Wednesday, January 11, 2017

New vCenter Server Appliance File-Based Backup / Restore Walkthroughs

New vCenter Server Appliance
File-Based Backup / Restore Walkthroughs




The vCenter Server Appliance (VCSA) 6.5 is full of new and exclusive features. One of which is the native file-based backup and restore. I’m happy to announce two new guided walkthroughs on the VMware Feature Walkthrough site. These walkthroughs will help illustrate how to setup the vCenter Server Appliance file-based backup feature. But also how to restore your vCenter Server Appliance to life when needed.

File-Based Backup

This new out-of-the-box functionality supports the backup of the vCenter Server Appliance or Platform Services Controller (PSC). This includes both embedded or external deployments. To begin the backup workflow, log in the VMware vSphere Appliance Management Interface (VAMI) of the VCSA or PSC. Navigate to the summary tab and click the Backup button to launch the Backup Appliance wizard. The VCSA file-based backup feature requires no quiescing or downtime of the selected appliance.
vCenter Server Appliance File-Based Backup 1
By default, the configuration and inventory data of a vCenter Server Appliance are backed up. There is also the option to backup the historical and performance data of the VCSA. The PSC will not have this option since all historical and performance data is kept in the VCSA database. Keep in mind that selecting this option could increase the backup time of the VCSA. The backup workflow will produce a set of files for the designated appliance. An option to encrypt the backup files using AES 256 is available by checking a box and entering a password. The encryption password is not stored and if lost, there is no way to recover those backup files. The backup files are then streamed to a backup target using one of the supported protocols: FTP(s), HTTP(s), and SCP. Once the backup workflow completes successfully, the files are visible at the backup target.
vCenter Server Appliance File-Based Backup 2

File-Based Restore

In the case of a disaster and your VCSA or PSC is no longer available, it’s time to put that backup to use. Make sure to have the original ISO used when deploying or upgrading your VCSA or PSC instance handy. During the restore workflow, enter the backup protocol and location used. If the option to encrypt your backup was selected, the same password used will be required to decrypt it. Without the encryption password, the restore of an appliance is not possible.
vCenter Server Appliance File-Based Restore 1
As part of the restore workflow, a new VCSA or PSC is deployed retaining its UUID and system name (FQDN). There are opportunities to change a few of the appliance settings during a restore. The deployment and storage sizes can remain the same or increase, but can not decrease in size. The appliance IP address, mask, gateway, and DNS can be changed. Two key points to remember when changing the appliance network settings. The first, if an appliance uses an IP address for its system name (FQDN), then it can not be changed. Second, in changing any appliance network settings remember to update DNS. The restore workflow will process to configure the appliance to the selected backup file.Once the restore workflow has completed, log in the vSphere Web Client to verify.

vCenter Server Appliance File-Based Restore 2

Walkthroughs

vCenter Server Appliance File-Based Backup Walkthrough is available here.
vCenter Server Appliance File-Based Restore Walkthrough is available here.
More information about the vCenter Server Appliance File-Based Backup and Restore can be found in the vSphere 6.5 documentation.

Monday, October 24, 2016

Configure Exchange Server 2016 for SMTP Application Relay


In most organizations there are several devices or applications that need to use an SMTP service to send email messages. An Exchange 2016 server can provide that service for you, however the configuration required on the server depends on the SMTP relay requirements of your scenario.
There are generally two types of SMTP relay scenarios that Exchange Server 2016 is used for:
  • Internal relay – devices and applications that need to send email messages only to internal recipients in the Exchange organization.
  • External relay – devices and applications that need to send email messages to external recipients.
exchange-2016-smtp-relay-01
Let’s take a look at each of those scenarios, and then some additional considerations when you are deploying this in your own production environments.

INTERNAL SMTP RELAY WITH EXCHANGE SERVER 2016

When Exchange Server 2016 is first installed the setup routine automatically creates a receive connector that is pre-configured to be used for receiving email messages from anonymous senders to internal recipients. This allows inbound internet email to be received by the server, and is also suitable for internal relay scenarios.
The receive connector is named “SERVERNAME\Default Frontend SERVERNAME”, for example, “EXSERVER\Default Frontend EXSERVER” in my test environment.
[PS] C:\>Get-ReceiveConnector

Identity                                Bindings                                Enabled
--------                                --------                                -------
EXSERVER\Default EXSERVER               {0.0.0.0:2525, [::]:2525}               True
EXSERVER\Client Proxy EXSERVER          {[::]:465, 0.0.0.0:465}                 True
EXSERVER\Default Frontend EXSERVER      {[::]:25, 0.0.0.0:25}                   True
EXSERVER\Outbound Proxy Frontend EXS... {[::]:717, 0.0.0.0:717}                 True
EXSERVER\Client Frontend EXSERVER       {[::]:587, 0.0.0.0:587}                 True
You can test this connector by making an SMTP connection using Telnet and issuing SMTP commands. For example:
C:\>telnet exserver 25

220 EXSERVER.exchange2016demo.com Microsoft ESMTP MAIL Service ready at Thu, 22
Oct 2015 11:39:23 +1000
helo
250 EXSERVER.exchange2016demo.com Hello [192.168.0.30]
mail from: test@test.com
250 2.1.0 Sender OK
rcpt to: adam.wally@exchange2016demo.com
250 2.1.5 Recipient OK
Data
354 Start mail input; end with .
Subject: Test email
Testing
.
250 2.6.0 <f7c2f921-ff7e-4ce4-b2eb-a70dc52f225f@EXSERVER.exchange2016demo.com> [
InternalId=854698491929, Hostname=EXSERVER.exchange2016demo.com] Queued mail for
 delivery
So there’s no specific configuration required on the server or the connectors to allow this scenario, however it is recommended that you use a DNS alias instead of the real server name. This will allow you to configure all of your devices and applications with the DNS alias, and you can later move that DNS alias to point to a different Exchange server during a migration.

EXTERNAL SMTP RELAY WITH EXCHANGE SERVER 2016

Continuing from the previous demonstration, let’s see what happens if I try to use Telnet to send an email message from a valid internal address to an external recipient.
220 EXSERVER.exchange2016demo.com Microsoft ESMTP MAIL Service ready at Thu, 22
Oct 2015 12:04:45 +1000
helo
250 EXSERVER.exchange2016demo.com Hello [192.168.0.30]
mail from: adam.wally@exchange2016demo.com
250 2.1.0 Sender OK
rcpt to: exchangeserverpro@gmail.com
550 5.7.54 SMTP; Unable to relay recipient in non-accepted domain
An SMTP error code “550 5.7.54, Unable to relay recipient in non-accepted domain” is received instead. The receive connector will not allow an anonymous, unauthenticated sender to relay to external domain names, which prevents your server from being exploited as an open relay.
There are two ways you can resolve this and allow your devices and applications to send to external recipients:
  • Using authentication for SMTP connections
  • Configuring an anonymous SMTP relay connector

EXTERNAL SMTP RELAY WITH EXCHANGE SERVER 2016 USING AUTHENTICATION

The first method is to use authenticated SMTP connections. Exchange Server 2016 has a receive connector designed to be used by clients that need to send via SMTP called “SERVERNAME\Client Frontend SERVERNAME”, for example “EXSERVER\Client Frontend EXSERVER” in my test environment.
[PS] C:\>Get-ReceiveConnector

Identity                                Bindings                                Enabled
--------                                --------                                -------
EXSERVER\Default EXSERVER               {0.0.0.0:2525, [::]:2525}               True
EXSERVER\Client Proxy EXSERVER          {[::]:465, 0.0.0.0:465}                 True
EXSERVER\Default Frontend EXSERVER      {[::]:25, 0.0.0.0:25}                   True
EXSERVER\Outbound Proxy Frontend EXS... {[::]:717, 0.0.0.0:717}                 True
EXSERVER\Client Frontend EXSERVER       {[::]:587, 0.0.0.0:587}                 True
Minimal configuration is required to get this working. Assuming you’ve already configured an SSL certificate for Exchange Server 2016, and added a DNS alias for your SMTP devices and applications to use (I’m using a DNS alias of mail.exchange2016demo.com in this example), you should then also set the TlsCertificateName for the receive connector.
Use Get-ExchangeCertificate to identify the thumbprint of the SSL certificate you’ll be using.
[PS] C:\>Get-ExchangeCertificate

Thumbprint                                Services   Subject
----------                                --------   -------
FC5259C0528657EF22BB818CA9B23FD220A9DE83  ...WS..    CN=mail.exchange2016demo.com, OU=IT, O=LockLAN Systems Pty Ltd,...
FE6528BE1548D81C794AE9A00D144FF3D16E0CD2  ....S..    CN=Microsoft Exchange Server Auth Certificate
DAB089E53CA660DEF7B8EE303212C31C0E3D3499  IP.WS..    CN=EXSERVER
17839AF62AA3A1CBBD5F7EC81E92A609976D8AD9  .......    CN=WMSvc-EXSERVER
The syntax of the TlsCertificateName string is made up of two different attributes of the certificate, so I use the following commands to apply the configuration to my receive connector.
[PS] C:\>$cert = Get-ExchangeCertificate -Thumbprint FC5259C0528657EF22BB818CA9B23FD220A9DE83

[PS] C:\>$tlscertificatename = "<i>$($cert.Issuer)<s>$($cert.Subject)"

[PS] C:\>Set-ReceiveConnector "EXSERVER\Client Frontend EXSERVER" -Fqdn mail.exchange2016demo.com -TlsCertificateName $tlscertificatename
To test using the Client Frontend connector to send an email message I’m going to use PowerShell’s Send-MailMessage cmdlet instead of Telnet. First, capture some valid credentials to use for authentication.
PS C:\>$credential = Get-Credential
Next, use the Send-MailMessage cmdlet with parameters specifying the server, to and from addresses, subject line, and the port number.
PS C:\>Send-MailMessage -SmtpServer mail.exchange2016demo.com -Credential $credential -From 'adam.wally@exchange2016demo.com' -To 'exchangeserverpro@gmail.com' -Subject 'Test email' -Port 587 -UseSsl
In the above example the email is successfully received by the external recipient. So any device or application on the network that can use authenticated SMTP can be set up to use that connector listening on port 587 on your Exchange 2016 server.

EXTERNAL SMTP RELAY WITH EXCHANGE SERVER 2016 USING ANONYMOUS CONNECTIONS

When authenticated SMTP is not an option you can create a new receive connector on the Exchange 2016 server that will allow anonymous SMTP relay from a specific list of IP addresses or IP ranges.
In the Exchange Admin Center navigate to mail flow and then receive connectors. Select the server that you want to create the new receive connector on, and click the “+” button to start the wizard.
exchange-2016-smtp-relay-02
Give the new connector a name. I like to keep the name consistent with the other default connectors. Set the Role to “Frontend Transport”, and the Type to “Custom”.
exchange-2016-smtp-relay-03
The default Network adapter bindings are fine. This represents the IP and port that the server will be listening on for connections. Multiple receive connectors on the Frontend Transport service can listen on the same port of TCP 25.
exchange-2016-smtp-relay-04
Remove the default IP range from the Remote network settings, and then add in the specific IP addresses or IP ranges that you want to allow anonymous SMTP relay from. I do not recommend adding entire IP subnets that contain other Exchange servers as this can cause issues with server to server communications.
exchange-2016-smtp-relay-05
Click Finish to complete the wizard, then there is some additional configuration still required.
In the Exchange Management Shell run the following two commands.
[PS] C:\>Set-ReceiveConnector "EXSERVER\Anon Relay EXSERVER" -PermissionGroups AnonymousUsers

[PS] C:\>Get-ReceiveConnector "EXSERVER\Anon Relay EXSERVER" | Add-ADPermission -User 'NT AUTHORITY\Anonymous Logon' -ExtendedRights MS-Exch-SMTP-Accept-Any-Recipient
We can now test the connector using Telnet from the IP address that was added to the remote network settings of the receive connector. In my test environment that IP address will now be allowed to send email from any email address (whether it is a valid internal address or not) to any external address.
220 EXSERVER.exchange2016demo.com Microsoft ESMTP MAIL Service ready at Thu, 22
Oct 2015 12:59:39 +1000
helo
250 EXSERVER.exchange2016demo.com Hello [192.168.0.30]
mail from: test@test.com
250 2.1.0 Sender OK
rcpt to: exchangeserverpro@gmail.com
250 2.1.5 Recipient OK
Data
354 Start mail input; end with .
Subject: test
.
250 2.6.0 <e1739c5f-db11-4fdd-aa27-a9702bc15b15@EXSERVER.exchange2016demo.com> [
InternalId=863288426497, Hostname=EXSERVER.exchange2016demo.com] Queued mail for
 delivery

ADDITIONAL CONSIDERATIONS

Here’s some additional items that you should consider when you’re providing SMTP relay services with Exchange Server 2016 for your environment.

HIGH AVAILABILITY AND LOAD BALANCING

If you want to provide a highly available SMTP service then a load balancer is the natural solution. If you plan to load balance you’ll need to ensure that the same receive connectors exist on all of the servers in the load balanced pool. This means creating the same relay connector on multiple servers and managing the same list of permitted IP addresses on those connectors.
However, as you’ll see by reading my article on issues with load balancing SMTP traffic, when a load balancer is source NATing the connections the only IP address that will appear to the Exchange server is that of the load balancer itself, not the source device or application. While this simplifies the receive connector configuration (only the load balancer IP needs to be added as an allowed IP) it opens up a number of concerns:
  • Access control (which IP’s are allowed to send) needs to be applied at the load balancer, or you risk having a wide open anonymous SMTP relay service on your network
  • Depending on the load balancer, health probes to the Exchange servers may not detect all health conditions, resulting in traffic being sent to unhealthy servers (and failing)
  • Connections made via the load balancer are anonymous and in some cases untraceable to the source IP (depending on what logging your load balancer is capable of)
You can read more about these issues here.
If a load balancer is not an option for you and you still want some high availability for SMTP services, then you can consider DNS round robin. However, many devices and applications do not handle DNS round robin as well as Outlook or a web browser would. Some devices, when they attempt a connection to one of several IP addresses available in DNS round robin and that IP address is not responding, will not try other IP addresses that are available and will simply consider the connection attempt failed. So it really depends on how well your devices and applications deal with that situation as to whether DNS round robin will be suitable for your environment.

SECURITY VS CONVENIENCE

A lot of organizations simply go with the anonymous relay option and set up a connector that allows wide ranges of IP addresses to relay email anywhere. This is the simplest approach, but clearly not the best in terms of security and auditing. Anonymous relay relies on trusted, identifiable IP addresses. If the IP addresses are in a DHCP pool, are associated with a load balancer (see above), are multi-user (such as terminal servers), or the IP/host itself is compromised in some way, then your ability to trace emails back to the real source is difficult if not impossible.
Although authentication adds some complexity, it may be worth it from security perspective. However it does mean managing credentials for all of your devices and applications. Sharing SMTP credentials across multiple systems might seem like a way to avoid complexity, but it re-introduces the problems associated with anonymous SMTP.

ENCRYPTION

In the tutorial above I demonstrated configuring a TLS certificate name for a receive connector and also used TLS/SSL for my testing with Send-MailMessage. If you are going to use authentication for SMTP in your environment, or the SMTP traffic is in any way sensitive, then you should protect it with TLS/SSL encryption.

MULTIPLE RECEIVE CONNECTORS

You may be wondering how the Exchange server is able to differentiate between traffic destined for one receive connector vs another receive connector, when both of them are listening on the same IP address and port number, for example “EXSERVER\Default Frontend EXSERVER” and “EXSERVER\Anon Relay EXSERVER”.
The answer is in the Remote network settings of the receive connectors. Exchange will use the receive connector that is the most specific match for the source IP address of the SMTP connection.
In my examples above this means that the default connector with its remote network settings of 0.0.0.0-255.255.255.255 (which is basically “anywhere”) is less specific than the relay connector with its remote network settings of 192.168.0.30. So when an SMTP connection comes from IP 192.168.0.30 to port 25 on the server it will be handled by the relay connector, while everything else connecting to port 25 will be handled by the default connector.
exchange-2016-smtp-relay-06

TROUBLESHOOTING

One of the most common issues when troubleshooting receive connector behaviour on an Exchange server is determine which connector is actually handling a given connection. There are two ways to approach this type of troubleshooting.
The first is to set different SMTP banners on each connector. Exchange MVP Jeff Guillet has a PowerShell example that you can run to configure each connector’s SMTP banner with the name of the connector itself, so that when you connect with Telnet you can immediately see which receive connector you’ve connected to.
[PS] C:\>$rc = Get-ReceiveConnector -Server EXSERVER
[PS] C:\>$rc | % {Set-ReceiveConnector $_.Identity -ProtocolLoggingLevel Verbose  -Banner "220 $_"}
Now when you use Telnet to connect you will see the connector name in the banner.
C:\>telnet exserver 25

220 EXSERVER\Anon Relay EXSERVER
The other troubleshooting method is to use protocol logging. In the PowerShell example above the protocol log level for each connector was also set to “Verbose”. You can set this on individual connectors if you need to by running Set-ReceiveConnector.
[PS] C:\>Set-ReceiveConnector "EXSERVER\Anon Relay EXSERVER" -ProtocolLoggingLevel Verbose
You can then review the protocol logs to determine what is happening to SMTP connections. I generally recommend you leave protocol logging enabled for receive connectors at all times.

SUMMARY

This article demonstrates how Exchange Server 2016 can be used to provide SMTP relay services to devices and applications on your network. As you can see there are multiple approaches that you can take to achieve this, each being suitable for different scenarios, and each having some pros and cons associated with it.
Internal relay needs are already met with the default configuration of an Exchange 2016, and authenticated SMTP for external relay is also available with minimal setup. When anonymous relay is required an additional receive connector can be easily configured.
I do recommend that you consider your actual requirements and implement the most appropriate solution to meet them, instead of simply configuring an anonymous relay connector for all devices and applications on your network.

Sunday, October 23, 2016

Introducing vSphere 6.5 & A Look at new vCenter Server Appliance


Today, VMware announces vSphere 6.5, the latest version of its industry-leading virtualization platform.  This new release of vSphere features a dramatically simplified experience, comprehensive built-in security, and a universal app platform for running any app.
vSphere 6.5 accelerates the customer transition to digital transformation and cloud computing by addressing key challenges:
1.     Environments growing increasingly complex,
2.     Growing IT security threats, and
3.     The need to support both existing and new apps and services.
Let’s take a look at some of the key capabilities.

Dramatically Simplified Experience

vSphere 6.5 elevates the customer experience to an entirely new level. It provides exceptional management simplicity, operational efficiency, and faster time to market
vSphere 6.5 makes the vCenter Server Appliance the fundamental building block of a vSphere environment. The core vSphere architecture is built around this easy to deploy and manage approach that reduces operational complexity by embedding key functionality into a single location. Capabilities such as vSphere host management (with a fully integrated vSphere Update Manager), file-based backup and recovery,native VCSA high availability, and much more are now embedded in this new one-stop appliance model. Users can now be more efficient as there is no longer a need to interface with multiple components.  Additionally, because everything is centralized, vCenter Server Appliance generates a tremendous amount of optimization and innovation, including an over 2x increase in scale and 3x in performance.  Upgrading to this building block will be easier than ever before as users can now convert from their traditional Windows deployment into the new appliance model using the new vCenter Server Appliance Migration tool.

vcsa-highlights
vCenter Server Appliance: The fundamental building block of a vSphere environment
In this release, vSphere 6.5 also takes an API-first approach to foster a more business-centric and highly agile environment. In a world where infrastructure as code is becoming a requirement rather than just nice to have, a programmable infrastructure layer is now essential. vSphere 6.5 introduces new REST-based APIs for VM Management that vastly improve both the user and partner experience by enabling finer control of virtual infrastructure for apps. You can now do much more with less lines of code with these new simple APIs.
The final component that allows vSphere 6.5 to deliver a simplified experience is the graphical user interface itself. The highly anticipated new HTML5-based vSphere Client provides a modern user interface experience that is both responsive and easy to use.   Many customers have already experienced this vSphere Client as part of a Fling on VMware Labs, and thus far the response has been overwhelming positive.
HTML5-based vSphere Client: GUI that enables fast performance and cross-platform compatibility
HTML5-based vSphere Client: GUI that enables fast performance and cross-platform compatibility

Comprehensive Built-in Security

With increased threats, comprehensive built-in security becomes more critical than ever before. vSphere 6.5 natively provides secure data, infrastructure, and access at scale via its operationally simple, policy-driven model. Protecting all three areas is essential for digital transformation and the evolution of any given business.
To secure data, vSphere 6.5 offers a new VM-level disk encryption capability designed to protect against unauthorized data access. VMware’s approach is both universal and scalable, with the ability to encrypt any VM disk regardless of guest OS, and the ability to manage encryption at scale using the familiar vSphere storage policy framework. Combined with the new encrypted vMotion capability, vSphere can safeguard both data at-rest and data in-motion.
To assure the security of the underlying infrastructure, vSphere 6.5 also adds a secure boot model to protect both the hypervisor and the guest operating system. It helps prevent images from being tampered with and prevents the loading of unauthorized components.
vSphere 6.5 also delivers enhanced audit-quality logging capabilities that provide more forensic information about user actions. IT can now better understand who did what, when, and where if an investigation into anomalies or security threats requires it.
vSphere 6.5 is the core of a secure SDDC and works seamlessly with other SDDC products to provide a complete security model for infrastructure.
Comprehensive Built-in Security: Secure Data, Secure Infrastructure, and Secure Access
Comprehensive Built-in Security: Secure Data, Secure Infrastructure, and Secure Access

Universal App Platform

vSphere is a universal app platform that supports both traditional and next-generation apps. While these two worlds are vastly different, both require infrastructure with the scale, performance, and availability to meet key business objectives.
vSphere has always been pushing the limits on what apps it can support.  Initially it was all about test/dev but then quickly expanded coverage business critical apps as well.  Later, it included Desktop Virtualization and 3D graphics.  Now we are seeing more modern apps being virtualized including Hadoop, Spark, Machine Learning, HPC and cloud native apps.
To run any app, vSphere 6.5 expands its workload coverage model by focusing on both scale-up and scale-out next-gen apps that are increasingly built using evolving technology building blocks, such as containers.   In this release, VMware delivers vSphere Integrated Containers, the easiest way for vSphere users to bring containers into an existing vSphere environment. vSphere Integrated Containers delivers an enterprise container infrastructure that provides the best of both worlds for the developers and vSphere operations teams. Containers are now just as easy to enable and manage as virtual machines. No process or tool changes are required.
VMware vSphere Integrated Containers helps customers to transform their businesses with containers without re-architecting their existing infrastructure. It is comprised of three components – the Engine which provides the core container run-time, Harbor which is an enterprise registry for container images, and Admiral which is a portal for container management by dev teams. vSphere Integrated Containers enables IT operations teams to provide a Docker compatible interface to their app teams, running on their existing vSphere infrastructure and features tight integration with VMware NSX and VMware Virtual SAN to support best-in-class network automation and scale out, high performance persistent storage, respectively.
vSphere Integrated Containers: Delivering the best of both worlds for IT and Developers
vSphere Integrated Containers: Delivering the best of both worlds for IT and Developers

vSphere 6.5 also lets you run apps from any cloud, including your data center or in public cloud environments. vSphere 6.5 is not only the heart of the Software-Defined Data Center, it’s also the foundation of VMware’s cloud strategy. vSphere 6.5 is available in both the private cloud and as a service through a public cloud. The newly announced VMware Cloud Foundation and VMware Cloud on AWS are both built on vSphere 6.5.
As the ideal platform for apps, cloud, and business, vSphere 6.5 reinforces the customer’s investment in VMware. vSphere 6.5 is one of the core components of VMware’s SDDC and a fundamental building block for VMware’s cloud strategy. With vSphere 6.5, customers can now run, manage, connect, and secure their applications in a common operating environment, across clouds and devices.
And about A Look at new vCenter Server Appliance:

VMworld has once again landed in Barcelona for its annual European conference and gathering of the geeks. I’ve been a tad quiet these past few weeks as I dove into the vast amounts of content provided by VMware on their upcoming vSphere 6.5 release. In this post, I pick apart the new information being passed by the VMware Technical Marketing team. And, wow, I think you’ll be happy with all of the superb work they are doing!
After talking with the team and seeing what’s going down, I have formed the opinion that the Windows deployment of vCenter Server is definitely a dead man walking. This has largely been lip service paid by VMware in the past because they weren’t actually solving real world problems with the VCSA – it was mostly just something I used for labs. With the VCSA 6.5 release, however, I don’t really see any reason to continue using a Windows deployment of vCenter Server.
At a high level, the VCSA can now be clustered for High Availability, includes VMware Update Manager (VUM), has a ton of new improvements on the VAMI side, and supports native backups and restores.
vcsa-65-whats-new
Let’s dig into these improvments – and many others – in this post.

Deploying and Configuring

The process to install and configure the appliance has also received a major forklift update. The process entails two steps: deploying the OVA (virtual appliance) and then laying down a configuration. New to this version, the deployment process can be done on Windows, Mac, or Linux. The menu has been simplified into Install, Upgrade, Migrate, or Restore.
vcsa-deploy-menu
I think the menu options and support helper language is simple and clean. In the past, VMware has made this sort of process clunky and overly technical, so I gave this a round of kudos to the VCSA team.
It also means that you can use VMware snapshots to provide a rollback for improper configurations – which is a major hallmark of the feature for VMware administrators – in addition to creating templates for automated deployments.

Migration into the VCSA

Migration is supported on the Windows vCenter Server versions 5.5 and 6.0. This makes sense, since they are the only supported versions of vCenter currently available today. The 5.0 and 5.1 releases went into Technical Guidance back in August of 2016. This means that both embedded and external database topologies can be migrated from Windows to the VCSA – including VMware Update Manager (VUM) – and will assume the identity of the previous vCenter Server instance. This includes the UUID, IP address, name, certificates, and so forth.
There’s even options to determine how much data is migrated: just the configuration; configuration, events, and tasks; or configuration, events, tasks, and performance metrics (consumes much more data). If you don’t want performance data, as an example, you can drop this moving forward. It might be wise to do this for use cases in which you’re heading into a hardware and host refresh.

Management and Monitoring

The management interface of the VCSA has received a fresh coat of paint. This means that it is much less of a black box, which was my major pet peve, and offers an administrator a ton of information on network, CPU, memory, and database operations. Below is an example image showcasing the vPostgres Database. In past experiences, solutions were always to “throw more resources” at the VCSA due to lack of understanding of what was going on. I think the monitoring pane will help alleviate this.
vcsa-monitoring
Note that the appliance menu also gives configuration options for a remote syslog server. If the appliance finds itself reaching a high water mark it will gracefully shut down to avoid silent corruption. A new watchdog, named vMon, is a service watching all of the vCenter Server Appliance services in order of criticality. It is considered the “source of truth” for VMware’s new High Availability feature for the VCSA.
The team also shared how you’re expected to manage vCenter across a number of different interfaces. Sadly, the Web Client remains based on Adobe Flex and thus requires Flash. Apparently more performance improvements have been made, with the primary goal being to move to the Clarity UI Standard made popular by the HTML5-fueled vSphere Client fling.
mgmt-interfaces-vc
I’m glad to hear that the vSphere Client will be integrated into vCenter 6.5 and supports Enhanced Linked Mode. It is also nice to see that 4 out of 5 interfaces for management are using HTML5 and a much cleaner, simpler user experience.
vsphere-client-65

Backup and Restore

Another much needed feature for vCenter is the ability to do application level backups and restores. In the Windows vCenter world, this meant having a full server image of the Windows Server plus a copy of the database. This is because so many files and configuration objects live somewhere within the file system in addition to the database.
With VCSA 6.5, a native option now exists to perform backups over HTTP/S, FTP/S, or SCP. This configuration is abstracted from the server appliance itself, making the VM largely just a shell that contains a configuration. A new OVA can be deployed and an administrator can use the Restore feature to bring back the VCSA to its former configuration state (including the database). This is supported in both embedded and external deployments for both vCenter and the PSC (Platform Services Controller) appliances.

VCSA High Availability Configuration

After the death of vCenter Heartbeat, many of my customers and colleagues were asking how to make vCenter Server highly available. And the answer was – you couldn’t. Not really. And for those who need vCenter to always be available, such as cloud providers, this answer wasn’t all that great. Plus, prior clustering technologies were a real pain to make operational.
With the VCSA 6.5 release, VMware has re-introduced appliance level high availability for vCenter services using what will probably look like a familiar active/passive clustering topology.
To be clear, this feature is not available for the Windows vCenter server.
vcsa-ha
The most noticeable change in an HA configuration is that each VCSA node will now have two NICs: eth0 for public traffic and eth1 for private traffic. This makes updating the VCSA to support HA relatively simple and non-invasive. VMware asks that eth0 and eth1 use different subnets from one another, but does not require layer 2 adjacency between nodes. You could, for example, use different layer 3 networks for the private network to support multiple data center designs.
How is this done? The VCSA uses synchronous database replication via native vPostgres SQL mechanisms to keep the databases in step. File based replication is also used for replicating changes to specific files within the appliance done asynchronously. Setup is handled by a wizard that was designed from scratch to be incredibly simple for the administrator. The wizard handles most of the work on your behalf.

VMware Update Manager (VUM)

For many, VUM was the last checkbox item on our list to completely migrate away from using Windows Servers for vCenter. Because of this requirement, I often just stood up a small number of Windows Servers for VUM and pointed each one to its respective vCenter Server. With the 6.5 release, the VCSA has finally integrated VUM by default. This includes the use of High Availability – cool!
vum65
Based on the comparison above, there doesn’t seem to be any advantages to keeping VUM on a Windows Server any longer.

Thoughts

The VCSA team has really done an outstanding job at taking lots of user feedback and turning the product into something I’m actually excited to use. The Wahl Network lab will be migrating from 6.0 Windows to 6.5 VCSA when the code goes GA! 🙂

Wednesday, April 29, 2015

What is new in Veeam Backup & Replication 8.0 Update 2


Engine
  • Job performance improvements. A number of optimizations focused on reducing the time jobs spend performing auxiliary tasks should significantly reduce the overall job execution time for incremental runs of backup and Backup Copy jobs.
  • Slow backup storage optimization. Target data mover now caches metadata from backup files, instead of requesting it from backup files residing multiple times over the course of the job run. This significantly improves performance of jobs targeting storage with poor random I/O performance (such as EMC Data Domain), while reducing the overall storage load. Important notes:
  1. The cache is only enabled when using a 64-bit OS on backup repository (or gateway server), and increases RAM consumption of each job by 2GB on average, depending on backup chain size. Using non-default backup block size changes cache RAM requirements proportionally.
  2. Using the default "Automatic selection" gateway server setting for Shared folder, EMC DataDomain or HP StoreOnce based backup repositories disables the cache.
  3. Disabling built-in deduplication disables the cache.
  • 64-bit Linux data mover. For increased scalability, a 64-bit data mover will now be used on 64-bit Linux backup repositories with an OS kernel version of 2.6.18 or later.
  • Linux data mover update. To enable new functionality, jobs will leverage the new version of the data mover on Linux servers with kernel version 2.6 or later. For compatibility with existing servers, jobs will use a legacy data mover when OS kernel version is earlier than 2.6 or cannot be detected.
  • Direct data mover communication. When both data movers are running on the same server (e.g., when backing up to a local storage attached to a backup proxy server, etc.), they will now exchange data through shared memory. This should improve data transfer performance of local backup jobs currently reporting Network as the bottleneck, or when you see high load on some of the backup proxy server NICs when the data was supposed to stay local to the server.
  • vPower NFS performance. Increased scalability of vPower NFS server by significantly reducing CPU usage associated with guest I/O operations using small data blocks
  • VeeamZIP performance. Improved VeeamZIP performance when using a Veeam backup repository as the target.
  • Replication from backup file enhancements. Replication from backup files no longer requires matching block size between the backup file and replica job settings


VMware
  • vSphere 6 support. Added support for ESXi 6.0 and vCenter Server 6.0 (including vCenter Server Appliance).
  • vCloud Director 5.6 support. Added support for backup and restore of vCloud Director 5.6 virtual machines (VMs) and vApps.
  • VMware Virtual Volumes (VVols) support. VMs residing on virtual volumes can be processed in Virtual Appliance (Hot Add) and Network (NBD) processing modes. Hot add processing mode requires that all proxy VM disks are located on the same virtual volume with the processed VM.
  • VMware Virtual SAN (VSAN) 2.0 support. VMs residing on VSAN can be backed up in Virtual Appliance (Hot Add) and Network (NBD) processing modes. For VMs with existing snapshots, hot add processing requires that all proxy VM disks are located on the same VSAN datastore.
  • Storage Policy-Based Management (SPBM) policy backup and restore. Storage policy associations are backed up and restored for each virtual disk upon full VM restore. This eliminates the manual process, which directly impacts recovery time. SPBM policies are important to restore because "out of policy” VMs can impact availability of either the restored VM itself or other VMs sharing the same storage.
  • Support for Fault Tolerant VMs (FT VMs) for backups and replicas. VMs with Fault Tolerance enabled can now be backed up and replicated. Legacy Fault Tolerant VMs must have Fault Tolerance re-enabled after vSphere 6 upgrade using vSphere Web Client to enable this capability.
  • vSphere 6 tags integration. vSphere 6 introduces new APIs for programmatic access and management of vSphere tags. With vSphere 6 tag support, you can continue building new advanced backup policies based on tags, even after you upgrade to vSphere 6. Due to new unique tag IDs in vSphere 6, be sure to review your job setup after you upgrade to vCenter Server 6.0.
  • Cross-vCenter vMotion awareness. Added support for cross-vCenter vMotion to the Quick Migration functionality. Now, when migrating a VM to another vCenter Server, the associated entries on backup or replication jobs will be updated automatically to keep the VM protected
  • Quick Migration to VVols. Enables moving VMs to VVols when using vMotion is not an option due to unreliable or slow network links, in scenarios when vMotion is not supported, or due to lack of VMware licensing. This functionality can help perform full migrations to new vSphere 6 clusters built from the ground up without inheriting new design problems from previous clusters.
  • Hot-Add transport mode of SATA virtual disks. On ESXi 6.0, SATA virtual disks can now be processed in Virtual Appliance (Hot Add) processing mode, which was previously limited to SCSI virtual disks only.
  • vSphere tags priority. vSphere tags priority has been raised one level above containers priority to ensure that jobs behave in line with customers’ expectations when job’s inclusion and/or exclusion lists use both containers and tags.
  • Disable CBT reset. The workaround for VMware Changed Block Tracking (CBT) corruption issue at 128GB boundaries (VMware KB2090639) can now be disabled by customers with ESXi hosts patched against this issue. To disable automatic CBT reset upon virtual disk size change, create theResetCBTOnDiskResize (DWORD) registry value under HKLM\SOFTWARE\Veeam\Veeam Backup and Replication, and set it to 0.


Storage integration
  • Granular rescan settings. Added ability to control which storage LUNs and volumes should be rescanned periodically for new VMs. These settings can be accessed directly from the Add Storage wizard while registering the storage, or by right-clicking the already added storage in the Storage Infrastructure tab.
  • NetApp integration enhancements. The following NetApp-specific enhancements have been added:
  1. Added support for triggering updates of non-qtree and vFiler-based SnapMirror and SnapVault
  2. Added support for backing up VMs from NetApp MetroCluster in the failed over state
  3. Preferred Network settings of Global Network Traffic Rules dialog now also used to pick preferred storage adapters for data transfer. And in cases when multiple adapters use the same subnet, NetAppOrderedIPList (STRING) registry value underHKLM\SOFTWARE\Veeam\Veeam Backup and Replication can now be created to specify preferred adapters’ IP addresses separated by a semicolon.


Hyper-V
  • SMB3 restore performance. Improved performance of full VM restore to SMB3 shares with caching disabled (such as in Nutanix).
  • Hyper-V Integration Services status check. To prevent situations with some VMs unexpectedly going into the Saved State during a volume snapshot creation, jobs will now check that Hyper-V Integration Services (HIS) are running and reachable, waiting for HIS to respond for up to 10 minutes before failing the VM processing.
  • Replica VM adjustment. Maximum RAM value of the replica VM is now automatically reduced according to the target host capabilities.


File-Level Recovery
  • Native 4K disk support. Windows File-Level Recovery now supports mounting native 4K virtual disks from backups out of the box, without requiring a user to switch to the mount engine via the corresponding registry value.
  • Linux ACL preservation. Multi-OS File-Level Recovery now preserves Linux ACL when restoring a file via Restore and Copy To operations. This requires that both backed up and destination VM runs Linux with kernel version 2.6 or later.
  • Linux host selection. Multi-OS File-Level Recovery now allows choice of a target Linux host to restore guest files to without having to add it to the managed servers first.
  • Restored files logging. Multi-OS File-Level Recovery now logs restored files in its session log, similar to the way Windows File-Level Recovery performs its restore activity logging.
  • SNMP traps. Both Windows and Multi-OS File-Level Recovery can now trigger SNMP notifications. To enable such notifications, create theEnableRestoreSNMPTraps (DWORD) registry value under HKLM\SOFTWARE\Veeam\Veeam Backup and Replication, and set it to 1.


Veeam Explorer for Microsoft SQL Server
  • Improved restore performance. Database restore performance has been improved by up to 3x.
  • Increased scalability. Reduced load on SQL Server hosting Veeam® Backup & Replication™ database in scenarios when transaction logs are being backed up from multiple SQL servers on a frequent schedule.
  • Log truncation retry. In cases when log truncation fails under the specified guest processing account, it will be retried from the LOCAL SYSTEM account, which often carries the necessary privileges to perform this operation.
  • SQL database restore. Added a warning when restoring a SQL database to a different location where the database with the same name already exists when using the Enterprise Manager web UI
  • Improved issues reporting. Backup job now detects and reports more issues around transaction log processing, such as failure to truncate logs. This may result in the appearance of a new warning after the update, simply because existing issues were not previously reported.


Veeam Cloud Connect
  • Multiple subscriptions support. Added ability to add the same service provider multiple times using different credentials.
  • Reconnect performance improvements. Reconnecting to a service provider should now occur much faster when a cloud provider has multiple Cloud Gateways deployed.
  • Enhancements for service providers. The following are enhancements relevant to Veeam Cloud Connect service providers only:
  1. Added ability to granularly purge global cache from WAN accelerator for the specific tenant.
  2. When deleting a tenant, global cache belonging to the tenant is now deleted automatically.
  3. Added ability to query the amount of protected VMs for the given tenant through RESTful API using the vmCount property.
  4. Service Providers node of the management tree is always shown when Cloud Connect Service Provider license is installed, without requiring the service provider to register at least one hypervisor host first. This enables service providers to more easily client consoles to user for testing or manipulating client backups.
  5. Enhanced debug logging to include initiator information for when the connection is terminated.


Tape
  • Job performance. File to Tape and Backup to Tape job performance was further improved.
  • Synthesized full backup enhancements. Synthesized full backup functionality has been reworked for better reliability, performance and support for very large backup files.
  • Third-party tape handling. Added support for detecting and reusing tapes written by third-party tape backup vendors.


User Interface
  • Manual job chain execution. By popular demand, when manually starting a job that has other jobs chained to it via “After this job” scheduling option, you will now be offered a choice between starting the selected job alone, or starting the entire chain.
  • Disable network traffic rules. Both traffic throttling and encryption can now be temporarily disabled without requiring you to delete the corresponding rule completely, which is useful for troubleshooting or for temporarily removing bandwidth consumption restrictions.
  • Improved guest credentials test. Guest processing credential test will now additional verify the presence of mlocate, which is required for Linux guest file system indexing.


Setup
  • Silent install. Starting with Update 2, updates will fully support automated silent install, including triggering update of remote backup infrastructure components. This should significantly reduce the time required to update Veeam deployments with a large number of backup servers.


PowerShell
  • Support in Free Edition. Start-VBRZip cmdlet is now enabled in Veeam Backup™ Free Edition, allowing users to schedule periodic VeeamZIP™ backups using external task schedulers, such as Windows Task Scheduler. This should make Veeam Backup Free Edition a viable alternative to ghettoVCB and other similar script-based free backup solutions.


Integration with Veeam Endpoint Backup FREE

This update enables you to take full advantage of Veeam backup repositories as additional target locations for your Veeam Endpoint Backup jobs, with backups for each endpoint being stored in a separate folder named after the endpoint.

To assign end-user permissions to individual Veeam backup repositories, use the new repository properties dialog that will appear in the repository’s shortcut menu upon first connection attempt from Veeam Endpoint Backup™ FREE to the Veeam Backup & Replication server. Before that, this dialog can be accessed by Ctrl-right-clicking the backup repository.

Global network traffic rules defined in Veeam Backup & Replication apply to endpoint backup jobs using Veeam backup repository as the target, allowing you to ensure that concurrent backups from multiple endpoints do not impact your available bandwidth, or that endpoint backup network traffic is encrypted.

Using a Veeam backup repository as the target for your endpoint backup jobs enables the following additional functionality:
  • Centralized monitoring. Perform basic monitoring and management for all incoming endpoint backup jobs, including email notifications about endpoint backup status.
  • Offsite protection. Get your endpoint backups off site to disk-based storage, tape or your Veeam Cloud Connect service provider with Backup Copy and Backup to Tape jobs.
  • Backup encryption. You can choose to optionally encrypt your endpoint backups stored in Veeam backup repositories. All standard Veeam encryption features are supported for endpoint backups, including password loss protection.
  • Application item-level recovery. Restore application items from backups of server machines with Veeam Explorers™ for Microsoft Active Directory, Exchange, SharePoint and SQL Server.
  • Disk export. Export physical disk content from backup into VMDK/VHD/VHDX virtual disk files

More Information

Prior to installing this update please reboot the Veeam server to clear any locks on the Veeam services and when the reboot is done, please stop all the Veeam services and apply the update.

After installing the update, please start the Veeam services, open the console and allow Veeam B&R to update its components.

After upgrading to vCenter Server 6.0, due to vSphere 6 using new unique tag IDs, you must edit all existing jobs that leverage vSphere tags and re-add all required tags.

To obtain this update, please click here (you need to be logged in to download the update).

To obtain Veeam ONE v8 Update 2, please follow this link