Random Short Take #95

Welcome to Random Short Take #95. Let’s get random.

  • Chris M. Evans put together an editorial on why centralised storage refuses to go away. I thought the point about ransomware was an interesting one, although some of the systems I’ve seen out there haven’t been secured terribly well.
  • Speaking of storage and ransomware, there’s an excellent article over at Backblaze on Object Lock. Worth checking out as I think a lot of people like to talk about Object Lock without understanding what it is (and isn’t).
  • Speaking of storage, Mellor covered a recent presentation by Tom Lyon – eminent Sun alumnus says NFS must die. I came from the block side of things, so NFS was always a little quirky but gee whiz you can do some good (and dumb) stuff with it.
  • I’ve followed Frances for some time, and really enjoyed this article on her experiences in the transition from VMware to Broadcom. I think everyone’s journey has been different, and it’s invariably a little more nuanced than The Register would have us believe. But as I’m an employee that’s probably all I’ll say about that publicly.
  • Speaking of Broadcom, Tony put together this excellent article on Cloud Director Tenancy Container Applications. It’s very thorough, and he’s promised me he’ll be doing more soon.
  • In press release news, Hammerspace are dong stuff with GPU data orchestration capabilities to accelerate access to S3 data. If you haven’t looked into Hammerspace, you really should.
  • In other PR news, Datadobi has unveiled StorageMAP 7.0. I tried to catch up with the Datadobi folks before I went on leave but it didn’t work out. Hopefully I can get hold of them to dive in a little deeper on this in the near future.
  • Finally, JB published a great piece entitled Existential Having. If you follow me on the photos social media you’ll know that I have a lot of records. And basketball jerseys. And sneakers. I don’t know why I have these things, but they bring me comfort. For a period of time. And then I Marie Kondo that crap and start all over.

Book Review – VMware Cloud on AWS Blueprint

Late last year I was approached by the folks at Packt Publishing to be a technical reviewer on a book about VMware Cloud on AWS. I was happy to be involved as VMC is something I’ve been working with quite a bit since I started at VMware. Fast forward to a few months ago and I received my reviewer copy (yes, an actual book, although you can also buy a PDF or access it via a subscription) of VMware Cloud on AWS Blueprint, written by Oleg Ulyanov, Michael Schwartzman, and Harsha Sanku. I thought I’d do a quick review of the book here, as I think it’s something worth diving into if you’re looking at running, or already run, VMware Cloud on AWS.


What’s In The Book?

The book weighs in at 388 pages, and is divided into 12 chapters, covering the foundational aspects of the VMware Cloud on AWS service, along with everything you need to know to standup the service, connect to it, run applications on it, and secure it. You’ll get the full view of what nodes go into the software-defined data centre (SDDC), what connectivity options you have available, and the best ways to put it all together. There are also chapters covering native AWS integrations, automation, as well as a chapter on the (now maybe only historically interesting) VMware Cloud on AWS Outposts offering. In short, it covers quite a lot of ground, and fills in a lot of detail that could otherwise be confusing for the first-time user of VMware Cloud on AWS. I’m the first to admit that I’m not the best when it comes to advanced networking and security concepts, being more of a disk slinger in the past than someone who focusses on things that go ping, so I found the chapter on understanding networking and security configurations to be truly helpful. Additionally, there was a great chapter on best practice advice, along with guidance on how to avoid common mistakes when deploying and using VMware Cloud on AWS.


Why Read It?

So why bother reading a book about a solution that you’ve probably already deployed? Because chances are there’s going to be some information in there that you haven’t come across, or hadn’t considered when you deployed your VMware Cloud on AWS solution. I’m a big believer in the documentation being able to get you so far, but it is books by specialists that can really open up a topic for you and allow you to see things from a different viewpoint. You might have just deployed your first SDDC, or you might have 20 of them running across multiple AWS Regions. I think you’ll still get some benefits from reading this book. Even if you’re not looking to leverage VMware Cloud on AWS, this book will give you some great insights into how a well-architected, mature, infrastructure-as-a-service offering looks, and provides some great perspectives on design considerations and things to look out for. The authors all have years of field experience, and know what they’re talking about. It was a real pleasure to be involved with this project, and I recommend you check it out.

Brisbane VMUG – Lunch and Learn – April 2024

The April 2024 edition of the Brisbane VMUG meeting will be held on Wednesday 24th April at the Attura Head Office (Level 9, 116 Adelaide Street, Brisbane, Queensland, 4000) from 12pm – 1:30pm. It’s sponsored by Cloud Ready Solutions and promises to be a great session.

Here’s the agenda:

  • Potential threats to virtual environments
  • Protecting virtual workloads with NAKIVO
    • VM backup
    • Ransomware protection
    • Instant recovery
    • Disaster recovery
    • IT Monitoring for VMware vSphere
    • MSP Console
  • Best practices for virtual data protection
    • The 3-2-1-1-0 strategy
    • Automated workflows
    • Storage efficiency
    • Flexible retention
    • Backup security
    • Backup vs. replication
    • Case studies
    • Technical demo
  • Q&A session

Cloud Ready Solutions has gone to great lengths to make sure this will be a fun and informative session and I’m really looking forward to hearing about NAKIVO. You can find out more information and register for the event here. I hope to see you there. Also, if you’re interested in sponsoring one of these events, please get in touch with me and I can help make it happen.

VMware Cloud on AWS – TMCHAM – Part 13 – Delete the SDDC

Following on from my article on host removal, in this edition of Things My Customers Have Asked Me (TMCHAM), I’m going to cover SDDC removal on the VMware-managed VMware Cloud on AWS platform. Don’t worry, I haven’t lost my mind in a post-acquisition world. Rather, this is some of the info you’ll find useful if you’ve been running a trial or a proof of concept (as opposed to a pilot) deployment of VMware Cloud Disaster Recovery (VCDR) and / or VMware Cloud on AWS and want to clean some stuff up when you’re all done.



Firstly, if you’re using VCDR and want to deactivate the deployment, the steps to perform are outlined here, and I’ve copied the main bits from that page below.

  1. Remove all DRaaS Connectors from all protected sites. See Remove a DRaaS Connector from a Protected Site.
  2. Delete all recovery SDDCs. See Delete a Recovery SDDC.
  3. Deactivate the recovery region from the Global DR Console. (Do this step last.) See Deactivate a Recovery Region. Usage charges for VMware Cloud DR are not stopped until this step is completed.

Funnily enough, as I was writing this, someone zapped our lab for reasons. So this is what a Region deactivation looks like in the VCDR UI.

Note that it’s important you perform these steps in that order, or you’ll have more cleanup work to do to get everything looking nice and tidy. I have witnessed firsthand someone doing it the other way and it’s not pretty. Note also that if your Recovery SDDC had services such as HCX connected, you should hold off deleting the Recovery SDDC until you’ve cleaned that bit up.

Secondly, if you have other workloads deployed in a VMware Cloud on AWS SDDC and want to remove a PoC SDDC, there are a few steps that you will need to follow.

If you’ve been using HCX to test migrations or network extension, you’ll need to follow these steps to remove it. Note that this should be initiated from the source side, and your HCX deployment should be in good order before you start (site pairings functioning, etc). You might also wish to remove a vCenter Cloud Gateway, and you can find information on that process here.

Finally, there are some AWS activities that you might want to undertake to clean everything up. These include:

  • Removing VIFs attached to your AWS VPC.
  • Deleting the VPC (this will likely be required if your organisation has a policy about how PoC deployments  are managed).
  • Tidy up and on-premises routing and firewall rules that may have been put in place for the PoC activity.

And that’s it. There’s not a lot to it, but tidying everything up after a PoC will ensure that you avoid any unexpected costs popping up in the future.

VMware Cloud on AWS – TMCHAM – Part 12 – Host Removal

In this edition of Things My Customers Have Asked Me (TMCHAM), I’m going to cover host removal on the VMware-managed VMware Cloud on AWS platform. This is a fairly brief post, as there’s not a lot to say about the process, but I’ve had enough questions about that I thought it was worth covering.



I’ve written about Elastic DRS (EDRS) in VMware Cloud on AWS previously. It’s something you can’t turn off, and the Baseline policy does a good job of making sure you don’t get in hot water from a storage perspective. That said, there might be occasions where you want to remove a host or two to scale in your cluster manually. This might happen after a cluster conversion, or you may have had a rapid scale out event and you have now removed whatever workloads caused that scale out event to occur.



The process to remove a host is documented here. Note that it is a sequential process, with one host being removed at a time. Depending on the number of hosts in your cluster, you may need to adjust your storage and fault tolerance policies as well. To start the process, go to your cloud console and select the SDDC you want to remove the hosts from. If there’s only one cluster, you can click on Remove Hosts under Actions. If there are multiple clusters in the SDDC, you’ll need to select the cluster you want to remove the host from.

You’ll then be advised that you need to understand what you’re doing (and acknowledge that), and you may be advised to change your default storage policies as well. More info on those policies is here.

Once you kick off the process, the cluster will be evaluated to ensure that removing hosts will not violate the applicable EDRS policies. VMs will be migrated off the host when it’s put into maintenance mode, and billing will be stopped for that host.

And that’s it. Pretty straightforward.

VMware – vExpert 2024

I’m very happy to have been listed as a vExpert for 2024. This is the twelfth time that they’ve forgotten to remove my name from the list (even I didn’t think I’d keep doing that “joke”). You can read more about it here. Thanks again to Corey Romero, the vExpert PROs, and the VMware by Broadcom Community and Advocacy Team for making this kind of thing happen. And thanks also to the vExpert community for being such a great community to be part of. Congratulations to you (whether this is your first or thirteenth time). There’s been a lot happening in and around VMware recently, and I’m happy that programs like this can continue to exist.

VMware Cloud on AWS – What’s New – February 2024

It’s been a little while since I posted an update on what’s new with VMware Cloud on AWS, so I thought I’d share some of the latest news.


M7i.metal-24xl Announced

It’s been a few months since it was announced at AWS re:Invent 2023, but the M7i.metal-24xl (one of the catchier host types I’ve seen) is going to the change the way we approach storage-heavy VMC on AWS deployments.

What is it?

It’s a host without local storage. There are 48 physical cores (96 logical cores with Hyper-Threading enabled). It has 384 GiB memory. The key point is that there are flexible NFS storage options to choose from – VMware Cloud Flex Storage or Amazon FSx for NetApp ONTAP. There’s support for up to 37.5 Gbps networking speed, and it supports always-on memory encryption using Intel Total Memory Encryption (TME).


Some of the potential use cases for this kind of host type are as follows:

  • CPU Intensive workloads
    • Image processing
    • Video encoding
    • Gaming servers
  • AI/ML Workloads
    • Code Generation
    • Natural Language Processing
    • Classical Machine Learning
    • Workloads with limited resource requirements
  • Web and application servers
    • Microservices/Management services
    • Secondary data stores/database applications
  • Ransomware & Disaster Recovery
    • Modern Ransomware Recovery
    • Next-gen DR
    • Compliance and Risk Management

Other Notes

New (greenfield) customers can deploy the M7i.metal-24xl in the first cluster using 2-16 nodes. Existing (brownfield) customers can deploy the M7i.metal-24xl in secondary clusters in the same SDDC. In terms of connectivity, we recommend you take advantage of VPC peering for your external storage connectivity. Note that there is no support for multi-AZ deployments, nor is there support for single node deployments. If you’d like to know more about the M7i.metal-24xl, there’s an excellent technical overview here.


vSAN Express Storage Architecture on VMware Cloud on AWS

SDDC Version 1.24 was announced in November 2023, and with that came support for vSAN Express Storage Architecture (ESA) on VMC on AWS. There’s some great info on what’s included in the 1.24 release here, but I thought I’d focus on some of the key constraints you need to look at when considering ESA in your VMC on AWS environment.

Currently, the following restrictions apply to vSAN ESA in VMware Cloud on AWS:
  • vSAN ESA is available for clusters using i4i hosts only.
  • vSAN ESA is not supported with stretched clusters.
  • vSAN ESA is not supported with 2-host clusters.
  • After you have deployed a cluster, you cannot convert from vSAN ESA to vSAN OSA or vice versa.
So why do it? There are plenty of reasons, including better performance, enhanced resource efficiency, and several improvements in terms of speed and resiliency. You can read more about it here.

VMware Cloud Disaster Recovery Updates

There have also been some significant changes to VCDR, with the recent announcement that we now support a 15-minute Recovery Point Objective (down from 30 minutes). There have also been a number of enhancements to the ransomware recovery capability, including automatic Linux security sensor installation in the recovery workflow (trust me, once you’ve done it manually a few times you’ll appreciate this). With all the talk of supplemental storage above, it should be noted that “VMware Cloud DR does not support recovering VMs to VMware Cloud on AWS SDDC with NFS-mounted external datastores including Amazon FSx for NetApp datastores, Cloud Control Volumes or VMware Cloud Flex Storage”. Just in case you had an idea that this might be something you want to do.



Much of the news about VMware has been around the acquisition by Broadcom. It certainly was news. In the meantime, however, the VMware Cloud on AWS product and engineering teams have continued to work on releasing innovative features and incremental improvements. The encouraging thing about this is that they are listening to customers and continuing to adapt the solution architecture to satisfy those requirements. This is a good thing for both existing and potential customers. If you looked at VMware Cloud on AWS three years ago and ruled it out, I think it’s worth looking at again.

VMware Cloud Disaster Recovery – Using A Script VM

This is a quick post covering the steps required to configure a script VM for use in a recovery plan with VMware Cloud Disaster Recovery (VCDR). Why would you want to do this? You might be running a recovery for a Linux VM and you need to run a script to update the DNS settings of the VM once it’s powered on at another site. Or you might have a site-specific application that needs to be installed. Whatever. The point is that VCDR gives you that ability to do that via the Script VM. You can read the documentation on the feature here.

Firstly, you configure the Script VM as part of the Recovery Plan creation process. Specify the name of the VM and the vCenter it’s hosted on.

Under Recovery steps, click on Add Step to add a step to the recovery process.

When you add the step, you’ll want to add an action for the post-recovery phase.

You can then select “Run script on the Script VM”.

At this point you can specify the full path to the script file, keeping in mind that Windows looks different to Linux. You can also set a timeout for the script.

And that’s pretty much it. Remember that you’ll need working DNS, or, failing that, valid IP addresses for things to work.

Random Short Take #90

Welcome to Random Short Take #90. I remain somewhat preoccupied with the day job and acquisitions. It’s definitely Summer here now. Let’s get random.

  • You do something for long enough, and invariably you assume that everyone else knows how to do that thing too. That’s why this article from Danny on data protection basics is so useful.
  • Speaking of data protection, Preston has a book on recovery for busy people coming soon. Read more about it here.
  • Still using a PDP-11 at home? Here’s a simple stack buffer overflow attack you can try.
  • I hate it when the machines shout at me, and so do a lot of other people it seems. JB has a nice write-up on the failure of self-service in the modern retail environment. The sooner we throw those things in the sea, the better.
  • In press release news, Hammerspace picked up an award at SC2023. One to keep an eye on.
  • In news from the day job, VMware Cloud on AWS SDDC Version 1.24 was just made generally available. You can read more about some of the new features (like Express Storage Architecture support – yay!) here. I hope to cover off some of that in more detail soon.
  • You like newsletters? Sign up for Justin’s weekly newsletter here. He does thinky stuff, and funny stuff too. It’s Justin, why would you not?
  • Speaking of newsletters, Anthony’s looking to get more subscribers to his daily newsletter, The Sizzle. To that end, he’s running a “Sizzlethon”. I know, it’s a pretty cool name. If you sign up using this link you also get a 90-day free trial. And the price of an annual subscription is very reasonable. There’s only a few days left, so get amongst it and let’s help content creators to keep creating content.

VMware Cloud on AWS – Check TRIM/UNMAP

This a really quick follow up to one of my TMCHAM articles on TRIM/UNMAP on VMware Cloud on AWS. In short, a customer wanted to know whether TRIM/UNMAP had been enabled on one of their clusters, as they’d requested. The good news is it’s easy enough to find out. On your cluster, go to Configure. Under vSAN, you’ll see Services. Expand the Advanced Options section and you’ll see whether TRIM/UNMAP has been enabled for the cluster or not.