During VMworld, and in the months prior for the event the buzzword seems to be Software Defined (Everything). And although I think highly of innovative and perfectly developed software, hardware is still the driver behind the software force. Without hardware, there would be no software, and because of the innovations at the hardware level, software is able to do it’s awesomeness these days. So naming it software defined is a bit stupid IMHO!
As said, I think highly of great software. But when you think of it lots of the software houses that developed software for many years just used the innovation of hardware in a boring way. Using the extra resources the hardware would (or could) offer is what a lot of these software houses did instead of doing the same innovation in their software. as the hardware vendors did. It made developers lazy. So a revolution in Software development is needed, but giving all credits to software isn’t.
With virtualization of the X86 hardware (with VMware as the main driver behind this force) the hardware vendors (Like Intel and AMD) developed more and more cool features on the hardware side that can be leveraged by software. After server virtualization we started virtualizing the storage and now we start virtualizing the network. This are all awesome achievements and I hope to see much more on these great technologies.
Did a server (before Software Defined) do anything without software installed on it? Or a switch or router? Have you ever seen a NAS or a SAN perform without software? So why does it now all of a sudden has to be named software defined? Hardware needs Software, as Software needs Hardware, so let’s rename it to something both of these awesome technologies are equally represented
Lots of questions. Do I have the answers? not really, but I guess the most of the renaming and rebranding has to do with Marketing. Renaming and creating buzzwords sells. So doing renamed technologies that already existed is all about making decision makers drool, and buy the new software (and hardware) products. It’s all about selling, and the developers just keep on creating the awesome software they are creating as well as the hardware vendors will keep on creating incredible cool hardware.
In part 1 we installed the VMware vShield part which is needed to get Trend Micro Deep Security up and running. In part 2 we created a database instance that will be used by the Deep Security Manager (DSM). In this part we’ll focus on the installation of the DSM itself. The DSM is the management interface used to manage and monitor the Deep Security environment. You will use this to deploy Deep Security Virtual Appliance (DSVA) instances as well as creating scan profiles, monitor the Deep Security infrastructure and more.
Let’s install the DSM now, first we’ll need to make sure we’ll have the right software (can be downloaded here):
After you’ve downloaded and extracted the Deep Security Manager files, doubleclick on the manager execution file
The Setup will start and in the Welcome screen Click Next
In the License Agreement screen select I accept.. and then click Next
In the Select Destination Directory screen Browse to the destination folder and Click Next
In the database screen select and setup the right Database setup (as created in part 2) and click Next
In the License screen provide your License activation code and press Next
In the Adress and Ports screen provide the FQDN of the DSM and click Next
In the credentials screen Provide a Username (MasterAdmin is standard) and a password and click Next
In the security update window leave the defaults and click Next
In the Co-located Relay screen select Yes and include AntiMalware and click Next
In the Smart Protection Network screen Enable Trend Micro Smart Feedback and click Next
In the confirm Settings click finish to install the DSM
After the installation is finished open a browser and browse to the FQDN (httpS://yourdsm.xxx:4119) of the DSM in the logon screen provide the username and password to log in to the DSM
After Login the DSM interface will look like this
In Part 4 we’ll install a Deep Security Virtual Appliance (DSVA). See you there And if you have any question please let me know.Read More
Today VMware (John Troyer) opened the VMware vExpert 2013 application program. As a vExpert 2012 I know how awesome it is to be in this awesome group of people. I’ll quote John for what the vExpert title is all about:
Each year, we bring together in the vExpert Program the people who have made some of the most important contributions to the VMware community. These are the bloggers, book authors, VMUG leaders, speakers, tool builders, community leaders and general enthusiasts. They work as IT admins and architects for VMware customers, they act as trusted advisors and implementors for VMware partners or as independent consultants, and some work for VMware itself. All of them have the passion and enthusiasm for technology and applying technology to solve problems. They have contributed to the success of us all by sharing their knowledge and expertise over their days, nights, and weekends. They are, quite frankly, the most interesting and talented group of people I’ve ever been in a room with.
There are three paths that you can follow for becoming a vExpert:
The Evangelist Path includes book authors, bloggers, tool builders, public speakers, VMTN contributors, and other IT professionals who share their knowledge and passion with others with the leverage of a personal public platform to reach many people. Employees of VMware can also apply via the Evangelist path. A VMware employee reference is recommended if your activities weren’t all in public or were in a language other than English.
The Customer Path is for leaders from VMware customer organizations. They have been internal champions in their organizations, or worked with VMware to build success stories, act as customer references, given public interviews, spoken at conferences, or were VMUG leaders. A VMware employee reference is recommended if your activities weren’t all in public.
VPN (VMware Partner Network) Path
The VPN Path is for employees of our partner companies who lead with passion and by example, who are committed to continuous learning through accreditations and certifications and to making their technical knowledge and expertise available to many. This can take shape of event participation, video, IP generation, as well as public speaking engagements. A VMware employee reference is required for VPN Path candidates.
This year it is possible again to Recommend someone for the vExpert Title. When you know someone that goes above and beyond whenever it comes to VMware make sure to recommend her/him at this site:Read More
Yesterday in the first part of this blog series on installing Trend Micro Deep Security 9 we installed the VMware vShield Manager as well as the vShield Endpoint on the hosts in our environment. The last prerequisite is the setup of the database for the DSM. This Database can be an Microsoft SQL or Oracle Database. While installing the Deep Security Manager you’ll have the option to install a build in that will only be able to support about 10 VM’s…..
The Database will grow fast, and an Microsoft SQL Express Database which has a limit of 4GB will be suitable for about 50 VM’s. Take that in mind when you’re doing a Proof of concept an thinking about using this kind of database.
With all that being said, let’s setup a database for the Deep Security Manager (I’ll use SQL2012 in this case):
Open the Microsoft SQL server management Studio:
In the Connect to Server windows choose your authentication method and press Connect:
Right Click on Databases and select New Database:
Provide a name for the database, select a database owner and press OK (leave the rest default):
If everything went well the database will be created and show in the Databases tab:
This step is the last one needed to begin the install of the Trend Micro Deep Security Manager. See you next time, and again when ever you have questions please feel free to contact meRead More
Installing Deep Security is not that hard. In this post I’ll walk you through the first step of getting Deep Security up and running in your virtual environment. The installation of vShield Manager.
In order to get Trend Micro Deep Security running a couple of prerequisites need to be in place. The prerequisites that need to be in place are:
The vShield Manager
The vShield Endpoint (installed on every host)
A Database (SQL or Oracle)
Let’s start with installing the vShield Manager. In order to this you’ll have to download the vShield Manager here. After the download is done, open vCenter and go to File –> Deploy OVF Template (Press picture for larger image)
In the Source window Click Browse
Browse to the vShield Manager OVA file and Open it
Click Next in the Source window
In the OVF Template Details click Next
In the End User License Agreement click Accept and click Next
In the Name and Location window Provide a vSM name and click Next
In the Host / Cluster window select the Cluster you want the vSM to be in and click Next
In the Specify a Specific Host select a host and click Next
In the Storage window choose the datastore you want to use and click Next
In the Disk Format window choose the format you want to use and click Next
In the Ready to Complete window Select Power on after Deployment and Press Finish
The deployment of the OVF will start and after this is complete open the vSM Console window
To log in to vSM use the Default username: admin and password: default
- Provide a IP Address
- Subnet Mask
- Default gateway
- Primary (and secondary) DNS
Open a webbrowser and surf to the IP address you just provided for the vSM
Log in with the admin account (user: admin pw: default)
Edit the vCenter Server settings so the vSM is able to communicate with the vSphere environment
The installation of the vSM is now done. To install vShield Endpoint on the hosts perforn these steps
In vSM browse to the host you want vShield Enpoint to be installed on and click Install
In the next we’ll install the Trend Micro Deep Security Manager. If you have questions, please don’t hesitate to reach out to me.Read More
@Virtual_Bill has been busy getting another v0dgeball team for the annual EMC-sponsored v0dgeball tournament… We ned some help from you guys to get this Gold Medal team up and running and show the other teams they are ……
Follow this link to fill in the form:
Info provided by Bill:
VMworld 2012 marks the 3rd year for the EMC-sponsored v0dgeball tournament.
All proceeds from the tournament go for the Wounded Warrior Project.
This year, with the backing of the Gestalt IT Godfather, Stephen Foskett, we are rounding up Tech Field Day delegates to create a super team of dodgeballers. If we can throw a ball at a competitor as well as we throw water bottles at presenters who say “Gartner”, “Magic Quadrant”, or “Single Pane of Glass”, the other teams hardly stand a chance of winning!
WHEN: Sunday, August 26 – 4-6pm
WHERE: Soma Rec Center
WHO: You (of course)
# of PLAYERS: 10
COST: Team entry requires $1000. So, we would need to split the cost across the players: $100/player.
UPDATE: A mysterious doner is willing to provide some additional funds to help ease the financial pressure on the team. So, please provide how much you would be willing to pay in the comments field! HINT: They have a NEX and know how to use it!
So… what do you say?! Are you ready to step up and join Team TFD?!
NOTE: Signing up on this form merely indicates that you are available during the timeslot and that you would be willing to pony up $100 if we are able to get enough people. I will reach out to the first 9 people to respond with an invite for the team!
So if you’d like to be in the winning team? Join ours….Read More