PowerCLI 11.1.0

PowerCLI 11.1.0 – More on Linux Side

During the last few days of December 2018, VMware released the 6th PowerCLI version of the year: PowerCLI 11.1.0. The coolest new features move around Site Recovery Manager:

  • Support for SRM module in MacOS and Linux
  • Support for Site Recovery Manager 8.1 API features
  • VMware.VimAutomation.Storage module received updates on 2 cmdlets: Get-VsanDisk and Start-SpbmReplicationTestFailover

There is nothing new on the install / update routines for Windows, so if you need guidance you can take a look at one of my previous article: VMware PowerCLI 10.1.0.

Read More
How to Upgrade ESXi from 6.5 to 6.7 with Command Line

How to Upgrade ESXi from 6.5 to 6.7 with Command Line

In a previous post I wrote about how to update ESXi 6.5 using Command Line. It’s 6.7 time now, so here is the article explaining how to upgrade ESXi from 6.5 to 6.7 with the command line (esxcli). This method works either the ESXi server is standalone or added to a vCenter Server (I will use no component of vCenter Server).

As a prerequisite, I placed the ESXi 6.5 server in maintenance mode.

Upgrade ESXi from 6.5 to 6.7 with Command Line - Maintenance Mode

Upgrade ESXi from 6.5 to 6.7 with Command Line – Check ESXi Version

To find the current version of ESXi, after I connected with PuTTY to the server, I ran this command:

esxcli system version get

Upgrade ESXi from 6.5 to 6.7 with Command Line - Check ESXi Version
Read More
Install VCSA 6.7

How to Install VCSA 6.7 (VMware vCenter Server Appliance)

In this article I will show you how to install VCSA 6.7 (VMware vCenter Server Appliance).

To start, you need an installation kit of vCenter Server Appliance 6.7. For this article, I will use the VCSA 6.7 Update 1 version – VMware-VCSA-all-6.7.0-10244745.iso (the latest available at the time I wrote this article).

Note: If you look for VCSA upgrade instructions, check this article: How to Upgrade vCenter Server Appliance from 6.5 to 6.7 – Stage 1.

Install VCSA 6.7 (VMware vCenter Server Appliance) – Stage 1

To launch the installer I will use a Windows virtual machine (alternatively you can use a Mac or a Linux system). Unzip the archive and navigate to VMware-VCSA-all-6.7.0-10244745\vcsa-ui-installer\win32 folder. Launch installer.exe and begin to install VCSA 6.7.

Install VCSA 6.7 - installer.exe

Read More

VMUG Romania October Meeting Report

Better late than never, so here it is the report for VMUG Romania latest meeting. On 16th October, 35 guests attended the last VMUG Romania meeting of the year. We held our meeting in the beautiful offices of our sponsor, Veeam. This meeting we added a new feature to our meeting: at the request of few remote colleagues, we streamed live on Facebook almost all the presentations. This allowed me to embed the videos into this article, so double win! We received cool feedback, so for next sessions we will have some sort of live streaming for sure.

I had the honor to present in the first slot of the meeting. As this year is the first year when Romania has not only one, but 2 vExperts, I thought this is a good opportunity to spread the word about vExpert program into the community. I talked about vExpert program, about the benefits of joining it and I showed the audience my path to vExpert. You can watch below my presentation in Romanian.

Read More

VCP6.5-DCV Delta Exam

VCP6.5-DCV Delta Exam Experience

Not so long ago I started to receive reminders from VMware Training Services about the expiration of my VCP6-DCV certification. With so many changes around, I patiently waited for the last reminder, one month to go. Read on for my journey with  VCP6.5-DCV Delta exam.

You generally have 3 ways to renew your certification:

  • Upgrade to VCAP
  • Update with the latest VCP exam (VCP6.5-DCV in my case)
  • Certify in a different technology track (for example VCP7-CMA)

Read More

VMSA-2018-0024

VMSA-2018-0024 – AirWatch Console Vulnerability

VMware has released a new security advisory VMSA-2018-0024: VMware Workspace ONE Unified Endpoint Management Console (AirWatch Console) update resolves SAML authentication bypass vulnerability.

This advisory documents the remediation of one critical issue: VMware Workspace ONE Unified Endpoint Management Console (AirWatch Console) contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. If certificate-based authentication is not enabled the outcome of exploitation is limited to an information disclosure (Important Severity).

The Common Vulnerabilities and Exposures project has assigned the identifier CVE-2018-6979 to VMSA-2018-0019 issue.

VMSA-2018-0024 – Affected Products and Resolutions

AirWatch Console 9.7.x – update to version 9.7.0.3 or above
AirWatch Console 9.6.x – update to version 9.6.0.7 or above
AirWatch Console 9.5.x – update to version 9.5.0.16 or above
AirWatch Console 9.4.x – update to version 9.4.0.22 or above
AirWatch Console 9.3.x – update to version 9.3.0.25 or above
AirWatch Console 9.2.x – update to version 9.2.3.27 or above
AirWatch Console 9.1.x – update to version 9.1.5.6 or above

As per VMware KB, if patching your environment is not feasible in a timely manner, you can take mitigation steps by disabling SAML authentication for enrollment located under System > Enterprise Integration > Directory Services.

You can check reports on other VMware vulnerabilities in my page dedicated to Security Advisories.

VMUG Romania

VMUG Romania October Meeting

At VMUG Romania we have a busy October: on 2nd October we take part to VMware vForum Romania with a presentation booth, then on 16th October we will host our autumn meeting in a new venue, AFI Park 5, Bucharest.

If you don’t know what you can expect from such a meeting, you can read my report for the February VMUG meeting.

Agenda

Cornel Popescu  (Veeam) – Improve data protection with Veeam CDP for vSphere and Availability Orchestrator
Community session – Victor Homocea – vSAN in real life
Community session – Constatin Ghioc – All about vExpert
Community session – Razvan Ionescu – PowerCLI and bulding custom vSphere images
Cristian Radu (VMware) – VMware, what’s new

In the end we will host a raffle, be sure to be there to claim your prize 🙂

Location

AFI Park 5, 9th Floor
Veeam Software, Timisoara Avenue 4A
Bucharest, Romania, 061344

Participation is free. Registration is mandatory.

VMUG Romania meeting from 16 October 2018 is sponsored by Veeam.

VMware vForum Romania 2018

VMware vForum Romania 2018

VMware announced 2018 edition of their 1 full-day conference in Romania, vForum. On 2nd October, Crown Plaza Hotel from Bucharest will host the biggest annual event of VMware Romania.

“VMware vFORUM 2018 is a full day of innovation to accelerate your digital transformation through a software-defined approach to business and IT. We show you how you can improve business agility by modernizing data centers and integrating public clouds, and create exceptional experiences by empowering a secure digital workspace. Get ready for industry-leading insights, keynotes, breakout sessions and customer case studies on the trends that matter most to your business and to IT.” – VMware vForum official site

This year the event has a long list of sponsors: Dell, Fortinet, HPE, Veeam, AWS, Check Point, Eta-2U, Kapsch, Novatech, and TechData.

Read More

VMSA-2018-0003

VMSA-2018-0019 – VMware Horizon Vulnerability

VMware has released a new security advisory VMSA-2018-0019: Horizon 6, 7, and Horizon Client for Windows updates address an out-of-bounds read vulnerability.

This advisory documents the remediation of one important issue: Horizon 6, 7, and Horizon Client for Windows contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privileged process running on a system where Horizon Connection Server, Horizon Agent or Horizon Client are installed.

The vulnerability doesn’t apply to Horizon 6, 7 Agents installed on Linux systems or Horizon Clients installed on non-Windows systems.

The Common Vulnerabilities and Exposures project has assigned the identifier CVE-2018-6970 to VMSA-2018-0019 issue.

VMSA-2018-0019 – Affected Products and Resolutions

Horizon version 7.x running on Windows – update to version 7.5.1 (release date 19 July 2018, for more details check the Release Notes)

Horizon version 6.x running on Windows – update to version 6.2.7 (release date 7 August 2018, for more details check the Release Notes)

Horizon Client for Windows version 4.x and earlier – update to version 4.8.1 (release date 7 August 2018, for more details check the Release Notes)

The vulnerability doesn’t apply to Horizon 6, 7 Agents installed on Linux systems or Horizon Clients installed on non-Windows systems.

You can check reports on other VMware vulnerabilities in my page dedicated to Security Advisories.

How to Upgrade vCenter Server Appliance from 6.5 to 6.7

How to Upgrade vCenter Server Appliance from 6.5 to 6.7 – Stage 2

In a previous article (How to Upgrade vCenter Server Appliance from 6.5 to 6.7 – Stage 1) I walked through the first phase of the upgrade process for vCSA 6.7 (embedded deployment) – Deploy the OVA File of the new vCenter Server Appliance with an embedded Platform Services Controller. In this article I will cover phase 2 of the vCenter upgrade – transfer the data and setup the newly deployed vCenter Server Appliance.

Upgrade vCenter Server Appliance from 6.5 to 6.7 – Stage 2

In the last step of the phase 1, I was presented with the following screen:

Upgrade vCenter Server Appliance from 6.5 to 6.7 - Deploy VCSA Completed

Read More