I’ve completed rethought the configuration of my environment. It’s far from best practice at this point - but it’s getting the job done. Ultimately my issue came down to the fact that best practice is obliterating my power bill. Running 4+ ESXi hosts on server grade hardware is just too expensive to keep cool and operate in Sacramento, California. I’ve moved to leveraging a larger “Core” host inside the house where I can keep it cool, and a distributed configuration remotely (in the garage) running on my former server hardware.
Hi All! I’ve been back from VMworld for a little over a week now, and I’m way past due on doing a “final thoughts” post around the cool technology and sessions we encountered. For now though, I’ll stick to being selfish and just posting back my sessions. William Lam at VirtuallyGhetto managed to pull together all the view URLs as direct links. You can view the full list here but I’ve included mine below.
Hi All! My session is done! I wanted to go ahead and drop this content out into the “space” so you guys could pull it down for testing. Attached I have the following items. vRealize Orchestrator Actions for Costing XaaS Deployment Workflow PowerNSX Powershell script for staging my NSX Distributed Firewall Rules (Creating Sections, Creating Rules, Basic Micro Segmentation) The workflows were added to a package and deployed so you can import the package directly.
Hey All! Now that I’ve lost all my money playing craps, which I finally know how to do, I have some time to pop on here and drop a heads up about a session I’m really excited for tomorrow (today, ugh, mornings going to come early…) Stop by NET7956 and check out VMware’s Ray Budavari and Francesco Vigo from the Network and Security Business Unit talk about ”vRealize Automation and NSX Design Best Practices”.
I wrote a blog post a few weeks back outlining my personal #VMWorld2016 session “How PG&E is Automating Secure Environments Using NSX, vRealize Automation, and vRealize Orchestrator”. What I didn’t mention is that I’m actually on 2 other Sessions during my VMWorld Stay. These sessions are “Panel” sessions with some great people. I’m incredibly honored and excited to have the opportunity to talk more about what I’ve learned over the past few years working in the Private Cloud and NSX space, as well as what PG&E is doing!
Partnering NSX with vRealize Automation creates some really intriguing possibilities when you look at taking tasks that a 3rd tier engineer would typically do, and being able to create a workflow that places a tight enough box around the task that a 1st or 2nd tier worker can complete the same task, in less time. This free’s up your 3rd tier engineers to focus on the real complex tasks. From personal experience, tasks like VLAN creation in the physical network realm have always taken a long time to complete.
Introduction I’ve fully bought into the value of leveraging XaaS (Anything as a Service) for a high number of catalog items in your vRealize Automation environment. So much so in fact, that I’m doing a a session on it at VMWorld 2016! This presentation is primarily about using XaaS to deploy systems, instead of the native IAAS “modules” already boxed in vRealize Automation. One thing I tend to do a lot of is build large lists in vRA for various reasons.
A huge bucket list item for me has always been to speak at VMWorld. I’m pretty excited for the opportunity to talk about what my team has done! It’s been an interesting road building the presentation out and detailing out what I specifically wanted to talk about. Ultimately I settled on Security Automation with NSX, and XaaS (Anything as a Service) and the customization’s we’ve made via vRA with XaaS to meet our business needs.
Introduction I’ve always wanted this blog to be something that was from a “Customer” point of view - instead of being from a VAR, MSP, or the Vendor directly. As customers we have a unique perspective on how to make these products fit with the goals we have as an enterprise (reads as fitting square pegs into round holes). I wanted to build my lab to show how I’ve made that work as close as possible.
Introduction Like most, I get the majority of my lab work done in my home at 2am. I’ve got 1 external IP address and multiple services that I want to be able to hit externally. I hate doing random ports for everything and trying to remember what port I’ve mapped to what server. Then I need to Swiss cheese my pfSense firewall and port forward to all kinds of destinations.