VMworld 2019 US and Europe events feature many opportunities to learn about the latest in VMware vSphere server virtualization technology and operations. This page is a quick reference to the VMworld 2019 sessions and other events where customers are able to engage with VMware experts on a range of topics, as well as network with industry peers. Links to the EU sessions will be added to the coming days. You can also still access the presentations, recordings, and session information from last year here – VMworld 2018 Archive. How PowerCLI Makes vSphere Configuration Management Easy Level 300 – [US: CODE2214U] Configuration management is a key DevOps principle. PowerShell and PowerShell DSC are easy ways to make use of config management in your environment. However, there's one area that's been missing that ability: VMware. PowerCLI has introduced the key to close that gap, and it's open-sourced! The Art of Code That Writes Code Level 300 – [US: CODE2216U] REST APIs are everywhere these days. A majority of those are backed by what's known as OpenAPI (swagger) specifications. Using the vast ecosystem of OpenAPI tooling, we can generate documentation, SDKs, and even PowerShell modules.
NVIDIA's virtual GPU (vGPU) technology, which has already transformed virtual client computing, now supports server virtualization for AI, deep learning and data science. Previously limited to CPU-only, AI workloads can now be easily deployed on virtualized environments like VMware vSphere with new vComputeServer software and NVIDIA NGC. Through our partnership with VMware, this architecture will help organizations to seamlessly migrate AI workloads on GPUs between customer data centers and VMware Cloud on AWS. IT administrators can use hypervisor virtualization tools like VMware vSphere, including vCenter and vMotion, to manage all their data center applications, including AI applications running on NVIDIA GPUs. These GPU servers are often isolated, with the need to be managed separately.
VMware has used the first day of VMworld in Las Vegas to announce a handful of innovations across its hybrid cloud portfolio of infrastructure and management software, pushing its multi-cloud business strategy as offering flexibility to customers. Newly announced is the vSphere Platinum Edition, a new release of vSAN to further ease hyperconverged infrastructure adoption, and new updates across the VMware vRealize cloud management platform, which VMware said will help customers deliver developer-friendly infrastructure from any cloud with more secure and consistent operations. As far and fast as cloud computing is embedding itself into the enterprise, there remain many cloud-resistant applications and services. Speaking with press ahead of the announcement, VMware VP and CTO for the Americas Cameron Haight said consistent infrastructure allows for the datacentre, the cloud, and now the edge to operate harmoniously. "We want to make sure we provide a consistent operation environment ... we want to make that digital foundation ubiquitous," Haight said.
VMware on Tuesday announced Project Arctic, a technology preview of a new architecture for its vSphere virtualization software. Project Arctic effectively makes hybrid cloud the default operating model. It natively integrates cloud connectivity into vSphere, allowing customers to leverage cloud services for any workloads running on vSphere, including on premise ones. Customers will be able to leverage unlimited cloud capacity on demand and access VMware cloud services through vCenter. Project Arctic showcases how VMware is evolving its products to support customers' multi-cloud strategies.
VMware is urging its vCenter users to update vCenter Server versions 6.5, 6.7, and 7.0 immediately, after a pair of vulnerabilities were reported privately to the company. The most pressing is CVE-2021-21985, which relates to a remote code execution vulnerability in a vSAN plugin enabled by default in vCenter that an attacker could use to run whatever they wished on the underlying host machine, provided they can access port 443. Even if users do not use vSAN, they are likely to be affected because the vSAN plugin is enabled by default. "The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server," VMware described the issue in an advisory. In its FAQ, VMware warned that since the attacker only needs to be able to hit port 443 to conduct the attack, firewall controls are the last line of defence for users.