<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-322570517117772700</id><updated>2026-02-19T21:24:57.783+05:30</updated><category term="Windows"/><category term="Virtualization"/><category term="Networking"/><category term="Linux"/><category term="Storage"/><category term="VMware"/><category term="Cloud Computing"/><category term="Cloud-native"/><category term="AWS"/><category term="Automation"/><category term="How to"/><category term="Web-Hosting"/><category term="NSX"/><category term="application"/><category term="Containers"/><category term="Interview Questions"/><category term="Troubleshooting"/><category term="vmworld"/><category term="Orchestrator"/><category term="AI"/><category term="UpdateManager"/><title type='text'>My IT Blog </title><subtitle type='html'>No matter how sophisticated the technology is , It still takes people ! </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.myitblog.in/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>319</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-7956468701201475883</id><published>2026-02-19T21:18:00.005+05:30</published><updated>2026-02-19T21:24:57.776+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><title type='text'>The AI Summit and What It Really Means for Your Career</title><content type='html'>&lt;!DOCTYPE html&gt;
&lt;html&gt;


&lt;p&gt;As I write this, the global AI Impact Summit is happening in New Delhi. The first ever AI summit in the developing world. Prime Minister Modi just delivered his inaugural address. UN Secretary General is there. Sam Altman, Sundar Pichai, business leaders from across the globe are gathered at Bharat Mandapam.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj06uO8I8-_q5kAR3Ty5mUrvfIghwNpL5PNdObpm-jLoap6CP6kaKKPTenzPCR2zaFQxg7RGROmi4noPlfbwIoak3YxSwgEzxpRJ6spyqq8Aq47W0VMDq7K_VE-C9NxiTyN0CiyvqfvlzEpi4ywdzpm3GS-c80igrdMQra85tOkiYMhxAlNKf8guBvbM_s/s944/Screenshot%202026-02-19%20165336.png&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;634&quot; data-original-width=&quot;944&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj06uO8I8-_q5kAR3Ty5mUrvfIghwNpL5PNdObpm-jLoap6CP6kaKKPTenzPCR2zaFQxg7RGROmi4noPlfbwIoak3YxSwgEzxpRJ6spyqq8Aq47W0VMDq7K_VE-C9NxiTyN0CiyvqfvlzEpi4ywdzpm3GS-c80igrdMQra85tOkiYMhxAlNKf8guBvbM_s/s600/Screenshot%202026-02-19%20165336.png&quot;/&gt;&lt;/a&gt;&lt;/div&gt;
  
  
&lt;p&gt;And my LinkedIn feed is full of the same question. &quot;Will AI take my job?&quot;&lt;/p&gt;

&lt;p&gt;Last week, a colleague working in banking operations called me. He had just read another article predicting massive job losses from AI. He sounded genuinely worried about his future in financial services.&lt;/p&gt;

&lt;p&gt;I understand this fear. But I also think we are looking at this completely wrong.&lt;/p&gt;

&lt;h2&gt;What the Leaders Actually Said Today&lt;/h2&gt;

&lt;p&gt;Let me tell you what struck me about Modi&#39;s speech this morning. He presented the &quot;MANAV Vision&quot; for AI. But more importantly, listen to what he actually said.&lt;/p&gt;

&lt;p&gt;&quot;While some see fear in AI, others see the future. I can say with utmost pride that India finds its future in Artificial Intelligence.&quot;&lt;/p&gt;

&lt;p&gt;Then he said something even more important. &quot;AI must not reduce human beings to mere data points. It must serve as an instrument of human welfare.&quot;&lt;/p&gt;

&lt;p&gt;UN Secretary General Guterres was clear. &quot;We must invest in workers, so AI augments human potential, not replaces it.&quot; He announced a global fund to help developing countries build AI capacity including skills, data access, and computing power.&lt;/p&gt;

&lt;p&gt;Sundar Pichai said it plainly. &quot;AI will undeniably reshape the workforce, automating some roles, evolving others, and creating entirely new careers.&quot;&lt;/p&gt;

&lt;p&gt;Creating entirely new careers. Not just destroying them.&lt;/p&gt;

&lt;h2&gt;What I Have Seen in Financial Services&lt;/h2&gt;

&lt;p&gt;In banking environments I have worked with, I have watched AI transform how people work over the last 18 months. Let me share what actually happened.&lt;/p&gt;

&lt;p&gt;Teams used to spend days creating compliance reports. Gathering data from multiple systems. Formatting spreadsheets. Writing summaries. Now AI generates the first draft in minutes. But here is the key part. People still need human judgment to validate the data, interpret regulatory requirements, and make strategic recommendations.&lt;/p&gt;

&lt;p&gt;The compliance work did not disappear. But now instead of spending time on data gathering and formatting, people spend it on analysis and decision making. Understanding risk. Advising business units. Preventing problems before they happen.&lt;/p&gt;

&lt;p&gt;My colleague who was worried? I told him what I am telling you. Do not compete with AI on repetitive tasks. Partner with it to focus on what AI cannot do.&lt;/p&gt;

&lt;h2&gt;The Real Question Nobody Asks&lt;/h2&gt;

&lt;p&gt;Everyone asks &quot;Will AI take my job?&quot; But the better question is &quot;What can I do with AI that I could not do before?&quot;&lt;/p&gt;

&lt;p&gt;In product development work, I used to spend hours creating technical specifications and architecture documentation. Now AI helps me generate first drafts. But I still need to add the context that only I know. The business constraints. The regulatory requirements. The organizational dynamics. The tradeoffs between different approaches.&lt;/p&gt;

&lt;p&gt;The work did not go away. It evolved. And I use the time I saved to focus on strategic thinking. Product vision. Team leadership. Things that require human judgment and experience.&lt;/p&gt;

&lt;h2&gt;What You Should Actually Do&lt;/h2&gt;

&lt;p&gt;If you are worried about AI, here is my practical advice based on what I have seen work in financial services and technology teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First, start using AI tools today.&lt;/strong&gt; Pick one task you do regularly that feels repetitive. Use ChatGPT, Claude, or Copilot to help you do it faster. But review it critically. Add your expertise. Make it better.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second, identify your unique value.&lt;/strong&gt; Make a list of everything you do. Divide it into two columns.&lt;/p&gt;

&lt;p&gt;Column A: Things AI can help with (writing code, generating reports, analyzing data, creating documentation)&lt;/p&gt;

&lt;p&gt;Column B: Things requiring human judgment (architecture decisions, stakeholder management, strategic planning, mentoring, understanding business context)&lt;/p&gt;

&lt;p&gt;Use AI heavily for Column A. This frees up time to get better at Column B, which is what makes you valuable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third, move up the abstraction stack.&lt;/strong&gt; If you write code, learn system design. If you manage infrastructure, learn business strategy. If you handle operations, learn how to prevent problems through better architecture.&lt;/p&gt;

&lt;p&gt;AI is good at implementation. Humans are still better at strategy and decision making.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fourth, develop communication skills.&lt;/strong&gt; As AI handles more technical tasks, your ability to communicate well becomes more valuable. Explaining complex tradeoffs. Building consensus. Mentoring others. These skills matter more than ever.&lt;/p&gt;

&lt;h2&gt;The Pattern I Keep Seeing&lt;/h2&gt;

&lt;p&gt;In organizations I have worked with, the people thriving with AI have one thing in common. They stopped trying to compete with it and started partnering with it.&lt;/p&gt;

&lt;p&gt;I have seen data analysts who used to spend hours cleaning datasets now use AI for that. They focus on interpreting patterns and making business recommendations.&lt;/p&gt;

&lt;p&gt;I have seen solutions architects who used to write detailed technical specs now use AI to generate them. They focus on understanding business problems and designing solutions that actually fit organizational constraints.&lt;/p&gt;

&lt;p&gt;I have seen security engineers who used to manually review configurations now use AI to scan for issues. They focus on security architecture and threat modeling that requires deep expertise.&lt;/p&gt;

&lt;p&gt;Do you see the pattern? AI handles repetitive work. Humans handle judgment based work.&lt;/p&gt;

&lt;h2&gt;The Uncomfortable Truth&lt;/h2&gt;

&lt;p&gt;Let me be direct. AI will not take your job. But someone who knows how to use AI might.&lt;/p&gt;

&lt;p&gt;If you refuse to learn AI tools, you will fall behind people who embrace them. Not because AI replaces you, but because others become more productive while you stay at the same level.&lt;/p&gt;

&lt;p&gt;When email became standard in business, some people refused to use it. They insisted on printed memos. Where are those people now?&lt;/p&gt;

&lt;p&gt;AI is the same shift. It is not AI versus humans. It is people who use AI versus people who do not.&lt;/p&gt;

&lt;h2&gt;What Modi&#39;s GPS Analogy Really Means&lt;/h2&gt;

&lt;p&gt;Modi used a GPS analogy in his speech that I think captures this perfectly. He said &quot;We must give AI an open sky and also keep the command in our hands, like GPS. GPS shows us the way, but the final call on which direction we should go is ours.&quot;&lt;/p&gt;

&lt;p&gt;That is exactly right. AI shows us options, generates possibilities, handles repetitive work. But humans make the decisions. We choose the direction. We apply judgment. We take responsibility.&lt;/p&gt;

&lt;p&gt;In financial services, this is critical. AI can analyze transaction patterns and flag anomalies. But a human needs to decide whether something is actually fraud or just unusual behavior. AI can suggest investment strategies. But a human needs to understand the client&#39;s actual needs and risk tolerance. AI can generate compliance reports. But a human needs to interpret what the regulations actually require.&lt;/p&gt;

&lt;h2&gt;My Challenge to You&lt;/h2&gt;

&lt;p&gt;Try this for 30 days. Pick one repetitive task. Use AI to help you do it faster. But review the output critically. Add your judgment and expertise.&lt;/p&gt;

&lt;p&gt;Then use the time you saved on something more strategic. Something that requires your experience. Something AI cannot do.&lt;/p&gt;

&lt;p&gt;After 30 days, ask yourself honestly: do you feel more valuable or less valuable?&lt;/p&gt;

&lt;p&gt;My prediction, based on watching this play out across teams, is that you will feel more capable. You will realize AI amplifies your abilities rather than replacing them.&lt;/p&gt;

&lt;h2&gt;What the Summit Really Represents&lt;/h2&gt;

&lt;p&gt;The AI Impact Summit happening in Delhi right now is not about replacing workers. It is about solving problems at unprecedented scale.&lt;/p&gt;

&lt;p&gt;Over 500 AI leaders are there. Google announced 15 billion dollar investment in India. Mukesh Ambani announced 10 lakh crore rupees for AI infrastructure. Countries from across the world are participating.&lt;/p&gt;

&lt;p&gt;They are not gathering to discuss job elimination. They are discussing how AI can improve healthcare, education, agriculture, financial inclusion. How to make AI work for people.&lt;/p&gt;

&lt;p&gt;The theme is &quot;Sarvajan Hitaya, Sarvajan Sukhaya&quot; which means welfare for all, happiness for all. That tells you everything about the real intent.&lt;/p&gt;

&lt;h2&gt;Final Thoughts&lt;/h2&gt;

&lt;p&gt;I started this talking about fear. The fear I hear from colleagues about AI taking jobs.&lt;/p&gt;

&lt;p&gt;But when I look at what is actually happening, I see opportunity. Yes, AI will change how we work. But it will also enable us to do things we could not do before. It will free us from repetitive work to focus on creative, strategic thinking.&lt;/p&gt;

&lt;p&gt;The people who will struggle are not those whose jobs can be partially automated. They are the ones who refuse to adapt.&lt;/p&gt;

&lt;p&gt;The people who will thrive are those who embrace AI as a partner. Who use it to become more productive. Who focus on developing uniquely human skills like judgment, creativity, and communication that AI cannot replicate.&lt;/p&gt;

&lt;p&gt;Stop worrying about whether AI will take your job. Start thinking about what you could accomplish if you had AI as a tool to amplify your abilities.&lt;/p&gt;

&lt;p&gt;That future is not coming. It is here now. And the question is not whether you will be part of it, but how actively you will participate in shaping it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;JD&lt;/strong&gt;&lt;/p&gt;

&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7956468701201475883'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7956468701201475883'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2026/02/the-ai-summit-and-what-it-really-means.html' title='The AI Summit and What It Really Means for Your Career'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj06uO8I8-_q5kAR3Ty5mUrvfIghwNpL5PNdObpm-jLoap6CP6kaKKPTenzPCR2zaFQxg7RGROmi4noPlfbwIoak3YxSwgEzxpRJ6spyqq8Aq47W0VMDq7K_VE-C9NxiTyN0CiyvqfvlzEpi4ywdzpm3GS-c80igrdMQra85tOkiYMhxAlNKf8guBvbM_s/s72-c/Screenshot%202026-02-19%20165336.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-4420797269943597371</id><published>2025-11-06T14:49:00.004+05:30</published><updated>2025-11-13T15:09:49.715+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Troubleshooting vSAN Storage Policy Migration Failures in VMware Cloud Foundation 9.0</title><content type='html'>&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;meta charset=&quot;UTF-8&quot;&gt;
&lt;/head&gt;
&lt;body&gt;

&lt;style&gt;
pre code {
  display: block;
  background: #f4f4f4;
  padding: 10px;
  border-radius: 5px;
  font-family: Consolas, monospace;
  color: #333;
}
&lt;/style&gt;


&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjESPY3q73NWIUZ5wxBoxYJqlW8g3n8GGe8OiknDNR5JcPgQMLpYxgLG9uHQKTiAi9gO4Ulncgs4bBMwopXez6ehmb9Irh5sFRqwM8axN2y4B7LZaW0Q9VuSVdFNXVujBQXwXNd58qiNXBwsYeDn8fOx5exuNG1v40G6YFKCJkwzkyq-zc-bua1SlfN5bY/s1536/vsan%20.png&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1536&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjESPY3q73NWIUZ5wxBoxYJqlW8g3n8GGe8OiknDNR5JcPgQMLpYxgLG9uHQKTiAi9gO4Ulncgs4bBMwopXez6ehmb9Irh5sFRqwM8axN2y4B7LZaW0Q9VuSVdFNXVujBQXwXNd58qiNXBwsYeDn8fOx5exuNG1v40G6YFKCJkwzkyq-zc-bua1SlfN5bY/s600/vsan%20.png&quot;/&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Recently I had a customer who migrated their VMware infrastructure from vSphere 7.0 to VMware Cloud Foundation 9.0. After the migration, they wanted to update their vSAN storage policies to take advantage of the new vSAN ESA (Express Storage Architecture) features. However, when they tried to change the storage policy for their production VMs, the operation kept failing with a cryptic error message.&lt;/p&gt;

&lt;p&gt;The error they were getting was:&lt;/p&gt;

&lt;pre&gt;
&lt;i&gt;&quot;Cannot complete operation due to insufficient resources to satisfy current storage policy.&quot;&lt;/i&gt;
&lt;/pre&gt;

&lt;p&gt;This was strange because they had plenty of disk space available. The vSAN cluster was only at 45% capacity, and all the hosts were healthy. Let me walk through how we troubleshooted and fixed this issue.&lt;/p&gt;

&lt;h2&gt;Understanding the Problem&lt;/h2&gt;

&lt;p&gt;First, let&#39;s understand what was happening in their environment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They had a 6-node vSAN cluster running VCF 9.0&lt;/li&gt;
&lt;li&gt;vSAN was configured with the new ESA architecture&lt;/li&gt;
&lt;li&gt;They were trying to migrate VMs from the old &quot;vSAN Default Storage Policy&quot; to a new policy called &quot;Production-ESA-Policy&quot; which had FTT=2 (Failures to Tolerate) with RAID-6 erasure coding&lt;/li&gt;
&lt;li&gt;Some VMs would migrate successfully, but most would fail&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After looking at the environment, I found the root cause. The issue was not about disk space at all. It was about available disk groups and how vSAN ESA handles erasure coding differently than the traditional vSAN architecture.&lt;/p&gt;

&lt;h2&gt;Root Cause Analysis&lt;/h2&gt;

&lt;p&gt;In vSAN ESA with RAID-6 erasure coding and FTT=2, you need at least 5 nodes to satisfy the policy requirements. But here is the tricky part that most people miss. When you are migrating VMs from one policy to another, vSAN needs to create the new object layout BEFORE it can delete the old one. This means during the migration, you temporarily need DOUBLE the capacity.&lt;/p&gt;

&lt;p&gt;In my customer&#39;s case:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Their old policy was using RAID-1 mirroring with FTT=1 (requires 2 copies of data)&lt;/li&gt;
&lt;li&gt;The new policy was RAID-6 with FTT=2 (requires data + 2 parity blocks distributed across 5 nodes minimum)&lt;/li&gt;
&lt;li&gt;During migration, both layouts exist simultaneously until the migration completes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This temporary doubling of capacity requirements was causing the &quot;insufficient resources&quot; error, even though they had plenty of raw disk space.&lt;/p&gt;

&lt;h2&gt;Solution Part 1: Check vSAN Capacity Before Migration&lt;/h2&gt;

&lt;p&gt;Before attempting large scale storage policy migrations, you should always check your vSAN slack space. Here is how to do it properly:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Check vSAN Capacity using vSphere Client&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log into vSphere Client&lt;/li&gt;
&lt;li&gt;Navigate to your vSAN cluster&lt;/li&gt;
&lt;li&gt;Go to Monitor tab &gt; vSAN &gt; Capacity&lt;/li&gt;
&lt;li&gt;Look at the &quot;Deduplication and Compression Savings&quot; section&lt;/li&gt;
&lt;li&gt;More importantly, look at &quot;Slack Space&quot; at the bottom&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In this case, the customer had:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Total capacity: 48 TB&lt;/li&gt;
&lt;li&gt;Used capacity: 21.6 TB (45%)&lt;/li&gt;
&lt;li&gt;But slack space available for rebuild operations: Only 8.2 TB&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The slack space is the actual usable space for new object creation during policy changes. This was the real bottleneck.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Calculate Required Slack Space for Migration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For policy migrations, you need at least 1.5x to 2x the size of the VM you are migrating as free slack space. For example, if you are migrating a 2TB VM, you need at least 3-4TB of slack space available.&lt;/p&gt;

&lt;p&gt;You can check the actual VM disk usage using PowerCLI:&lt;/p&gt;

  
&lt;pre&gt;
&lt;code class=&quot;language-powershell&quot;&gt;
Connect-VIServer -Server vcenter.domain.com

$vms = Get-VM
foreach ($vm in $vms) {
    $vmSize = ($vm | Get-HardDisk | Measure-Object -Property CapacityGB -Sum).Sum
    Write-Host &quot;VM: $($vm.Name) - Total Disk Size: $vmSize GB&quot;
}
&lt;/code&gt;
&lt;/pre&gt;

&lt;h2&gt;Solution Part 2: Temporary Workaround&lt;/h2&gt;

&lt;p&gt;If you do not have enough slack space for all VMs at once, you need to do the migration in batches. Here is the approach we took:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Option 1: Migrate VMs in Small Batches&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify your smallest VMs first (less than 500GB)&lt;/li&gt;
&lt;li&gt;Migrate those VMs first to the new policy&lt;/li&gt;
&lt;li&gt;Wait for migration to complete (you can check progress in vSAN &gt; Resyncing Objects)&lt;/li&gt;
&lt;li&gt;Once the first batch completes, the old objects are deleted and slack space is freed up&lt;/li&gt;
&lt;li&gt;Then migrate the next batch&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We created a simple script to do this automatically:&lt;/p&gt;

&lt;pre&gt; 
&lt;code class=&quot;language-powershell&quot;&gt;
$vms = Get-VM | Sort-Object -Property UsedSpaceGB
$newPolicy = Get-SpbmStoragePolicy -Name &quot;Production-ESA-Policy&quot;
$batchSize = 5

for ($i = 0; $i -lt $vms.Count; $i += $batchSize) {
    $batch = $vms[$i..($i + $batchSize - 1)]
    
    Write-Host &quot;Migrating batch starting at VM: $($batch[0].Name)&quot;
    
    foreach ($vm in $batch) {
        Set-VM -VM $vm -StoragePolicy $newPolicy -Confirm:$false
        Write-Host &quot;Started migration for $($vm.Name)&quot;
    }
    
    # Wait for resyncing to complete before next batch
    Write-Host &quot;Waiting for resync to complete...&quot;
    do {
        $resyncObjects = Get-VsanResyncingComponent -Cluster (Get-Cluster)
        Start-Sleep -Seconds 60
    } while ($resyncObjects.Count -gt 0)
    
    Write-Host &quot;Batch complete. Moving to next batch.&quot;
}
&lt;/code&gt;
&lt;/pre&gt;

&lt;p&gt;&lt;strong&gt;Option 2: Temporarily Add More Capacity&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you cannot wait for batch migrations, you can temporarily add capacity to the vSAN cluster:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Add a new disk group to existing hosts (if they have free slots)&lt;/li&gt;
&lt;li&gt;Or add a new host to the cluster temporarily&lt;/li&gt;
&lt;li&gt;After all migrations complete, you can remove the temporary capacity&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Solution Part 3: Long Term Fix Using vSAN Configuration&lt;/h2&gt;

&lt;p&gt;For the long term, we adjusted the vSAN configuration to handle this better in future migrations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configure vSAN Advanced Options for Better Migration Handling&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are some advanced vSAN settings that can help with policy migrations:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to vSphere Client&lt;/li&gt;
&lt;li&gt;Select your vSAN cluster&lt;/li&gt;
&lt;li&gt;Configure &gt; vSAN &gt; Services &gt; Performance Service&lt;/li&gt;
&lt;li&gt;Enable if not already enabled (this helps monitor resync progress better)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Then adjust the resync throttling:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Configure &gt; vSAN &gt; Services &gt; Advanced Options&lt;/li&gt;
&lt;li&gt;Find the following parameters and adjust them:
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;VSAN.DomResyncThrottleRate&lt;/code&gt; - Default is 0 (unlimited). If migrations are impacting production, set to 80 (limits resync to 80% of backend bandwidth)&lt;/li&gt;
&lt;li&gt;&lt;code&gt;VSAN.DomOwnerForceWarmCache&lt;/code&gt; - Set to 1 to improve performance during migrations&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note: These settings should be adjusted based on your environment. If you have maintenance windows, leave throttling at 0 for fastest migration. If migrations must happen during production hours, throttle to 60-80%.&lt;/p&gt;

&lt;h2&gt;Solution Part 4: Using vSphere Storage vMotion as Alternative&lt;/h2&gt;

&lt;p&gt;In some cases, if the direct storage policy change keeps failing, you can use Storage vMotion as a workaround:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Create a new datastore (even a small one, 100GB is enough for temporary use)&lt;/li&gt;
&lt;li&gt;Storage vMotion the VM to this temporary datastore&lt;/li&gt;
&lt;li&gt;This frees up the vSAN object&lt;/li&gt;
&lt;li&gt;Then Storage vMotion back to vSAN with the new storage policy&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example using PowerCLI:&lt;/p&gt;

&lt;pre&gt;
&lt;code class=&quot;language-powershell&quot;&gt;
$vm = Get-VM -Name &quot;ProductionVM01&quot;
$tempDatastore = Get-Datastore -Name &quot;Temp-Datastore&quot;
$vsanDatastore = Get-Datastore -Name &quot;vsanDatastore&quot;
$newPolicy = Get-SpbmStoragePolicy -Name &quot;Production-ESA-Policy&quot;

# Move to temp datastore first
Move-VM -VM $vm -Datastore $tempDatastore

# Wait a bit
Start-Sleep -Seconds 30

# Move back to vSAN with new policy
Move-VM -VM $vm -Datastore $vsanDatastore -StoragePolicy $newPolicy
&lt;/code&gt;
&lt;/pre&gt;

&lt;p&gt;This two-step approach avoids the double capacity requirement because the VM is completely removed from vSAN before being added back with the new policy.&lt;/p&gt;

&lt;h2&gt;Verification Steps&lt;/h2&gt;

&lt;p&gt;After migrating your VMs, verify everything is working correctly:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Check VM Storage Policy Compliance&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to VMs and Templates view&lt;/li&gt;
&lt;li&gt;Right-click the VM &gt; VM Policies &gt; Check VM Storage Policy Compliance&lt;/li&gt;
&lt;li&gt;You should see &quot;Compliant&quot; status&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Verify vSAN Object Health&lt;/strong&gt;&lt;/p&gt;

&lt;pre&gt;
&lt;code class=&quot;language-powershell&quot;&gt;
$cluster = Get-Cluster -Name &quot;YourClusterName&quot;
Get-VsanHealthSummary -Cluster $cluster
&lt;/code&gt;
&lt;/pre&gt;

&lt;p&gt;All health checks should be green, especially the &quot;Data&quot; section.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Check for Any Orphaned Objects&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sometimes failed migrations leave orphaned objects that consume space:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to vSAN cluster &gt; Monitor &gt; vSAN &gt; Capacity&lt;/li&gt;
&lt;li&gt;Look for &quot;Orphaned Objects&quot; section&lt;/li&gt;
&lt;li&gt;If you see any, you can delete them using:
&lt;ul&gt;
&lt;li&gt;RVC (Ruby vSphere Console)&lt;/li&gt;
&lt;li&gt;Or PowerCLI: &lt;code&gt;Remove-VsanOrphanedVMDKs -Cluster $cluster&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Lessons Learned and Best Practices&lt;/h2&gt;

&lt;p&gt;After going through this with the customer, here are the key takeaways:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Always check slack space, not just total capacity:&lt;/strong&gt; vSAN capacity monitoring can be misleading. The total available space is not the same as slack space available for operations.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Plan for 2x capacity during migrations:&lt;/strong&gt; When changing storage policies, especially moving from RAID-1 to RAID-6, the migration temporarily needs double the capacity.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Migrate in batches during production hours:&lt;/strong&gt; Do not try to migrate all VMs at once. Start with small VMs in small batches.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Test with non-production VMs first:&lt;/strong&gt; Always test your migration process on dev or test VMs before touching production.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Monitor resync progress:&lt;/strong&gt; Use vSAN Performance Service to monitor resync operations. This helps you understand how long migrations will take.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Consider maintenance windows for large VMs:&lt;/strong&gt; For very large VMs (multi-TB), schedule migrations during maintenance windows when you can remove resync throttling for faster completion.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Document your vSAN configuration:&lt;/strong&gt; Keep track of your disk groups, capacity groups, and policy settings. This makes troubleshooting much faster.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Additional Notes for VCF 9.0 Specific Considerations&lt;/h2&gt;

&lt;p&gt;If you are running VMware Cloud Foundation 9.0 specifically, there are a few additional things to be aware of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;vSAN ESA is the default:&lt;/strong&gt; New VCF 9.0 deployments use vSAN ESA by default. Make sure you understand the differences from vSAN OSA (Original Storage Architecture).&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Storage policies are managed through VCF:&lt;/strong&gt; While you can change them in vSphere, it is better to use SDDC Manager for policy changes to keep everything in sync.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Lifecycle management considerations:&lt;/strong&gt; When you update VCF components, storage policies may need to be revalidated. Plan accordingly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Storage policy migrations in vSAN are not as straightforward as they might seem, especially when moving to more advanced erasure coding configurations. The key is understanding that vSAN needs temporary extra capacity during the migration process.&lt;/p&gt;

&lt;p&gt;By following the steps above, you should be able to successfully migrate your VMs to new storage policies without hitting capacity errors. Remember to always test first, migrate in batches, and monitor the resync progress.&lt;/p&gt;

&lt;p&gt;If you run into issues even after following these steps, check the vSAN health service for any underlying problems with your cluster configuration. Sometimes issues like network latency, disk performance problems, or host hardware issues can also cause migration failures that show up as capacity errors.&lt;/p&gt;

&lt;p&gt;Hope this helps anyone facing similar issues with vSAN storage policy migrations in VCF 9.0!&lt;/p&gt;


&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4420797269943597371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4420797269943597371'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/11/troubleshooting-vsan-storage-policy.html' title='Troubleshooting vSAN Storage Policy Migration Failures in VMware Cloud Foundation 9.0'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjESPY3q73NWIUZ5wxBoxYJqlW8g3n8GGe8OiknDNR5JcPgQMLpYxgLG9uHQKTiAi9gO4Ulncgs4bBMwopXez6ehmb9Irh5sFRqwM8axN2y4B7LZaW0Q9VuSVdFNXVujBQXwXNd58qiNXBwsYeDn8fOx5exuNG1v40G6YFKCJkwzkyq-zc-bua1SlfN5bY/s72-c/vsan%20.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-1975340647400007358</id><published>2025-10-25T21:42:00.001+05:30</published><updated>2025-11-13T22:57:25.679+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vmworld"/><title type='text'>Fixing Tanzu Kubernetes Pod to External Services Connectivity Issues with NSX-T</title><content type='html'>&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;meta charset=&quot;UTF-8&quot;&gt;
&lt;title&gt;Fixing Tanzu Kubernetes Pod to External Services Connectivity Issues with NSX-T&lt;/title&gt;
&lt;style&gt;
pre {
    background-color: #2d2d2d;
    color: #f8f8f2;
    padding: 15px;
    border-radius: 5px;
    overflow-x: auto;
    border-left: 4px solid #4a9eff;
    font-family: &#39;Courier New&#39;, monospace;
    line-height: 1.5;
}
code {
    background-color: #2d2d2d;
    color: #f8f8f2;
    padding: 2px 6px;
    border-radius: 3px;
    font-family: &#39;Courier New&#39;, monospace;
}
&lt;/style&gt;
&lt;/head&gt;
&lt;body&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3CNicQaGrLSTWMLVz3qg1XVaBUfF5uu_bS7T7lfbKwm1LBgMfRKhxPQTTocx_1wLb4dMhcQKMHpw0G2fdc0rHa6qg41e4dWjKFyvkLi1Sc5Q1Fh-_0LzlmKU4KuxT0dMhogZbAE1A8aPBVwLujJBEUzCTpA3A3bRBYUrXuGabm5u9KXmi7vmOgZIyqE/s1536/Designer.png&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1536&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3CNicQaGrLSTWMLVz3qg1XVaBUfF5uu_bS7T7lfbKwm1LBgMfRKhxPQTTocx_1wLb4dMhcQKMHpw0G2fdc0rHa6qg41e4dWjKFyvkLi1Sc5Q1Fh-_0LzlmKU4KuxT0dMhogZbAE1A8aPBVwLujJBEUzCTpA3A3bRBYUrXuGabm5u9KXmi7vmOgZIyqE/s600/Designer.png&quot;/&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Last month I got a call from a customer who was pulling their hair out over a networking issue. They had just deployed VMware Tanzu Kubernetes Grid on their vSphere with Tanzu environment, everything looked good in the dashboards, all pods were running, but their applications inside the pods could not reach external databases running on traditional VMs in the same datacenter.&lt;/p&gt;

&lt;p&gt;The frustrating part was that some pods could reach external services perfectly fine, while others would just timeout. There was no clear pattern. Let me tell you how we figured this out and fixed it.&lt;/p&gt;

&lt;h2&gt;The Initial Problem&lt;/h2&gt;

&lt;p&gt;Here is what the customer setup looked like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;vSphere 8.0 with Tanzu enabled&lt;/li&gt;
&lt;li&gt;NSX-T 4.1.2 for networking&lt;/li&gt;
&lt;li&gt;Three Tanzu Kubernetes clusters running different microservices applications&lt;/li&gt;
&lt;li&gt;External PostgreSQL database running on traditional VMs (non-Kubernetes)&lt;/li&gt;
&lt;li&gt;External API services running on another set of VMs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The symptom was simple but annoying. When pods tried to connect to the PostgreSQL database at IP 192.168.50.25, sometimes it worked, sometimes it did not. The application logs showed connection timeouts:&lt;/p&gt;

&lt;pre&gt;
Error: could not connect to server: Connection timed out
Is the server running on host &quot;192.168.50.25&quot; and accepting TCP/IP connections on port 5432?
&lt;/pre&gt;

&lt;p&gt;The weird part was that if you did a &lt;code&gt;kubectl exec&lt;/code&gt; into the pod and ran &lt;code&gt;ping 192.168.50.25&lt;/code&gt;, it worked fine. But the actual database connection on port 5432 would fail.&lt;/p&gt;

&lt;h2&gt;Initial Troubleshooting Steps&lt;/h2&gt;

&lt;p&gt;First thing I did was check if this was a DNS issue. I asked them to try connecting using IP address directly instead of hostname. Same problem. So DNS was not the culprit.&lt;/p&gt;

&lt;p&gt;Next, I checked if the pods could reach other external services. I had them create a test pod and try different connections:&lt;/p&gt;

&lt;pre&gt;
kubectl run test-pod --image=nicolaka/netshoot -it --rm -- /bin/bash

# Inside the pod, test different connections
ping 192.168.50.25
# This worked fine

curl -v telnet://192.168.50.25:5432
# This would timeout

curl -v telnet://192.168.50.30:8080
# This worked (different VM, different service)
&lt;/pre&gt;

&lt;p&gt;So ping worked, but TCP connections to specific ports were failing. That told me this was likely a firewall issue, not routing.&lt;/p&gt;

&lt;h2&gt;Checking NSX-T Distributed Firewall&lt;/h2&gt;

&lt;p&gt;Since they were using NSX-T, my next thought was to check the Distributed Firewall rules. I logged into NSX Manager and went to Security &gt; Distributed Firewall.&lt;/p&gt;

&lt;p&gt;What I found was interesting. They had a rule that allowed traffic from &quot;Tanzu-Workload-Network&quot; to &quot;Database-Servers&quot; security group. On paper, this should have worked. But when I looked closer at the security groups, I noticed something odd.&lt;/p&gt;

&lt;p&gt;The &quot;Tanzu-Workload-Network&quot; security group was defined based on a specific NSX segment. But here is the thing about Tanzu Kubernetes pods. They do not sit directly on NSX segments. They use overlay networking within Kubernetes, and NSX sees them through SNAT (Source NAT) translation.&lt;/p&gt;

&lt;h2&gt;Understanding the Root Cause&lt;/h2&gt;

&lt;p&gt;Let me explain what was actually happening. When a pod in Tanzu Kubernetes tries to reach an external service:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The pod sends traffic to its default gateway (the Kubernetes service network)&lt;/li&gt;
&lt;li&gt;Traffic goes through the Tanzu Kubernetes cluster&#39;s load balancer&lt;/li&gt;
&lt;li&gt;NSX-T performs SNAT to translate the pod IP to the Tier-0 gateway IP&lt;/li&gt;
&lt;li&gt;The traffic then goes to the destination VM&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The problem was in step 3. The NSX-T firewall rules were checking the SOURCE IP of the traffic. After SNAT, the source IP was no longer from the &quot;Tanzu-Workload-Network&quot; segment. It was coming from the Tier-0 gateway IP pool.&lt;/p&gt;

&lt;p&gt;This is why some connections worked and some did not. It depended on which Tier-0 gateway IP got assigned during SNAT, and whether that IP was accidentally covered by other broader firewall rules.&lt;/p&gt;

&lt;h2&gt;Solution Part 1: Fix the NSX-T Firewall Rules&lt;/h2&gt;

&lt;p&gt;Once we understood the problem, the fix became clear. We needed to modify the firewall rules to account for the SNAT translation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Identify the Tier-0 Gateway IP Pool&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, we needed to find out which IP range NSX-T was using for SNAT when Tanzu traffic goes out.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log into NSX Manager&lt;/li&gt;
&lt;li&gt;Go to Networking &gt; Tier-0 Gateways&lt;/li&gt;
&lt;li&gt;Click on your Tier-0 gateway (in their case it was called &quot;T0-Gateway-01&quot;)&lt;/li&gt;
&lt;li&gt;Go to Service Interfaces section&lt;/li&gt;
&lt;li&gt;Note down the IP addresses configured there&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In their environment, the Tier-0 gateway was using 192.168.10.1 for the external interface.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Create a New Security Group for Tanzu Traffic&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Instead of using the segment-based security group, we created a new one specifically for Tanzu traffic after SNAT:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Inventory &gt; Groups&lt;/li&gt;
&lt;li&gt;Click &quot;Add Group&quot;&lt;/li&gt;
&lt;li&gt;Name: &quot;Tanzu-K8s-External-Traffic&quot;&lt;/li&gt;
&lt;li&gt;Under Membership Criteria, select &quot;IP Address&quot;&lt;/li&gt;
&lt;li&gt;Add the IP address: 192.168.10.1&lt;/li&gt;
&lt;li&gt;Save&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Update the Distributed Firewall Rules&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now we updated the firewall rule:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Security &gt; Distributed Firewall&lt;/li&gt;
&lt;li&gt;Find the rule that allows access to Database Servers&lt;/li&gt;
&lt;li&gt;Edit the rule&lt;/li&gt;
&lt;li&gt;In the &quot;Source&quot; field, add the new &quot;Tanzu-K8s-External-Traffic&quot; group we just created&lt;/li&gt;
&lt;li&gt;Keep the original &quot;Tanzu-Workload-Network&quot; group as well (for direct VM-to-VM traffic if any)&lt;/li&gt;
&lt;li&gt;Make sure the rule is set to &quot;Allow&quot;&lt;/li&gt;
&lt;li&gt;Publish the changes&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;After publishing these changes, we tested again from the pod:&lt;/p&gt;

&lt;pre&gt;
kubectl run test-pod --image=nicolaka/netshoot -it --rm -- /bin/bash

curl -v telnet://192.168.50.25:5432
# Now it worked!
&lt;/pre&gt;

&lt;p&gt;Success! But we were not done yet.&lt;/p&gt;

&lt;h2&gt;Solution Part 2: Fix Tanzu Network Policies&lt;/h2&gt;

&lt;p&gt;While testing, we found another issue. Some namespaces in the Tanzu cluster had NetworkPolicy objects that were blocking egress traffic by default. This is actually a good security practice, but it was not configured properly.&lt;/p&gt;

&lt;p&gt;We checked the existing network policies:&lt;/p&gt;

&lt;pre&gt;
kubectl get networkpolicies --all-namespaces
&lt;/pre&gt;

&lt;p&gt;In the &quot;production&quot; namespace, they had a very restrictive policy:&lt;/p&gt;

&lt;pre&gt;
kubectl get networkpolicy -n production default-deny-egress -o yaml
&lt;/pre&gt;

&lt;p&gt;The output showed:&lt;/p&gt;

&lt;pre&gt;
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: default-deny-egress
  namespace: production
spec:
  podSelector: {}
  policyTypes:
  - Egress
  egress: []
&lt;/pre&gt;

&lt;p&gt;This policy was blocking ALL egress traffic from pods in the production namespace. We needed to add specific rules to allow traffic to the database and external APIs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Create a New NetworkPolicy to Allow Database Access&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We created a new policy file called &lt;code&gt;allow-database-access.yaml&lt;/code&gt;:&lt;/p&gt;

&lt;pre&gt;
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: allow-database-access
  namespace: production
spec:
  podSelector:
    matchLabels:
      app: backend-api
  policyTypes:
  - Egress
  egress:
  - to:
    - ipBlock:
        cidr: 192.168.50.0/24
    ports:
    - protocol: TCP
      port: 5432
  - to:
    - ipBlock:
        cidr: 0.0.0.0/0
    ports:
    - protocol: UDP
      port: 53
&lt;/pre&gt;

&lt;p&gt;Let me explain what this policy does:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It applies to pods with label &lt;code&gt;app: backend-api&lt;/code&gt; in the production namespace&lt;/li&gt;
&lt;li&gt;It allows egress traffic to the 192.168.50.0/24 subnet (where the database lives) on port 5432&lt;/li&gt;
&lt;li&gt;It also allows DNS traffic (UDP port 53) to anywhere, because pods need to resolve domain names&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Apply this policy:&lt;/p&gt;

&lt;pre&gt;
kubectl apply -f allow-database-access.yaml
&lt;/pre&gt;

&lt;p&gt;Verify it was created:&lt;/p&gt;

&lt;pre&gt;
kubectl get networkpolicy -n production
&lt;/pre&gt;

&lt;p&gt;Now test from a pod with the &lt;code&gt;app: backend-api&lt;/code&gt; label:&lt;/p&gt;

&lt;pre&gt;
kubectl run test-backend --image=nicolaka/netshoot -n production --labels=&quot;app=backend-api&quot; -it --rm -- /bin/bash

# Inside the pod
curl -v telnet://192.168.50.25:5432
# Should work now

# Try from a pod without the label
kubectl run test-other --image=nicolaka/netshoot -n production -it --rm -- /bin/bash
curl -v telnet://192.168.50.25:5432
# This should still be blocked (as intended)
&lt;/pre&gt;

&lt;h2&gt;Solution Part 3: Configure NSX-T Container Network Interface (CNI)&lt;/h2&gt;

&lt;p&gt;While we were fixing things, I also noticed their NSX-T CNI configuration was not optimal. By default, vSphere with Tanzu uses NSX-T CNI, but there are some settings that can cause connectivity issues if not configured properly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check the Current CNI Configuration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SSH into one of the Tanzu Kubernetes control plane nodes (you will need to enable SSH in the cluster configuration first).&lt;/p&gt;

&lt;p&gt;Check the NSX CNI configuration:&lt;/p&gt;

&lt;pre&gt;
cat /etc/nsx-ujo/ncp.ini
&lt;/pre&gt;

&lt;p&gt;Look for these specific settings:&lt;/p&gt;

&lt;pre&gt;
[nsx_v3]
policy_nsxapi = True
single_tier_topology = True

[coe]
cluster = your-cluster-name
enable_snat = True
&lt;/pre&gt;

&lt;p&gt;In their case, &lt;code&gt;enable_snat&lt;/code&gt; was set to True, which is correct. But I have seen cases where this gets set to False, and that causes all sorts of connectivity issues.&lt;/p&gt;

&lt;p&gt;If you need to change this setting, you cannot do it directly on the control plane node. You need to modify it through the Tanzu Kubernetes cluster spec.&lt;/p&gt;

&lt;p&gt;Get your cluster configuration:&lt;/p&gt;

&lt;pre&gt;
kubectl get tanzukubernetescluster -n your-namespace
&lt;/pre&gt;

&lt;p&gt;Edit the cluster:&lt;/p&gt;

&lt;pre&gt;
kubectl edit tanzukubernetescluster your-cluster-name -n your-namespace
&lt;/pre&gt;

&lt;p&gt;Look for the network section and ensure it looks like this:&lt;/p&gt;

&lt;pre&gt;
spec:
  topology:
    controlPlane:
      ...
    workers:
      ...
  settings:
    network:
      cni:
        name: antrea
      serviceDomain: cluster.local
      services:
        cidrBlocks:
        - 10.96.0.0/12
      pods:
        cidrBlocks:
        - 10.244.0.0/16
&lt;/pre&gt;

&lt;p&gt;Save and exit. The cluster will reconcile the changes automatically.&lt;/p&gt;

&lt;h2&gt;Solution Part 4: Troubleshooting with NSX Intelligence&lt;/h2&gt;

&lt;p&gt;After making all these changes, we wanted to verify that traffic was flowing correctly. NSX-T has a great feature called NSX Intelligence that helped us visualize the traffic flows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enable NSX Intelligence (if not already enabled)&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log into NSX Manager&lt;/li&gt;
&lt;li&gt;Go to System &gt; NSX Intelligence&lt;/li&gt;
&lt;li&gt;Click &quot;Enable NSX Intelligence&quot;&lt;/li&gt;
&lt;li&gt;Wait for it to be enabled (takes about 5-10 minutes)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;View Traffic Flows&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Plan &amp; Troubleshoot &gt; NSX Intelligence&lt;/li&gt;
&lt;li&gt;In the search box, enter the source IP (the Tier-0 gateway IP: 192.168.10.1)&lt;/li&gt;
&lt;li&gt;Click on &quot;Flows&quot;&lt;/li&gt;
&lt;li&gt;You should see traffic flows from the Tier-0 IP to your database server IP&lt;/li&gt;
&lt;li&gt;Click on any flow to see detailed information&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This visualization helped us confirm that traffic was now flowing properly through NSX-T from the Tanzu pods to the external database.&lt;/p&gt;

&lt;h2&gt;Additional Troubleshooting Commands&lt;/h2&gt;

&lt;p&gt;Here are some useful commands we used during troubleshooting that might help you:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check NSX-T Container Plugin Logs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SSH to the Tanzu Kubernetes control plane node and check NCP logs:&lt;/p&gt;

&lt;pre&gt;
tail -f /var/log/nsx-ujo/ncp.log
&lt;/pre&gt;

&lt;p&gt;Look for any errors related to connectivity or SNAT.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check Pod Network Configuration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;From inside a pod, check its network configuration:&lt;/p&gt;

&lt;pre&gt;
kubectl run test-pod --image=nicolaka/netshoot -it --rm -- /bin/bash

# Inside the pod
ip addr show
ip route show
iptables -L -t nat
&lt;/pre&gt;

&lt;p&gt;The &lt;code&gt;ip route show&lt;/code&gt; command will show you the default gateway the pod is using. This should point to the NSX-T virtual network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test Connectivity from Different Points&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Test from the Tanzu Kubernetes node itself (not from inside a pod):&lt;/p&gt;

&lt;pre&gt;
# SSH to TKG node
curl -v telnet://192.168.50.25:5432
&lt;/pre&gt;

&lt;p&gt;If this works but pod-to-database does not work, then the issue is definitely in the Kubernetes networking layer (NetworkPolicy or CNI configuration).&lt;/p&gt;

&lt;p&gt;If even the node cannot reach the database, then the issue is in NSX-T routing or firewall.&lt;/p&gt;

&lt;h2&gt;Verification and Testing&lt;/h2&gt;

&lt;p&gt;After all these fixes, we created a comprehensive test to make sure everything was working:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deploy a Test Application&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We deployed a simple Python application that connects to the PostgreSQL database:&lt;/p&gt;

&lt;pre&gt;
apiVersion: v1
kind: Pod
metadata:
  name: db-test-app
  namespace: production
  labels:
    app: backend-api
spec:
  containers:
  - name: postgres-client
    image: postgres:14
    command:
    - sleep
    - &quot;3600&quot;
    env:
    - name: PGHOST
      value: &quot;192.168.50.25&quot;
    - name: PGPORT
      value: &quot;5432&quot;
    - name: PGUSER
      value: &quot;appuser&quot;
    - name: PGPASSWORD
      value: &quot;yourpassword&quot;
    - name: PGDATABASE
      value: &quot;production_db&quot;
&lt;/pre&gt;

&lt;p&gt;Apply it:&lt;/p&gt;

&lt;pre&gt;
kubectl apply -f db-test-app.yaml
&lt;/pre&gt;

&lt;p&gt;Test the connection:&lt;/p&gt;

&lt;pre&gt;
kubectl exec -it db-test-app -n production -- psql -c &quot;SELECT version();&quot;
&lt;/pre&gt;

&lt;p&gt;If this returns the PostgreSQL version information, then the connectivity is working perfectly.&lt;/p&gt;

&lt;h2&gt;Lessons Learned&lt;/h2&gt;

&lt;p&gt;After spending two days troubleshooting this issue, here are the key things I learned:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;NSX-T SNAT changes the source IP:&lt;/strong&gt; When creating firewall rules for Tanzu workloads accessing external services, remember that the source IP will be the Tier-0 gateway IP after SNAT, not the pod IP or node IP.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;NetworkPolicies and NSX-T DFW work together:&lt;/strong&gt; Both layers need to allow the traffic. Even if NSX-T allows it, a restrictive NetworkPolicy in Kubernetes can block it, and vice versa.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Test from multiple points:&lt;/strong&gt; When troubleshooting, test from the pod, from the node, and from a regular VM. This helps you isolate where the problem is.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;NSX Intelligence is your friend:&lt;/strong&gt; Use NSX Intelligence to visualize traffic flows. It saves hours of guessing where traffic is getting blocked.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Document your IP ranges:&lt;/strong&gt; Keep a clear document of what IP ranges are used for what purpose. In our case, knowing the Tier-0 gateway IPs was crucial for fixing the firewall rules.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Start with less restrictive policies and tighten them:&lt;/strong&gt; When first deploying Tanzu with NSX-T, start with more permissive firewall rules to get connectivity working, then gradually tighten them for security. Trying to get everything perfect from day one often leads to connectivity issues that are hard to troubleshoot.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Common Mistakes to Avoid&lt;/h2&gt;

&lt;p&gt;Based on this experience and similar issues I have seen with other customers, here are common mistakes people make:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Using security groups based on VM segments for Tanzu traffic:&lt;/strong&gt; This does not work because pods are not VMs on segments. They are containers with overlay networking.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Forgetting about DNS:&lt;/strong&gt; If you create a very restrictive NetworkPolicy, do not forget to allow DNS (UDP port 53). Otherwise pods cannot resolve any domain names.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Not checking both ingress and egress:&lt;/strong&gt; Sometimes the problem is not that your pod cannot send traffic out, but that the response cannot come back in. Check both directions.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Assuming ping works means everything works:&lt;/strong&gt; ICMP (ping) uses a different protocol than TCP. Just because ping works does not mean your application traffic will work. Always test the actual port your application uses.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Not using labels consistently:&lt;/strong&gt; NetworkPolicies use label selectors. If your pods do not have the right labels, the policies will not apply to them correctly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Final Configuration Summary&lt;/h2&gt;

&lt;p&gt;For anyone facing similar issues, here is a summary of what a working configuration should look like:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NSX-T Side:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security group that includes the Tier-0 gateway IP(s) used for SNAT&lt;/li&gt;
&lt;li&gt;Distributed Firewall rule allowing traffic from that security group to your external services&lt;/li&gt;
&lt;li&gt;NSX Intelligence enabled for troubleshooting&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Tanzu Kubernetes Side:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NetworkPolicy allowing egress to the specific IP ranges and ports you need&lt;/li&gt;
&lt;li&gt;NetworkPolicy allowing DNS (UDP 53) for name resolution&lt;/li&gt;
&lt;li&gt;Proper pod labels so NetworkPolicies apply correctly&lt;/li&gt;
&lt;li&gt;NSX CNI with &lt;code&gt;enable_snat: True&lt;/code&gt; in the configuration&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Testing:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Test with actual application ports, not just ping&lt;/li&gt;
&lt;li&gt;Test from inside pods, not just from nodes&lt;/li&gt;
&lt;li&gt;Use NSX Intelligence to verify traffic flows&lt;/li&gt;
&lt;li&gt;Check logs on both NSX-T and Tanzu sides&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Networking in Tanzu Kubernetes with NSX-T can be complex because you have multiple layers of networking and security working together. When things go wrong, the key is to understand how traffic flows through the entire stack, from the pod to NSX-T to the destination.&lt;/p&gt;

&lt;p&gt;The most important thing to remember is that NSX-T performs SNAT for Tanzu traffic going to external destinations, so your firewall rules need to account for the post-SNAT IP addresses, not the pod IPs.&lt;/p&gt;

&lt;p&gt;I hope this helps anyone struggling with similar connectivity issues between Tanzu Kubernetes pods and external services through NSX-T. If you are still facing issues after trying these steps, double-check your NSX-T routing configuration and make sure the Tier-0 gateway is properly configured with external connectivity.&lt;/p&gt;


&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/1975340647400007358'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/1975340647400007358'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/10/fixing-tanzu-kubernetes-pod-to-external.html' title='Fixing Tanzu Kubernetes Pod to External Services Connectivity Issues with NSX-T'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3CNicQaGrLSTWMLVz3qg1XVaBUfF5uu_bS7T7lfbKwm1LBgMfRKhxPQTTocx_1wLb4dMhcQKMHpw0G2fdc0rHa6qg41e4dWjKFyvkLi1Sc5Q1Fh-_0LzlmKU4KuxT0dMhogZbAE1A8aPBVwLujJBEUzCTpA3A3bRBYUrXuGabm5u9KXmi7vmOgZIyqE/s72-c/Designer.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-5614446768579375321</id><published>2025-09-30T23:00:00.002+05:30</published><updated>2025-11-06T00:09:56.501+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vmworld"/><title type='text'>Unlocking VMware Cloud Foundation 9.0: A Strategic Blueprint for Enterprise Transformation</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;



&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;style&gt;
body { font-family: Georgia, serif; line-height: 1.6; color: #333; width: 100%; margin: 0; padding: 20px; box-sizing: border-box; }
h1 { color: #0066cc; border-bottom: 3px solid #0066cc; padding-bottom: 10px; }
h2 { color: #0066cc; margin-top: 30px; }
h3 { color: #005299; margin-top: 25px; }
.highlight { background-color: #e6f3ff; padding: 15px; border-left: 4px solid #0066cc; margin: 20px 0; }
.tip { background-color: #f0f9ff; padding: 15px; border-left: 4px solid #00cc66; margin: 20px 0; }
code { background-color: #f4f4f4; padding: 2px 6px; border-radius: 3px; font-family: &#39;Courier New&#39;, monospace; }
pre { background-color: #f4f4f4; padding: 15px; border-radius: 5px; overflow-x: auto; }
.section-intro { font-style: italic; color: #666; margin-bottom: 20px; }
table { border-collapse: collapse; width: 100%; margin: 20px 0; }
table th { background-color: #0066cc; color: white; padding: 12px; text-align: left; }
table td { border: 1px solid #ddd; padding: 10px; }
table tr:nth-child(even) { background-color: #f9f9f9; }
ul, ol { margin: 15px 0; padding-left: 30px; }
li { margin: 8px 0; }
.author { font-style: italic; color: #666; margin-bottom: 30px; }
.conclusion { background-color: #f0f9ff; padding: 20px; border-radius: 5px; margin-top: 30px; }
&lt;/style&gt;
&lt;/head&gt;
&lt;body&gt;
  

&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_LErwQzNMCi9FlmG-OCmS529ty559if7TTZyNTCXivHZ2foVH649kC7pB6M7IWFtcnjx9a0LMBSR8OFZoBf_y2bf_fHxeePPbk1t5xGl5SJsWmGHz02hzSjvovvyCy11O2Xgfvq1l3FAR6t7o7rMvHgLTF3MO4mGiWuBvFhYt2NF__SbZ-Q3cIpdpgFs/s2644/Screenshot%202025-11-05%20at%2019.33.47.png&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;1492&quot; data-original-width=&quot;2644&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_LErwQzNMCi9FlmG-OCmS529ty559if7TTZyNTCXivHZ2foVH649kC7pB6M7IWFtcnjx9a0LMBSR8OFZoBf_y2bf_fHxeePPbk1t5xGl5SJsWmGHz02hzSjvovvyCy11O2Xgfvq1l3FAR6t7o7rMvHgLTF3MO4mGiWuBvFhYt2NF__SbZ-Q3cIpdpgFs/s600/Screenshot%202025-11-05%20at%2019.33.47.png&quot;/&gt;&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;section-intro&quot;&gt;The evolution of VMware under Broadcom represents not disruption, but clarification—a focused vision toward unified private cloud excellence. As organizations navigate this transformation, the opportunity has never been greater to build truly modern, efficient, and powerful infrastructure with VMware Cloud Foundation.&lt;/p&gt;

&lt;p&gt;After architecting VMware solutions across diverse enterprise environments, I&#39;ve observed a pattern: organizations that embrace VMware Cloud Foundation (VCF) strategically—rather than viewing the transition as a burden—emerge with significantly more capable, cost-effective, and future-ready infrastructure.&lt;/p&gt;

&lt;p&gt;This post shares a practical framework for successfully modernizing your VMware environment, maximizing your investment, and positioning your organization for the AI-driven, cloud-native future.&lt;/p&gt;

&lt;h2&gt;Understanding the VMware Cloud Foundation Vision&lt;/h2&gt;

&lt;p&gt;Let&#39;s start with clarity about what Broadcom and VMware are building:&lt;/p&gt;

&lt;div class=&quot;highlight&quot;&gt;
&lt;strong&gt;VMware Cloud Foundation 9.0 is a complete private cloud platform&lt;/strong&gt; that unifies compute (vSphere), storage (vSAN), networking (NSX), security, Kubernetes (Tanzu), and now AI services into a single, integrated stack with simplified operations and lifecycle management.
&lt;/div&gt;

&lt;p&gt;This isn&#39;t just repackaging existing products—VCF 9.0 introduces genuinely transformative capabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;AI-Native Infrastructure:&lt;/strong&gt; Built-in Private AI Foundation with NVIDIA integration, vector database support, and GPU resource management for enterprise AI workloads&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simplified Operations:&lt;/strong&gt; Single pane of glass management (SDDC Manager), automated lifecycle operations, one-click patching across the entire stack&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enhanced Security:&lt;/strong&gt; Zero-trust architecture by default, micro-segmentation with NSX, encrypted vSAN, comprehensive compliance frameworks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Kubernetes Excellence:&lt;/strong&gt; vSphere with Tanzu integrated natively, seamless VM and container orchestration from the same platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Extended Support:&lt;/strong&gt; 6-year support lifecycle (increased from 5 years), providing long-term stability and investment protection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sovereign Cloud Ready:&lt;/strong&gt; Built-in capabilities for data residency, regulatory compliance, and national security requirements&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;The Strategic Value Proposition&lt;/h3&gt;

&lt;p&gt;Organizations are discovering that VCF delivers compelling advantages over fragmented multi-cloud strategies:&lt;/p&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Challenge&lt;/th&gt;
&lt;th&gt;VCF Solution&lt;/th&gt;
&lt;th&gt;Business Impact&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Public cloud costs spiraling&lt;/td&gt;
&lt;td&gt;Predictable private cloud economics with 3-5 year ROI&lt;/td&gt;
&lt;td&gt;30-60% TCO reduction for stable workloads&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Data sovereignty requirements&lt;/td&gt;
&lt;td&gt;On-premises control with cloud operations model&lt;/td&gt;
&lt;td&gt;Regulatory compliance without compromise&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Security complexity&lt;/td&gt;
&lt;td&gt;Unified security architecture (NSX, vSAN encryption, identity)&lt;/td&gt;
&lt;td&gt;Reduced attack surface, simplified auditing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Skills shortage&lt;/td&gt;
&lt;td&gt;Integrated platform reduces learning curve vs. multi-vendor&lt;/td&gt;
&lt;td&gt;Operational efficiency, faster onboarding&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AI infrastructure needs&lt;/td&gt;
&lt;td&gt;Native GPU management, AI-ready platform&lt;/td&gt;
&lt;td&gt;Accelerated AI adoption without separate infrastructure&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h2&gt;The Smart Migration Path to VCF 9.0&lt;/h2&gt;

&lt;p&gt;The key to successful VCF adoption is treating it as an &lt;em&gt;optimization opportunity&lt;/em&gt;, not just a licensing migration. Here&#39;s the architecture framework I recommend:&lt;/p&gt;

&lt;h3&gt;Phase 1: Strategic Assessment &amp;amp; Optimization (Weeks 1-6)&lt;/h3&gt;

&lt;p&gt;Before migrating to VCF, optimize your existing VMware footprint. This is where most organizations find immediate value:&lt;/p&gt;

&lt;div class=&quot;tip&quot;&gt;
&lt;strong&gt;Pro Tip:&lt;/strong&gt; Organizations typically reduce their VMware footprint by 25-40% through optimization before VCF migration, significantly reducing licensing costs and improving ROI.
&lt;/div&gt;

&lt;h4&gt;VM Portfolio Rationalization:&lt;/h4&gt;

&lt;pre&gt;
Audit Category               Typical Findings        Action
─────────────────────────────────────────────────────────────
Powered Off VMs             10-15% of inventory     Decommission (archive if needed)
Zombie VMs (no activity)     5-10% of inventory     Identify owners, decommission
Over-provisioned Resources   30-50% of VMs          Rightsize CPU/memory
Duplicate/Redundant VMs      5-8% of inventory      Consolidate
Development/Test Sprawl      20-25% of inventory    Consolidate to shared environments
&lt;/pre&gt;

&lt;h4&gt;Workload Classification:&lt;/h4&gt;

&lt;p&gt;Categorize workloads by strategic value to determine optimal platform placement:&lt;/p&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Tier&lt;/th&gt;
&lt;th&gt;Characteristics&lt;/th&gt;
&lt;th&gt;Platform Recommendation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tier 1: Mission Critical&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Production apps, customer-facing, revenue-generating, regulated workloads&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;VCF Premium&lt;/strong&gt; - Full stack, highest SLA, advanced features&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tier 2: Business Critical&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Internal systems, moderate complexity, stable requirements&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;VCF Standard&lt;/strong&gt; - Core capabilities, excellent reliability&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tier 3: Development&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Dev/test, staging, CI/CD, analytics&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;VVF (vSphere Foundation)&lt;/strong&gt; - Cost-optimized compute&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tier 4: Ephemeral&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Containers, microservices, short-lived compute&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tanzu on VCF&lt;/strong&gt; - Kubernetes-native&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;div class=&quot;highlight&quot;&gt;
&lt;strong&gt;Key Insight:&lt;/strong&gt; Not everything needs to be on VCF. Strategic workload placement maximizes value while controlling costs. Use VCF where it provides clear business advantage; use vSphere Foundation (VVF) for simpler workloads.
&lt;/div&gt;

&lt;h3&gt;Phase 2: VCF Architecture Design (Weeks 7-12)&lt;/h3&gt;

&lt;p&gt;Design your target VCF environment based on optimized requirements:&lt;/p&gt;

&lt;h4&gt;Cluster Sizing Strategy:&lt;/h4&gt;

&lt;p&gt;VCF licensing is core-based with minimum commitments. Optimize your architecture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Consolidate clusters:&lt;/strong&gt; Fewer, larger clusters are more efficient than many small ones (reduces licensing overhead, improves resource utilization)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Standardize hardware:&lt;/strong&gt; Use consistent server specifications to simplify operations and licensing tracking&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Plan for growth:&lt;/strong&gt; Size for 3-year capacity with 20-30% headroom (avoids frequent license additions)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Consider HCI:&lt;/strong&gt; vSAN-based VCF reduces hardware footprint and simplifies management&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Network Architecture with NSX:&lt;/h4&gt;

&lt;p&gt;NSX is included in VCF—leverage it fully:&lt;/p&gt;

&lt;pre&gt;
VCF Network Architecture:
├── Physical Network: Simplified underlay (L3 spine-leaf recommended)
├── NSX Overlay: Logical networks, micro-segmentation
├── Tier-0 Gateway: North-south routing, external connectivity
├── Tier-1 Gateways: Per-application routing, east-west traffic
├── Distributed Firewall: Micro-segmentation policies
└── Load Balancing: Integrated NSX Advanced Load Balancer
&lt;/pre&gt;

&lt;div class=&quot;tip&quot;&gt;
&lt;strong&gt;Architecture Tip:&lt;/strong&gt; NSX enables you to simplify physical networking dramatically. Many organizations reduce physical VLAN count by 70-80%, decreasing complexity and change risk.
&lt;/div&gt;

&lt;h4&gt;Storage Design with vSAN:&lt;/h4&gt;

&lt;p&gt;vSAN in VCF 9.0 includes powerful capabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Storage Policies:&lt;/strong&gt; Define service levels (encryption, deduplication, compression, erasure coding) per workload&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;vSAN ESA (Express Storage Architecture):&lt;/strong&gt; Next-gen architecture with 2-3x performance improvement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;File Services:&lt;/strong&gt; Native NFS/SMB file shares without separate NAS&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;HCI Mesh:&lt;/strong&gt; Share storage across clusters for better utilization&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Phase 3: Pilot Implementation (Months 4-5)&lt;/h3&gt;

&lt;p&gt;Deploy a VCF pilot with real workloads to validate architecture and build team confidence:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Deploy VCF Workload Domain:&lt;/strong&gt; Start with a single 4-node cluster (minimum for VCF)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integrate Identity:&lt;/strong&gt; Connect to Active Directory, configure RBAC&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure NSX:&lt;/strong&gt; Deploy logical networking, test connectivity&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Deploy Tanzu:&lt;/strong&gt; Enable Kubernetes capabilities, deploy sample apps&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Migrate Test Workloads:&lt;/strong&gt; Move 10-20 non-critical VMs, validate functionality&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operational Validation:&lt;/strong&gt; Test backup/restore, patching, monitoring, alerting&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Performance Baseline:&lt;/strong&gt; Establish metrics for comparison&lt;/li&gt;
&lt;/ol&gt;

&lt;div class=&quot;highlight&quot;&gt;
&lt;strong&gt;Success Metric:&lt;/strong&gt; Pilot should demonstrate that VCF operations are simpler and more automated than traditional vSphere, not more complex. If it feels harder, revisit your design.
&lt;/div&gt;

&lt;h3&gt;Phase 4: Production Rollout (Months 6-18)&lt;/h3&gt;

&lt;p&gt;Systematic migration of production workloads:&lt;/p&gt;

&lt;pre&gt;
Migration Wave Planning:
├── Wave 1 (Months 6-8): Low-risk, tier 3 workloads (100-200 VMs)
├── Wave 2 (Months 9-11): Tier 2 workloads, more complex apps (200-400 VMs)
├── Wave 3 (Months 12-15): Tier 1 production, mission-critical (100-300 VMs)
└── Wave 4 (Months 16-18): Specialized workloads, cleanup, optimization
&lt;/pre&gt;

&lt;h4&gt;Migration Tools &amp;amp; Techniques:&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;vMotion:&lt;/strong&gt; For VMs already on vSphere 7.x/8.x (zero downtime)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;HCX (Hybrid Cloud Extension):&lt;/strong&gt; For complex migrations, cross-version compatibility&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Workload Mobility:&lt;/strong&gt; VCF native tools for intra-VCF migrations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Application-Aware Migration:&lt;/strong&gt; Coordinate with app owners, test thoroughly&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Maximizing VCF Investment: Advanced Capabilities&lt;/h2&gt;

&lt;p&gt;Once your core VCF environment is operational, unlock advanced capabilities that drive additional value:&lt;/p&gt;

&lt;h3&gt;1. AI-Ready Infrastructure with Private AI Foundation&lt;/h3&gt;

&lt;p&gt;VCF 9.0 includes native AI infrastructure capabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;GPU Resource Management:&lt;/strong&gt; Dynamic allocation of NVIDIA GPUs to AI workloads&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vector Database Support:&lt;/strong&gt; Integrated support for AI/ML data operations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AI Workload Optimization:&lt;/strong&gt; Automated placement and scaling of AI training/inference&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Private AI Services:&lt;/strong&gt; Deploy AI models within your VCF environment with data governance&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&quot;tip&quot;&gt;
&lt;strong&gt;Use Case:&lt;/strong&gt; Organizations building private AI/ML platforms on VCF reduce infrastructure complexity vs. separate AI clusters, while maintaining data sovereignty and control.
&lt;/div&gt;

&lt;h3&gt;2. Kubernetes at Scale with Tanzu&lt;/h3&gt;

&lt;p&gt;VCF includes vSphere with Tanzu, enabling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified VM + Container Platform:&lt;/strong&gt; Run traditional VMs and modern containers from the same infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simplified Kubernetes:&lt;/strong&gt; Declarative cluster creation, automated lifecycle management&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise-Grade Security:&lt;/strong&gt; NSX micro-segmentation for containers, image registry scanning&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-Cluster Management:&lt;/strong&gt; Centralized governance across development, staging, production clusters&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;3. Disaster Recovery &amp;amp; Business Continuity&lt;/h3&gt;

&lt;p&gt;VCF enables sophisticated DR architectures:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;vSAN Stretched Clusters:&lt;/strong&gt; Synchronous replication across sites with automated failover&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NSX Federation:&lt;/strong&gt; Multi-site networking with consistent security policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Site Recovery Manager:&lt;/strong&gt; Orchestrated DR testing and failover&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;vSphere Replication:&lt;/strong&gt; Asynchronous replication for geographically dispersed sites&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;4. Sovereign Cloud Capabilities&lt;/h3&gt;

&lt;p&gt;For regulated industries and government sectors, VCF provides:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Data Residency Controls:&lt;/strong&gt; Guarantee workloads and data remain in specific geographies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance Frameworks:&lt;/strong&gt; Pre-configured templates for PCI-DSS, HIPAA, FedRAMP, GDPR&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Audit Logging:&lt;/strong&gt; Comprehensive audit trails for regulatory requirements&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Everything:&lt;/strong&gt; Data-at-rest (vSAN), data-in-motion (NSX), VM encryption&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Cost Optimization Strategies&lt;/h2&gt;

&lt;p&gt;Making VCF economically compelling requires strategic thinking about total cost of ownership:&lt;/p&gt;

&lt;h3&gt;Licensing Optimization:&lt;/h3&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Strategy&lt;/th&gt;
&lt;th&gt;Implementation&lt;/th&gt;
&lt;th&gt;Typical Savings&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Right-size before migration&lt;/td&gt;
&lt;td&gt;Eliminate unused VMs, consolidate workloads&lt;/td&gt;
&lt;td&gt;25-40% footprint reduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Workload tiering&lt;/td&gt;
&lt;td&gt;Use VVF for dev/test instead of full VCF&lt;/td&gt;
&lt;td&gt;30-50% dev/test licensing cost&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cluster consolidation&lt;/td&gt;
&lt;td&gt;Fewer, larger clusters vs. many small ones&lt;/td&gt;
&lt;td&gt;15-25% through better utilization&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3-year commits&lt;/td&gt;
&lt;td&gt;Negotiate multi-year agreements for stability&lt;/td&gt;
&lt;td&gt;10-20% vs. annual renewals&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Partner relationships&lt;/td&gt;
&lt;td&gt;Work with VMware Cloud Service Providers (VCSP)&lt;/td&gt;
&lt;td&gt;Access to better terms, support&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h3&gt;Operational Efficiency:&lt;/h3&gt;

&lt;div class=&quot;highlight&quot;&gt;
VCF automation capabilities typically reduce operational overhead by 40-60% compared to managing separate product silos (vSphere, vSAN, NSX, Tanzu independently).
&lt;/div&gt;

&lt;p&gt;Quantify these savings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Patching Time:&lt;/strong&gt; VCF automated lifecycle management vs. manual component patching (saves 10-20 hours per quarter)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Troubleshooting:&lt;/strong&gt; Unified interface reduces MTTI (Mean Time to Identify) by 30-50%&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Capacity Planning:&lt;/strong&gt; vRealize Operations integration provides proactive recommendations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Self-Service:&lt;/strong&gt; Developer portal (Aria Automation) reduces provisioning tickets by 70-80%&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Hardware Efficiency:&lt;/h3&gt;

&lt;p&gt;VCF enables better hardware utilization:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;vSAN HCI:&lt;/strong&gt; Eliminate separate SAN infrastructure (reduces hardware footprint by 20-30%)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NSX Overlay:&lt;/strong&gt; Reduce physical switch complexity and port requirements&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Resource Pooling:&lt;/strong&gt; Better VM density through optimized resource management&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Power Efficiency:&lt;/strong&gt; Consolidation reduces power and cooling costs&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Building the Business Case&lt;/h2&gt;

&lt;p&gt;Executives need clear ROI justification. Here&#39;s a framework for building the VCF business case:&lt;/p&gt;

&lt;h3&gt;5-Year TCO Model:&lt;/h3&gt;

&lt;pre&gt;
Cost Category                Year 1      Years 2-5    Notes
─────────────────────────────────────────────────────────────────
VCF Licensing                $XXX,XXX    $XXX,XXX     Subscription model
Hardware (refresh/new)       $XXX,XXX    $XXX,XXX     3-5 year depreciation
Migration Services           $XX,XXX     -            One-time investment
Training &amp; Enablement        $XX,XXX     -            Team upskilling
Operational Savings          ($XX,XXX)   ($XXX,XXX)   Automation benefits
Hardware Consolidation       ($XX,XXX)   ($XX,XXX)    SAN elimination, etc.
Public Cloud Repatriation    -           ($XXX,XXX)   Move workloads from AWS/Azure
─────────────────────────────────────────────────────────────────
Net TCO                      $XXX,XXX    $XXX,XXX     Positive ROI by Year 2-3
&lt;/pre&gt;

&lt;h3&gt;Qualitative Benefits:&lt;/h3&gt;

&lt;p&gt;Beyond cost, emphasize strategic value:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Risk Reduction:&lt;/strong&gt; Unified platform reduces complexity and security exposure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Agility:&lt;/strong&gt; Faster provisioning, self-service capabilities accelerate business initiatives&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Innovation Enablement:&lt;/strong&gt; AI and Kubernetes capabilities support digital transformation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance:&lt;/strong&gt; Built-in controls simplify regulatory adherence&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Talent Retention:&lt;/strong&gt; Modern platform attracts and retains skilled engineers&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Common Challenges &amp;amp; Solutions&lt;/h2&gt;

&lt;p&gt;Let&#39;s address the concerns I hear most frequently:&lt;/p&gt;

&lt;h3&gt;Challenge: &quot;VCF licensing costs are too high&quot;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt; Focus on total cost of ownership, not just licensing. When you factor in operational savings, hardware consolidation, and avoided public cloud costs, VCF often shows positive ROI within 24-36 months. The key is right-sizing before migration and using workload tiering strategically.&lt;/p&gt;

&lt;h3&gt;Challenge: &quot;Our team doesn&#39;t have VCF expertise&quot;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt; If your team can manage vSphere/vSAN/NSX today, VCF is an evolution, not a revolution. VMware provides excellent training (VMware Learning), and the VCF interface is actually simpler than managing components separately. Consider engaging a VMware partner for initial implementation and knowledge transfer.&lt;/p&gt;

&lt;h3&gt;Challenge: &quot;We&#39;re locked into Broadcom&#39;s strategy&quot;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt; VCF is built on open standards (KVM, Kubernetes, open networking). Your workloads remain portable. The &quot;lock-in&quot; concern is overstated—you&#39;re committed to the platform&#39;s capabilities, not trapped. Focus on whether VCF meets your requirements, not hypothetical future exits.&lt;/p&gt;

&lt;h3&gt;Challenge: &quot;Migration will disrupt business operations&quot;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt; Phased migration using vMotion and HCX enables zero-downtime transitions for most workloads. The key is proper planning, pilot validation, and wave-based approach. Organizations successfully migrate 1000+ VMs with minimal business impact using this methodology.&lt;/p&gt;

&lt;h2&gt;The Partner Ecosystem Advantage&lt;/h2&gt;

&lt;p&gt;Don&#39;t navigate VCF adoption alone. Leverage the VMware partner ecosystem:&lt;/p&gt;

&lt;h3&gt;VMware Cloud Service Providers (VCSP):&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Access to dedicated VMware support and resources&lt;/li&gt;
&lt;li&gt;Better pricing through partner programs&lt;/li&gt;
&lt;li&gt;Implementation expertise and best practices&lt;/li&gt;
&lt;li&gt;Ongoing managed services if desired&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;System Integrators:&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Architecture design and validation&lt;/li&gt;
&lt;li&gt;Migration planning and execution&lt;/li&gt;
&lt;li&gt;Training and knowledge transfer&lt;/li&gt;
&lt;li&gt;Post-migration optimization&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&quot;tip&quot;&gt;
&lt;strong&gt;Recommendation:&lt;/strong&gt; Engage a VCSP early in your planning process. They can provide architecture reviews, sizing assistance, and often have access to VMware resources that accelerate your success.
&lt;/div&gt;

&lt;h2&gt;Looking Forward: The VCF Roadmap&lt;/h2&gt;

&lt;p&gt;VMware&#39;s product direction under Broadcom is increasingly clear:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Continued AI Integration:&lt;/strong&gt; Deeper NVIDIA partnership, expanded AI services&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Edge Computing:&lt;/strong&gt; VCF deployment models for edge and distributed locations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-Cloud Consistency:&lt;/strong&gt; Unified operations across on-prem VCF and public cloud VMware services&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Developer Experience:&lt;/strong&gt; Enhanced Tanzu capabilities, improved DevOps integration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operational Simplicity:&lt;/strong&gt; Further automation of lifecycle operations, self-healing capabilities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Organizations investing in VCF today are positioning themselves for these future capabilities.&lt;/p&gt;

&lt;div class=&quot;conclusion&quot;&gt;
&lt;h2&gt;Conclusion: The Path Forward&lt;/h2&gt;

&lt;p&gt;The evolution of VMware under Broadcom represents a strategic inflection point—an opportunity to modernize infrastructure, reduce operational complexity, and build a foundation for AI-driven, cloud-native workloads.&lt;/p&gt;

&lt;p&gt;VMware Cloud Foundation 9.0 is not just a licensing change; it&#39;s a genuinely advanced platform that, when implemented strategically, delivers compelling technical and economic benefits.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My recommendations for organizations navigating this transition:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Start with assessment:&lt;/strong&gt; Understand your current state, optimize before migrating&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Design strategically:&lt;/strong&gt; Use workload tiering to maximize value while controlling costs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Leverage partners:&lt;/strong&gt; Don&#39;t go alone—VCSP ecosystem provides valuable support&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Focus on TCO:&lt;/strong&gt; Look beyond licensing costs to total economic impact&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Execute methodically:&lt;/strong&gt; Phased approach reduces risk and builds confidence&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Unlock advanced capabilities:&lt;/strong&gt; AI, Kubernetes, sovereign cloud features differentiate VCF&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The organizations that will thrive in this new VMware era are those that embrace the VCF vision strategically, optimize intelligently, and execute with discipline.&lt;/p&gt;

&lt;p&gt;As a VMware architect, I&#39;m excited about what VCF enables. The platform has never been more capable, more integrated, or more ready to support the next generation of enterprise workloads.&lt;/p&gt;
&lt;/div&gt;

&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Are you planning a VCF migration? What challenges are you facing in your VMware modernization journey? I&#39;d love to hear your perspective and help address your specific questions.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Feel free to reach out—as a VMware solutions architect, I&#39;m passionate about helping organizations succeed with VCF and maximize their VMware investments.&lt;/em&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p style=&quot;font-size: 0.9em; color: #666;&quot;&gt;&lt;em&gt;This article reflects my professional experience architecting VMware solutions. Your specific requirements may differ—consult with VMware-certified professionals for architecture guidance tailored to your environment. VMware Cloud Foundation and related products are trademarks of VMware, Inc.&lt;/em&gt;&lt;/p&gt;

&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/5614446768579375321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/5614446768579375321'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/09/unlocking-vmware-cloud-foundation-90.html' title='Unlocking VMware Cloud Foundation 9.0: A Strategic Blueprint for Enterprise Transformation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_LErwQzNMCi9FlmG-OCmS529ty559if7TTZyNTCXivHZ2foVH649kC7pB6M7IWFtcnjx9a0LMBSR8OFZoBf_y2bf_fHxeePPbk1t5xGl5SJsWmGHz02hzSjvovvyCy11O2Xgfvq1l3FAR6t7o7rMvHgLTF3MO4mGiWuBvFhYt2NF__SbZ-Q3cIpdpgFs/s72-c/Screenshot%202025-11-05%20at%2019.33.47.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-751661815837993311</id><published>2025-09-30T15:02:00.004+05:30</published><updated>2025-11-06T18:59:32.465+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Architecting Intelligence: AI-Driven Automation in VMware Cloud Foundation</title><content type='html'>&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;style&gt;
body { font-family: Georgia, serif; line-height: 1.8; color: #333; width: 100%; margin: 0; padding: 20px; box-sizing: border-box; }
.header { background: linear-gradient(135deg, #0066cc 0%, #004d99 100%); color: white; padding: 35px 25px; margin: -20px -20px 30px -20px; border-radius: 0 0 12px 12px; }
h1 { color: white; margin: 0 0 12px 0; font-size: 2.2em; line-height: 1.3; }
.subtitle { color: #FCFAFA; font-size: 1.15em; font-style: italic; margin: 8px 0 0 0; }
h2 { color: #F26907; margin-top: 35px; font-size: 1.7em; }
h3 { color: #07B0F2; margin-top: 28px; font-size: 1.35em; }
.author { font-style: italic; color: #666; margin-bottom: 25px; font-size: 1.05em; padding: 12px; background: #f8f9fa; border-left: 3px solid #0066cc; }
.intro-text { font-size: 1.08em; color: #444; line-height: 1.75; margin-bottom: 25px; }
.insight-box { background: #e6f3ff; padding: 18px 20px; margin: 22px 0; border-radius: 6px; border-left: 4px solid #0066cc; }
.tech-note { background: #fff9e6; padding: 18px 20px; margin: 22px 0; border-radius: 6px; border-left: 4px solid #ff9900; }
.future-note { background: #f0ffe6; padding: 18px 20px; margin: 22px 0; border-radius: 6px; border-left: 4px solid #66cc00; }
table { border-collapse: collapse; width: 100%; margin: 22px 0; background: white; box-shadow: 0 1px 3px rgba(0,0,0,0.08); }
table th { background: linear-gradient(135deg, #0066cc 0%, #004d99 100%); color: white; padding: 14px; text-align: left; font-weight: 600; }
table td { border: 1px solid #ddd; padding: 12px; vertical-align: top; }
table tr:nth-child(even) { background-color: #f9f9f9; }
table tr:hover { background-color: #f0f9ff; }
ul, ol { margin: 15px 0; padding-left: 32px; }
li { margin: 9px 0; line-height: 1.7; }
code { background-color: #f4f4f4; padding: 3px 7px; border-radius: 3px; font-family: &#39;Courier New&#39;, monospace; font-size: 0.92em; color: #c7254e; }
.conclusion { background: #f8f9fa; padding: 25px; margin-top: 35px; border-radius: 8px; border-top: 3px solid #0066cc; }
.tag { display: inline-block; background: #0066cc; color: white; padding: 4px 12px; margin: 4px; border-radius: 15px; font-size: 0.82em; }
.tags { margin: 18px 0; }
p { margin: 15px 0; }
strong { color: #0066cc; }
&lt;/style&gt;
&lt;/head&gt;
&lt;body&gt;

&lt;div class=&quot;header&quot;&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;p class=&quot;subtitle&quot;&gt;A Practical Architect&#39;s View on Integrating AI Capabilities into VMware Cloud Foundation&lt;/p&gt;
&lt;/div&gt;


&lt;div class=&quot;tags&quot;&gt;
&lt;span class=&quot;tag&quot;&gt;VMware Cloud Foundation&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;AI Integration&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Intelligent Operations&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Enterprise Architecture&lt;/span&gt;
&lt;/div&gt;

  
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbI5PxVp6YjZOI0qFkwBYqB4RudTvul_R4pr21n0jgB04xgHq8YBbSniTCVF5tvghkXnaQ7wKejtMf3mNzwZCz4CvNsSM5jhO-j2_sPPJYbaLc9ZNcTRTnPlRULWyf_o2KjVCwKcmgn5nTAqVlaNoqwLGDfKTpd7ax3qENWRWCkilRxM8YJj-gEq7thrs/s2044/Screenshot%202025-11-06%20at%2014.28.35.png&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;1160&quot; data-original-width=&quot;2044&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbI5PxVp6YjZOI0qFkwBYqB4RudTvul_R4pr21n0jgB04xgHq8YBbSniTCVF5tvghkXnaQ7wKejtMf3mNzwZCz4CvNsSM5jhO-j2_sPPJYbaLc9ZNcTRTnPlRULWyf_o2KjVCwKcmgn5nTAqVlaNoqwLGDfKTpd7ax3qENWRWCkilRxM8YJj-gEq7thrs/s600/Screenshot%202025-11-06%20at%2014.28.35.png&quot;/&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p class=&quot;intro-text&quot;&gt;The biggest challenge enterprises face today is not just managing infrastructure at scale, but making intelligent decisions about it. Every day, our VMware environments generate millions of data points about performance, capacity, security, and health. The question is no longer whether we have enough data. The real question is whether we have the intelligence to act on it before problems impact our business.&lt;/p&gt;

&lt;p&gt;Having worked with VMware infrastructure for several years now, I have seen this pattern repeat itself across organizations. We build sophisticated monitoring systems. We create detailed dashboards. We write comprehensive runbooks. But when an incident happens at 2 AM, we still depend on a tired engineer to connect the dots between disparate signals and make the right call under pressure.&lt;/p&gt;

&lt;p&gt;What if the infrastructure itself could learn these patterns? What if it could predict capacity issues before they become critical? What if it could automatically remediate common problems while the team sleeps? This is not futuristic thinking anymore. With VMware Cloud Foundation 9.0 and its native AI capabilities, this is becoming our reality.&lt;/p&gt;

&lt;h2&gt;Why Traditional Operations Are Reaching Their Limits&lt;/h2&gt;

&lt;p&gt;Let me share something I observed recently. A large enterprise retail organization I worked with had 15 different monitoring tools feeding into a central dashboard. They had invested heavily in observability. Every metric imaginable was being collected. Storage utilization, network throughput, VM performance, application response times, everything.&lt;/p&gt;

&lt;p&gt;Yet they were still getting surprised by capacity issues. Storage would fill up faster than predicted. Applications would slow down before crossing their monitoring thresholds. The root cause was always there in the data, but it was buried under thousands of normal signals. By the time someone noticed the pattern, it was too late for proactive action.&lt;/p&gt;

&lt;div class=&quot;insight-box&quot;&gt;
&lt;strong&gt;The Core Problem:&lt;/strong&gt; Human capacity to analyze data does not scale with the complexity of modern infrastructure. A single VMware environment can easily generate 50,000 metrics per minute. No operations team, no matter how skilled, can process this volume in real time and spot the subtle patterns that indicate emerging problems.
&lt;/div&gt;

&lt;p&gt;This is where intelligent automation becomes necessary, not optional. I am not talking about simple scripting or basic if-then-else logic. I mean systems that can actually learn what normal looks like for your specific environment, detect anomalies that deviate from those patterns, and make informed decisions about how to respond.&lt;/p&gt;

&lt;h2&gt;What VMware Cloud Foundation 9.0 Brings to the Table&lt;/h2&gt;

&lt;p&gt;VMware has taken a very pragmatic approach with VCF 9.0. Instead of bolting AI on as an afterthought or requiring you to build separate AI infrastructure, they have integrated intelligence capabilities directly into the platform itself.&lt;/p&gt;

&lt;p&gt;The Private AI Foundation component is particularly interesting from an architectural standpoint. It gives you the ability to run AI workloads on the same infrastructure that runs your production applications. This might sound trivial, but think about the implications. You do not need a separate GPU cluster. You do not need to move data to external ML platforms. You do not need to worry about data sovereignty issues because everything stays within your own environment.&lt;/p&gt;

&lt;h3&gt;Three Capabilities That Matter Most for Operations&lt;/h3&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Capability&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;th&gt;Why It Matters for SRE&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;In Platform AI Runtime&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Run machine learning models directly within VCF without external dependencies&lt;/td&gt;
&lt;td&gt;Build and deploy operational AI models that have direct access to infrastructure APIs and telemetry data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Vector Database Integration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Store and query operational knowledge in semantic format rather than just raw metrics&lt;/td&gt;
&lt;td&gt;Enable intelligent search across historical incidents, configuration changes, and performance patterns to find similar situations&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Model Governance Framework&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Control which AI models can make what changes with policy based guardrails&lt;/td&gt;
&lt;td&gt;Build trust by ensuring AI decisions are auditable, explainable, and constrained to safe boundaries&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h2&gt;Practical Use Cases I Have Implemented&lt;/h2&gt;

&lt;p&gt;Theory is good, but what actually works in production? Let me walk through three scenarios where I have successfully deployed intelligent automation on VMware infrastructure.&lt;/p&gt;

&lt;h3&gt;Capacity Prediction That Actually Works&lt;/h3&gt;

&lt;p&gt;The traditional approach to capacity planning goes something like this. You look at historical growth trends. You extrapolate linearly. You add some buffer. You order hardware. By the time it arrives and gets deployed, your actual consumption has diverged from the prediction because growth is rarely linear.&lt;/p&gt;

&lt;p&gt;With an AI based approach, the model learns seasonal patterns specific to your workloads. It knows that compute usage spikes during month end closing for financial applications. It understands that storage growth accelerates during tax season. It factors in upcoming application deployments that will add load.&lt;/p&gt;

&lt;div class=&quot;tech-note&quot;&gt;
&lt;strong&gt;Real Example:&lt;/strong&gt; For one retail client, we trained a forecasting model on 18 months of vRealize Operations data. The model now predicts cluster capacity needs 45 days in advance with 92 percent accuracy. More importantly, it flags anomalous growth patterns that indicate inefficient applications or zombie VMs consuming resources unnecessarily. This single capability has reduced their infrastructure overspend by 23 percent.
&lt;/div&gt;

&lt;p&gt;The technical implementation is straightforward. vRealize Operations already collects the metrics. We extract CPU, memory, and storage utilization data at hourly granularity. A time series model trained on this data using VCF&#39;s integrated ML capabilities generates forecasts. The model output feeds into our procurement workflow, triggering hardware orders when predicted utilization will cross 70 percent in the next 60 days.&lt;/p&gt;

&lt;h3&gt;Intelligent Incident Response&lt;/h3&gt;

&lt;p&gt;Here is something that happens all too often. An alert fires at 3 AM. The on call engineer wakes up, logs into multiple systems, correlates logs and metrics, searches through Confluence for the relevant runbook, follows the steps, and resolves the issue in 40 minutes. The next week, a similar alert happens. Different engineer, same 40 minute process.&lt;/p&gt;

&lt;p&gt;Now imagine this instead. The alert fires. Within seconds, an AI agent analyzes the symptoms, queries the vector database for similar historical incidents, identifies the most likely root cause, validates the recommended fix against current system state, executes the remediation automatically, and sends a summary notification to the team channel. Total time? 90 seconds. No human woken up.&lt;/p&gt;

&lt;div class=&quot;insight-box&quot;&gt;
&lt;strong&gt;Key Architectural Decision:&lt;/strong&gt; We do not let AI agents run unrestricted. Each agent operates under a governance policy that defines exactly what actions it can take automatically versus what requires human approval. Low risk actions like clearing cache or restarting a stuck service are fully automated. Higher risk actions like failing over to DR site require human confirmation even if the AI recommends it.
&lt;/div&gt;

&lt;p&gt;The agent architecture uses VMware&#39;s Model Context Protocol support to maintain context across the entire incident lifecycle. It can read documentation, understand system topology from NSX Intelligence, analyze metrics from vROps, and execute remediation via vCenter APIs. All while logging every decision for audit purposes.&lt;/p&gt;

&lt;h3&gt;Continuous Optimization&lt;/h3&gt;

&lt;p&gt;This is perhaps the most valuable use case because it generates continuous business value rather than just preventing occasional fires. The basic idea is simple. An optimization agent constantly scans your VMware environment looking for inefficiencies.&lt;/p&gt;

&lt;p&gt;It identifies VMs that are sized far larger than their actual utilization patterns require. It finds workloads that are on premium storage but have low I/O requirements. It detects VMs that have been powered off for 60 plus days but are still consuming storage. It spots network traffic patterns that would benefit from VM placement optimization.&lt;/p&gt;

&lt;p&gt;For each finding, the agent calculates the potential savings, estimates the risk of making the change, and presents recommendations prioritized by ROI. Some changes happen automatically. Powered off VMs get archived after notification to the owner. Others require approval. Rightsizing production databases needs a human to review even if the data clearly supports it.&lt;/p&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Optimization Type&lt;/th&gt;
&lt;th&gt;Detection Method&lt;/th&gt;
&lt;th&gt;Typical Savings&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VM Rightsizing&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Compare allocated resources versus 60 day average utilization&lt;/td&gt;
&lt;td&gt;15 to 30 percent reduction in compute licensing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Storage Policy Optimization&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Analyze I/O patterns and match to appropriate tier&lt;/td&gt;
&lt;td&gt;20 to 35 percent storage cost reduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Zombie VM Cleanup&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Identify VMs with zero activity for extended periods&lt;/td&gt;
&lt;td&gt;8 to 12 percent capacity reclamation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Network Placement&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Analyze east west traffic patterns from NSX flows&lt;/td&gt;
&lt;td&gt;10 to 25 percent latency reduction for chatty workloads&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h2&gt;The Integration Challenge and How to Solve It&lt;/h2&gt;

&lt;p&gt;The hardest part of building intelligent operations is not the AI itself. There are plenty of good ML frameworks available. The hard part is integrating AI decision making into your existing operational workflows in a way that people actually trust and adopt.&lt;/p&gt;

&lt;p&gt;I learned this the hard way. My first attempt at deploying an AI based remediation agent failed spectacularly. Not because the AI made wrong decisions. It actually worked quite well. It failed because the operations team did not trust it. They could not see why it made certain decisions. They were uncomfortable with the idea of autonomous changes happening in production without their direct control.&lt;/p&gt;

&lt;div class=&quot;future-note&quot;&gt;
&lt;strong&gt;Lesson Learned:&lt;/strong&gt; Start with observability and recommendations before moving to automation. Let the AI watch and learn for 30 days. Have it generate recommendations that humans review and execute manually. Only after the team sees that recommendations are consistently good and saves them time, then gradually increase the automation scope.
&lt;/div&gt;

&lt;h3&gt;Building Trust Through Transparency&lt;/h3&gt;

&lt;p&gt;Every AI decision needs to be explainable. When an agent recommends rightsizing a VM, it should show you exactly what data led to that conclusion. 60 days of CPU utilization data showing average of 18 percent with peaks never exceeding 35 percent. Historical pattern showing this is consistent across seasons. Confidence score of 94 percent based on how similar the pattern is to other successfully rightsized VMs.&lt;/p&gt;

&lt;p&gt;This transparency is not just nice to have. It is essential for regulatory compliance in many industries. When auditors ask why you made certain infrastructure changes, being able to show the data driven reasoning behind decisions is critical.&lt;/p&gt;

&lt;h3&gt;Governance Framework&lt;/h3&gt;

&lt;p&gt;VMware VCF 9.0 includes a governance layer specifically for AI operations. You define policies in YAML that specify what each AI agent is allowed to do. The policy enforcement happens at the platform level, not just at the application level, which means there is no way for an agent to exceed its authorized scope even if it wanted to.&lt;/p&gt;

&lt;p&gt;Here is a simplified example of what a governance policy looks like:&lt;/p&gt;

&lt;div class=&quot;tech-note&quot;&gt;
&lt;code&gt;agent: capacity_optimizer&lt;/code&gt;&lt;br&gt;
&lt;code&gt;scope: [production, staging, development]&lt;/code&gt;&lt;br&gt;
&lt;code&gt;permissions:&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;vm_resize: allowed_if_utilization_below_30_percent&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;vm_migrate: allowed_for_non_tier1_workloads&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;vm_delete: always_require_human_approval&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&amp;nbsp;&amp;nbsp;cluster_scale: require_human_approval&lt;/code&gt;&lt;br&gt;
&lt;code&gt;audit: full_logging_required&lt;/code&gt;&lt;br&gt;
&lt;code&gt;rollback: automatic_on_error&lt;/code&gt;
&lt;/div&gt;

&lt;p&gt;This governance model gives you granular control. You can let AI be aggressive in dev/test environments while being much more conservative in production. You can allow some teams to have AI agents with broader authority while others have restricted agents. The flexibility is there to match your organizational risk tolerance.&lt;/p&gt;

&lt;h2&gt;What This Means for VMware Architects&lt;/h2&gt;

&lt;p&gt;If you are designing VMware infrastructure today, you need to think about AI readiness as a core architectural requirement, not a future nice to have. This has several practical implications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First, unified observability becomes non negotiable.&lt;/strong&gt; AI models need clean, consistent telemetry data. If your monitoring is fragmented across multiple tools with different data formats and retention policies, training accurate models becomes extremely difficult. The integrated observability in VCF with vROps, NSX Intelligence, and vSAN Insights working together solves this problem elegantly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second, API first design matters more than ever.&lt;/strong&gt; AI agents interact with infrastructure through APIs. If your automation still relies on screen scraping or CLI parsing, it will not work with intelligent systems. VCF&#39;s comprehensive REST APIs provide the foundation for AI driven operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third, you need to plan for GPU resources.&lt;/strong&gt; Even if you are not running AI workloads today, having some GPU capacity available lets you experiment with AI operations capabilities without requiring a separate infrastructure buildout. A single NVIDIA A100 can support multiple operational AI models comfortably.&lt;/p&gt;

&lt;div class=&quot;insight-box&quot;&gt;
&lt;strong&gt;Architectural Recommendation:&lt;/strong&gt; When sizing new VCF deployments, include at least one GPU enabled host per cluster for organizations with 500 plus VMs. This provides enough capacity to run operational AI models without impacting production workloads. For larger environments, consider dedicated GPU resource pools that can be shared across multiple workload domains.
&lt;/div&gt;

&lt;h2&gt;Looking Forward&lt;/h2&gt;

&lt;p&gt;Where is this heading? Based on what I am seeing from VMware&#39;s roadmap and customer discussions, we are moving toward infrastructure that is genuinely self managing. Not in a hands off, hope it works kind of way. More like infrastructure that handles the routine operational decisions autonomously while escalating truly novel situations to human experts.&lt;/p&gt;

&lt;p&gt;The line between infrastructure operations and application development will continue to blur. We are already seeing this with Tanzu and Kubernetes integration. Adding AI capabilities accelerates this trend. The infrastructure becomes a platform that provides not just compute, storage, and networking, but also intelligence as a service.&lt;/p&gt;

&lt;p&gt;For VMware shops specifically, this is exciting because you do not need to rip and replace your existing investment. VCF 9.0 brings these capabilities to the platform you already know. You can start small with a single use case, prove value, and expand organically. That incremental adoption path is crucial for enterprise IT organizations that cannot afford big bang transformations.&lt;/p&gt;

&lt;div class=&quot;conclusion&quot;&gt;
&lt;h2&gt;Final Thoughts&lt;/h2&gt;

&lt;p&gt;Building intelligence into VMware operations is not about replacing human expertise. It is about amplifying it. The goal is to free skilled engineers from repetitive operational toil so they can focus on architecture, innovation, and solving genuinely novel problems that actually require human creativity.&lt;/p&gt;

&lt;p&gt;VMware Cloud Foundation 9.0 gives us the tools to make this happen. The Private AI capabilities are production ready. The governance framework provides necessary safety. The integration with existing VMware components means you are building on a solid foundation rather than introducing yet another point solution.&lt;/p&gt;

&lt;p&gt;For organizations running significant VMware footprints, investigating these capabilities should be high on your priority list. Start with a pilot. Pick one use case that has clear business value. Measure the results rigorously. Then expand based on what you learn.&lt;/p&gt;

&lt;p&gt;The infrastructure of the future is not just virtualized and automated. It is intelligent. And that future is available to deploy today if you are willing to take the first steps.&lt;/p&gt;
&lt;/div&gt;

&lt;hr style=&quot;margin: 30px 0; border: none; border-top: 1px solid #ddd;&quot;&gt;

&lt;p style=&quot;font-size: 0.95em; color: #666;&quot;&gt;&lt;em&gt;What are your thoughts on bringing AI capabilities into infrastructure operations? Have you experimented with intelligent automation in your VMware environment? I would be interested to hear about your experiences and challenges. Feel free to share in the comments or reach out directly.&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;font-size: 0.88em; color: #888; margin-top: 25px;&quot;&gt;&lt;em&gt;Views and opinions expressed in this article are based on my personal professional experience working with VMware technologies. Implementation specifics should be evaluated based on your organization&#39;s unique requirements and constraints.&lt;/em&gt;&lt;/p&gt;

&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/751661815837993311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/751661815837993311'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/09/architecting-intelligence-ai-driven.html' title='Architecting Intelligence: AI-Driven Automation in VMware Cloud Foundation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbI5PxVp6YjZOI0qFkwBYqB4RudTvul_R4pr21n0jgB04xgHq8YBbSniTCVF5tvghkXnaQ7wKejtMf3mNzwZCz4CvNsSM5jhO-j2_sPPJYbaLc9ZNcTRTnPlRULWyf_o2KjVCwKcmgn5nTAqVlaNoqwLGDfKTpd7ax3qENWRWCkilRxM8YJj-gEq7thrs/s72-c/Screenshot%202025-11-06%20at%2014.28.35.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-7728173556973686979</id><published>2025-08-01T22:34:00.004+05:30</published><updated>2025-11-07T00:09:47.707+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Storage"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>GitOps Driven Infrastructure: Securing AI Workloads on VMware Cloud Foundation</title><content type='html'>&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;style&gt;
body { font-family: Georgia, serif; line-height: 1.8; color: #2d3748; width: 100%; margin: 0; padding: 20px; box-sizing: border-box; }
.header { background: linear-gradient(135deg, #1e40af 0%, #1e3a8a 100%); color: white; padding: 30px 25px; margin: -20px -20px 30px -20px; border-radius: 0 0 10px 10px; }
h1 { color: white; margin: 0 0 10px 0; font-size: 2em; line-height: 1.3; }
.subtitle { color: #93c5fd; font-size: 1.1em; font-style: italic; margin: 5px 0 0 0; }
h2 { color: #1e40af; margin-top: 35px;  font-size: 1.6em; }
h3 { color: #2563eb; margin-top: 25px; font-size: 1.3em; }
.author { font-style: italic; color: #64748b; margin-bottom: 25px; font-size: 1em; padding: 12px; background: #f1f5f9; border-left: 3px solid #1e40af; }
.intro { font-size: 1.05em; color: #475569; line-height: 1.75; margin-bottom: 25px; background: #f8fafc; padding: 15px; border-radius: 5px; }
.insight { background: #dbeafe; padding: 16px 18px; margin: 20px 0; border-radius: 5px; border-left: 4px solid #2563eb; }
.warning { background: #fef3c7; padding: 16px 18px; margin: 20px 0; border-radius: 5px; border-left: 4px solid #f59e0b; }
table { border-collapse: collapse; width: 100%; margin: 20px 0; background: white; box-shadow: 0 1px 3px rgba(0,0,0,0.08); }
table th { background: #1e40af; color: white; padding: 12px; text-align: left; font-weight: 600; }
table td { border: 1px solid #e2e8f0; padding: 11px; vertical-align: top; }
table tr:nth-child(even) { background-color: #f8fafc; }
table tr:hover { background-color: #dbeafe; }
ul, ol { margin: 12px 0; padding-left: 30px; }
li { margin: 8px 0; line-height: 1.7; }
code { background-color: #1e293b; color: #93c5fd; padding: 2px 6px; border-radius: 3px; font-family: &#39;Courier New&#39;, monospace; font-size: 0.9em; }
pre { background-color: #1e293b; color: #e2e8f0; padding: 15px; border-radius: 5px; overflow-x: auto; line-height: 1.5; margin: 15px 0; }
.conclusion { background: #f1f5f9; padding: 20px; margin-top: 30px; border-radius: 6px; border-top: 3px solid #1e40af; }
.tag { display: inline-block; background: #2563eb; color: white; padding: 3px 10px; margin: 3px; border-radius: 12px; font-size: 0.8em; }
.tags { margin: 15px 0; }
p { margin: 14px 0; }
strong { color: #1e40af; }
.architecture { background: #f8fafc; padding: 15px; border: 1px solid #cbd5e1; border-radius: 5px; margin: 15px 0; font-family: monospace; line-height: 1.6; font-size: 0.9em; }
&lt;/style&gt;
&lt;/head&gt;
&lt;body&gt;
&lt;div class=&quot;header&quot;&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;p class=&quot;subtitle&quot;&gt;How Policy as Code, Agentic AI, and Private LLMs Enable Compliant Innovation at Enterprise Scale&lt;/p&gt;
&lt;/div&gt;


&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkLaSGgLsPp5kBW0PaiIfHGkufcrR1Xk7F9im-BbsNaZILun5h3-UVhb4Yr7V3uoqqNYCH0mQB94gm7Z490FpjQtW6qW60Gm0KeHoluWKb_OukT1D2Hse1LK8LYsO-BnT8YIlOgNM3AFcIhjESwPMkfCik7qb7AtVrhESYLpjaplSrBbTToJicYqPPGA4/s1536/AI-VMware-Gitops.jpeg&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1536&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkLaSGgLsPp5kBW0PaiIfHGkufcrR1Xk7F9im-BbsNaZILun5h3-UVhb4Yr7V3uoqqNYCH0mQB94gm7Z490FpjQtW6qW60Gm0KeHoluWKb_OukT1D2Hse1LK8LYsO-BnT8YIlOgNM3AFcIhjESwPMkfCik7qb7AtVrhESYLpjaplSrBbTToJicYqPPGA4/s600/AI-VMware-Gitops.jpeg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;

&lt;div class=&quot;intro&quot;&gt;
For CTOs and enterprise architects facing the dual mandate of accelerating innovation while maintaining security posture, the question is no longer whether to adopt AI, but how to do it without compromising data sovereignty, regulatory compliance, or operational stability. The answer lies in combining three powerful patterns: Infrastructure as Code with GitOps, policy driven guardrails, and private AI deployments on VMware Cloud Foundation.
&lt;/div&gt;

&lt;p&gt;Having architected infrastructure for regulated environments where compliance is non negotiable, I have learned that the key to safe innovation is not restricting what teams can do, but controlling how they do it. GitOps provides the control plane. VCF provides the secure substrate. And private AI capabilities enable intelligence without data exfiltration.&lt;/p&gt;

&lt;h2&gt;The GitOps Foundation for Enterprise Infrastructure&lt;/h2&gt;

&lt;p&gt;GitOps is not just about using Git for infrastructure code. It represents a fundamental shift in how we think about infrastructure state management and change control. Every infrastructure configuration lives in Git. Every change goes through a pull request. Every deployment is auditable, reversible, and reproducible.&lt;/p&gt;

&lt;p&gt;For VCF environments, this pattern is particularly powerful because it bridges the gap between developer velocity and operational safety. Developers get self service infrastructure provisioning. Security teams get policy enforcement. SRE teams get drift detection and automatic reconciliation.&lt;/p&gt;

&lt;h3&gt;Architecture Pattern: GitOps with VCF&lt;/h3&gt;

&lt;div class=&quot;architecture&quot;&gt;
&lt;div style=&quot;background: #f8fafc; border: 2px solid #cbd5e1; border-radius: 12px; padding: 25px; margin: 25px 0; font-family: &#39;SF Mono&#39;, &#39;Monaco&#39;, &#39;Inconsolata&#39;, &#39;Roboto Mono&#39;, monospace; font-size: 1em; color: #1e293b; overflow-x: auto; box-shadow: 0 4px 15px rgba(0,0,0,0.05);&quot;&gt;
  &lt;div style=&quot;font-weight: bold; color: #1e40af; margin-bottom: 8px;&quot;&gt; Structure diagram&lt;/div&gt;
  &lt;pre style=&quot;margin: 0; background: none; color: inherit; font-size: inherit; border: none; padding: 0;&quot;&gt;
┌─────────────────────────────────────────────────────────────┐
│  Git Repository (Source of Truth)                           │
│  ├── infrastructure/                                        │
│  │   ├── vcf-workload-domains/                              │
│  │   ├── network-policies/                                  │
│  │   ├── storage-policies/                                  │
│  │   └── security-policies/                                 │
│  ├── applications/                                          │
│  │   ├── kubernetes-manifests/                              │
│  │   └── vm-templates/                                      │
│  └── policies/                                              │
│      ├── guardrails.yaml                                    │
│      ├── compliance-rules.yaml                              │
│      └── ai-governance.yaml                                 │
└─────────────────────────────────────────────────────────────┘
                          ↓
┌─────────────────────────────────────────────────────────────┐
│  CI/CD Pipeline (GitLab / GitHub Actions / Aria)            │
│  ├── Policy Validation (OPA / Kyverno)                      │
│  ├── Security Scanning (Trivy / Checkov)                    │
│  ├── Drift Detection                                        │
│  └── Automated Deployment                                   │
└─────────────────────────────────────────────────────────────┘
                          ↓
┌─────────────────────────────────────────────────────────────┐
│  VMware Cloud Foundation 9.0                                │
│  ├── vSphere + vSAN + NSX                                   │
│  ├── Tanzu Kubernetes Grid                                  │
│  ├── Private AI Services (GPU Pool)                         │
│  └── Aria Automation (Orchestration)                        │
└─────────────────────────────────────────────────────────────┘
  &lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;


&lt;div class=&quot;insight&quot;&gt;
&lt;strong&gt;Key Principle:&lt;/strong&gt; The Git repository becomes your compliance audit trail. When auditors ask why a change was made, who approved it, and what testing was done, the pull request history provides complete documentation. This shifts compliance from a manual documentation burden to an automatic byproduct of your workflow.
&lt;/div&gt;

&lt;h3&gt;Implementing Policy as Code for VCF&lt;/h3&gt;

&lt;p&gt;The real power of GitOps emerges when you combine it with policy as code. Before any infrastructure change reaches production, it must pass through automated policy checks. These policies encode your security standards, compliance requirements, and operational best practices.&lt;/p&gt;

&lt;p&gt;For VCF environments, I typically implement three layers of policy enforcement:&lt;/p&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Policy Layer&lt;/th&gt;
&lt;th&gt;Enforcement Point&lt;/th&gt;
&lt;th&gt;Example Policy&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Pre Commit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Developer workstation (Git hooks)&lt;/td&gt;
&lt;td&gt;Terraform must use approved VCF modules. No hardcoded credentials. Tags mandatory for all resources.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CI Pipeline&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Before deployment (OPA / Sentinel)&lt;/td&gt;
&lt;td&gt;NSX firewall rules must follow least privilege. VM templates must have encryption enabled. No public IPs without approval.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Runtime&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;VCF platform level (Admission Controllers)&lt;/td&gt;
&lt;td&gt;Block VMs without backup policy. Prevent privilege escalation. Enforce resource quotas per team.&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;p&gt;Here is a practical example of a policy that prevents deployment of AI workloads without proper data classification:&lt;/p&gt;

&lt;pre&gt;
# OPA Policy for AI Workload Deployment
package vcf.ai.governance

deny[msg] {
    input.kind == &quot;VirtualMachine&quot;
    contains(input.metadata.labels.workload, &quot;ai-training&quot;)
    not input.spec.dataClassification
    msg = &quot;AI training workloads must specify data classification level&quot;
}

deny[msg] {
    input.kind == &quot;VirtualMachine&quot;
    input.metadata.labels.workload == &quot;ai-training&quot;
    input.spec.dataClassification == &quot;confidential&quot;
    not input.spec.encryption.enabled
    msg = &quot;Confidential AI workloads must have encryption enabled&quot;
}

deny[msg] {
    input.kind == &quot;TanzuKubernetesCluster&quot;
    contains(input.spec.purpose, &quot;llm-inference&quot;)
    not input.spec.networkPolicy == &quot;isolated&quot;
    msg = &quot;LLM inference clusters must use isolated network policy&quot;
}
&lt;/pre&gt;

&lt;div class=&quot;warning&quot;&gt;
&lt;strong&gt;Security Note:&lt;/strong&gt; Policy enforcement must be immutable. Policies themselves should be version controlled and require approval from security team before changes go live. The policy repository should have branch protection requiring multiple reviewers and automated security scanning.
&lt;/div&gt;

&lt;h2&gt;Securing AI Workloads: The Private LLM Architecture&lt;/h2&gt;

&lt;p&gt;The challenge with AI adoption in regulated industries is straightforward. Most LLM services require sending your data to external APIs. For financial services, healthcare, or government sectors, this is often a non starter. Data sovereignty, regulatory compliance, and intellectual property protection demand that sensitive data never leaves your control.&lt;/p&gt;

&lt;p&gt;VMware Cloud Foundation 9.0 addresses this with integrated Private AI Services. You can deploy and run LLMs entirely within your own infrastructure, with the same security controls and compliance frameworks that protect your other workloads.&lt;/p&gt;

&lt;h3&gt;Architecture for Enterprise Private LLM Deployment&lt;/h3&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;VCF Implementation&lt;/th&gt;
&lt;th&gt;Security Control&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Model Storage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;vSAN with encryption at rest&lt;/td&gt;
&lt;td&gt;Models never leave your datacenter. Encrypted storage with key management.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;GPU Resources&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;vSphere GPU passthrough or vGPU for NVIDIA A100/H100&lt;/td&gt;
&lt;td&gt;Dedicated GPU pools with resource quotas per team/project.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Network Isolation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;NSX micro segmentation with distributed firewall&lt;/td&gt;
&lt;td&gt;LLM inference endpoints isolated from internet. Zero trust networking.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Access Control&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Active Directory integration with RBAC&lt;/td&gt;
&lt;td&gt;Model access controlled by AD groups. All queries logged for audit.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Data Governance&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Tanzu with admission webhooks&lt;/td&gt;
&lt;td&gt;Prevent deployment of models trained on unapproved datasets.&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h3&gt;Practical Implementation: Agentic AI with Governance&lt;/h3&gt;

&lt;p&gt;Agentic AI represents the next evolution beyond simple LLM queries. These are AI systems that can plan multi step workflows, make decisions, and take actions autonomously. For infrastructure operations, this means AI agents that can analyze logs, identify root causes, and execute remediation procedures without human intervention.&lt;/p&gt;

&lt;p&gt;The security challenge is obvious. How do you give an AI agent the permissions it needs to be useful while ensuring it cannot accidentally or maliciously cause damage?&lt;/p&gt;

&lt;div class=&quot;insight&quot;&gt;
&lt;strong&gt;Solution Pattern:&lt;/strong&gt; Deploy agentic AI with bounded autonomy. Each agent operates within a strictly defined scope, can only execute pre approved actions, and escalates to humans for anything outside its authorization. This is enforced at the VCF platform level, not just at the application level.
&lt;/div&gt;

&lt;p&gt;Here is how I implement this in practice:&lt;/p&gt;

&lt;pre&gt;
# AI Agent Authorization Policy (Kubernetes RBAC + OPA)
apiVersion: authorization.vmware.com/v1
kind: AIAgentPolicy
metadata:
  name: sre-incident-response-agent
spec:
  agent:
    identity: sre-agent@infra.corp
    purpose: automated-incident-response
  
  allowedActions:
    - action: &quot;vm.restart&quot;
      scope: [&quot;dev&quot;, &quot;staging&quot;]
      conditions:
        - healthCheck: failed
        - downtime: &quot;&gt;5 minutes&quot;
      approval: automatic
    
    - action: &quot;vm.restart&quot;
      scope: [&quot;production&quot;]
      conditions:
        - healthCheck: failed
        - downtime: &quot;&gt;10 minutes&quot;
      approval: human-required
      escalation: oncall-sre
    
    - action: &quot;scale.cluster&quot;
      scope: [&quot;all&quot;]
      approval: always-human
      reason: &quot;High impact change requires human judgment&quot;
  
  prohibitedActions:
    - &quot;vm.delete&quot;
    - &quot;firewall.disable&quot;
    - &quot;encryption.disable&quot;
  
  auditLogging:
    enabled: true
    destination: siem-integration
    retention: 7-years
&lt;/pre&gt;

&lt;h3&gt;The Model Context Protocol Advantage&lt;/h3&gt;

&lt;p&gt;One technical capability that makes VCF particularly compelling for agentic AI is support for the Model Context Protocol. MCP enables AI agents to maintain context across interactions with different systems while keeping that context secure and auditable.&lt;/p&gt;

&lt;p&gt;In practical terms, this means an SRE agent can query vRealize Operations for metrics, analyze NSX flow data for network anomalies, check vSAN health status, and correlate all this information while maintaining a unified understanding of the infrastructure state. All without data leaving your VCF environment.&lt;/p&gt;

&lt;h2&gt;Real World Implementation: GitOps Driven AI Infrastructure&lt;/h2&gt;

&lt;p&gt;Let me describe a production implementation that ties all these concepts together. The requirement was to enable data science teams to deploy AI training workloads on VCF while maintaining strict security controls and cost governance.&lt;/p&gt;

&lt;h3&gt;The Challenge&lt;/h3&gt;

&lt;p&gt;Data scientists wanted self service access to GPU resources for model training. Security team required that training data never leave the corporate network. Finance team needed cost allocation per project. Compliance team required complete audit trails. Traditional ticket based provisioning was taking 2 to 3 weeks per request.&lt;/p&gt;

&lt;h3&gt;The Solution Architecture&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;GitOps Repository Structure:&lt;/strong&gt; Created separate Git repositories for infrastructure definitions, application manifests, and security policies. Data science teams submit pull requests for new environments rather than tickets.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Automated Policy Validation:&lt;/strong&gt; Every pull request triggers automated checks. Does the request specify data classification? Is GPU quota available? Are network isolation requirements met? Does the requester have budget approval?&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Terraform with VCF Modules:&lt;/strong&gt; Infrastructure deployed via Terraform using standardized VCF modules. Each module enforces security baselines. GPU enabled VMs get automatic encryption. Training clusters get automatic network isolation via NSX.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Private Model Registry:&lt;/strong&gt; Harbor registry deployed on vSAN stores AI models. Access controlled via AD groups. All model downloads logged. Vulnerability scanning runs on every push.&lt;/li&gt;

&lt;li&gt;&lt;strong&gt;Cost Allocation via Tags:&lt;/strong&gt; Every resource automatically tagged with project code, cost center, and data classification during provisioning. vRealize Operations aggregates costs per team for chargeback.&lt;/li&gt;
&lt;/ol&gt;

&lt;div class=&quot;insight&quot;&gt;
&lt;strong&gt;Results After 6 Months:&lt;/strong&gt; Provisioning time reduced from 2 to 3 weeks to 4 hours (mostly waiting for human approvals in pipeline). 100 percent compliance in security audits because all controls are enforced by code. 30 percent cost reduction through automatic shutdown of idle training jobs. Zero security incidents related to data exfiltration.
&lt;/div&gt;

&lt;h2&gt;Guardrails That Enable Rather Than Block&lt;/h2&gt;

&lt;p&gt;The philosophy behind effective guardrails is critical. Many organizations implement security controls that are so restrictive they push teams to find workarounds. Shadow IT emerges not because people are malicious, but because official processes are too slow or inflexible.&lt;/p&gt;

&lt;p&gt;The GitOps approach flips this dynamic. Instead of a central team controlling a bottleneck, you encode security requirements as automated checks. Teams get fast self service provisioning as long as they stay within guardrails. When they need something outside the guardrails, the exception process is transparent and tracked.&lt;/p&gt;

&lt;h3&gt;Key Guardrail Patterns for VCF&lt;/h3&gt;

&lt;table&gt;
&lt;tr&gt;
&lt;th&gt;Guardrail Type&lt;/th&gt;
&lt;th&gt;Implementation&lt;/th&gt;
&lt;th&gt;Business Impact&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Data Sovereignty&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;OPA policy blocks VMs with confidential data from deploying to cloud connected clusters&lt;/td&gt;
&lt;td&gt;Ensures regulatory compliance without manual review of every deployment&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Cost Control&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Resource quotas enforced at vSphere cluster level based on approved budget&lt;/td&gt;
&lt;td&gt;Prevents budget overruns while allowing teams autonomy within limits&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Security Baseline&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;VM templates require encryption, backup policy, and network isolation by default&lt;/td&gt;
&lt;td&gt;Every workload starts secure without requiring security team review&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;AI Model Governance&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Models must pass bias testing and vulnerability scan before production deployment&lt;/td&gt;
&lt;td&gt;Accelerates AI adoption while managing ethical and security risks&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

&lt;h2&gt;The Operational Model: SRE Teams and AI Agents Working Together&lt;/h2&gt;

&lt;p&gt;A question I get frequently from Customers is whether AI agents will replace SRE teams. The answer is no, but the relationship is evolving. AI agents handle the toil, the repetitive incident response, the capacity monitoring, the optimization recommendations. Human SREs focus on architecture, resilience engineering, chaos testing, and handling truly novel situations.&lt;/p&gt;

&lt;p&gt;In the VCF environment I described earlier, we now have AI agents handling about 60 percent of operational tasks. Restarting failed services, clearing disk space, rebalancing clusters, rightsizing VMs based on utilization. The SRE team is actually smaller than before, but more effective. They spend time on proactive reliability improvements rather than reactive firefighting.&lt;/p&gt;

&lt;div class=&quot;warning&quot;&gt;
&lt;strong&gt;Critical Success Factor:&lt;/strong&gt; Start with read only AI agents. Let them observe and recommend for 90 days. Build team confidence that the AI makes good suggestions. Only then grant limited write permissions in non production environments. Expand scope gradually based on demonstrated reliability. This incremental approach builds trust and allows the team to learn how to work with AI agents effectively.
&lt;/div&gt;

&lt;h2&gt;Integration with Existing Enterprise Architecture&lt;/h2&gt;

&lt;p&gt;For global enterprises, VCF rarely operates in isolation. You have existing ITSM tools, monitoring platforms, CI/CD pipelines, and identity systems. The GitOps pattern integrates naturally with these existing investments.&lt;/p&gt;

&lt;p&gt;ServiceNow integration for change management. Requests that pass automated policy checks get auto approved. Requests outside policy trigger human review workflow. Splunk or ELK for security event correlation. All VCF events, all AI agent actions, all policy violations flow into your SIEM. Active Directory for identity. Your existing AD groups control who can deploy what types of workloads.&lt;/p&gt;

&lt;p&gt;The key architectural principle is that VCF becomes the secure execution layer while your existing tools provide the governance and observability layers. This allows you to adopt VCF&#39;s advanced capabilities without disrupting established processes.&lt;/p&gt;

&lt;div class=&quot;conclusion&quot;&gt;
&lt;h2&gt;Strategic Recommendations for Enterprise Architects&lt;/h2&gt;

&lt;p&gt;If you are evaluating how to enable AI workloads while maintaining security and compliance, here is my recommended approach based on production implementations:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 1 (Months 1 to 3):&lt;/strong&gt; Establish GitOps foundation for VCF infrastructure. Move infrastructure definitions to Git. Implement basic policy as code for security baseline. Deploy CI/CD pipeline for automated validation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 2 (Months 4 to 6):&lt;/strong&gt; Deploy Private AI Services on VCF. Set up GPU resource pools. Implement model registry with governance. Create self service portal for data science teams backed by GitOps workflow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 3 (Months 7 to 9):&lt;/strong&gt; Introduce read only AI agents for operations. Let them analyze patterns, generate recommendations, build institutional knowledge. Train SRE teams on working with AI assistants.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 4 (Months 10 to 12):&lt;/strong&gt; Grant limited autonomy to proven AI agents. Start with low risk actions in non production. Expand based on demonstrated reliability and team confidence.&lt;/p&gt;

&lt;p&gt;The organizations succeeding with AI today are not the ones with the most sophisticated models. They are the ones who figured out how to deploy AI safely, govern it effectively, and integrate it into existing workflows. VMware Cloud Foundation with GitOps and policy as code provides the platform to do exactly that.&lt;/p&gt;
&lt;/div&gt;

&lt;hr style=&quot;margin: 25px 0; border: none; border-top: 1px solid #cbd5e1;&quot;&gt;

&lt;p style=&quot;font-size: 0.95em; color: #64748b;&quot;&gt;&lt;em&gt;How is your organization approaching AI workload security? Are you using GitOps patterns for infrastructure management? I would be interested to hear about your architecture decisions and challenges.&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;font-size: 0.88em; color: #94a3b8; margin-top: 20px;&quot;&gt;&lt;em&gt;This article reflects my professional experience architecting secure infrastructure for AI workloads. Your specific requirements will vary based on regulatory environment, scale, and organizational maturity. Consult with security and compliance teams before implementing these patterns in production.&lt;/em&gt;&lt;/p&gt;


&lt;div class=&quot;tags&quot;&gt;
&lt;span class=&quot;tag&quot;&gt;VMware Cloud Foundation&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;GitOps&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Infrastructure as Code&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Agentic AI&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Security Guardrails&lt;/span&gt;
&lt;span class=&quot;tag&quot;&gt;Private LLM&lt;/span&gt;
&lt;/div&gt;
  
&lt;/body&gt;
&lt;/html&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7728173556973686979'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7728173556973686979'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/08/gitops-driven-infrastructure-securing.html' title='GitOps Driven Infrastructure: Securing AI Workloads on VMware Cloud Foundation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkLaSGgLsPp5kBW0PaiIfHGkufcrR1Xk7F9im-BbsNaZILun5h3-UVhb4Yr7V3uoqqNYCH0mQB94gm7Z490FpjQtW6qW60Gm0KeHoluWKb_OukT1D2Hse1LK8LYsO-BnT8YIlOgNM3AFcIhjESwPMkfCik7qb7AtVrhESYLpjaplSrBbTToJicYqPPGA4/s72-c/AI-VMware-Gitops.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-6703543638743085821</id><published>2025-07-15T18:22:00.006+05:30</published><updated>2025-11-06T00:32:08.434+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vmworld"/><title type='text'>Building Guardrails and Conformity Bots in VMware Environments: A Practical Engineering Guide</title><content type='html'>&lt;!-- Banner Image --&gt;
&lt;div style=&quot;text-align:center; margin-bottom:2em;&quot;&gt;
  &lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBcVpzxBErGfcQwP9_KvrZ6NGarr06V_g24eZhH1uZ4cyjaAFXslXMk9XNWK_jjp5JN_XIiLct3VMy8i8-oiXIawh1ytcb6TYP9688kmN2eYDRmYwr4MRIQImxLRPbi7KKCaRix-gz1novuyox43E5nRK05p4FoKZv42McMiYTfsLL9h3vb4Qmh1TNtsw/s2638/vmware-guardrails.png&quot; alt=&quot;VMware Guardrails Architecture&quot; style=&quot;max-width:100%; height:auto; border-radius:8px;&quot;&gt;
&lt;/div&gt;

&lt;!-- Intro --&gt;
&lt;p&gt;
  &lt;strong&gt;In enterprise VMware environments, maintaining architectural standards at scale is a constant challenge.&lt;/strong&gt;
  After years of working with large-scale virtualisation infrastructures, I&#39;ve learned that the gap between what architects design and what exists in production grows exponentially with team size and deployment velocity.
&lt;/p&gt;
&lt;p&gt;
  This post shares my hands-on experience building automated guardrails and conformity bots that enforce standards, detect drift, and maintain architectural hygiene across VMware estates.
&lt;/p&gt;

&lt;!-- Section: The Real Problem --&gt;
&lt;h2 style=&quot;color:#e67e22;&quot;&gt;&lt;strong&gt;The Real Problem: Configuration Entropy&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Every VMware environment I&#39;ve worked with faces the same pattern. It starts clean—well-tagged VMs, proper resource allocation, consistent network segmentation. Six months later, chaos.&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;VMs get deployed without mandatory tags, making cost tracking nearly impossible&lt;/li&gt;
  &lt;li&gt;Resource limits get bypassed during urgent deployments and never corrected&lt;/li&gt;
  &lt;li&gt;Network placement becomes inconsistent as different teams interpret policies differently&lt;/li&gt;
  &lt;li&gt;Backup configurations are missed or misconfigured&lt;/li&gt;
  &lt;li&gt;Storage policies don&#39;t align with actual workload criticality&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #e67e22; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;Quarterly manual audits catch these issues too late.&lt;/strong&gt; By then, you&#39;re looking at hundreds of non-compliant resources and the political nightmare of telling teams to fix them.
&lt;/div&gt;

&lt;!-- Section: Automated Policy Enforcement --&gt;
&lt;h2 style=&quot;color:#2980b9;&quot;&gt;&lt;strong&gt;My Approach: Automated Policy Enforcement&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;
  I&#39;ve built systems that combine &lt;strong&gt;preventive guardrails&lt;/strong&gt; (stopping problems before they start) with &lt;strong&gt;conformity bots&lt;/strong&gt; (finding and fixing drift automatically). Here&#39;s the architecture I typically implement:
&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;System Architecture&lt;/strong&gt;&lt;/h3&gt;
&lt;pre style=&quot;background:#272822; color:#fff; padding:1em; border-radius:6px; overflow-x:auto;&quot;&gt;
vCenter APIs → Collection Layer → Policy Engine → Action Layer → Notification System
                                        ↓
                                  Policy Repository
                                  (Git-based)
&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Core Components:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
  &lt;li&gt;&lt;strong&gt;Policy Repository:&lt;/strong&gt; Version-controlled policies defining acceptable VM configurations (tags, resources, networks, backups)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Collection Layer:&lt;/strong&gt; Scheduled jobs gathering current state from vCenter&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Policy Engine:&lt;/strong&gt; Evaluation logic comparing actual vs. desired state&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Action Layer:&lt;/strong&gt; Automated remediation for approved violations&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Notification System:&lt;/strong&gt; Integration with team communication tools&lt;/li&gt;
&lt;/ol&gt;

&lt;!-- Section: Tag Compliance Automation --&gt;
&lt;h3 style=&quot;color:#16a085;&quot;&gt;&lt;strong&gt;Real Example: Tag Compliance Automation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Policy Definition (YAML):&lt;/strong&gt;&lt;/p&gt;
&lt;pre style=&quot;background:#f4f4f4; border-left:4px solid #16a085; padding:1em; font-size:90%; overflow-x:auto;&quot;&gt;
policy:
  name: mandatory-vm-tags
  severity: high
  scope: all-vms
  required_tags:
    - CostCenter
    - Environment
    - Owner
    - BackupTier
  enforcement_mode: strict
  grace_period_days: 7
  actions:
    - notify_owner_immediately
    - create_tracking_ticket
    - block_operations_after_grace_period
&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Detection Script (PowerCLI):&lt;/strong&gt;&lt;/p&gt;
&lt;pre style=&quot;background:#f4f4f4; border-left:4px solid #16a085; padding:1em; font-size:90%; overflow-x:auto;&quot;&gt;
# Connect to vCenter
Connect-VIServer -Server vcenter.example.com

$requiredTags = @(&#39;CostCenter&#39;, &#39;Environment&#39;, &#39;Owner&#39;, &#39;BackupTier&#39;)
$allVMs = Get-VM

foreach ($vm in $allVMs) {
    $assignedTags = Get-TagAssignment -Entity $vm | Select-Object -ExpandProperty Tag
    $tagNames = $assignedTags.Name
    $missingTags = $requiredTags | Where-Object {$_ -notin $tagNames}
    
    if ($missingTags.Count -gt 0) {
        # Log violation
        Write-ViolationReport -VMName $vm.Name `
                              -Owner (Get-VMOwner $vm) `
                              -MissingTags $missingTags `
                              -Severity &quot;High&quot;
    }
}
&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Bot Remediation Logic:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
  &lt;li&gt;&lt;strong&gt;Day 0:&lt;/strong&gt; Email to VM owner with missing tags, documentation links, and 7-day deadline&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Day 3:&lt;/strong&gt; Reminder notification&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Day 7:&lt;/strong&gt; Set VM custom attribute &lt;code&gt;ComplianceStatus=Blocked&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Day 7+:&lt;/strong&gt; vCenter alarm prevents power operations until tags are added&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #16a085; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;This approach is firm but fair—gives teams time to comply while ensuring eventual enforcement.&lt;/strong&gt;
&lt;/div&gt;

&lt;!-- Section: Guardrail Pattern --&gt;
&lt;h2 style=&quot;color:#e67e22;&quot;&gt;&lt;strong&gt;Guardrail Pattern: CPU/Memory Limits&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Resource sprawl is another common issue. Without controls, you&#39;ll see VMs with 32 vCPUs sitting at 5% utilization, wasting cluster capacity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Prevention Strategy:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;CPU maximum: 16 vCPUs (exceptions require approval workflow)&lt;/li&gt;
  &lt;li&gt;Memory maximum: 128 GB (exceptions require approval workflow)&lt;/li&gt;
  &lt;li&gt;Ratio validation: Prevent obviously wrong configs (2 vCPU with 256 GB RAM)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Detection Strategy:&lt;/strong&gt;&lt;/p&gt;
&lt;pre style=&quot;background:#f4f4f4; border-left:4px solid #e67e22; padding:1em; font-size:90%; overflow-x:auto;&quot;&gt;
import vcenter_api_client

def analyze_resource_utilization():
    for vm in vcenter_api_client.get_all_vms():
        allocated_cpu = vm.config.num_cpu
        avg_usage_30d = vm.get_cpu_usage_average(days=30)
        
        utilization_percent = (avg_usage_30d / allocated_cpu) * 100
        
        if utilization_percent &lt; 20:
            # VM consistently uses less than 20% of allocated CPU
            recommendations = generate_rightsizing_recommendation(vm)
            notify_vm_owner(vm, recommendations)
            log_to_capacity_planning_report(vm, recommendations)
&lt;/pre&gt;

&lt;!-- Section: Network Segmentation --&gt;
&lt;h2 style=&quot;color:#2980b9;&quot;&gt;&lt;strong&gt;Network Segmentation Validation Bot&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;In regulated environments (or really any security-conscious organisation), network placement is critical. My conformity bot validates:&lt;/p&gt;
&lt;ol&gt;
  &lt;li&gt;Production VMs are on approved production VLANs&lt;/li&gt;
  &lt;li&gt;Sensitive workloads stay on isolated networks&lt;/li&gt;
  &lt;li&gt;No unauthorised network adapters added post-deployment&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Implementation:&lt;/strong&gt;&lt;/p&gt;
&lt;pre style=&quot;background:#f4f4f4; border-left:4px solid #2980b9; padding:1em; font-size:90%; overflow-x:auto;&quot;&gt;
def validate_network_placement(vm):
    # Get VM&#39;s environment tag
    environment = vm.get_tag_value(&#39;Environment&#39;)
    
    # Get allowed networks for this environment
    allowed_networks = POLICY_CONFIG[environment][&#39;allowed_networks&#39;]
    
    # Check all network adapters
    for adapter in vm.network_adapters:
        if adapter.network_name not in allowed_networks:
            # CRITICAL violation - wrong network for environment
            create_security_incident(
                vm=vm,
                violation=f\&quot;VM in {environment} connected to unauthorized network {adapter.network_name}\&quot;,
                severity=\&quot;CRITICAL\&quot;,
                action=\&quot;Notify security team + create isolation runbook ticket\&quot;
            )
            return False
    return True
&lt;/pre&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #2980b9; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;Critical violations get escalated immediately; the bot doesn&#39;t wait for batch processing.&lt;/strong&gt;
&lt;/div&gt;

&lt;!-- Section: Lessons --&gt;
&lt;h2 style=&quot;color:#16a085;&quot;&gt;&lt;strong&gt;Lessons from Production Deployments&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;1. Always Start in Observation Mode&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;Run detection-only for 30 days&lt;/li&gt;
  &lt;li&gt;Analyse violation patterns&lt;/li&gt;
  &lt;li&gt;Refine policies based on real data&lt;/li&gt;
  &lt;li&gt;&lt;em&gt;Then&lt;/em&gt; enable enforcement&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;2. Exception Handling Matters&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;Requestor submits justification&lt;/li&gt;
  &lt;li&gt;Architect or security reviews&lt;/li&gt;
  &lt;li&gt;Approval recorded in Git with expiration date&lt;/li&gt;
  &lt;li&gt;Bot recognises exception and skips validation&lt;/li&gt;
  &lt;li&gt;Monthly review meeting to challenge ongoing exceptions&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;3. Smart Notification Strategy&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Critical violations:&lt;/strong&gt; Real-time Slack/Teams notification&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;High severity:&lt;/strong&gt; Email within 1 hour&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Medium/Low:&lt;/strong&gt; Daily digest email&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Weekly:&lt;/strong&gt; Executive dashboard with compliance trends&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;4. Enable Self-Service Remediation&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;One-click link to automated backup enrolment workflow&lt;/li&gt;
  &lt;li&gt;Clear documentation on backup tier selection&lt;/li&gt;
  &lt;li&gt;Automated approval for standard tiers&lt;/li&gt;
  &lt;li&gt;Owner can fix their own issue without opening tickets&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;5. Track Metrics That Drive Behavior&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Overall compliance rate:&lt;/strong&gt; % of resources meeting all policies (target: &gt;95%)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Mean time to remediation:&lt;/strong&gt; Average days from detection to fix (target: &lt;3 days)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Active exceptions:&lt;/strong&gt; Number and trend (should decrease over time)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Automation rate:&lt;/strong&gt; % of violations auto-fixed vs. manual (target: &gt;60%)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;New deployment compliance:&lt;/strong&gt; % of new VMs compliant at creation (target: &gt;98%)&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #16a085; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;Publish these monthly to leadership—visibility drives accountability.&lt;/strong&gt;
&lt;/div&gt;

&lt;!-- Section: Results --&gt;
&lt;h2 style=&quot;color:#e67e22;&quot;&gt;&lt;strong&gt;Results I&#39;ve Observed&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
  &lt;li&gt;Configuration drift reduced by 70-80%&lt;/li&gt;
  &lt;li&gt;Tagging compliance improved from 50-60% to 90-95%&lt;/li&gt;
  &lt;li&gt;Security findings related to VM configuration decreased by 80%+&lt;/li&gt;
  &lt;li&gt;Architect time spent on manual audits reduced by 10-15 hours/week&lt;/li&gt;
  &lt;li&gt;Faster incident resolution due to standardised, predictable configurations&lt;/li&gt;
&lt;/ul&gt;

&lt;!-- Section: Technology Stack --&gt;
&lt;h2 style=&quot;color:#2980b9;&quot;&gt;&lt;strong&gt;Technology Stack&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;VMware vCenter 7.x / 8.x&lt;/strong&gt; (core infrastructure)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;PowerCLI 12.x+&lt;/strong&gt; (data collection, remediation scripts)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Python 3.9+&lt;/strong&gt; (policy engine - libraries: PyYAML, requests, pyvmomi)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Git/GitLab/GitHub&lt;/strong&gt; (policy-as-code repository with CI/CD)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;vRealize Automation or Terraform&lt;/strong&gt; (integration for self-service)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;vRealize Operations&lt;/strong&gt; (historical metrics, rightsizing data)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Ticketing system API&lt;/strong&gt; (ServiceNow, Jira, etc.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Communication platform API&lt;/strong&gt; (Slack, Teams)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Everything is containerised and runs on Kubernetes for resilience.&lt;/p&gt;

&lt;!-- Section: Future Direction --&gt;
&lt;h2 style=&quot;color:#16a085;&quot;&gt;&lt;strong&gt;Future Direction: Predictive Policy&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
  &lt;li&gt;Predict which deployments are likely to become non-compliant&lt;/li&gt;
  &lt;li&gt;Recommend optimal configurations based on similar workload patterns&lt;/li&gt;
  &lt;li&gt;Auto-generate temporary policy exceptions for genuinely unique requirements&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #16a085; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;Early results are promising—we can predict 65% of future violations based on deployment patterns.&lt;/strong&gt;
&lt;/div&gt;

&lt;!-- Section: Getting Started --&gt;
&lt;h2 style=&quot;color:#2980b9;&quot;&gt;&lt;strong&gt;Getting Started in Your Environment&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Week 1-2: Foundation&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Choose one high-impact policy (I recommend tagging)&lt;/li&gt;
  &lt;li&gt;Build simple detection script&lt;/li&gt;
  &lt;li&gt;Run manually, gather baseline data&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Week 3-4: Automation&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Schedule detection script (daily)&lt;/li&gt;
  &lt;li&gt;Build notification logic&lt;/li&gt;
  &lt;li&gt;Deploy in read-only mode&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Month 2: Refinement&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Analyze violation patterns&lt;/li&gt;
  &lt;li&gt;Adjust policies based on feedback&lt;/li&gt;
  &lt;li&gt;Document exception process&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Month 3: Enforcement&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Enable preventive guardrails for new deployments&lt;/li&gt;
  &lt;li&gt;Begin gentle enforcement (warnings, then blocks)&lt;/li&gt;
  &lt;li&gt;Measure compliance improvement&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Months 4-6: Expansion&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Add second policy (e.g., backup configuration)&lt;/li&gt;
  &lt;li&gt;Build self-service remediation workflows&lt;/li&gt;
  &lt;li&gt;Implement automated fixes for simple violations&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #2980b9; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;Start small, prove value, expand based on success.&lt;/strong&gt;
&lt;/div&gt;

&lt;!-- Section: Closing Thoughts --&gt;
&lt;h2 style=&quot;color:#e67e22;&quot;&gt;&lt;strong&gt;Closing Thoughts&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;
  Guardrails and conformity bots don&#39;t replace skilled engineers but they multiply their effectiveness. By automating policy enforcement, architects and SREs can focus on design, resilience patterns, and innovation rather than configuration audits.
&lt;/p&gt;
&lt;p&gt;
  For any organisation running VMware at scale, these systems transition from &quot;nice to have&quot; to &quot;operational necessity.&quot; The alternative is configuration chaos, compliance gaps, and an operations team drowning in toil.
&lt;/p&gt;
&lt;div style=&quot;background:#f9f9f9; border-left:4px solid #e67e22; padding:1em; margin:1em 0;&quot;&gt;
  &lt;strong&gt;The compound interest of architectural conformity is real.&lt;/strong&gt; Every day your environment operates within guardrails is a day you&#39;re building technical debt mitigation into your foundation.
&lt;/div&gt;
&lt;p style=&quot;margin-top:2em; font-weight:bold;&quot;&gt;
  What&#39;s the first policy you&#39;d automate in your environment? I&#39;d love to hear your thoughts and experiences in the comments.
&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6703543638743085821'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6703543638743085821'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2025/07/building-guardrails-and-conformity-bots.html' title='Building Guardrails and Conformity Bots in VMware Environments: A Practical Engineering Guide'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBcVpzxBErGfcQwP9_KvrZ6NGarr06V_g24eZhH1uZ4cyjaAFXslXMk9XNWK_jjp5JN_XIiLct3VMy8i8-oiXIawh1ytcb6TYP9688kmN2eYDRmYwr4MRIQImxLRPbi7KKCaRix-gz1novuyox43E5nRK05p4FoKZv42McMiYTfsLL9h3vb4Qmh1TNtsw/s72-c/vmware-guardrails.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-6316604058437928446</id><published>2024-10-04T01:21:00.002+05:30</published><updated>2024-10-14T01:31:02.408+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><title type='text'>Seamless Migration from VMware to Azure: A Comprehensive Guide with Examples</title><content type='html'>&lt;p&gt;In the era of digital transformation, businesses are increasingly adopting hybrid cloud strategies to leverage the flexibility, scalability, and cost-efficiency of both private and public cloud environments. VMware and Microsoft Azure are two leading platforms that, when combined, offer a robust solution for hybrid cloud deployments.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This article provides an in-depth guide on migrating workloads from an on-premises VMware environment to Azure, complete with practical examples and strategic insights.&lt;/p&gt;&lt;div aria-description=&quot;&quot; aria-label=&quot;Sent by Copilot: Absolutely! Here&#39;s the revised blog article with a more detailed introduction:

---

## Seamless Migration from VMware to Azure: A Comprehensive Guide with Examples

In the era of digital transformation, businesses are increasingly adopting hybrid cloud strategies to leverage the flexibility, scalability, and cost-efficiency of both private and public cloud environments. VMware and Microsoft Azure are two leading platforms that, when combined, offer a robust solution for hybrid cloud deployments. This article provides an in-depth guide on migrating workloads from an on-premises VMware environment to Azure, complete with practical examples and strategic insights.

### Understanding the Hybrid Cloud Advantage

Hybrid cloud environments allow organizations to integrate on-premises infrastructure with public cloud services, offering several benefits:

- **Flexibility**: Easily scale resources based on demand.
- **Cost Efficiency**: Optimize costs by balancing workloads between private and public clouds.
- **Disaster Recovery**: Ensure business continuity with robust backup and recovery solutions.

For Chief Technology Officers (CTOs), investing in a well-planned migration strategy not only ensures a seamless transition but also positions your organization to leverage the full potential of hybrid cloud environments. Engaging with experienced cloud architects and engineers will be key to navigating this complex process successfully. This guide is designed to provide both strategic insights for decision-makers and detailed technical steps for engineers.

### Preparing for Migration

#### 1. Assessment and Planning

**a. Inventory and Assessment**
   - **Identify Workloads**: Catalog all applications and workloads running in your VMware environment.
   - **Example**: A retail company identifies its e-commerce platform, inventory management system, and customer database as key workloads for migration.
   - **Dependency Mapping**: Understand dependencies between applications and services.
   - **Example**: The e-commerce platform depends on the customer database and payment gateway services.
   - **Performance Metrics**: Gather performance data to determine resource requirements in Azure.

**b. Feasibility Study**
   - **Cost Analysis**: Estimate the cost of running workloads in Azure.
   - **Example**: Using Azure&#39;s pricing calculator, the retail company estimates the monthly cost of running its e-commerce platform in Azure.
   - **Compliance and Security**: Ensure that the migration meets regulatory and security requirements.

**c. Migration Plan**
   - **Define Objectives**: Set clear goals for the migration (e.g., cost savings, scalability).
   - **Example**: The retail company aims to reduce infrastructure costs by 20% and improve scalability to handle peak shopping seasons.
   - **Timeline and Milestones**: Create a detailed timeline with key milestones.
   - **Risk Management**: Identify potential risks and mitigation strategies.

#### 2. Environment Setup

**a. Azure Subscription**
   - Ensure you have an appropriate Azure subscription.

**b. Networking**
   - Set up Azure Virtual Networks (VNets) and configure VPN or ExpressRoute for secure connectivity.
   - **Example**: The retail company sets up a VNet with subnets for web servers, application servers, and databases.

**c. Identity Management**
   - Integrate Azure Active Directory (AAD) with your on-premises AD.

**d. Tool Selection**
   - **Azure Migrate**: Use Azure Migrate for assessment and migration.
   - **VMware HCX**: Consider VMware HCX for large-scale migrations.

### Executing the Migration

#### 1. Pilot Migration

**a. Select Pilot Workloads**
   - Choose non-critical workloads for the initial migration.
   - **Example**: The retail company selects its internal HR application for the pilot migration.

**b. Test Migration**
   - Perform a test migration to identify any issues.
   - **Example**: The HR application is migrated to Azure, and the team tests its functionality and performance.

**c. Validation**
   - Validate the migrated workloads in Azure.
   - **Example**: The HR team confirms that the application works as expected in Azure.

#### 2. Full Migration

**a. Batch Migration**
   - Migrate workloads in batches to minimize downtime.
   - **Example**: The retail company migrates its e-commerce platform in phases, starting with the web servers, followed by the application servers, and finally the database.

**b. Data Migration**
   - Use Azure Data Box or Azure Site Recovery for large data transfers.
   - **Example**: The customer database is transferred using Azure Data Box to ensure data integrity and minimize downtime.

**c. Application Migration**
   - Migrate applications using Azure App Service or Azure Kubernetes Service (AKS).
   - **Example**: The e-commerce platform is containerized and deployed using Azure Kubernetes Service for better scalability and management.

#### 3. Cutover

**a. Final Sync**
   - Perform a final synchronization of data.
   - **Example**: The retail company performs a final sync of the customer database to ensure all recent transactions are captured.

**b. DNS and IP Changes**
   - Update DNS records and IP addresses as needed.
   - **Example**: The DNS records for the e-commerce platform are updated to point to the new Azure-hosted environment.

**c. Go Live**
   - Switch production workloads to Azure.
   - **Example**: The e-commerce platform goes live on Azure, and the on-premises environment is decommissioned.

### Post-Migration Optimization

#### 1. Performance Tuning
   - Optimize performance settings in Azure.
   - **Example**: The retail company adjusts VM sizes and storage configurations based on performance monitoring data.

#### 2. Cost Management
   - Use Azure Cost Management tools to monitor and control costs.
   - **Example**: The company sets up cost alerts and budgets to ensure they stay within their projected spending.

#### 3. Monitoring and Management
   - Set up Azure Monitor for ongoing monitoring.
   - Implement Azure Security Center recommendations.
   - **Example**: The retail company configures Azure Monitor to track the performance and health of their e-commerce platform and uses Azure Security Center to enhance security.

#### 4. Training and Documentation
   - Train IT staff on managing Azure resources.
   - Update documentation to reflect the new environment.
   - **Example**: The IT team undergoes training on Azure management tools, and all operational procedures are updated to include Azure-specific processes.

### Conclusion

Migrating from VMware to Azure requires careful planning and execution. By following this comprehensive strategy and leveraging the strengths of both VMware and Azure, organizations can ensure a smooth transition to a robust hybrid cloud environment. As technology continues to evolve, the partnership between VMware and Azure will undoubtedly play a crucial role in shaping the future of hybrid cloud solutions.

---

I hope this article meets your needs! If you need any further adjustments or additional details, feel free to let me know.&quot; class=&quot;content user-select-text&quot; tabindex=&quot;0&quot;&gt;&lt;div class=&quot;ac-container ac-adaptiveCard&quot; streaming=&quot;&quot;&gt;&lt;div class=&quot;ac-textBlock&quot;&gt;&lt;h3&gt;Understanding the Hybrid Cloud Advantage&lt;/h3&gt;&lt;h3&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj_UQ2hEqSqLQVkYRsnoHzSte8klU4U-7_AmmOADNG-YrUBbcvo6NtlOu_RxNshjMbbRWoxzAxlmQQIPpJYmL4DJC0shBFayxvjS_EnH8plF6MLpb6rR0b7Z2Ok_Fi9masfDKo8_2nDZoXJU-9-RFpKkiVk8d-LTdcgapZRPhofJ-tHgIbzs2Mew9nvkmQ&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;902&quot; data-original-width=&quot;1608&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj_UQ2hEqSqLQVkYRsnoHzSte8klU4U-7_AmmOADNG-YrUBbcvo6NtlOu_RxNshjMbbRWoxzAxlmQQIPpJYmL4DJC0shBFayxvjS_EnH8plF6MLpb6rR0b7Z2Ok_Fi9masfDKo8_2nDZoXJU-9-RFpKkiVk8d-LTdcgapZRPhofJ-tHgIbzs2Mew9nvkmQ=w640-h360&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/h3&gt;&lt;p&gt;Hybrid cloud environments allow organizations to integrate on-premises infrastructure with public cloud services, offering several benefits:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Flexibility&lt;/strong&gt;: Easily scale resources based on demand.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Cost Efficiency&lt;/strong&gt;: Optimize costs by balancing workloads between private and public clouds.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Disaster Recovery&lt;/strong&gt;: Ensure business continuity with robust backup and recovery solutions.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For Chief Technology Officers (CTOs), investing in a well-planned migration strategy not only ensures a seamless transition but also positions your organization to leverage the full potential of hybrid cloud environments. Engaging with experienced cloud architects and engineers will be key to navigating this complex process successfully. This guide is designed to provide both strategic insights for decision-makers and detailed technical steps for engineers.&lt;/p&gt;&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;Preparing for Migration&lt;/h3&gt;&lt;h4&gt;1. Assessment and Planning&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;a. Inventory and Assessment&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Identify Workloads&lt;/strong&gt;: Catalog all applications and workloads running in your VMware environment.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: A retail company identifies its e-commerce platform, inventory management system, and customer database as key workloads for migration.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Dependency Mapping&lt;/strong&gt;: Understand dependencies between applications and services.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The e-commerce platform depends on the customer database and payment gateway services.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Performance Metrics&lt;/strong&gt;: Gather performance data to determine resource requirements in Azure.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;b. Feasibility Study&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Cost Analysis&lt;/strong&gt;: Estimate the cost of running workloads in Azure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: Using Azure’s pricing calculator, the retail company estimates the monthly cost of running its e-commerce platform in Azure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Compliance and Security&lt;/strong&gt;: Ensure that the migration meets regulatory and security requirements.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;c. Migration Plan&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Define Objectives&lt;/strong&gt;: Set clear goals for the migration (e.g., cost savings, scalability).&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company aims to reduce infrastructure costs by 20% and improve scalability to handle peak shopping seasons.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Timeline and Milestones&lt;/strong&gt;: Create a detailed timeline with key milestones.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Risk Management&lt;/strong&gt;: Identify potential risks and mitigation strategies.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;2. Environment Setup&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;a. Azure Subscription&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Ensure you have an appropriate Azure subscription.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;b. Networking&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Set up Azure Virtual Networks (VNets) and configure VPN or ExpressRoute for secure connectivity.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company sets up a VNet with subnets for web servers, application servers, and databases.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;c. Identity Management&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Integrate Azure Active Directory (AAD) with your on-premises AD.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;d. Tool Selection&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Azure Migrate&lt;/strong&gt;: Use Azure Migrate for assessment and migration.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;VMware HCX&lt;/strong&gt;: Consider VMware HCX for large-scale migrations.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Executing the Migration&lt;/h3&gt;&lt;h4&gt;1. Pilot Migration&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;a. Select Pilot Workloads&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Choose non-critical workloads for the initial migration.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company selects its internal HR application for the pilot migration.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;b. Test Migration&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Perform a test migration to identify any issues.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The HR application is migrated to Azure, and the team tests its functionality and performance.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;c. Validation&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Validate the migrated workloads in Azure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The HR team confirms that the application works as expected in Azure.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;2. Full Migration&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;a. Batch Migration&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Migrate workloads in batches to minimize downtime.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company migrates its e-commerce platform in phases, starting with the web servers, followed by the application servers, and finally the database.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;b. Data Migration&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Use Azure Data Box or Azure Site Recovery for large data transfers.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The customer database is transferred using Azure Data Box to ensure data integrity and minimize downtime.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;c. Application Migration&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Migrate applications using Azure App Service or Azure Kubernetes Service (AKS).&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The e-commerce platform is containerized and deployed using Azure Kubernetes Service for better scalability and management.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;3. Cutover&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;a. Final Sync&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Perform a final synchronization of data.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company performs a final sync of the customer database to ensure all recent transactions are captured.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;b. DNS and IP Changes&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Update DNS records and IP addresses as needed.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The DNS records for the e-commerce platform are updated to point to the new Azure-hosted environment.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;c. Go Live&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Switch production workloads to Azure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The e-commerce platform goes live on Azure, and the on-premises environment is decommissioned.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Post-Migration Optimization&lt;/h3&gt;&lt;h4&gt;1. Performance Tuning&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Optimize performance settings in Azure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company adjusts VM sizes and storage configurations based on performance monitoring data.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;2. Cost Management&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Use Azure Cost Management tools to monitor and control costs.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The company sets up cost alerts and budgets to ensure they stay within their projected spending.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;3. Monitoring and Management&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Set up Azure Monitor for ongoing monitoring.&lt;/li&gt;&lt;li&gt;Implement Azure Security Center recommendations.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The retail company configures Azure Monitor to track the performance and health of their e-commerce platform and uses Azure Security Center to enhance security.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;4. Training and Documentation&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Train IT staff on managing Azure resources.&lt;/li&gt;&lt;li&gt;Update documentation to reflect the new environment.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Example&lt;/strong&gt;: The IT team undergoes training on Azure management tools, and all operational procedures are updated to include Azure-specific processes.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Conclusion&lt;/h3&gt;&lt;p&gt;Migrating from VMware to Azure requires careful planning and execution. By following this comprehensive strategy and leveraging the strengths of both VMware and Azure, organizations can ensure a smooth transition to a robust hybrid cloud environment. As technology continues to evolve, the partnership between VMware and Azure will undoubtedly play a crucial role in shaping the future of hybrid cloud solutions&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;cib-overlay&gt;&lt;/cib-overlay&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6316604058437928446'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6316604058437928446'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2024/10/seamless-migration-from-vmware-to-azure.html' title='Seamless Migration from VMware to Azure: A Comprehensive Guide with Examples'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEj_UQ2hEqSqLQVkYRsnoHzSte8klU4U-7_AmmOADNG-YrUBbcvo6NtlOu_RxNshjMbbRWoxzAxlmQQIPpJYmL4DJC0shBFayxvjS_EnH8plF6MLpb6rR0b7Z2Ok_Fi9masfDKo8_2nDZoXJU-9-RFpKkiVk8d-LTdcgapZRPhofJ-tHgIbzs2Mew9nvkmQ=s72-w640-h360-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-6636064602027703546</id><published>2024-09-19T15:38:00.004+05:30</published><updated>2024-10-04T15:41:35.796+05:30</updated><title type='text'>VMware Explore: Core Technical Concepts for 2024 and 2025 with AI Integration</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Introduction&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px;&quot;&gt;VMware Explore continues to be a pivotal event for virtualization and cloud computing professionals, showcasing the latest innovations and technological advancements. As we look ahead to 2024 and 2025, several core technical concepts are set to shape the future of VMware’s ecosystem. This article delves into these concepts, with a particular focus on the integration of artificial intelligence (AI) to enhance VMware’s offerings.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgdhzS_pJ0RMsJJLAaGYuwRxHA2GEIWtQrIjmclulZ72Ss9lMjNvfe-RkUGfYt2d82nJWzpmmuBbz2ukCEU19TgcbkPWMJNTEWkikSJJf3NKst4A_UEzxKZy-AuDLrYeJHzYLpN-148vz29pIJPrsNXxstjjRQwN0S_FoxxN0vJeqd13euNybM0vfnBA98&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;402&quot; data-original-width=&quot;768&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgdhzS_pJ0RMsJJLAaGYuwRxHA2GEIWtQrIjmclulZ72Ss9lMjNvfe-RkUGfYt2d82nJWzpmmuBbz2ukCEU19TgcbkPWMJNTEWkikSJJf3NKst4A_UEzxKZy-AuDLrYeJHzYLpN-148vz29pIJPrsNXxstjjRQwN0S_FoxxN0vJeqd13euNybM0vfnBA98=w640-h336&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. AI-Driven Automation and Operations&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;AI is transforming IT operations by enabling smarter, more efficient management of infrastructure. VMware is leveraging AI to enhance its automation capabilities, particularly through VMware vRealize Operations and VMware vSphere with Tanzu.&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;vRealize Operations:&lt;/strong&gt;&amp;nbsp;AI-driven predictive analytics and machine learning algorithms are being integrated to provide proactive insights, anomaly detection, and automated remediation. This helps in optimizing resource utilization, reducing downtime, and improving overall system performance.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;vSphere with Tanzu:&lt;/strong&gt;&amp;nbsp;AI is being used to streamline Kubernetes operations, automate workload placement, and optimize resource allocation. This ensures that containerized applications run efficiently and reliably.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;2. Enhanced Security with AI:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Security remains a top priority for VMware, and AI is playing a crucial role in enhancing security measures across its platforms.&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;VMware NSX:&lt;/strong&gt;&amp;nbsp;AI-powered threat detection and response capabilities are being integrated into NSX to identify and mitigate security threats in real-time. Machine learning models analyze network traffic patterns to detect anomalies and potential breaches.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Carbon Black Cloud:&lt;/strong&gt;&amp;nbsp;AI and machine learning are used to enhance endpoint security by identifying malicious behavior, automating threat hunting, and providing advanced threat intelligence.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;3. AI-Optimized Hybrid Cloud Management:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Managing hybrid cloud environments can be complex, but AI is simplifying this process by providing intelligent insights and automation.&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;VMware Cloud Foundation:&lt;/strong&gt;&amp;nbsp;AI-driven management tools are being integrated to optimize workload placement, automate resource scaling, and provide predictive maintenance. This ensures seamless operation across private and public cloud environments.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;VMware HCX:&lt;/strong&gt;&amp;nbsp;AI is used to optimize data migration and disaster recovery processes, ensuring minimal downtime and efficient resource utilization.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;4. AI in Edge Computing:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Edge computing is becoming increasingly important as organizations seek to process data closer to its source. VMware is integrating AI to enhance its edge computing solutions.&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;VMware Edge Compute Stack:&lt;/strong&gt;&amp;nbsp;AI algorithms are used to optimize data processing at the edge, reducing latency and improving performance. This is particularly beneficial for applications requiring real-time data analysis, such as IoT and autonomous systems.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Project Monterey:&lt;/strong&gt;&amp;nbsp;VMware’s initiative to rearchitect the data center for the edge leverages AI to enhance security, performance, and manageability of edge environments.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;5. AI-Enhanced Developer Experience:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;VMware is focusing on improving the developer experience by integrating AI into its development platforms.&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;VMware Tanzu:&lt;/strong&gt;&amp;nbsp;AI-powered tools are being integrated to assist developers in writing, testing, and deploying applications more efficiently. This includes intelligent code suggestions, automated testing, and performance optimization.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;DevSecOps:&lt;/strong&gt;&amp;nbsp;AI is used to automate security checks and compliance monitoring throughout the development lifecycle, ensuring that applications are secure from the outset.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;As we move into 2024 and 2025, VMware Explore continues to be a beacon of innovation, showcasing the latest advancements in virtualization, cloud computing, and AI. The integration of AI across VMware’s product portfolio is set to enhance automation, security, hybrid cloud management, edge computing, and the developer experience. By leveraging AI, VMware is poised to deliver smarter, more efficient solutions that meet the evolving needs of modern IT environments.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6636064602027703546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/6636064602027703546'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2024/09/vmware-explore-core-technical-concepts.html' title='VMware Explore: Core Technical Concepts for 2024 and 2025 with AI Integration'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgdhzS_pJ0RMsJJLAaGYuwRxHA2GEIWtQrIjmclulZ72Ss9lMjNvfe-RkUGfYt2d82nJWzpmmuBbz2ukCEU19TgcbkPWMJNTEWkikSJJf3NKst4A_UEzxKZy-AuDLrYeJHzYLpN-148vz29pIJPrsNXxstjjRQwN0S_FoxxN0vJeqd13euNybM0vfnBA98=s72-w640-h336-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-8180736451569065438</id><published>2024-05-10T15:34:00.001+05:30</published><updated>2024-10-04T15:36:33.342+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vmworld"/><title type='text'>Optimising Hybrid Cloud Environments with Broadcom and VMware</title><content type='html'>&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Hybrid cloud environments are becoming increasingly popular among enterprises due to their flexibility, cost-efficiency, and disaster recovery capabilities. Broadcom and VMware, two industry leaders, offer robust solutions that can optimize hybrid cloud environments. This article explores how their technologies can be integrated to enhance performance, scalability, and security.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Understanding Hybrid Cloud&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Hybrid cloud environments combine private and public cloud resources, allowing businesses to leverage the best of both worlds. Key benefits include:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Flexibility:&lt;/strong&gt;&amp;nbsp;Easily scale resources up or down based on demand.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Cost-Efficiency:&lt;/strong&gt;&amp;nbsp;Optimize costs by using public cloud resources for non-sensitive workloads.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Disaster Recovery:&lt;/strong&gt;&amp;nbsp;Ensure business continuity with robust disaster recovery solutions.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Broadcom’s Contributions:&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Broadcom provides a range of technologies that support hybrid cloud environments, including:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Network Switches:&lt;/strong&gt;&amp;nbsp;Broadcom’s Trident 4 switch ASIC offers high port density, low latency, and programmability, essential for modern data centers.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Fibre Channel HBAs:&lt;/strong&gt;&amp;nbsp;Emulex Gen 7 Fibre Channel HBAs support NVMe over Fabrics (NVMe-oF), providing high-speed storage connectivity.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Storage Adapters:&lt;/strong&gt;&amp;nbsp;Broadcom’s storage adapters enhance data transfer speeds and reliability.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;VMware’s Hybrid Cloud Solutions&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;VMware offers comprehensive solutions for hybrid cloud environments, including:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;VMware Cloud Foundation:&lt;/strong&gt;&amp;nbsp;Provides a unified platform for managing private and public cloud resources.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;VMware Cloud on AWS:&lt;/strong&gt;&amp;nbsp;Enables seamless integration between on-premises VMware environments and AWS.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;VMware Tanzu:&lt;/strong&gt;&amp;nbsp;Supports Kubernetes-based container orchestration, enabling modern application development and deployment.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Integration Capabilities&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;The integration of Broadcom’s hardware with VMware’s software solutions can significantly enhance hybrid cloud environments:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Performance Optimization:&lt;/strong&gt;&amp;nbsp;Broadcom’s high-performance networking and storage solutions can boost the performance of VMware’s hybrid cloud infrastructure.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Seamless Workload Mobility:&lt;/strong&gt;&amp;nbsp;VMware’s vSphere, combined with Broadcom’s network and storage solutions, enables seamless workload mobility and disaster recovery.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unified Management:&lt;/strong&gt;&amp;nbsp;VMware vRealize Suite provides unified management across hybrid cloud environments, leveraging Broadcom’s telemetry for proactive monitoring.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Real-World Applications&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Several businesses have successfully implemented Broadcom and VMware solutions to optimize their hybrid cloud environments. For example:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Financial Services:&lt;/strong&gt;&amp;nbsp;Firms leverage VMware NSX with Broadcom’s network infrastructure for secure, high-performance trading platforms.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Healthcare:&lt;/strong&gt;&amp;nbsp;Organizations use VMware Cloud Foundation with Broadcom’s storage adapters to ensure reliable and secure access to patient data.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Retail:&lt;/strong&gt;&amp;nbsp;Retailers deploy VMware Tanzu with Broadcom’s programmable network switches to support modern application development and deployment.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Best Practices for Implementation&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Implementing Broadcom and VMware solutions requires careful planning and execution. Here are some best practices:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Automated Workload Balancing:&lt;/strong&gt;&amp;nbsp;Use VMware’s automation tools to balance workloads across hybrid cloud environments, ensuring optimal performance and resource utilization.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unified Management:&lt;/strong&gt;&amp;nbsp;Leverage VMware vRealize Suite for unified management and monitoring, integrating Broadcom’s telemetry for proactive issue resolution.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Advanced Configurations:&lt;/strong&gt;&amp;nbsp;Optimize hybrid cloud environments with VMware’s Kubernetes solutions (Tanzu) and Broadcom’s programmable network switches.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Broadcom and VMware offer powerful solutions that can significantly optimize hybrid cloud environments. By leveraging the strengths of both companies, organizations can achieve enhanced performance, scalability, and security. Implementing these solutions with best practices can ensure a robust and resilient hybrid cloud infrastructure.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8180736451569065438'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8180736451569065438'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2024/05/optimising-hybrid-cloud-environments.html' title='Optimising Hybrid Cloud Environments with Broadcom and VMware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-4748186795135746075</id><published>2024-02-02T16:28:00.001+05:30</published><updated>2024-10-04T15:34:05.344+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Broadcom’s Acquisition of VMware: What It Means for the Future of Cloud Computing</title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Introduction:&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px;&quot;&gt;Broadcom’s recent acquisition of VMware for $61 billion marks a significant milestone in the tech industry. This merger is set to reshape the landscape of cloud computing, bringing together Broadcom’s hardware prowess and VMware’s software expertise. In this post, we will delve into the details of the acquisition, its impact on VMware’s product line, and the broader implications for cloud computing.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Background of the Acquisition:&lt;/b&gt;&lt;/span&gt;&amp;nbsp;The acquisition deal, announced in May 2022, is one of the largest in the tech sector. Broadcom, known for its semiconductor and infrastructure software solutions, has strategically acquired VMware to enhance its software portfolio. This move follows Broadcom’s previous acquisitions of CA Technologies and Symantec’s enterprise security business, highlighting its aggressive expansion strategy.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Impact on VMware’s Product Line&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;VMware’s core products, including vSphere, vSAN, NSX, and VMware Cloud Foundation, are expected to see significant enhancements. Broadcom’s advanced ASICs, NICs, and HBA technologies will be integrated with VMware’s software-defined data center (SDDC) solutions, optimizing performance and scalability. For instance, the integration of Broadcom’s high-performance networking hardware with VMware’s NSX could lead to improved network virtualization and security capabilities.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Implications for Cloud Computing:&lt;/b&gt;&lt;/span&gt;&amp;nbsp;The merger is poised to bring several benefits to the cloud computing landscape:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #111111; display: flex; flex-direction: column; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; gap: 12px; margin: 12px 0px 0px; padding-inline-start: 24px;&quot;&gt;&lt;li&gt;&lt;strong&gt;Performance Improvements:&lt;/strong&gt;&amp;nbsp;Broadcom’s high-performance networking and storage solutions will enhance VMware’s cloud infrastructure, providing faster and more reliable services.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Scalability:&lt;/strong&gt;&amp;nbsp;Broadcom’s scalable hardware solutions will support VMware’s multi-cloud and hybrid cloud environments, enabling seamless expansion and management.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Security:&lt;/strong&gt;&amp;nbsp;The integration of Broadcom’s advanced threat protection and encryption technologies with VMware’s security offerings will provide robust end-to-end security for cloud environments.&lt;/li&gt;&lt;/ol&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Future Prospects&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;Looking ahead, the combined strengths of Broadcom and VMware are expected to drive innovations in edge computing and 5G networks. Broadcom’s edge devices, coupled with VMware’s edge computing solutions, will enable efficient data processing at the edge, reducing latency and improving performance. Additionally, the acquisition will accelerate the deployment of 5G infrastructure, leveraging VMware’s telco cloud solutions and Broadcom’s networking hardware.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #111111; font-family: -apple-system, Roboto, SegoeUI, &amp;quot;Segoe UI&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, &amp;quot;Microsoft YaHei&amp;quot;, &amp;quot;Meiryo UI&amp;quot;, Meiryo, &amp;quot;Arial Unicode MS&amp;quot;, sans-serif; font-size: 16px; font-variation-settings: var(--cib-type-body2-font-variation-settings); line-height: var(--cib-type-body2-line-height); margin: 12px 0px 0px; padding: 0px; word-break: break-word;&quot;&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: var(--cib-type-subtitle2-stronger-font-size); font-variation-settings: var(--cib-type-subtitle2-stronger-font-variation-settings); font-weight: var(--cib-type-subtitle2-stronger-font-weight); line-height: var(--cib-type-subtitle2-stronger-line-height);&quot;&gt;:&lt;/span&gt;&amp;nbsp;In summary, Broadcom’s acquisition of VMware is set to revolutionize the cloud computing industry. The integration of Broadcom’s hardware with VMware’s software will lead to enhanced performance, scalability, and security for cloud environments. As the industry evolves, we can expect to see significant innovations and improvements driven by this powerful combination.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4748186795135746075'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4748186795135746075'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2024/10/broadcoms-acquisition-of-vmware-what-it.html' title='Broadcom’s Acquisition of VMware: What It Means for the Future of Cloud Computing'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-603740074711390896</id><published>2024-01-18T17:18:00.004+05:30</published><updated>2024-10-16T16:23:04.022+05:30</updated><title type='text'>Right-Sizing VMs and Container Nodes with VMware Tanzu: A Customer Success Story</title><content type='html'>&lt;p&gt;As a technical architect, I recently had the opportunity to work with a customer who was facing significant challenges with their IT infrastructure. They were struggling with resource allocation, performance bottlenecks, and network reliability. Here’s how we leveraged VMware Tanzu and NSX to transform their environment.&lt;/p&gt;&lt;div aria-description=&quot;&quot; aria-label=&quot;Sent by Copilot: ### Right-Sizing VMs and Container Nodes with VMware Tanzu: A Customer Success Story

As a technical architect, I recently had the opportunity to work with a customer who was facing significant challenges with their IT infrastructure. They were struggling with resource allocation, performance bottlenecks, and network reliability. Here&#39;s how we leveraged VMware Tanzu and NSX to transform their environment.

#### The Challenge

My customer, a mid-sized enterprise, was experiencing rapid growth. Their existing infrastructure was unable to keep up with the increasing demands. They had over-provisioned resources, leading to inefficiencies and increased costs. Additionally, their network lacked the necessary segmentation and security measures, making it vulnerable to potential threats.

#### The Solution

We decided to implement VMware Tanzu for managing their Kubernetes clusters and NSX for enhancing network reliability and security. Here’s how we approached the project:

**1. Workload Analysis:**
We began by conducting a thorough analysis of their workloads. Using VMware vRealize Operations, we assessed historical data to understand resource usage patterns. This helped us determine the optimal sizes for VMs and container nodes.

**Technical Details:**
- **vRealize Operations:** We configured vRealize Operations to collect performance data from existing VMs and containers. This included CPU, memory, disk I/O, and network usage metrics.
- **Predictive Analysis:** Leveraging machine learning capabilities, vRealize Operations provided predictive analytics to forecast future resource needs based on historical trends.

**2. Resource Allocation:**
Next, we leveraged VMware Tanzu Kubernetes Grid (TKG) to automate the deployment and scaling of Kubernetes clusters. This allowed us to allocate resources dynamically based on workload demands. We also used VMware vSphere with Tanzu to manage VMs and containers on a single platform, ensuring efficient resource allocation.

**Technical Details:**
- **Tanzu Kubernetes Grid (TKG):** We deployed TKG clusters with a mix of small, medium, and large node sizes to match the varying workload requirements.
- **Resource Pools:** Created resource pools in vSphere to allocate specific amounts of CPU and memory to different clusters, ensuring that critical applications received priority.

**3. Monitoring and Adjustments:**
To ensure continuous optimization, we integrated VMware Tanzu Observability by Wavefront for real-time monitoring and alerting. This enabled us to track performance metrics and make necessary adjustments promptly. Additionally, we employed VMware Aria Operations for Applications to monitor application performance continuously.

**Technical Details:**
- **Tanzu Observability by Wavefront:** Configured dashboards to visualize key performance indicators (KPIs) such as CPU utilization, memory usage, and response times.
- **Automated Alerts:** Set up automated alerts to notify the operations team of any anomalies or performance issues, enabling quick remediation.

**4. Network Segmentation and Security:**
For network segmentation and security, we configured NSX Distributed Firewall to enforce micro-segmentation policies at the VM and container level. This allowed us to create isolated network segments for different applications and services. We also implemented NSX Advanced Threat Protection to detect and mitigate security threats in real-time.

**Technical Details:**
- **NSX Distributed Firewall:** Defined security groups and applied firewall rules to control traffic between different segments. For example, we isolated the database tier from the web tier to enhance security.
- **Advanced Threat Protection:** Deployed NSX IDS/IPS to monitor network traffic for malicious activity and automatically block threats.

**5. Load Balancing:**
To ensure high availability and prevent any single node from becoming a bottleneck, we deployed NSX Advanced Load Balancer (formerly Avi Networks). This provided intelligent load balancing across VMs and containers. We also configured global server load balancing (GSLB) to ensure high availability and disaster recovery.

**Technical Details:**
- **NSX Advanced Load Balancer:** Configured virtual services and pools to distribute traffic based on health checks and performance metrics.
- **GSLB:** Implemented GSLB to route traffic to the nearest data center, reducing latency and improving user experience.

**6. Automated Network Management:**
We utilized NSX-T Data Center to automate network provisioning and management across multi-cloud environments. This reduced the complexity of maintaining a reliable network infrastructure. Additionally, we implemented NSX Intelligence for advanced analytics and automated remediation of network issues.

**Technical Details:**
- **NSX-T Data Center:** Automated the creation of logical switches, routers, and firewalls using NSX-T APIs.
- **NSX Intelligence:** Used NSX Intelligence to gain insights into network traffic patterns and identify potential bottlenecks or security risks.

**7. Integration with Tanzu:**
Finally, we used VMware Cloud Foundation with Tanzu to create a unified platform for managing VMs, containers, and network resources. This integration simplified the deployment and management of Kubernetes clusters, enhancing overall operational efficiency. We also leveraged VMware Tanzu Service Mesh to provide end-to-end visibility and control over microservices communication.

**Technical Details:**
- **VMware Cloud Foundation:** Deployed VMware Cloud Foundation to provide a consistent infrastructure across on-premises and cloud environments.
- **Tanzu Service Mesh:** Configured Tanzu Service Mesh to manage service-to-service communication, enforce security policies, and monitor application performance.

#### The Outcome

The results were remarkable. By right-sizing their VMs and container nodes, we optimized resource utilization and reduced costs. The dynamic resource allocation ensured that their applications always had the necessary resources without over-provisioning. The enhanced network segmentation and security measures significantly improved their overall security posture.

The customer was particularly impressed with the automated network management capabilities of NSX. It not only simplified their network operations but also provided them with the visibility and control they needed to maintain a reliable and secure environment.

This project was a testament to the power of VMware Tanzu and NSX in transforming IT infrastructure. By following best practices and leveraging the advanced capabilities of these solutions, we were able to deliver a balanced, secure, and highly available environment for our customer.&quot; class=&quot;content user-select-text&quot; tabindex=&quot;0&quot;&gt;&lt;div class=&quot;ac-container ac-adaptiveCard&quot;&gt;&lt;div class=&quot;ac-textBlock&quot;&gt;&lt;h4&gt;The Challenge&lt;/h4&gt;&lt;p&gt;My customer, a mid-sized enterprise, was experiencing rapid growth. Their existing infrastructure was unable to keep up with the increasing demands. They had over-provisioned resources, leading to inefficiencies and increased costs. Additionally, their network lacked the necessary segmentation and security measures, making it vulnerable to potential threats.&lt;/p&gt;&lt;h4&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiIflEpoOXU61Q9nVo2L3El65-667qepoiF5vBkP9MZmDPN-GNxJBz--5DnkRz5Ohp8zev10h5QE_AD95sKr56iI0sZ8pgCMx34Q6IYyn97zA-aoJgRUaoOxnLEIe_ncO02je1BAn8uc504FbFYwXXrA2KRZ5TAO8HsdQi8kfGxteVjTHmRsqXWfbGhNKs&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;325&quot; data-original-width=&quot;847&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiIflEpoOXU61Q9nVo2L3El65-667qepoiF5vBkP9MZmDPN-GNxJBz--5DnkRz5Ohp8zev10h5QE_AD95sKr56iI0sZ8pgCMx34Q6IYyn97zA-aoJgRUaoOxnLEIe_ncO02je1BAn8uc504FbFYwXXrA2KRZ5TAO8HsdQi8kfGxteVjTHmRsqXWfbGhNKs=w640-h246&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;The Solution&lt;/h4&gt;&lt;p&gt;We decided to implement VMware Tanzu for managing their Kubernetes clusters and NSX for enhancing network reliability and security. Here’s how we approached the project:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;1. Workload Analysis:&lt;/strong&gt; We began by conducting a thorough analysis of their workloads. Using VMware vRealize Operations, we assessed historical data to understand resource usage patterns. This helped us determine the optimal sizes for VMs and container nodes.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;vRealize Operations:&lt;/strong&gt; We configured vRealize Operations to collect performance data from existing VMs and containers. This included CPU, memory, disk I/O, and network usage metrics.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Predictive Analysis:&lt;/strong&gt; Leveraging machine learning capabilities, vRealize Operations provided predictive analytics to forecast future resource needs based on historical trends.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;2. Resource Allocation:&lt;/strong&gt; Next, we leveraged VMware Tanzu Kubernetes Grid (TKG) to automate the deployment and scaling of Kubernetes clusters. This allowed us to allocate resources dynamically based on workload demands. We also used VMware vSphere with Tanzu to manage VMs and containers on a single platform, ensuring efficient resource allocation.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Tanzu Kubernetes Grid :&lt;/strong&gt; We deployed TKG clusters with a mix of small, medium, and large node sizes to match the varying workload requirements.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Resource Pools:&lt;/strong&gt; Created resource pools in vSphere to allocate specific amounts of CPU and memory to different clusters, ensuring that critical applications received priority.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;3. Monitoring and Adjustments:&lt;/strong&gt; To ensure continuous optimization, we integrated VMware Tanzu Observability by Wavefront for real-time monitoring and alerting. This enabled us to track performance metrics and make necessary adjustments promptly. Additionally, we employed VMware Aria Operations for Applications to monitor application performance continuously.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Tanzu Observability:&lt;/strong&gt; Configured dashboards to visualize key performance indicators (KPIs) such as CPU utilization, memory usage, and response times.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Automated Alerts:&lt;/strong&gt; Set up automated alerts to notify the operations team of any anomalies or performance issues, enabling quick remediation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;4. Network Segmentation and Security:&lt;/strong&gt; For network segmentation and security, we configured NSX Distributed Firewall to enforce micro-segmentation policies at the VM and container level. This allowed us to create isolated network segments for different applications and services. We also implemented NSX Advanced Threat Protection to detect and mitigate security threats in real-time.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;NSX Distributed Firewall:&lt;/strong&gt; Defined security groups and applied firewall rules to control traffic between different segments. For example, we isolated the database tier from the web tier to enhance security.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Advanced Threat Protection:&lt;/strong&gt; Deployed NSX IDS/IPS to monitor network traffic for malicious activity and automatically block threats.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;5. Load Balancing:&lt;/strong&gt; To ensure high availability and prevent any single node from becoming a bottleneck, we deployed NSX Advanced Load Balancer (formerly Avi Networks). This provided intelligent load balancing across VMs and containers. We also configured global server load balancing (GSLB) to ensure high availability and disaster recovery.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;NSX Advanced Load Balancer:&lt;/strong&gt; Configured virtual services and pools to distribute traffic based on health checks and performance metrics.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;GSLB:&lt;/strong&gt; Implemented GSLB to route traffic to the nearest data center, reducing latency and improving user experience.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;6. Automated Network Management:&lt;/strong&gt; We utilized NSX-T Data Center to automate network provisioning and management across multi-cloud environments. This reduced the complexity of maintaining a reliable network infrastructure. Additionally, we implemented NSX Intelligence for advanced analytics and automated remediation of network issues.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;NSX-T Data Center:&lt;/strong&gt; Automated the creation of logical switches, routers, and firewalls using NSX-T APIs.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;NSX Intelligence:&lt;/strong&gt; Used NSX Intelligence to gain insights into network traffic patterns and identify potential bottlenecks or security risks.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;7. Integration with Tanzu:&lt;/strong&gt; Finally, we used VMware Cloud Foundation with Tanzu to create a unified platform for managing VMs, containers, and network resources. This integration simplified the deployment and management of Kubernetes clusters, enhancing overall operational efficiency. We also leveraged VMware Tanzu Service Mesh to provide end-to-end visibility and control over microservices communication.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;VMware Cloud Foundation:&lt;/strong&gt; Deployed VMware Cloud Foundation to provide a consistent infrastructure across on-premises and cloud environments.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Tanzu Service Mesh:&lt;/strong&gt; Configured Tanzu Service Mesh to manage service-to-service communication, enforce security policies, and monitor application performance.&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;The Outcome&lt;/h4&gt;&lt;p&gt;The results were remarkable. By right-sizing their VMs and container nodes, we optimized resource utilization and reduced costs. The dynamic resource allocation ensured that their applications always had the necessary resources without over-provisioning. The enhanced network segmentation and security measures significantly improved their overall security posture.&lt;/p&gt;&lt;p&gt;The customer was particularly impressed with the automated network management capabilities of NSX. It not only simplified their network operations but also provided them with the visibility and control they needed to maintain a reliable and secure environment.&lt;/p&gt;&lt;p&gt;This project was a testament to the power of VMware Tanzu and NSX in transforming IT infrastructure. By following best practices and leveraging the advanced capabilities of these solutions, we were able to deliver a balanced, secure, and highly available environment for our customer.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;cib-overlay&gt;&lt;/cib-overlay&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/603740074711390896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/603740074711390896'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2024/01/right-sizing-vms-and-container-nodes.html' title='Right-Sizing VMs and Container Nodes with VMware Tanzu: A Customer Success Story'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEiIflEpoOXU61Q9nVo2L3El65-667qepoiF5vBkP9MZmDPN-GNxJBz--5DnkRz5Ohp8zev10h5QE_AD95sKr56iI0sZ8pgCMx34Q6IYyn97zA-aoJgRUaoOxnLEIe_ncO02je1BAn8uc504FbFYwXXrA2KRZ5TAO8HsdQi8kfGxteVjTHmRsqXWfbGhNKs=s72-w640-h246-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-2976577723211931043</id><published>2023-07-12T19:31:00.002+05:30</published><updated>2023-07-12T19:31:32.014+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>VMware on AWS - How to restore NSX DFW firewall rules to previous state </title><content type='html'>Customers who uses NSX day-in, day-out would like to have a point-in time restore functionality of DFW firewall rules. Many customer have a large footprints in VMC and make changes to DFW quite often. &lt;br /&gt;&lt;br /&gt;This feature was missing for long time and we could see its included in recent versions . Let&#39;s see how DFW configuration roll back works&amp;nbsp;&lt;br /&gt;&lt;br /&gt;NSX DFW configuration has versioning, and it is stored in the NSX Manager.&amp;nbsp; Every time when someone update DFW configuration, NSX creates one more version but keep storing the previous ones. You can rollback for previous config but reapplying it once again.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You can find the options under &lt;b&gt;Networking &amp;amp; Security tab&lt;/b&gt;, &amp;gt; Security &amp;gt; &lt;b&gt;Distributed Firewall&lt;/b&gt;. In the right side we see an &lt;b&gt;Actions &lt;/b&gt;drop down. Choose &lt;b&gt;View&lt;/b&gt; to get to the below screen.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhgBdPySWwFabLQ9ncD4IGutXMvGKgkLDRPtQ4sg1WYgnhgyG6EU4GA-eP_5_wLS1eg6qisZmMJQmkDroAOAF41EE0ngCyS_ql3kD_AXcZpLmNyU7K8W36lnxwQ1VQNdgxWx4l-PayLt7S4RStemm9D52i88dsh9iBDYAMxLYIsbhygh7pwKOVUOqoYLEI&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;452&quot; data-original-width=&quot;1650&quot; height=&quot;176&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhgBdPySWwFabLQ9ncD4IGutXMvGKgkLDRPtQ4sg1WYgnhgyG6EU4GA-eP_5_wLS1eg6qisZmMJQmkDroAOAF41EE0ngCyS_ql3kD_AXcZpLmNyU7K8W36lnxwQ1VQNdgxWx4l-PayLt7S4RStemm9D52i88dsh9iBDYAMxLYIsbhygh7pwKOVUOqoYLEI=w640-h176&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Let’s go through the use case:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Original state- default config with no custom rules:&amp;nbsp;&lt;/li&gt;&lt;li&gt;a.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;There are no saved configurations during last 30 days:&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNQKddJYn85HtSiMQK5wFyOqnuZ-JID7_A5KkGLpeKbryv7rYzYpuFUv6dD38htxB99xsSeFiFvrp4dpLjEAAAqZ4piieGoU0Z4BnKd7metxXRz-3mvVYWDpdj2zxhhONk5lW2AA4L9QqJnkGTO-_Kb_ijH0Au24Mue1nJ4dUJuR79dooTGHfdsAL29Ho/s1414/Screenshot%202023-07-12%20at%2015.02.08.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;463&quot; data-original-width=&quot;1414&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNQKddJYn85HtSiMQK5wFyOqnuZ-JID7_A5KkGLpeKbryv7rYzYpuFUv6dD38htxB99xsSeFiFvrp4dpLjEAAAqZ4piieGoU0Z4BnKd7metxXRz-3mvVYWDpdj2zxhhONk5lW2AA4L9QqJnkGTO-_Kb_ijH0Au24Mue1nJ4dUJuR79dooTGHfdsAL29Ho/w640-h210/Screenshot%202023-07-12%20at%2015.02.08.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;In my existing test setup, with the current setting everything works well. The test vms are able to ping each other.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHLuIHNo0Q2ECNU3tqoQOVnfnQBcIIerGkvIaitWjytKlgkHGXO21Z36kConURV-Ve-3rwCJe_JV8JjgcuRtfjC5cT_jyaJnMFiHb_PJuRUn8kFm95vf0FbT083ApeJF_EcJPOwNhbcoxU9jXtfyr3lseag6Z5ocYNQvNIdedjE86tnYpW1Ao_-aHfyA/s530/Screenshot%202023-07-12%20at%2015.04.28.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;189&quot; data-original-width=&quot;530&quot; height=&quot;143&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHLuIHNo0Q2ECNU3tqoQOVnfnQBcIIerGkvIaitWjytKlgkHGXO21Z36kConURV-Ve-3rwCJe_JV8JjgcuRtfjC5cT_jyaJnMFiHb_PJuRUn8kFm95vf0FbT083ApeJF_EcJPOwNhbcoxU9jXtfyr3lseag6Z5ocYNQvNIdedjE86tnYpW1Ao_-aHfyA/w400-h143/Screenshot%202023-07-12%20at%2015.04.28.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;2. New configuration : Let&#39;s go ahead and create new rules&amp;nbsp;&lt;/li&gt;&lt;li&gt;1. Create a new rule to &lt;b&gt;reject&lt;/b&gt; the &lt;b&gt;traffic&lt;/b&gt; from VM 172.16.30.11.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV43Ux1ReSufkJ2X5yVV-35GNzFZnBKT0leSPlu3fpeGf34c5MCOeyzkAwcHBO_sNanRyzyRoZ3OVWoPY2hr0l3iN155a000lpFpelwSZnLlZI2EQwMSDUXd7k6Bnfiec4UioMH0MEW-JTYjCDPxGtNzMx0jBeJW42_ls7Z_iNxZsPPQiQTS9kKJNmIdM/s1415/Screenshot%202023-07-12%20at%2015.09.22.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;323&quot; data-original-width=&quot;1415&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV43Ux1ReSufkJ2X5yVV-35GNzFZnBKT0leSPlu3fpeGf34c5MCOeyzkAwcHBO_sNanRyzyRoZ3OVWoPY2hr0l3iN155a000lpFpelwSZnLlZI2EQwMSDUXd7k6Bnfiec4UioMH0MEW-JTYjCDPxGtNzMx0jBeJW42_ls7Z_iNxZsPPQiQTS9kKJNmIdM/w640-h146/Screenshot%202023-07-12%20at%2015.09.22.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As we see in the screenshot the traffic from the &lt;b&gt;VM is now rejected &lt;/b&gt;.&amp;nbsp; Let&#39;s try to ping test and confirm the same.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV7JzzZ81TvKgDptGH6-_uN5p5gwdFGKm_DpXyOH5_aWzC-9fHZJt4gQPTB4no-_q5Mg_ekH0XCKyidmX6kqJczbhrnohbzsSgW9HWCDxf9Bv0BDSHz9uqCdpq6T-cVEKYvXqqnjf_3rwAuGEd7ulrsJcyUrLMjxloCvpY1E5CfRCQG4BrVrRIWAOA8dE/s496/Screenshot%202023-07-12%20at%2015.10.09.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;291&quot; data-original-width=&quot;496&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV7JzzZ81TvKgDptGH6-_uN5p5gwdFGKm_DpXyOH5_aWzC-9fHZJt4gQPTB4no-_q5Mg_ekH0XCKyidmX6kqJczbhrnohbzsSgW9HWCDxf9Bv0BDSHz9uqCdpq6T-cVEKYvXqqnjf_3rwAuGEd7ulrsJcyUrLMjxloCvpY1E5CfRCQG4BrVrRIWAOA8dE/w400-h235/Screenshot%202023-07-12%20at%2015.10.09.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Let&#39;s go to &lt;b&gt;Actions&lt;/b&gt; and &lt;b&gt;View&lt;/b&gt; the saved configurations.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;In the screen we see a dot with and when we place the cursor on the dot we get to see when the last rule update was done. Look at the time of the change and click on the rule Name&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjEjY_z4EW66JBu2ZFcxokAOhlOSOa0np3XK2PdVKG4Huv6ak11lFgET3ypNTa8vK4kTQBbXtGtXZUEWoYoSxL4yj7wPDCL4a3Oq8nQtelXmO3mZgcQKavjTjfcBmA8Vxzij55toyD2neGbVfk9miVoPh59fzxx15gU705_ABw6BYtFnQnC_PcW-7iiTI/s1401/Screenshot%202023-07-12%20at%2015.11.43.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;391&quot; data-original-width=&quot;1401&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjEjY_z4EW66JBu2ZFcxokAOhlOSOa0np3XK2PdVKG4Huv6ak11lFgET3ypNTa8vK4kTQBbXtGtXZUEWoYoSxL4yj7wPDCL4a3Oq8nQtelXmO3mZgcQKavjTjfcBmA8Vxzij55toyD2neGbVfk9miVoPh59fzxx15gU705_ABw6BYtFnQnC_PcW-7iiTI/w640-h178/Screenshot%202023-07-12%20at%2015.11.43.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;When we open the last draft , a new window appears with more details. As we see the last change was done by the user &quot; userid&quot; and also the time stamps.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgsThCtmIbIdK10uGPPudGbx8Cm0J0Ohe0LfNo6jcPC08Xt2-4TeYl2_W-_i6ETSlTid-dQN3y3xoYGzXbYzq3gHnwdzPj8QySfVTFIhgMoqd8fpXJ9ftrKn2AC0EM31jF1zhjfJobEGuTn_OkwiRl6psKlF3HuexB2WPcXI2C9uGr7mp2hz8a0Ds2QQw/s1133/Screenshot%202023-07-12%20at%2015.15.28.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;396&quot; data-original-width=&quot;1133&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgsThCtmIbIdK10uGPPudGbx8Cm0J0Ohe0LfNo6jcPC08Xt2-4TeYl2_W-_i6ETSlTid-dQN3y3xoYGzXbYzq3gHnwdzPj8QySfVTFIhgMoqd8fpXJ9ftrKn2AC0EM31jF1zhjfJobEGuTn_OkwiRl6psKlF3HuexB2WPcXI2C9uGr7mp2hz8a0Ds2QQw/w640-h224/Screenshot%202023-07-12%20at%2015.15.28.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Expand the lower section under &lt;b&gt;Draft changes&lt;/b&gt; to check the rule details :&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLvwOAJvc8RoE5uxWCMdm3PQEhVL2J_Wv-LCsGsQikQT65sX5eeaWP1gINfNYyf_R0Mai0cR9l140Xwgke-bHjCmhRWcoil1gexfZQPq3td3BA7SC1xjxfQi6pi0Jh3rHucfioI9OroWuNSH-Iqv3vTBhBNzCVe-cf9x6To1Hl9BIzNQHTO7wSsl3Yarw/s1129/Screenshot%202023-07-12%20at%2015.16.14.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;671&quot; data-original-width=&quot;1129&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLvwOAJvc8RoE5uxWCMdm3PQEhVL2J_Wv-LCsGsQikQT65sX5eeaWP1gINfNYyf_R0Mai0cR9l140Xwgke-bHjCmhRWcoil1gexfZQPq3td3BA7SC1xjxfQi6pi0Jh3rHucfioI9OroWuNSH-Iqv3vTBhBNzCVe-cf9x6To1Hl9BIzNQHTO7wSsl3Yarw/w640-h380/Screenshot%202023-07-12%20at%2015.16.14.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The rule what we added shows up here.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Let&#39;s create another policy and a rule for a demo purpose.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXKC5j1GwI-R0RhP2bNwIurdfDmcB_Bekk8dBNLO8l04BR4SMX1RiCc6KkpXhXKi7dOHdbSkZndCMnI3lDcy48BppLriNRmsnOnNOR1zo89TyD74sy81sJRI7vsvfMXrU_psYzxPEafweFaXL-5V6XvQlH3av6CRQs3u-a_XpwREdxapIYrMAJDFc2y2M/s1411/Screenshot%202023-07-12%20at%2015.19.08.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;396&quot; data-original-width=&quot;1411&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXKC5j1GwI-R0RhP2bNwIurdfDmcB_Bekk8dBNLO8l04BR4SMX1RiCc6KkpXhXKi7dOHdbSkZndCMnI3lDcy48BppLriNRmsnOnNOR1zo89TyD74sy81sJRI7vsvfMXrU_psYzxPEafweFaXL-5V6XvQlH3av6CRQs3u-a_XpwREdxapIYrMAJDFc2y2M/w640-h180/Screenshot%202023-07-12%20at%2015.19.08.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Now we see a new rule Change-2 as well as the Change-1. Let&#39;s review the configuration changes snapshot under &lt;b&gt;Actions&lt;/b&gt;, &amp;gt;&amp;nbsp;&lt;b&gt;View&lt;/b&gt;.&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXNPpnDFwKferphiwM15_-Q_N30UfbZD2wApxIw_LW0C6zres87JbltK01bY5oL63KxGqEdlS6D8Ia-llGHFSox1eQbo9l4DyeAWELRPBbJVU_748NUy5ssKUEOTJj5vXRs9gSQlBo8oQCbDSH_hVpwL_ObIyoWPlzosDyvcTo4t07B9RyzP3o9mMqSww/s1418/Screenshot%202023-07-12%20at%2015.22.23.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;1418&quot; height=&quot;136&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXNPpnDFwKferphiwM15_-Q_N30UfbZD2wApxIw_LW0C6zres87JbltK01bY5oL63KxGqEdlS6D8Ia-llGHFSox1eQbo9l4DyeAWELRPBbJVU_748NUy5ssKUEOTJj5vXRs9gSQlBo8oQCbDSH_hVpwL_ObIyoWPlzosDyvcTo4t07B9RyzP3o9mMqSww/w640-h136/Screenshot%202023-07-12%20at%2015.22.23.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Let say the changes we made is wrong and impacting the pings. And we decide to roll back to the previous state.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A. Go to &lt;b&gt;Actions&lt;/b&gt; and under &lt;b&gt;View&lt;/b&gt; choose the state we need to go back to. In our case its the first dot ( confirm the time lines as well).&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOAHer56S_wP62wNFV2WWy48T-2Dxls1mjWq25D80kYVY0X7N9yCOAxDIuMomNofFtDop94CMS4q0MBKy5or4KhcBNbXV8AijOKHCjsMQ80wO_jvrS4xCHtWqkcln5fM2VLDSdHQuFKeQQFob-21icjoR9rNgwWfCZOO_Jx0pK7Cdvc8dpheJt9W5jrKA/s1145/Screenshot%202023-07-12%20at%2015.24.50.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;887&quot; data-original-width=&quot;1145&quot; height=&quot;496&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOAHer56S_wP62wNFV2WWy48T-2Dxls1mjWq25D80kYVY0X7N9yCOAxDIuMomNofFtDop94CMS4q0MBKy5or4KhcBNbXV8AijOKHCjsMQ80wO_jvrS4xCHtWqkcln5fM2VLDSdHQuFKeQQFob-21icjoR9rNgwWfCZOO_Jx0pK7Cdvc8dpheJt9W5jrKA/w640-h496/Screenshot%202023-07-12%20at%2015.24.50.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Here we should see 2 Firewall config and 2 Policy ( 1 we added to reject and another one to demo) . Both the policies and rules will be deleted&amp;nbsp; - 4 in total ( going to exact previous state - before state).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Push “&lt;b&gt;Load&lt;/b&gt;” and revert configuration to the last known-good state before these changes: When below screen appears , click on &lt;b&gt;Load&lt;/b&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHwgV__7ONjru2vo4PcfkDlpl93utpACCguEI897mafRXq-P9IQ0ypz1BFERDb3z0ZtL_vIUqgnwxBsz8DwcW2nF6c5N4LgfrQqWySMMi3UahsVmpQiGPLZYlmbgVTsQKqByXz3kTaiY0d7SxZzk0Gj4eBzwqabX33HMTZs268UnZrihw7ZtcuhHYV3dU/s579/Screenshot%202023-07-12%20at%2015.27.43.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;579&quot; height=&quot;562&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHwgV__7ONjru2vo4PcfkDlpl93utpACCguEI897mafRXq-P9IQ0ypz1BFERDb3z0ZtL_vIUqgnwxBsz8DwcW2nF6c5N4LgfrQqWySMMi3UahsVmpQiGPLZYlmbgVTsQKqByXz3kTaiY0d7SxZzk0Gj4eBzwqabX33HMTZs268UnZrihw7ZtcuhHYV3dU/w640-h562/Screenshot%202023-07-12%20at%2015.27.43.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the next screen we could see the state as exactly as previous one. We need to &lt;b&gt;publish&lt;/b&gt; them to make it effect. ( click publish)&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihGrVlJx26YwQMaLM4MZdIdksoGRJSf0O3LLpTG3TYSAbPgQglQn97mUrzboP0PhgTp6rKh2ROHfp8ZyiknA35E-bqeeH0SJGtajdsWOX41PdFDVTj86OpcdCVC2uFI06DDWzy39KLubVHrqtSudt9oV-Y_Ti3mpHskGCr6Onb_ozOafUz7eHVNGELmwc/s1423/Screenshot%202023-07-12%20at%2015.29.23.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;406&quot; data-original-width=&quot;1423&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihGrVlJx26YwQMaLM4MZdIdksoGRJSf0O3LLpTG3TYSAbPgQglQn97mUrzboP0PhgTp6rKh2ROHfp8ZyiknA35E-bqeeH0SJGtajdsWOX41PdFDVTj86OpcdCVC2uFI06DDWzy39KLubVHrqtSudt9oV-Y_Ti3mpHskGCr6Onb_ozOafUz7eHVNGELmwc/w640-h182/Screenshot%202023-07-12%20at%2015.29.23.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Now check the connectivity of the VMs are restored to the original state.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwTHMrRlSjJ4C7E73bDG3EK8mqOcy9Pxcsthwpfo9yojENMFkCKfilhJvMW8ctSBs45l6YLiAFrb54H3d4Nmk5hkUHw9SgcOXRNXTSz3SPp8Dq-GLIlgAl_fvLkPjhI9qdxLPYnJYDRnvex21WADqZioT_9Yk8u05ogPEJBNPJfJS_jRevhcXNvwgKhs/s496/Screenshot%202023-07-12%20at%2015.30.06.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;468&quot; data-original-width=&quot;496&quot; height=&quot;604&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwTHMrRlSjJ4C7E73bDG3EK8mqOcy9Pxcsthwpfo9yojENMFkCKfilhJvMW8ctSBs45l6YLiAFrb54H3d4Nmk5hkUHw9SgcOXRNXTSz3SPp8Dq-GLIlgAl_fvLkPjhI9qdxLPYnJYDRnvex21WADqZioT_9Yk8u05ogPEJBNPJfJS_jRevhcXNvwgKhs/w640-h604/Screenshot%202023-07-12%20at%2015.30.06.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;Other Options :&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Under Actions &amp;gt; click on Save &amp;gt;&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This option helps to store the state of the DFW firewall. We can use this option before making any major changes ( like before change management window). This helps to restore to the previous state if the Change fails.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRdgbnU_BKVAPIArhwuiJNQAdE74QSSwPNhXR-JFOQ71bC7GOUk5bzE5fzEo-02tr3714hwPIXyj2vIF-EA_snUiLTOQQV4nSKrLc3J3bTYkv2jMcE43dEyfElcIXRllr5BjC01dDsemub-596CcUTOnziTq9Hj8CqA_ccqiCbT2-6NvI6SHHk5KfUp2o/s606/Screenshot%202023-07-12%20at%2015.33.41.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;577&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRdgbnU_BKVAPIArhwuiJNQAdE74QSSwPNhXR-JFOQ71bC7GOUk5bzE5fzEo-02tr3714hwPIXyj2vIF-EA_snUiLTOQQV4nSKrLc3J3bTYkv2jMcE43dEyfElcIXRllr5BjC01dDsemub-596CcUTOnziTq9Hj8CqA_ccqiCbT2-6NvI6SHHk5KfUp2o/w610-h640/Screenshot%202023-07-12%20at%2015.33.41.png&quot; width=&quot;610&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;And we could see a dot with Star - highlight helps to fetch the details without opening multiple dots.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI-s4iFySIqA6QH4GJwmIsZsdZJWH-a90jKTDpo_YO5l2hd1qRCtvfH0W-lqwI2SART7jXmCxh6wKGbahHzE0Mu3cPiXGlJ1meQX6z2rYRKwk6mMZ1MeB7j-MdxpzcnGvVR2d-C2EjXuUBZlbKtFftmGNrpbz3z9KnEbvJjMwI-fK8ULEPvSJ7-RLt2XQ/s1413/Screenshot%202023-07-12%20at%2015.33.56.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;398&quot; data-original-width=&quot;1413&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI-s4iFySIqA6QH4GJwmIsZsdZJWH-a90jKTDpo_YO5l2hd1qRCtvfH0W-lqwI2SART7jXmCxh6wKGbahHzE0Mu3cPiXGlJ1meQX6z2rYRKwk6mMZ1MeB7j-MdxpzcnGvVR2d-C2EjXuUBZlbKtFftmGNrpbz3z9KnEbvJjMwI-fK8ULEPvSJ7-RLt2XQ/w640-h180/Screenshot%202023-07-12%20at%2015.33.56.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;FAQ: Service disruptions:&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Rollback of NSX rules is the same process as applying new (or change) DFW rules. I.e., underneath, each ESXi host will get a new list of rules, which corresponds to the ones at the time we are doing the roll back.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;This will lead to the fact that if some other rules (let&#39;s call them, useful and valid) were created from the point we want to go back to, they too will be revoked. And consequently, the traffic that was going through them will stop going through right after the rollback. For this reason, before doing a rollback, it is worth looking at all the changes that have happened since then and fixing (cloning/exporting) the &quot;useful&quot; rules. And add them again after you do the rollback.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/2976577723211931043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/2976577723211931043'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2023/07/vmware-on-aws-how-to-restore-nsx-dfw.html' title='VMware on AWS - How to restore NSX DFW firewall rules to previous state '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhgBdPySWwFabLQ9ncD4IGutXMvGKgkLDRPtQ4sg1WYgnhgyG6EU4GA-eP_5_wLS1eg6qisZmMJQmkDroAOAF41EE0ngCyS_ql3kD_AXcZpLmNyU7K8W36lnxwQ1VQNdgxWx4l-PayLt7S4RStemm9D52i88dsh9iBDYAMxLYIsbhygh7pwKOVUOqoYLEI=s72-w640-h176-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-4434884384031107438</id><published>2023-06-23T20:04:00.006+05:30</published><updated>2023-06-23T20:04:53.090+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>[How to] Enable Multi-cast in VMware on AWS - NSX environment </title><content type='html'>&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;I had a customer who were running few application VMs in their on-premises datacenter which uses &lt;b&gt;multicasting&lt;/b&gt; as main mechanism in order to form cluster blocks. They are in process of migrating the workloads from On-premises to VMware on AWS SDDCs. The application Architect wanted to ensure that the VMC supports multicasting within AWS VMC so that they migrate the VMS ( Life &amp;amp; Shift) without major downtime/config changes to their applications clusters. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Let&#39;s see how things works within VMC world&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;In VMC setup the Multi casting feature is enabled by default. &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;In SDDC networks, layer 2 multicast traffic is treated as broadcast traffic on the network segment where the traffic originates. It is not routed beyond that segment. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;VMC Limitation:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;Optimisation features such as IGMP snooping are not supported.&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;Layer 3 multicast (such as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; text-align: justify;&quot;&gt;Protocol Independent Multicast) is not supported in VMware Cloud on AWS.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: white; margin: 0px; padding: 0px; text-align: left; user-select: text;&quot;&gt;&lt;div class=&quot;OutlineElement Ltr SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; clear: both; cursor: text; margin: 0px; overflow: visible; padding: 0px; position: relative; user-select: text;&quot;&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{54}&quot; paraid=&quot;1769065076&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;In the above example case, the customer has L2 multicast, let&#39;s check if the things work by using the omping command. 
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;Example: Run omping command from source VM to the destination VM.  ( Make sure the VMs are in the same SDDC Cluster within the SDDC and uses the segments within the VMC range from NSX) &lt;/span&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;1.  &lt;/span&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;omping -m 239.192.197.125 -p 9106 172.11.78.18 
&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{54}&quot; paraid=&quot;1769065076&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;Check if the source vm is able to receive the multi cast response from the destination. 

If you get the error  &quot;&lt;/span&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp;omping: Given address 172.11.78.18 is not valid multicast address&quot; then the things are not working as expected.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{54}&quot; paraid=&quot;1769065076&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{54}&quot; paraid=&quot;1769065076&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;In my case the customer had the VMware Distributed firewall in place. In that case, we had to allow the multicast address range in the DFW firewall inorder to make things work.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Below are the rules were created in the DFW.&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-variant-ligatures: none; white-space-collapse: preserve;&quot;&gt;
&lt;/span&gt;


&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{54}&quot; paraid=&quot;1769065076&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; user-select: text;&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;Configuration change at NSX DFW:&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;(Is&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt; need only if it does not work by default)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; line-height: 18.4px; margin: 0px; padding: 0px; user-select: text;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;ListContainerWrapper SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; position: relative; user-select: text;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;Allow the source and destination ports explicitly. Example,&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt; if the source VM IP range is 192.17.41.0/24, then enable UDP communication between the networks (multicast): 172.11.78.0/24 224.0.0.0/4.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;In DFW&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;, create a new rule for this traffic. S&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;ource IP is 172.11.78.0/24 and destination &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt;is&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; user-select: text;&quot;&gt; 224.0.0.0/4. The port is ANY and protocol is UDP.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; line-height: 18.4px; margin: 0px; padding: 0px; text-align: justify; user-select: text; white-space-collapse: preserve;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;ListContainerWrapper SCXW111992725 BCX0&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; margin: 0px; padding: 0px; position: relative; user-select: text;&quot;&gt;&lt;ol class=&quot;NumberListStyle1 SCXW111992725 BCX0&quot; role=&quot;list&quot; start=&quot;3&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; cursor: text; margin: 0px; overflow: visible; padding: 0px; user-select: text;&quot;&gt;&lt;li aria-setsize=&quot;-1&quot; class=&quot;OutlineElement Ltr SCXW111992725 BCX0&quot; data-aria-level=&quot;1&quot; data-aria-posinset=&quot;3&quot; data-font=&quot;Calibri&quot; data-leveltext=&quot;%1.&quot; data-list-defn-props=&quot;{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559684&amp;quot;:-1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}&quot; data-listid=&quot;3&quot; role=&quot;listitem&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; clear: both; cursor: text; display: block; margin: 0px 0px 0px 24px; overflow: visible; padding: 0px; position: relative; user-select: text; vertical-align: baseline;&quot;&gt;&lt;p class=&quot;Paragraph SCXW111992725 BCX0&quot; paraeid=&quot;{d1cb791d-09ab-4642-943e-e4513a378871}{90}&quot; paraid=&quot;660978270&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; background-color: transparent; font-kerning: none; margin: 0px; overflow-wrap: break-word; padding: 0px; text-align: justify; user-select: text; vertical-align: baseline; white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;span class=&quot;TextRun SCXW111992725 BCX0&quot; data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; font-variant-ligatures: none !important; line-height: 18.4px; margin: 0px; padding: 0px; user-select: text;&quot; xml:lang=&quot;EN-US&quot;&gt;Use the OMPING to confirm post the network changes&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;EOP SCXW111992725 BCX0&quot; data-ccp-props=&quot;{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:200,&amp;quot;335559740&amp;quot;:276}&quot; style=&quot;-webkit-tap-highlight-color: transparent; -webkit-user-drag: none; line-height: 18.4px; margin: 0px; padding: 0px; user-select: text;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6VPV56JYR5sWJqOXScrgg4sIthfBbxQ1SBd7ZHVx18DVOInouXWmMmEjBdeRlIW9ECyYJdnH5f468uVMja3mhQ7UW2TJmdWi8ElCKo3hr7rYKpYs3mZupxRawCXEZ41ui3c76j4vVo3UuSAECISYsIt75RjuXt9MvAvT2q9Sbqa78ZjhKNlnpFuPZv2A/s2160/temppp.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;2160&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6VPV56JYR5sWJqOXScrgg4sIthfBbxQ1SBd7ZHVx18DVOInouXWmMmEjBdeRlIW9ECyYJdnH5f468uVMja3mhQ7UW2TJmdWi8ElCKo3hr7rYKpYs3mZupxRawCXEZ41ui3c76j4vVo3UuSAECISYsIt75RjuXt9MvAvT2q9Sbqa78ZjhKNlnpFuPZv2A/w640-h320/temppp.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4434884384031107438'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4434884384031107438'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2023/06/how-to-enable-multi-cast-in-vmware-on.html' title='[How to] Enable Multi-cast in VMware on AWS - NSX environment '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6VPV56JYR5sWJqOXScrgg4sIthfBbxQ1SBd7ZHVx18DVOInouXWmMmEjBdeRlIW9ECyYJdnH5f468uVMja3mhQ7UW2TJmdWi8ElCKo3hr7rYKpYs3mZupxRawCXEZ41ui3c76j4vVo3UuSAECISYsIt75RjuXt9MvAvT2q9Sbqa78ZjhKNlnpFuPZv2A/s72-w640-h320-c/temppp.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-5959858381129721181</id><published>2023-02-24T17:48:00.005+05:30</published><updated>2023-02-24T17:53:01.300+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Implement and configure AWS Backup for VMware Cloud on AWS VM workloads</title><content type='html'>&lt;span style=&quot;font-family: helvetica;&quot;&gt;In our &lt;a href=&quot;https://www.myitblog.in/2023/02/aws-backup-for-vmware-cloud-on-aws.html&quot; target=&quot;_blank&quot;&gt;previous post &lt;/a&gt;we saw the design of the AWS Backup on VMC. In this post we’re going through the implementation steps&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;As per the design and best practice, we are going to use the ENI for the Backup traffic&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: small;&quot;&gt;CREATE A VPC ENDPOINT&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;TO CREATE AN INTERFACE ENDPOINT FOR AN AWS SERVICE&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Open the Amazon VPC console at &lt;a href=&quot;https://console.aws.amazon.com/vpc&quot;&gt;https://console.aws.amazon.com/vpc&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ERwtV9E8oD-CRelZU53IcQR2TfuT7tMHo_0K0AW7u00g-jM8i2qA1f5D5E8XaAhBdYKRhgu4MOhB0KNom5YeuQBrlc4qYuWsprqs-bcxCJ1k5GNUUKP6qrBHTsjd1KkiiBnrsnNKlcRD39-IvbpHDTlUg3-LTCT8HRT8rz-8xPL4LQ6MXsDlYXXO/s1149/Screenshot%202023-02-24%20at%2011.55.35.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;712&quot; data-original-width=&quot;1149&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ERwtV9E8oD-CRelZU53IcQR2TfuT7tMHo_0K0AW7u00g-jM8i2qA1f5D5E8XaAhBdYKRhgu4MOhB0KNom5YeuQBrlc4qYuWsprqs-bcxCJ1k5GNUUKP6qrBHTsjd1KkiiBnrsnNKlcRD39-IvbpHDTlUg3-LTCT8HRT8rz-8xPL4LQ6MXsDlYXXO/w400-h248/Screenshot%202023-02-24%20at%2011.55.35.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In the navigation pane, choose &lt;b&gt;Endpoints&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLsvMF5X71fnnuPE7ulBpl83jkgF4lfml83sHAz-qMnVwWuMMxRJ7-tdXqU2Iui-Nv5QgKt8tq9NJrO4Sf41nA40w9zAUnUoERd4-yD8YQCLjGHJv93OkR49t2CSCvAHqvU9su1KUGdVGj-0vGOwUSPAwPlL1tiXXPdSLj4G-3B1QAH4phjWN2ywjb/s946/Screenshot%202023-02-24%20at%2011.56.24.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;459&quot; data-original-width=&quot;946&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLsvMF5X71fnnuPE7ulBpl83jkgF4lfml83sHAz-qMnVwWuMMxRJ7-tdXqU2Iui-Nv5QgKt8tq9NJrO4Sf41nA40w9zAUnUoERd4-yD8YQCLjGHJv93OkR49t2CSCvAHqvU9su1KUGdVGj-0vGOwUSPAwPlL1tiXXPdSLj4G-3B1QAH4phjWN2ywjb/w400-h194/Screenshot%202023-02-24%20at%2011.56.24.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Choose &lt;b&gt;Create endpoint&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Name the endpoint&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibxEmOLUWuMAqXUU43QLZ-KcXOjuibzqZFKlZcnCKnlfbhoTQmrE2uyGJqC3XGnDaRbxfePx7YQKzPOPYiVPzQIsfDB5b2SyLxxdI9qM9Y8GaZxgoPU6AxS-IVFd2hRtbHvg2fIsn9UcZSjL0-qK0Hw6uFVueN36N5ff55XTKpOXYWpeW7vldXTzD_/s858/Screenshot%202023-02-24%20at%2011.57.08.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;427&quot; data-original-width=&quot;858&quot; height=&quot;199&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibxEmOLUWuMAqXUU43QLZ-KcXOjuibzqZFKlZcnCKnlfbhoTQmrE2uyGJqC3XGnDaRbxfePx7YQKzPOPYiVPzQIsfDB5b2SyLxxdI9qM9Y8GaZxgoPU6AxS-IVFd2hRtbHvg2fIsn9UcZSjL0-qK0Hw6uFVueN36N5ff55XTKpOXYWpeW7vldXTzD_/w400-h199/Screenshot%202023-02-24%20at%2011.57.08.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For Service category, choose &lt;b&gt;AWS services&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCjE7V9OE_u_cjoTlkOSM-NdAB724vvuTOStAPUMnMirM64xvFCcntqCXeGGiiZ-r73Lv__kDQCuCFXzZ8M3_dZcscdGF_s2WsCs9AaTEv6H4zeBrNmf15I18WM6j24KCeT3IX7lf0wnZ1DbhvY5MwWvlQjPtG8I1t0HmCoID7o70HwbLPlDxPgEJp/s839/Screenshot%202023-02-24%20at%2011.58.05.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;543&quot; data-original-width=&quot;839&quot; height=&quot;259&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCjE7V9OE_u_cjoTlkOSM-NdAB724vvuTOStAPUMnMirM64xvFCcntqCXeGGiiZ-r73Lv__kDQCuCFXzZ8M3_dZcscdGF_s2WsCs9AaTEv6H4zeBrNmf15I18WM6j24KCeT3IX7lf0wnZ1DbhvY5MwWvlQjPtG8I1t0HmCoID7o70HwbLPlDxPgEJp/w400-h259/Screenshot%202023-02-24%20at%2011.58.05.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;6.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For Service name, search “&lt;b&gt;Backup&lt;/b&gt;” and select “&lt;b&gt;backup-gateway&lt;/b&gt;” service from the dropdown&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKf6X1sJh8ioFhDm5gUEo8MY6vvAwLktHZ7eYMlWw0-4G9F-8n7IkyYvlylejGlCNhskd90vZpaxwpep-9U9iMTshTaZA8BJNu4WuoVh_8eo1AwAd1X0HS8NFB28aRMv75F-JROT4rlSu04L8RofcSDJzeMBJBlXX50hnUU78ueUFyrmt9Tv05Mmls/s830/Screenshot%202023-02-24%20at%2011.58.26.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;552&quot; data-original-width=&quot;830&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKf6X1sJh8ioFhDm5gUEo8MY6vvAwLktHZ7eYMlWw0-4G9F-8n7IkyYvlylejGlCNhskd90vZpaxwpep-9U9iMTshTaZA8BJNu4WuoVh_8eo1AwAd1X0HS8NFB28aRMv75F-JROT4rlSu04L8RofcSDJzeMBJBlXX50hnUU78ueUFyrmt9Tv05Mmls/w400-h266/Screenshot%202023-02-24%20at%2011.58.26.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;7.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For VPC, select the &lt;b&gt;VPC&lt;/b&gt; which we used for SDDC deployment and extension&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;8.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;To create an interface endpoint for Amazon S3, you must “uncheck” Additional settings, Enable DNS name. This is because Amazon S3 does not support private DNS for interface VPC endpoints&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;9.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For&amp;nbsp;&lt;b&gt;Subnets&lt;/b&gt;, select one subnet per Availability Zone which we used for SDDC VMC selection&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifrAafG9LQ5sSMTjbPGqsxx_gA7ijHAlRaxVFpZd-iCjIpslURuViEpRQQQ_cG-rUgIFQEq1bqKeqeO2TASV8Q_5hf_CWMwMLrGdY_-_yB8XA6u-0hsMtSubWr9LuLH71VakiXURTRTi8Zu1xzO-AwpQGlv9Y20w8KTnSH-xYMW1F4ggZDNhUyxEfP/s831/Screenshot%202023-02-24%20at%2011.59.32.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;614&quot; data-original-width=&quot;831&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifrAafG9LQ5sSMTjbPGqsxx_gA7ijHAlRaxVFpZd-iCjIpslURuViEpRQQQ_cG-rUgIFQEq1bqKeqeO2TASV8Q_5hf_CWMwMLrGdY_-_yB8XA6u-0hsMtSubWr9LuLH71VakiXURTRTi8Zu1xzO-AwpQGlv9Y20w8KTnSH-xYMW1F4ggZDNhUyxEfP/w400-h295/Screenshot%202023-02-24%20at%2011.59.32.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;10.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For &lt;b&gt;Security group&lt;/b&gt;, select the security groups to associate with the endpoint network interfaces. The security group rules must allow Backup resource to communicate with the SDDC MGW/CGW to communicate with the endpoint network interface&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUMmxQ8NW7Aa760VzQNEzhsaj6cX3WVD-8z-5rmYwCBsVQ3FzVVvZGjA6pzmqqsOob4Xk-4J3mRTRN5DMU9O9cKt48xZOyyW_fgJ_s_TYQ0BBV7S4s-nFMIYRiqJLD3jCecxWlgZWFszO2ezr0hCdCkoiNrf1hGudA00FLqbcmSWU6GpllGw3JdKrb/s840/Screenshot%202023-02-24%20at%2012.00.01.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;472&quot; data-original-width=&quot;840&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUMmxQ8NW7Aa760VzQNEzhsaj6cX3WVD-8z-5rmYwCBsVQ3FzVVvZGjA6pzmqqsOob4Xk-4J3mRTRN5DMU9O9cKt48xZOyyW_fgJ_s_TYQ0BBV7S4s-nFMIYRiqJLD3jCecxWlgZWFszO2ezr0hCdCkoiNrf1hGudA00FLqbcmSWU6GpllGw3JdKrb/w400-h225/Screenshot%202023-02-24%20at%2012.00.01.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;11.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;For Policy, select Full access to allow all operations by all principals on all resources over the VPC endpoint.&amp;nbsp; If you want to go with custom services, use the &lt;a href=&quot;https://awspolicygen.s3.us-east-1.amazonaws.com/policygen.html&quot; target=&quot;_blank&quot;&gt;policy creation tool&lt;/a&gt; to generate the custom policy and apply here&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;12.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;(Optional) To add a tag, choose Add new tag and enter the tag key and the tag value&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;13.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Choose Create endpoint&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqKYw0N_4gJBT6YKrGNtScH-CqYSAhesEeRXImEIfQ_tB7S_ZT9uIVBIH1nudsY_m0XDa2hftmyNbZ75o298UybtsXKaIpmONlPRwXwEPXW4FvBd3YV1ccy39ax9WTP9A-jxKmxm4L9oTjZEfPlwY88b6lTrojPHP1iAEphS89cB551o2XOq5SxNuJ/s831/Screenshot%202023-02-24%20at%2012.01.04.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;270&quot; data-original-width=&quot;831&quot; height=&quot;130&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqKYw0N_4gJBT6YKrGNtScH-CqYSAhesEeRXImEIfQ_tB7S_ZT9uIVBIH1nudsY_m0XDa2hftmyNbZ75o298UybtsXKaIpmONlPRwXwEPXW4FvBd3YV1ccy39ax9WTP9A-jxKmxm4L9oTjZEfPlwY88b6lTrojPHP1iAEphS89cB551o2XOq5SxNuJ/w400-h130/Screenshot%202023-02-24%20at%2012.01.04.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;14.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Back to VPC console and check the progress of VPC endpoint creation&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZJc9Okwzn6irfCAUHpuE-DwmReKVXDGeTeGKm9Gp_jEyToicJ-oK9bffWTO_27Rvo9pO11VizKtFdq2uyJozZadU0Z2iFoi_QTQ_Qwrm5pFK8J17mW3gKTiR_O6gcB4lI4afV3rtG9EKIBz8yVeLR89m0I0TX9Ynof4Kb3Aqke6pC-DZZ8HZZxWP/s1590/Screenshot%202023-02-24%20at%2012.02.05.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;362&quot; data-original-width=&quot;1590&quot; height=&quot;91&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZJc9Okwzn6irfCAUHpuE-DwmReKVXDGeTeGKm9Gp_jEyToicJ-oK9bffWTO_27Rvo9pO11VizKtFdq2uyJozZadU0Z2iFoi_QTQ_Qwrm5pFK8J17mW3gKTiR_O6gcB4lI4afV3rtG9EKIBz8yVeLR89m0I0TX9Ynof4Kb3Aqke6pC-DZZ8HZZxWP/w400-h91/Screenshot%202023-02-24%20at%2012.02.05.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;Next, lets setup the Backup Gateway and establish the connection between AWS Connected account and on-premises&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: helvetica; font-size: small;&quot;&gt;CREATING A BACKUP GATEWAY&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;TO CREATE A GATEWAY:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Open the &lt;b&gt;AWS Backup console &lt;/b&gt;at &lt;a href=&quot;https://console.aws.amazon.com/backup&quot;&gt;https://console.aws.amazon.com/backup&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidR2kUR1oTEGQOrT4La98bzP83zPLccHSgx8emcoDqyF0gf8JWCn0hylUOFccHPlRlZZ_e-DFrJlkKHlJmrjn0Q1-wwl7zDnTlE1AzkhzuoyJs0SPLfQ25X-4nsuGmJMMLsW6g3XtbMh88NXyVNhWRVGf3vVx5QbnkibfeGJU5Acf4axD22bWmqQ5F/s1092/Screenshot%202023-02-24%20at%2012.04.16.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;395&quot; data-original-width=&quot;1092&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidR2kUR1oTEGQOrT4La98bzP83zPLccHSgx8emcoDqyF0gf8JWCn0hylUOFccHPlRlZZ_e-DFrJlkKHlJmrjn0Q1-wwl7zDnTlE1AzkhzuoyJs0SPLfQ25X-4nsuGmJMMLsW6g3XtbMh88NXyVNhWRVGf3vVx5QbnkibfeGJU5Acf4axD22bWmqQ5F/w400-h145/Screenshot%202023-02-24%20at%2012.04.16.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In the left navigation pane, under the&lt;b&gt; External resources&lt;/b&gt; section,&lt;b&gt; choose Gateways&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjLoqMIUAUW62G3eV1SLepejMsZ2I9o2rAvFrJSPPNwgyNre226Fjriz0BCfJw1Px_eyEXa24j8JJsUSD6n1dQDno2b3orqz2Imr65Bb-AvejgmP0HDH-Ta8K7tPst-ZEb1pM6HbsoU_Tu4OxLr11YceZX68omuJZ8eXunI55IYb36zRkNLebehFTW/s1146/Screenshot%202023-02-24%20at%2012.04.51.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;617&quot; data-original-width=&quot;1146&quot; height=&quot;215&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjLoqMIUAUW62G3eV1SLepejMsZ2I9o2rAvFrJSPPNwgyNre226Fjriz0BCfJw1Px_eyEXa24j8JJsUSD6n1dQDno2b3orqz2Imr65Bb-AvejgmP0HDH-Ta8K7tPst-ZEb1pM6HbsoU_Tu4OxLr11YceZX68omuJZ8eXunI55IYb36zRkNLebehFTW/w400-h215/Screenshot%202023-02-24%20at%2012.04.51.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Choose &lt;b&gt;Create gateway&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyc2Ato69CQxWxBXkGrW_iCDHgjgqyBy8DjPIvGD9f_JGLpWHaX6Ld6xBkpbzZ3W5TuXZxvcp1orYlR-sJzrgVqEU_O2DCjOwzPqSFKlSV1ylrqLlDYNkvetMsvyz4YYXvKDmcmjsVYTDOoIJsmglnwxgM2WoTXnGXDdOc4q79LhtI3JrXl6CE2Um5/s1205/Screenshot%202023-02-24%20at%2012.06.20.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;655&quot; data-original-width=&quot;1205&quot; height=&quot;217&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyc2Ato69CQxWxBXkGrW_iCDHgjgqyBy8DjPIvGD9f_JGLpWHaX6Ld6xBkpbzZ3W5TuXZxvcp1orYlR-sJzrgVqEU_O2DCjOwzPqSFKlSV1ylrqLlDYNkvetMsvyz4YYXvKDmcmjsVYTDOoIJsmglnwxgM2WoTXnGXDdOc4q79LhtI3JrXl6CE2Um5/w400-h217/Screenshot%202023-02-24%20at%2012.06.20.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Download OVF template&lt;/b&gt; from the create gateway wizard. Follow the instructions on the prompt to deploy the Backup Gateway appliance in SDDC&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYq0sKiAxL0XMq6dC9ZF71D8Ie9wzFTF8zmShZ3vNhmNjoLW4lYSUuR7yzRVasK6anmGMN1IBv8dolJgiPeWQrDJu35KvMo4sHDfz_Evkj6GsixIspVxusiC08BN2qDRpIIuGtZ4hhUeLEnvfLhqIeR2eV_gNgEpZR48Me-YZro3pudA-YMOymzT9q/s852/Screenshot%202023-02-24%20at%2013.00.21.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;704&quot; data-original-width=&quot;852&quot; height=&quot;330&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYq0sKiAxL0XMq6dC9ZF71D8Ie9wzFTF8zmShZ3vNhmNjoLW4lYSUuR7yzRVasK6anmGMN1IBv8dolJgiPeWQrDJu35KvMo4sHDfz_Evkj6GsixIspVxusiC08BN2qDRpIIuGtZ4hhUeLEnvfLhqIeR2eV_gNgEpZR48Me-YZro3pudA-YMOymzT9q/w400-h330/Screenshot%202023-02-24%20at%2013.00.21.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Login to &lt;b&gt;VMware on AWS SDDC console&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;6.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Create a network segment for backups(recommended) and create a group.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;a)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Navigate to &lt;b&gt;Software-Defined Data Centers &lt;/b&gt;(SDDC) and select the SDDC where you have deployed the backup gateway&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;b)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Select &lt;b&gt;Networking &amp;amp; Security &lt;/b&gt;tab&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;c)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In the Networking &amp;amp; Security, under Networks, select “&lt;b&gt;Segments&lt;/b&gt;” and Add Segment&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbrMBPhzmK1HP6gMSmK3T_I8xg6OeiDs7nFBN51uip1L3PjweNdKH7iX_x9mRaQnL5b_bFxdBEFO9x0Dfe1klzeeMEzL1A9X3yHpL0iMTXxdqkR1ZARHjX7G4XkLndgdnMFW5P0Qmpy_dClw8V9ppr4dD3s4-XmkRcD3SL5COzc7wpKRDXrvMmXAAT/s1553/Screenshot%202023-02-24%20at%2012.23.57.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;591&quot; data-original-width=&quot;1553&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbrMBPhzmK1HP6gMSmK3T_I8xg6OeiDs7nFBN51uip1L3PjweNdKH7iX_x9mRaQnL5b_bFxdBEFO9x0Dfe1klzeeMEzL1A9X3yHpL0iMTXxdqkR1ZARHjX7G4XkLndgdnMFW5P0Qmpy_dClw8V9ppr4dD3s4-XmkRcD3SL5COzc7wpKRDXrvMmXAAT/w400-h153/Screenshot%202023-02-24%20at%2012.23.57.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;d)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Specify a segment Type and fill in the required configuration parameters. Set the IP assignment configuration to DHCP to have IPs assigned automatically&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;e)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Click &lt;b&gt;SAVE&lt;/b&gt; to create or update the segment.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;f)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In the Networking &amp;amp; Security, under Inventory – select “&lt;b&gt;Groups&lt;/b&gt;” and navigate to “&lt;b&gt;Management Groups&lt;/b&gt;”&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;g)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Add Group&lt;/b&gt;, provide a name and &lt;b&gt;Set Members &lt;/b&gt;to the CIDR of your backup segment&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVSFP2A9E_RgXV05z4a6aFfeY9IRXe5LKxFfMxEhIiJ2MEqZRFbQKHHYaAP9QEzjVHozO_WvLR34yYpNQ1ru7Pnj1UtMIoM-laVmbNR82ive2p1JHFCt0KA96SgzaixGqwXC0n6-FQXyUkCe4Zbi7vir7hL2aWD3_wlC0EgyeLCxS7Wxdyf2Yn7t3k/s1559/Screenshot%202023-02-24%20at%2012.25.27.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;559&quot; data-original-width=&quot;1559&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVSFP2A9E_RgXV05z4a6aFfeY9IRXe5LKxFfMxEhIiJ2MEqZRFbQKHHYaAP9QEzjVHozO_WvLR34yYpNQ1ru7Pnj1UtMIoM-laVmbNR82ive2p1JHFCt0KA96SgzaixGqwXC0n6-FQXyUkCe4Zbi7vir7hL2aWD3_wlC0EgyeLCxS7Wxdyf2Yn7t3k/w400-h144/Screenshot%202023-02-24%20at%2012.25.27.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;h)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Now navigate back to the &lt;b&gt;Networking &amp;amp; Security&lt;/b&gt;, under Inventory – select “&lt;b&gt;Groups&lt;/b&gt;” and select &lt;b&gt;“Compute Groups&lt;/b&gt;”&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;i)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Add Group&lt;/b&gt;, provide a name and Set Members to the CIDR of your backup segment and your local network IP address/subnet from where you will register backup gateway&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFHGSgFVLBtpFoFDiXiQ8k5p7A9NSuFSqhaudbIp8jtzne9_sTtj7J-VAowvHrQo7snNEhVl06TKNdnCP8B5r-yk1abZGLzu83_g5-TBP_Sgj4Yf3cz9C0EnJ6Gpza8PrmfKM_k48hHyPsCITWdOiyDEkE0FrNoc_AdVT0rmBnNEbxYyqmQTfP1Ly_/s1486/Screenshot%202023-02-24%20at%2012.26.20.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;561&quot; data-original-width=&quot;1486&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFHGSgFVLBtpFoFDiXiQ8k5p7A9NSuFSqhaudbIp8jtzne9_sTtj7J-VAowvHrQo7snNEhVl06TKNdnCP8B5r-yk1abZGLzu83_g5-TBP_Sgj4Yf3cz9C0EnJ6Gpza8PrmfKM_k48hHyPsCITWdOiyDEkE0FrNoc_AdVT0rmBnNEbxYyqmQTfP1Ly_/w400-h151/Screenshot%202023-02-24%20at%2012.26.20.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;7.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Add Management Gateway Firewall Rules&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;On the Networking &amp;amp; Security tab, click &lt;b&gt;Gateway Firewall&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8AG9I4f7jFQC2ow346yws0eXCmIqpQydzG5mB0A2yXhNZ4mvNUSTLTwQKhUAwVp6oorr43DCpgPhQd8jygtHmGxPqHOHkjYvoZk1R49lRiCvywKWnOnfMHBPc0cGsomWORoVx17JQm8PYoS-sQIQcdqjB-v5_AKYacjk_vH31go9QznNUX4bysWx/s1556/Screenshot%202023-02-24%20at%2012.27.33.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;302&quot; data-original-width=&quot;1556&quot; height=&quot;78&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8AG9I4f7jFQC2ow346yws0eXCmIqpQydzG5mB0A2yXhNZ4mvNUSTLTwQKhUAwVp6oorr43DCpgPhQd8jygtHmGxPqHOHkjYvoZk1R49lRiCvywKWnOnfMHBPc0cGsomWORoVx17JQm8PYoS-sQIQcdqjB-v5_AKYacjk_vH31go9QznNUX4bysWx/w400-h78/Screenshot%202023-02-24%20at%2012.27.33.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;On the Gateway Firewall card, click &lt;b&gt;Management Gateway&lt;/b&gt;, then click &lt;b&gt;ADD RULE&lt;/b&gt; and give the new rule a Name&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Enter the parameters for the new rule – the Source should the Group created for backup segment and destination should be the vCenter and the ESXi&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In services drop-down, select &lt;b&gt;Provisioning &amp;amp; Remote Console, HTTPS of&amp;nbsp; ESXi, and HTTPS for the vCenter&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Click &lt;b&gt;PUBLISH&lt;/b&gt; to create the rule&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;8.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Add Compute Gateway Firewall Rules&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;On the &lt;b&gt;Networking &amp;amp; Security&lt;/b&gt; tab, click Gateway Firewall.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;On the Gateway Firewall card, click &lt;b&gt;Compute Gateway&lt;/b&gt;, then click &lt;b&gt;ADD RULE&lt;/b&gt; and give the new rule a Name.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Enter the parameters for the new inbound rule – the Source should be the Group created for your local network IP address/CIDR and destination should be the backup segment group. Allow port 80 and 443.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3Xp9lGyHZ7jZdSRllQpMhkMpcnTwgSc3myCZ9_mgEgMl3xv-6FnJ_fvKTa-xMjJIe2PyzAdG6DnCRi0I4kW4xh8cFtfCjGrejCumiPh73ZDCcByhRlcrFXyjtrDFD4HJfKlDXZOoOcTfRhr8FForlUfXf7lVZXByCBi8puELBGRnZ2hw8p22nQg5i/s1564/Screenshot%202023-02-24%20at%2012.28.17.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;310&quot; data-original-width=&quot;1564&quot; height=&quot;79&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3Xp9lGyHZ7jZdSRllQpMhkMpcnTwgSc3myCZ9_mgEgMl3xv-6FnJ_fvKTa-xMjJIe2PyzAdG6DnCRi0I4kW4xh8cFtfCjGrejCumiPh73ZDCcByhRlcrFXyjtrDFD4HJfKlDXZOoOcTfRhr8FForlUfXf7lVZXByCBi8puELBGRnZ2hw8p22nQg5i/w400-h79/Screenshot%202023-02-24%20at%2012.28.17.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Enter the parameters for the new outbound rule – the Destination can be “Any” (If you want to drill down the outbound traffic, the set the source to be backup segment group and destination to AWS, DNS Server, AWS Support and NTP Server. Allow port TCP 443, UDP 53, TCP 22 and UDP 123.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Click &lt;b&gt;PUBLISH&lt;/b&gt; to create the rule&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;9.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Once the Backup gateway appliance is deployed and powered ON, complete the following steps:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Return to the AWS Console, In the &lt;b&gt;Gateway connection&lt;/b&gt; section, type in the &lt;b&gt;IP address&lt;/b&gt; of the gateway.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;To find this IP address, go to the vSphere Client.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Select your gateway under the Summary tab.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Copy the IP address and paste it in the AWS Backup console text bar&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2QLqsreesqD5qJ5KmT9yAfOjYsQLCHnD37lqsMTG-8IHTxObpaFQRRuba7IQHs8H4zO4V-gf6k0o3AIyLb3JSLyYsljPA5C6CzTON7QRAlSNcaXBI8FsqDRwDor2OC6cY75k22sJEvdQFtCQ6kNgMCvzv-J0a0CQB-Pfxgem-jNSqOidCycuT3_gh/s818/Screenshot%202023-02-24%20at%2012.29.58.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;496&quot; data-original-width=&quot;818&quot; height=&quot;243&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2QLqsreesqD5qJ5KmT9yAfOjYsQLCHnD37lqsMTG-8IHTxObpaFQRRuba7IQHs8H4zO4V-gf6k0o3AIyLb3JSLyYsljPA5C6CzTON7QRAlSNcaXBI8FsqDRwDor2OC6cY75k22sJEvdQFtCQ6kNgMCvzv-J0a0CQB-Pfxgem-jNSqOidCycuT3_gh/w400-h243/Screenshot%202023-02-24%20at%2012.29.58.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;In the &lt;b&gt;Gateway settings&lt;/b&gt; section,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Type in a &lt;b&gt;Gateway name&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Verify the AWS Region. ( choose the right region to avoid cross regional data charges)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Choose Endpoint type as &lt;b&gt;VPC hosted&lt;/b&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Select &lt;b&gt;VPC endpoint ID&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;From the dropdown select the Backup endpoint which we created in the previous task&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOnmczXyM6oPB9CqYE3ke-jLIQNZ7ClprbY5e2gFlC1JKNAUJp-Ut-gqg6REKdRn1ydAnx89i12qrmqRGMc0zd2NXwxa-DuZWU70fmoqkqeqAqiUdotPhKGcobymqIYl9RwLqfyVybJYFnUCEYHCewv-RcfP_2OJjNGrsLrEbZPZvoCrKoRHYuPPmg/s824/Screenshot%202023-02-24%20at%2012.30.22.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;704&quot; data-original-width=&quot;824&quot; height=&quot;341&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOnmczXyM6oPB9CqYE3ke-jLIQNZ7ClprbY5e2gFlC1JKNAUJp-Ut-gqg6REKdRn1ydAnx89i12qrmqRGMc0zd2NXwxa-DuZWU70fmoqkqeqAqiUdotPhKGcobymqIYl9RwLqfyVybJYFnUCEYHCewv-RcfP_2OJjNGrsLrEbZPZvoCrKoRHYuPPmg/w400-h341/Screenshot%202023-02-24%20at%2012.30.22.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;[Optional] In the Gateway tags section, you can assign tags by inputting the key and optional value. To add more than one tag, click Add another tag.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;To complete the process, click &lt;b&gt;Create gateway&lt;/b&gt;, which takes you to the gateway detail page&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;In our next post we see how to add the Hypervisors, backup plan, Backup vaults and Backup rules. Stay tuned.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/5959858381129721181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/5959858381129721181'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2023/02/implement-and-configure-aws-backup-for.html' title='Implement and configure AWS Backup for VMware Cloud on AWS VM workloads'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ERwtV9E8oD-CRelZU53IcQR2TfuT7tMHo_0K0AW7u00g-jM8i2qA1f5D5E8XaAhBdYKRhgu4MOhB0KNom5YeuQBrlc4qYuWsprqs-bcxCJ1k5GNUUKP6qrBHTsjd1KkiiBnrsnNKlcRD39-IvbpHDTlUg3-LTCT8HRT8rz-8xPL4LQ6MXsDlYXXO/s72-w400-h248-c/Screenshot%202023-02-24%20at%2011.55.35.png" height="72" width="72"/><georss:featurename>Amsterdam, Netherlands</georss:featurename><georss:point>52.3675734 4.9041389</georss:point><georss:box>24.057339563821152 -30.2521111 80.677807236178836 40.0603889</georss:box></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-1616996907787277615</id><published>2023-02-24T03:02:00.006+05:30</published><updated>2023-02-24T17:53:42.986+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="NSX"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>AWS Backup for VMware Cloud on AWS workloads - The Design </title><content type='html'>&lt;p&gt;This blog post provides the high level design for implementing the Native AWS Backup to protect the VMware Workloads hosted on VMware Cloud on AWS.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;VMware Cloud on AWS&lt;/h2&gt;&lt;p&gt;&lt;a href=&quot;https://aws.amazon.com/vmware/&quot; target=&quot;_blank&quot;&gt;VMware Cloud on AWS &lt;/a&gt;enables customers to deploy the SDDC and consume vSphere workloads as a managed service on AWS global infrastructure. VMC is a jointly engineered solution by &lt;a href=&quot;https://www.vmware.com/solutions/software-defined-datacenter.html&quot; target=&quot;_blank&quot;&gt;VMware&lt;/a&gt; and AWS that provides customers with a true hybrid cloud experience.&lt;/p&gt;&lt;p&gt;As customers continue to adopt VMware Cloud on AWS, data protection for the VMs and workloads hosted on the VMC SDDC is becoming increasingly important. Customers should also be able to comply with data regulations and manage backup costs effectively.&lt;/p&gt;&lt;p&gt;This post will go over the design considerations and best practices for enabling Native AWS Backup for VMs hosted on VMC SDDC. We&#39;ll go over different architecture design options and use cases that address customer needs.&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;AWS Backup for VMware&lt;/h2&gt;&lt;div&gt;We can centrally protect our VMware workloads hosted on VMC SDDC thanks to AWS Backup support for VMware. &lt;a href=&quot;https://aws.amazon.com/backup/&quot; target=&quot;_blank&quot;&gt;AWS Backup&lt;/a&gt; enables us to demonstrate the status of compliance with our organizational data protection policies by monitoring backup, copy, and restore operations and generating unified auditor-ready reports to help us meet data governance and regulatory requirements.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h2&gt;How does AWS Backup work with VMware SDDC&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;AWS Backup connects to VMware workloads via the AWS Backup gateway, which we will deploy in our VMC SDDC Compute Cluster. AWS Backup gateway discovers VMs via VMware vCenter Server, takes VM snapshots, and manages backup and restore data between AWS Backup and the VMC SDDC. We can assign VMs to your backup policies using tags, VM Resource IDs, or group assignment by VM folder or hypervisor, which centrally govern data protection of VMware VMs with supported AWS Backup services.&amp;nbsp;Following these steps, AWS Backup begins securely backing up VMs into AWS Backup&#39;s storage vaults. You can view your VMware backups in AWS Backup and restore them on-premises, to VMware Cloud on AWS, VMware Cloud on AWS Outposts, Amazon EBS, or Amazon EC2 as needed.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;The detailed deployment steps to be followed &lt;a href=&quot;https://www.myitblog.in/2023/02/implement-and-configure-aws-backup-for.html&quot; target=&quot;_blank&quot;&gt;in the next blog post.&amp;nbsp;&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Deciding the Network path for the Backup traffic&amp;nbsp;&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The great advantage of VMware Cloud on AWS is that it can integrate seamlessly with native AWS services like AWS backup.&amp;nbsp;During the SDDC onboarding process, customers are able to establish high-bandwidth and low-latency connectivity to a designated VPC, which is often referred to as the connected VPC. This connectivity is established using cross-account Elastic Network Interface (ENI) between the NSX Edge appliance in the VMware-managed shadow account and a subnet within the AWS connected VPC in the customer-managed account.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Advantage of ENI&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Virtual machine workloads running on the VMC SDDCs and accessing native services hosted in the connected VPC (AWS Backup) will use the ENIs rather than the VMware Transit Connect, improving operations efficiency and lowering data transfer costs.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Because the VM backup size is large (daily, weekly, and monthly), it is recommended to use ENI to avoid cluttering the network bandwidth of VPN, Direct Connect, VMware Transit Connect, or the Internet path.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;The Architecture&amp;nbsp;&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYGoGGKVwoWi_ELziEtfoSoSZgUd35wIaDJPiYtMYvGvH6SPYVYbsmO6mX9XDwpZ2g_1Xd4FcO4cOINnrOWGitCJvZRyQ9d3ZcdoyQF3aBtO5EVWpl2vbqpi-6SJZjU3zRqFpOH9I6c1pOuxt9Uj5nLsJCqHjVS_fWOEIEYXltb2NsZrekt4T7x4da/s967/JD-Blog-Post.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;435&quot; data-original-width=&quot;967&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYGoGGKVwoWi_ELziEtfoSoSZgUd35wIaDJPiYtMYvGvH6SPYVYbsmO6mX9XDwpZ2g_1Xd4FcO4cOINnrOWGitCJvZRyQ9d3ZcdoyQF3aBtO5EVWpl2vbqpi-6SJZjU3zRqFpOH9I6c1pOuxt9Uj5nLsJCqHjVS_fWOEIEYXltb2NsZrekt4T7x4da/w640-h288/JD-Blog-Post.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The detailed deployment steps to be followed in &lt;a href=&quot;https://www.myitblog.in/2023/02/implement-and-configure-aws-backup-for.html&quot; target=&quot;_blank&quot;&gt;the next blog post.&amp;nbsp;&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/1616996907787277615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/1616996907787277615'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2023/02/aws-backup-for-vmware-cloud-on-aws.html' title='AWS Backup for VMware Cloud on AWS workloads - The Design '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYGoGGKVwoWi_ELziEtfoSoSZgUd35wIaDJPiYtMYvGvH6SPYVYbsmO6mX9XDwpZ2g_1Xd4FcO4cOINnrOWGitCJvZRyQ9d3ZcdoyQF3aBtO5EVWpl2vbqpi-6SJZjU3zRqFpOH9I6c1pOuxt9Uj5nLsJCqHjVS_fWOEIEYXltb2NsZrekt4T7x4da/s72-w640-h288-c/JD-Blog-Post.jpg" height="72" width="72"/><georss:featurename>Amsterdam, Netherlands</georss:featurename><georss:point>52.3675734 4.9041389</georss:point><georss:box>24.057339563821152 -30.2521111 80.677807236178836 40.0603889</georss:box></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-72663585110946293</id><published>2022-11-01T00:51:00.004+05:30</published><updated>2022-12-24T01:07:33.406+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>VMware on AWS Cloud - Moving VMware HCX from VPN to Direct Connect</title><content type='html'>&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;One of my customers are in the journey of migrating the workloads from On-Premise Datacenter to VMware Cloud on AWS. They have a 6 node VMC SDDC brought up and they are connected via a VPN tunnel over the public Internet. They also have HCX deployed on premise with multiple stretched networks and two HCX Service Meshes. &lt;b&gt;&lt;blockquote&gt;The existing service meshes was created over the HCX VPN tunnel for the workload migration. Due to the fact that the customer is now planning for the mass VM migration from On-Premise to VMC, they decided to go with Direct Connect (AWS Direct Connect)&amp;nbsp;&lt;/blockquote&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;In this blog spot, I share the steps we performed.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Architecture:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;We have setup the Direct Connect between On-Prem and AWS Datacenter and the connections are made available in AWS network account. Then created the Transit Virtual interfaces and associated with the Direct connect gateway (&lt;a href=&quot;https://docs.aws.amazon.com/directconnect/latest/UserGuide/direct-connect-gateways-intro.html&quot; target=&quot;_blank&quot;&gt;detailed steps here&lt;/a&gt;). Then attach the Direct Connect Gateway to an SDDC group &lt;a href=&quot;https://docs.vmware.com/en/VMware-Cloud-on-AWS/services/com.vmware.vmc-aws-operations/GUID-DCE28EB0-D31F-46A0-A459-9095766169EE.html&quot; target=&quot;_blank&quot;&gt;steps here.&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;The high-level architecture looks like:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjCZlCf5RN18i7oXQrf4quUVSyi_FzRfGijGb6WzLcM2gF0WMRpNQIjKPuAg4DlsD3FUr8UwmZZ0l5IBuDZI-Us12qglpnoPGTBq7QBlyKdBWvOfaJCt9t-pJr9iOcL7wuyA2Iw_BQtpkCTffoFbUAMZAx8aEpzUihoFOLHV-fWpwWu9GR7ndAuY-Ms&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;438&quot; data-original-width=&quot;936&quot; height=&quot;301&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjCZlCf5RN18i7oXQrf4quUVSyi_FzRfGijGb6WzLcM2gF0WMRpNQIjKPuAg4DlsD3FUr8UwmZZ0l5IBuDZI-Us12qglpnoPGTBq7QBlyKdBWvOfaJCt9t-pJr9iOcL7wuyA2Iw_BQtpkCTffoFbUAMZAx8aEpzUihoFOLHV-fWpwWu9GR7ndAuY-Ms=w640-h301&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Step 1: (Configuration in AWS Network account)&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Once the links from network backbone is setup, the links becomes visible In the AWS network account as below&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgWIhHnhLIDzb6Pu3c4viXMNH_TOpgeun3b08b2Qmdx7C423BvFMoDoluvFievt8sOUSbxBh3JMDGdDvt7UDtD7xw_BgKkJqkyB2iZXzvXUbr2HB265lAUVxxWUcprvvwKFGU6QuV-Zd8Tj-Al8QE-I8ZJPNVIczjF5LX9oFsafmVo8Auz0KgsuQTKA&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;230&quot; data-original-width=&quot;904&quot; height=&quot;162&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgWIhHnhLIDzb6Pu3c4viXMNH_TOpgeun3b08b2Qmdx7C423BvFMoDoluvFievt8sOUSbxBh3JMDGdDvt7UDtD7xw_BgKkJqkyB2iZXzvXUbr2HB265lAUVxxWUcprvvwKFGU6QuV-Zd8Tj-Al8QE-I8ZJPNVIczjF5LX9oFsafmVo8Auz0KgsuQTKA=w640-h162&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;Step 2: (Configuration in VMC Console)&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Now the VMC should attach the VIF to the AWS Direct connect gateway using the Private. Once the links are up the status of the Direct connect shows as below.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Make sure the direct connect is Connected to VMC SDDC group as shown in the picture below&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgafkWT6XVTWwcLEjeCNLiedioH5LWqgDrrY2kt0Ih1dMc2DZ44FFzg1poEgnmoQcOrQWzrXFEMKphiYON1CH3HtDGSv4JOH8ClKMBkHd6YIN8Jo4sqLVsmEaEP0GaYS6g7PCIQS8patosEOqNiFCrVUwRkvCQ81Lui5vlX9ffkjjh7tGi0D6OC0NU3&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;428&quot; data-original-width=&quot;904&quot; height=&quot;304&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgafkWT6XVTWwcLEjeCNLiedioH5LWqgDrrY2kt0Ih1dMc2DZ44FFzg1poEgnmoQcOrQWzrXFEMKphiYON1CH3HtDGSv4JOH8ClKMBkHd6YIN8Jo4sqLVsmEaEP0GaYS6g7PCIQS8patosEOqNiFCrVUwRkvCQ81Lui5vlX9ffkjjh7tGi0D6OC0NU3=w640-h304&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Post establishing the Direct Connection from On-premise to VMC, the next step to create the Service mesh over the newly created DX links.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Step 3: (Configuration in VMware HCX)&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Pre-requisites and health check:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;1. In the VMC SDDC - Direct connect tab, make sure the routes are advertised for vSphere management, vCenter and the HCX management network segments.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;2. Update the management firewall rules in VMC SDDC to have the new Direct Connect segments (previously it has the network segments for VPN Connection)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;3. Test the connectivity (ping) from VMC SDDC to the on-premise vcenter segments that is being advertised over the Direct Connect to verify the on-premise vSphere management can communicate with VMC SDDC Management appliances&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;4. Now the connections are up and ensure there are no live migrations or replications are in progress in HCX.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;5. Change the HCX FQDN Resolution address&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Log in to VMware Cloud Services at &lt;b&gt;https://vmc.vmware.com.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Click &lt;b&gt;Inventory&lt;/b&gt; &amp;gt; &lt;b&gt;SDDCs&lt;/b&gt;, then pick an SDDC card and click &lt;b&gt;VIEW DETAILS&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Navigate to the &lt;b&gt;Settings&lt;/b&gt; tab of your SDDC.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Expand &lt;b&gt;HCX FQDN&lt;/b&gt;, and click &lt;b&gt;Edit&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Under &lt;b&gt;Resolution Address&lt;/b&gt; select the &lt;b&gt;Private IP address &lt;/b&gt;( new after DX setup) and click &lt;b&gt;SAVE&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;6. Verify HCX Connector &amp;amp; HCX Cloud pairing is healthy. The existing HCX site pairing should work without any issues. If not, we need ot update the site pairing.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;7.Create the Direct Connect Network Profile in VMware HCX in VMC.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;1. Navigate to the SDDC tab and login using the cloudadmin@vmc.local user or login with the enterprise admin credentials.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;2. Navigate to the Infrastructure and Interconnect then the Network profiles&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;3. Create a new DirectConnectNetwork network profile&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;4. Add the IP range, prefix length, and gateway to the network profile and click SAVE. (this is the new IP range for the Direct Connect setup and it should be unique without any overlaps in VMC or On-prem)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;5. Check back that the new network segment is advertised over the Direct connect in VMC SDDC Console -&amp;gt;Networking &amp;amp; Security-&amp;gt;System-&amp;gt;Direct Connect.  The subnet should be visible under Advertised BGP Routes.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;6. Update the on-premise firewalls are allowing the new HCX IP Range to communicate with the vSphere Management network on premise.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;8. Redeploy HCX Service Mesh from on premise HCX Connector Manager&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0 0 0 40px; padding: 0px;&quot;&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;9.Update new compute firewall rules in VMC SDDC to referred to the prior VPN connection to the Direct Connect.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Important notes:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Make sure there are no ongoing replications or migrations in the HCX.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Make sure no networks are extended over the Service mesh which we are updating&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Redeploy the service mesh on-prem as needed&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;Let me know if you need detailed steps.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: georgia; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/72663585110946293'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/72663585110946293'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2022/11/vmware-on-aws-cloud-moving-vmware-hcx.html' title='VMware on AWS Cloud - Moving VMware HCX from VPN to Direct Connect'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjCZlCf5RN18i7oXQrf4quUVSyi_FzRfGijGb6WzLcM2gF0WMRpNQIjKPuAg4DlsD3FUr8UwmZZ0l5IBuDZI-Us12qglpnoPGTBq7QBlyKdBWvOfaJCt9t-pJr9iOcL7wuyA2Iw_BQtpkCTffoFbUAMZAx8aEpzUihoFOLHV-fWpwWu9GR7ndAuY-Ms=s72-w640-h301-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-8985030041289026650</id><published>2022-09-01T17:16:00.003+05:30</published><updated>2022-12-15T21:03:53.979+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><title type='text'>Extend your datacenter with Confidence using VMware Cloud on AWS (Part-1)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPihzhONdJlBVGlAcVZg0yORE5JxG0JT_KPfGB1lgydgDN0e0Hxphb2IF1QSiwVSUopA6EvNJO9LWielawJVfu3VXi8V9JOiShWClWeWRYYOL5fGNJf5mNDAIcwl3wrwDXZP9NZureWYdCDpGJq10wYDFkV65bY_eAHIeqj4MPB5-Nyp_awtYH0_M/s1200/VMware-Cloud-on-AWS-dark.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;1200&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPihzhONdJlBVGlAcVZg0yORE5JxG0JT_KPfGB1lgydgDN0e0Hxphb2IF1QSiwVSUopA6EvNJO9LWielawJVfu3VXi8V9JOiShWClWeWRYYOL5fGNJf5mNDAIcwl3wrwDXZP9NZureWYdCDpGJq10wYDFkV65bY_eAHIeqj4MPB5-Nyp_awtYH0_M/w640-h320/VMware-Cloud-on-AWS-dark.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;As per Gartner, 100 percent of Fortune 500 and Fortune Global 100 companies use &lt;a href=&quot;https://www.vmware.com/cloud-solutions.html&quot; target=&quot;_blank&quot;&gt;VMware&lt;/a&gt;, and more than 500,000 customers have saved billions of dollars worldwide. Approximately 85 percent of all virtualized applications run on VMware.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Many companies still rely on their own data centers and manage their IT infrastructure with long-standing, proven solutions from VMware. But many would also like to benefit from the advantages of a public cloud solution, such as high scalability, reliability, and flexible costs. This is made possible with &lt;a href=&quot;https://aws.amazon.com/vmware/&quot; target=&quot;_blank&quot;&gt;VMware Cloud on AWS&lt;/a&gt;. It enables companies to bring their vSphere-based workloads into the public cloud and combine them with modern services from AWS, such as S3 object storage or an RDS database service, if required.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Why move to Cloud:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Common scenarios include&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Company strategy to implement cloud-first mandates&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Aging infrastructure or major hardware refreshes&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Expiring contracts or co-location lease expiration&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;span&gt;4.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;Accelerate migrations&amp;nbsp;&lt;/span&gt;&lt;span&gt;with operational&amp;nbsp;&lt;/span&gt;&lt;span&gt;consistency and flexibility&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;span&gt;5.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;Reduce costs while&amp;nbsp;&lt;/span&gt;&lt;span&gt;scaling global&amp;nbsp;&lt;/span&gt;&lt;span&gt;business demand&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;span&gt;6.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span&gt;Modernize workloads and&amp;nbsp;&lt;/span&gt;&lt;span&gt;increase innovation with&amp;nbsp;&lt;/span&gt;&lt;span&gt;cloud-native services&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;There are also those who prefer to use the overhead devoted to managing datacenters to focus on building applications. According to a recent survey, on average, 40% of server hardware is over three years old — and respondents whose entire service fleet is three-plus years old say they have higher costs and slower time-to-market as a result.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;What customer Say:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;blockquote&gt;&amp;nbsp;&quot;Rather than datacenters, we are moving toward centers of data, placed and optimized to provide the most business value. This also expands the role and responsibilities of central IT to one of a business enabler, rather than a purveyor of equipment and software. &quot;&lt;/blockquote&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;What is VMware Cloud on AWS:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;a href=&quot;https://aws.amazon.com/vmware/&quot; target=&quot;_blank&quot;&gt;VMware Cloud on AWS&lt;/a&gt; brings VMware’s enterprise-class SDDC software to the AWS Cloud with optimized access to native AWS services. VMC is an innovative service built on a joint engineering relationship between AWS and VMware powered by VMware Cloud Foundation, VMware Cloud on AWS integrates VMware&#39;s compute, storage, and network virtualization products (VMware vSphere, VMware vSAN, and VMware NSX) along with VMware vCenter Server management, optimized to run on dedicated, elastic, bare-metal AWS infrastructure and continue innovating your business.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Why customer should use VMware Cloud on AWS?&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;AWS is VMware&#39;s preferred public cloud partner for all vSphere-based workloads. VMware Cloud on AWS provides customers with consistent and interoperable infrastructure and services between VMware-based datacenters and the AWS cloud, which minimizes the complexity and associated risks of managing diverse environments.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Customer is already pursuing a cloud strategy&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Expand the VMware environment into the cloud&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;VMware Cloud on AWS seamlessly moves the traditional workloads into VMware Cloud on AWS&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Customer can continue to use VMware technology that is proven in the On-premise environment&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Park the VMware based workloads in the Cloud and plan for the modernization at the pace with which the company can adapt&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;br /&gt;You set the pace: modernize VMware workloads in simple steps&lt;/span&gt;&lt;/h3&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Lift &amp;amp; shift: Migrate your VMware workloads to the AWS Cloud. &lt;span style=&quot;font-weight: normal;&quot;&gt;This allows you to continue operations seamlessly without changing or adjusting workloads.&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Enhance: &lt;span style=&quot;font-weight: normal;&quot;&gt;Add &amp;gt;150 native AWS services such as S3 object storage or the RDS database service to existing workloads.&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;Refactor: &lt;span style=&quot;font-weight: normal;&quot;&gt;Completely transform your traditional applications on AWS into native cloud solutions. Do so according to your needs and at your own pace.&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: arial; font-size: medium;&quot;&gt;To be continued … part 2 – Migration strategy&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8985030041289026650'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8985030041289026650'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2022/09/extend-your-datacenter-with-confidence.html' title='Extend your datacenter with Confidence using VMware Cloud on AWS (Part-1)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPihzhONdJlBVGlAcVZg0yORE5JxG0JT_KPfGB1lgydgDN0e0Hxphb2IF1QSiwVSUopA6EvNJO9LWielawJVfu3VXi8V9JOiShWClWeWRYYOL5fGNJf5mNDAIcwl3wrwDXZP9NZureWYdCDpGJq10wYDFkV65bY_eAHIeqj4MPB5-Nyp_awtYH0_M/s72-w640-h320-c/VMware-Cloud-on-AWS-dark.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-4956967425117397137</id><published>2021-04-01T14:08:00.002+05:30</published><updated>2021-08-19T19:12:08.529+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Onboarding experience of VMware ON AWS  in Production Environment-Part2</title><content type='html'>&lt;h3 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;VMware ON AWS Deployment - Requirements.&amp;nbsp;&lt;/h3&gt;&lt;p&gt;As mentioned in the previous post , when we are set with the project objective, we need to prepare the items mentioned in the VMC deployment checklist. Some of the basic requirements are,&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;The AWS account details&lt;/u&gt;&lt;/b&gt; - When we deploy our SDDC on VMware Cloud on AWS, it is created within an AWS account and a VPC dedicated to your organisation and managed by VMware. We must also connect the SDDC to an AWS account belonging to us, called the customer AWS account . This connection allows our SDDC to access AWS services belonging to our org&amp;nbsp; account.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;SDDC Management subnets&lt;/u&gt;&lt;/b&gt; - This is the most critical part of the deployment. Choosing the right network for SDDC and connect back to ON-Premise network (check with network team to make sure you provide unique range of CIDR, ASN etc to avoid conflicts)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Connectivity to On-Premise DC and VMC&lt;/u&gt;&lt;/b&gt; - There are different ways to connect to the On-Prem DC, using IPsec VPN, AWS Direct Connect, Hybrid Cloud Extension (HCX) /HCX Connector, or custom MPLS, network backend connections. ( example AT &amp;amp;T Netbond)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Region &lt;/u&gt;&lt;/b&gt;where we deploy the VMC SDDC stack ( we need to choose from AWS Regions)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Cluster type&lt;/u&gt;&lt;/b&gt; - We have an option to choose either Stretched or non-Stretched Cluster&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Number of hosts&lt;/u&gt;&lt;/b&gt; do we need in the SDDC cluster ( remember we can start from 1 host but the recommended settings for production cluster is minimum of 3 nodes )&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Getting Started with Deployment:&amp;nbsp;&lt;/h4&gt;&lt;div&gt;Once we have the AWS account details ready, we need to provide that to the VMware backend team to provide us with the subscription. These subscriptions are mapped to our AWS account and ENI&#39;s to be attached at the later stage of this deployment&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Once we have a &quot;Welcome&quot; email from VMware, we are ready to go with the deployment. Login to VMC console and click on &quot;Create SDDC&quot; and provide the details as captured in the deployment checklist.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The SDDC Stack deployment is fully automated and the creation of Datacenter, Cluster, addition of nodes, creation and configuration of vSAN datastore, deployment of NSX Components, etc are fully automatic.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The wait of approx 2 hours would results us with the fully working setup.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Post deployment Steps:&amp;nbsp;&lt;/h4&gt;&lt;div&gt;Once the deployment is successful login to vmc.vmware.com console to perform the next steps.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;1. The landing page : In this page, we can check the summary of our deployed SDDC components, region where we deployed the stack, etc.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo_KR1Tw3lG_DRj4NxyNazFIo77cTtiCgJvK0MLhAlRBHTPni_33lPPI2M8MEMFUc3eB1JvaGGWkXO_MIubS9AMBxXBTvKHjv2LIsfTSU9jaI01aRjpMY11-H58b3_YSFNcHutmZ8w0Uc/s1129/vmc-3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;667&quot; data-original-width=&quot;1129&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo_KR1Tw3lG_DRj4NxyNazFIo77cTtiCgJvK0MLhAlRBHTPni_33lPPI2M8MEMFUc3eB1JvaGGWkXO_MIubS9AMBxXBTvKHjv2LIsfTSU9jaI01aRjpMY11-H58b3_YSFNcHutmZ8w0Uc/w400-h236/vmc-3.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;2. Click on View details to review the connectivity details and configuration page. Note: The connection to on-premise is not yet done - we need to perform additional steps which we cover in the following sections of the blog post.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip5aVrBacDedMXlsuJrw54HApckk2aYtJMn38aJeNzPVt6z-K3J9e_BuLDCN4gK9SfLPhFsYe7jz69qpzKlvdRv3L4PTYCX2kf-g_F2PT9OMP87asSjWznvuu44z5vuVgOGK05P8tiKGk/s1760/vmc-4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;863&quot; data-original-width=&quot;1760&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip5aVrBacDedMXlsuJrw54HApckk2aYtJMn38aJeNzPVt6z-K3J9e_BuLDCN4gK9SfLPhFsYe7jz69qpzKlvdRv3L4PTYCX2kf-g_F2PT9OMP87asSjWznvuu44z5vuVgOGK05P8tiKGk/w400-h196/vmc-4.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;3. VMC Network diagram :&amp;nbsp;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;i&gt;&lt;span style=&quot;background-color: white; color: #3d3d3d; font-family: &amp;quot;Merriweather Sans&amp;quot;, sans-serif; font-size: 17px;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;background-color: white; color: #3d3d3d; font-family: &amp;quot;Merriweather Sans&amp;quot;, sans-serif;&quot;&gt;Below is a more detailed view of how NSX is deployed within VMware Cloud on AWS (diagram courtesy of&amp;nbsp;&lt;/span&gt;&lt;a aria-label=&quot;Gilles Chekroun (opens in a new tab)&quot; href=&quot;http://gilles.cloud/&quot; rel=&quot;noreferrer noopener&quot; style=&quot;background-color: white; border: 0px; box-sizing: inherit; color: #f24444; font-family: &amp;quot;Merriweather Sans&amp;quot;, sans-serif; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Gilles Chekroun&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #3d3d3d; font-family: &amp;quot;Merriweather Sans&amp;quot;, sans-serif;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtLHoEAGuOQctZDoyS9PzRRyJr9JEPD8q7GKBSalVQ8yJRvjivMXjpiO1ZqRbJvObVPGjlWAR4i0rGenx02TfVCFiI7BpBOGDqD2IzeU5KZ-EO665nKmMX9d6Df3zPjnScoiW7cJrTzvE/s2048/vmc-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1074&quot; data-original-width=&quot;2048&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtLHoEAGuOQctZDoyS9PzRRyJr9JEPD8q7GKBSalVQ8yJRvjivMXjpiO1ZqRbJvObVPGjlWAR4i0rGenx02TfVCFiI7BpBOGDqD2IzeU5KZ-EO665nKmMX9d6Df3zPjnScoiW7cJrTzvE/w640-h336/vmc-2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;We will see how to connect to ON-Premise datacenter from our VMC setup in our next blog post&amp;nbsp;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4956967425117397137'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/4956967425117397137'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2021/04/onboarding-experience-of-vmware-on-aws.html' title='Onboarding experience of VMware ON AWS  in Production Environment-Part2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo_KR1Tw3lG_DRj4NxyNazFIo77cTtiCgJvK0MLhAlRBHTPni_33lPPI2M8MEMFUc3eB1JvaGGWkXO_MIubS9AMBxXBTvKHjv2LIsfTSU9jaI01aRjpMY11-H58b3_YSFNcHutmZ8w0Uc/s72-w400-h236-c/vmc-3.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-7321798552240652453</id><published>2021-03-01T14:56:00.006+05:30</published><updated>2021-08-19T19:14:09.841+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Onboarding experience of VMware ON AWS  in Production Environment - Part1</title><content type='html'>&lt;p&gt;I hope you and your loved ones are safe and healthy&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;During this pandemic time, I have got a chance to onboard the VMware ON AWS to another location of our business. In this blog series I will share my experience and few tips about VMware ON AWS (VMC). This is purely my view and the intention are to spread the views to the community. If you have any issues, comments, feedback kindly share via email. Let’s get straight to the topic.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Why VMC:&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Before we go choose to proceed with VMC, we need to understand and convince ourselves on below items,&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Where do we fit this VMC in our existing infrastructure?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How could VMC bring in a value to our business&amp;nbsp;&lt;/li&gt;&lt;li&gt;What workloads or solutions do we plan to run in this VMC?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Do we have a DR requirement? If yes, do we have an existing setup to migrate to VMC or its going to be a new DR setup?&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Like this you might have to ask few questions which you might need to address it. When we have a problem statement and the solution, we are ready to proceed.&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;What are ideal use cases of VMC?&amp;nbsp;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Since many (or almost all Fortune 500 companies) are running VMware solutions in their traditional Centre, they are most likely using or considering a move to VMware Cloud on AWS. The reason could be that they have spent a decade or more securing, hardening and operation in VMware virtual datacenter environments.&amp;nbsp; The business might look to have flatten the learning curve associated with moving to the public cloud and leverage existing skills to reduce operational overhead and expedite cloud adoptions. VMC eases that transition to public cloud by providing consistency between on-premises VMware and VMC environments. By not changing hypervisors, workload portability is easy. VMC also takes advantage of native AWS services’ power while allowing the use of existing and new apps within the VMware construct.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;So, the use cases are,&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Cloud Migration&amp;nbsp;&lt;/li&gt;&lt;li&gt;Datacenter extension&amp;nbsp;&lt;/li&gt;&lt;li&gt;Disaster recovery&amp;nbsp;&lt;/li&gt;&lt;li&gt;AWS integrated apps&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBNwcR3wQfy31nrofIWp4EcoZYud3SFTTYun-wq6R5WzDaOVOOPq8AYcff8cgbiu4IiLkbPqoNNZJG-AlsMzbUuJz-30jKGyjBaUdYsJRbO5fZw2Zf-RuK5W5AlFZrPCef7BMxBMBScHk/s1181/vmc-p1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;638&quot; data-original-width=&quot;1181&quot; height=&quot;346&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBNwcR3wQfy31nrofIWp4EcoZYud3SFTTYun-wq6R5WzDaOVOOPq8AYcff8cgbiu4IiLkbPqoNNZJG-AlsMzbUuJz-30jKGyjBaUdYsJRbO5fZw2Zf-RuK5W5AlFZrPCef7BMxBMBScHk/w640-h346/vmc-p1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Onboarding process:&amp;nbsp;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;VMC has a very good sales team just like any other product within VMware and these professionals reached out to me pitching this solution. Since I already had experience working with this product, it was easy for me to decide and justify the business value, use case to my management. We started the project.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;As a first step, the VMC team provides you with the checklist. In my view, we need to pay attention to the below important key-items for a successful project execution and deliver on time.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;i&gt;Read more &lt;a href=&quot;https://www.myitblog.in/2021/04/onboarding-experience-of-vmware-on-aws.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;in next blog post (Link)&amp;nbsp;&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7321798552240652453'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7321798552240652453'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2021/08/onboarding-experience-of-vmware-on-aws.html' title='Onboarding experience of VMware ON AWS  in Production Environment - Part1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBNwcR3wQfy31nrofIWp4EcoZYud3SFTTYun-wq6R5WzDaOVOOPq8AYcff8cgbiu4IiLkbPqoNNZJG-AlsMzbUuJz-30jKGyjBaUdYsJRbO5fZw2Zf-RuK5W5AlFZrPCef7BMxBMBScHk/s72-w640-h346-c/vmc-p1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-7229110000550513310</id><published>2019-11-26T18:57:00.001+05:30</published><updated>2019-11-26T19:01:07.067+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="Orchestrator"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Automated deployment of Virtual Container Host (VCH) using vRealize Automation (vRA) </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
In our &lt;a href=&quot;https://www.myitblog.in/2019/11/the-role-of-vmware-integrated.html&quot; target=&quot;_blank&quot;&gt;previous posts&lt;/a&gt;, we saw the option to deploy the VCH using CLI utility, vSphere client etc. In this post, we see an option to automate the &lt;a href=&quot;https://www.myitblog.in/2019/09/how-can-vmware-integrated-containers-be.html&quot; target=&quot;_blank&quot;&gt;VCH deployment &lt;/a&gt;using vRealize Automation ( vRA)&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
Background:&amp;nbsp;&lt;/h4&gt;
The current automated world requires the seamless and fastest deployment of its infrastructure. VMware vSphere Integrated Containers gives developers an essential tool for streamlining the process of building and running containerized applications in production.&amp;nbsp; The deployment of VCH is done through various methods as we see in our previous posts. But in this post, we are going to see how to automate the VCH deployment and the first VCH in few mouse clicks. By using the service catalog in vRealize Automation to provision Virtual Container Hosts on-demand as a ticketless offer, you can make your developers self-sufficient.&lt;br /&gt;
&lt;br /&gt;
The vRealize Automation 7.4 and later versions support provisioning and management of Virtual Container Hosts(VCH) for running &lt;a href=&quot;https://www.myitblog.in/2019/09/how-can-vmware-integrated-containers-be.html&quot; target=&quot;_blank&quot;&gt;vSphere Integrated Containers&lt;/a&gt; (VIC).&amp;nbsp; Here below are the step-by-step procedure on how to use the XaaS blueprint in vRealize Automation to create a fast, self-service offering of Virtual Container Hosts while ensuring compliance with business policies.&lt;br /&gt;
&lt;br /&gt;
Step 1: Download the &quot;&lt;a href=&quot;https://github.com/rdjagadeesh/vic_homelab/blob/master/deploy-VCH-through-vRA/XaaS-blueprint-to-deploy-a-Virtual-Container-Host.zip&quot; target=&quot;_blank&quot;&gt;XaaS-blueprint-to-deploy-a-Virtual-Container-Host.zip&quot;&lt;/a&gt; package from the link&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 2: Extract the package&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUBFYc81Kv3GvbvGLdSLDbfyHZZ16Qk3MK4Dj-i613W9H3ztiR7DU7Sf-6dC6gNVdld_uA6UZggmEY-ra_MWxkC3ypVSneOt8ifRpAlS7a2N1HSz3FUyFbWqJLsAFZ02S5DhpMomkMfTc/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;279&quot; data-original-width=&quot;718&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUBFYc81Kv3GvbvGLdSLDbfyHZZ16Qk3MK4Dj-i613W9H3ztiR7DU7Sf-6dC6gNVdld_uA6UZggmEY-ra_MWxkC3ypVSneOt8ifRpAlS7a2N1HSz3FUyFbWqJLsAFZ02S5DhpMomkMfTc/s640/1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
Step 3: Login to the Orchestrator and you land in the page&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zoL5uLn6IvVdATn2-zBI299jk1TKHuBIXw7qCLXjgsNp_3dQ6_e3Og0zGy1d5UIcNrjmOaH1A8ebN6IxeI_SGCgScNX134Vdmj_YG6lb6biskB485LkA6tHpii6GB_XwE0AeZFLgwUs/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;566&quot; data-original-width=&quot;1600&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zoL5uLn6IvVdATn2-zBI299jk1TKHuBIXw7qCLXjgsNp_3dQ6_e3Og0zGy1d5UIcNrjmOaH1A8ebN6IxeI_SGCgScNX134Vdmj_YG6lb6biskB485LkA6tHpii6GB_XwE0AeZFLgwUs/s640/2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 4: Click on &quot;Import&amp;nbsp; package&quot; tab and choose the downloaded file &quot;com.vmware.vra.vic.package&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcGJ1A7Bb6JB2uqeCa08lreHJ1BcyyHcoIvo0RA20aGelBDPMDpsNs-ynbdRwB9PyUiZVPNkGpFmBkH5SMbZqX79V-xQQiS-xQ4SNx14EhbYoWuHHLhuELpLevMLFQcGtwDd3Faah5ryw/s1600/3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;490&quot; data-original-width=&quot;845&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcGJ1A7Bb6JB2uqeCa08lreHJ1BcyyHcoIvo0RA20aGelBDPMDpsNs-ynbdRwB9PyUiZVPNkGpFmBkH5SMbZqX79V-xQQiS-xQ4SNx14EhbYoWuHHLhuELpLevMLFQcGtwDd3Faah5ryw/s640/3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIbuTPEw9P6Ge8JuQHEoyP6YC-Q9dXViVt5dXcRRPiupDWKx_ohi-Glb1s6jDV76VcXb4R3MwRAeIo29QijZEKF8xtpQP0ns1aSHbf6WznI18z2I-8J7KP3WLFc2v5lP6gFBb3uJgtZds/s1600/4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;489&quot; data-original-width=&quot;784&quot; height=&quot;398&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIbuTPEw9P6Ge8JuQHEoyP6YC-Q9dXViVt5dXcRRPiupDWKx_ohi-Glb1s6jDV76VcXb4R3MwRAeIo29QijZEKF8xtpQP0ns1aSHbf6WznI18z2I-8J7KP3WLFc2v5lP6gFBb3uJgtZds/s640/4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 5:&amp;nbsp; You get the signature verification window. Choose one &quot;&lt;i&gt;Import once or Import and trust provider&lt;/i&gt;&quot; and proceed&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwt47_-iKczOXPOc5McJEkGJZXwsPm-Dlhrnbgz1sBDaJ-_XyDD6SqAGbdfNzYV4zhJ2tyiP55_OSG1KHBW4HzMRgwmBtb-Y0gaKb1Tb00ZhUCVe5ywI_eMFivIjUhA2lX7ZsLE9jR874/s1600/5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;529&quot; data-original-width=&quot;786&quot; height=&quot;430&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwt47_-iKczOXPOc5McJEkGJZXwsPm-Dlhrnbgz1sBDaJ-_XyDD6SqAGbdfNzYV4zhJ2tyiP55_OSG1KHBW4HzMRgwmBtb-Y0gaKb1Tb00ZhUCVe5ywI_eMFivIjUhA2lX7ZsLE9jR874/s640/5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 6: In this step, you get the configuration summary and the items which are imported as part of the package&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdxsPLr5hgn-fD4QTEbrL1EnvF7d8HFxrMH_bW9m7W8yIupfTbpRFDfNKOVOPHZbXe1dherw13sH-LYZU3JCvuSs6KcGbSQSK7Vmfb-TS2KQYCkC4tSkOK6W9hDgG_9ANTPjWg9QtIaKE/s1600/6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;488&quot; data-original-width=&quot;810&quot; height=&quot;384&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdxsPLr5hgn-fD4QTEbrL1EnvF7d8HFxrMH_bW9m7W8yIupfTbpRFDfNKOVOPHZbXe1dherw13sH-LYZU3JCvuSs6KcGbSQSK7Vmfb-TS2KQYCkC4tSkOK6W9hDgG_9ANTPjWg9QtIaKE/s640/6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 7: Click Import selected elements and you should see the progress bar&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpTC5jfF9zpXwulWQcY9aSqwyLVZ9Z0ExzOPLOP-jXNXmiHY_z3J2VJSBV8kPT6wZwN50c0Q54G1IDwrBu6Swj0QaD76GGmNVJCptdlr1u22BA3cWLoI1HW58qi41LlVM-gZyWf-GXlbA/s1600/7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;227&quot; data-original-width=&quot;599&quot; height=&quot;242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpTC5jfF9zpXwulWQcY9aSqwyLVZ9Z0ExzOPLOP-jXNXmiHY_z3J2VJSBV8kPT6wZwN50c0Q54G1IDwrBu6Swj0QaD76GGmNVJCptdlr1u22BA3cWLoI1HW58qi41LlVM-gZyWf-GXlbA/s640/7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR-ZmfQMjv5YDIpEsqCR0V58V0Qcusvbk0aztR2gu-Up-_boVOGoSmBJ1DtE36R9YmFHFFJbkhOxL10cn8COhiQVsvPHZtafRcCVYnEj4mx9yz_V6jED6jccYOngYv-vMwacQBhGhRf6M/s1600/8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;503&quot; data-original-width=&quot;896&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR-ZmfQMjv5YDIpEsqCR0V58V0Qcusvbk0aztR2gu-Up-_boVOGoSmBJ1DtE36R9YmFHFFJbkhOxL10cn8COhiQVsvPHZtafRcCVYnEj4mx9yz_V6jED6jccYOngYv-vMwacQBhGhRf6M/s640/8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 8:&amp;nbsp; Once imported successfully, we should see the package and its workflows in the inventory. Go to the workflows tab and verify that you see the workflows as below.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFXO_GuTb8vhnfbeHf1nOc5XFq-vy98kzqVCGx52z16RNt6a-37Dvc6oI4nshzN-r3RkrGBp9Av1Rv_LPBie-tkGxGnXn6fSnCjVDDqaBRVoI5JSkzzBYHt758NUHPUhXYu97y8GCTwjY/s1600/9.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;543&quot; data-original-width=&quot;843&quot; height=&quot;412&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFXO_GuTb8vhnfbeHf1nOc5XFq-vy98kzqVCGx52z16RNt6a-37Dvc6oI4nshzN-r3RkrGBp9Av1Rv_LPBie-tkGxGnXn6fSnCjVDDqaBRVoI5JSkzzBYHt758NUHPUhXYu97y8GCTwjY/s640/9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;Step 9: Go to the Configurations tab and select the configuration element found under the path –&amp;nbsp; VMware-&amp;gt;VIC Deploy-&amp;gt;vRealize Automation-&amp;gt;Targets&lt;br /&gt;
&lt;br /&gt;
Edit the element as per your environment settings. You can change the name of the element too matching the syntax. &lt;a href=&quot;https://www.myitblog.in/2019/11/the-role-of-vmware-integrated.html&quot; target=&quot;_blank&quot;&gt;(Syntax Reference)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Note – If you are using multiple clusters in your environment then you need to add an additional attribute named ‘compute-resource’ and the name of the cluster as its value&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiSMM9jC0cNgrDrzFhx-Ulphfrx3UDb5w8N1yF5ez826MsgCWwQgCMQjVypV0iPFqaGBHzoij6GD_pdI_e8REOf7xmAELb8s8mwlMcQffQSQPa0Y1iC_1S12l-0JB6r-NQWtQvA8sFefA/s1600/111.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;616&quot; data-original-width=&quot;1389&quot; height=&quot;282&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiSMM9jC0cNgrDrzFhx-Ulphfrx3UDb5w8N1yF5ez826MsgCWwQgCMQjVypV0iPFqaGBHzoij6GD_pdI_e8REOf7xmAELb8s8mwlMcQffQSQPa0Y1iC_1S12l-0JB6r-NQWtQvA8sFefA/s640/111.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 10:&amp;nbsp; Make sure to keep the same name for another configuration element which is found under the path – VMware-&amp;gt;VIC Deploy-&amp;gt;vRealize Automation-&amp;gt;Deployments&lt;br /&gt;
&lt;br /&gt;
Procedure to setup VIC in vRA Orchestrator appliance:&lt;br /&gt;
&lt;br /&gt;
a. Download the VIC bundle by accessing the admiral portal&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GvNADAocjxCdz5uMXDffgtrxfQpsNbSlLl9ctZ1x-DBz45N5-hk1k0BEudBGk8hinrpm7W_qPRN4R0HANu2YO_87fw8c6rFkwONI0zwQRNW8m4Sl9LkWbeaxlD9DLQG_vjytpECVSaE/s1600/pic-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;799&quot; data-original-width=&quot;1600&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GvNADAocjxCdz5uMXDffgtrxfQpsNbSlLl9ctZ1x-DBz45N5-hk1k0BEudBGk8hinrpm7W_qPRN4R0HANu2YO_87fw8c6rFkwONI0zwQRNW8m4Sl9LkWbeaxlD9DLQG_vjytpECVSaE/s640/pic-1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
b. Log in to vRealize Orchestrator appliance or vRA appliance ( if it&#39;s embedded) and copy the VIC v1.5.4.tar file to the location &lt;i&gt;/etc/vco/app-server/&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
c. Untar the file using the command &quot;&lt;i&gt;tar -xvzf vic1.5.4.tar&lt;/i&gt;&quot; and a folder will be created as vic.&lt;br /&gt;
d. Change the permission of VIC folder by running the command &quot;&lt;i&gt;chown -R vco:vco vic&lt;/i&gt;&quot;&lt;br /&gt;
e. Verify the permissions are set properly inside the folder&lt;br /&gt;
&lt;br /&gt;
f. Edit the &lt;i&gt;/etc/vco/app-server/properties&lt;/i&gt; and add the following property to the bottom of the file:&amp;nbsp;&amp;nbsp;&lt;i&gt;com.vmware.js.allow-local-process=true&lt;/i&gt;&lt;br /&gt;
g.&amp;nbsp; Close the editor and restart the vco service using the following command: &lt;i&gt;/etc/init.d/vco-server &lt;/i&gt;restart (Note: If you have a high available implementation of vRealize Automation, steps b - f must be performed on every vRealize Automation appliance node).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 11: Create a catalog item. In order to create it, we need to import the blueprint using the tool called &quot;CloudClient&quot;. Run below command in cloudclient.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Import the blueprint using the following command — vra content import –path “path_to extracted_files”\desktop\users\downloads\-xaas-blueprint.zip –resolution OVERWRITE –precheck WARN –verbose&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once we import the blueprint, we should see them under the design, select the imported XaaS blueprint, we can edit the details as required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj36FVA3mY5sqh2fQ1ETV7qxxi9BaSj3TwYS4SiDYUmQQjmTKo38a6Y1Pak0D1Rg3zzm-W6FmB6rV2Ybt7IxG0CK3LzIvhPo_tOVunYNFwV1CHkg70pQrzoC3G4D-JpQdeQYjAerccNmN0/s1600/10.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;481&quot; data-original-width=&quot;783&quot; height=&quot;392&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj36FVA3mY5sqh2fQ1ETV7qxxi9BaSj3TwYS4SiDYUmQQjmTKo38a6Y1Pak0D1Rg3zzm-W6FmB6rV2Ybt7IxG0CK3LzIvhPo_tOVunYNFwV1CHkg70pQrzoC3G4D-JpQdeQYjAerccNmN0/s640/10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Choose the option to be presented to users. Go to the Blueprint Form tab and select the field named – Select vSphere / ESXi Host.&amp;nbsp; Make sure that the ‘Default Value’ matches the name of the configuration element specified in step 9.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgapV8_CAcwB0Dm7DPWxzFrweV6CrjIr8Z2QVHpMKneTB-Px8VIHccEQgeexGytl28VYAhWZZlgtSf6GuQHDTWjh2zZO5KgNw0iL92M5fFJPiKETlN6RGbt09oT6cuYNleYX1XQ9mWDyq0/s1600/11.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;850&quot; data-original-width=&quot;1188&quot; height=&quot;456&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgapV8_CAcwB0Dm7DPWxzFrweV6CrjIr8Z2QVHpMKneTB-Px8VIHccEQgeexGytl28VYAhWZZlgtSf6GuQHDTWjh2zZO5KgNw0iL92M5fFJPiKETlN6RGbt09oT6cuYNleYX1XQ9mWDyq0/s640/11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 12: Publish this blueprint. Add it to a vRA service and create entitlements for the users who will be requesting this blueprint. Publish this blueprint. Add it to a vRA service and create entitlements for the users who will be requesting this blueprint&lt;br /&gt;
&lt;br /&gt;
Step 13: Go to the vRA Catalog tab and you should see ‘Deploy Virtual Container Host’ as a catalog item.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAKpHsqqIy9nhjLZGiY2MhdygFYHXzyV4JnUQAVyMrfxpAe1uQj7xn5hUJzaiSiNiHSh42fMIizHib6T9ztUBJigN8XrV79FFATBveysDCiRm685dai4Ql_V4o27EClfkQsOmTjv6nHIQ/s1600/12.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;1039&quot; height=&quot;314&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAKpHsqqIy9nhjLZGiY2MhdygFYHXzyV4JnUQAVyMrfxpAe1uQj7xn5hUJzaiSiNiHSh42fMIizHib6T9ztUBJigN8XrV79FFATBveysDCiRm685dai4Ql_V4o27EClfkQsOmTjv6nHIQ/s640/12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 14: Users can request the vms, check the status of your request in the Requests tab. Once the request is completed, the VCH will be visible in the vCenter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhehQvf0jy1G15jXHnYozdTTCIx4M74n6JfZQa4MfotNc7xnNj33Es6DODtgsHqGsF4070HI8zNcu50bitT4HaValMPjD1R52vfcl5UCWNTumBXhLXJIkN3i4i-aJwVOu6F3hhQEtooeZ0/s1600/13.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;171&quot; data-original-width=&quot;266&quot; height=&quot;411&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhehQvf0jy1G15jXHnYozdTTCIx4M74n6JfZQa4MfotNc7xnNj33Es6DODtgsHqGsF4070HI8zNcu50bitT4HaValMPjD1R52vfcl5UCWNTumBXhLXJIkN3i4i-aJwVOu6F3hhQEtooeZ0/s640/13.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the VCH is deployed, the URL of the VCH can be made available to the developers who can start deploying vSphere Integrated Container using the Docker Client OR from vRA using the vRA-Containers provisioning feature. ( &lt;a href=&quot;https://www.myitblog.in/2019/09/how-can-vmware-integrated-containers-be.html&quot; target=&quot;_blank&quot;&gt;refer post&lt;/a&gt; for adding VCH to projects/vRA containers tab)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7229110000550513310'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/7229110000550513310'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2019/11/automated-deployment-of-vch.html' title='Automated deployment of Virtual Container Host (VCH) using vRealize Automation (vRA) '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUBFYc81Kv3GvbvGLdSLDbfyHZZ16Qk3MK4Dj-i613W9H3ztiR7DU7Sf-6dC6gNVdld_uA6UZggmEY-ra_MWxkC3ypVSneOt8ifRpAlS7a2N1HSz3FUyFbWqJLsAFZ02S5DhpMomkMfTc/s72-c/1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-8451275416257988163</id><published>2019-11-20T17:40:00.001+05:30</published><updated>2019-11-26T18:57:52.249+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="AWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="Orchestrator"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>The role of  VMware Integrated Containers in real life scenario - PART 3 </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Virtual Container Host Deployment using the &quot;vic-machine&quot; Utility - VMware Integrated Containers&lt;/span&gt;&lt;/h2&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;In our &lt;a href=&quot;https://www.myitblog.in/2019/11/how-can-vmware-integrated-containers-be_18.html&quot; target=&quot;_blank&quot;&gt;previous posts&lt;/a&gt;, we saw the steps to deploy VIC appliance and deploying the VCH from vSphere client. In this post, we will see the steps to deploy the VCH using the &quot;vic-machine&quot; CLI Utility&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Refernce: &lt;a href=&quot;https://github.com/rdjagadeesh/vic_homelab/&quot; target=&quot;_blank&quot;&gt;https://github.com/rdjagadeesh/vic_homelab/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Once we deploy the vSphere Integrated Containers (VIC) appliance, access the VIC appliance IP from the browser and we land on the below page. From this page, we can download the vSphere Integrated Containers Engine bundle from the appliance and unpack it on the workstation/laptop/ jump host where we connect to our vSphere environment.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg51VmvcV3pdzQwOad1HjEep1mOpOfatUzhbKzSF6x6WzKv2hZyqpxlGQ5gys1g6et6Zji7QcMfUGnpN_FvEAAOY00UOL87GgNKLROpGBQlG8fwRRlJZUO0Ae1i0lX5xQV6LNxMlmfsbaA/s1600/pic-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;799&quot; data-original-width=&quot;1600&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg51VmvcV3pdzQwOad1HjEep1mOpOfatUzhbKzSF6x6WzKv2hZyqpxlGQ5gys1g6et6Zji7QcMfUGnpN_FvEAAOY00UOL87GgNKLROpGBQlG8fwRRlJZUO0Ae1i0lX5xQV6LNxMlmfsbaA/s640/pic-1.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Unpack the downloaded bundle&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpF66APh2STX7ka3IioPFIRV3FRWsB2idseTNtEG1foyPehUqE5bzp_KI-c23uL-UKPCUfAYZhLQUYMMxJUBv9X3orjWDudZdxxCJz2hda-so2L4xrR45MK4J4wMjXUF9lBiENw_5kIpk/s1600/pic-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;176&quot; data-original-width=&quot;646&quot; height=&quot;174&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpF66APh2STX7ka3IioPFIRV3FRWsB2idseTNtEG1foyPehUqE5bzp_KI-c23uL-UKPCUfAYZhLQUYMMxJUBv9X3orjWDudZdxxCJz2hda-so2L4xrR45MK4J4wMjXUF9lBiENw_5kIpk/s640/pic-2.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;The bundle included the following contents and utilities&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGHB_PP1HZs-0-nawH4bB79j3wzlqxAImaotLPB7UgfhsuhJxeS78isriqHd4nSGCY2zQ7hTVFRiAQs6YUxZpsaOupejpKZstQhP8nj6PNVDQ3P44NXv45gMmmIat0nXNQ63e2XDP_qZk/s1600/pic-3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;319&quot; data-original-width=&quot;626&quot; height=&quot;326&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGHB_PP1HZs-0-nawH4bB79j3wzlqxAImaotLPB7UgfhsuhJxeS78isriqHd4nSGCY2zQ7hTVFRiAQs6YUxZpsaOupejpKZstQhP8nj6PNVDQ3P44NXv45gMmmIat0nXNQ63e2XDP_qZk/s640/pic-3.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;The VIC bundle includes the vic-machine CLI utility. We use &quot;vic-machine&quot; to deploy and manage virtual container hosts (VCHs) at the command line.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Procedure:&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Open a terminal on the system on which we downloaded and unpacked the vSphere Integrated Containers Engine binary bundle.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Navigate to the directory that contains the vic-machine utility:&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ3lBkKOtmhNe0wHNLkUlyR6LjvCbqoxlxA5A6kYpvVGzn-iQt5Rx1gyTZSfDqaxsjlRKjnmXnaxZZCIc-ItXhf1wC7-MU4NXY-CBsR2pKY0ZmA_JnYZngiCI-jSt3aOLtdrB0TxYBdkI/s1600/pic-4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;167&quot; data-original-width=&quot;515&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ3lBkKOtmhNe0wHNLkUlyR6LjvCbqoxlxA5A6kYpvVGzn-iQt5Rx1gyTZSfDqaxsjlRKjnmXnaxZZCIc-ItXhf1wC7-MU4NXY-CBsR2pKY0ZmA_JnYZngiCI-jSt3aOLtdrB0TxYBdkI/s640/pic-4.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Run the vic-machine create command.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Syntax:&lt;/span&gt;&lt;/h4&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--target homelabvc01.vsphere.local/VIC_COMPUTE_CLUSTER&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--user &#39;administrator@vsphere.local&#39;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--password &#39;VMware@12345&#39;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--no-tlsverify&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--force&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--bridge-network vxw-dvs-564-virtualwire-21-sid-2144-NSX-VIC-Bridge&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--bridge-network-range 192.168.125.0/12&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--dns-server 10.126.193.47&amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--public-network vxw-dvs-564-virtualwire-21-sid-2144-NSX-public&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--container-network vxw-dvs-564-virtualwire-21-sid-2144-NSX-Container:public&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--container-network-firewall vxw-dvs-564-virtualwire-21-sid-2144-NSX-Container:open&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--compute-resource &#39;TEST_CLUSTER&#39;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--image-store DATASTORE_VSAN&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--timeout 20m&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--endpoint-cpu 4&amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--memory 30000&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--endpoint-memory 8192&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--volume-store DATASTORE_VSAN/volumes:default&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--thumbprint 09:21:29:EF:0G:DE:78:9D:FG:89:DF:8F:89:3S:89:0A:FF:67:ZX&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;--name MyFirstVCH&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Example:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;C:\&amp;gt;documents\vic\vic-machine-windows.exe create --target &quot;administrator@vsphere.local&quot;:VMware@12345@homelabvc01.vsphere.local/datacenter_name --compute-resource VIC_COMPUTE_CLUSTER --bridge-network &quot;vxw-dvs-564-virtualwire-21-sid-2144-NSX-VIC-Bridge&quot; --public-network &quot;vxw-dvs-564-virtualwire-21-sid-2144-NSX-public&quot; --image-store &quot;DATASTORE_VSAN&quot; --volume-store DATASTORE_VSAN/volumes:default --volume-store DATASTORE_VSAN/volumes:default --name MyFirstVCH --thumbprint 09:21:29:EF:0G:DE:78:9D:FG:89:DF:8F:89:3S:89:0A:FF:67:ZX --no-tlsverify --timeout 20m&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Linux OS:&lt;/span&gt;&lt;/h4&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;$ vic-machine-linux create&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--target esxi_host_address&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--user root&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--password &#39;esxi_host_password&#39;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--no-tlsverify&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--thumbprint esxi_certificate_thumbprint&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Windows OS:&lt;/span&gt;&lt;/h4&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;$ vic-machine-windows create&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;--target esxi_host_address&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;--user root&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;--password &quot;esxi_host_p@ssword&quot;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;--no-tlsverify&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;--thumbprint esxi_certificate_thumbprint&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Mac OS:&lt;/span&gt;&lt;/h4&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;$ vic-machine-darwin create&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--target esxi_host_address&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--user root&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--password &#39;esxi_host_p@ssword&#39;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--no-tlsverify&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;--thumbprint esxi_certificate_thumbprint&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Result&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;At the end of a successful deployment, VIC-machine displays information about the new VCH:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Initialization of appliance successful&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;VCH ID: vch_id&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;VCH Admin Portal:&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;https://vch_address:2378&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Published ports can be reached at:&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;vch_address&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Docker environment variables:&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;DOCKER_HOST=vch_address:2376&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Environment saved in virtual-container-host/virtual-container-host.env&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Connect to docker:&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;docker -H vch_address:2376 --tls info&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;Installer completed successfully&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Test the Deployment of the VCH&lt;/span&gt;&lt;/h3&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;1. We can use a Docker client, run the docker info command to confirm that we can connect to the VCH.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;docker -H vch_address:2376 --tls info&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;2. We should see confirmation that the Storage Driver is vSphere Integrated Containers Backend Engine.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;3. In our Docker client, pull a Docker container image from Docker Hub into the VCH.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;For example, pull the BusyBox container image.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;docker -H vch_address:2376 --tls pull busybox&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;4. In the ESXi host/vcenter&amp;nbsp; UI, open the Datastore browser and select the datastore. We should see that vSphere Integrated Containers Engine has created a folder that has the same name as the VCH. This folder contains the VCH endpoint VM files and a folder named VIC, in which to store container image files.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;5. Expand the VIC folder to navigate to the images folder.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;6. The images folder contains folders for each container image that We pull into the VCH. The folders contain the container image files.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;7. In our Docker client, run the Docker container that We pulled into the VCH.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;i&gt;docker -H vch_address:2376 --tls run --name test busybox&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;8. In the ESXi host UI, go to Virtual Machines. We should see a VM named test-container_id. This is the container VM that We created from the BusyBox image.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Download kit: &lt;a href=&quot;https://github.com/rdjagadeesh/vic_homelab/&quot; target=&quot;_blank&quot;&gt;https://github.com/rdjagadeesh/vic_homelab/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; font-size: large;&quot;&gt;Thanks for reading and in our &lt;a href=&quot;https://www.myitblog.in/2019/11/automated-deployment-of-vch.html&quot; target=&quot;_blank&quot;&gt;next post we see an option to automate the deployment of VCH through vRealize Automation&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8451275416257988163'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/8451275416257988163'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2019/11/the-role-of-vmware-integrated.html' title='The role of  VMware Integrated Containers in real life scenario - PART 3 '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg51VmvcV3pdzQwOad1HjEep1mOpOfatUzhbKzSF6x6WzKv2hZyqpxlGQ5gys1g6et6Zji7QcMfUGnpN_FvEAAOY00UOL87GgNKLROpGBQlG8fwRRlJZUO0Ae1i0lX5xQV6LNxMlmfsbaA/s72-c/pic-1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-2815744384533930011</id><published>2019-11-18T18:30:00.001+05:30</published><updated>2019-11-21T16:36:59.606+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="Orchestrator"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>How can VMware Integrated Containers be useful in real life scenario - PART2</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In this post we see the options to deploy the Virtual Container Hosts ( VCH)&lt;br /&gt;
&lt;br /&gt;
Ref:&amp;nbsp;&lt;a href=&quot;https://github.com/rdjagadeesh/vic_homelab/&quot;&gt;https://github.com/rdjagadeesh/vic_homelab/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;https://www.myitblog.in/2019/09/how-can-vmware-integrated-containers-be.html&quot; target=&quot;_blank&quot;&gt;previous post&lt;/a&gt; talks about vSphere Integrated Containers&amp;nbsp;and their benefits. The VIC offers a robust solution that enables the vSphere environment to quickly get containers up and running in their current vSphere infrastructure. This environment can be useful for migrating current apps to containers or for in-house development.&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Architecture&lt;/b&gt;&lt;/h3&gt;
In a traditional container environment, containers run as threads within the container host. vSphere Integrated Containers leverage the native constructs of vSphere for provisioning container-based applications into its own container running its own very minimal Linux kernel with just enough code to run a Docker image, thus preventing any issue with containers being accessed from other containers by pushing isolation of the container down to the hypervisor layer that is much better at handling this type of isolation.&lt;br /&gt;
&lt;br /&gt;
This isolation permits IT directors to deliver an instrumentation atmosphere while not having to create a separate, specialized instrumentation infrastructure stack. By deploying every instrumentation image as a vSphere virtual machine (VM), vSphere Integrated Containers permits these workloads to leverage vital vSphere application availableness and performance options like vSphere hour angle, vMotion, DRS and a lot of. vSphere Integrated Containers provides these options whereas still presenting a jack API to developers of container-based applications.&lt;br /&gt;
&lt;br /&gt;
The VIC engine is that the mechanism that gives this docker API to the container VM’s. It permits the provisioning and management of VMs into vSphere clusters using the docker binary image format. It allows vSphere admins to pre-allocate certain amounts of compute, networking and storage and provides that to developers as a self-service portal using a familiar Docker-compatible API. It permits developers that already know docker to develop in containers and deploy them aboard ancient VM-based workloads on vSphere clusters.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Virtual Container Host Deployment Options:&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
In VIC, we can deploy virtual container hosts (VCHs) that serve as Docker API endpoints. VCHs allow Docker developers to provision containers as VMs in your vSphere environment.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Deploy Virtual Container hosts in the vSphere Client&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Deploy Virtual Container hosts using the vic-machine CLI utility&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Deploy a Virtual Container host through the vRealize Automation Portal ( vRA/vRO)&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
Option 1: Deploy VCH in the vSphere client procedure&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If you have installed the HTML5 plug-in for vSphere Integrated Containers, you can deploy virtual container hosts (VCHs) interactively in the vSphere Client.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Log in to the HTML5 vSphere client with an admin account and choose &quot;vSphere Integrated Containers&quot;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhObfVg865yWYwulvz_d9nZzOjDhr7DztMgkKsCGm4-u07YllaOlsD9b-sb5XDlS2Uepvj0ASNZ-A6soXhC6SLBA-EFQcYWB8gvkHqWmQFiaelF3mNZV1oa9GEhIvn94yq6OOIaGf-5SsU/s1600/pic1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;737&quot; data-original-width=&quot;746&quot; height=&quot;632&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhObfVg865yWYwulvz_d9nZzOjDhr7DztMgkKsCGm4-u07YllaOlsD9b-sb5XDlS2Uepvj0ASNZ-A6soXhC6SLBA-EFQcYWB8gvkHqWmQFiaelF3mNZV1oa9GEhIvn94yq6OOIaGf-5SsU/s640/pic1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The vSphere Integrated Containers view presents the number of VCHs and container VMs that you have deployed to this vCenter Server instance.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfGN11wc3KtcJHNJ_mP-BYbr6p8yoJeRrMzyUilPS-bDrnNv-GgLnWffWERrMx28eNUrygj_q6jeb6ghO-jl0oB8rSDphwIR0qMopg6pJ5zxBg2-e4yH78GS9mnx4kCFJN11fh3AF5f_Y/s1600/pic2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;569&quot; data-original-width=&quot;1514&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfGN11wc3KtcJHNJ_mP-BYbr6p8yoJeRrMzyUilPS-bDrnNv-GgLnWffWERrMx28eNUrygj_q6jeb6ghO-jl0oB8rSDphwIR0qMopg6pJ5zxBg2-e4yH78GS9mnx4kCFJN11fh3AF5f_Y/s640/pic2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Click on the deployed vSphere integrated containers and select &quot;New Virtual Container Host&quot; option. Provide a name for the VCH instance&lt;/div&gt;
&lt;br /&gt;
Optionally we can also forward the logs to syslog or the vRealize Log insight server&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJDnWZHUT5rWvfp0OJmrg9mduAxHot2jJ32J8moBTx8vz_2f1pH__urZUhU0x_YhkqbL0eASZS8oMuwbUCI4Jt43v2PjKV7TDu8thAKCQhRa5L1ijS4trjN-61a5x_ghqq17hZolgd0Y0/s1600/pic3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;266&quot; data-original-width=&quot;965&quot; height=&quot;176&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJDnWZHUT5rWvfp0OJmrg9mduAxHot2jJ32J8moBTx8vz_2f1pH__urZUhU0x_YhkqbL0eASZS8oMuwbUCI4Jt43v2PjKV7TDu8thAKCQhRa5L1ijS4trjN-61a5x_ghqq17hZolgd0Y0/s640/pic3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEaflpdu6YZUZj7BK-FmEzT5Gm_IB_pqgY-8ltGfdRXGengFz0AoSmc_WkhVbnDCeBzXC1JccKhEQaTi9xQghyv9Vey8C0t3dfuaG3Tj12GnZUeXCluzbdoa_gSnuQYATeyn3lIqur6lo/s1600/pic4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;732&quot; data-original-width=&quot;1050&quot; height=&quot;444&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEaflpdu6YZUZj7BK-FmEzT5Gm_IB_pqgY-8ltGfdRXGengFz0AoSmc_WkhVbnDCeBzXC1JccKhEQaTi9xQghyv9Vey8C0t3dfuaG3Tj12GnZUeXCluzbdoa_gSnuQYATeyn3lIqur6lo/s640/pic4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Choose a cluster where you want to deploy a VCH&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7fxrehg1Ntxhyphenhyphen0OSPkuJQ_Xc1Hp8r3JcfqswS74ncElWCZXtxUt8QIBqYDOUuyXcAvVWpfcK7A4TCnWK3CsLPGEtrkGWpmmoGVL9EgPWDWhbCrEFU_0kokVpwwKpmtgAB-LfjvEqdfTM/s1600/pic5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;729&quot; data-original-width=&quot;1047&quot; height=&quot;444&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7fxrehg1Ntxhyphenhyphen0OSPkuJQ_Xc1Hp8r3JcfqswS74ncElWCZXtxUt8QIBqYDOUuyXcAvVWpfcK7A4TCnWK3CsLPGEtrkGWpmmoGVL9EgPWDWhbCrEFU_0kokVpwwKpmtgAB-LfjvEqdfTM/s640/pic5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Provide the compute details&lt;br /&gt;
&lt;br /&gt;
By default it takes 1 vCPU and 2 GB of Memory. In my experience, it works seamlessly well with 2 vCPU and 8 GB of memory.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP6Gr2XmTGgRAv9gpfEdlNynJf1FxKglVozuJwLTkkMpc_LHep8evL0DysrNof0I4bE5o3xJIR7gHjSwKyBa0beaH4e-0xFqsb5jwkIv5FSjMmQP0cCtbl1V3tMJreEIU9G4e9H0IFYeo/s1600/pic6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;722&quot; data-original-width=&quot;1035&quot; height=&quot;446&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP6Gr2XmTGgRAv9gpfEdlNynJf1FxKglVozuJwLTkkMpc_LHep8evL0DysrNof0I4bE5o3xJIR7gHjSwKyBa0beaH4e-0xFqsb5jwkIv5FSjMmQP0cCtbl1V3tMJreEIU9G4e9H0IFYeo/s640/pic6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Provide storage/datastore information. I recommend enabling anonymous volumes, which creates a path by default. If not then you could need to create/attach a volume manually post the deployment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0901L2vD-ohRphGZyU8rWZ8FJJwrOnotC-s37NmBOwk6kq1_BTgvcApPFeOLYo3xRnpxzwfW1VewhWZXxdWQGJNrspWyH3Wx1uralQ4Bl7fOrAdFsD4GkLKBXcGeRxUOvGPHuIcKYgQM/s1600/pic7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;723&quot; data-original-width=&quot;1039&quot; height=&quot;444&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0901L2vD-ohRphGZyU8rWZ8FJJwrOnotC-s37NmBOwk6kq1_BTgvcApPFeOLYo3xRnpxzwfW1VewhWZXxdWQGJNrspWyH3Wx1uralQ4Bl7fOrAdFsD4GkLKBXcGeRxUOvGPHuIcKYgQM/s640/pic7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Configure Networks - It is mandated to provide the Bridge network and Public network.&lt;br /&gt;
&lt;br /&gt;
NOTE: It is mandated to create a dedicated BRIDGE NETWORK PORT GROUP for EACH VCH. If you reuse the same PORT GROUP then you would end up with duplicate IPs on C-VMS/container VMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8utyJzrsC6FvK5LXAkoDbsnHLTMFzDgskFNJdPFdaTdVGlvU3bNtaQyx8XrynYxNq-CkElj_XQbD9fwaoAVQMiGPrtEEv4Nin3DHvTxggA960cU92KdmG79NI6DKVeuaqqgCf5hwc7WI/s1600/pic8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;724&quot; data-original-width=&quot;1039&quot; height=&quot;444&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8utyJzrsC6FvK5LXAkoDbsnHLTMFzDgskFNJdPFdaTdVGlvU3bNtaQyx8XrynYxNq-CkElj_XQbD9fwaoAVQMiGPrtEEv4Nin3DHvTxggA960cU92KdmG79NI6DKVeuaqqgCf5hwc7WI/s640/pic8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Security options - you can also turn off this option in your closed/POC/test setup.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnwofHCzsSR5bjLFNQLr9lwftfQNSb32fFE-0kIxYhAXNjMRpdQN8fMoPNwhmqNFMmDilQTe49Hu8lFVr1h4bW7d_J01GROsEF8oe3ZqEewXQa8pZcGr3tAaRNm235DanE3OxbAM2oXS8/s1600/pic9.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;723&quot; data-original-width=&quot;1037&quot; height=&quot;446&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnwofHCzsSR5bjLFNQLr9lwftfQNSb32fFE-0kIxYhAXNjMRpdQN8fMoPNwhmqNFMmDilQTe49Hu8lFVr1h4bW7d_J01GROsEF8oe3ZqEewXQa8pZcGr3tAaRNm235DanE3OxbAM2oXS8/s640/pic9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;Registry access:&amp;nbsp; Leave it to default values unless you have some restrictions applied to download the registry entities in your network&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPy4BQTibuGlYKcMGjl7Agwap1e549sTOPDeSyglMJeNCx4_2sAhxcNZfU_hflQWawyKp8DvpU887uiEUOfAiSdEDpiW9UK4HfUZkckDl1_sFiTn3s0jaUwpCxVLT4zLGd_HC1eDPo1nE/s1600/pic10.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;711&quot; data-original-width=&quot;1036&quot; height=&quot;438&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPy4BQTibuGlYKcMGjl7Agwap1e549sTOPDeSyglMJeNCx4_2sAhxcNZfU_hflQWawyKp8DvpU887uiEUOfAiSdEDpiW9UK4HfUZkckDl1_sFiTn3s0jaUwpCxVLT4zLGd_HC1eDPo1nE/s640/pic10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Provide the operations user details - this is to deploy the VCH VM in your setup and also to access the ESXi host logs&lt;br /&gt;
&lt;br /&gt;
In the next step, review and submit the request. Once the deployment is successful, you should see the below details with the right IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguTv6n7saLg73dXNJL1MAxK4hWYlHEjZxI-NrUxqpJXsnygDvQE1yGC7VwvzapHd_sFIuAkBux1OBupkDmWm8fgLa8ByI84h37qcJ5cCvZJvlxJbWZqWRufJVt1bO6nSc5sI6eXhbe_js/s1600/pic11.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;238&quot; data-original-width=&quot;1442&quot; height=&quot;104&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguTv6n7saLg73dXNJL1MAxK4hWYlHEjZxI-NrUxqpJXsnygDvQE1yGC7VwvzapHd_sFIuAkBux1OBupkDmWm8fgLa8ByI84h37qcJ5cCvZJvlxJbWZqWRufJVt1bO6nSc5sI6eXhbe_js/s640/pic11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
In the vSphere client, we should be able to see a resource group/pool created with the same name as a VCH&lt;br /&gt;
&lt;br /&gt;
NOTE: Each VCH creates its own Resource POOL where all the C-VMs/ container vms are grouped.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_fviLUF7lIH0Tw8-gGICE-TWqgfOEVbHedT_yxao_XAUkKIidmuQtZYkl0V_nK-KNu4JE4iCW4B-oDMetWIlWfoo6V7HljmxlXgukxXG56SKrGiiviugFRiKflquZpZWcMW3AODq_zk/s1600/pic12.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;204&quot; data-original-width=&quot;333&quot; height=&quot;392&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_fviLUF7lIH0Tw8-gGICE-TWqgfOEVbHedT_yxao_XAUkKIidmuQtZYkl0V_nK-KNu4JE4iCW4B-oDMetWIlWfoo6V7HljmxlXgukxXG56SKrGiiviugFRiKflquZpZWcMW3AODq_zk/s640/pic12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Once you have the DOCKER API IP details, navigate to VIC administrator portal and add the VCH to the project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjapCLqvZ-2KvFMKm0cUIcjuAMvnvh1LtNeUBN_AogYDpHatTzwzEWhnITWTUCkXkWl-Nss2BbbAPUdANG-Z-xw4XtUTf_JnWg6adOTp8cWnQs_3l0LsRyS8VdvmjSQySVwGS1IebD0GaA/s1600/pic13.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;442&quot; data-original-width=&quot;642&quot; height=&quot;440&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjapCLqvZ-2KvFMKm0cUIcjuAMvnvh1LtNeUBN_AogYDpHatTzwzEWhnITWTUCkXkWl-Nss2BbbAPUdANG-Z-xw4XtUTf_JnWg6adOTp8cWnQs_3l0LsRyS8VdvmjSQySVwGS1IebD0GaA/s640/pic13.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Name a PROJECT where you want to add the VCH to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr8ggasKBqfruP_gDWv6brkCgrcvp-Lf3goXWRqVnhjMrqnmcvKKv77jdT58MV20uNtkF7906Af-lNEDufLqT2zpuAFaYFdnsu1NFLm83nnsngEFFBwvAzW90c8KShoV8OlXQNZhH4knc/s1600/pic14.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;391&quot; data-original-width=&quot;896&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr8ggasKBqfruP_gDWv6brkCgrcvp-Lf3goXWRqVnhjMrqnmcvKKv77jdT58MV20uNtkF7906Af-lNEDufLqT2zpuAFaYFdnsu1NFLm83nnsngEFFBwvAzW90c8KShoV8OlXQNZhH4knc/s640/pic14.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Add host to the PROJECT&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw9_bKxHAwuBSKb8y2CiR086qi8pkJKAf0GKX_sc9uMj9R7EM_d9tH9JxIJuHYZfMBE_JiLHPzdXQ5k_WkE9-G6g98m-wCmvlmxoO7PB84RnXUI1z8-dItkklmIDKmiyD7n9bn52wVJJ4/s1600/pic15.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;884&quot; data-original-width=&quot;1181&quot; height=&quot;478&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw9_bKxHAwuBSKb8y2CiR086qi8pkJKAf0GKX_sc9uMj9R7EM_d9tH9JxIJuHYZfMBE_JiLHPzdXQ5k_WkE9-G6g98m-wCmvlmxoO7PB84RnXUI1z8-dItkklmIDKmiyD7n9bn52wVJJ4/s640/pic15.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Add members who are entitled to access the project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuYZ7BBNymiHhB27_LFk8DrRFcx73Cj4XtZwtjm92zx7Simsi0jaEKRSNi21dEvaQwI6tW0REmPx7IxvHxAsQGgjppLBUTrGwIygRDOIYlr-e1vDWjIZcplECK__gd1f6UAoT62VlxmBk/s1600/pic16.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;492&quot; data-original-width=&quot;1217&quot; height=&quot;258&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuYZ7BBNymiHhB27_LFk8DrRFcx73Cj4XtZwtjm92zx7Simsi0jaEKRSNi21dEvaQwI6tW0REmPx7IxvHxAsQGgjppLBUTrGwIygRDOIYlr-e1vDWjIZcplECK__gd1f6UAoT62VlxmBk/s640/pic16.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Add the VCH host&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI5iFV6H_RhcpTF6-bEv5YCW_YruHnvPu7kJaWR6TmRm6031u_-GgkTFKC10KLnD2oCAgKPmQO21xwvgc0i6qnjjKI-fWG2LctJn54NgmmjMfcRF3m1ObR7WIfKNiSdYwNAXuJpntdCdM/s1600/pic17.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;516&quot; data-original-width=&quot;1459&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI5iFV6H_RhcpTF6-bEv5YCW_YruHnvPu7kJaWR6TmRm6031u_-GgkTFKC10KLnD2oCAgKPmQO21xwvgc0i6qnjjKI-fWG2LctJn54NgmmjMfcRF3m1ObR7WIfKNiSdYwNAXuJpntdCdM/s640/pic17.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq7EQD7CSpC4XKw3U2jAh7PzcvdJao_GZPBbr-m_DnZw-BHkBpfIo7l0tfaRjCBlXI5zGgzc5_eqIzKdFBkh-DUHvlxQYHyxXiHbGDT4MBQo-qWgv-MjXRW9UjlK7yUYQEnT2qHT4Xl2Y/s1600/pic18.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;593&quot; data-original-width=&quot;936&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq7EQD7CSpC4XKw3U2jAh7PzcvdJao_GZPBbr-m_DnZw-BHkBpfIo7l0tfaRjCBlXI5zGgzc5_eqIzKdFBkh-DUHvlxQYHyxXiHbGDT4MBQo-qWgv-MjXRW9UjlK7yUYQEnT2qHT4Xl2Y/s640/pic18.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the host is added it lists under the Infrastructure tab. We can add multiple hosts in this project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCsDJXRlUgSYDeA4aHckBRz5vOAeVvOmJPXUy9_ZGgvwxceK0pH8K0_BFT6KeF_aD9uJP936nkIEKMhweu_SHsHp68bVLk7f0bd6RYJFwlrlozgblf9l3HGXj4iRfCqNFSPygUX3nFG4o/s1600/pic19.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;626&quot; data-original-width=&quot;1204&quot; height=&quot;332&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCsDJXRlUgSYDeA4aHckBRz5vOAeVvOmJPXUy9_ZGgvwxceK0pH8K0_BFT6KeF_aD9uJP936nkIEKMhweu_SHsHp68bVLk7f0bd6RYJFwlrlozgblf9l3HGXj4iRfCqNFSPygUX3nFG4o/s640/pic19.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Choose the newly created PROJECT&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVL0k0Rm4zdyso2-s-38ulgh9pAi2SEdceYJwKu75x2Kau_LgQXzK6u4ndNMx6jMAqLMQqgdTWgoTbDke9z7d7HWVVlRzquRHmdBLieuIMk6LgUKcYO4112Cqqo1FCMedWapcSXEC-0e8/s1600/pic20.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;234&quot; data-original-width=&quot;578&quot; height=&quot;258&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVL0k0Rm4zdyso2-s-38ulgh9pAi2SEdceYJwKu75x2Kau_LgQXzK6u4ndNMx6jMAqLMQqgdTWgoTbDke9z7d7HWVVlRzquRHmdBLieuIMk6LgUKcYO4112Cqqo1FCMedWapcSXEC-0e8/s640/pic20.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;
Hosts are added to the Project and we are ready to spin our first C-VM/container.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWFBx52pEFKyFtpfJ78a_qApLd1HAhBj4DMpL5qWAOjJIaJvURaewYG6ccT8vc7j7sW4PWym-DyTmh1RzqGT1caS7vQmxWqo9QKVy_h8eWUONmmQg7QnMoGf5h2V-CzZ7I5pqNNdOOeH4/s1600/pic21.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;674&quot; data-original-width=&quot;668&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWFBx52pEFKyFtpfJ78a_qApLd1HAhBj4DMpL5qWAOjJIaJvURaewYG6ccT8vc7j7sW4PWym-DyTmh1RzqGT1caS7vQmxWqo9QKVy_h8eWUONmmQg7QnMoGf5h2V-CzZ7I5pqNNdOOeH4/s640/pic21.png&quot; width=&quot;634&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In &lt;a href=&quot;https://www.myitblog.in/2019/11/the-role-of-vmware-integrated.html&quot; target=&quot;_blank&quot;&gt;our next post,&lt;/a&gt; we see other options to deploy the VCH.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/2815744384533930011'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/2815744384533930011'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2019/11/how-can-vmware-integrated-containers-be_18.html' title='How can VMware Integrated Containers be useful in real life scenario - PART2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhObfVg865yWYwulvz_d9nZzOjDhr7DztMgkKsCGm4-u07YllaOlsD9b-sb5XDlS2Uepvj0ASNZ-A6soXhC6SLBA-EFQcYWB8gvkHqWmQFiaelF3mNZV1oa9GEhIvn94yq6OOIaGf-5SsU/s72-c/pic1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-3856729076594095247</id><published>2019-09-26T19:26:00.000+05:30</published><updated>2019-11-18T17:42:44.043+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="application"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-native"/><category scheme="http://www.blogger.com/atom/ns#" term="Containers"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>How can VMware Integrated Containers be useful in real life scenario - PART1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;What is VIC:&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; letter-spacing: 0.2px;&quot;&gt;VIC - vSphere Integrated Containers enable IT, teams, to seamlessly run traditional workloads and container workloads side-by-side on existing vSphere infrastructure.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; letter-spacing: 0.2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; letter-spacing: 0.2px;&quot;&gt;The solution is delivered in the form of an appliance just like any other VMware mgmt solution. The appliance comprises of,&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; letter-spacing: 0.2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin: 0px 0px 0.85em; padding: 0px 0px 0px 2em; text-size-adjust: none;&quot;&gt;
&lt;li style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; text-size-adjust: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; font-weight: 700; text-size-adjust: none;&quot;&gt;vSphere Integrated Containers Engine&lt;/span&gt;, a container runtime for vSphere that allows you to provision containers as virtual machines, offering the same security and functionality of virtual machines in VMware ESXi™ hosts or vCenter Server® instances.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin: 0px 0px 0.85em; padding: 0px 0px 0px 2em; text-size-adjust: none;&quot;&gt;
&lt;li style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; text-size-adjust: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; font-weight: 700; text-size-adjust: none;&quot;&gt;vSphere Integrated Containers Plug-In for vSphere Client&lt;/span&gt;, that provides information about your vSphere Integrated Containers set up and allows you to deploy virtual container hosts directly from the vSphere Client.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin: 0px 0px 0.85em; padding: 0px 0px 0px 2em; text-size-adjust: none;&quot;&gt;
&lt;li style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; text-size-adjust: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; font-weight: 700; text-size-adjust: none;&quot;&gt;vSphere Integrated Containers Registry (Harbor)&lt;/span&gt;, an enterprise-class container registry server that stores and distributes container images. vSphere Integrated Containers Registry extends the&amp;nbsp;Docker Distribution&amp;nbsp;open source project by adding the functionalities that an enterprise requires, such as security, identity, and management.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin: 0px 0px 0.85em; padding: 0px 0px 0px 2em; text-size-adjust: none;&quot;&gt;
&lt;li style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; text-size-adjust: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; font-weight: 700; text-size-adjust: none;&quot;&gt;vSphere Integrated Containers Management Portal&lt;/span&gt;, a container management portal, built on the VMware Admiral project, that provides a UI for DevOps teams to provision and manage containers, including the ability to obtain statistics and information about container instances. Management Portal administrators can manage container hosts and apply governance to their usage, including capacity quotas and approval workflows. Management Portal administrators can create projects, and assign users and resources such as registries and virtual container hosts to those projects.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; letter-spacing: 0.2px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;All components run on Photon OS 2.0. These components currently support the Docker image format. vSphere Integrated Containers is entirely Open Source and free to use.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Why VIC and how does it differ from other services:&amp;nbsp;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;As the VIC is entirely Open source and freeware, it can be tested in any existing VMware environment. We do not need many efforts or changes to introduce VIC in our setup.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;With no or minimal efforts we can get the VIC up and running. The VIC can be used for any container/cloud-native&amp;nbsp;&lt;span style=&quot;letter-spacing: 0.2px;&quot;&gt;application testing. If you are a starter or new to cloud-native application hosting/testing then VIC is a great place to start&lt;/span&gt;&lt;span style=&quot;letter-spacing: 0.2px;&quot;&gt;.&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Being said if you are a learner or new to container apps, then VIC will become handy, as you don&#39;t need to spend much time on setting up the foundation.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Unlike any other cloud-native platforms, VIC doesn&#39;t require much time to set up the base infrastructure. Once you deploy the VIC, you are ready to spin up the 1st container.,&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;b style=&quot;letter-spacing: 0.2px;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Deployment of VIC:&amp;nbsp;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The deployment of VIC appliance is as same as any other vmware appliance and pretty straight forward.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Read more :&amp;nbsp;&lt;a href=&quot;https://vmware.github.io/vic-product/assets/files/html/1.5/vic_vsphere_admin/vi_reqs.html&quot; style=&quot;background-color: transparent;&quot;&gt;https://vmware.github.io/vic-product/assets/files/html/1.5/vic_vsphere_admin/vi_reqs.html&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Important note regarding Network:&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img alt=&quot;VCH Networking&quot; src=&quot;https://vmware.github.io/vic-product/assets/files/html/1.5/vic_vsphere_admin/graphics/vic_networking.png&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Configuration steps :&amp;nbsp;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Once we deploy the appliance successfully the next is to configure it for use.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;1. Open Chrome and access the appliance to get the administration portal.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizLNV3SQdUzOgD6ifKVaZbHaRpMvNoAdJrlKEMs_JUuQYEgMnE8n-VKWkrHbmILCJs_8wqnDuXkDlFy_RABa0jCqYPGHi31XWalu9MsSqlS1o2cQUkpLKymNB8ER44lesj9-5cWF8jw2U/s1600/11.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;792&quot; data-original-width=&quot;1600&quot; height=&quot;315&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizLNV3SQdUzOgD6ifKVaZbHaRpMvNoAdJrlKEMs_JUuQYEgMnE8n-VKWkrHbmILCJs_8wqnDuXkDlFy_RABa0jCqYPGHi31XWalu9MsSqlS1o2cQUkpLKymNB8ER44lesj9-5cWF8jw2U/s640/11.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;2.&amp;nbsp; This is the landing page of the VIC&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisjjmt_tz4NnkQuvOArM6WwwCUJ-4T-XcOEl_rDILhoKqbxomZ1n9jOdw7T2wPJ8Q_e7WS7yISvwwOqibyNdonePTnRmV5yUAmG18e-M3KVfAIQwi0CA93Y7cg2dxPikr0Oe9jrxS4xcc/s1600/12.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;732&quot; data-original-width=&quot;1305&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisjjmt_tz4NnkQuvOArM6WwwCUJ-4T-XcOEl_rDILhoKqbxomZ1n9jOdw7T2wPJ8Q_e7WS7yISvwwOqibyNdonePTnRmV5yUAmG18e-M3KVfAIQwi0CA93Y7cg2dxPikr0Oe9jrxS4xcc/s640/12.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;3.&amp;nbsp; Next step is to configure the users who can manage the VIC and VCH. This can be done in Identity management.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbpcDzxP5IgSBRtlf2vSGjbg9csBaI4d01McIKLMFjFW8xc1ymn4I41Z0bnvVbmAEdByRAfS4sNRPJDP2xdidgeH3fx1qscClVnPDtuLUqP7E0xXYpEqACIl_L9udeRbgVttDLNazTzGo/s1600/15.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;519&quot; data-original-width=&quot;1428&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbpcDzxP5IgSBRtlf2vSGjbg9csBaI4d01McIKLMFjFW8xc1ymn4I41Z0bnvVbmAEdByRAfS4sNRPJDP2xdidgeH3fx1qscClVnPDtuLUqP7E0xXYpEqACIl_L9udeRbgVttDLNazTzGo/s640/15.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;4. Create a new Project. The project can be either allocated to a team or for a specific application hosting. This is a logical grouping of containers&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6t-LFPUTmpT3eRBQSOUDhIj7wSs8DhlbywPbP4oC9suewvq68WyyBF6ZNy4n3n7yXQLfUAVWLsRMhoSnivAr-aRmlCX8LR5d3hE8-95vzJgJ8gt66q0cTysqaSP28ECT39yJ_B32aLEo/s1600/16.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;421&quot; data-original-width=&quot;947&quot; height=&quot;284&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6t-LFPUTmpT3eRBQSOUDhIj7wSs8DhlbywPbP4oC9suewvq68WyyBF6ZNy4n3n7yXQLfUAVWLsRMhoSnivAr-aRmlCX8LR5d3hE8-95vzJgJ8gt66q0cTysqaSP28ECT39yJ_B32aLEo/s640/16.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;5. There will be a default project as well and we can add the projects based on the necessity&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; letter-spacing: 0.2px; margin-bottom: 0.85em; orphans: 3; text-align: left; text-size-adjust: none; widows: 3;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgagnsf8BOxUCnBq_9szFhtP4-iWi3_k2zNftPvOFZ5p4-NOnrTa8HnkyWE2HtxO6Li-Rp_sSgWzZhO-8WKRCEMo8X2YlTjVhDDcIxCCdbZ3r0N1Nqtc8VtzBzzDRtN7IP5aYcqwBmVR9I/s1600/17.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;406&quot; data-original-width=&quot;1153&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgagnsf8BOxUCnBq_9szFhtP4-iWi3_k2zNftPvOFZ5p4-NOnrTa8HnkyWE2HtxO6Li-Rp_sSgWzZhO-8WKRCEMo8X2YlTjVhDDcIxCCdbZ3r0N1Nqtc8VtzBzzDRtN7IP5aYcqwBmVR9I/s640/17.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;6.&amp;nbsp; Each project should have a members or entitlements, internal repositories settings, Infrastructure ( where we add the VCH) etc&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdhbsFmSBSA7-SCL9mfKPYcA2WsrFnsPPSk3wlMA2tYBIxkzp-i5hZq4OS8NndQ2Y3IPbrkmuLGWYObYoIlB25zDKb4ydOh6OqHf6a7FDsHzBjgSACalG5OWb72bH6srWGZhtibzQRjHs/s1600/18.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;708&quot; data-original-width=&quot;961&quot; height=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdhbsFmSBSA7-SCL9mfKPYcA2WsrFnsPPSk3wlMA2tYBIxkzp-i5hZq4OS8NndQ2Y3IPbrkmuLGWYObYoIlB25zDKb4ydOh6OqHf6a7FDsHzBjgSACalG5OWb72bH6srWGZhtibzQRjHs/s640/18.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;7.&amp;nbsp; We can add the users from the Identity manager ( integrated with LDAP or AD). Assign the role of the user in the specific project&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVucZs2ONDHGG9Z4XlQPy_yW0NE_VnR0Z3lbqMRcim6chzBojER7edPk8q_89YnSwQ7geHgnk-AiZkGYj2VdHnRuKvQAOvLAWgMuSDJIebrAybkGGLpNNWXrGa8M6bPrO5kJDNJRVl_w/s1600/19.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;571&quot; data-original-width=&quot;880&quot; height=&quot;414&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVucZs2ONDHGG9Z4XlQPy_yW0NE_VnR0Z3lbqMRcim6chzBojER7edPk8q_89YnSwQ7geHgnk-AiZkGYj2VdHnRuKvQAOvLAWgMuSDJIebrAybkGGLpNNWXrGa8M6bPrO5kJDNJRVl_w/s640/19.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;8.&amp;nbsp; We can add users and groups for multiple projects at once&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0YTp9T-AQuJFI94ohdKKr6asN_JQ-krujGFBwR_6Ndsdh077Wl9fOYn0VaJREmdLtPdOTlgrv6bgeaRxXtKTCMvV3KBza1IUiMIyCIh5yD9U98htWeOsSBB809Sgqtlsb7MY-3fiQQoI/s1600/20.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;324&quot; data-original-width=&quot;876&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0YTp9T-AQuJFI94ohdKKr6asN_JQ-krujGFBwR_6Ndsdh077Wl9fOYn0VaJREmdLtPdOTlgrv6bgeaRxXtKTCMvV3KBza1IUiMIyCIh5yD9U98htWeOsSBB809Sgqtlsb7MY-3fiQQoI/s640/20.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;9.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh154aIPWf4G4_559YRlYV9YqyXmaTKjxgMIESgDJ-Xll1isvYgDV6Snvgm-h5pCPqGqQPrvR9eVBYWV5xemVcEOeB13CxL1kd3w0nqEPlkNouJyy5T0rs5tvjBaUenTmVHrEtNuySehkE/s1600/22.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;511&quot; data-original-width=&quot;1600&quot; height=&quot;204&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh154aIPWf4G4_559YRlYV9YqyXmaTKjxgMIESgDJ-Xll1isvYgDV6Snvgm-h5pCPqGqQPrvR9eVBYWV5xemVcEOeB13CxL1kd3w0nqEPlkNouJyy5T0rs5tvjBaUenTmVHrEtNuySehkE/s640/22.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Next topic we cover :&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;1. How to deploy a VCH&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;2. Add VCH host to the Project&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;3. Spin up the first container in the project&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Thanks for reading!&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/3856729076594095247'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/3856729076594095247'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2019/09/how-can-vmware-integrated-containers-be.html' title='How can VMware Integrated Containers be useful in real life scenario - PART1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizLNV3SQdUzOgD6ifKVaZbHaRpMvNoAdJrlKEMs_JUuQYEgMnE8n-VKWkrHbmILCJs_8wqnDuXkDlFy_RABa0jCqYPGHi31XWalu9MsSqlS1o2cQUkpLKymNB8ER44lesj9-5cWF8jw2U/s72-c/11.png" height="72" width="72"/><georss:featurename>34937 County Rd 165.4, Kim, CO 81049, USA</georss:featurename><georss:point>37.50972603877014 -103.62304725000001</georss:point><georss:box>11.987691538770139 -144.93164125 63.031760538770143 -62.314453250000014</georss:box></entry><entry><id>tag:blogger.com,1999:blog-322570517117772700.post-3002213452642510618</id><published>2018-10-07T00:43:00.000+05:30</published><updated>2018-10-07T00:54:23.411+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>vRA 7.5 Installation steps - Back to Basics</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;vRealize Automation
Installation Overview &lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;You can install
vRealize Automation to support minimal, proof of concept environments, or in
different&amp;nbsp;sizes of
distributed, enterprise configurations that are capable of handling production
workloads.&amp;nbsp;Installation can be
interactive or silent.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;After installation,
you start using vRealize Automation by customizing your setup and configuring
tenants,&amp;nbsp;which provides users
with access to self-service provisioning and life-cycle management of cloud services&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;u&gt;New in this vRealize Automation Installation:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;If you installed earlier versions of vRealize Automation, be aware of changes in the installation process
for this release.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;This release simplifies the vRealize Automation appliance node removal process.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The vRealize Automation appliance administration interface has changed.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Database tab features have moved to the Cluster tab. The Database tab has been removed, and
the Cluster tab has become a primary tab.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The Migration tab has become a primary tab and now includes vRealize Automation and
vRealize Orchestrator migration.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The support bundle option has moved to the Logs tab.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;vRealize Code Stream has been removed from the Licensing tab.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;u&gt;The vRealize Automation Appliance&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The vRealize Automation appliance is a preconfigured Linux virtual appliance. The vRealize Automation&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;appliance is delivered as an open virtualization file that you deploy on existing virtualized infrastructure&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;such as vSphere.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The vRealize Automation appliance performs several functions central to vRealize Automation.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance contains the server that hosts the vRealize Automation product portal, where users log in to access self-service provisioning and management of cloud services.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance manages single sign-on (SSO) for user authorization and authentication.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance server hosts a management interface for vRealize Automation appliance settings.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance includes a preconfigured PostgreSQL database used for internal vRealize Automation appliance operations.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance includes a preconfigured instance of vRealize Orchestrator. vRealize Automation uses vRealize Orchestrator workflows and actions to extend its capabilities.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The appliance contains the downloadable Management Agent installer. All Windows servers that make up your vRealize Automation IaaS must install the Management Agent.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;In large deployments with redundant appliances, the secondary appliance databases serve as replicas to provide high availability.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The embedded instance of vRealize Orchestrator is now recommended. In older deployments or special cases, however, users might connect vRealize Automation to an external vRealize Orchestrator instead.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;The Management Agent registers IaaS Windows servers with the vRealize Automation appliance,&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;automates the installation and management of IaaS components, and collects support and telemetry&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;information.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In this blog post we
are going to see the basics steps of vRA 7.5 setup/installation &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Deploy the vRealize
Automation Appliance&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Before you can take
any of the installation paths, vRealize Automation requires that you deploy at
least one vRealize Automation appliance.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;To create the
appliance, you use the vSphere Client to download and deploy a partially
configured virtual machine from a template. You might need to perform the
procedure more than once, if you expect to create an enterprise deployment for
high availability and failover. Such a deployment typically has multiple
vRealize Automation appliances behind a load balancer.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Prerequisites&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Log in to the
vSphere Client with an account that has permission to deploy OVF templates to
the inventory.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Download the
vRealize Automation appliance .ovf or .ova file to a location accessible to the
vSphere Client.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif; font-weight: bold; text-decoration: underline;&quot;&gt;Procedure&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Select the vSphere
Deploy OVF Template option.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Enter the path to
the vRealize Automation appliance .ovf or .ova file.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhznHQ_1_DzNoe2Ba0dMWRkESUgNcdqZruN4qnILp-MKrZOSYtwskaEBDwzaHNIDDpr2_GQsG1SPY4C1Gr6a0cygV_DroWKWWFeR5Whfs0k1PpgnJJVer6o_lel9INexWEQhQzqb6ZNZA/s1600/1b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;564&quot; data-original-width=&quot;964&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhznHQ_1_DzNoe2Ba0dMWRkESUgNcdqZruN4qnILp-MKrZOSYtwskaEBDwzaHNIDDpr2_GQsG1SPY4C1Gr6a0cygV_DroWKWWFeR5Whfs0k1PpgnJJVer6o_lel9INexWEQhQzqb6ZNZA/s640/1b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Enter an appliance
name and inventory location.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When you deploy
appliances, use a different name for each one, and do not include
non-alphanumeric characters such as underscores ( _ ) in names.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7g-GUv1JwujzuPUC8wSMVRuqBhczDhTo2WGYTCbr_MOIXXwIWjnLTC2i8hkR3NUJ0D_UHUlEIJlJZQqDISXMEDZD6BsxazsN4ZeRyY8UCK6yZyPRbHQKSYjhd6bW2LaG44dl8HbGCocY/s1600/2b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;562&quot; data-original-width=&quot;960&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7g-GUv1JwujzuPUC8wSMVRuqBhczDhTo2WGYTCbr_MOIXXwIWjnLTC2i8hkR3NUJ0D_UHUlEIJlJZQqDISXMEDZD6BsxazsN4ZeRyY8UCK6yZyPRbHQKSYjhd6bW2LaG44dl8HbGCocY/s640/2b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Select the host and
cluster in which the appliance will reside.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE2fpiuUzzXgqD_I6b_slKHvqKzXieV_DPv4gWUxZA7mxyVoMBWo1zC7gGsTaWm6GkkDPU-PtMwiHtzkFttr_djMkvVOClxl9KFyfWJ4xB4VLHoZBVnsSejCvN4xTP_tTDPJVDykclNOo/s1600/3b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;564&quot; data-original-width=&quot;966&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE2fpiuUzzXgqD_I6b_slKHvqKzXieV_DPv4gWUxZA7mxyVoMBWo1zC7gGsTaWm6GkkDPU-PtMwiHtzkFttr_djMkvVOClxl9KFyfWJ4xB4VLHoZBVnsSejCvN4xTP_tTDPJVDykclNOo/s640/3b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJXFUpjvNrlJ5GxeC4XPLtdUr_nmDcLK5eo8AobkbX27W9FpDzA9dYUzTdT05UlWp1XTA6VkU4eiGNL_dffrB3o02zV_9opnU4cpNqGH4Wglbc3DS-D1itUMPYGBqAg7J9en2gRvPsHrU/s1600/4b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;560&quot; data-original-width=&quot;964&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJXFUpjvNrlJ5GxeC4XPLtdUr_nmDcLK5eo8AobkbX27W9FpDzA9dYUzTdT05UlWp1XTA6VkU4eiGNL_dffrB3o02zV_9opnU4cpNqGH4Wglbc3DS-D1itUMPYGBqAg7J9en2gRvPsHrU/s640/4b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Read and accept the
end-user license agreement.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8a6yj0BEfa3bqdahfP6JuEqvddU5fWxRyh3z9O5fgDrevDvuHEZt3MUn3YythUZAOoqi3Txxw0LSDLKpatAy5trSo9Jc7WHpuH_qzUxQEJkWbCGO8DYwemsQS0F-UfuoFtLGBdqB6xw/s1600/5b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;562&quot; data-original-width=&quot;958&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8a6yj0BEfa3bqdahfP6JuEqvddU5fWxRyh3z9O5fgDrevDvuHEZt3MUn3YythUZAOoqi3Txxw0LSDLKpatAy5trSo9Jc7WHpuH_qzUxQEJkWbCGO8DYwemsQS0F-UfuoFtLGBdqB6xw/s640/5b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Select the storage
that will host the appliance.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Select a disk
format.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Thick formats
improve performance, and thin formats save storage space.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Format does not
affect appliance disk size. If an appliance needs more space for data, add disk
by using vSphere after deploying.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRtGiMz79j70MDEi25N8Xm9RSqXydLDMR-NIFRkIxTaTJbhOrbi6JUxicf1xX1XHrTEyZLfNkH5INBmIXvmGT13L_UMmOIou4j-J4VSWQG7tFVSlHXFONzBhVv_bOVZ5ons3v4ozaeQkw/s1600/6b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;558&quot; data-original-width=&quot;964&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRtGiMz79j70MDEi25N8Xm9RSqXydLDMR-NIFRkIxTaTJbhOrbi6JUxicf1xX1XHrTEyZLfNkH5INBmIXvmGT13L_UMmOIou4j-J4VSWQG7tFVSlHXFONzBhVv_bOVZ5ons3v4ozaeQkw/s640/6b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;!--StartFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;From
the drop-down menu, select a Destination Network.&lt;!--EndFragment--&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc8zg3wn0Q_A_gA3qHWV49MrsY8hPRFSnPp68wg8ZNSVsvBudtAr1OHGbC9d93LBXjBFC2f90MI2MxXa6QJ_li9StRmd3dwMxiQqVKq36wiCn2F55WibapzMDt1kgvGspmUeIf8d9Cqn8/s1600/7b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;560&quot; data-original-width=&quot;966&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc8zg3wn0Q_A_gA3qHWV49MrsY8hPRFSnPp68wg8ZNSVsvBudtAr1OHGbC9d93LBXjBFC2f90MI2MxXa6QJ_li9StRmd3dwMxiQqVKq36wiCn2F55WibapzMDt1kgvGspmUeIf8d9Cqn8/s640/7b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Complete the
appliance properties.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Enter and confirm a
root password.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The root account
credentials log you in to the browser-based administration interface hosted by
the appliance, or the appliance operating system command-line console.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Select whether or
not to allow remote SSH connections to the command-line console.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Disabling SSH is
more secure but requires that you access the console directly in vSphere
instead of through a separate terminal client.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;For Hostname, enter
the appliance FQDN.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;For best results,
enter the FQDN even if using DHCP.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Note:&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;vRealize Automation
supports DHCP, but static IP addresses are recommended for production
deployments.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In Network
Properties, when using static IP addresses, enter the values for gateway,
netmask, and DNS servers. You must also enter the IP address, FQDN, and domain
for the appliance itself, as shown in the following example.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7KRtD1EAf55GNQtJs-fVoBW4SwMGvKWaaTwntLLzDI7SjtW4r4lh9xiNMz2d2VA0chwCdAXQ4VOb2u9xPG2zhKTvKYI6QeyidziIbpsK9aRYwQ0MlqU32raMYF-erWbQTWBPQW5Te_I/s1600/8b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;566&quot; data-original-width=&quot;962&quot; height=&quot;376&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7KRtD1EAf55GNQtJs-fVoBW4SwMGvKWaaTwntLLzDI7SjtW4r4lh9xiNMz2d2VA0chwCdAXQ4VOb2u9xPG2zhKTvKYI6QeyidziIbpsK9aRYwQ0MlqU32raMYF-erWbQTWBPQW5Te_I/s640/8b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Review the settings and submit the request&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi6Zhoy0F6-WyLOQDsjXHY8yfKG8XJtyCa1nHinyxs_lyww79DsrtlKbvDww8PkB7DJxQQq5afYXio69N_mvORhaf8lUixrZXarc0HoInLa2vdqmAHbKgHlibF1Vpnk3Iwo-lrukOx1Lk/s1600/9b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;564&quot; data-original-width=&quot;962&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi6Zhoy0F6-WyLOQDsjXHY8yfKG8XJtyCa1nHinyxs_lyww79DsrtlKbvDww8PkB7DJxQQq5afYXio69N_mvORhaf8lUixrZXarc0HoInLa2vdqmAHbKgHlibF1Vpnk3Iwo-lrukOx1Lk/s640/9b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When you submit the request the deployment work flow starts. This workflow firstly deploys the appliance and once the deployment finishes the VM will be powered ON. You can watch the installation/initialisation steps in the console.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCE_2oTw-l0M3ToZHWYhCPkeGs0Vb6B2pWMCj4hyphenhyphenAThYt3A0r1TMV1pzBCCNzD3BSs5l6kMVswtNqLGcOBybJWAno8Roq5oEkUJ6r8E65H7yC9pwvnl5i_Oprt6nBxeoyHR2zuTsLORaI/s1600/10b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;662&quot; data-original-width=&quot;994&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCE_2oTw-l0M3ToZHWYhCPkeGs0Vb6B2pWMCj4hyphenhyphenAThYt3A0r1TMV1pzBCCNzD3BSs5l6kMVswtNqLGcOBybJWAno8Roq5oEkUJ6r8E65H7yC9pwvnl5i_Oprt6nBxeoyHR2zuTsLORaI/s640/10b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The initial setup would take few minutes and VM lands in initial/welcome screen.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJxEi_ih5NWO-1vpsHb1AL840OHuubns4NrSOTGCr8PmA48s7X-dItu8gIir-GzNVrhMNlVM079CZ3abJFkXqxbuPWMmN9QJSJiAd7XiZDVB3ZNNxaZyTo9bCUNTq2QQ9VmEZAwRFekrQ/s1600/11b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;878&quot; data-original-width=&quot;1600&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJxEi_ih5NWO-1vpsHb1AL840OHuubns4NrSOTGCr8PmA48s7X-dItu8gIir-GzNVrhMNlVM079CZ3abJFkXqxbuPWMmN9QJSJiAd7XiZDVB3ZNNxaZyTo9bCUNTq2QQ9VmEZAwRFekrQ/s640/11b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Start the wizard by
logging in as root to the vRealize Automation appliance administration
interface.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;!--StartFragment--&gt;







&lt;!--EndFragment--&gt;&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;a href=&quot;https://vrealize-automation-appliance-fqdn:5480/&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;https://vrealize-automation-appliance-FQDN:5480&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgamEOXl7be5OIfR3h_OgmcIeuQ69lAGHYza2iGWFkuJgljsHdpsz4ZoDLuzl_l5dqEDwMrPgzTxOgreC_izld30Zmp98lXPGjS4kCosxCCLKkbMr7O6fG2eaBE0iYsopPixfCkcP_U8t0/s1600/12b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;384&quot; data-original-width=&quot;922&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgamEOXl7be5OIfR3h_OgmcIeuQ69lAGHYza2iGWFkuJgljsHdpsz4ZoDLuzl_l5dqEDwMrPgzTxOgreC_izld30Zmp98lXPGjS4kCosxCCLKkbMr7O6fG2eaBE0iYsopPixfCkcP_U8t0/s640/12b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As you login, the vRealize automation appliance configuration wizard starts,&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4sab-LUEha-m5G5Lp22xdbjUBUu9pnVPjpvkmxzlex4MxhGinh8nkLiUJb5xIj9PzRJnMRth2NCyuz8NgqMcoWvQQyNFbknIT4DpK9u2oWK9o8ZrFwmqlMkhzzboUib840kqRwcZNikU/s1600/13b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1006&quot; data-original-width=&quot;1548&quot; height=&quot;414&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4sab-LUEha-m5G5Lp22xdbjUBUu9pnVPjpvkmxzlex4MxhGinh8nkLiUJb5xIj9PzRJnMRth2NCyuz8NgqMcoWvQQyNFbknIT4DpK9u2oWK9o8ZrFwmqlMkhzzboUib840kqRwcZNikU/s640/13b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Accept the license agreement&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg2rus8eZMCynGps1dymG0r629GQLYNOR4zVeH9hYowFuzSaZB5IIwG2PLUa0VbqR-jbXAp5YQ4I6ACrg7M8lrq1H8erVs8n1OMtDv1-SL21B2ZnnexK8hw-zNVt1DD8BNyXfhsofcAMQ/s1600/14b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1006&quot; data-original-width=&quot;1544&quot; height=&quot;416&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg2rus8eZMCynGps1dymG0r629GQLYNOR4zVeH9hYowFuzSaZB5IIwG2PLUa0VbqR-jbXAp5YQ4I6ACrg7M8lrq1H8erVs8n1OMtDv1-SL21B2ZnnexK8hw-zNVt1DD8BNyXfhsofcAMQ/s640/14b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--StartFragment--&gt;

&lt;br /&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;On the Deployment
Type page, you decide which vRealize Automation components, and how many of
each, you want to install.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Minimal&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Minimal deployments
use just one vRealize Automation appliance and one Windows server that hosts
IaaS components. In minimal deployments, you may host the IaaS database on a
separate SQL Server system, or install SQL on the IaaS Windows server.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;You cannot convert a
minimal deployment to an enterprise deployment. To scale a deployment up, start
with a small enterprise deployment, and add components to that. Starting with a
minimal deployment is not supported.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Enterprise&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Enterprise
deployments involve multiple, separate appliances and Windows hosts, typically
with load balancing. Enterprise deployments also permit you to host the IaaS
database on a separate SQL Server system or on one of the IaaS Windows servers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When you select an
enterprise deployment, additional Installation Wizard pages appear in the
summary list at the left of the wizard.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Infrastructure as a
Service&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The Infrastructure
as a Service (IaaS) option selects whether or not to configure existing Windows
machines with vRealize Automation modeling and provisioning capabilities.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When you select
IaaS, additional Installation Wizard pages appear in the summary list at the
left of the wizard.&lt;/span&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9qh4Nkn7_p_Y19G09ggJi6dX7o9XWGv9A7ConQeLzZot6-_r04rJNSMbq_CLxtZXtTtik-OOghYC8RjFwsrmK1rxeuEHqepLAXfkZ0TL2jfSQ6yUEzudEiMUUhbewqKqC7LkXHwO_W1s/s1600/15b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1002&quot; data-original-width=&quot;1548&quot; height=&quot;414&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9qh4Nkn7_p_Y19G09ggJi6dX7o9XWGv9A7ConQeLzZot6-_r04rJNSMbq_CLxtZXtTtik-OOghYC8RjFwsrmK1rxeuEHqepLAXfkZ0TL2jfSQ6yUEzudEiMUUhbewqKqC7LkXHwO_W1s/s640/15b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmcaHDMhIJOesTQfmNktswWdxh53awlhyphenhyphen0Hc__Vj7MMhm_o_YteAwl3Upz54xZJ-n2DSJHYE3kMaGnmIYLCyLd7F_eFyap6Cms3_XG443XDApd_98YqYXEyN2j5faACbQM7rQge5rMRFY/s1600/16b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1540&quot; height=&quot;414&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmcaHDMhIJOesTQfmNktswWdxh53awlhyphenhyphen0Hc__Vj7MMhm_o_YteAwl3Upz54xZJ-n2DSJHYE3kMaGnmIYLCyLd7F_eFyap6Cms3_XG443XDApd_98YqYXEyN2j5faACbQM7rQge5rMRFY/s640/16b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;color: black; margin: 0in;&quot;&gt;
&lt;span style=&quot;background: #FAFAFA; font-family: Georgia, Times New Roman, serif; font-weight: bold;&quot;&gt;IaaS&amp;nbsp;Windows Servers&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #212529; margin: 0in;&quot;&gt;
&lt;span style=&quot;background: #FAFAFA; font-family: Georgia, Times New Roman, serif;&quot;&gt;For a Windows machine to serve as
an&amp;nbsp;IaaS&amp;nbsp;component host, you must download and
install&amp;nbsp;vCAC-IaaSManagementAgent-Setup.msi&amp;nbsp;on the Windows machine.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #212529; margin: 0in;&quot;&gt;
&lt;span style=&quot;background: #FAFAFA; font-family: Georgia, Times New Roman, serif;&quot;&gt;Management Agent installation requires communication
with a running&amp;nbsp;vRealize Automation&amp;nbsp;appliance. Each time that you
install the Management Agent on Windows, that system becomes uniquely tied to
the specific appliance and deployment.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #212529; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;background: #FAFAFA;&quot;&gt;Potential&amp;nbsp;IaaS&amp;nbsp;Windows servers that have
the correct Management Agent installed appear under&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: #FAFAFA; font-weight: bold;&quot;&gt;Discovered Hosts&lt;/span&gt;&lt;span style=&quot;background: #FAFAFA;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;!--StartFragment--&gt;











&lt;!--EndFragment--&gt;&lt;br /&gt;
&lt;div style=&quot;color: #212529; margin: 0in;&quot;&gt;
&lt;span style=&quot;background: #FAFAFA; font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #212529; margin: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;background: #FAFAFA;&quot;&gt;To have the Installation Wizard ignore a discovered
host, click&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: #FAFAFA; font-weight: bold;&quot;&gt;Delete&lt;/span&gt;&lt;span style=&quot;background: #FAFAFA;&quot;&gt;. Deleting a Windows host does not remove its
Management Agent. To uninstall the agent, use the Add or Remove Programs
feature directly in Windows.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPci0Q9tidPBuiAtsHMUGkUNcy0GOnYaaxGemqwlK4XSnhfTyAxYyvUeepTX-RrdG6ki_ayIKKq6paz_xvvIIk2c2l4s2_LESfh3XTgwoSLC8kmCRzOkCKG7J8bYBbnJ6YQkRPD-q5Uw/s1600/17b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;998&quot; data-original-width=&quot;1546&quot; height=&quot;412&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPci0Q9tidPBuiAtsHMUGkUNcy0GOnYaaxGemqwlK4XSnhfTyAxYyvUeepTX-RrdG6ki_ayIKKq6paz_xvvIIk2c2l4s2_LESfh3XTgwoSLC8kmCRzOkCKG7J8bYBbnJ6YQkRPD-q5Uw/s640/17b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP4EyR0aF_RJvV2IqsCHPfFsiDOkw6mZWr2xHZsk-QyHFMz_3l7HEmgfinSARQE2mi66XQJU4199Fe4nYI5rhF_soHHszED33ite4xpy3PoIgQosYCj24vTH1n9KnIzbimKJOx9hqIYcc/s1600/18b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;314&quot; data-original-width=&quot;850&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP4EyR0aF_RJvV2IqsCHPfFsiDOkw6mZWr2xHZsk-QyHFMz_3l7HEmgfinSARQE2mi66XQJU4199Fe4nYI5rhF_soHHszED33ite4xpy3PoIgQosYCj24vTH1n9KnIzbimKJOx9hqIYcc/s640/18b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Start the agent installation in the windows machine to finish the agent setup&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifheQ9hrxFiJfCLbpY4Mtvmhv_aOHbmLf115C_1Db2hI-L9FO05jkunyM-snApX1cGxmmI_NHVtDwYMACmaEAzBpu3m72kbnUHpXsT1PvZMLdlTXF_Tlo1HT2gmtGUEuGVCzGRW6urkPA/s1600/19b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;652&quot; height=&quot;498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifheQ9hrxFiJfCLbpY4Mtvmhv_aOHbmLf115C_1Db2hI-L9FO05jkunyM-snApX1cGxmmI_NHVtDwYMACmaEAzBpu3m72kbnUHpXsT1PvZMLdlTXF_Tlo1HT2gmtGUEuGVCzGRW6urkPA/s640/19b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9aERQOInDCqaiTamttPbXNNaT5F-D95jhxEbv6zcoTCDtWV7qJAaBhusZdgCxXlpoUBsXlpEKTYih46W37G0FPr6E39qTHpAz2dMe19dSGfQD6u9CkSMLCVUXpplEd7O1CDZj7BkerdI/s1600/20b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;652&quot; height=&quot;498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9aERQOInDCqaiTamttPbXNNaT5F-D95jhxEbv6zcoTCDtWV7qJAaBhusZdgCxXlpoUBsXlpEKTYih46W37G0FPr6E39qTHpAz2dMe19dSGfQD6u9CkSMLCVUXpplEd7O1CDZj7BkerdI/s640/20b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Location to install the agents&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLvsowVf-m2-cJJmT5p03tUUrsDbixtalmN2I7va-i8KxNBD8a-32x2kLnNLocFBGVKa3GdJTvuCWuKVPxxY0d5Oe-q5yenhR7DG7vZBjb__xGYqyWLSdEE2KFQ3ihnuNHNHeDJ3OAaGs/s1600/21b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;652&quot; height=&quot;498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLvsowVf-m2-cJJmT5p03tUUrsDbixtalmN2I7va-i8KxNBD8a-32x2kLnNLocFBGVKa3GdJTvuCWuKVPxxY0d5Oe-q5yenhR7DG7vZBjb__xGYqyWLSdEE2KFQ3ihnuNHNHeDJ3OAaGs/s640/21b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Suffice the details of the vRA appliance , credentials to login to the vRA and also the certificate ( if you use custom certs then the host names should match the windows instance)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinguE4YQJFWsYGVuj4h6qPuPvIkfB_-7hgDvBlP-p5Ft2b39VjCuH2vBMQeMfFwIkG0QWxERRvnZbXIbvYoHQd0sR3o6W-nT2h1hzW7eR85ENwD8pN81jKVBCchhnP21diofw8YfIoWAY/s1600/22b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;652&quot; height=&quot;498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinguE4YQJFWsYGVuj4h6qPuPvIkfB_-7hgDvBlP-p5Ft2b39VjCuH2vBMQeMfFwIkG0QWxERRvnZbXIbvYoHQd0sR3o6W-nT2h1hzW7eR85ENwD8pN81jKVBCchhnP21diofw8YfIoWAY/s640/22b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Service account details of the local windows instance/account&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijEVBloUs9PWY57_b1dkGqmPHa3zZAYFW1tP95MG3pOZgPAOF94zHXGAh8JDIZU7q1fnJ10Wq89m9B-N-6fPL1TBWQ_QvCL1V-pCrhGBfRlKL5uwmzhcyuWfKndYcQ2Qm9VAGY1BN4vxs/s1600/23b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;650&quot; height=&quot;500&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijEVBloUs9PWY57_b1dkGqmPHa3zZAYFW1tP95MG3pOZgPAOF94zHXGAh8JDIZU7q1fnJ10Wq89m9B-N-6fPL1TBWQ_QvCL1V-pCrhGBfRlKL5uwmzhcyuWfKndYcQ2Qm9VAGY1BN4vxs/s640/23b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTrvqYyII1AZdiLM8lziKEYsAtQnaBElC5wSOBN8TL8d3SSO03jGHuRe_-mSU-GsHKM9ut8gXHwtkAln9kSx9CYrcfyMAmqShRlSSSia8K2H90hIaNux2H08ag-G1x9YrFfW1nEeWA0aA/s1600/24b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;650&quot; height=&quot;504&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTrvqYyII1AZdiLM8lziKEYsAtQnaBElC5wSOBN8TL8d3SSO03jGHuRe_-mSU-GsHKM9ut8gXHwtkAln9kSx9CYrcfyMAmqShRlSSSia8K2H90hIaNux2H08ag-G1x9YrFfW1nEeWA0aA/s640/24b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNCW4RR1TkIVizzWI4pMIyn7_e0SLp55gnsrIbhws5es52GjWfvkax4Uobp2ZEg_E8ne922PYEa0GR_ncPm_ePmBiPmlutlvk27mztukQ9Hoa4DABYn23kQi-ECfPjvT1CRdJLQw19f8o/s1600/26b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;650&quot; height=&quot;500&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNCW4RR1TkIVizzWI4pMIyn7_e0SLp55gnsrIbhws5es52GjWfvkax4Uobp2ZEg_E8ne922PYEa0GR_ncPm_ePmBiPmlutlvk27mztukQ9Hoa4DABYn23kQi-ECfPjvT1CRdJLQw19f8o/s640/26b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Once the installation finishes, switch back to the vRA 7.5 configuration wizard and look for the agent status.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_1SqzM-A-V_hqIduU4uPPJLhanJA9XEsqh6V3fk5GbRCTStJdBAB934hl6jEdW4GTvEJCYD-_i-HHHyZeW-jIzsyhOhnYiVvCfkAxH85D84jmOKjIVICwijRQznLAKLGGl_NClLGAhGI/s1600/27b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;994&quot; data-original-width=&quot;1540&quot; height=&quot;411&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_1SqzM-A-V_hqIduU4uPPJLhanJA9XEsqh6V3fk5GbRCTStJdBAB934hl6jEdW4GTvEJCYD-_i-HHHyZeW-jIzsyhOhnYiVvCfkAxH85D84jmOKjIVICwijRQznLAKLGGl_NClLGAhGI/s640/27b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As above you would be able to see the last sync details of the agent with the vRealize automation appliance.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Proceed with the configuration of Iaas and the DB. Further steps are pretty much easier as like the previous versions and I would cover the screen shots in the next thread.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;To be continued ......&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/3002213452642510618'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/322570517117772700/posts/default/3002213452642510618'/><link rel='alternate' type='text/html' href='http://www.myitblog.in/2018/10/vra-75-installation-steps-back-to-basics.html' title='vRA 7.5 Installation steps - Back to Basics'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhznHQ_1_DzNoe2Ba0dMWRkESUgNcdqZruN4qnILp-MKrZOSYtwskaEBDwzaHNIDDpr2_GQsG1SPY4C1Gr6a0cygV_DroWKWWFeR5Whfs0k1PpgnJJVer6o_lel9INexWEQhQzqb6ZNZA/s72-c/1b.jpg" height="72" width="72"/></entry></feed>