MENU
Virtual workload migration with VMware
Posted by Askar Kopbayev on March 27, 2017
No ratings yet.

It is quite surprising how many companies migrate virtual workload nowadays. There could be different reasons – expiring contract with the service provider, move to the new office, consolidation of resources to minimize Capex and Opex, but in every case, companies need efficient and flexible V2V migration solution.

Very often people think of migration in terms of moving data from one place to another. However, migration is much more than that. For instance, you would probably want VMs to keep the same IP addresses after the migration. Which means you need to consider stretching VLANs between the source and target locations in case you cannot migrate all VMs in particular subnet in one go. You must plan a network cutover too.

Cross-vCenter vMotion

(more…)

Please rate this

Veeam Backup Enterprise Manager
Posted by Romain Serre on March 21, 2017
5/5 (2)

Veeam Backup Entreprise Manager is an optional component that enables to consolidate several Veeam Backup & Replication server through a single pane of glass. Veeam Backup Enterprise Manager provides a web-based interface to centrally control and manage all jobs. You can edit job, monitor them and have a consolidated view of the reporting of all Veeam Backup & Replication server. In this topic, we’ll see how to configure Veeam Backup Enterprise Manager.

2-node Cluster based on Hyper-V 2016 and ESXi 6.5

(more…)

Please rate this

Eliminating Blue Screen or Errors during failover
Posted by Taras Shved on March 15, 2017
4.67/5 (3)

Introduction

The reason for writing this post was a recent case from one of our customers, who ran into an issue when their SAN switch failed. The problem was that their VMs were generating an enormous amount of errors that were caused by the switching of active paths at the time of failover.

Local Machine System Current Controller Set Services Disk

(more…)

Please rate this

Using Blue/Green environments to avoid a Gitlab style outage
Posted by Gary Williams on March 13, 2017
No ratings yet.

As most of you are probably aware, Gitlab is, in part, a source code hosting repository which suffered something of a major outage just a few weeks ago. Unusually, they posted a very full and frank report on what actually happened. It’s very rare for a company to do this and even rarer for it to be made public, I wish more companies would do this, even if it was just an internal review with the blame put on the process, it would at least highlight where the weaknesses are in the infrastructure.

Diagram user router web server application server database server

(more…)

Please rate this

Connect Veeam to vCenter and add a Backup repository
Posted by Romain Serre on February 27, 2017
5/5 (1)

In the previous topic, we have seen how to install and update Veeam Backup & Replication 9.5. In this topic, we will prepare the environment. We will connect to vCenter to be able to backup virtual machines and we will add a backup repository.

Connect Veeam to vCenter 6.5

In my lab environment, I have deployed a vCenter Server Appliance 6.5 (VCSA). The VCSA FQDN is admin.vsphere.lab.

First, you need an administrator user to connect to vCenter from Veeam. From vCenter, add a new user as below. I have called mine Veeam.

VMware vSphere Web Client

(more…)

Please rate this

Azure Backup Server Offering New Features: Central Monitoring, Enhanced Security, and New Regions
Posted by Augusto Alvarez on February 20, 2017
4.83/5 (6)

We talked about Azure Backup before in this blog, when they recently added the capability to backup VMware virtual machines, now they are introducing a new set of features: Central monitoring, enhanced security and available in new regions.

Microsoft Azure Backup

(more…)

Please rate this

Upgrade your CA to SKP & SHA256. Part II: Move from a CSP to KSP provider
Posted by Didier Van Hoye on February 3, 2017
5/5 (1)

Move from a CSP to KSP provider

Once you have moved to a least Windows Server 2008 R2 you can take this step. Any version below doesn’t allow for this and should be considered the end of life. Many haven’t made the move from a CSP to KSP provider yet, even when they are already running Windows Server 2012 or 2012 R2 for a few reasons. There were some issues with older clients like Windows Server 2003 and Windows XP. These were fixed with a hotfix but in all seriousness, if you’re still on those OS versions you need to move a.s.a.p. and if not there’s nothing we can do to help you. A modern and secure PKI will be the last of your worries I’m afraid. For a Microsoft reference, see Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP).

PKI Certifivate general

(more…)

Please rate this

Encryption of VMware vSphere 6.5 virtual machines and vMotion migrations. And their performance
Posted by Alex Samoylenko on January 26, 2017
5/5 (2)

As many admins of virtual infrastructures know, for the first time ever, VMware vSphere 6.5 received the long awaited encryption feature of both virtual disks content and vMotion hot migrations.

The VMs encryption works based on AES-NI algorithm, and the key management is carried out based on KMIP 1.1 standard. When I/O operation comes to the disk of the virtual machine, it is immediately encrypted on-the-fly, which provides complete security against data security attack.

Virtual machine Encryption How it works

(more…)

Please rate this

Design a ROBO (Part 1): Introduction and high-level design
Posted by Andrea Mauro on January 25, 2017
4.75/5 (4)

What is a ROBO scenario?

A Remote Office / Branch Office (ROBO) is an office located in a different site or a remote geographical area from another office (usually the headquarter or the main office). Several organizations have one (or more) main office, as well as remote offices in another city, country or continent.

Many organizations today have in each remote office some local IT infrastructure, usually for data locality, but also for service local services.

ROBO scenario

(more…)

Please rate this

Ransomware: 14 Key Methods of Protection
Posted by Oksana Zybinskaya on January 9, 2017
No ratings yet.

After 2016 everyone can come to a certain conclusion that ransomware is a persistent phenomenon to reckon with from now on, with more sophisticated and innovative techniques to come. That is why it is crucial for very user and administrator to learn how to improve and protect their computer from ransomware. Here are some important steps to remember:

ransomware key

(more…)

Please rate this