Tag Archives: vmware

VMworld Europe 2019-Day 2 Keynote highlights

The Wednesday General Session at VMworld Europe is usually where VMware puts the meat onto the bones of the Tuesday announcements and this year was no exception. Here’s a quick rundown of my highlights.

imageExecutive VP Ray O’Farrell kicked off proceedings with a video of a near-future environment where a person is making use of futuristic apps, devices, and transport- a storyline which was then tied in to the new VMware announcements. Following on from the success of Elastic Sky Pizza in 2017, attendees were introduced to the latest (ficticious) company- Tanzu Tees – who must be opening a European branch following their success at VMworld US in August.

The Keynote was divided into four sections to follow this theme- “Build and Run”, “Connect and Protect”, “Manage” and “Experience”. This split the hour into 10-15 minute sections and showed the breadth of todays’ VMware profile.

Less than 7 minutes into the show and we’re already diving into product demos, with Joe Baguely brought in to show an application being built with Spring Initializr to build out a framework for developers, deploying this to a Bitnami catalogue with Project Galleon and make it available in VMware Cloud Marketplace.

The second demo showed off the new Tanzu Mission Control managing Kubernetes clusters across vSphere, AWS, VMware Cloud, Azure, and Google Cloud- all on one screen. A key feature here was the ability to apply policies across all these different platforms from one consistent interface- no need to dive into 3, 4, or 5 different workflows, each with their own GUI, CLI, and API components to deal with.

A demo of Project Pacific followed this. I’ve heard lots of people say how much they appreciated these demonstrations and being able to see what the products actually look like as slide decks can only take you so far.

In this third demo we saw the vSphere Client we all know managing Kubernetes clusters alongside VMs and container pods- all natively within ESX. VMware are already using this technology in house- currently creating and destroying 800,000 containers weekly- a number which is growing.

Moving onto the “Connect and Protect” section Ray was joined onstage by Marcos Hernandez who had more demos. The first of these looked at the NSX Intelligence features- picking up risks, threats, and vulnerabilities which have been surfaced using the new Distributed IDS/IPS technology in NSX and then applying recommended firewall rules to remediate the faults.

Marcos’s second demo looked at how Carbon Black Cloud Workload adds another layer to protecting the application- spotting known vulnerabilities, locations in the infrastructure where encryption wasn’t implemented, The demo included a simulated hack on the Tanzu Tees application and showed how Carbon Black and AppDefense detected the intrusion attempt.

The “Manage” segment brought Purnima Padmanabhan to the stage. Wavefront was the first product up here, collecting metrics from the components of the Tanzu Tees apps and drilling down into individual microservices to diagnose performance problems- in this demo identifying a specific SQL query which was the root cause.

Project Magna was next up in the demonstrations- this uses AI and ML to optimise application performance- in this example by modifying cache size based on the current workload on the storage device.

CloudHealth was used by Tanzu Tees to analyse the usage of the components of the applications and recommend right-sizing of VMs and produce budget alerts to help proactively manage cloud spend.

The final section- “Experience” – was led by Shikha Mittal who continued the demo heavy theme by showing how Horizon Virtual Desktops sites can be created on both AWS and Azure clouds and use on-premises style images alongside the Microsoft Windows Virtual Desktops deployments of Windows 10.

VMware Workspace One was shown managing a variety of end user devices, and connecting to Carbon Black to spot anomalies in usual device behaviour, for example spotting malicious logins and potentially compromised endpoints. Again VMware uses this internally for their 60,000 endpoints across the globe.

The new CTO of VMware, Greg Lavender, closed out the presentations talking through some of the forward-looking activities of his office including using Bitfusion appliances to provide GPU resources across a network thus sharing a pool of GPU resources amongst a CPU-only ESX infrastructure.

In summary this was a session full of product demonstrations- definitely worth a watch or picking out the bits relevant to you. You can now tune into the full keynote (1 hour) on Youtube.

246520-vmworld2019-contentcatalog-eu-blank-1600x250

VMworld Europe 2019-Day 1 Keynote Highlights

VMworld Europe is happening in Barcelona this week, and today saw the annual Tuesday keynote start the morning off. I’m not amongst the 14,000 attendees from 111 countries at the event this year, so I’m recapping the highlights from the comfort of the sofa thanks to the online broadcast.

PG-Welcome-VMworld2019As has become normal for this European keynote, Jean-Paul Brulard (Senior VP and GM for VMware EMEA) welcomed the audience and introduced CEO Pat Gelsinger to deliver the core of the session. Pat focused on how digital technology has permeated all areas of our life and looked into the future to see how technologies such as AI and 5G will continue to accelerate this development.

VMware’s vision of Any Device, Any Application, and Any Cloud continues to be refined year on year- and the show looked at how VMware works to help provide consistence to the technologists trying to master the breadth of applications, clouds,  and devices in the modern world.

The product features started with Joe Beda being brought onstage to talk Kubernetes. VMware’s new Tanzu portfolio of products is designed to help build, run, and manage Kubernetes in the enterprise and is sold as a product to help both developers and IT. This section included the announcement of the betas of  Project Galleon which takes the Bitnami catalogue to the enterprise and Project Pacific which is vSphere rearchitected with Kubernetes at it’s core. VMware’s Tanzu Mission Control product which helps manage Kubernetes deployments on any platform has reached Private Beta.

image

In the hybrid cloud arena, VMware Cloud Director Service has been introduced to allow the 4000 VMware Cloud Provider Partners (VCPP) to provision the infrastructure from the hyperscale clouds to their customers. This is available on AWS and IBM clouds today and expected in Azure by the end of the year.

The VMware on AWS platform is continuing to be developed- now available in 4 times the number of regions that it was a year ago, and the Outposts product getting closer to being delivered which will open up AWS zones in customer datacentres. When Tanzu ships next year it will be also feature on the VMWonAWS platform.

rJr0l480_400x400Microsoft also got a mention, VMware are partnering there to provide the HCX migration tools on Azure, and integrating Workspace One with Microsoft Endpoint Manager. Azure SQL 2019 on VMware vSphere is an interesting concept- providing the public cloud database service but on-premises.

Staying on-prem, the private cloud is covered with VMware Cloud on Dell EMC is now available – this couples VMware Cloud Foundation with Dell’s VXRail hardware to provide Datacentre-as-a-Service.

NSX, the “secret sauce” of previous VMworld keynotes, continues to develop- the acquisition of AVI Networks providing load balance capabilities and software-defined intrusion detection to bring features only seen within the datacentre in special purpose devices or next-gen firewalls right down into the hypervisor and adjacent to the applications.

Sanjay Poonen (COO) interspersed customer chats in amongst the presentation and towards the end took centre stage to discuss VMware’s security stance.  Their strategy is to provide proactive security whilst tying the network security, endpoint security, cloud security, identity, and analytics together. The Carbon Black acquisition closed between the US and Europe events and this technology will be layered into vSphere, Workspace One, and NSX, providing agentless antivirus protection and threat detection.

There’s a wide range of announcements here- and whilst a lot of the content is similar to the US event back in August, albeit further along the roadmap- it sets up for a good week in Barcelona. You can tune in to the full keynote (1 hour 48 minutes) on Youtube.

246520-vmworld2019-contentcatalog-eu-blank-1600x250

Improving Documentation via the Community.

Have you ever had to deal with incorrect documentation? Or been frustrated by a typo? Or been annoyed that a how-to guide uses an old version of an interface?

Now you can fix it!

Many software providers are now using community-editable documentation online. This isn’t a Wikipedia style free-for-all, but a carefully moderated process ensuring that the resulting document is accurate.  If you come across an error in an online doc, or even a PowerShell help page, check and see if you can submit edits.

Continuous deployment pipelines mean that these edits can make it into live documentation in a matter of hours or days- impressive times if you’ve ever submitted an errata to a printed book, or submitted a bug request to get online documentation fixed.

docs.Microsoft.com

If you visit a Microsoft docs page, you’ll see an Edit link at the top of the screen (see (1) in the screenshot below). Clicking on this takes you to a page on Github with the source of the document. Click there to edit the file and a git fork will be made under your own profile- make your edits and submit a merge request and, once approved, your updates will appear in the original website. You’ll even get a little credit (see (2) in the screenshot below) for your contribution.

image

In this particular example I was following the step-by-step guide and noticed that the wording in the document no longer matched the Azure Portal. I was quickly able to suggest a fix and later that day the page was updated and anyone else following the instructions wouldn’t be misled. Two minutes of my time hopefully saved ten minutes of head-scratching by someone else.

VMware PowerCLI Example Scripts

As the name suggests, the source code for some example PowerCLI scripts has been published by VMware supported by members of the #vCommunity. If you find an error in the scripts you can pop over to Github and correct them- and remember this isn’t just the code of the script, but also it’s accompanying documentation.

image

In this example a typo in the get-help file was spotted and quickly corrected. Whilst the spelling mistake wasn’t a show-stopper this shows how quick and easy it is to contribute to these projects without being a coding guru.

Summary

Many of these projects use Github and learning how to use that version control platform isn’t arduous- especially for small changes like these- and is a useful skill to pickup if you don’t already have it. The important message here is you don’t need to be a developer to contribute to the code.

So, next time you spot a mistake in documentation, see if you can fix it yourself and help the next person who comes along.

vSAN Cluster Shutdown

A few weeks ago I had to shutdown a vSAN Cluster temporarily for a planned site-wide 24 hour power outage that was blacking out a datacentre. With the amount of warning and a multi-datacentre design this wasn’t an issue, but I made use of vSphere tags and some Powershell/PowerCLI to help with the evacuation and repopulation of the affected cluster. Hopefully some of this may be useful to others.

The infrastructure has two vSAN Clusters – Cluster-Alpha and Cluster-Beta. Cluster-Beta was the one being affected by the power outage, and there was sufficient space on Cluster-Alpha to absorb migrated workloads. Whilst they exist in different datacentres both clusters are on the same LAN and under the same vCenter.

I divided the VMs on Cluster-Beta into three categories:

  1. Powered-Off VMs and Templates. These were to stay in place, they would be inaccessible for the outage but I determined this wouldn’t present any issues.
  2. VMs which needed to migrate and stay on. These were tagged with the vSphere tag “July2019Migrate”
  3. VMs which needed to be powered off but not migrated. For example test/dev boxes which were not required for the duration. These were tagged with “July2019NOMigrate”

The tagging was important, not only to make sure I knew what was migrating and what was staying, but also what we needed to move back or power on once the electrical work had completed. PowerCLI was used to check that all powered-on VMs in Cluster-Beta were tagged one way or another.

Get the VMs in CLuster-Beta where the tag “July2019Migrate” is not assigned and the tag “July 2019NOMigrate” is not assigned and the VM is Powered On.

Get-Cluster -Name "Cluster-Beta" |Get-VM | where {
 (Get-TagAssignment -Entity $_).Tag.Name –notcontains "July2019Migrate" –and
 (Get-TagAssignment -Entity $_).Tag.Name –notcontains "July2019NOMigrate" –and
 $_.PowerState –eq “PoweredOn”}

In the week approaching the shutdown the migration was kicked off:

#Create a List of the VMs in the Source Cluster which are tagged to migrate
$MyTag= Get-Tag -Name "July2019Migrate"
$MyVMs=Get-Cluster "Cluster-Beta" | Get-VM | Where-Object {(Get-TagAssignment -Entity $_).Tags -contains $MyTag }
#Do the Migration
$TargetCluster= "Cluster-Alpha" #Target Cluster
$TargetDatastore= "vSANDatastore-Alpha" #Target Datastore on Target Cluster
$MyVMs | Move-VM -Destination (Get-Cluster -Name $TargetCluster) -Datastore (Get-Datastore -Name $TargetDatastore) -DiskStorageFormat Thin -VMotionPriority High

At shutdown time, a quick final check of the remaining powered on VMs was done and then all remaining VMs in Cluster-Beta were shut down. Once there were no running workloads on Beta it was time to shut down the vSAN cluster. This part I didn’t automate as I’m not planning on doing it a lot, and there’s comprehensive documentation in the VMware Docs site. The process is basically one of putting all the hosts into maintenance mode and then once the whole cluster is done, powering them off.

You are in a dark, quiet datacentre. There are many servers, all alike. There may be Grues here.

When power was restored, the process was largely reversed. I powered on the switches providing the network interconnect between the nodes, and then powered on those vSAN hosts and waited for them to come up. Once all the hosts were visible to vCenter, it was just a case of selecting them all and choosing “Exit Maintenance Mode”

2019-07-29 (8)

There was a momentary flash of alerts as nodes come up and wonder where their friends are, but in under a minute the cluster was passing the vSAN Health Check

image

At this point it was all ready to power on the VMs that had been shutdown and left on the cluster, and vMotion the migrated virtual machines back across. Again, PowerCLI simplified this process:

#Create a List of the VMs in the Source Cluster which are tagged to stay but need powering on.
$MyTag= Get-Tag -Name "July2019NOMigrate"
$MyVMs=Get-Cluster “Cluster-Alpha” | Get-VM | Where-Object {(Get-TagAssignment -Entity $_).Tags -contains $MyTag }
#Power on those VMs
$MyVMs | Start-VM

#Create a List of the VMs in the Source Cluster which are tagged to migrate (back)
$MyTag= Get-Tag -Name "July2019Migrate"
$MyVMs=Get-Cluster “Cluster-Alpha” | Get-VM | Where-Object {(Get-TagAssignment -Entity $_).Tags -contains $MyTag }
#Do the Migration
$TargetCluster= "Cluster-Beta" #New Target Cluster
$TargetDatastore= "vSANDatastore-Beta" #Target Datastore on Target Cluster
$MyVMs | Move-VM -Destination (Get-Cluster -Name $TargetCluster) -Datastore (Get-Datastore -Name $TargetDatastore) -DiskStorageFormat Thin -VMotionPriority High

Then it was just a case of waiting for the data to flow across the network and finally check that everything had migrated successfully and normality had been restored.

we have normality, I repeat we have normality…Anything you still can’t cope with is therefore your own problem. Please relax.

Trillian, via the keyboard of Douglas Adams. The Hitchhiker’s Guide to the Galaxy