PowerCLI migrate vSwitch port groups to vDS in a different vCenter

Over the 6 months I have been working hard on designing and implementing our latest infrastructure refresh and migration to another datacenter. This was a big task, especially when we had to migrate customer servers with minimal downtime. However, there were many more challenges we faced, however with the right planning in the design, these were fairly well handled.

One of the challenges was that we were using Standard vSwitches in the old 5.5/5.1 environment due to some 3rd party applications back when the environment was 4.1 which caused issues when using a vDS.
As we were building a new vCenter we decided the best method was to automate adding all the VM port groups along with their VLANs and LAG into the DvSwitch.
One thing I’ve learnt from Alan Renouf is “The best script you will ever write is one that you stole from somebody’s website” which doesn’t mean  steal it and claim it as your own, but if someone has a script that does exactly what you need, then use it, just make sure you give credit where credit is due.
It just so happened by luck that right around the time I was starting to think about the process, I saw a twitter post from Ben Liebowitz “PowerCLI Script to create a new vDS Portgroups” – Beauty, this was exactly what I was after (albeit some small changes to suit).

The next step was to get a script to match to do the initial export to CSV, after a quick google I came across a Luc Dekens script that he had written for someones request on the VMware Community Forums.  It was pretty straight forward and only require some lines removed so that the CSV only had the columns required for the import.  So once I had the scripts, it was down to testing the process on how to use them prior to prod.

  1. Edit the Export vSwitch Configuration script from Luc Dekens
  2. Run the script
  3. Open the CSV (Make sure the columns names line up with the import script)
    **As we are exporting from a vSwitch and importing to vDS, we will need to manually add a new column to the exported CSV called numports and place the correct number of ports in each row (by default 8) .
    **Also remove any multiples of portgroups (e.g. if you have multiple hosts with the same Portgroups as these will be also in the csv)
  4. Edit the Import script from Ben Liebowitz
    – Change the vDS name and LAG name to match your environment.
    – Update to the CSV path
  5. Run the import script.
  6. Confirm the ports have imported by looking at the vDS.

The process is simple, so let’s break this down into some of the areas you can edit .

In the export script, all you need to edit is the lines that control what information is exported to the CSV. Just remove the lines you do not require. for example I do not need the IP address, so I would remove the below line.

@{N="IP";E={if($vNicTab.ContainsKey($pg.Name)){$vNicTab[$pg.Name].Spec.Ip.IpAddress}}}

The csv will export to the directory you have set in PowerCLI when running the script. Below is what the csv will turn out like, however note that I have also added the numports in as well.

ESX,pgName,vlanID,numports
HyperVisor-Hostname,PortGroup_1,3005,8
HyperVisor-Hostname,Portgroup_2,3005,8
HyperVisor-Hostname,Portgroup_13,3007,8
HyperVisor-Hostname,Portgroup_34,3007,8

etc.

Now for the Import.
In the import script, make sure that you change the name of the vDS, ActiveUplink and the location of the CSV – So he following lines.

# Set the VDS Name to variable
$vds = "dvSwitch"
# Import the CSV of VLAN IDs, Portgroups, and # of ports
$vdsPortgroup = Import-Csv \path\to\New_Portgroups.csv
get-vdswitch $vdsname | Get-VDPortgroup $portgroup.pgName | Get-VDUplinkTeamingPolicy | Set-VDUplinkTeamingPolicy -UnusedUplinkPort dvUplink1, dvUplink2, dvUplink3, dvUplink4

get-vdswitch $vdsname | Get-VDPortgroup $portgroup.pgName | Get-VDUplinkTeamingPolicy | Set-VDUplinkTeamingPolicy -ActiveUplinkPort LAG

That’s it. Very straight forward set of scripts to run. I prefer to run these individually as there is the step in the middle with the csv file. Aside from that I would like to thank both Ben Liebowitz and Luc Dekens for their community support for sharing their scripts.

Advertisements

Install and Configure NSX Manager

I’m starting to become a bit of a fan of VMware NSX and getting excited with all the new features that came out of VMworld 2017. I recently rebuilt my lab and one of the parts I need to install is, you guessed it, NSX. So I figured I would write a series of basic “Getting Started” guides.  To start with, we will go through installing the NSX Manager, the brain of the solution. Now for the install, I just attached the NSX Manager Appliance to a vSwitch for the moment, but you will need to ensure that you have a Distributed Virtual Switch configured to utilise NSX as it is a required component. I will be installing NSX Manager 6.3.3 (The latest as of this post)

NSX is more than just networking, it is also part of the endpoint services that was previously vShield in the vCloud Networking and Security Suite (vCNS). Implementing NSX allows you to extend the feature set taking you to the next level of virtual networking.

I will be going over the install and configuration of some of the other components in the next few posts following this one.

Installing NSX Manager:

The NSX Manager OVA can be downloaded from my.vmware.com
Once downloaded, ensure the Client Integration tools are installed and then open up the VMware Webclient. (For Client Integration Tools SSL FireFox issue  see this post)

Right click cluster and select “Deploy OVF Template” à Navigate to the NSX Manager OVF file à Accept the configuration

Accept the EULA

Input details for configuration

-Password
– IPv4/IPv6 details
– DNS
– NTP
– SSH
– VMware Customer Experience Improvement Program

 

 

 

 

 

 

 

Accept all and deploy

 

 

 

Once deployed. Open up a web browser and navigate to the IP/hostname that you set for your NSX Manager.

Login with admin and the password you set for deployment.

Navigate to “General” and edit the time settings à set your timezone à Save and log off and back on again for settings to take affect

Navigate down to “NSX Management Service” àSelect Edit on “Lookup Service URL:” and enter your PSC FQDN. (Enter vCenter if using embedded PSC) Enter SSO username and password and click OK

Select edit on “vCenter Server” and enter your vCenter server address followed by vCenter Service account or SSO.

Once all lights are green, log off and log into vCenter with the account used to attached NSX to vCenter.

If you log in as another accout, you will not be able to see the Network and Security tab as you will not have been granted permission to it. (Note that my SSO is vSphere.local for this lab)

Log in as the account that You will see the Networking and Security section available in the Action menu, Home screen and the left hand Navigation menu. Select Network and Security -> click on NSX Managers -> select NSX Manager you wish to adjust -> Manage -> Users.

Click the green Plus sign -> Choose either to add a group or individual user (Suggest making an NSX Group to make control easier) -> Select the Level of Access and click OK.

Log off and log in as the user you jut granted permission to.  (Note that I am using readysetvirtual.local for my lab domain and standard user)

VMware Client Integration – FireFox SSL Popup

I’ve been having this issue for a little while now, I hadn’t found any successful posts on how to allow the VMware Client integration plug-in to run on FireFox. This occur in my last lab environment and my current.  Unfortunately, without this integration tool, OVF deployments and various other functions are unavailable in the WebClient.

Error Msg: “The VMware Client Integration Plugin has updated its SSL Certificate in FireFox.”

Since Firefox ver. 52, plugins have been disabled by default and started to behave differently. We found this out the hardware when some of our customers were starting to open their SaaS Citrix environment with HTML5 instead of the thick client.

To fix this, I found a KB article that outlines the solution. (KBA 2112076)

As you can see, the integration tool is currently installed and in Firefox 56 the message is displaying after log on to the WebClient.

Screen Shot 2017-09-06 at 10.28.31 amScreen Shot 2017-09-06 at 10.27.43 am

Go ahead and uninstall the Integration Tool as you will need to reinstall it again.

Screen Shot 2017-09-06 at 10.31.15 am

 

Uninstall your current version of FireFox and download and install FireFox Extended Support Release
Screen Shot 2017-09-06 at 10.30.17 am

Once installed, reinstall the VMware Client Integration Plug-in and launch FireFox. The Plugin should then popup once you access your venter WebClient login page. -> Select “Remember my choice for vmware-csd links” and click “Open Link”

Screen Shot 2017-09-06 at 10.40.55 am

Head over to a host and attempt an OVF deployment.  A second pop will request for Access Control -> select “Allow” and untick “Always ask before allowing this site” (Unless security reasons)

Screen Shot 2017-09-06 at 10.42.08 am

You should now not see any error messages when you attempt an OVF deployment.

Screen Shot 2017-09-06 at 10.42.21 am

Guest Introspection Service – NSX

Continuing on from my last post, I thought I would get in and talk about the Guest Introspection service before I roll back and redeploy my NSX lab.

In prior versions to vSphere 6.x, part of the VMware vCloud Networking and Security (vCNS) was vShield Endpoint that was installed onto each host to allow for agentless security products to interact with virtual machines through VMTools. This was a two component setup, you would first have the vShield Manager that was connected to your vCenter which then added an installation option on each host for vShield Endpoint. Once vShield Endpoint was installed and vShield Driver (Part of VMTools install), your antivirus/anti-malware software could then protect inside your virtual machines that have been set up.

Fast forward to vSphere 6.x and the release of NSX taking over the networking and security side of things for vSphere environments. vShield was partially removed in vSphere 6.0, but completely removed by vSphere 6.5. Replacing vShield is now the NSX Guest Introspection Service (GIS) that still gets deployed to each host, but the difference is instead of having a separate vShield manager, it is included with the NSX Manager.
The GIS is free (Depending on vCloud licensing you may need to double check with your reseller) with the default licensing that comes with NSX Manager. There is a default key that is automatically deployed with NSX Manager giving you this access.

To set up your Guest Introspection Services, follow the below steps:

Pre-requisites:
IP Pool (If you do not have one configured, then you can set up during GIS deployment)

  1. Open up your Network and Security Tab –> Click on Installation –> Select Service Deployments.
  2. Click on the + sign –> Select Guest Introspection –> Choose when you want to deploy Now or Schedule –> click next.
  3. Select your Datacenter and cluster you want to install your Guest Introspection to –>  click next
  4. Choose your storage device and network you want to –> Decide to use DHCP or IP Pool, click Change –> Select IP Pool and Click the + sign to create the Pool.


  5. Confirm and click Finish.

The process will run through and migrate VMs between hosts if required. Once installed, your security software should detect the hosts and their current state and either require install a filter driver to the hosts and then the appliance (Third party components may vary between vendors).

This is a very straight forward service setup, but very powerful for the service it provides to your environment.

Thank you for reading. Please let a comment if you would like to. 

VMUG UserCon Sydney: 2015

On Tuesday, I had the opportunity to go to the Sydney VMUG UserCON. This was quite an amazing experience. The last time I was in Sydney and outside the airport was when I was 12 on a school camp, and even then I was off the bus, on the ferry and then back on the bus.
So what happened at Sydney VMUG UserCON that made it such an amazing day? Well… lots!! I guess starting and running through the day is the best way to start.

It was a warm sunny morning, the birds were singing, the workers were hurrying across the roads to get to work on time and I was passing by to try and get my 5 seconds of window fame on sunrise…. Alright, fast forward to the event.


0800hrs: Registration:  
This was a great set up, walking into the venue was great, very well presented, the sign-in desk was well set up allowing the member to search their name and print out their name tag, thus one step closer to saving the environment. Breakfast was also available with croissants and muffins, and COFFEE!!! (I walked through the city from 6am looking for coffee, I was at the venue waiting outside very early.) After standing around a little I quietly walked into the main hall for the opening to the day.

0830hrs: Welcome, VMware Updates and morning Keynote: John Troyer
VMUGhq representative Renee did a short welcome introducing the VMUG team and giving a brief overview and then introducing Ryan McBride (Sydney VMUG Leader). Ryan also started off with a welcome followed by a presentation on the updates to VMUG including VMUG Advantage and the benefits along with EVALexperience. Ryan then spoke about the steering team, about the sponsors and what was going to be in store for the day. Next was Tom Hubert from VMware education bringing up-to-date information in regards to the new vSphere 6.0 certification paths. (You can read about the changes in this article.)

All of a sudden, Ryan did not come back on stage, instead Nigel Moreton from VMware was on stage and in no time at all he dropped a big surprise, Sanjay Mirchandani (VMware Senior VP and GM for APJ) was in the house and in no time at all, he was up on stage with so much energy.

On to the Keynote. Mr John Troyer was up, straight away he was in to it. The entire audience was engaged as John delivered The New I.T. There were a lot of funny meme’s that John had put together, and for good reason, they were the exact example of how I.T. is viewed, the team in the dungeon. The key is to change from saying “No” to “Yes, and….” This drops the ego, and it allows you to show your interest to take the next step and progress further. John continued to discuss how there are different technologies that are becoming big and will change I.T. as it is today. There are many ways we use to rely on hearing technology news, we don’t buy the latest magazines anymore, we just google what we want, or read blogs.

The points that John left us with were;

  • Start Side Projects (Create New things)
  • Teach Internally
  • Blog
  • Educate

Move from being the operator and keep moving by doing things that charge you. Don’t write a book first, start small by building in your network where you may only start with one friend reading your blog, but within time, more and more will join until you have thousands.

1055hrs: The Missed Session

Two days before the event, I spent an hour putting together my agenda for the day, trying to work out which events would be best suited to myself and job. Unfortunately, they don’t always go to plan. Fortunately, during the break, I met some very knowledgeable people, Josh Odgers, Ryan McBride and Michael Webster. Within this time, we had missed the call for the next session, but it turned out for the best as the first session I picked to fill in time anyway. We had some great discussions about technology, VMUGs, customer stories, designs, among other things that were just an eye opener to me. This lead into the next session.

1155hrs: Performance Tuning for Monster VMs and Business Critical Apps – Michael (Web-Scale) Webster.

Now I don’t deal with monster VMs that use 40 vCPUs and 512Gb of RAM, but regardless, this session was full of content that related to how you should think about sizing your VMs, and how you can get the most performance out of your databases. Michael broke down how you should assign cores to your VMs, eg. 8 Core CPU = 1, 2, 4, or 8 cores in a VM. 10 core CPU = 1, 2, 4, 5, etc.  vNUMA only kicks in once you start using 9 cores or more.

Michael talked about a series of tweaks that you can perform to get the most out of your VMs, by upgrading to Hardware Version 10 he noticed an 8% increase in performance.

Storage Controllers are a critical choice that needs to be correct as the different controllers, you can read more here: More here.

NIC choices are also an integral part, but if you choose the wrong one, you may be harming your throughput. Again Michael has done up another great post here.

This was another great session as it got me to really think about the way I design my VMs and what I need to configure to get the most out of the VMs.

VMware vSphere 5.5 Virtual Network Adapter Performance

1410hrs: Accelerating Business Critical Apps and VMware Horizon 6 with Web-Scale

After lunch and a bit of spare time walking around talking to some of the sponsors and finding out about their products a bit more, I gave in and went to Josh Odgers, and Michael Websters presentation. I was particularly interested in what Nutanix could do with with VMware Horizon, and I was impressed with the results that were displayed. Up to 2048 VMs in a HA cluster (but this is limited due to VMware limitations). 6 minutes to load 100 or 888 VMs.

Nutanix have designed a really nice little unit that scales really easily, and has great GeoLocation ability.

 

1520hrs: Deploying Vmware Horizon Workspace in the real World – Alastair Cooke

This was a session I was really looking forward to, and it delivered a stack of information. Alastair described a recent project that he worked on for a particular client who was using XenApp. This project involved migrating them across to Airwatch, Horizon 6 and Workspace Portal. During the presentation, Alastair talked about the design, the road blocks and challenges that he experienced. Alastair showed pictures of the Workspace Portal and how it presents a corporate App Store (as everything has an App Store these days) he talked about how customisable it is to work with for the users. The Citrix integration wasn’t very straight forward, but if you read the instructions it is certainly a lot easier. There were several key points that Alastair shared.

  • Put workspace in an internal network first for testing (Firewalls are a huge issue)
  • Learn Distinguished Names
  • Read documentation
  • Know your DNs

 

1620hrs: Closing Keynote: Chad Sakac

Wow! What energy to start a keynote (especially after a long day). This really got me thinking, my entire way of approaching design, operations, work ethic. Chad was a standout guy on stage. So much content packed in. The diagrams that were presented on screen gave a clear picture on how different Storage controllers and designs could greatly impact the data and performance.

4 main types of storage fabrics:

  • Persistence Models: Changing
  • Tightly Coupled
  • Loosely Coupled.
  • Distributed Share

The one thing that stood out to me was the time it takes data to be stored. Even when using FusionIO or ExtremeIO it still is a long time, not humanly noticeable, except Chad broke it down to be noticeable. If moving from CPU to SRAM is 1ns, then it would be 1 Second. If SRAM to DRAM it would be 10 seconds,  right up to All Flash Array that equalled a trip around the the world in a boat.

ChadTalk

The key points that Chad left us with were:

Watch:

  • Increasing Application Delivery
  • Increase Diversity in Compute

Do

  • No time to Dither
  • Start to be Maniacal/clear about workload
  • Accepting the differences
  • Invest time into M&O
  • Use Internal Pressures

This was certainly a great way to close off the entire days worth of sessions.

Congratulations  to all that won prizes from VMUG and the Sponsors.

 

1735hrs: Reception

Beers, who could say “No”?

If you didn’t get a chance throughout the day to meet new people, this was the time. I got a great opportunity to speak with Alastair Cooke, I was able to thank him personally for all his work that he has put into AutoLab. We had a really good conversation about opportunities for building the community for VMUG. A very nice guy who is very passionate about communities and presenting.

The evening was cut short for me as I needed to catch my flight home. To me I felt like I had made new friends in business and personally. I learnt a lot in the one day, and I am really keen to bring that day to the Brisbane VMUG, if not this year, then next year. This was a very enjoyable event for me and I take my hat off to Ryan and his team for making it a great day!

Thank you.

Keiran.

*I do apologise if I have missed some content, this was produced a little later than I anticipated.