vSphere Announcements at VMware Explore 2023 Las Vegas

VMware has a lot of vSphere related announcements for their next big update, which is vSphere 8 Update 2. It is scheduled to be released Q3 2023 so that’s just around the corner. Core product announcements are usually my favorite because they touch the daily work for all VMware admins.

I know we all want to keep our vCenters running the latest version, but it can be tough to coordinate downtime with 7+ patches every year. It can easily take one hour for each upgrade in a medium sized environment. Keep in mind that the following doesn’t apply to vCenters in ELM and HA at the moment. Now there’s reduced downtime for upgrades of vCenter. It will only be down for about 5 minutes! This is accomplished due to the following. A new vCenter server is deployed with a temporary IP address, even for a minor patch. Data is copied from the old to new vCenter. Then the short downtime occurs when switching over and starting up services. On top of that, there’s an automatic LVM snapshot taken during patching, which can be resumed on a failure or rolled back. Being able to resume is nice because sometimes a upgrade fails for a very minor reason and need to start over. Now can fix it and resume the upgrade.

Renewing or replacing certificates has never been fun, but there’s been improvements over the past few years. Now there’s a new enhancement that everyone will appreciate. vCenter certs can now be renewed or replaced without restarting services so no downtime.

This next enhancement is useful if stuck in a bad situation with your vDS not being synced up with all hosts. This can happen when a backup is taken, a vDS change occurs, and then a restore. You will no longer have vDS inconsistencies when restoring from a backup. vDS changes will be pushed from cluster(s) to vCenter. This is also supported with a vDS using NSX.

At a previous job, I have had Microsoft engineers not thrilled with no vCenter identity provider federation support with Entra ID.  By the way, Microsoft recently changed Azure AD to now be called Entra ID. Now Entra ID is supported and all existing identity providers are still available. There’s another great addition on the Microsoft side. Adding an AD OU path is an option when going through the VM customization wizard. No more computer objects going to the computers container or automation needed outside of the wizard to do this.

I think we have all been in a situation where a backup or something has a lock on a VMDK. Then it’s a pain to track it down via CLI and logs. Now there is a detailed error message when a file is locked with the IP address and MAC of the host holding the file lock.

With AI and ML getting bigger and bigger, GPUs need to have better features at the hypervisor level. There have always been many caveats with a VM having a vGPU enabled. Now there has been further improvements with placement for vGPU enabled VMs. DRS now makes better deployment decisions with an initial placement of a VM. Also, vGPU enabled VMs are automatically migrated when needed to accommodate for larger VMs. There’s one other addition that I think is cool for vGPU enabled VMs. No more guessing how much time a user will be affected with a vMotion. You can now view a stun time estimate in edit settings of a VM.

Whenever there’s a big update, you can expect a new VM hardware version to be released. Now up to version 21.

Those are the features and improvements that I am looking forward to most in vSphere 8 Update 2, but wait, there’s more. There are many other advancements, such on the DevOps side. Give it a try on a VMware Hands-on Lab and check out VMware’s documentation for further details.

VMware Cloud on AWS – Software Defined Data Center 2019 Badge

I recently passed the VMware Cloud on AWS Management Exam 2019 (5V0-31.19) with a score of 478. The exam is scored the same as every other VMware exam. There are actually no prerequisites to take the exam and the exam is taken online. I assume VMware has these two differences to appeal to a larger crowd that are not on the traditional VMware certification tracks. The exam is only 30 questions, but only 45 minutes to complete the exam. Definitely have to think quick and harder than I expected. The exam followed very close to the exam guide. I previously took the VMware Cloud on AWS: Deploy and Manage class, which I feel helped me prepare for the exam. However, the class only has lab simulations that are basically click through animations. I did have access to a real VMware Cloud on AWS account so that also greatly helped me to get ready for the exam.

vmware_Skill_AWS_SDDC_2019

 

Inaccurate Statistic in vSphere Flash Client

I mostly use the vSphere Flash client and was monitoring my vSAN performance with it. I noticed TCP inbound loss rate was ranging from 1-10% on the vSAN host TCP packet retransmission and loss rate graph. My VMs did not seem to be impacted. Also, there is bound to be some loss with TCP. However, this number seemed high to me.

I had a case open with VMware GSS and they could not figure out what was the underlining issue. They blamed my Cisco UCS servers. Cisco didn’t have any ideas. Nothing seemed wrong with my physical switches.

Then one day I used the HTML5 client and looked at the same graph. The numbers were much lower. I went back to the Flash client and the numbers were high. I followed the graphs over multiple time periods, on every host, and noticed the numbers were always off by a factor of ten. See the two screenshots below. You can see the flow of the line graph is the same, but with the y axis on a different scale. Also, every exact time I hover over is always off by a factor of ten.

I have a cluster on VMware Cloud on AWS. That of course is using vSAN so I decided to check it out. Same exact problem! Therefore, it has nothing to do with my on-prem configuration or version. I reported the issue to VMware and didn’t seem like they will do anything about it. After all, the Flash client will be deprecated in the next major release of vSphere. Though, still frustrating that I chased what I thought was a problem for a while and it turned out to be a bug with the graph. I hope no one else falls for this too.

Flash Client (Flex)
Flash_vSAN_TCP

HTML5 Client
HTML5_vSAN_TCP