Tag Archives: vSphere
Just this past Monday Infinio announced the general availability of the third iteration of their performance enhancing software, Accelerator 3.0. If you haven’t heard of Infinio I would certainly recommend checking them out – They are one of really only a few companies providing true server-side caching for virtual machines. On a side note one interesting fact about Infinio is that they actually came out of stealth during a Tech Field Day presentation – a pretty cool entry if you ask me!
Accelerator 3.0 marks the third major release from Infinio since they entered the market in 2013 – with each bringing something new and exciting to the table. So what’s new this go around? – A few things caught my attention…
Built on VAIO
Along with vSphere 6.0 U1 came something called VMware VAIO, or more specifically vSphere APIs for IO Filtering. This is essentially a framework – a framework provided by VMware allowing for third party vendors to insert their technology directly into an IO stream of a VM. As you can imagine disrupting the I/O stream of a VM could potentially have performance implications. By utilizing VAIO, third parties are now able to do this is in a safe and certifiable manner – using API calls and technology that is supported by VMware. Accelerator 3.0, from what I can see is one of the first products to be certified on and utilize VAIO. It should be noted however that even though VAIO was available with vSphere 6.o U1, Accelerator 3.0 requires vSphere 6.o U2!
The Infinio I/O filter gets installed onto each host within your cluster, which then in turn provides acceleration on a per-VM basis, rather than accelerating complete datastores. This type of functionality is also completely integrated within the Storage Policy-Based Management functionality – For instance with VVOLs we are able to dictate via policy which type of disk our VMs sit on along with many other array provided technologies they utilize – in addition to this Infinio Accelerator will allows us to attach policies to determine the cache properties and acceleration of these VMs.
Memory and SSD
Infinio has always been known for their use of server RAM for an acceleration medium. In addition to this, Accelerator 3.0 gives customers the choice to offload cache to local SSDs and PCIe/NVMe flash as well, all the while supporting the acceleration of any type of storage be it SAN, NAS, DAS, VSAN, VMFS, vVOLs, etc. In the end we have somewhat of a tiering effect for cache – RAM being the primary and as data is aged it flows down to flash – allowing us to have fast performance for primary cache while having an option for a larger cache size.
While these were the features that certainly grabbed my attention its the performance that Infinio is highlighting. Through it’s early adopters of Accelerator 3.0 Infinio has seen 1 Million IOPS per host, coupled with an astounding 20GB/sec of throughput!! If you are interested in learning more about the product I suggest that you jump onto one of their 30 minute demos that they offering – with the next one occurring on June 23rd @ 1PM EST. Also, if you need a little literature before hand you can also pull down the product whitepaper! More of a hands on type of person – get your hands on a 30 day free trial here! Infinio has always stressed that they are a risk free product – in the past I’ve installed and removed Infinio into live production environments without experiencing any downtime whatsoever – and I’m sure things haven’t changed with this release!
I think we can all agree that ol’ Al Einstein was a pretty smart dude right? Especially when it came to his thoughts around insanity and the “doing the same thing over and over and expecting different results” spiel. The thing is Al’s not here anymore and while yeah, he was a wise one, he never had to install the vSphere Client Integration plug-in inside of the newest version of Google Chrome – if he did, he’d certainly place himself inside of his own definition!
So here’s the issue at hand – One fine July morning I find myself sitting in front of the same message shown above! “How odd…” I thought, “I could’ve swore I’ve already installed this!” Either way it’s not a big deal, I’ll just install it again! So, shutdown the 84 tabs inside of Chrome that I have open and away we go – next, next, next my way through the wizard, re-open my 84 tabs and…
Huh?!? Now I know that I’ve installed this! Maybe it’s just not enabled! So I check out plugins section within Chrome to see that…
Wow! It’s not even listed anymore! Now I know it used to be there as I can remember going in and ensuring that it was always allowed to run. After another failed attempt at installing it with the same result I do what I always do – Google! And to my surprise end up at this KB.
To the point!
To skip my little story and get to the point the problem resides with NPAPI – an architecture used to extend browser functionality. Google says the 90’s era architecture is outdated and causes crashes and therefore, as of Google Chrome 42 – not enabled! That same 90’s era architecture is the delivery model within the vSphere Client Integration plug-in – so you can see where the problem now lies!
To make a long problem short all we need to do in order to get the plug-in to run is simply enable NPAPI within Chrome, which is done by entering “chrome://flags/#enable-npapi” in the address bar and simply clicking ‘Enable’.
This will get us through….for now! Who knows when Google may decide to phase support for this out completely? They are on their own schedule and it wouldn’t surprise me to see them just drop support sometime in the near future! I mean, it does stand for the Netscape Plugin Application Programming Interface, which to me sounds just a little archaic 🙂
In the meantime we will have to put up with a nifty little warning every time we fire up the vSphere Web Client – because, who doesn’t want to close two warnings every morning?!?! Either way it’s working now, I tried something different and got different results! My man Al would be proud!
Today Ravello Systems, a company based out of Palo Alto and Israel announced a new beta, a beta that I think is going to go over very well within the VMware community – one that will allow us to spin up vSphere labs, complete with vCenter Server, ESXi hosts, Domain Controllers, Storage and Network services and all the VMs that go with the punch inside of Google and Amazon’s cloud. To be honest I was kind of skeptical when I first started working with Ravello? I mean, come on, an ESXi host in Amazon, let alone and ESXi host running VMs inside of Amazon, an ESXi host running VMs with little to no performance penalty, all running within Amazon – you can see why I might of cringed a bit. But Ravello gave me a shot to try it for myself – and during the introductory chat as they were showing me how things worked I thought, hey, what a use case for the new cross vCenter vMotion capabilities in vSphere 6! A lab in Amazon, a lab in Google Cloud, and VMs migrating between them – how cool is that?
Who and what is Ravello Systems?
Now, before I get into the details of the vMotion itself I want to take a step back and explain a little bit about Ravello Systems themselves, and what they have to offer. Ravello was founded in 2011 with the sole purpose of supporting and driving nested virtualization to the next frontier and did so when they launched their product globally in August of 2013 (You had to of seen the scooters at VMworld 🙂 ) They didn’t just want to simply provide an environment for nested virtualization though, they wanted to make it simple and easy for companies to replicate their data center infrastructure into the public cloud. The core technology behind all of this is their HVX hypervisor – essentially acting as a Cloud VM, sitting in either Amazon or Google and providing overlay networking and storage to the VMs that are placed on top of it.
As per the diagram above the VMs present can be built from scratch or imported via an OVA within Ravello’s very easy to use intuitive interface – but perhaps more interestingly you can utilize the Ravello Import Tool(??), point it to your ESXi host or vCenter, and import VMs directly from your environment into the cloud! But they don’t stop there, Ravello can also detect and create every network your VM is attached to, deploying an exact duplicate of your network infrastructure! Now if this wasn’t good enough for you the beta today announces the ability to support Intel VT through HVX – which means we can now run VMs on top of ESXi on top of HVX on top of Amazon or Google! True inception leaving us with a setup shown in the diagram below.
A great place to break things!
There is a reason why Ravello dubs their technology as having the ability to create “Smart Labs”! Throughout my early access to the solution I broke and fixed so many things within my applications – and Ravello always gave me a way to rebuild or reconstruct my labs in a very efficient manner.
First up we are able to save our VMs to the library – which is essentially a personal set of VMs and images that we can re-use in all of our applications. For example I only had to build my ESXi 6.0 image once – after saving this to the library I was able to simply drag and drop this VM as many times as needed to as many applications as needed, simply re-ip and re-naming after I was done.
Having the ability to re-use VMs is cool but the blueprint functionality that Ravello provides is really where I see value! We are able to take a complete application, in my instance an ESXi host, domain controller, vCenter Server, etc and save the entire application as a blueprint. Blueprints are then available to be used as starting points for new applications – meaning I can build a complete lab on Amazon, save as a blueprint, and then publish a new application to Google which is an exact identical copy, networks and all. Blueprints are an excellent way to test out the different public clouds as well as version or snapshot your entire lab before making any major changes – if things go awry you can simply republish your saved blueprint to a new application.
Enough talk – Let’s see the vMotion!
Alright! Let’s get to it! Let me first warn you, the environment I built to do this was quick and dirty – not a lot of polishing going on here.
The two applications we will be using are Google-vxlan and EC2-vxlan – I’ll let you guess which public clouds each is published to.
As shown above these applications are pretty similar; each containing an Ubuntu server (used to establish the vxlan tunnel between EC2 and Google), a pfSense appliance that provides a VPN for my vMotion networks, a vCenter Server (the Windows version), and an ESXi host (just one for now). The EC2 application also contains a jumpbox VM which provides entry into the local network as well as DNS services.
As far as networking goes the setup at both Amazon and Google is almost identical with the exception of the jumpbox. The 192.168.0.0/24 network is available at both EC2 and Google. The 10.0.0.0/24 network is the only network that is routed to the internet, therefore my only access into the labs outside of the Ravello GUI – this is why the jumpbox also has a connection to this network – to act as an RDP gateway of sorts. The two Ubuntu servers have an elastic public IP attached to them in order to ensure the public IP doesn’t change and mess up my vxlan config. The free trial of Ravello gives you two elastic IPs, and four other DCHP public IPs (subject to changing every now and then). The vxlan tunnel is established between the two elastic IPs in order to provide Layer 2 connectivity between Amazon and Google. The pfSense boxes each have a dynamic public IP attached to them with an IPSEC tunnel established between the 192.168.1.0/24 and the 192.168.2.0/24 networks.
On the VMware side of things I have two vCenters with embedded PSCs (i know – bad practice) – one in Amazon and one in Google, which are attached to the same SSO domain and configured in Enhanced Linked Mode. Therefore whatever is at Google can be seen at Amazon and vice versa. As far as vMotion goes I’ve simply enabled this one my existing management interfaces (more bad practice – but hey, it’s a lab). There is local storage attached to the ESXi hosts and one VM named EC2-VM1 present.
So my goal was to migrate this VM from Amazon to Google and back again, taking both the compute and storage with it. Now just writing about a vMotion is not that exciting so I included a video below so you too can see it move 🙂 It’s my first attempt at a video and had some screaming kids while I made it so yeah, no narration – I’ll try and update with a little tour of the Ravello environment later 🙂
So there you have it – a VM moving from Amazon to Google and back, all while maintaining its’ ping response – pretty cool!
Is Ravello worth it?
So, with all this the question now remains is Ravello worth the cost? Well, considering as how Ravello estimates the cost of a two ESXi Node, vCenter and Storage lab to be on average $0.81 – $1.71 per hour (usage based, no up front costs) I would certainly say it is! The ability to run nested ESXi hosts on top of the public cloud provides a multitude of use-cases for businesses – but honestly I see this being a valuable tools for the community. I plan on using Ravello solely for my home lab usage over the next year or so – it’s just so much nicer to break things and simply re-publish an application than it is to try and rebuild my lab at home. If you want to give Ravello a shot you can sign up for the beta here – Even after the beta expires you simply swipe your credit card and pay Ravello directly – no Amazon accounts, no Google bills – just Ravello! You will be limited during the beta’s and free trials in the amount of CPU, RAM and concurrent powered on VMs but they definitely give you enough resources to get a decent lab setup.
Ravello has a great solution and certainly expect more from me in regards to my lab adventures in the public cloud.
It should be no surprise to any of my regular readers or followers that I am a huge fan of vCenter Operations. Being a VMware customer I find that it is a huge time-saver when trying to pin point performance issues within our environment, as well as giving us a great first step in trying to do capacity planning and figure out where we are going to need to go next. So, it should also be no surprise that I get just a little excited when there is a new release of the product; be it only a .1 release, still super awesome none the less.
It goes without saying that you should see a few posts diving deeper into some of the new features listed below as well as in the official release notes, as well as a quckie about how to upgrade, but for now, without further ado, the newest features from vCenter Operations 5.7 from vmware.com…
More Flexibility with Capacity Planning
This release introduces new diagnostics metrics to monitor the health and availability of vCenter Operations Manager components, such as Analytics, Collector, Active MQ, Web server, database, and operating system.
Widgets with Improved Flexibility and Usability
New Custom Relationship Widget
Allows you to build a custom resource hierarchy and relationship view, just like the existing out-of-the-box vCenter Server view.
Custom UI Import and Export Changes for Dashboards and Super Metrics
Balanced Metrics Profile
This release introduces a new metrics profile that reports a reduced set of metrics. Increase the scalability of vCenter Operations Manager to support more resources by changing the metrics profile to the new “Balanced” profile in vCenter Operations Manager Administration.
VMware vCenter Infrastructure Navigator Filtering Capability
You can configure how resources discovered by vCenter Infrastructure Navigator are displayed in vCenter Operations Manager. This release introduces a configurable filtering capability to the vCenter Infrastructure Navigator adapter to control Application service and Application resource reporting. For each resource type, you can configure either “blackList” or “whiteList” filtering in the configuration file filterList.txt.
New Browser Support
This release adds new support for the following browsers: Apple Safari version 6, Google Chrome versions 24 and 25, and Mozilla Firefox 18 and 19.
This release includes additional security hardening and increases compliance with The Defense Information Systems Agency (DISA) and The Security Technical Implementation Guides (STIG) guidelines.
Are you ready? Let’s go! That seemed to be the catch phrase that presenter Scott Lowe (blog/twitter) rhymed off before starting off the awesomesauce that is each lesson of Trainsignal’s Designing VMware Infrastructure video training. Now I know the word awesomesauce is overused, I’ve even used it multiple times but in this case there is just no other way to describe the content and how Scott delivers this content throughout this course. And speaking of content there is a lot of it, over 6 hours of training at your fingertips and in true TrainSignal fashion available in multiple formats (DVD, iPOD/iPAD, Online). Don’t trust my word that Scott’s presentation and knowledge is awesomesauce? Check out a little (1 hour) teaser called VMware vSphere Design 101 over on TrainSignals site. Its a great example (minus the audio) of how well of a speaker and how knowledgeable Scott is in the realm of design. Below you can see how the course is laid out in the form of lesson content and as you can see it covers a wide variety of details.
Getting Started with Designing VMware Infrastructure
Designing vSphere Environments in the Real World
Understanding vSphere Design Terminology
Determining vSphere Design Factors
Defining a Logical Design
Defining a Logical Compute Design
Creating a Logical Network Design
Creating a Logical Storage Design
Building Security Into the Logical Design
Specifying Backup and Availability in the Logical Design
Designing the Management Layer
Mapping the Logical Design to Actual Solutions
Creating a Physical Storage Design
Creating a Physical Network Design
Sizing Hosts, Clusters, and Resource Pools
Defining VM Attributes
Incorporating Implementation and Test Plans
Bringing It All Together
Preparing for Your VCAP-DCD Certification Exam
So on to the meat and potatoes. This course covers everything you need to know about vSphere Design. Scott described vSphere design as a holistic design, meaning everything is connected and interlinked. Even the way he delivered the course was holistic, meaning in almost every lesson Scott went back and stressed the importance of how the four main design factors (Requirements, Assumptions, Risks, and Constraints) affect the area being discussed and how they are interlinked to every step of the design process. Now I can’t go through every single lesson, I’ll let you do that, the outline is listed above but what I can do is highlight some of my favorite items…
- Throughout the course Scott frequently accesses and references a couple real design documents. One being the VMware Cloud Infrastructure Case Study (available online), but here’s the exciting part, the other being Scott’s actual design he used during his VCDX defense. Very cool to have that high level of an example embedded into the course
- Secondly I love the flow of this course – meaning in a large number of lessons Scott will often reflect on some learning from another lesson and show you how everything is related and how any decisions made in one part of the design phase can most likely affect decisions made in another and inevitably affect your overall design.
- Scott does an awesome job at explaining the four key factors in vSphere design and repeatedly refers to them and shows how four simple terms basically define your complete design.
In my current role I’m more adapted to a sysadmin, you know, the guy that’s primarily responsible for maintaining and implementing everything…not the architect, not the designer – but – after watching this course I’ve gotten excited about design and excited about architecting solutions. Heck, I’m now thinking about maybe tackling the VCAP-DCD. So I’m not going to say that this course is only for the designers and architects because it’s not. This is a great course for anyone working within a vSphere environment, anyone with passion for VMware’s technology, or how would TrainSignal put it..any vNerd! As with all of TrainSignal’s VMware Training I thoroughly enjoyed this one and would most certainly recommend this to anyone!
And guess what?!?! It’s that special time of year again to say Happy New Sphere to everyone and maybe get yourself a copy of this training for yourself complements of Trainsignal! Watch this space closely for details as mwpreston.net along with Trainsignal will be giving away a copy of this along with a few other prizes (hopefully). Are you ready, Let’s go!
Once again i was lucky enough to attend my local quarterly Toronto VMUG meeting at the convention center in Toronto Since i missed the last one i was beginning to run short of my VMUG fix but this one certainly fulfilled that. All in all it was a fantastic day getting to talk to VMUG leader Angelo Luciani and fellow member ( and presenter for the day) Eric Wright (blog/twitter). Below are my thoughts and comments from the presentations for the day. As the slide decks come in i will be sure to add them to this post.
Angelo started off the day with a brief overview of what’s new and upcoming with the Toronto VMUG. Honestly, the amount of work and time this guy puts into making each and every one of these days informative and a success is amazing. He is a great advocate for the VMware community as he seems to be in the know about almost everything that is happening within it. The full day VMUG regional conference is coming up sometime in February and I can’t wait till that one, as they are always a huge benefit to anyone in any stage of virtualization.
Next up Mike from VMware Canada gave a brief presentation outlining some of the announcements and releases that came out of VMworld. Included in this was a great explanation on how VMware is perceiving the vCloud Suite as the building blocks or the infrastructure behind the cloud and more specifically the software defined datracenter. It’s too bad that these presentations don’t have audio because I found this slide deck very beneficial in my understanding of where VMware stands with these products as well the various pieces that are included within them.
And now on to the sponsors, McAfee gave a great presentation on how they have aligned a number of recent acquisitions and products to the complete datacenter stack and how each and every component of the datacenter requires an effective level of security. They spent a great deal of time displaying features and different configurations on how customers can deploy their MOVE AV solutions. This looks like a pretty solid piece of technology and has an interesting take on providing security by white-listing safe applications to protect against zero day exploits. As consolidation ratios continue to grow our perception on how to tackle antivirus will certainly have to change and I think McAfee has certainly taken a step in the right direction in providing customers with different options. As always, any presentation revolving around security sparked a ton of conversation within the room, and McAfee did a fabulous job at fielding all the questions.
PureStorage was the next sponsor on stage…well kinda. There was an unfortunate event (SANDY) which resulted in the presenter not being able to attend, however as always, Angelo did a great job at setting up a go to meeting with another presenter. PureStorage did a great job at attempting to present offsite as well as field questions (a tricky combo). They have a pretty niche product in their all flash array and have done a great job at keeping that price point down into an affordable range as well as providing some pretty nifty looking software management tools around it. I thought that the go to functionality worked fine (well, till the end) and hope this can help to open up more doors for the Toronto VMUG. Angelo’s already begun to envision the presenters and subject matter experts that we may be able to facilitate presenting in a web-ex fashion whom otherwise may not be able to.
And finally to cap off the day we had a great presentation titled BCP for VMware environments put on by community member and blogger Eric Wright. Eric first talked to the audience about BCP in general and how he has tackled setting up various teiring levels to protect his critical VMs based on RTO, RPO, and SLA’s defined within his corporation. He then went on to talk about how he has applied three separate products (Double Take, Veeam Free Edition, and vSphere Replication) to those different protection levels. Eric is a great speaker and I’m glad he decided to share this with the group. It’s always great to hear it from a community member as there are no sales or pitches included in the presentation, just what he has done, how he did it, what worked, what didn’t, etc… Invaluable to other community members like myself. If you don’t already I would recommend following Eric on Twitter and reading his blog. Hats off to Eric, great presentation!
So as always I encourage everyone to get out and attend your local VMUGs (not sure if you have one, find out here) ! Every time I attend one of these I always come back with some great takeaways and benefits that I can immediately begin to implement or adjust in my current environment. Big thanks once again to Angelo organizing this awesome day! As always there are multiple ways to stay connected with the Toronto VMUG (and they are always updated and active) including reading the blog, follow them on twitter, connect on LinkedIn and circle them on Google +. See you all in February!!!!