of our partners, this is old news. They&#rsquo;re already one step ahead of where their customers are in their digital transformation journey. But that means there are still customers and partners out there that are lagging when it comes to digital transformation.

The reality is that digital transformation tends to be driven by customers themselves in their search for innovation, productivity and improved competitiveness. That comes both from a decision maker level, but also from the users themselves. Businesses are realizing they must have a digital strategy.

Partners need to look at how they&#rsquo;re positioning themselves in relation to digital transformation. In the new world, if partners don’t transform they won’t be relevant to their customers, and ultimately won&#rsquo;t be able to take advantage of the growing digital transformation opportunities.

The changing nature of the IT, business and channel landscapes means that partners who purely resell product aren&#rsquo;t in a position where they’re providing enough value to differentiate themselves from their competitors and if they don&#rsquo;t change they won&#rsquo;t be around in years to come.

Successful partners are those looking at their business and transforming it from the traditional pure reseller model to becoming a partner that resells solutions, but coupled with consultancy and elements of service provision. For example, one of our partners is offering disaster recovery as-a-service using VMWare vCloud Air, and wrapping additional services and value around this to complete the solution and deliver to their customers. Another UK partner is offering a software asset management service for customers, and is using vCloud Air, for one of their multinational customers, to host the service in the US so that they are able to comply with local data protection laws.

However, adapting to this new business model is something that a lot of our partners are grappling with. Some are just embarking on their digital transformation journey, and others are much further along the road. But wherever they are on this journey, those that haven&#rsquo;t started the transformation process will struggle to survive.

The key thing for partners to realize is that success on this journey comes from focus. Unless you&#rsquo;re a very big organization, you can&#rsquo;t be all things to all people. You need to look at your expertise and experience and use this to inform which vendors and solutions will build your offering. Being focused means you can then much more easily communicate your value proposition to your customers and articulate the business value you can deliver. At the same time, you need to think how all the different solutions that you offer tie together, and what else you could offer to deliver a wider solution. For example, if you&#rsquo;ve specialized in delivering End User Compute solutions, then it isn&#rsquo;t a big step to offer Mobility solutions, but for your customers this could be a complete game-changer.

At VMware we want all of our partners firmly on the road to digital transformation, both for them and their customers. With our Opportunity Registration program Advantage+ we&#rsquo;re rewarding partners for delivering software-defined solutions, such as NSX, that are central to their customers&#rsquo; digital transformation strategies. What&#rsquo;s more, we&#rsquo;re working with our Premier partners to help them build business plans for their digital transformation approach. This covers a range of things, from marketing to pre-sales enablement and messaging. We&#rsquo;re delivering next generation partnering to help those partners that want to offer our next generation, software-defined solutions.

If there&#rsquo;s one thing we want partners to realise, it is that what we did with server virtualization – allowing them to reduce cost and complexity, whilst increasing agility and flexibility – we are now doing with the public cloud – giving our customers the choice of where to place the workloads, and allowing them to easily move it according to their requirements. Our software-defined architecture is a central part of this, and means our customers can work seamlessly between on-premise and off-premise giving them the flexibility they need without compromising security, allowing them to more easily respond to changing business needs and provide innovation. What our partners need to do is ensure they understand this new approach, more importantly, the benefits it offers them and their customers.

Take a look at some of our previous partner blog posts [here]. If you&#rsquo;re interested in finding out about the VMware Solution Provider Program, visit the site for more information.

Jan 182017
 

The third and final installment in our 2017 Predictions blog series continues to tackle the cybersecurity issues facing the modern enterprise. As businesses accelerate along their digital transformation journey, new approaches to cybersecurity will become essential. Tom Corn, Senior VP of Security Products at VMware, outlines five key predictions for 2017 that will change the way enterprises look at and implement cybersecurity in the coming year.

More so than ever before, security is top of mind for organizations. In 2016 we witnessed multiple large-scale cyberattacks across industries, to the point that it seemed like rarely a day went by when the news wasn&#rsquo;t plastered with revelations of a massive data breach or some other online threat. As data center infrastructure increasingly moves to the cloud, new approaches to security are needed.

Let&#rsquo;s take a step back to reflect on where we&#rsquo;ve been – and where we&#rsquo;re going – in terms of security.

Below I&#rsquo;ve outlined five things we should expect to see this year:

1. Application is king

Security teams have traditionally concerned themselves with protecting data center infrastructure, and they&#rsquo;ve worked most closely with infrastructure teams to deploy, align, and manage security controls. That approach needs to change in the hybrid cloud era. Ultimately, the applications and data are what we are trying to protect. In 2017, we expect the application will become the new unit of focus for security teams, who will align themselves more closely with application teams to deploy their controls. Containers and DevOps will further fuel this model.

These new approaches to application development will result in application teams being more declarative of the components that make up their applications, which will aid security teams in aligning their controls around applications and data. We&#rsquo;ve already begun to see evidence of this trend with the growing popularity of network micro-segmentation, a process by which a critical application or compliance scope is compartmentalized in a segment and endpoint and network controls are aligned to that boundary. We predict that adoption of this and other application-centric security ideas will only accelerate in the coming year.

2. Using the cloud to secure, versus securing the cloud

To date, the security discussion around the cloud – both public and private – has centered around how to secure it. And while concerns and challenges remain, in 2017 we believe security teams will increasingly look to the cloud to capitalize on security approaches that have not been possible in the world of traditional data centers. As part of that movement, we will see a growing number of technologies and techniques to leverage the cloud to secure applications and data – including controls and policies that follow the workload, the use of dynamics to limit persistence, automation of security incident response, micro-segmentation, greater visibility and control, and so on. As the cloud shifts away from its &#rsquo;just trust us&#rdquo; roots toward more customer visibility, more inter-customer isolation and 3rd party attestation (less faith based trust), the cloud will become more secure and digestible for broader ranges of applications and services.

3. Simplicity and automation become the new dimension of innovation in security

Security has become astronomically complex, and the limiting factor for most security organizations is the lack of qualified human capital available to run it. Both the scarcity of talent and the difficulty of funding additional headcount (which is often even more challenging than funding capital expenditures) have hampered organizations&#rsquo; ability to adopt powerful new security technologies. We see a tipping point ahead. The talent shortage will drive a new wave of security technologies designed to both simplify and automate the process of securing critical infrastructure and applications, both on-premises and in the cloud. Already there are a host of companies working toward automating incident response. The desperate need to stay ahead of an ever-worsening threat landscape will continue to spur innovation in other areas along this same dimension – including threat detection and predictive analytics – where elbow-grease alone can no longer do the job.

4. More sophisticated attacks from less sophisticated attackers

Just as defending data is becoming an increasingly complex job, so too are the attacks themselves. Increasingly sophisticated attack techniques deployed by nation-states and organized crime require very specialized skill sets. But the trend towards automation we mentioned earlier is a double-edged sword. The weaponization of cyberspace has driven a wave of new, more automated tools for creating and managing sophisticated attacks. Prominent examples of these kinds of attack / malware tools including Zeus (for building Trojans) and BlackPoS (which was used to attack point-of-sale terminals in several prominent retail breaches). The rise of this kind of advanced yet easy-to-use malware means we will begin to see significant attacks from a much broader range of attackers. We already see an expansion of the advanced attacker population and motivation to include things like political activism/dissent. The trends we mentioned earlier will certainly help mitigate these new threats in the long run, but things will get worse before they get better.

5. Mobile security and identity controls collide

So far, mobile security and identity and access management (IAM) have largely remained two separate markets – but we see them on a collision course. Mobile devices are already a critical component of the knowledge worker&#rsquo;s toolkit. They are being used as communication devices, data storehouses and application portals, and increasingly they are being used as a credential and authentication mechanism. As a result of this move to mobile, identity is rapidly moving to a risk-based behavioral model, where the IAM solution factors in the risk of the endpoint device, the criticality of the application and data being accessed and the level of confidence that the user really is who they say they are. The motivation for “risk-based” controls has been that authentication and isolation have not been enough to support trustworthy identity. Evidence of behavioral consistency helps address the risk that authenticated, isolated and trusted services have been taken over by exploiting imperfections in their implementation or infrastructure. We&#rsquo;ve already begun to see some unified security solutions that blend these two components, and we expect this trend to accelerate in the coming year.

Missed our other predictions for 2017? Discover the changes our experts anticipate for hyperconverged infrastructure and cloud-native applications next year – and don&#rsquo;t forget to follow @VMware_UK to stay up to date with the latest news, announcements and industry insights.

Jan 182017
 

I am happy to announce that after a very long review and publication cycle the &#rsquo;Architecture Guidelines and Best Practices for Deployments of SAP HANA on VMware vSphere Guide&#rdquo; is now published.

The guide can be downloaded from our central VMware SAP page.

Direct link to the document: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/sap_hana_on_vmware_vsphere_best_practices_guide-white-paper.pdf

The chapter on sizing tackles the complex subject getting HANA VM&#rsquo;s sized properly, and provides incredible value to the reader as it provides guidance that explains how to size beyond physical to virtual so your organization can get it right the first time, every time.

Building a virtual SAP HANA VM requires to know not only the needed RAM, but also the number of needed CPUs to support this RAM. Without this information, it is not possible to create a VM.

The sizing guidelines published in this guide follow the SAP currently requested CPU socket / CPU core to RAM ratios or, when available describe how to perform a SAPS sizing. Using these guideless will provide you with SAP supported VM configurations.

I will provide some additional sizing examples that focus on SAPS and vCPU sizing, in addition to the already provided &#rsquo;NUMA&#rdquo; node based sizing example. Please remember, primary sizing figure for SAP HANA is memory and CPU is second and a SAP HANA configuration is optimized to optimal memory performance with lowest latency.

The post New Architecture Guidelines and Best Practices for Deployments of SAP HANA on VMware vSphere Guide, now available! appeared first on Virtualize Business Critical Applications.

Jan 182017
 

By: Brock Peterson

Blue Medora provides hundreds of dashboards out of the box, but there are still times custom dashboards are required. A client recently contacted me wanting to create an executive level dashboard showing his MSSQL environment health. His requirements were to provide very high level health metrics which executives could use. He also wanted them to only have access to that specific dashboard.

Let&#rsquo;s start with the dashboards. Once logged into vRealize Operations (vROps), go to the Actions dropdown in the toolbar and click Create Dashboard as shown below in Figure 1.

Figure 1

You will then be asked to give your new dashboard a Name and Description as shown here in Figure 2.

Figure 2

Next choose the appropriate widgets from the Widget List tab and size them accordingly in the right hand pane as shown here in Figure 3.

Figure 3

I&#rsquo;ve chosen the high level Heatmap widget and the Health Chart widget. Now configure each widget to publish the required metrics. Do this by clicking the pencil icon in the upper right hand corner of each widget. Let&#rsquo;s configure the Heatmap widget first as shown here in Figure 4.

Figure 4

I&#rsquo;ve configured this widget to be called Executive MSSQL Heatmap, it will refresh content every five minutes, it will be grouped by MSSQL Server, and colored by MSSQL Badge|Health State, which is the general MSSQL health itself. Let&#rsquo;s now move onto the Health Chart widget as shown here in Figure 5.

Figure 5

I&#rsquo;ve configured this widget to be called Executive MSSQL Health Chart, it will be refreshed every five minutes, ordered by value, and show the last 30 days of data. Next configure the Dashboard Navigation flow as shown here in Figure 6.

Figure 6

I then clicked Apply Navigations and Save. This last widget tab allows you to send the user to a configured destination when drilling down into your custom dashboard. The final product looks like this.

Figure 7

Now, let&#rsquo;s limit the permissions the executives have to only view this new custom dashboard. We will create a vROps Role, assign a vROps Group to that Role, then assign vROps Users (the executives) to that Group. Once logged into vROps go into Administration – Access Control and click the Roles tab in the right hand pane as shown here in Figure 8.

Figure 8

Click the green plus button to add a new Role. Once created, adjust the permissions of the Role by clicking the pencil icon in the lower right pane of the Permissions window as shown here in Figure 9.

Figure 9

Select the following Permissions: Administration – Login Interactively, Content – Views Management – Render, and Environment – View Dashboard Home Page. This will allow the users to log into vROps, the widget will render properly, and they will have access to the Dashboard Home Page only.

Next, create and assign a User Group to this Role. From the same window, select the User Groups tab on the toolbar and create your User Group as shown here in Figure 10.

Figure 10

Click the green plus icon and create a User Group as shown here in Figure 11.

Figure 11

Click Next and select the Users to put into the new group as shown here in Figure 12.

Figure 12

Next click the Objects tab to select the proper Objects. In our case it will be the MSSQL objects as shown here in Figure 13. Once complete click Finish.

Figure 13

The final step is to share the custom dashboard previously created. From the vROps home page go to Content – Dashboards and click on the Gears icon in the toolbar at the top as shown here in Figure 14.

Figure 14

Click the Share Dashboards option which will present the following screen.

Figure 15

Now simply drag and drop the custom dashboard from the right hand pane into the necessary group in the left hand pane. Click Save and you are done!

The post Custom vRealize Operations Dashboards with Private Access Lists appeared first on VMware Cloud Management.

Jan 182017
 

By: Brock Peterson

Blue Medora provides hundreds of dashboards out of the box, but there are still times custom dashboards are required. A client recently contacted me wanting to create an executive level dashboard showing his MSSQL environment health. His requirements were to provide very high level health metrics which executives could use. He also wanted them to only have access to that specific dashboard.

Let&#rsquo;s start with the dashboards. Once logged into vRealize Operations (vROps), go to the Actions dropdown in the toolbar and click Create Dashboard as shown below in Figure 1.

Figure 1

You will then be asked to give your new dashboard a Name and Description as shown here in Figure 2.

Figure 2

Next choose the appropriate widgets from the Widget List tab and size them accordingly in the right hand pane as shown here in Figure 3.

Figure 3

I&#rsquo;ve chosen the high level Heatmap widget and the Health Chart widget. Now configure each widget to publish the required metrics. Do this by clicking the pencil icon in the upper right hand corner of each widget. Let&#rsquo;s configure the Heatmap widget first as shown here in Figure 4.

Figure 4

I&#rsquo;ve configured this widget to be called Executive MSSQL Heatmap, it will refresh content every five minutes, it will be grouped by MSSQL Server, and colored by MSSQL Badge|Health State, which is the general MSSQL health itself. Let&#rsquo;s now move onto the Health Chart widget as shown here in Figure 5.

Figure 5

I&#rsquo;ve configured this widget to be called Executive MSSQL Health Chart, it will be refreshed every five minutes, ordered by value, and show the last 30 days of data. Next configure the Dashboard Navigation flow as shown here in Figure 6.

Figure 6

I then clicked Apply Navigations and Save. This last widget tab allows you to send the user to a configured destination when drilling down into your custom dashboard. The final product looks like this.

Figure 7

Now, let&#rsquo;s limit the permissions the executives have to only view this new custom dashboard. We will create a vROps Role, assign a vROps Group to that Role, then assign vROps Users (the executives) to that Group. Once logged into vROps go into Administration – Access Control and click the Roles tab in the right hand pane as shown here in Figure 8.

Figure 8

Click the green plus button to add a new Role. Once created, adjust the permissions of the Role by clicking the pencil icon in the lower right pane of the Permissions window as shown here in Figure 9.

Figure 9

Select the following Permissions: Administration – Login Interactively, Content – Views Management – Render, and Environment – View Dashboard Home Page. This will allow the users to log into vROps, the widget will render properly, and they will have access to the Dashboard Home Page only.

Next, create and assign a User Group to this Role. From the same window, select the User Groups tab on the toolbar and create your User Group as shown here in Figure 10.

Figure 10

Click the green plus icon and create a User Group as shown here in Figure 11.

Figure 11

Click Next and select the Users to put into the new group as shown here in Figure 12.

Figure 12

Next click the Objects tab to select the proper Objects. In our case it will be the MSSQL objects as shown here in Figure 13. Once complete click Finish.

Figure 13

The final step is to share the custom dashboard previously created. From the vROps home page go to Content – Dashboards and click on the Gears icon in the toolbar at the top as shown here in Figure 14.

Figure 14

Click the Share Dashboards option which will present the following screen.

Figure 15

Now simply drag and drop the custom dashboard from the right hand pane into the necessary group in the left hand pane. Click Save and you are done!

The post Custom vRealize Operations Dashboards with Private Access Lists appeared first on VMware Cloud Management.

Jan 182017
 

4回目:レポートの活用方法

– Back Number –
#1…最新のV4Hが使いやすくなっている!
#2…ビューの活用方法①
#3…ビューの活用方法②
#4…レポートの活用方法
#5…vRealize Log Insightとの連携

こんにちは、ソフトバンク コマース&サービスの中川明美です。
今回はレポートの活用方法をご紹介します。レポートを活用するためには、カスタマイズが必要です!!

◆よくあるご質問◆

「レポートの出力期間を変更したい」と質問を受けることがあります。その場合はレポートの元となる「ビュー」の日付範囲を変更します。
レポートは、1つ以上の「ビュー」または「ダッシュボード」、もしくは両方から構成されます。データの表示は「ビュー」または「ダッシュボード」を使用し、レイアウト(配置)や出力形式(PDF/CSV)をレポートの作成ウィザードで指定します。

◆カスタムレポートの作成①◆

既存レポートの出力期間(過去の期間)をデフォルトの30日から特定の2ヶ月間に変更します。
<データタイプの確認>
ここでは、「ホストのCPUデマンドおよび使用量(%)トレンドビューレポート」をカスタムの対象にします。どのビューを元にレポートが構成されているかを確認します。レポートを選択し、「テンプレートの編集」アイコンをクリックします。

「2.ビューとダッシュボード」の「データタイプ」が表示されます。このレポートは、「ホストのCPUデマンドおよび使用量(%)トレンドビュー」というビューで構成されていることがわかります。

<ビュー/レポートの編集>
レポートのデータ表示期間を変更するには、レポートのデータタイプで指定されたビューの日付範囲を変更します。その後、変更したビューに差し替えます。この場合、ビューもレポートもコピーを作成し、変更することをお勧めします。

■ビューの編集

■レポートの編集

◆レポートの出力◆
レポートのテンプレートを実行し、レポートを出力(ダウンロード)します。


下図は、日付範囲を変更したレポートをPDFで出力した結果です。「特定の日付範囲」で指定した8月~9月の過去データが表示されています。



◆カスタムレポートの作成②◆
新規レポートを作成します。前回のBlogで作成したカスタムビューを元にレポートを作成します。
下図は、前回のBlogで作成したカスタムビューです。


<レポートの新規作成>

◆まとめ
2つのカスタムレポートの作成方法をご紹介しました。ぜひ活用してみてください!
全体を通したお話となりますが、vROpsに慣れるまでは標準の機能(ダッシュボード/ビュー/レポート)を使用してみてください。vROpsを知る段階で、カスタム機能までを習得しようとすると、「やることがいっぱい」「カスタム機能は難しい」と思ってしまうようです。
まずは、「vROpsで何ができるの?」を知ることから始めてください。その後、カスタム機能を習得するのが理想的です。カスタム機能については、ぜひこちらのBlogをご活用いただけたらと思います。

次回は、vRealize Log Insightとの連携をご紹介します。

ソフトバンクC&SのサイトでvROpsを使用した仮想化健康診断の事例を紹介しています。ここでは、「vSphere環境を運用管理している方 が何に困っているのか」「その困ったことにパートナーのみなさまがどのようにアプローチされているのか」を載せています。
インタビュー形式で構成しています。ぜひお仕事に役立つ情報を手に入れてください!

The post VMware vRealize Operations Manager (vROps) をパワーアップしよう! パート2 appeared first on Japan Cloud Infrastructure Blog.

Jan 172017
 

In case you missed my last post, I covered one of the coolest features in the vRealize Operations version 6.4 — predictive distributed resource scheduler. In this post, I’m going to cover another one of the very coolest features of vROps 6.4 and that is the new dedicated VMware Virtual SAN (VSAN) management pack. Now you may say that vROps could already manage VSAN prior to vROps 6.4 and you’re right, however that was with the vRealize Operations Management pack for storage devices. The storage devices management pack is for managing all types of storage devices with vROps and, thus, isn’t dedicated to just VSAN. The newly released VSAN management pack for vRealize Operations 6.4 is dedicated just to managing VSAN and, as such, it offers a lot of cool functionality. To learn how to download it, how to install it, and what it offers you, read on !

What You Need to Know About the New VSAN Management Pack

Hold on for a second there! If you are like me when you see some new just released application you quickly scroll to the download button (or google the app), download it, and install it before you ever finish the article. Before you do that (if you haven’t already and had trouble) you should know that there are a couple ofrequirements that you must meet in order to use the new vROps 6.4 VSAN management pack. They are:

  • Must be using VMware VSAN version 6.2 or 6.5 (or later)
  • AND vRealize Operations Manager version 6.4 (or later)

So make sure that before you download the new VSAN management pack and deploy it that your version of VSAN and vRealize Operations are up to those minimums. Besides just allowing you to run the new VSAN management pack, the new vRealize Operations 6.4offers so many great new features, I recommend deploying that asap(for more info on what’s new in vROps 6.4 checkout this YouTube video from Sunny Dua and Simon Eady, both vROps experts from VMware).According to Duncan Epping of VMware who wrote about the new VSAN Management here, one of the benefits of having a dedicated management pack over the shared storage devices management pack is that the VSAN team will have greater flexibility and ability to release new features, faster.

Once you have met the pre-reqs, you can download the new VSAN management pack for vRealize Operation 6.4 from the VMware Solutions Exchange (VSX).

Among the numerous new very cool VSAN dashboards, the new VSAN management pack will also…

  • Discover VSAN disk groups in a VSAN datastore
  • Identify the VSAN-enabled cluster compute resource, host system, and datastore objects in a vCenter Server system
  • Leverage vRealize Operations 6.4 features like KPI Metric groups and Alert groups

I was excited by what the new VSAN management pack could offer so I took it for a spin!

Downloading and Deploying the VSAN Management Pack for vROps 6.4

Once you’ve met the the prerequisites mentioned above, you’re going to want to go to the VMware Solutions Exchange (VSX) and download the new the VSANmanagement pack for a vROps 6.4. Next, go intovROpsSolution configuration and click “+” to add a new solution. Select the PAK file that you downloaded from VSX for the VSAN management pack and clickUpload.

Once uploaded, click Next. Check the box to accept the end-user license agreement and click Next. When thatdeployment is complete, you’ll see the installation details and, assuming everything went well, click Finish.

Once installed, you’ll see that the VSAN management pack solution will be in a state of collecting data then receiving data.

After a bit of collecting has passed, you’ll see all the cool new dashboards populate, which is what we should talk about next!

How the New VSAN Management Pack for vROps 6.4 Helps You

Since I’m just getting started with the new VSANand management pack, I’m sure there’s much more that it offers then what I’ll be able to show you in this post. From what I have experience, the greatest benefits of the new management pack are the numerous new dashboards and the tons of information that they provide. For example, the optimize VSAN deployments dashboard, shown below, shows you the top VSAN datastores with available capacity, the latency across all your district that make up the VSAN datastore, the virtual machines that are running in the VSAN datastores as well as their IOPS and latency trends.

Moving onto the VSANPerformance dashboard, it’s here that you’ll find all your VSANclusters, across every data center, being managed by vROps. I really like the heat maps that very quickly show you based on color coding, how the virtual machines are performing in every VSAN

If we scroll on down the VSAN Performance dashboard, you’ll see that you can very quickly tell if the writebuffer and read cacheit each of the same cluster is properly tuned by looking at the writebuffer andread cacheperformance charts. Additionally, you’re very easily be able to tell if your vSphere hosts have the CPU and memory resources that they need to adequately provide the IOPS needed to run the virtual machines and serve up VSAN disk requests.

Moving onto the VSAN environment overview tab, it’s here that you could very quickly tell what’s going on across your VSAN clusters, whether they’re sitting next to you and your own data center or distributed around the world.

Besides all the new VSAN dashboard tabs, you’ll noticeother new benefits of the VSAN management pack when you look at things like vROps Views, shown in the graphic below.

Finally, with the new VSAN management pack you can:

  • Monitor & proactively alert on vSAN problems, not metrics, via Alert Groups- for health, capacity, config (based on the VSAN health checks)
  • Identify VSAN clusters running out of capacity now or soon
  • Compare Non-vSAN and VSAN clusters to deploy or balance workloads to & optimize for performance & utilization

David’s Take…

I’m impressed with what VMware has done to marry vRealize Operations and VMware VSAN. If you haven’t already, make sure that you upgrade to (if you are already using a previous version ofvRealize Operations) or evaluate vRealize Operations 6.4. From there, if you aren’t already using VSAN, VSAN iseasy to evaluate or if you are using the VSAN, make sure that you’ve upgraded to the latest version. With these two pieces in place the next thing you want to do is to try out the new (and free, mind you) VSAN Management Pack for vRealize Operations from the VMware Solutions Exchange –Download it here!

PS – something else I just learned about from Sunny Dua during the research for this post is the new SDDC Health Solution for VSAN Monitoring. Once you are done with the above, you might want to check that out

The post David Davis on vRealize Operations – Post #35 – NEW! VMware VSAN Dedicated Management Pack in vROps 6.4 appeared first on VMware Cloud Management.

Jan 172017
 

Hey everyone =)

Did you know that today&#rsquo;s Internet is more than just web pages? Shocker, right?

Well… did you know that VMware Fusion and VMware Workstation can help protect you when browsing the wide-open Internet?

How so, you might ask?

When you surf online you are being tracked in a number of ways.Tracking &#rsquo;Cookies&#rdquo;, IP Addresses, Geo Location and Language,Browsing History,Invisible tracking pixels/images and more. All working in concert to build a profile of you and your online habits.

In addition to just standard browsing being tracked, there&#rsquo;s also &#lsquo;the bad guys&#rsquo; out there:

  • Click Jacking
  • Compromised Ad Networks(“Malvertising”)
  • Malware

UsingVMware Fusion(or VMware Workstation) on your desktop to run a different operating system and web browser in a virtual sandbox keeps your main operating system safe, anonymous and protectedfrom online threats.

Check out theInfographic here!

The post Using Fusion to securely browse the Internet appeared first on VMware Fusion Blog.

Jan 172017
 

This is the second post in the series about building a three-tier application for demonstration, lab, and education purposes. At this point, you have downloaded Photon OS and prepared the base template according to the specifications. If not, please go to the first post in the series to prepare your environment.

I am tryingto release these posts on Wednesdays, but yesterday was a holiday in the US, so I had some time to get this one out the door early.

For the build, I will work bottom-up so it is possible totest the components as we go along andaddress any issues before we get to the end and have to worry aboutthe whole stack.

The Database (db-01a)

There are many choices that could have been made here, but I wanted to minimize the steps required and use the tools I had available by default, wherever possible. So, the database server for this application uses a SQLite database. This may seem like an odd choice since ithas no native remote access. But, the sqlite3is already present on thePhoton image.So is Python. Don’t expect elegance here since I do not normally use Python.I hacked together a simple CGI scriptto query the database and send the results over HTTP. It is not fancy, but it is small and does just enough for my needs.

Fear not! SQLite is simple enough that you don’t need any kind of DBA skills to use it. The minimal SQL that I know was enough to get this done.

The red box in the following diagram highlightsthe component that we are building in this post.

Let’s get started!

Deploy a copy of the base template

Deploy a copy of the base Photon template you created by following the steps in myfirst post. Name it something that makes sense to you. I called mine db-01a.

Power it up and log in as the root user.

Set theIP address

You need to configure the IP address for this machine. Here are the contents of my/etc/systemd/network/10-static-eth0.network file.

[Match]Name=eth0[Network]Address=192.168.120.10/24Gateway=192.168.120.1DNS=192.168.110.10Domains=corp.local

Set the name

Update the name in the/etc/hostsand/etc/hostname files with the proper name for this VM. Replace every occurrence of the name you used in the template with the name of this VM. Note that the hostname withinthe prompt string will change whenyou log out.

Restart the network to apply the settings

# systemctl restart systemd-networkd

Once you have finished with these steps, make sure you can access the network before moving on. You need Internet access in order to proceed.

SSH in

At this point, I strongly suggest you SSH tothe machine so that you can paste text. Doing all of the work from the console is possible, but pasting is easier. So, fire up puTTY or whatever else you use as your preferred SSH client.

Install the web server

I am using Apache here since I can get the base install to do what I need in pretty short order. Unfortunately, it is not already present, so we need to install it. Fortunately, it only takes a few minutes:

# tdnf install httpd

Make a directory to store the database file and make apache the owner

So you don’t absolutely needto do this, but I sometimes like to separate my data from the executables.

# mkdir /etc/httpd/db# chown apache:apache /etc/httpd/db

Start the web server and set it to startup when the VM boots

# systemctl start httpd# systemctl enable httpd

Create the database’s front-end CGI script

There is not much to this one. It performs a simple query of the database and dumps the result. You can type in the code, but if you have connected via SSH, you canpaste it in. I recommend the latter. Keep in mind that Python uses whitespace to give the program structure, so indenting is important. More precisely,the exact amount of indentation does not matter, but the relative indentation of nested blocks to one another matters a lot. If that sounds confusing, just make sure the spacing looks like mine.

This script takes an optional parameter named queryval that allows the data to be filtered on the name property of the records. It is a step above the “dump everything” approach we used in previous versions and provides the possibility for some user interaction.

Open anew file,/etc/httpd/cgi-bin/data.py

#!/usr/bin/env pythonimport cgiimport sqlite3conn=sqlite3.connect('/etc/httpd/db/clients.db')curs=conn.cursor()print "Content-type:text/plain\n\n";form = cgi.FieldStorage()querystring = form.getvalue("querystring")if querystring != None:   queryval = "%" + querystring + "%"   select = "SELECT * FROM clients WHERE name LIKE '" + queryval + "'"else:   select = "SELECT * FROM clients"for row in curs.execute(select):   if len(row) == 4:      for item in row:        print item,'|'      print "#"conn.close()

Save and close the file, then mark it executable

# chmod 755 /etc/httpd/cgi-bin/data.py

Create the database file and load it with data

SQLite will create the file if it is not already present. Bonus!

# sqlite3 /etc/httpd/db/clients.db

At the sqlite> prompt, create the table:

CREATE TABLE 'clients' ( "Rank" integer, "Name" varchar(30), "Universe" varchar(25), "Revenue" varchar(20) );

Then, load in some data. Feel free to use whatever you like:

INSERT INTO 'clients' VALUES (1,'CHOAM','Dune','$1.7 trillion'), (2,'Acme Corp.','Looney Tunes','$348.7 billion'), (3,'Sirius Cybernetics Corp.',"Hitchhiker's Guide",'$327.2 billion'), (4,'Buy n Large','Wall-E','$291.8 billion'), (5,'Aperture Science, Inc.','Valve','$163.4 billion'), (6,'SPECTRE','007','$157.1 billion'), (7,'Very Big Corp. of America','Monty Python','$146.6 billion'), (8,'Frobozz Magic Co.','Zork','$112.9 billion'), (9,'Warbucks Industries',"Lil' Orphan Annie",'$61.5 billion'), (10,'Tyrell Corp.','Bladerunner','$59.4 billion'), (11,'Wayne Enterprises','Batman','$31.3 billion'), (12,'Virtucon','Austin Powers','$24.9 billion'), (13,'Globex','The Simpsons','$23.7 billion'), (14,'Umbrella Corp.','Resident Evil','$22.6 billion'), (15,'Wonka Industries','Charlie and the Chocolate Factory','$21.0 billion'), (16,'Stark Industries','Iron Man','$20.3 billion'), (17,'Clampett Oil','Beverly Hillbillies','$18.1 billion'), (18,'Oceanic Airlines','Lost','$7.8 billion'), (19,'Brawndo','Idiocracy','$5.8 billion'), (20,'Cyberdyne Systems Corp.','Terminator','$5.5 billion'), (21,'Paper Street Soap Company','Fight Club','$5.0 billion'), (22,'Gringotts','Harry Potter','$4.4 billion'), (23,'Oscorp','Spider-Man','$3.1 billion'), (24,'Nakatomi Trading Corp.','Die-Hard','$2.5 billion'), (25,'Los Pollos Hermanos','Breaking Bad','$1.3 billion');

Once you are happy with the data you have entered — ensure that you finish with a semi-colon and a newline— press Control-D to close the sqlite session.

Set the database file’s owner

The apache user running the web server needs access to this file in order for the CGI script to read the data.

# chown apache:apache /etc/httpd/db/clients.db

Enable CGI on the webserver

The default Apache install on Photon does not have the CGI module loadedby default. It is simple enough to turn it on:

Open the web server’s configuration file. The +176before the file name opens the file at line 176, which is where we want to start:

# vi +176 /etc/httpd/httpd.conf

At line 176, add the following line to load the CGI module:

LoadModule cgi_module /usr/lib/httpd/modules/mod_cgi.so

Atline 379, add the following to enableaccess to the database directory. It goes right before a line that starts with<IfModule mime_module>

#database directory<Directory "/etc/httpd/db">    AllowOverride None    Options None    Require all granted</Directory>

Save and close the file.

Restart the web server to read the updated configuration

# systemctl restart httpd

Verify

Now, if you access the script via http, you should see the data.

# curl http://db-01a/cgi-bin/data.py

It won’t look too pretty, but the user never sees this back end data. That’s where the application server comes in. At this point, the resultshould look something like this:

root@db-01a [ ~ ]# curl http://db-01a/cgi-bin/data.py1 |CHOAM |Dune |$1.7 trillion |#... (truncated) ...#24 |Nakatomi Trading Corp. |Die-Hard |$2.5 billion |#25 |Los Pollos Hermanos |Breaking Bad |$1.3 billion |#root@db-01a [ ~ ]#

The next piece of the puzzle is the application server, which consumes the data provided by this component. If you had no problems with this setup, the rest should be a breeze. This is the most complicated part of the whole thing.

Thank you for reading!

The post HOL Three-Tier Application, Part 2 – DB server appeared first on VMware Hands-On Lab (HOL) Blog.

Jan 172017
 

For many of VMware&#rsquo;s customers, digital transformation will remain one of their key priorities in 2017, and beyond. Whether that&#rsquo;s providing true mobile working to employees or delivering a Cross-Cloud Architecture that brings freedom and control to IT and competitive business advantages, the opportunities for our customers are endless. A key part of this is the VMware partner community, which is playing a vital role in making this a reality for our customers. As part of our ongoing series of partner blog posts, we spoke to Harvey Smith, Manager, UK & Ireland Strategic Partner Team at VMware about the opportunities offered by digital transformation in 2017.

&#lsquo;Digital business&#rsquo; is no longer a term that&#rsquo;s only relevant to a fraction of organisations. We are in a world where even the most traditional businesses are being disrupted by new entrants. For a number of our partners, this is old news. They&#rsquo;re already one step ahead of where their customers are in their digital transformation journey. But that means there are still customers and partners out there that are lagging when it comes to digital transformation.

The reality is that digital transformation tends to be driven by customers themselves in their search for innovation, productivity and improved competitiveness. That comes both from a decision maker level, but also from the users themselves. Businesses are realising they must have a digital strategy.

Partners need to look at how they&#rsquo;re positioning themselves in relation to digital transformation. In the new world, if partners don’t transform they won’t be relevant to their customers, and ultimately won&#rsquo;t be able to take advantage of the growing digital transformation opportunities.

The changing nature of the IT, business and channel landscapes means that partners who purely resell product aren&#rsquo;t in a position where they’re providing enough value to differentiate themselves from their competitors and if they don&#rsquo;t change they won&#rsquo;t be around in years to come.

Successful partners are those looking at their business and transforming it from the traditional pure reseller model to becoming a partner that resells solutions, but coupled with consultancy and elements of service provision. For example, one of our partners is offering disaster recovery as-a-service using VMWare vCloud Air, and wrapping additional services and value around this to complete the solution and deliver to their customers. Another UK partner is offering a software asset management service for customers, and is using vCloud Air, for one of their multinational customers, to host the service in the US so that they are able to comply with local data protection laws.

However, adapting to this new business model is something that a lot of our partners are grappling with. Some are just embarking on their digital transformation journey, and others are much further along the road. But wherever they are on this journey, those that haven&#rsquo;t started the transformation process will struggle to survive.

The key thing for partners to realise is that success on this journey comes from focus. Unless you&#rsquo;re a very big organisation, you can&#rsquo;t be all things to all people. You need to look at your expertise and experience and use this to inform which vendors and solutions will build your offering. Being focused means you can then much more easily communicate your value proposition to your customers and articulate the business value you can deliver. At the same time, you need to think how all the different solutions that you offer tie together, and what else you could offer to deliver a wider solution. For example, if you&#rsquo;ve specialised in delivering End User Compute solutions, then it isn&#rsquo;t a big step to offer Mobility solutions, but for your customers this could be a complete game-changer.

At VMware we want all of our partners firmly on the road to digital transformation, both for them and their customers. With our Opportunity Registration program Advantage+ we&#rsquo;re rewarding partners for delivering software-defined solutions, such as NSX, that are central to their customers&#rsquo; digital transformation strategies. What&#rsquo;s more, we&#rsquo;re working with our Premier partners to help them build business plans for their digital transformation approach. This covers a range of things, from marketing to pre-sales enablement and messaging. We&#rsquo;re delivering next generation partnering to help those partners that want to offer our next generation, software-defined solutions.

If there&#rsquo;s one thing we want partners to realise, it is that what we did with server virtualization – allowing them to reduce cost and complexity, whilst increasing agility and flexibility – we are now doing with the public cloud – giving our customers the choice of where to place the workloads, and allowing them to easily move it according to their requirements. Our software-defined architecture is a central part of this, and means our customers can work seamlessly between on-premise and off-premise giving them the flexibility they need without compromising security, allowing them to more easily respond to changing business needs and provide innovation. What our partners need to do is ensure they understand this new approach, more importantly, the benefits it offers them and their customers.

Take a look at some of our previous partner blog posts here. If you&#rsquo;re interested in finding out about the VMware Solution Provider Program, visit the site for more information.