VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
VMworld 2013
Archish Dalal, VMware
Nikhil Kelshikar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX provides a platform for deployment of software-defined network (SDN) and network function virtualization (NFV) services across physical network devices in a way that is analogous to server virtualization.
VMworld 2013: vSphere Distributed Switch – Design and Best Practices VMworld
VMworld 2013
Vyenkatesh (Venky) Deshpande, VMware
Marcos Hernandez, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
VMworld 2013
Archish Dalal, VMware
Nikhil Kelshikar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX provides a platform for deployment of software-defined network (SDN) and network function virtualization (NFV) services across physical network devices in a way that is analogous to server virtualization.
VMworld 2013: vSphere Distributed Switch – Design and Best Practices VMworld
VMworld 2013
Vyenkatesh (Venky) Deshpande, VMware
Marcos Hernandez, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013
Jerry Breaud, VMware
Allen Shortnacy, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Virtual SAN Technical Best Practices VMworld
VMworld 2013
Cormac Hogan, VMware
Kiran Madnani, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
2016年6月25日に開催されたHyper-Converged Infrastructure Community Meetup #3にて発表した、EMC/VCEVxRack及びVBlockの製品説明資料です。
This is EMC/VCE VxRack and VBlock product presentation for HCI Community meetup #3. This presentation is written in Japanese.
VMware Site Recovery Manager - Architecting a DR Solution - Best Practicesthephuck
This was the slide deck from the Philadelphia VMUG User Conference for the VMware Site Recovery Manager - Architecting a DR Solution session on May 15th, 2014.
VMworld 2013: An Introduction to Network Virtualization VMworld
VMworld 2013
Thomas Kraus, VMware
Eric Lopez, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld
VMworld 2013
Richard Cockett, VMware
Umesh Goyal, VMware Software India Pvt ltd
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud
In this workshop VMware will provide a quick reminder of the main contributions of the NSX network virtualization platform: consistent network and security management, increased application resiliency, rapid migration of workloads to and from the cloud.
VMware and OVH will then move on to practical cases with implementation of micro-segmentation, dynamic routing, automatic deployment of an application, load balancing in the OVH Hosted Private Cloud. This workshop is aimed at a technical audience.
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
Tutorial at ONUG Spring 2015 on Network and Service Virtualization. The tutorial covers three converging trends 1) Network virtualization, 2) Service virtualization, 3) overlay networking for Docker and OpenStack. The talk concludes with pointers to the hands-on portion of the tutorial that uses LorisPack, and the operational lessons learned.
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Dan Mihai Dumitriu
OpenStack deployments for public or private clouds require overlay networking. Due to the scale and rate of change of virtual resources, it isn't practical to rely on traditional network constructs and isolation mechanims. Today's deployments require performance, resilience, and high availability to be considered truly production-ready. In this session, we deep dive into the MidoNet architecture, and process of sending a data packet across an OpenStack environment through a network overlay. A distributed architecture implements logical constructs that are used to build networks without a single point of failure, all while adding network functionality in a highly-scalable manner. Network functions are applied in a single virtual hop. By applying network services right at the ingress host, the network is free from unnecessary clogging and bottlenecks by avoiding additional hops. Packets reach their destination more efficiently with the single virtual hop. After this session, the audience will understand how distributed architectures allow efficient networking with routing decisions and network services applied at the edge. Also, the audience will understand how it is easier to scale clouds when the network intelligence is distributed.
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...VMworld
VMworld 2013
Srinivas Nimmagadda, VMware
Shadab Shah, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
The popularity of Virtual SAN is growing daily. Server admins are finally free to aggregate storage in their servers to create a shared storage system that scales with their compute needs. The underlying key to making it all work is networking. All Virtual SAN data flows through it, and correct selection and configuration of networking components will mean the difference between disruptive success or dramatic failure. This session will give deep insight in the do's and don'ts of Virtual SAN networking. Best practices for physical and virtual switch configuration and performance testing will be discussed. Virtual SAN 5.5 and 6.0 will be covered, and the networking differences discussed. Methods of troubleshooting network issues will be covered. For those configuring a Virtual SAN network for the first time, for labs or enterprise scale, this session is a must-see.
VMware 2015: Next Horizon for Cloud Networking and SecurityVMworld
Software Defined Networking (SDN) and network virtualization has become an accepted part of modern data center architecture. The transformation of networking into a software industry has accelerated innovation and given rise to a number of new technologies and use cases that were previously impossible. Network virtualization is starting to have profound impact on services, security, the underlying physical networks and the organization of the IT organizations that use them. How will network virtualization impact the next horizon for cloud networking and security?
In this session Guido Appenzeller presents a tech-preview of NSX working with Docker Containers and Amazon Web Services (AWS). Additional speakers include Scott Lowe, Mukesh Hira and Jacob Cherkas from VMware and Suneet Nandwani from eBay.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
5. 55
Operational Impacts - Questions
If a Virtual Machine has a network outage where do I start?
How does network virtualization map to our operating model?
What tools exist to correlate logical and physical networks to
assist in troubleshooting?
What opportunities does network virtualization provide to improve
how we operate our environment?
Are we adding complexity
by adopting network
virtualization?
Does network virtualization
create a ‘black box’?
7. 77
Operational Impacts - Opportunities
All NSX components such as the NSX Controller, NSX vSwitch and
NSX Edge provide detailed network visibility and data
Simplify the underlying physical network
• One consistent physical transport network to manage for virtual machine traffic
• Greatly reduces the number of MAC/ARP table entries to manage
• Enables you to build the network you want, while still meeting application and
workload connectivity requirements
DC Networks
Centralized reporting and
monitoring, distributed
performance and scale
Designed for automation
• NSX is built on a REST API
provided by NSX Manager
• All operations can be performed
programmatically via scripting or
higher-level languages
8. 88
Operational Impacts - Examples
If a Virtual Machine has a network outage where do I start
to troubleshoot?
Before Network Virtualization:
• Validate VLAN trunk configuration across multiple devices and ports
• Verify VM visibility on each path of the network
• Troubleshooting requires accessing different devices and interfaces
• vSphere Web Client
• Hypervisor CLI
• Access Switch CLI
• Distribution Switch CLI
• Firewall
• Load Balancer
• These devices are typically managed by different teams
• Virtualization Administrators
• Network Administrators
• Security Administrators
• Service Providers
9. 99
Operational Impacts - Examples
After Network Virtualization:
• VXLAN network tests determine if the issue is related to the transport network
• If VTEPs are reporting issues, engage the network team to troubleshoot physical
transport network
• Provide VTEP IP/MAC information
• Otherwise virtualization team validates VM logical networking
• Verify NSX Components and Controller state information
• Verify Source and Destination Hypervisors
• Enhanced toolset is available for troubleshooting
• Reduced number of components and resources required
• NSX components can be queried or configured via REST API
11. 1111
NSX for vSphere Components
Consumption
• Self Service Portal
• Cloud Management
• vCloud Automation Center
Data
Plane
NSX Edge
Services
Gateway
ESXi
VDS
Hypervisor Kernel Modules
FirewallDistributed
Logical Router
VXLAN
NSX vSwitch
• NSX Edge
• VM form factor
• Data Plane for North South
traffic
• Routing and Advanced
services
• NSX vSwitch
• Distributed network edge
• Line Rate performance
Management
Plane
NSX Manager
• Single point of configuration
• REST API and UI interface
vCenter Server
Control
Plane
NSX Controller • Manages Logical networks
• Run-time state
• Does not sit in the Data Path
• Control-Plane Protocol
NSX Edge
Logical Router User World Agent
12. 1212
Components – NSX Manager
• NSX for vSphere centralized management plane
• 1:1 mapping between an NSX Manager and vCenter Server
• Provides the management UI and API for NSX
• vSphere Web Client Plugin
• Deploys NSX Controller and NSX Edge Virtual Appliances (OVF)
• Installs VXLAN, Distributed Routing and Firewall kernel modules and UW
Agent on ESXi hosts
• Configures Controller
Cluster via a REST API
and hosts via a
message bus
• Generates certificates to
secure control plane
communications
13. 1313
Components – NSX Controller
A reliable and secure control plane to distribute VXLAN and Logical
Routing network information to ESXi hosts
NSX Controllers are clustered for scale out and high availability
Network information is sliced across nodes in a Controller Cluster
Enables dependency on multicast routing/PIM in the physical network to
be removed
Provides suppression of ARP broadcast traffic in VXLAN networks
VXLAN
Logical Router
VXLAN
Logical Router
VXLAN
Logical Router
Controller
VXLAN Directory
Service
MAC table
ARP table
VTEP table
14. 1414
Components – UW agent
UW agent is a TCP (SSL) client that communicates with the Controller using
the control plane protocol
May connect to multiple controllers
Mediator between the ESXi Hypervisor Kernel Modules and NSX Controllers
Also communicates with message bus agent to retrieve information from|
NSX Manager
Runs as a service daemon on ESXi: netcpa
• Logs to: /var/log/netcpa.log
Controller
Cluster
Controller Controller Controller
ESXi Host
Kernel
Modules
Client ClientUser World
Agent
LR
NSX
MGR
Client
VXLAN
15. 1515
Components – NSX vSwitch and NSX Edge
NSX vSwitch (VDS)
VMkernel Modules
VXLAN
Distributed Routing
Distributed Firewall
Switch Security
Message Bus
L3-L7 Services:
NAT, DHCP, LB, VPN, Interface based
FW
Dynamic Routing
VM form factor
High Availability
vSphere NSX Edge Services GW
Control Functions only
Dynamic Routing &
updates to Controller
Determines active ESXi
host for L2 Bridging
NSX Edge Logical Router
ESXi
VDS
Hypervisor Kernel Modules
(vSphere VIBs)
FirewallLogical RouterVXLAN
NSX vSwitch
NSX Edge
Services
Gateway
NSX Edge
Logical
Router
17. 1717
Operational Tools – ESXi
pktcap-uw
New with vSphere 5.5
Enhanced tool that provides a framework for packet capture and tracing at the
Uplink, vSwitch, vmknic, vnic and port level at any stage in a packet’s lifecycle
18. 1818
Operational Tools – ESXi
pktcap-uw
Extensive range of filters
such as source/destination
mac, IP, Protocol, VLAN,
VXLAN, ports etc.
Supports pcap format
output for use with protocol
analyzers such as
Wireshark
22. 2222
Operational Tools – NSX vSwitch Alarms
vSwitch Alarms allow for alerting on VDS related events. Some of the
available preconfigured Triggers include Health Status, Reconfiguration,
Port blocked, Port Deleted, Link Down and Host removal
SNMP Network MIBs provide standards based visibility of NSX vSwitch
objects
23. 2323
Operational Tools – NSX vSwitch Health Check
Network Health Check feature helps to detect common
configuration errors
Mismatched VLAN trunks between virtual switch and physical switch
Mismatched MTU setting between vNIC, virtual switch, physical adapter, and
physical switch ports.
Mismatched Teaming Configurations
vSphere admins can provide failure data to the Network admins to
facilitate problem resolution Health Check uses
L2 Echo protocol to
send Ethernet
broadcast frames to
the physical switch
If reply packets are
not received,
warnings are
highlighted in the
vSphere Web Client
24. 2424
vSphere Cluster B
UWA VTEP
UWA VTEP
UWA VTEP
Operational Tools – NSX Controller
Control Plane basics
ESXi hosts and NSX Edge Logical
Router VMs collect network
information, which is then reported
to the Controller via User World
Agent (UWA)
The NSX Controller CLI provides a
consistent, centralized interface to
verify VXLAN and Logical Routing
network state information
NSX Manager also provides APIs to
programmatically retrieve data from
the controller nodes
NSX Manager
NSX
Controller
Cluster
vSphere Cluster A
UWA VTEP
UWA VTEP
UWA VTEP
25. 2525
Operational Tools – NSX Controller VTEP Report
vSphere Host
VM
vSphere Distributed Switch
MAC1
Management
Network
10.20.10.10
vSphere Host
VM
MAC2
vSphere Host
Send VNI,VTEP
Mapping to
Controller
1
2
5
10
VXLAN 5001
3
VNI VTEP IP
5001 10.20.10.10
9
IP1 IP
2
Controller
VNI VTEP IP
5001 10.20.10.10
VNI VTEP IP
5001 10.20.10.11
10.20.10.11 10.20.10.12
11
6
7
VNI VTEP IP
5001
10.20.10.10
10.20.10.11
VNI VTEP IP
5001
10.20.10.10
10.20.10.11
48
10
VNI VTEP IP
5001
10.20.10.10
10.20.10.11
11
Report the new
VNI,VTEP
Mapping to the
Hosts
26. 2626
Operational Tools – NSX Controller
General NSX Controller troubleshooting
steps:
• Verify Controller cluster status and roles
• Verify Controller node network connectivity
• Check Controller API service
• Validate VXLAN and Logical Router mapping
table entries to ensure they are consistent
• Review source and destination netcpa logs and
CLI to determine control plane connectivity issues
between ESXi hosts & NSX Controller
The first set of commands relates to NSX
Controller CLI cluster status and health:
• nsx-controller # show control-cluster status
• nsx-controller # show control-cluster startup-
nodes
• nsx-controller # show control-cluster roles
• nsx-controller # show control-cluster connections
• nsx-controller # show control-cluster vnet core
stats
• nsx-controller # show network <arg>
• nsx-controller # show log cloudnet/cloudnet_java-
vnet-controller.<start-time-stamp>.log
27. 2727
Operational Tools – NSX Controller
General NSX Controller VXLAN operations:
• List VNIs
• VXLAN connection table
• Verify VXLAN VTEP, MAC and ARP mapping tables
• View VXLAN statistics
NSX Controller CLI VXLAN commands:
• # show control-cluster vnet vxlan vni <vni>
• # show control-cluster vnet vxlan connection-table <vni>
• # show control-cluster vnet vxlan vtep-table <vni>
• # show control-cluster vnet vxlan mac-table <vni>
• # show control-cluster vnet vxlan arp-table <vni>
• # show control-cluster vnet vxlan vni-stats <vni>
Note: VXLAN Logical Switches and Logical
Router instances are distributed across
Controller Nodes (slicing), so you will need to
run the CLI commands on the node which is
active for a given object
28. 2828
Operational Tools – NSX Controller
General NSX Controller Logical Routing operations:
• List Logical Router instances
• Verify Logical Router interface and route mapping tables
• Verify active controller connections
• View Logical Router statistics
NSX Controller CLI Logical Routing commands:
• # show control-cluster vnet logical-router instance-table <lr-id>
• # show control-cluster vnet logical-router lif-table <lr-id>
• # show control-cluster vnet logical-router route-table <lr-id>
• # show control-cluster vnet logical-router lr-stats <lr-id>
Note that the NSX Controller CLI is still not final
29. 2929
Operational Tools – VXLAN
Common VXLAN issues:
• Connectivity between VXLAN VTEPs on Transport Network
• MTU on Transport Network not set to 1600 bytes or greater
• Teaming mismatch between dvUplinks and upstream switch
• Preparation - either with the installation of VXLAN kernel modules or creation of VTEP VMkernel
interfaces
• ESXi host communication with Controller
NSX for vSphere provides a new workflow for preparation and configuration
Supports multiple VTEPs per host
NSX leverages the vSphere 5.5 multi-instance TCP/IP stack
30. 3030
Operational Tools – VXLAN
At Logical Switch level on the Monitoring Tab you can use the
unicast or broadcast test to verify the connectivity between VTEPs
VXLAN standard tests
with a 1600 byte MTU
31. 3131
Operational Tools – VXLAN
The VXLAN Replication Mode will also determine transport network
connectivity requirements
Unicast Mode
• All replication occurs using
unicast
Hybrid Mode
• Local replication offloaded to
physical network, while remote
replication occurs via unicast
Multicast Mode
• Requires IGMP for a Layer 2
topology and Multicast Routing
for L3 topology
All modes require an MTU of
1600 bytes
32. 3232
Operational Tools – VXLAN
VXLAN namespace for esxcli provides detailed network
information and statistics.
• # esxcli network vswitch dvs vmware vxlan list
• # esxcli network vswitch dvs vmware vxlan network list --vds-name=Compute_VDS
• # esxcli network vswitch dvs vmware vxlan network mac list –vds-name=Compute_VDS --
vxlan-id=5001
• # esxcli network vswitch dvs vmware vxlan network arp list --vds-name Compute_VDS --vxlan-id=5001
• # esxcli network vswitch dvs vmware vxlan network port list --vds-name Compute_VDS --vxlan-id=5001
• # esxcli network vswitch dvs vmware vxlan network stats list --vds-name Compute_VDS --vxlan-id=5001
33. 3333
Operational Tools – Logical Routing
Use the net-vdr command on
ESXi hosts to view Logical
Routing configuration and
statistics
• Display Logical Router instances
~ # net-vdr -I –l
• List Logical Interface and Routing
Tables
~ # net-vdr -l –lif <instance-name>
~ # net-vdr -l --route <instance-name>
LIFs and routes are pushed by the NSX
controller to the ESXi hosts and should
be consistent across the environment
• View L2 Bridging information
~ # net-vdr -b –mac <instance-name>
~ # net-vdr -l –stats <instance-name>
34. 3434
Operational Tools – NSX Edge Services
NSX Edge VM CLIs
• NSX Edge provides a familiar CLI command
set for troubleshooting network services
• Documented in a dedicated CLI guide
Sample Configuration Commands
• show configuration {ospf|bgp|isis|static-routing}
• show configuration {firewall|nat|dhcp|dns}
• show configuration {loadbalancer|ipec|sslvpn-plus}
Sample Status Commands
• show interface [IFNAME]
• show firewall
• show ip {route|ospf|bgp|forwarding}
• show arp
• show system {cpu|memory|network-stats|storage|uptime}
• show service {dhcp|dns|highavailability|ipsec|loadbalancer|sslvpn-plus}
35. 3535
Operational Tools – NSX Edge Services
API provides based statistics (for interfaces and services)
UI also provides interface statistics and graphs
37. 3737
Operational Tools – Flow Monitoring
Flow monitoring provides vNIC level visibility of VM traffic flows
Reporting on Top Flows, Destinations and Sources
Detailed Flow Data for both Allowed and Blocked Flows
38. 3838
Operational Tools – Flow Monitoring
Flow data easily available through UI or via API for orchestration
Per flow granularity for Allowed and Blocked with ability to add or
edit firewall rules related to the flow.
39. 3939
Operational Tools – NSX Manager
Perform Backup & Restore
operations (both scheduled
and on-demand)
NSX Manager Appliance
Upgrades
Verify status of NSX
Manager Services
Generate Tech support logs
View appliance CPU,
Memory and Disk usage
40. 4040
Operational Practices – vCenter Operations Manager
Dashboard based view of environment
Monitor overall health of NSX vSphere Management and Control
Layer components and diagnose issues quickly
Networking and Security metrics
42. 4242
Operational Practices – Log Insight
Consolidation, visualization, and correlation of syslog data from
multiple related components in a Software Defined Datacenter
Build Custom Dashboards for real time monitoring and trending
Customize Log interpretation Logic to parse using regex, int, str
43. 4343
Operational Tools – REST API
NSX Manager exposes web service API over HTTPS (TCP 443)
API request and response data is formatted in XML
Simple “single-user” authentication using password
REST principles:
• Leverages HTTP to send data between Clients and Servers (Requests and Responses)
• Resources, Global Permanent Identifiers, Constraints
45. 4545
NSX for vSphere Demonstrations
1. Packet capture of encapsulated VXLAN frames
2. Flow Monitoring
46. 4646
Key Takeaways & Best Practices
VMware NSX provides a unified platform for administering,
monitoring, and supporting your virtual networks and services
NSX enables a similar operational model for virtual networks as
vSphere does for virtual machines
Moving network features to logical space simplifies physical
networks and troubleshooting
Start with the basics when troubleshooting (transport network and
control plane)
Understanding the component interactions and toolset is key to
NSX operations
Enable logging on all components ‘before’ you have issues and
familiarize yourself with how to collect support logs
Automate repeatable steps via the REST API to reduce error
Take the NSX for vSphere Hands on Lab: HOL-SDC-1303 to
reinforce concepts from this session
49. 4949
Network Virtualization - Operations
• Overall Logical network
health/stats
• VM to VM connectivity
• Per VM flow visibility
• Traffic Analysis – Packet
Capture
• Transport/Tunnel health
• Inventory/Fault Mgmt
• Multi-level Logging, Event
tracking and Auditing
• Physical network
troubleshooting/visibility
• Upgrade Management
Cloud Ops or Network Ops
vSwitch
NSX EdgeESXi ESXi ESXi ESXi
vSwitch vSwitch vSwitch vSwitch
L2
Logical Topology
L2
WAN/Inter
net
What are the key capabilities required for
operating a Logical world?
Controller Cluster
NSX Manager
50. 5050
NSX Operations – Capabilities
NSX Optimized for vSphere
Logical Network Health
UI: NSX Manager
CLI: Central NSX Controller, NSX Edge
VM to VM connectivity (Logical) NSX Controller Central CLI, Host level CLI
Traffic Flow visibility
IPFIX (VDS)
NSX Edge – Flow Monitoring
Traffic Analysis per VM
RSPAN/ERSPAN (VM Traffic)
Host Packet Capture (Overlay)
Network Inventory, Fault Management NSX Manager, SNMP (MIBS for ports, Switch etc)
Multi-level logging, Event tracking &
Auditing
Syslog Export (NSX controller, NSX Manager, NSX
Edge etc.)
Transport (Overlay) Health
NSX Manager Connectivity Check
NSX Controller Central CLI, Per host CLI
Upgrade Management
NSX Manager (Automated VIB and Controller
upgrades)
API visibility NSX Manager API
External Tools Custom, VCOPs, Log Insight
51. 5151
NSX System Architecture
Cloud Management System
vCenter Server NSX Manager
Management Plane
Control Plane
NSX Edge
Logical
RouterNSX Controller
Data Plane
NSX Edge
Services
Gateway
VXLAN DR DFWSecurity VXLAN DR DFWSecurityVXLAN DR DFWSecurity
vSphere API
MessageBus
vSphereAPI
REST API
NSX vSwitch
Control Plane Protocol
Control Plane
Protocol
REST APIvSphere API
UWA
CP Protocol
52. 5252
Control Plane Protocol
Control plane protocol
• All messages are TLVs
• Categorized into primitives:
• Connection management, negotiation, etc:
• Hello, bye, keepalive
• App specific:
• Open, close, notification, update, query
• Extensible.
• App ID in message common header.
VXLAN sub protocol
• Update and query messages contains one
or more TLVs for different data types:
VM IP, VM MAC, VTEP
53. 5353
VXLAN Control Plane Security
UW
Agent
VTEP
UW
Agent
VTEP
UW
Agent
VTEP
vSphere Cluster B
UW
Agent
VTEP
UW
Agent
VTEP
UW
Agent
VTEP
vSphere Cluster A
Controller Cluster
NSX Manager DB
1
Certificate
Generation
2
OVF
Deployment3 Message Bus
4 REST API
NSX Manager
5 SSL 5 SSL
5 SSL
54. 5454
Operational Practices – NSX Controller MAC Report
vSphere Host
VM
vSphere Distributed Switch
MAC1
Management
Network
10.20.10.10
vSphere Host
VM
MAC2
vSphere Host
Send VNI,VM
MAC Mapping
and VTEP IP to
Controller
1
2
5 VXLAN 5001
3
IP1 IP
2
Controller
VNI VM MAC
5001 MAC1
VNI VM MAC
5001 MAC2
10.20.10.11 10.20.10.12
6
7
48
VNI VM MAC VTEP
5001 MAC1 10.20.10.10
VNI VM MAC VTEP
5001 MAC1
10.20.10.1
0
5001 MAC2
10.20.10.1
1
55. 5555
Operational Tools – NSX Controller IP Report
vSphere Host
VM
vSphere Distributed Switch
MAC1
Management
Network
10.20.10.10
vSphere Host
VM
MAC2
vSphere Host
Send VM MAC,
IP Mapping and
VNI to Controller
1
2
5 VXLAN 5001
3
IP1 IP
2
Controller
VNI
VM
IP
VM
MAC
5001 IP1 MAC1
VNI
VM
IP
VM
MAC
5001 IP2 MAC2
10.20.10.11 10.20.10.12
6
7
48
VNI VM IP VM MAC
5001 IP1 MAC1
VNI VM IP VM MAC
5001 IP1 MAC1
5001 IP2 MAC2
56. 5656
Controller Based VXLAN – ARP Request
vSphere Host
VM
vSphere Distributed Switch
MAC1
Management
Network
10.20.10.10
vSphere Host
VNI
VM
IP
VM
MAC
VTEP
5001 IP1
MAC
1
10.20.10.1
0
VM
MAC2
vSphere Host
1
2
VXLAN 5001
3
IP1 IP2
Controller
10.20.10.11 10.20.10.12
6 5
VNI
VM
IP
VM
MAC
VTEP
5001 IP1 MAC1 10.20.10.10
5001 IP2 MAC2 10.20.10.11
4
PayloadL2
DA: Broadcast
SA: MAC1
ARP Request for
VM IP2 sent to
Controller
ARP Report for
VM IP2, MAC2
sent to VTEP
10.20.10.10
VNI
VM
IP
VM
MAC
VTEP
5001 IP1 MAC1 10.20.10.10
5001 IP2 MAC2 10.20.10.11
57. 5757
Controller Based VXLAN – Communication after ARP Resolution
vSphere Host
VM
vSphere Distributed Switch
MAC1
VXLAN Transport
Network
10.20.10.10
vSphere Host
VM
MAC2
vSphere Host
7
8
VXLAN 5001
IP1 IP2
Controller
10.20.10.11 10.20.10.12
9
VNI
V
M
IP
VM
MAC
VTEP
5001 IP1 MAC1 10.20.10.10
5001 IP2 MAC2 10.20.10.11
PayloadL2
DA: MAC2
SA: MAC1
L2 IP UDP VXLAN PayloadL2
DA: 10.20.10.11
SA: 10.20.10.10
5001
10
DA: MAC1
SA: MAC2
VNI
VM
IP
VM
MAC
VTEP
500
1
IP1 MAC1 10.20.10.10
500
1
IP2 MAC2 10.20.10.11
VNI
VM
IP
VM
MAC
VTEP
500
1
IP2 MAC2 10.20.10.11
VNI
VM
IP
VM
MAC
VTEP
500
1
IP2 MAC1 10.20.10.11
500
1
IP1 MAC2 10.20.10.10
58. 5858
Operational Tools – NSX Edge Services
Download Edge Gateway Tech Support Logs using the Web Client
Or from NSX Edge CLI using the following command
NSX-Edge1-0# export tech-support scp user@scpserver:file
59. 5959
Operational Tools – REST API
• VERB = GET
• URI = https://<NSX Manager Hostname>/api/2.0/vdn/scopes
• HEADERS = Authorization
• HTTP Body = N/A
• RESPONSE: Search for the id of scope:
<id>vdnscope-X</id>
60. 6060
Operational Tools – REST API
• VERB = POST
• URI = https://<NSX Manager
Hostname>/api/2.0/vdn/scopes/vdnscope-1/virtualwires
• HEADERS = Authorization, Content-Type
• HTTP Body =
<virtualWireCreateSpec>
<name>Test-Logical-Switch-01</name>
<description>Created via REST API</description>
<tenantId>virtual wire tenant</tenantId>
<multicastProxy>true</multicastProxy>
<disableMulticast>true</disableMulticast>
</virtualWireCreateSpec>
61. 6161
Operational Tools – REST API
• Response: 201 Created
• The Response Body provides the virtualwire-id, which can be used for additional
operations (eg, attaching to a Logical Router LIF or for Distributed Firewall rules)
62. 6262
Demo 1 (3 mins) - Script
Component Installation
• NSX Manager
• NSX Controller Cluster
Preparation
• Login to ESXi host (destination)
• Add Logical Switch
• Connect VMs to Logical Switch
Data Collection
• Start data collection on destination host, output to a share (that is also accessible on
analyzer)
• Connect VMs to Logical Switch
• Generate some traffic
• Stop data collection
• Start Wireshark and open pcap file
• Enable VXLAN decoder
• Walk through packet data format (VXLAN headers, unicast mode etc)
• Show anything else ? Controller CLI/esxcli ?
63. 6363
References
Other VMworld breakouts – VXLAN troubleshooting,
Security operations
VMware Networking and Security Booth
Hands on Lab: HOL-SDC-1303 VMware NSX to gain hands
on experience
Expert Bar/Group Discussions
64. 6464
Other VMware Activities Related to This Session
HOL:
HOL-SDC-1303
VMware NSX Network Virtualization Platform