Quantcast
Channel: VMware Arena
Viewing all 326 articles
Browse latest View live

vSphere Distributed Switch Part 19 - Understanding vSwitch Network Load Balancing policies

$
0
0
Load Balancing and failover policy allows you to define how the network traffic distributed between physical network adapters and how to reroute the traffic in case of network adapter failure. There are 5 types of network load balancing policies available with vSphere distributed switch. Let's discuss in details about each load balancing policy. Load Balancing Policy  available at vSwitch and dvSwitch is only to control the Outgoing traffic

1. Route based on originating Virtual Port
2. Route based on IP hash
3. Route based on originating virtual Port
4. Use Explicit failover order
5. Route based on Physical NIC load


Route based on originating Virtual Port

This is the default load balancing policy. Virtual Switch consists of number of virtual ports. In this load balancing policy, Virtual ports of the vSwitch are associated with the Physical network adapter. This physical network adapters are determined by the virtual Port ID in which the virtual machine is connected. Traffic from that particular virtual machine virtual Ethernet adapter is consistently sent only to the same Ethernet adapter until and unless there is a failure of that particular physical Ethernet adapter. In that case, There will be a failover to another physical adapter in the NIC team. Network replies will also be received on the same physical adapter as the physical switch learns the port association.

Route based on IP Hash

If this Load balancing policy is configured, Physical Nic for outbound packet is chosen based on its source and destination IP address. Physical uplink will be selected based on the hash of the source and destination IP address of the each packet sent from the VM. This method need higher CPU overhead.



In the above diagram, You can see the different uplinks are chosen based on the hash of the source and destination IP address.

Hash of A & X associated with Uplink1
Hash of A & Y associated with Uplink2
Hash of  B & Y associated with Uplink3
Hash of  B & Z associated with Uplink3

Above diagram will clearly explains how the physical uplink adapters will be chosen using Load based on IP hash load balancing policy.

Route based on  Source MAC Hash

In this load balancing policy, Each Virtual machine outbound traffic will be mapped to a particular physical NIC based on the hash of Virtual Machine NIC's MAC address. Traffic from a particular virtual NIC is consistently sent to the same uplink adapter unless there is failure of that particular uplink adapter. Even replies are received on the same physical adapter.



Hash of VM A vNIC's MAC is associated with Uplink 1
Hash of VM B vNIC's MAC is associated with Uplink 2
Hash of VM C vNIC's MAC is associated with Uplink 3

Route based on Physical NIC load

This load balancing policy is only available as part of dvSwitch and it is not available in Standard switches. This policy chooses a uplink based on the current load of the physical network adapters. This load balancing policy use a algorithm to perform a regular inspection of load on the Physical NICs every 30 seconds. When the utilization of Particular physical uplink exceeds 75% over 30 seconds, the hypervisor will move VM's traffic to another uplink adapter. This load balancing doesn't require any additional configuration at the physical switch level.



This load balancing policy provides better utilization of all the uplink adapters and does perfect load balancing. Please find the below test case results  dvUplinkswith the network bandwidth usage on 2 Uplink adapter during the entire benchmark period. This load balancing policy provides even distribution of network load on both physical uplink adapters.



Graphic Thanks to VMware.com

Use Explicit Failover Order

This setting always use the highest order uplink from the list of Active uplink adapters. In case of failover or both the active uplink adapters failed, Standby adapters will be used. Move the adapters up and down based on the requirement.  uplinks adapters under Unused uplink will not used for the communication.


I hope this is informative for you. Thanks for Reading!!!. Be Social and share it in social media if you feel worth sharing it.

Difference Between vCenter Server Appliance 5.5 and vCenter Server 5.5 on Windows

$
0
0
vCenter Server Appliance 5.5 is reducing the dependency of Windows operating system for vCenter server Install. With VCSA 5.5 on Embedded database can manage 100 hosts and 3000 Virtual Machines. vCSA reduces lot of administrative efforts by reducing efforts needed for windows patching, software update and management of Guest OS on windows operating system. It is necessary to understand the difference between the vCenter Server Appliance 5.5 and vCenter server 5.5 installed on windows Server. This post will explain you the detailed difference between the 2 items.



Feature
vCenter Server Appliance 5.5
vCenter Server 5.5 on Windows
Can be Deployed 
 Only as a Virtual Machine
Can be installed on Physical or
Virtual windows Machine
Operating System
Preconfigured Linux-based
virtual machine
vCenter 5.5 requires 64 Bit OS and 64 bit DSN:
Windows Server 2013 (64 bit)
Windows Server 2008 Sp2 (64 bit)
Windows Server 2008 R2 Sp1 (64 bit)
Windows Server 2008 R2 (64 bit)
Database
PostgreSQL for the embedded database
Supports Oracle Database
SQL Server 2005 (SP4) (Standard\Enterprise)
 (32-bit & 64-bit)

SQL Server 2008 (R2 SP2, R2 SP1) (Express\standard\Enterprise\Datacenter) (32-bit & 64-bit)

SQL Server 2012 (SP1) (Enterprise\Standard) (32-bit & 64-bit)

Oracle 11 G Release 2 (Enterprise\Standard) & Oracle 11G ONE edition (32-bit & 64-bit)
Installation Method
 Deployed as a Virtual Machine using OVF or
OVA template
Need to install on top of Windows Operating System.
Hosts Per vCenter
100 Hosts with
 embedded vPostgres database
1000 Hosts with Oracle Database
1000 hosts per vCenter Server
Virtual Machines Per vCenter
3,000 VM's with
 embedded vPostgres database
10,000 VM's with Oracle Database
10,000 VM's per vCenter Server
vCenter Linked Mode
Not Supported
Supported with Windows Install
vCenter Server Heartbeat
Not Supported
vCenter heartbeat is a windows application.
 It works with Windows install vCenter server
VMware Update Manager
You can't install VUM on VCSA. Update Manager can be installed on separate windows machine to use with VCSA
Supported with Windows Install
AutoDeploy
Autodeploy is bundled with VCSA
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
Syslog Collector
Syslog collector is installed by default
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
ESXi Dump Collector Service
ESXi Dump Collector Service is installed by default
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
vSphere Web Client
Pre-Installed with VCSA
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
PowerCLI
Cannot be installed on vCSA
Can be installed on Windows vCenter Server machine
IPV6 support
IPv6 is not supported. Only supports IPV4
Both  IPv4 and IPv6 are supported

vExpert 2014 Applications are Open Now !!!!

$
0
0
There's chance to show the contributions of VMwareArena and get recognized. Nothing but vExpert 2014. I am happy to announce via my website that vExpert 2014 applications are open now. Applications of vExpert 2014 will be accepted untill March 6th Midnight PST. Applications received after March 6th will be roll into Q2 nomination & Voting Process. Got Shocked???.. Yes.There are new changes to vExpert Program

1. If you are a Current 2013 vExpert, Your 2014 application process has been shortened. Since you have proved yourself as a vExpert, you need to let them know the contributions since May 2013 vExpert announcement.

2. There will be quarterly nominations into 2014 vExpert program. Applications will be open year round at the end of each quarter. The voting process will begin for new vExperts from the previous quarter. So if you are not selected as vExpert 2014 right away, you will have change for quarterly voting and nominations.




As same as the last year, There are 3 different paths to prove yourself as vExpert.

Evangelist Path:
The Evangelist Path includes book authors, bloggers, tool builders, public speakers, VMTN contributors, and other IT professionals who share their knowledge and passion with others with the leverage of a personal public platform to reach many people. Employees of VMware can also apply via the Evangelist path. A VMware employee reference is recommended if your activities weren’t all in public or were in a language other than English.

Customer Path:
The Customer Path is for leaders from VMware customer organizations. They have been internal champions in their organizations, or worked with VMware to build success stories, act as customer references, given public interviews, spoken at conferences, or were VMUG leaders. A VMware employee reference is recommended if your activities weren’t all in public.

VPN (VMware Partner Network) Path:
The VPN Path is for employees of our partner companies who lead with passion and by example, who are committed to continuous learning through accreditations and certifications and to making their technical knowledge and expertise available to many. This can take shape of event participation, video, IP generation, as well as public speaking engagements. A VMware employee reference is required for VPN Path candidates.

Apply Now:

If you Current vExpert 2013, Use the Fast Track vExpert 2014 Application

 For 2014 vExpert Nomination ,2014 vExpert Application

I hope this is informative for you. Apply now to show your contribution to virtual community and get awarded by VMware as vExpert 2014. Thanks for Reading!!!!

vSphere Distributed Switch Part 16 – Configuring dvPortGroup Security Settings

$
0
0
In this Post, I am going to explain in detail about the Security settings of dvPortGroup. Which works in exact way in both Standard and distributed switch. Only difference in the security settings between the standard switch and distributed switch is its default settings against the security policy.

Default Security Settings for all the below 3 settings (Promiscuous mode, MAC address changes & Forged Transmits is set to Reject)  in distributed Virtual Switch.

Promiscuous mode = Reject
 MAC address changes = Reject
 Forged Transmits = Reject

Default Security Settings of Standard Switch will be different than the dvswitch setting. In standard Switch, Below are the default settings:

Promiscuous mode = Reject
 MAC address changes = Accept
 Forged Transmits = Accept

Promiscuous Mode

Accept: If you set dvportgroup Security setting (Promiscuous mode to Accept), Virtual Machine adapter connect to this port group, will receive all frames passed on the switch in compliance with the VLAN policy of the port. This settings can only be useful in Firewalls, Intrusion detection systems and also in Packet capturing software. You can run packet capturing software like wireshark on the Guest operating system of the virtual machine connected to the port group with Promiscuous mode is set to Accept to capture the frames passing on that switch for network troubleshooting and analysis.

Reject: If you set dvportgroup Security setting (Promiscuous mode to Reject), Virtual Machine adapter will not receiving frames which is send for other virtual machines. By default, Promiscuous mode is set to reject. Don’t set it to Accept unless and until it is required. Enabling promiscuous mode without any prominent use will create a unnecessary load on the virtual machines.

MAC Address Changes

MAC address is a unique number assigned to networking components like Network adapters. Each virtual machine will be assigned with atleast one virtual network adapter (vNIC). each vNIC will be assigned with a MAC address when VM powers on first time. MAC address of the Virtual network adapter will be saved in the virtual machine configuration file (.VMX).which will be stored in the virtual machine directory on your datastore. The MAC address which is saved in .VMX file aslo termed as Initial address.

 Usually this initial address will be copied by the Guest operating system to the network adapters as effective address unless you have bind some other MAC address at Guest OS level. Binding MAC address at Guest OS level will be useful when performing the P2V migration of the physical server in which installed application license is bind to the MAC address of physical host. This application will not work with other MAC address. In that case ,you can manually assign MAC address to network adapter inside the Guest operating system.

Runtime address is the address which is viewed by a port on the virtual switch. Runtime address will be same as the effective address which is assigned by Guest operating system.

Accept: If you set MAC Address Changes policy to accept and the guest operating system changes the MAC address of a  virtual network adapter other than the address specified in the .VMX (virtual machine configuration file)(Initial address), The switch allows the  inbound frames to pass with the new address.  In other terms, If initial address is not same the effective address,this policy allows the frames to pass the switch if this security policy is set as Accept.

Reject: If you set MAC Address changes to Reject and the Guest operating system changes the MAC address of the virtual network adapter other than the address specified in the .VMX file (Initial address), the switch drops all the inbound frames to that virtual machine adapter In other terms,. If initial address is not same the effective address,it does not allow incoming traffic to the VM.

Forged Transmits

Forged Transmits works as same as the MAC address changes policy. Only difference is it works on Outgoing traffic whereas MAC address changes works on Incoming traffic

Accept: If the Forged Transmits is set to Accept, Switch does not perform any security filtering and permits all the outbound frames from the virtual machine network adapter even if the source MAC address is different from the one saved in virtual machine configuration file (.VMX)

Reject: If the Forged Transmits is set to Reject, Switch drops any outbound frames from the virtual machine network adapter, if the source MAC address is different from the one saved in virtual machine configuration file.

I hope this is informative for you. Thanks for Reading!!!. Be Social and share it in social media, if you feel worth sharing it.

vSphere Distributed Switch Part 17 – Configuring dvPortGroup Traffic Shaping Policies

$
0
0
Traffic shaping is a method to regulate the network data transfer to obtain certain level of network performance and quality of service (QOS). It allows you to prioritize the network packet of most important traffic as compared to leased important traffic. Below are major scenarios in which traffic shaping plays a major role
  • Let’s say you have Time sensitive data like Credit card gateway servers, which should be given more priority as compared to internal production environment. Production traffic should be given more priority than your development traffic. This can be achieved by traffic shaping by limiting the traffic for development and production environment as compared to the network of credit card gateway servers.
  • If your are the ISP provider, then you may need to shape the traffic on your customer based on bandwidth plan  or based on the support contract they have with your company.

Traffic Without Traffic Shaping

  

Traffic With Traffic Shaping

Graphic Thanks to linebroker.co.uk

I hope you have understood about the necessity of traffic shaping. In this post, I am going to explain about the VMware’s Traffic shaping policies. Which can be configured at standard switch, Standard Port Group, Distributed PortGroup and Distributed port.The main difference between the traffic shaping policy on Standard Switch and Distributed switch is ESX/ESXi host shapes outbound traffic traffic on Standard switches whereas  both Incoming and outgoing traffic shaping can be achieved using vSphere distributed switches.

Standard Switch = Outgoing Traffic Shaping (Egress Traffic Shaping)

Distributed Switch = Incoming + Outgoing Traffic shaping (Ingress + Egress Traffic Shaping)

Average Bandwidth:

This will be specified in Kbit/s. This option controls the number of bits per second to allow across a port,averaged over time. Specified value is the allowed average load on the PortGroup.

Peak Bandwidth:

This will be specified in Kbit/s. This option controls the maximum number of bits per second to allow across a portGroup .Value Specified in the peak bandwidth option is maximum value in Kbit/s that portGroup can handle. Peak bandwidth should never be smaller than the average bandwidth.

Burst Size:

This will be specified in KB. This is Maximum number of bytes to allow in a burst. Let’s say, If you have configured Burst size parameter, Port Group might gain the burst bonus if it is not at all using all its allocated bandwidth on the port Group. During Peak time, When the same port group needs more bandwidth than value specified in the Average bandwidth. It will be allowed temporarily to transmit data at higher speed if port group has burst bonus. It is nothing but the factor which defines how long the bandwidth can exceed the average.

Excellent Diagram from LucD explaining the Traffic Shaping policies.

I believe This is informative for you. Thanks for Reading !!!. Be Social and Share it in social media if you feel worth sharing it.

vSphere Distributed Switch Part 18 – Configuring dVPortGrouP VLAN Policy

$
0
0

In this post i am going to explain how to configure VLAN policy at distributed port Group. This VLAN ploicy can also be configured at distributed port, Uplink PortGroup and Uplink Port level.  I have explained different types of VLAN’s available with distributed portGroup along with the detailed explanation about different types of VLAN tagging like External Switch Tagging(EST), Virtual Switch Tagging (VST) and Virtual Guest Tagging (VGT).

VLAN type = None:

Configure VLAN type as None, If you are not using VLAN’s or In case of External switch Tagging. I have explained about External switch tagging in my one of the blog post ” VLAN Tagging : VST,EST & VGT on VMware vSphere”. For better understanding i am recollecting the concepts of VLAN tagging here.

External Switch Tagging (EST)
1  In EST, ESX host doesn’t see any vlan tags and does not handle any VLAN tagging.
2  All the tagging operation is done by physical switch and virtual switch is not aware about that.
3  Number of physical nics = no of VLANs connected to ESX
4.Port groups on the Virtual switch of ESX server need not to be configured with the VLAN number or configure VLAN ID 0 (if it is not native VLAN)
5  Count of NICS and cable connected to ESX is more as compared to VST approach.
6  The physical switch port connecting the uplink from the ESX should be configured as Access port assigned to specific VLAN.
7  virtual machine network Packet is delivered to physical switch without any tagging operation performed by the virtual switch.

Below are the examples of External Switch tagging. Each Port group is not tagged with VLAN iD.

VLAN type = VLAN

Tag your network traffic with the VLAN ID. Enter the number between 1 and 4094 for the Virtual Switch Tagging (VST) and Type VLAN number as 4095 for Virtual Guest Tagging(VGT)

 Virtual Switch Tagging (VST)

1. VST uses 802.1q VLAN trunks and tagged traffic.

2 VLAN tagging for all packets is performed by the Virtual Switch before leaving the ESX/ESXI host
3 Port groups on the Virtual switch of ESX server should be configured with VLAN ID (1-4094)
4 vSwitch responsibility is  to strip off the vlan tag and send packet to virtual machine in corresponding port group.
5 Reduces the number of Physical nics on the server by running all the VLANs over one physical nic. Better solution would be keep 2 nics for redundancy.
6.Reduces number of cables from ESX server to physical switch.
7 The physical switch port connecting the uplink from the ESX should be configured as Trunk port.
8 virtual machine network Packet is delivered to vSwitch and before it is sent to physical switch the packet is tagged with vlan id according to the port group membership of originating virtual machine.

Virtual Guest Tagging (VGT)

1. you must install 8021.Q VLAN trunking driver inside virtual machine guest operating system.
2 All the VLAN tagging is performed by the virtual machine with use of trunking driver in the guest.
3 VLAN tags are understandable only between the virtual machine and external switch when frames are passed to/from virtual switches.
4 Virtual Switch will not be involved or aware of this operation. vSwitch only forwards the packets from Virtual machine to physical switch and will not perform any operation.
5 Port group of the virtual machine should be configured with VLAN ID 4095
6 The physical switch port connecting the uplink from the ESX should be configured as Trunk port

VLAN Type = VLAN Trunking

Configure the VLAN ID within the VLAN trunk range. Multiple ranges and individual VLANs can be used by entering as comma-separated list. This option should be with Virtual Guest Tagging (VGT)

VLAN Type = Private VLAN

Associate the PortGroup traffic with a private VLAN. Private VLAN can only be created on the distributed switch. I will explain how to create PVLAN and uses cases of three different types of VLANs in my upcoming posts.

Below is comparison table for the people who want a comparison of different VLAN tagging types under single table

         

 I hope this is informative for you. Thanks for Reading!!!. Be Social and share it in social media. If you feel, Worth sharing it.

New VCP certfication :VCP550 based on vSphere 5.5 is available Now

$
0
0
It is been a great news that VMware have release new VCP certification VCP550 on January 22 2014. which is based out of vSphere 5.5.  We have already been testing and implementing lot of new features of vSphere 5.5 in our production and lab environment. It would be nice that you have a new certification which test your skills on vSphere 5.5. Let’s get ready  for VCP (VMware Certified Professional) 550 (VCP550).

One more thing to notice is Even if you appear for VCP510(exam based on vSphere 5.0/5.1) or VCP 550 (exam based on vSphere 5.5), You will earn the certification called “VCP5-DCV”(VMware Certified Professional 5- Data Center Virtualization). It is upto to you to choose which version you want to test and proof your skills.

Your Certification can be achieved in Simple 3 Steps

1. Attend a mandatory VMware Authorized course

2. Gain hands-on experience with vSphere 5

3. Appear and pass the VCP5-DCV (VCP510 or VCP550) exam.

To appear for the certification VCP5-DCV based on VCP550, you need to first get authorization for the exam using the link Request for Authorization for VCP550. Review your details in the authorization form and click on submit to submit the request for authorization for this exam.
  • Allow up to 15 minutes for your authorization request to be processed 
  • You will receive an email with your authorization information from VMware within in the next hour.
  • Go to Pearson VUE testing site to schedule your exam.
  • Login using the name and Candidate ID.

Below is the overview from the Exam blue Print of VCP5-DCV (VCP 550)  Download the exam blue print for VCP5-DCV (VCP550)  for detailed items covered in each objective.
Section 1 – Plan, Install, Configure and Upgrade vCenter Server and VMware ESXi
Objective 1.1 – Identify and Explain vSphere Architecture and Solutions
Objective 1.2 — Install and Configure vCenter Server
Objective 1.3 – Install and Configure VMware ESXi
Objective 1.4 – Plan and Perform Upgrades of vCenter Server and VMware ESXi
Objective 1.5 –Secure vCenter Server and ESXi
Section 2 – Plan and Configure vSphere Networking
Objective 2.1 – Configure vSphere Standard Switches
Objective 2.2 – Configure vSphere Distributed Switches
Objective 2.3 – Configure vSS and vDS Policies
Section 3 – Plan and Configure vSphere Storage
Objective 3.1 – Configure Shared Storage for vSphere
Objective 3.2 – Create and Configure VMFS and NFS Datastores
Section 4 – Deploy and Administer Virtual Machines and vApps
Objective 4.1 – Create and Deploy Virtual Machines
Objective 4.2 – Create and Deploy vApps
Objective 4.3 – Manage Virtual Machine Clones and Templates
Objective 4.4 – Administer Virtual Machines and vApps
Section 5 – Establish and Maintain Service Levels
Objective 5.1 – Create and Configure VMware Clusters
Objective 5.2 – Plan and Implement VMware Fault Tolerance
Objective 5.3 – Create and Administer Resource Pools
Objective 5.4 – Migrate Virtual Machines
Objective 5.5 – Backup and Restore Virtual Machines
Objective 5.6 – Patch and Update ESXi and Virtual Machines
Section 6 – Perform Basic Troubleshooting
Objective 6.1 – Perform Basic Troubleshooting for ESXi Hosts
Objective 6.2 – Perform Basic vSphere Network Troubleshooting
Objective 6.3 – Perform Basic vSphere Storage Troubleshooting
Objective 6.4 – Perform Basic Troubleshooting for HA/DRS Clusters and vMotion/Storage vMotion
Section 7 – Monitor a vSphere Implementation
Objective 7.1 – Monitor ESXi, vCenter Server and Virtual Machines
Objective 7.2 – Create and Administer vCenter Server Alarms
Objective 7.3 – Install, Configure and Administer vCenter Operations Manager

I hope this is informative for you. Let’s ready to test our skills in vSphere 5.5. Be Social and Share it in Social media if you feel it is worth sharing it.

VMTurbo Released Operations Manager 4.5 with Storage and Fabric Control Module

$
0
0
First of all before going to talk about VMTurbo Operation Manager, VMwareArena Welcomes VMTurbo as a new Sponsor. On Jan 28,2014 -VMTurbo released its new version version of Operation manager which is Operations manager version 4.5. VMTurbo’s Operation manager continuously analyzes the real-time performance, resource capacity, Service level priorities and System constraints across your virtualized environment to determine, implement and adjust resource configurations and workload placements. VMTurbo’s Operations Manager support various virtualization platforms including VMware,Citrix, Microsoft and RedHat.

VMTurbo Operations Manager integrates with Microsoft VMM (SCVMM) which allows you to manage the inventory of Hyper-V hosts and VM’s.

Below are the Few of the New features which are available as part of Operations Manager 4.5

VMTurbo Storage Control Module

Storage Control Module supports advanced features such as NetApp Clustered Data ONTAP (Cluster mode) and FlexPod. This Module helps users to solve their Storage Performance problems, Cost Challenges by enabling the efficient use of storage infrastructure by preventing unnecessary  storage provisioning.

VMTurbo Fabric Control Module

Fabric Control Module supports Cisco UCS fabric. which helps to identify the right amount of blades for the current workload in your environment so that, you can provision more or less as needed for your current workload. It helps your to reduce the hardware cost based on workload identified So, blades can be provisioned or decommissioned on demand. This Fabric Control Module also controls the number of Ports on the NICs which allows to provision the correct amount of bandwidth from the fabric interconnect. This Module simply ensures that your workloads get the perfect compute and network resources to get the reliable performance by utilizing the underlying blades and Ports

Apart from the above 2 New Modules, there are many key improvements to Operation Manger foundation features like Supply chain management, ROI Report, Workload summary, lot of reporting and capacity dashboard.

Download Your Free Trail of  VMTurbo Operation Manger 4.5 Now

I Hope this is informative for you. Thanks for Reading and Share it in Social media, if you feel Worth sharing it.


vSphere Distributed Switch Part 19 – Understanding vSwitch Network Load Balancing policies

$
0
0
Load Balancing and failover policy allows you to define how the network traffic distributed between physical network adapters and how to reroute the traffic in case of network adapter failure. There are 5 types of network load balancing policies available with vSphere distributed switch. Let’s discuss in details about each load balancing policy. Load Balancing Policy  available at vSwitch and dvSwitch is only to control the Outgoing traffic
1. Route based on originating Virtual Port
2. Route based on IP hash
3. Route based on originating virtual Port
4. Use Explicit failover order
5. Route based on Physical NIC load

Route based on originating Virtual Port

This is the default load balancing policy. Virtual Switch consists of number of virtual ports. In this load balancing policy, Virtual ports of the vSwitch are associated with the Physical network adapter. This physical network adapters are determined by the virtual Port ID in which the virtual machine is connected. Traffic from that particular virtual machine virtual Ethernet adapter is consistently sent only to the same Ethernet adapter until and unless there is a failure of that particular physical Ethernet adapter. In that case, There will be a failover to another physical adapter in the NIC team. Network replies will also be received on the same physical adapter as the physical switch learns the port association.

Route based on IP Hash

If this Load balancing policy is configured, Physical Nic for outbound packet is chosen based on its source and destination IP address. Physical uplink will be selected based on the hash of the source and destination IP address of the each packet sent from the VM. This method need higher CPU overhead.

In the above diagram, You can see the different uplinks are chosen based on the hash of the source and destination IP address.

Hash of A & X associated with Uplink1
Hash of A & Y associated with Uplink2
Hash of  B & Y associated with Uplink3
Hash of  B & Z associated with Uplink3

Above diagram will clearly explains how the physical uplink adapters will be chosen using Load based on IP hash load balancing policy.

Route based on  Source MAC Hash

In this load balancing policy, Each Virtual machine outbound traffic will be mapped to a particular physical NIC based on the hash of Virtual Machine NIC’s MAC address. Traffic from a particular virtual NIC is consistently sent to the same uplink adapter unless there is failure of that particular uplink adapter. Even replies are received on the same physical adapter.

Hash of VM A vNIC’s MAC is associated with Uplink 1
Hash of VM B vNIC’s MAC is associated with Uplink 2
Hash of VM C vNIC’s MAC is associated with Uplink 3

Route based on Physical NIC load

This load balancing policy is only available as part of dvSwitch and it is not available in Standard switches. This policy chooses a uplink based on the current load of the physical network adapters. This load balancing policy use a algorithm to perform a regular inspection of load on the Physical NICs every 30 seconds. When the utilization of Particular physical uplink exceeds 75% over 30 seconds, the hypervisor will move VM’s traffic to another uplink adapter. This load balancing doesn’t require any additional configuration at the physical switch level.
This load balancing policy provides better utilization of all the uplink adapters and does perfect load balancing. Please find the below test case results  dvUplinkswith the network bandwidth usage on 2 Uplink adapter during the entire benchmark period. This load balancing policy provides even distribution of network load on both physical uplink adapters.
Graphic Thanks to VMware.com

Use Explicit Failover Order

This setting always use the highest order uplink from the list of Active uplink adapters. In case of failover or both the active uplink adapters failed, Standby adapters will be used. Move the adapters up and down based on the requirement.  uplinks adapters under Unused uplink will not used for the communication.

I hope this is informative for you. Thanks for Reading!!!. Be Social and share it in social media if you feel worth sharing it.

Difference Between vCenter Server Appliance 5.5 and vCenter Server 5.5 on Windows

$
0
0
vCenter Server Appliance 5.5 is reducing the dependency of Windows operating system for vCenter server Install. With VCSA 5.5 on Embedded database can manage 100 hosts and 3000 Virtual Machines. vCSA reduces lot of administrative efforts by reducing efforts needed for windows patching, software update and management of Guest OS on windows operating system. It is necessary to understand the difference between the vCenter Server Appliance 5.5 and vCenter server 5.5 installed on windows Server. This post will explain you the detailed difference between the 2 items.
Feature
vCenter Server Appliance 5.5
vCenter Server 5.5 on Windows
Can be Deployed 
 Only as a Virtual Machine
Can be installed on Physical or
Virtual windows Machine
Operating System
Preconfigured Linux-based
virtual machine
vCenter 5.5 requires 64 Bit OS and 64 bit DSN:
Windows Server 2013 (64 bit)
Windows Server 2008 Sp2 (64 bit)
Windows Server 2008 R2 Sp1 (64 bit)
Windows Server 2008 R2 (64 bit)
Database
PostgreSQL for the embedded database
Supports Oracle Database
SQL Server 2005 (SP4) (Standard\Enterprise)
 (32-bit & 64-bit)

SQL Server 2008 (R2 SP2, R2 SP1) (Express\standard\Enterprise\Datacenter) (32-bit & 64-bit)

SQL Server 2012 (SP1) (Enterprise\Standard) (32-bit & 64-bit)

Oracle 11 G Release 2 (Enterprise\Standard) & Oracle 11G ONE edition (32-bit & 64-bit)

Installation Method
 Deployed as a Virtual Machine using OVF or
OVA template
Need to install on top of Windows Operating System.
Hosts Per vCenter
100 Hosts with
 embedded vPostgres database
1000 Hosts with Oracle Database
1000 hosts per vCenter Server
Virtual Machines Per vCenter
3,000 VM’s with
 embedded vPostgres database
10,000 VM’s with Oracle Database
10,000 VM’s per vCenter Server
vCenter Linked Mode
Not Supported
Supported with Windows Install
vCenter Server Heartbeat
Not Supported
vCenter heartbeat is a windows application.
 It works with Windows install vCenter server
VMware Update Manager
You can’t install VUM on VCSA. Update Manager can be installed on separate windows machine to use with VCSA
Supported with Windows Install
AutoDeploy
Autodeploy is bundled with VCSA
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
Syslog Collector
Syslog collector is installed by default
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
ESXi Dump Collector Service
ESXi Dump Collector Service is installed by default
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
vSphere Web Client
Pre-Installed with VCSA
Should be installed as an additional package. Installation files are located in vCenter Installation DVD
PowerCLI
Cannot be installed on vCSA
Can be installed on Windows vCenter Server machine
IPV6 support
IPv6 is not supported. Only supports IPV4
Both  IPv4 and IPv6 are supported

vExpert 2014 Applications are Open Now !!!!

$
0
0
There’s chance to show the contributions of VMwareArena and get recognized. Nothing but vExpert 2014. I am happy to announce via my website that vExpert 2014 applications are open now. Applications of vExpert 2014 will be accepted untill March 6th Midnight PST. Applications received after March 6th will be roll into Q2 nomination & Voting Process. Got Shocked???.. Yes.There are new changes to vExpert Program
1. If you are a Current 2013 vExpert, Your 2014 application process has been shortened. Since you have proved yourself as a vExpert, you need to let them know the contributions since May 2013 vExpert announcement.
2. There will be quarterly nominations into 2014 vExpert program. Applications will be open year round at the end of each quarter. The voting process will begin for new vExperts from the previous quarter. So if you are not selected as vExpert 2014 right away, you will have change for quarterly voting and nominations.
As same as the last year, There are 3 different paths to prove yourself as vExpert.
 
Evangelist Path:
The Evangelist Path includes book authors, bloggers, tool builders, public speakers, VMTN contributors, and other IT professionals who share their knowledge and passion with others with the leverage of a personal public platform to reach many people. Employees of VMware can also apply via the Evangelist path. A VMware employee reference is recommended if your activities weren’t all in public or were in a language other than English.
Customer Path:
The Customer Path is for leaders from VMware customer organizations. They have been internal champions in their organizations, or worked with VMware to build success stories, act as customer references, given public interviews, spoken at conferences, or were VMUG leaders. A VMware employee reference is recommended if your activities weren’t all in public.
VPN (VMware Partner Network) Path:
The VPN Path is for employees of our partner companies who lead with passion and by example, who are committed to continuous learning through accreditations and certifications and to making their technical knowledge and expertise available to many. This can take shape of event participation, video, IP generation, as well as public speaking engagements. A VMware employee reference is required for VPN Path candidates.
Apply Now:
If you Current vExpert 2013, Use the Fast Track vExpert 2014 Application
 For 2014 vExpert Nomination ,2014 vExpert Application
I hope this is informative for you. Apply now to show your contribution to virtual community and get awarded by VMware as vExpert 2014. Thanks for Reading!!!!

Deploying a vApp failed with the error “Cannot initialize property “

$
0
0

This is my first post after the migration of the VMwareArena into wordpress platform. Today, when i was deploying the vCenter Operations manager appliance on my vCenter server, I was shocked by the error “Cannot initialize property ‘vami.netmask0.VM_1′. Network ‘VM Network’ has no associated network protocol profile”. I tried to troubleshoot the issue by re-configuring the Virtual Machine network port group settings but no luck. Came across a VMware KB2007012 article about this issue.

vApp-Deployment Error-1

This issue can occur if you don’t have a predefined set of IP address ranges for the Operations Manager appliance virtual machine. It needs to be configured under IP pools. IP pools provide a network identity to vApps. An IP pool is a network configuration that is assigned to an network used by a vApp. The vApp can then leverage vCenter Server to automatically provide an IP configuration to its virtual machines. You can set up an IP address range by specifying a host address range within a network.

Below are the procedure to add the IP Pool range in vCenter server to use by vApp.

1. Login to your vCenter Server using vSphere Client.

2. Click on the datacenter that contains your vApp and click on IP Pool tab. Click on Add to add the IP Pools.

 

vAPP-IP Pool configuration_1

3. Enter the Name for your IP Pool. I have named it as “Virtual Data network”. In the Properties dialog, Click on the IPv4 or IPv6 tab depending on the IP protocol used on your environment. Enter the IP subnet and gateway details.

4.  Select the check box “Enable IP Pool”. Enable this setting to specify an IP address range. Enter a comma-separated list of address ranges in the Ranges field. A range is specified as an IP address along with a pound sign (#) and a number indicating the length of the range. For example, 192.168.216.175#25 indicates the IPv4 range address can range from 192.168.216.175 to 192.168.216.200.

vApp-IP pool configuration-2

5. Click on Associations tab, select the networks that should use this configured IP Pool. Click on OK to complete the creation of the IP pool.

vAPP-IP Pool configuration-3

6. Now, you have configured the IP pool ” Virtual Data Network” under IP Pools tab.

vAPP-IP Pool configuration-4

 

After the IP pool has been created. I have powered on the vCenter Operations Manager vApp Successfully.  I hope this is informative for you. Thanks for Reading!!!

vSphere Distributed Switch Part 20 – Understanding dvSwitch Failover settings

$
0
0

This post of vSphere Distributed switch talks about the failover settings of the dvSwitch. This settings basically take care of how to act incase of failures caused at the network layer, such as NIC failures, port failure or physical switch failure ,etc. Let’s discuss about the Network failure detection settings. There are 2 types of network failure detection settings available at virtual switch settings.

1. Link Status only

2. Beacon Probing

Link Status only

This failure detection method relies solely on the link status which is provided by the network adapter. This option only detects failures such as cable pulls and physical switch power failures but it will not detect the configuration errors such as misconfiguration due to wrong VLAN or cable failure or pulls on the other side of a physical switch.

Beacon Probing

Beacon probing is a network failure detection mechanism that sends out and listens for beacon probes on all NICs in the team and uses this information along with link status to determine link failure. Beacon probing detects more failures as compared to link status method. It detects failures such as cable pulls and physical switch power failures on the immediate physical switch and also on the downstream switches.

ESXi host sends broadcasts beacon packets from all uplinks in a team and then physical switch task is expected to forward all the beacon packets to other ports which are part of the same broadcast domain. So, a team member will receive the beacon packets from other team members. If an uplink failed to receive 3 consecutive beacon packets, It will be marked as bad. This failure can be due to the immediate or a downstream link.

Notify Switches:

This options determines whether to notify or not notify the Switches in the case of failover. If you set Notify switches to Yes, whenever a virtual NIC is connected to the vSwitch or vNIC’s traffic is routed over a different physical NIC in the team because of any failure event, a notification will be send over the network to update the lookup tables on the physical switches. Do not use this option when the virtual machines using the port group are using Microsoft Network Load balancing (NLB) in unicast mode. No issues when use with multicast mode.

Failback Options

This failback option determines how a physical adapter is returned to its active duty after recovering from a failure.

Yes: If failback is set to Yes, then adapter will return to its duty immediately upon recovery by displacing the standby adapter.

NO: If failback is set to NO, then failed adapter is left inactive even after the recovery. Failback will not happen until another active adapter fails and requiring its replacement.

I hope this is informative for you. Thanks for Reading!!!. Be social and share it in social media if you feel worth sharing it.

VOTE for VMware Arena to place it in Top VMware/Virtulization 2014 Blogs list

$
0
0

This is one of my long awaiting voting pool to get recognized by my blog readers and Virtualization community users.  Nothing but  2014 TOP VMware & Virtualization blogs contents. This is the first year i got nominated for this voting category and i am expecting a great recoginzation from my website readers. It’s the time for everyone to show your support for VMware Arena  and get it  listed in  the top VMware & Virtualization blogs list.

There will be lucky draw for some great prize giveaways that include Nexus tablets, iWatches, headphones and more. Anyone that votes for the top blogs is eligible to win one of the prizes. In addition any blogger that makes the top 50 blog list is eligible to win prizes. Winners will be determined by a random drawing and announced on a special live results podcast after the voting ends.

VMware Arena is nominated under below 2 categories

1. Top Favorite Blog

2. Favorite Independent Blogger

To Vote for VMwareArena as your Favorite blog and Myself as  favorite Independent Blogger, Click on the below Image

vote for VMware Arena

 

Click on the Above Voting link and Click on Next to initiate the voting Process

1. Select Any 10 blogs which you feel that it’s your favorite blogs. VMware Arena is listed in the Name “VMware Arena (Mohammed Raffic) “. You can press CTRL+F and type your favorite bog name and search for it and choose.

Favourtite blogs

2. Second step is to rank the 10 blogs that you picked in the previous question with #1 being your most favorite blog. Votes are weighted so a #1 vote counts as 10 points, #2 vote counts as 9 points etc down to 1 point for a #10 vote. The total points for each blog will be added up and will determine the top 50 order. Drag and Drop the blogs listed in the left side to right side in the order which you want to rank from 1 to 10.

3. Third step is to vote in the special categories to help distinguish certain types of blog These categories are independent of the general voting and will have their own winners. Choose your favorite blog in each of the following categories.

a. Favorite Storage blog
b. Favorite Scripting blog
c. Favourite Podcast
d. Favourite New Blogger
e. Favourite Independent Blogger (VMware Arena is also nominated under this category)

Independent Blogger

4. Fourth step will be provide your name & email address and click on submit. That’s it You are done.

There will be lucky draw for some great prize giveaways that include Nexus tablets, iWatches, headphones and more. Anyone that votes for the top blogs is eligible to win one of the prizes. In addition any blogger that makes the top 50 blog list is eligible to win prizes. Winners will be determined by a random drawing and announced on a special live results podcast after the voting ends.

When casting your votes please keep the following in mind about the blogs.

Longevity – Anyone can start a blog but it requires dedication, time & effort to keep it going. Some bloggers start a blog only to have it fall to the wayside several months later. Things always come up in life but the good bloggers keep going regardless of what is happening in their life.
Length – It’s easy to make a quick blog post without much content, nothing wrong with this as long as you have good content in the post that people will enjoy. But some bloggers post pretty long detailed posts which takes a lot of time and effort to produce. The tip of the hat goes to these guys that burn the midnight oil trying to get you some great detailed information.
Frequency – Some bloggers post several times a week which provides readers with lots of content. This requires a lot of effort as bloggers have to come up with more content ideas to write about. Frequency ties into length, some do high frequency/low length, some do low frequency/high length, some do both. They’re all good and require a lot of time and effort on the bloggers part.
Quality – It all comes down to whats in the blog post regardless of how often or how long the blog posts are. After reading a blog post if you come away with learning something that you did not previously know and it benefits you in some way then you know you are reading a quality post. Good quality is usually the result of original content, its easy to re-hash something previously published elsewhere, the good bloggers come up with unique content or put their own unique spin on popular topics.

Click on the below Image to cast your Vote your favorite virtualization blogs

vote for VMware Arena

 

I believe everyone will vote for VMware Arena to list under the  TOP 5  favourite VMWare/Virtulization blogs. Thanks for reading !!!!

Free Tools : New Version of RVTools Released

$
0
0

RVTools,a great windows .NET 2.0 application which uses the VI SDK to display information about your virtual machines and ESX hosts. New version of RVTools has been released which is RVTools 3.6. It is one of the tool that every vMware admin should have in their machine. RVTools doesn’t simply display the information about your Virtual infrastructure but also perform some administrative actions like VMware tools upgrade and disconnect cd-ROM and Floppy drive.

RVTools can interact with almost all versions of vCenter and ESX/ESXi host including VirtualCenter 2.5, ESX Server 3.5, ESX Server 3i, VirtualCenter 4.x, ESX Server 4.x, VirtualCenter 5.0, VirtualCenter Appliance, ESX Server 5.0, VirtualCenter 5.1, ESX Server 5.1, VirtualCenter 5.5, ESX Server 5.5.

Using RVTools, you can connect to vCenter server or ESXi host to collect the information.

RVTools -VMware Arena-1

New features available as part of RVTools 3.6:

vCluster Tab – New tab with cluster information

RVTools -VMware Arena-2
vMultipath Tab – New tab with multipath information

RVTools-Multipath -VMware Arena-3
vInfo Tab displays the below new fields in the RVTools 3.6

a. HA Isolation response and HA restart priority information
b. Cluster Affinity Rule information
c. Connection State and suspend time
d. Connection state and suspend time
e. vSphere HA protection state for a virtual machine (DAS protection)
f. Quest state

RVTools -vInfo-VMware Arena-4

vCPU Tab – Displays new fields Hot Add and Hot remove information and also displays with CPU/Sockets/Cores information

RVTools-vCpu-Vmware Arena-5
vHost tab – Displays new fields vMotion support and Storage vMotion support
vMemory tab – Displays a new field called Hot Add
vNetwork Tab – Displays a new field called VM folder
VSC_VMK Tab – Displays new field called MTU

Bugs fixed in this release:

1.Datastore bug for ESX version 3.5
2.VMFolder bug when started form the command line
3.Improved documentation for command line options

You can  download RVTools and enjoy collection the useful information about your virtual infrastructure. I hope this post will be informative to you. Thanks for reading. Be Social and share it in social media, if you feel worth sharing it.


VMware vCenter Log Insight Part 1 – Initial Configuration

$
0
0

VMware vCenter Log Insight is a Virtual appliance from VMware that allows administrators to view, analyze and manage the syslog data. It allows the administrators to consolidate, monitor and analyze the logs to troubleshoot the vSphere efficiently and also it helps to perform security auditing and compliance management. vCenter Log Insight appliance is multipurpose appliance that includes syslog server, log consolidation and log analysis. vCenter Log Insight delivers automated log management through aggregation, analyze and search, providing operational intelligence and enterprise-wide visibility in dynamic hybrid cloud environments. It reads ,collects and analyze all types of machine generated log data such as application logs, configuration files, performance data and messages. You can connect almost operating systems, storage,firewalls, networks devices such as routers and switches to vCenter Log Insight.

Deployment procedure of vCenter log Insight will be same as the other VM deployment using OVA or OVF into vSphere. I am not going to spend time to explain you the import OVF steps. This post covers the initial configuration of vCenter Log Insight and integration with VCenter Operations Manager.

vCenter log insight_1

Once the deployment of the vCenter Log insight is completed. Go to the web browser and type the IP address or host name of the vCeter Log Insignht server in the below format.

https:// log_insight-host/

At first time, initial configuration wizard will open, click on Next

vCenter log insight_2

Update the email address and password for the admin account and click on Save and Continue

vCenter log insight_3

Enter the license key for your vCenter Log Insight and click on Set Key and click on Continue

vCenter log insight_4

In General Configuration page, enter the email address in which you want to receive the system notifications from vCenter Log Insight. Select the check box “Send weekly Trace data to VMware as part of the customer Experience improvement program” , if you want to participate in the customer experience improvement program. Click on Save and continue

vCenter log insight_5

You can either configure the time synchronization of vCenter Log Insight with NTP server or ESX/ESXi host.Configure the settings as per your environment .click on Save and Continue

vCenter log insight_6

 Specify the SMTP server settings which are used to enable outgoing email for alerts and system notifications from vCenter Log Insight. Optionally to test the configured setting, you can enter email address and test the email flow using Send Test mail option. Once settings are updated, click on Save and continue

vCenter log insight_8

The integration between vCenter Log insight and vCenter operations manager can be established to enable sending Log Insight alerts to vCenter Operations Manager. Enter the details about your vCenter Operations manager. This is an optional setting.Specify the credentials and hostname of vCenter Operations Manager UI VM.

Select the check box “Enable Alerts Integration” to allow vCenter Log Insight to send alert notifications triggered by Log Insight alarms.

Select the check box ” Enable Launch in Context”. Which requires vCenter Operations Manager v5.7.1 or later. When you enable the Launch in context, a Log Insight resource is created under the HTTP post adapter in vCenter Operations Manager.The resource identifier contains the IP address of the Log Insight instance, and is used by vCenter Operations Manager to open Log Insight.
Click on Test connection if you want to test the connectivity.

vCenter log insight_9

Select Enable Data Archiving if you want to achieve log data to an NFS location and enter the path to the storage location. Click on Test to test the connectivity between vCenter Log Insight and Storage location. Click on Save and Continue.

vCenter log insight_10

Click on Restart. restart is required to complete the setup process.

vCenter log insight_11

vCenter log insight_12

Once Restart is complete, Access the vCenter Log Insight using the below URL on your web browser.

vCenter log insight_13

I believe this is informative for you. In the Next post, we will how to Integrate vCenter Server Log Insight with your vSphere environment  to collect the logs. Thanks for Read.  If you like this site and content, Please spend 2 mins to vote for “VMware Arena” to get #1 in TOP vBLOG Competition.

VMware vCenter Log Insight Part 2 – vSphere Integration

$
0
0

We have gone through the detailed step by step procedure for the initial configuration of  vCenter Log Insight server in your previous post “Initial Configuration”. vCenter Log Insight appliance is multipurpose appliance that includes syslog server, log consolidation and log analysis. vCenter Log Insight delivers automated log management through aggregation, analyze and search, providing operational intelligence and enterprise-wide visibility in dynamic hybrid cloud environments. It reads ,collects and analyze all types of machine generated log data such as application logs, configuration files, performance data and messages. You can connect almost operating systems, storage,firewalls, networks devices such as routers and switches to vCenter Log Insight.

Greatest feature of the vCenter Log Insight is its integration with lot of VMware products such as ESX/ESXi host , vCenter Server, vCenter Operations managers,etc. It is so easy to perform the log management and troubleshoot analysis of the log files of your vSphere environment easily by integrating with your vSphere environment. This post is going to explain the detailed procedure for the integration of your vSphere environment with vCenter Log Insight.

Access your vCenter Log Insight Server using the below URL and login with the admin credentials.

https:// log_insight-host/

vCenter Log Insight - vSphere Integration -1

If you didn’t integrated your vSphere environment with Log Insight, It will display the  below option for the integration. Click on vSphere Integration Page for the setup.

vCenter Log Insight - vSphere Integration -2

You can integrate the vCenter Log Insight with your vCenter server or directly to the ESXi host. Below 2 operations can be achieved from the Log Insight with the vSphere integration.

1. You can collect vCenter Server events, tasks and alarms

2. Configure ESXi hosts to send logs to Log Insight

Enter your vCenter Server hostname and IP address. Provide the administrative credentials for your vCenter server.  Click on Test Connection to test your connectivity. You can add multiple vCenter Servers using the option ” Add vCenter Server”. Click on Save.

vCenter Log Insight - vSphere Integration -3

Click on Advanced options under ” Configure ESXi hosts to send logs to Log Insight” to Configure all ESXi hosts or to configure specific ESXi hosts. Select the particular ESXi hosts from the list to configure it.

vCenter Log Insight - vSphere Integration -4

ESXi 4 hosts can only have one syslog target. You can define the option to handle the logs collection for ESXi 4 hosts. Select either one of the options to handle the ESXi 4 hosts syslog target. You have a option to configure the protocol for your syslog traffic.

1. Overwrite  existing syslog target for ESXi 4 hosts

2. Do not overwrite (logs from ESXi 4 hosts will not be send to Log Insight)

Once the Integration of  the vCenter Log Insight with vSphere is completed. You will be able to see the events from your vCenter server are started reporting on the homepage of the vCenter Log Insight.

vCenter Log Insight - vSphere Integration -5

you will be able to see the log files sending to your vCenter Log Insight from your ESXi hosts under Interactive Analytics.

vCenter Log Insight - vSphere Integration -6

Cool isn’t.  we will see detailed procedure  to perform  various operations using vCenter Log Insight. Thanks for reading!!. I hope this is informative for me. Sharing it in social media, If you feel worth sharing it.

Disable ESXi shell and SSH warning for ESXi host

$
0
0

ESXi shell and SSH are the 2  command line option mostly used by the VMware Administrators along with PowerCLI. Mostly ESXi Shell will be used for the initial configuration of ESXi host after the build and at the time of ESXi server is not reachable on the network. SSH is mostly used all the times by administrators. So, We will be enabling ESXi shell and SSH mostly in our virtual environment for administrative purposes.

shell-supress3

shell-supress4

If you have enabled this 2 options (SSH and ESXi shell) in your ESXi host, There will be annoying alert always displaying the Configuration Issues (ESXi shell for the host has been enabled and SSH for the host has been enabled) under your ESXi host summary tab.

shell-supress1

This annoying alert can be suppressed by simply changing the advanced settings of your ESXi host. Login to your vCenter server or ESXi host using vSphere client.

Under Configuration tab, Click on Advanced Settings -> Click on UserVars

Change the Value of “ UserVars.SuppressShellWarning” = 1 to suppress the warnings . Click on ok. Default value is 0.

shell-supress2Once Value has been set, Your annoying warning on the ESXi host will disappear. I hope this is informative for you. Thanks for Reading !!!! Be social and share it in social media, if you feel share it.

ESXi Query Network Hint: CDP information of ESXi host in Command Line

$
0
0

This post will be really helpful when you are troubleshooting your ESXi host network communication issue. As ESXi admin, We will not be knowing much information about the physical switch  configuration for our ESXi host but still we will be able to get the phsyical switch information using the CDP (Cisco Discovery Protocol). The Cisco Discovery Protocol (CDP) is a Cisco’s proprietary Data Link Layer protocol used to share information about other directly connected Cisco equipment, such as upstream Physical switch.

CDP allows ESX and ESXi administrators to determine the vSwitch is connected to which Cisco switch port. You will be able to see the properties of the Cisco switch, such as device ID, software version, and timeout from the vSphere Client when the CDP is enabled on the vSwitch. This information is useful when troubleshooting network connectivity issues related to VLAN tagging methods on virtual and physical port settings.

 

CDP information

 

Image thanks for VMware.com

Good to know. Ok, Let’s imagine the situation,  ESXi host is not reaching in the network. You are not able to connect to your ESXi host using Putty or vSphere Client. How to do identify the CDP information and collect the network switch and Port details in which your ESXi host vSwitch or vmnic is connected. This post helps you to achieve this just from the ESXi shell from your console Connection such as ILO or DRAC. This command can also be used when you connect your ESXi host using SSH connection.

Execute the below command to identify the Switch Name and Switch Port ID in which your vmnic “vmnic0″ is Connected:

~ # vim-cmd hostsvc/net/query_networkhint –pnic=vmnic0 | egrep ‘portId|devId’

devId = “cisco-swt1.vmwarearena.com(SSI55030KNE)”,

portId = “Ethernet107/1/13″,

In the baove command, DevID is the Switch name and PortId is the Ethernet port on the switch.

Execute the below command to identify the Switch Name and Switch Port in which you vmnic “vmnic1″ is Connected:

~ # vim-cmd hostsvc/net/query_networkhint –pnic=vmnic1 | egrep ‘portId|devId’

devId = “cisco-swt1.vmwarearena.com(SSI55030KNE)”,

portId = “Ethernet108/1/13″,:

Execute the below command to identify the VLAN Id’s which are tagged for your vmnic “vmnic1″:

~ # vim-cmd hostsvc/net/query_networkhint –pnic=vmnic1 | egrep ‘vlan’

vlanId = 32,

vlanId = 87,

vlanId = 88,

vlanId = 89,

vlanId = 3052,

vlanId = 0,

vlanId = 3061,

vlanId = 59,

vlan = 1,

VLAN’s which are visible from the command output are listed by your vmnic using CDP. There may be a chance that some vlan’s which are tagged by not visible in the above command. It is  best to collaborate with your network team to get more detailed networking information.

 Execute the below command to Get the observed IP subnet information of your vmnic “vmnic1″ :

~ # vim-cmd hostsvc/net/query_networkhint –pnic=vmnic1 |egrep ‘ipSubnet’

ipSubnet = “192.161.28.224-192.161.28.254″,

ipSubnet = “192.162.27.206-192.162.27.206″,

ipSubnet = “192.164.83.171-192.164.83.171″,

ipSubnet = “192.162.10.1-192.162.11.254″,

ipSubnet = “192.162.125.2-192.162.125.2″,

ipSubnet = “192.161.1.1-192.161.1.1″,

ipSubnet = “172.16.192.128-172.16.192.143″,

ipSubnet = “0.0.0.1-255.255.255.254″,

 Execute the below command to collect the complete network hint information for your vmnic “vmnic1″. It displays the the VLAN info, IP address information, Physical Switch name, Physical Switch information like switch model, software version ,location,etc and network configurations of the physical switch.

~ # vim-cmd hostsvc/net/query_networkhint –pnic=vmnic1

(vim.host.PhysicalNic.NetworkHint) [

(vim.host.PhysicalNic.NetworkHint) {

dynamicType = <unset>,

device = "vmnic1",

subnet = (vim.host.PhysicalNic.NetworkHint.IpNetwork) [

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 32,

ipSubnet = "192.162.21.192-192.162.21.254",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 87,

ipSubnet = "192.162.27.206-192.162.27.206",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 88,

ipSubnet = "192.164.83.171-192.164.83.171",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 89,

ipSubnet = "192.162.10.1-192.162.11.254",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 3052,

ipSubnet = "192.162.125.2-192.162.125.2",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 0,

ipSubnet = "192.161.1.1-192.161.1.1",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 3061,

ipSubnet = "172.16.192.128-172.16.192.143",

},

(vim.host.PhysicalNic.NetworkHint.IpNetwork) {

dynamicType = <unset>,

vlanId = 59,

ipSubnet = "0.0.0.1-255.255.255.254",

}

],

connectedSwitchPort = (vim.host.PhysicalNic.CdpInfo) {

dynamicType = <unset>,

cdpVersion = 2,

timeout = 0,

ttl = 146,

samples = 11606,

devId = “cisco-swt1.vmwarearena.com(SSI55030KNE)”,

address = “192.162.160.24″,

portId = “Ethernet108/1/13″,

deviceCapability = (vim.host.PhysicalNic.CdpDeviceCapability) {

dynamicType = <unset>,

router = false,

transparentBridge = false,

sourceRouteBridge = false,

networkSwitch = true,

host = false,

igmpEnabled = true,

repeater = false,

},

softwareVersion = “Cisco Nexus Operating System (NX-OS) Software, Version 5.2(1)N1(4)”,

hardwarePlatform = ” N5K-C5596T “,

ipPrefix = “0.0.0.0″,

ipPrefixLen = 0,

vlan = 1,

fullDuplex = true,

mtu = 1500,

systemName = “cisco-swt1″,

systemOID = “1.7.6.1.5.1.9.12.13.1.3.1384″,

mgmtAddr = “192.162.160.24″,

location = “India,Bang-KR “,

},

lldpInfo = (vim.host.PhysicalNic.LldpInfo) null,

}

]

I hope this is informative for you. Thanks for Reading!!!. Be Social and share it in social media, if you feel worth sharing it.

VMware vCenter Log Insight Part 3 – Send your vCenter appliance logs to Log Insight Server

$
0
0

 

As you all aware that, VMware vCenter Log Insight is a Virtual appliance from VMware that allows administrators to view, analyze and manage the syslog data. It allows the administrators to consolidate, monitor and analyze the logs to troubleshoot the vSphere efficiently and also it helps to perform security auditing and compliance management. vCenter Log Insight appliance is multipurpose appliance that includes syslog server, log consolidation and log analysis. vCenter Log Insight delivers automated log management through aggregation, analyze and search, providing operational intelligence and enterprise-wide visibility in dynamic hybrid cloud environments. It reads ,collects and analyze all types of machine generated log data such as application logs, configuration files, performance data and messages. You can connect almost operating systems, storage,firewalls, networks devices such as routers and switches to vCenter Log Insight.

This post is going to explain you with the procedure to configure your vCenter Server Appliance (vCSA) to send its logs files to the vCenter Log Insight server. So that you will  have the log files of your vCenter Server appliance also included in the Log Insight server and it will ready for the intelligent analysis incase of troubleshooting.

Log in to your vCenter Server Appliance(vCSA) server with your root credentials using SSH connection such as Putty.  Browse towards the directory, /etc/syslog-ng using the below command

cd /etc/syslog-ng

Edit the syslog-ng.log using the editor such as Vi editor. Enter the below command to edit the syslog file

vi syslog-ng.conf

EasyCapture1

Add the following text at the end of the file “Syslog-ng.conf”. Using the below config, we are sending the following log files (vpxd.log, vpxd-alert.log, vws.log, vmware-vpxd.log, ds.log) from your vCenter server appliance to your vCenter Log Insight server. You can add or remove the log files by your choice.

source vpxd {
file(“/var/log/vmware/vpx/vpxd.log” follow_freq(1) flags(no-parse));
file(“/var/log/vmware/vpx/vpxd-alert.log” follow_freq(1) flags(no-parse));
file(“/var/log/vmware/vpx/vws.log” follow_freq(1) flags(no-parse));
file(“/var/log/vmware/vpx/vmware-vpxd.log” follow_freq(1) flags(no-parse));
file(“/var/log/vmware/vpx/inventoryservice/ds.log” follow_freq(1) flags(no-parse));
};
destination loginsight { udp(“<loginsight-host>”); };
log { source(vpxd); destination(loginsight); };

 

EasyCapture2

Enter the Log Insight host name in the place of “<loginsight-host>” in the above text. Even you can specify the protocol TCP in the place of UDP. Once the above lines are added in the config file. Save the file and exit using the below command by pressing Esc key and enter :wq!  to save and exit the config file.

Restart the Syslog server for the configuration to apply. Restart using the below command

Service syslog restart

EasyCapture3

That’s it.  Your vCenter Log Insight server will start receiving the log files from your vCenter Server Appliance(vCSA). I hope this is informative for you. Thanks for reading!!!.

Viewing all 326 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>