This document provides an introduction and overview of VMware's NSX network virtualization platform. It begins with a disclaimer about features being under development. The agenda then covers an introduction to NSX, its momentum and use cases, new features in NSX 2014, and NSX operations. It demonstrates NSX's ability to provide network and security services in software and enable dynamic application topologies. It also discusses NSX components, deployments, partnerships, and upcoming training and certification opportunities.
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
Since launch, VMware has seen a steady expansion in the use cases that are addressed by network virtualization. So what is next for NSX and network virtualization? This session answers this question, taking a look at how NSX is expanding beyond a single data center. It also reviews the technical state of NSX and looks forward to where network virtualization will head in the coming years.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013
Archish Dalal, VMware
Nikhil Kelshikar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
VMworld 2013
Anirban Sengupta, VMware
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
The term Micro-segmentation has been used by all vendors to death. So what does it mean for you? This session walks through step by step building a security architecture from nothing. Where do you start? How do you learn how an application speaks? What approach can you take that is not disruptive? What objects should I use? Security Groups, IPsets, Clusters, VMs? After deciding what is best for the right situation come and see how to apply micro segmentation with VMware NSX to VMware Log Insight. Walk away with a repeatable approach breaking down, learning, and segmenting any application on your virtualised infrastructure. Designing an applications micro segmentation policy just got a whole lot easier.
The Vision for the Future of Network Virtualization with VMware NSXScott Lowe
This presentation recaps some announcements and demonstrations made at VMworld 2015 regarding new features and new functionality tentatively anticipated for future versions of VMware NSX.
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
VMworld 2013
Arun Goel, VMware
Serge Maskalik, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
The Future of Cloud Networking is VMware NSXScott Lowe
This presentation was first given at Varrow Madness 2014 and discusses the need for a solution specifically designed (like VMware NSX) for cloud networking
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
VMworld 2013
Shubha Bheemarao, VMware
Bruno Germain, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013
Archish Dalal, VMware
Nikhil Kelshikar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Integration with OpenStack VMworld
VMworld 2013
Somik Behera, VMware
Mark McClain, DreamHost & OpenStack
Salvatore Orlando, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
VMworld 2013
Anirban Sengupta, VMware
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
The term Micro-segmentation has been used by all vendors to death. So what does it mean for you? This session walks through step by step building a security architecture from nothing. Where do you start? How do you learn how an application speaks? What approach can you take that is not disruptive? What objects should I use? Security Groups, IPsets, Clusters, VMs? After deciding what is best for the right situation come and see how to apply micro segmentation with VMware NSX to VMware Log Insight. Walk away with a repeatable approach breaking down, learning, and segmenting any application on your virtualised infrastructure. Designing an applications micro segmentation policy just got a whole lot easier.
The Vision for the Future of Network Virtualization with VMware NSXScott Lowe
This presentation recaps some announcements and demonstrations made at VMworld 2015 regarding new features and new functionality tentatively anticipated for future versions of VMware NSX.
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
Witness the enablement of a true integration of a virtual network platform and an underlay physical network for a scalable data center orchestration, automation and multi-tenancy solution over high-capacity IP fabrics. With the integration of VMware NSX Layer 2 gateway services on networking hardware running Cumulus Linux, customers can now connect virtual workloads to physical workloads with no performance impact.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
VMworld 2013
Rajiv Krishnamurthy, VMware
Manish Mittal, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Get a technical understanding of the components of NSX, including how switching, routing, firewalling, load-balancing and other services work within NSX.
Virtualization Forum 2015, Praha, 7.10.2015
sál VMware
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
VMworld 2013: An Introduction to Network Virtualization VMworld
VMworld 2013
Thomas Kraus, VMware
Eric Lopez, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
SDN, Network Virtualization and the Software Defined Data Center – Brad HedlundChef Software, Inc.
IT organizations around the world are transforming data center operations and economics by virtualizing their networks. Much like server virtualization decoupled VMs from the underlying X86 server hardware transforming the operational model of compute, network virtualization decouples software-based virtual networks from the underlying network hardware to enable a new operational model for networking. Deployed non-disruptively on any existing network without change, network virtualization transforms the physical network into a pool of capacity that can be consumed and repurposed on demand.
You will learn how, today, companies like AT&T, NTT, eBay and Rackspace have transformed their operational model and reduced network provisioning time from days/weeks to seconds. You will learn how network virtualization, OpenStack cloud management and Chef automation can be leveraged together and examine the architectural decisions you should be considering now to prepare for this transformation
VMwareのSDDCソリューションであるNSXとJuniperの連動について、ジュニパーネットワークスのSEがProof of Concept 及び、デザイン検討を行った資料です。
Juniperの最新アーキテクチャ、Clos IP FabricとVMware NSXの連動によるSDDCの世界をご堪能ください。
Understanding and deploying Network VirtualizationSDN Hub
Analogous to server virtualization, Network Virtualization decouples and isolates virtual networks (i.e. tenant) from the underlying network hardware. One of the key value propositions of Software-Defined Networking (SDN) is to enable the provisioning and operation of virtual networks. This tutorial motivates the need for network virtualization, describes the high-level requirements, provides an overview of all architectural approaches, and gives you a clear picture of the vendor landscape.
Previously presented at ONUG Fall 2013 and Spring 2014.
Webinar Fondazione CRUI e VMware: VMware vRealize SuiteJürgen Ambrosi
vRealize Suite è una piattaforma di Cloud Management di classe enterprise progettata appositamente per il cloud ibrido che consente di distribuire e gestire rapidamente l’infrastruttura e le applicazioni senza compromettere il controllo IT.
My view on VMware approach to Hybrid- and Software-Defined Infrastructure: NSX, Hybrid Cloud and OpenStack. Get the agility of a startup with the guarantees of Enterprise-class IT. Session delivered at asLAN Congress 2015 in Madrid on April 15th.
VMworld 2013: Cloud Service Automation with NSX and vCloud Automation Center VMworld
VMworld 2013
Gargi Keeling, VMware
Valentina Reutova, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware vRealize Network Insight delivers intelligent operations for software-defined networking and security across virtual, physical and multiple-clouds with micro-segmentation planning, 360 visibility and NSX operations.
Join Jared Ruckle and Pieter Humphrey for a view into Pivotal Cloud Foundry (PCF) 2.0 capabilities with demos and expert Q&A. See how the platform enables:
DEVELOPER PRODUCTIVITY
- Accelerate feature delivery with an updated application runtime to speed innovation.
OPERATOR EFFICIENCY
- Run all of your apps on the highly automated Pivotal Cloud Foundry platform. Deploy in your data center or the public cloud.
COMPREHENSIVE SECURITY
- Reduce risk across your app portfolio. Protecting systems and customer data using Pivotal’s 3 Rs of security: repair, repave, and rotate.
HIGH AVAILABILITY
- Deliver enterprise SLAs at scale. Keep customer-facing systems online under even the most challenging circumstances.
Learn about the updates during this online event to understand why brand leaders continue to choose PCF as the leading multi-cloud platform.
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
VMworld 2013
Bilal Malik, Palo Alto Networks
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
PLNOG 17 - Grzegorz Kornacki - F5 and OpenStackPROIDEA
F5 is a top Security and Application Delivery Controller vendor. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS).
This seemingly unrelated disciplines have a lot of in common. This session will explain what F5 can do for OpenStack, and what OpenStack can do for F5. We will touch upon: F5 platform virtualization, deployment automation, LBaaS and OpenStack security.
What's New VMware NSX Advanced Load Balancer (Avi Networks)Avi Networks
Watch webinar on-demand https://info.avinetworks.com/webinars/accelerating-public-cloud-migration
With the Avi Networks acquisition, VMware is officially entering the application delivery controller (ADC) market. VMware NSX Advanced Load Balancer delivers multi-cloud application services consistently across on-premises data centers and public clouds.
It’s a new addition to the VMware price list. Join the webinar to learn about software load balancing, web application firewall (WAF), and what’s new with the latest upcoming release:
- Positive security model (PSM) and learning mode for WAF
- Flexible Upgrade for non-disruptive load balancer upgrades
- Support for modern encryption: TLS 1.3
Tomáš Michaeli, VMware
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Pivotal Container Service (PKS) at SF Cloud Foundry Meetupcornelia davis
Overview of Pivotal Container Service (PKS), built on the open source Cloud Foundry Container Runtime (CFCR). Covers what Kubernetes is, how PKS presents a complete platform that includes Kubernetes and much more, and key cloud principles.
Presented at the San Francisco-Bay Area Cloud Foundry meetup.
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
This year VMware vSphere 6 combined with vRealize Operations 6.1 (vR Ops 6) adds critical features to increase technical agility in the infrastructure, and reduce Mean time to Repair. With a new Automated remediation action framework in vR Ops, vSphere 6’s ability to vMotion Physical Raw Device mappings (RDMs), and a complete Management Pack Ecosystem for monitoring Infrastructure to applications, administrators have the tools needed to get to maintain 5 9’s uptime, shorten Mean Time to Repair (MTTR), and predict capacity requirements as and when the business requires.. This session will be a deep technical explanation, and live demonstration of these tools. It will give administrators a solid understanding of how they can use these tools to monitor and manage their application clusters, keep applications running during Infrastructure maintenance, and get deep holistic visibility into the entire Application ecosystem, from Storage to Networking.
VMworld 2015: Advanced SQL Server on vSphereVMworld
Microsoft SQL Server is one of the most widely deployed “apps” in the market today and is used as the database layer for a myriad of applications, ranging from departmental content repositories to large enterprise OLTP systems. Typical SQL Server workloads are somewhat trivial to virtualize; however, business critical SQL Servers require careful planning to satisfy performance, high availability, and disaster recovery requirements. It is the design of these business critical databases that will be the focus of this breakout session. You will learn how build high-performance SQL Server virtual machines through proper resource allocation, database file management, and use of all-flash storage like XtremIO. You will also learn how to protect these critical systems using a combination of SQL Server and vSphere high availability features. For example, did you know you can vMotion shared-disk Windows Failover Cluster nodes? You can in vSphere 6! Finally, you will learn techniques for rapid deployment, backup, and recovery of SQL Server virtual machines using an all-flash array.
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
Active Directory Domain Services (ADDS) allows organizations to deploy a scalable and secure directory service for managing users, resources and applications. Virtualization of ADDS has been supported for many years now, however has required careful management to avoid pitfalls around replication, time management, and access. Windows Server 2012 provides greater support for virtualization by including virtualization-safe features and support for rapid domain controller deployment.
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
Policy based management greatly simplifies the work of IT Administrators making it easy to ensure that applications and VMs receive the resources, protection and functionality required. Learn about the latest enhancements of Site Recovery Manager in this space, which represent a huge step towards providing policy based DR. In this session we'll dive deep into how this approach works and how to work with them.
Not content to simply describe the Virtual Volume (VVOL) framework, this session instead examines practical use cases: How different configurations and workloads benefit from VVOLs. Learn how Storage Policy Based Management (SPBM) couples with VVOLs to provide VM configuration options not previously available. We demonstrate a handful of real-life scenarios, specifically covering how VVOLs benefits oversubscribed systems, disaster recovery preparation and multi-tenant requirements for customers. Specific configuration options and constraints are covered in detail, including how they work with underlying storage.
The popularity of Virtual SAN is growing daily. Server admins are finally free to aggregate storage in their servers to create a shared storage system that scales with their compute needs. The underlying key to making it all work is networking. All Virtual SAN data flows through it, and correct selection and configuration of networking components will mean the difference between disruptive success or dramatic failure. This session will give deep insight in the do's and don'ts of Virtual SAN networking. Best practices for physical and virtual switch configuration and performance testing will be discussed. Virtual SAN 5.5 and 6.0 will be covered, and the networking differences discussed. Methods of troubleshooting network issues will be covered. For those configuring a Virtual SAN network for the first time, for labs or enterprise scale, this session is a must-see.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. Disclaimer
• This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
CONFIDENTIAL 2
3. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 3
4. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 4
5. The Anatomy of the Most Agile and
Efficient Data Centers is SDDC
5
Custom Application
Google / Facebook /
Amazon Data Centers
Custom Platform
Any x86
Any Storage
Any IP network
Software / Hardware Abstraction
Software / Hardware Abstraction
6. The Choice for “New IT” for “All Applications”
6
Software Defined
Data Center (SDDC)
Any Application
SDDC Platform
Any x86
Any Storage
Any IP network
With NSX
Custom Application
Google / Facebook /
Amazon Data Centers
Custom Platform
Any x86
Any Storage
Any IP network
Software / Hardware Abstraction
Software / Hardware Abstraction
7. Provides
A Faithful Reproduction of Network & Security Services in Software
Management
APIs, UI
Switching Routing
Firewalling
Load
Balancing
VPN
Connectivity to
Physical Networks
Policies,
Groups, Tags
Data Security Activity Monitoring
8. Enables
Dynamic creation of complex application topologies in minutes
Network and Security Virtualization with NSX
Hardware
Software
9. NSX Components
Cloud
Consumption
• Self Service Portal
• vCloud Automation Center, OpenStack,
Custom CMS
Data Plane
NSX Edge
ESXi Hypervisor Kernel Modules
Distributed Services
• High – Performance Data Plane
• Scale-out Distributed Forwarding Model
Management
Plane
NSX Manager
• Single configuration portal
• REST API entry-point
Control Plane
NSX Controller
• Manages Logical networks
• Control-Plane Protocol
• Separation of Control and Data Plane
FirewallDistributed
Logical Router
Logical
Switch
11. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 11
12. VMware NSX Training & Certification:
Making SDE Real in 2014
Career Path
Certifications & Training Programs
12
Training
Certified Network
Virtualization Professional
Certified Network
Virtualization Expert
Certification
NET
1214
13. NSX Training and Certification Portfolio
• Training Courses (www.vmware.com/go/NSXtraining)
– VMware NSX Install, Configure, Manage
– VMware NSX Fast Track for Internetworking Experts (coming)
– VMware NSX Design and Deploy (coming)
• Certifications (www.vmware.com/certification)
– VMware Certified Professional – Network Virtualization (VCP-NV)
– VMware Certified Implementation Expert – Network Virtualization (VCIX-NV)
– VMware Certified Design Expert – Network Virtualization (VCDX-NV)
CONFIDENTIAL 13
14. Designing with NSX
14
Reference Designs & Technical Papers on VMware Communities:
https://communities.vmware.com/docs
Reference Designs and Technical Papers on the NSX Portal:
http://www.vmware.com/products/nsx/resources.html
NSX
Design Guides
NSX Partner
Reference Design
NSX Partner
Whitepaper
NSX
Hardening Guide
SDDC
Validated Guides
NET
2318
NET
1589
15. New Service Categories and Partners
NSX Partner Extensions
Security ServicesPhysical-to-Virtual Services Operations and Visibility Application Delivery Services
NET
2225
16. New Service Categories and Partners – GA Q32014
NSX Partner Extensions
Security ServicesPhysical-to-Virtual Services Operations and Visibility Application Delivery Services
NET
2225
17. VMware NSX Momentum: Over 150 Customers
17
top investment banks enterprises & service providers
18. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 18
19. VMware NSX – Use Cases
Self-Service IT
Dev X
Dev A
Test X
Acquisition A
DevOps Cloud
On-boarding M&A
Application specific networking
Flexible IP Address Mgmt
Simplified consumption
Key Capabilities
Examples
Data Center
Automation
Micro-segmentation of App
Simplifying Compute Silos
DMZ Deployments
Programmatic Consumption
Full featured stack
Visibility and ops
Key Capabilities
Examples
Public Clouds
XaaS Clouds
Vertical Clouds
Multi-tenant Deployment
Programmatic L2, L3, Security
Overlapping IP Addressing
Any Hypervisor, Any CMP
Key Capabilities
Examples
22. Multi-Tier App, Multiple Networks Multi-Tier App, Single Flat
Network
APP
DATABASE
WEB
WEB APP
DATABASE
Today’s app, PAAS, Containers ---- I want it all NOW
23. NSX Integrates with Cloud Automation Systems to Deliver
Applications with Network and Security in Minutes
CONFIDENTIAL 23
Consumption
Any
MGMT
1969
NET
2379
24. Self Service IT journey
CONFIDENTIAL 24
End user drops apps in
pre-created instances
Provider
Cloud
Consumer
End user instantiates
dynamic topologies
Provider
Provider delivers
Pre-Created instances
Provider delivers
Templates for
Dynamic Instantiation
End user drives any
topology
Provider delivers
guard rails
25. VMware NSX –Use Cases
Self-Service IT
Dev X
Dev A
Test X
Acquisition A
DevOps Cloud
On-boarding M&A
Application specific networking
Flexible IP Address Mgmt
Simplified consumption
Key Capabilities
Examples
Data Center
Automation
Micro-segmentation of App
Simplifying Compute Silos
DMZ Deployments
Programmatic Consumption
Full featured stack
Visibility and ops
Key Capabilities
Examples
Public Clouds
XaaS Clouds
Vertical Clouds
Multi-tenant Deployment
Programmatic L2, L3, Security
Overlapping IP Addressing
Any Hypervisor, Any CMP
Key Capabilities
Examples
26. Problem: Data Center Network Security
Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible
Little or no
lateral controls
inside perimeter
Internet Internet
Insufficient Operationally
Infeasible
SEC
1959-S
27. NSX: Enabling a Needed Control Point in the Datacenter
for Security
CONFIDENTIAL 27
An NSX platform is made up of distributed
elements embedded in each
hypervisor,
enabling each VM/app to
have its own security
policy
Security closest to the applications and aligned with application lifecycle.
SEC
1746
28. NSX is the platform for integrating
advanced security services.
Security Partner Integrations
CONFIDENTIAL 28
Partner Ecosystem
Next-generation IPS Malware Protection
Granular protection of individual VM workloads with
customizable policy definitions
Automation of advanced malware interception
Unified management for physical and virtual sensors
Data Center security with agentless anti-malware and
guest network threat protection
Real-time, dynamic threat protection and response
for workloads moving between hosts and virtual data
centers
Vulnerability Management
Automatic vulnerability risk assessment
Data Center wide real- time risk visibility
Auto segmentation of risky assets
Vulnerability prioritization for effective remediation
File and Malware Protection
Single virtual appliance provides agentless:
Anti-malware with URL filtering
Vulnerability and software scanning
Detection of file changes
Intrusion Detection & Prevention
Next-Generation Firewall
Multiple threat prevention disciplines including firewall, IPS,
and antimalware
Safe application enablement with continuous content
inspection for all threats
Granular user-based controls for apps, content, users,
SEC
1958
NET
2225
29. NSX Micro-Segmentation Journey
29
Deployed Applications on
Physical Networks
New Deployments/
Deployed applications
Apply NSX Security Full network and security
virtualization
35. NSX – The Network Virtualization Platform: What’s New
35
ConsumptionServicesDataPlaneOperations
Operations Guides
& Best Practices
Integration with Existing Tools
Riverbed, Gigamon, NetScout, EMC Smarts
Analytics
VMware vCenter Ops, Log Insight
Firewall Operations
Tufin, Algosec
New NSX Partners &
Service Categories
Physical-to-Virtual Services
Operations & Visibility
Application Delivery Services
Security Services
36. NSX – The Network Virtualization Platform: What’s New
36
ConsumptionServicesDataPlaneOperations
vCloud Automation Center
More topologies and on demand use cases
OpenStack Juno
Control plane scale & Docker integration
37. NSX – The Network Virtualization Platform: What’s New
37
Consumption
• VMware vCloud Automation Center
• OpenStack Juno
Services
• Distributed Firewall Operations
• LBaaS: UDP support
• DDI: DHCP relay
DataPlane
• Continue advancements of Open Virtual Switch
• NSX Edge: A-A with scale-out
• Physical device integration
Operations
Partner
Integration
• New NSX Partners & Service Categories
• Operations Guides & Best Practices
• Integrations with existing tools
• Analytics, Firewall Ops
• Multi-site and hybrid enablement
38. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 38
45. NSX with physical workloads
Physical Workloads
VXLAN VLAN
x86-based bridge
Highest density but requires specific hardware
Leverages x86 server
Physical Workloads
VXLAN VLAN
HW VTEP
46. NSX with physical workloads
Native NSX
support for
containers
Ecosystem with
OVSDB
x86 based
bridging
49. Agenda
1 Intro to NSX
2 NSX Momentum
3 NSX Use Cases
4 What’s New in NSX 2014
5 NSX Operations
6 In closing
CONFIDENTIAL 49
50. NSX – The Network Virtualization Platform
50
Consumption
How an end user consumes NSX services via a Cloud Management Platform.
The operator interacts with the system through UI or API.
Services
NSX logical services and 3rd party extensions for networking and security (ex. Logical switch , Logical
router, Firewall, Load Balancer, VPN, DDI)
DataPlane
Provides workload connectivity & services processing
(ex. hypervisors, physical switches and appliances)
Operations
Partner
Integration
NSX operator uses tools (built-in and 3rd party) for
troubleshooting, visibility
Management, Control & Data plane integration
of 3rd party services
DataPlane
XenServerNSX Edge Hyper-VvSphere KVM3rd Party GW
ServicesServices
L2 Switch Firewall Load BalancerL3 Router VPN DDI
Operations
Partner
Integration
Software partner extensions
Hardware partner extensions
Partner extensions
vCOPs
Consumption
Any
51. SDDC Approach with NSX Enables Choice and Flexibility
2-Tier / 3-Tier Leaf / Spine
Build
Your
Own
Converged
Systems
Hyper-
Converged
Systems
Today’s
Application
PAAS Containers . . .
. . .
< Any Network >
< Any Infrastructure >
< Any Application >
54. Business Solution
• NET1214 NSX Certification – the Next Step in your Networking Career
• NET1745 The Case for Network Virtualization: Customer Case Study
• NET1786 The Business Case for Network Virtualization
• NET2293 Bridging Enterprise Networks to Hybrid Cloud Using NSX
Hands-on Labs
CONFIDENTIAL 54
• SDC-1402 vSphere Distributed Switch from A to Z
• SDC-1403 Introduction to VMware NSX
• SDC-1420 OpenStack with VMware vSphere and NSX
• SDC-1423 vCloud Suite Basic Networking
• SDC-1424 VMware NSX and SDDC
• SDC-1425 VMware NSX Advanced
55. Technical Track - Networking
CONFIDENTIAL 55
• NET1846 Introduction to NSX
• NET1743 VMware NSX – A Technical Deep Dive
• NET1957 NFV for Telco Infrastructure
• NET1468 A Tale of Two Perspectives: IT Operations with VMware NSX
• NET1586 Advanced Network Services with NSX
• NET1560 The NSX Guide to Horizon View
• NET1883 NSX Performance Overview
• NET1588 Load Balancer as a Service, using NSX or Partner Solutions
• NET1401 vSphere Distributed Switch Best Practices for NSX
• NET2318 Scale-Out NSX Deployments: With VMware-powered SDDC
• NET1581 Reference Design for SDDC with NSX for Multi-Hypervisors
• NET2379 Dynamically Configuring Application Specific Network Services for vCAC &NSX
• NET2225 NSX Platform: Enabling 3rd Party Network & Security Solutions
56. Advanced Technical Track - Networking
CONFIDENTIAL 56
• NET1949 VMware NSX for Docker, Containers & More
• NET1589 Reference Design for SDDC with NSX & vSphere
• NET1583 NSX for vSphere Logical Routing Deep Dive
• NET1974 Multi-Site Data Center Solutions with VMware NSX
• NET1674 Advanced Topics & Future Directions in Network Virtualization with NSX
• NET1966 Operational Best Practices for VMware NSX
• NET1592 Under the Hood: Network Virtualization with OpenStack Neutron & VMware NSX
Group Discussions - Networking
• NET3441-GD vSphere Distributed Switch
• NET3442-GD vCAC and NSX
• NET3443-GD NSX Routing Design Best Practices
• NET3445-GD NSX Multi Site Deployments
• NET3444-GD NSX Network Services
57. Technical Track - Security
CONFIDENTIAL 57
• SEC1196 Who Can You Trust? Strategies & Designs for Implementing Zero-Trust Model Leveraging NSX
• SEC2238 Security & Micro-Segmentation for the SDDC
• SEC1959-S The “Goldilocks Zone” for Security
• SEC1958 Automating Security Policy Enforcement with VMware NSX
• SEC1698 Optimize Security with Context & Isolation using NSX Guest Introspection
• SEC2567 Unleashing Collaborative Security with VMware NSX – Advanced Defense for Advanced Threats
Advanced Technical Track - Security
• SEC2421 VMware NSX Security Operations Best Practices
• SEC1746 NSX Distributed Firewall Deep Dive
Group Discussions - Security
• SEC3446-GD Security & Micro-segmentation
• SEC3449-GD Security Policy Automation using NSX Service Composer
• SEC3448-GD NSX Platform Extensibility
• SEC3447-GD Compliance Reference Architecture
58. Technical Track – Management
CONFIDENTIAL 58
• MGT1833 How to Perform Troubleshooting and Root Cause Analysis Using Log Insight
• MGT1878 Deep Dive into How vCenter Operations Simplifies NSX Operations
• MGT1969 vCloud Automation Center and NSX Integration Technical Deep Dive
59. Fill out a survey
Every completed survey is entered into a
drawing for a $25 VMware company store
gift certificate