Manage, Monitor & Troubleshoot your Kubernetes cluster with Lens : The Kubernetes IDE

These days Kubernetes is everywhere and there are many Kubernetes administration tools to choose from either command-line or a graphical user interface. While exploring the options to manage and monitor my kubernetes cluster, I came across two very nice tools  k9s (a command line kubernetes cluster monitoring tool) and Lens (a GUI based tool). As most …

Triggering Actions using vRealize Operations Manager 8.0

Triggering Actions using vRealize Operations Manager 8.0 The vRealize Operations Manager actions allows to modify the state or configuration of selected objects in vCenter Server from vRealize Operations Manager. For example, you might need to modify the configuration of an object to address a problematic resource issue or to redistribute resources to optimize your virtual infrastructure. You …

VMware vSAN Witness Appliance Requirements

Introduction to vSAN Witness Appliance As SDDC (Software Defined Datacenter) offerings from VMware are continuing to mature with Virtual SAN 6.1, VMware announced two new great features i.e vSAN Stretched Cluster and 2 – Node vSAN Cluster. In a stretched or 2-node cluster, to maintain the quorum, a dedicated witness host is required. As the …

Understanding Degraded Device Handling in VMware VSAN

Degraded Device Handling in VMware VSAN As the name suggest Degraded Device Handling (DDH) or Dying Disk Handling is an unhealthy drive detection method  help VMware VSAN customers to avoid cluster performance degradation due to an unhealthy drive. There can be a situation where the drive part of VSAN is not completely failed but can show inconsistent …

Deploying Unified Access Gateway using vSphere Web Client

Introduction In the previous post, we discussed an overview of Unified Access Gateway. In this post, I will be deploying a VMware Unified Access Gateway (UAG) appliance to give the end-user access to entitled Virtual Desktop / Remote Hosted applications over an insecure network like the internet. You might think when you can provide access to …

VMware Mirage Step by Step – Part 10 – Capturing Application Layer

Introduction to Application Layer In previous, we covered the process of capturing Mirage Base Layer having OS & the standard applications installed within the base layer. Next step is to capture an application layer which you can use to install departmental applications along with base layer on to the endpoints. VMware Mirage Application layer helps you …

VMware Mirage Step by Step – Part 9 – Creating Base Layer

Introduction to Base Layer Once reference machine is centralized to a reference CVD on the Mirage server, you can capture a new base layer from that reference CVD. You can either capture the base layer from an existing reference CVD or a new reference CVD as a new source of layer capture. The base layer captures a point-in-time snapshot …

VMware Mirage Step by Step – Part 7 – Centralizing Endpoint

Introduction In the previous article, we covered the installation of VMware Mirage client on the endpoint. After you install the Horizon Mirage client, you centralize the device. The Mirage client software runs in the base OS and verifies that images at the endpoint and the Centralized Virtual Disk (CVD) are in sync. For centralized management of the device …

Configuring ISCSI Target using VSAN 6.5

Introduction to ISCSI Target using VSAN 6.5 With VMWare vSphere 6.5 release, VSAN 6.5 also extended workload support to physical servers using ISCSI Target Service. iSCSI targets on VSAN are managed the same as other objects with Storage Policy Based Management. vSAN functionality such as deduplication, compression, mirroring, and erasure coding, RAID-1, RAID-5, RAID-6 can be utilized with …