VMware Integrated Openstack 2.0 set for release before the end of Q3 2015

Its been just six months since VMware released version 1.0 of VMware Integrated Openstack for general availability and now the next release is expected to be available before the end of Q3 2015 for download, here’s what’s new in this 2.0 release:

  • Kilo-based: VMware Integrated OpenStack 2.0 will be based on OpenStack Kilo release, making it current with upstream OpenStack code.
  • Seamless OpenStack Upgrade: VMware Integrated OpenStack 2.0 will introduce an Industry-first seamless upgrade capability between OpenStack releases. Customers will now be able to upgrade from V1.0 (Icehouse) to V2.0 (Kilo), and even roll back if anything goes wrong, in a more operationally efficient manner.
  • Additional Language Support: VMware Integrated OpenStack 2.0 will now available in six more languages: German, French, Traditional Chinese, Simplified Chinese, Japanese and Korean.
  • LBaaS: Load Balancing as a service will be available supported through VMware NSX.
  • Ceilometer Support: VMware Integrated OpenStack 2.0 will now support Ceilometer with Mongo DB as the Backend Database
  • App-Level Auto Scaling using Heat: Auto Scaling will enable users to set up metrics that scale up or down application components. This will enable development teams to address unpredictable changes in demand for the app services. Ceilometer will provide the alarms and triggers, Heat will orchestrate the creation (or deletion) of scale out components and LBaaS will provide load balancing for the scale out components.
  • Backup and Restore: VMware Integrated OpenStack 2.0 will include the ability to backup and restore OpenStack services and configuration data.
  • Advanced vSphere Integration: VMware Integrated OpenStack 2.0 will expose vSphere Windows Guest Customization. VMware admins will be able to specify various attributes such as ability to generate new SIDs, assign admin passwords for the VM, manage compute names etc. There will also be added support for more granular placement of VMs by leveraging vSphere features such as affinity and anti-affinity settings.
  • Qcow2 Image Support: VMware Integrated OpenStack 2.0 will support the popular qcow2 Virtual Machine image format.
  • Available through our vCloud Air Network Partners: Customers will be able to use OpenStack on top of VMware through any of the service providers in out vCloud Air Partner Network.

Openstack Juno- RDO Packstack deployment to an external network & config via Neutron

Openstack Juno- RDO Packstack deployment to an external network & config via Neutron
Openstack is a solution that I have briefly been following over the past couple of years or so but never really had enough time to give it the focus it probably deserves, the current project I am working on has an element of interaction with Openstack so it seems a great opportunity to gain some in depth hands on experience giving me greater insight on how the various Openstack components click together and the level of interaction required for existing environments.
Having already bult a fairly solid VMware and Hyper-V lab environment meant that I wasn’t going to crash and burn what I already have; I need to shoehorn an Openstack deployment in to the lab environment, utilizing the existing network and storage facilities already available. This blog post will endeavor to layout the steps required to add an Openstack deployment from start to operational build and go over some of the hurdles I encountered along the way. As some background, in my existing built lab I use a typical range of IPv4 address and also have a router to the outside world at If your labs the same then it’s a matter of running the commands, if not then modify the address ranges to suit yours.
So many flavors to choose from.
Before I go into the steps, I also wanted to highlight some of the hurdles I encountered to building the Openstack deployment. The first question I asked myself is which distribution to choose to build the environment; initially I reviewed the Openstack docs to see the process of building the latest version of Openstack Juno version. Ubuntu and Centos seemed like the most common distributions that are used, I went for Ubuntu first because of the Devstack deployment process which a friend of mine suggested to check out. The docs surrounding Devstack (http://docs.openstack.org/developer/devstack/) are good, but are not so straight forward as it wasn’t clear exactly which files needed creating or modifying  for building the environment. For example it wasn’t clear if you needed to create the configuration file (local.conf or localrc) to get the options you need installed and configured. After a couple of attempts I did get a working environment going but initially it was a basic Nova/Network setup only finding the correct way to configure the local.conf file I got Neutron installed although configuration was another matter. I did have many late nights trying to get a worked environment but eventually gave up on it.
After ditching the Ubuntu build I then looked at building with Centos, having used Redhat for many years it did feel much more comfortable, I carried out some research on the options with Centos and went for an automatic installation process by using RDO (https://www.rdoproject.org/Main_Page), a community project of Redhat, Fedora and Centos deployments supported by users of the community.  One thing I have found with both Devstack and RDO is that information is out there but it is spread all over the place and not all sites have up to date information, for example some still focus on Havana or Icehouse and not many have info on Juno. Hopefully this guide will bring the installation steps into a single document which will help you.
Building out the Openstack environment following steps 1 to 27
Below are the steps I have created which will build out an Openstack deployment of Juno on a single VM or physical system which is based on Centos 7, it will use Neutron and connect to the existing external lab network of The Openstack VM will have an IP of which we will configure as a bridge, we will create a new network for the Openstack instances which will use a private IP pool of and a floating IP or, we will create a floating IP range of so that I can have 18 IPs available for instances if needed.
I will use vSphere 6 but really vSphere v5.x would be OK too, my vSphere servers can run nested virtualization which is ideal as I can create a snapshot and revert the snapshot if certain things failed.
1.      Create a new VM, for my requirements I have created a 16gb VM which is enough to run a couple of instances too along with Openstack, it also has a boot disk of 20GB, I also added another disk which I will use for Cinder (block storage), it will be a 100GB disk. I have also attached 2 virtual network cards both are directly connected to the main network.
2.     Install Centos 7.0 on the VM or physical system, I have used CentOS-7.0-1406-x86_64-Minimal.iso for my build. Install the OS following the configuration inputs as requested as asked by the install process.
3.     Some additional house keeping I make on the image is to rename the enolxxxxxxx network devices to eth0 and eth1, I’m a bit old school with device naming.
Modify the /etc/default/grub and append ‘net.ifnames=0 biosdevname=0‘ to the GRUB_CMDLINE_LINUX= statement.

# vi /etc/default/grub
GRUB_CMDLINE_LINUX="rd.lvm.lv=rootvg/usrlv rd.lvm.lv=rootvg/swaplv crashkernel=auto vconsole.keymap=usrd.lvm.lv=rootvg/rootlv vconsole.font=latarcyrheb-sun16 rhgb quiet net.ifnames=0 biosdevname=0"

4.     next make a new grub config

# grub2-mkconfig -o /boot/grub2/grub.cfg

5.     Rename the config files for both eno devices

# mv /etc/sysconfig/network-scripts/ifcfg-eno16777736 /etc/sysconfig/network-scripts/ifcfg-eth0

6.     repeat for eth1

# mv /etc/sysconfig/network-scripts/ifcfg-eno32111211 /etc/sysconfig/network-scripts/ifcfg-eth1

7.      Reboot to run with the modified changes.

# reboot

The RDO Install process
8.     Bring the Centos OS up to date

# yum update -y

9.     Open the SE Linux barriers a bit, this is a lab environment so can loosen the security a little

# vi /etc/selinux/config # SELINUX=enforcing SELINUX=permissive

10.  Install the epel repository

# yum install epel-release -y

11.   Modify the epel repo and enable core, debuginfo and source sections.

# vi /etc/yum.repos.d/epel.repo
[epel-debuginfo] enabled=1
[epel-source] enabled=1

12.   Install net tools

# yum install net-tools -y

13.   Install the RDO release

# yum install -y http://rdo.fedorapeople.org/rdo-release.rpm

14.   Install openstack packstack

# yum install -y openstack-packstack

15.   Install openvswitch

# yum install openvswitch -y

16.   Final update

# yum update -y

Cinder volume preparation
17.   Install lvm2

# yum install lvm2 -y

18. Build out using packstack puppet process

# packstack --allinone --provision-all-in-one-ovs-bridge=n

19.  Remove 20gb loopback file from Packstack install and create new cinder-volume disk on 100GB virtual disk

# vgremove cinder-volumes
# fdisk sdb
# pvcreate /dev/sdb
# vgcreate cinder-volumes /dev/sdb

Instead of the changes to eth1 and br-ex I have found a simpler method of using eth1 as the NIC that will be used on the OVS switch. just remember that if the server is rebooted to check that the eth1 is still connected to the br-ex port group.
20. Add eth1 to the openvswitch br-ex ports

# ovs-vsctl add-port br-ex eth1

Change network configuration for /etc/sysconfig/network-scripts/ifcfg-br-ex & /etc/sysconfig/network-scripts/ifcfg-eth1

# vi /etc/sysconfig/network-scripts/ifcfg-br-ex
# vi /etc/sysconfig/network-scripts/ifcfg-ifcfg-eth0
HWADDR=52:54:00:92:05:AE # your hwaddr

21.  Additional network configurations for the bridge

# network_vlan_ranges = physnet1
# bridge_mappings = physnet1:br-ex

22.   Restart the network services so that the config takes effect

# service network restart

Configure new network and router to connect onto external network
23.  Remove old network configuration settings

# . keystonerc_admin
# neutron router-gateway-clear router1
# neutron subnet-delete public_subnet
# neutron subnet-delete private subnet
# neutron net-delete private
# neutron net-delete public

24.  Open ports for icmp pings and connection via ssh

# nova secgroup-add-rule default icmp -1 -1 
# nova secgroup-add-rule default tcp 22 22

25.  Create new private network on subnet

# neutron net-create private 
# neutron subnet-create private --name private --dns-nameserver

26.  Create new public network on subnet

# neutron net-create homelan --router:external=True 
# neutron subnet-create homelan --name homelan --enable_dhcp False --allocation_pool start=,end= --gateway

27.  Create new virtual router to connect private and public networks

# HOMELAN_NETWORK_ID=`neutron net-list | grep homelan | awk '{ print $2 }'` 
# PRIVATE_SUBNET_ID=`neutron subnet-list | grep private | awk '{ print $2}'` 
# ADMIN_TENANT_ID=`keystone tenant-list | grep admin | awk '{ print $2}'` 
# neutron router-create --name router --tenant-id $ADMIN_TENANT_ID router 
# neutron router-gateway-set router $HOMELAN_NETWORK_ID
# neutron router-interface-add router $PRIVATE_SUBNET_ID

That’s the install and configuration process complete. I will continue this series of blogs with deployment of instances and floating IP allocation.
Hope this has helped you deploy Openstack. Feel free to leave me a comment.

Goodbye vSphere AppHA, you were just not up to the job, enter Symantec ApplicationHA to the rescue

Well I thought this day would come eventually but I am surprised to see it so soon, its official folks. vSphere AppHA is no more as of vSphere 6.0, the official announcement is here . With the effort that’s required to provide continual support for old and new applications and also having to provide continual support for their updates it looks like the task was not something that VMware wanted to focus on. Don’t think that your covered though with backups, replication, vSphere HA or vSphere FT, non of those will get your application back up and running automatically should it fail.
don’t worry though
Symantec ApplicationHA comes to the rescue…..

As one of the first third party vendors providing support for application availability within virtual machines, Symantec has always been at the forefront providing resilience for applications running within VMware vSphere. ApplicationHA is one solution that has been doing this, and for the past four years its been going from strength to strength adding functionality and automation and importantly, resilience for mission critical applications that enables our customers to sleep at night. If your unfamiliar with Symantec ApplicationHA take a look at this comparison which I made a while back, its very detailed but will give you an insight of ApplicationHA’s true potential. Its inexpensive and doesn’t need vSphere Enterprise Plus to work. Its stable mature technology built on Veritas Cluster Server heritage. The development effort required to keep on top of platform and application updates is a challenge but it’s worth it, after all it’s the applications that drive your business and providing resilience for them should be top of mind.
More info on Symantec Application can be found here there’s also a free trial that you can test drive for 60 days if you like too.

Whats new in VMware Fault Tolerance 6.0

VMware Fault Tolerance (FT) in vSphere 5.5 is one of those features you would love to use but because of its vCPU limitation it was not really helping to protect the Mission Critical applications so for many its left behind. With vSphere 6.0, VMware broken the limitation of a single vCPU for Fault Tolerance, a FT VM now Supports upto 4 vCPUs and 64 GB of RAM. With vSMP support, FT can be used to protect your mission critical applications. Along with the vSMP FT support, let’s take a look at what’s new in vSphere 6.0 Fault Tolerance(FT).
vSphere 6.0 - FT_1

Benefits of Fault Tolerance

  • Continuous Availability with Zero downtime and Zero data loss
  • NO TCP connections loss during failover
  • Fault Tolerance is completely transparent to Guest OS.
  • FT doesn’t depend on Guest OS and application
  • Instantaneous failover from Primary VM to Secondary VM in case of ESXi host failure

What’s New in vSphere 6.0 Fault Tolerance

  • FT support upto 4 vCPUs and 64 GB RAM
  • Fast Check-Pointing, a new Scalable technology is introduced to keep primary and secondary in Sync by replacing “Record-Replay”
  • vSphere 6.0, Supports vMotion of both Primary and Secondary Virtual Machine
  • With vSphere 6.0, You will be able to backup your virtual machines. FT supports for vStorage APIs for Data Protection (VADP) and it also supports all leading VADP solutions in Market like Symantec, EMC, HP ,etc.
  • With vSphere 6.0, FT Supports all Virtual Disk Type like EZT, Thick or Thin Provisioned disks. It supports only Eager Zeroed Thick with vSphere 5.5 and earlier versions
  • Snapshot of FT configured Virtual Machines are supported with vSphere 6.0
  • New version of FT keeps the Separate copies of VM files like .VMX, .VMDk files to protect primary VM from both Host and Storage failures. You are allowed to keep both Primary and Secondary VM files on different datastore.

Difference between vSphere 5.5 and vSphere 6.0 Fault Tolerance (FT)

Difefrence between FT 5.5 amd 6.0
One thing to be aware of with VMware FT is that this feature does not monitor the application its still only virtual machine protection so you still need to think about the application and how it will be protected.

What new features are in vSphere 6.0

Well there has been some public information out there for some time on some of the new features that will or maybe in vSphere 6.0, mainly information that has come from VMworld 2014 and some from the beta which although public did have some NDA with it. As VMware announce the new release below are some of the new features that made the cut into the new version.
vSphere Platform (including ESXi)

  • Increase in vSphere Host Configuration Maximums
    • 480 Physical CPUs per Host
    • Up to 12 TB of Physical Memory
    • Up to 1000 VMs per Host
    • Up to 6000 VMs per Cluster
  • Virtual Hardware v11
    • 128 vCPUs per VM
    • 4 TB RAM per VM
    • Hot-add RAM now vNUMA aware
    • Serial and parallel port enhancements
      • A virtual machine can now have a maximum of 32 serial ports
      • Serial and parallel ports can now be removed
  • ESXi Account & Password Management
    • New ESXCLI commands to add/modify/remove local user accounts
    • Configurable account lockout policies
    • Password complexity setting via VIM API & vCenter Host Advanced System Settings
  • Improved Auditability of ESXi Admin Actions
    • Prior to vSphere 6.0, actions taken through vCenter by any user would show up as ‘vpxuser’ in ESXi logs.
    • In vSphere 6.0 actions taking through vCenter will show the actual username in the ESXi logs
  • Enhanced Microsoft Clustering (MSCS) Support
    • Support for Windows 2012 R2 and SQL 2012
    • Failover Clustering and AlwaysOn Availability Groups
    • IPv6 Support
    • PVSCSI & SCSI controller support
    • vMotion Support
      • Clustering across physical hosts with Physical Compatibility Mode RDMs (Raw Device Mapping)
      • Supported on Windows 2008, 2008 R2, 2012, and 2012 R2

vCenter 6.0

  • Scalability Improvements
    • 1000 Hosts per vCenter
    • 10,000 VMs per vCenter
    • 64 Hosts per cluster (including VSAN!)
    • 6000 VMs per cluster
    • Linked Mode no longer requires MS ADAM
  • New Simplified Architecture with Platform Services Controller
    • Centralizes common services
    • Embedded or Centralized deployment models
  • Content Library
    • Repository for vApps, VM templates, and ISOs
    • Publisher/Subscriber model with two replication models
    • Allow content to be stored in one location and replicated out to “Subscriber” vCenters
  • Certificate Management
    • Certificate management for ESXi hosts & vCenter
    • New VMware Endpoint Certificate Service (VECS)
    • New VMware Certificate Authority
  • New vMotion Capabilities
    • Cross vSwitch vMotion
    • Cross vCenter vMotion
    • Long Distance vMotion
    • vMotion across L3 boundaries

Storage & Availability

  • VMware Virtual Volumes (VVOLS)
    • Logical extension of virtualization into the storage world
    • Policy based management of storage on per-VM basis
    • Offloaded data services
    • Eliminates LUN management
  • Storage Policy-Based Management
    • Leverages VASA API to intelligently map storage to policies and capabilities
    • Polices are assigned to VMs and ensure storage performance & availability
  • Fault Tolerance
    • Multi-vCPU FT for up to 4 vCPUs
    • Enhanced virtual disk format support (thin & thick disks)
    • Ability to hot configure FT
    • Greatly increased FT host compatibility
    • Backup support with snapshots through VADP
    • Now uses copies of VMDKs for added storage redundancy (allowed to be on separate datastores)
  • vSphere Replication
    • End-to-end network compression
    • Network traffic isolation
    • Linux file system quiescing
    • Fast full sync
    • Move replicas without full sync
    • IPv6 support
  • vSphere Data Protection
    • VDP Advanced has been rolled into VDP and is no longer available for purchase (the features of VDP-A are now available for free to Essentials Plus and higher editions of vSphere!)
    • Protects up to 800 VMs per vCenter
    • Up to 20 VDP appliances per vCenter
    • Replicate backup data between VDP & EMC Avamar
    • EMC Data Domain support with DD Boost
    • Automated backup verification

So there you have it – a pretty long list of updates for vSphere 6.0. One thing that I was surprised to see that that vSphere Application HA has been removed in vSphere 6.0 due to a lack of demand for the feature, oddly its not something we have seen at Symantec and still our user base grows quarter by quarter and Symantec ApplicationHA goes on..

Providing high availability and disaster recovery for virtualized SAP within VMware the right way

Over the past couple of years I have been getting more and more involved in SAP architecture designs for HA and DR and one on my pet hates at the start of my journey was the lack of basic information on what the SAP components were for and how they interacted with each other, it was a hard slog, for those who are venturing into SAP or even those hardened SAP veterans out there the paper below covers SAP in great detail and more importantly covers how SAP deployments should be done correctly especially when high availability and disaster recovery is a requirement.
Many organizations rely on SAP applications to support vital business processes. Any disruption of these services translates directly into bottom-line losses. As organization’s information systems become increasingly integrated and interdependent, the potential impact of failures and outages grows to enormous proportions.
The challenge for IT organizations is to maintain continuous SAP application availability in a complex, interconnected, and heterogeneous  application environment. The difficulties are significant:

  • there are many potential points of failure or disruption
  • the interdependencies between components complicates administration
  • the infrastructure itself undergoes constant change

To gain additional competitive advantage, enterprises must now work more closely together and integrate their SAP environment with those of other organizations, such as partners, customers, or suppliers. The availability of these applications is therefore essential.
There are three main availability classes, depending on the degree of availability required:

  • Standard Availability – achievable availability without additional measures
  • High Availability – increased availability after elimination of single points of failure within the local datacenter
  • Disaster Recovery – highest availability, which even overcomes the failure of an entire production site

Symantec helps the organizations that rely on SAP applications with an integrated, out-of-the-box solution for SAP availability. Symantec’s High Availability and Disaster Recovery solutions for SAP enhance both local and global availability for business critical SAP applications.
Local high availability: By clustering critical application components with application-specific monitoring and failover, Symantec’s solutions simplify the management of complex environments. Administrators can manually move services for preventative and proactive maintenance, and the software automatically migrates and restarts applications in case of failures.
Global availability/disaster recovery: By replicating data across geographically dispersed data centers and using global failover capabilities, companies can provide access to essential services in the event of major site disruptions. Using Symantec’s solutions, administrators can migrate applications or an entire data center within minutes, with a single click through a central console. Symantec’s flexible, hardware independent solutions support a variety of cost-effective strategies for leveraging your investment in disaster recovery resources.
Symantec provides High Availability and Disaster Recovery solutions for SAP, utilizing Symantec™ Storage Foundation, powered by Veritas, Symantec™ Replicator Option, Symantec™ Cluster Server, powered by Veritas, and Cluster Server agents that are designed specifically for SAP applications. The result is an out-of-the-box solution that you can quickly deploy to protect critical SAP applications immediately from either planned or unplanned downtime.
Download the full white paper below.

Fix – vSphere Replication – Cannot connect to the specified site – due to change in default ports

Keep meaning to document this one, so here it goes.
Adding a site in VMware vSphere Replication fails with the error: Cannot connect to the specified site, site might not be available on the network or the network configuration may not be correct.
This may happen if you change the default network port for the vCenter Servers from 80 to another port number.
To resolve this issue when you are not using the standard port 80 or port 443, specify the port number in vSphere Replication: Add Site dialog.
For example: If vCenter Server at IP address is accessed over port 8081, enter in the vSphere Replication: Add Site dialog.
Hope this helps you out.
thanks for reading.

Symantec Storage and Availability products and SHELLSHOCK bug impact

Customer ALERT:  Please take the time to read through the following notifications and alert your teams/customers regarding this bug.
The Symantec Storage Foundation Products position on the BASH ShellShock bug and the related Technotes are now published externally:
The pertinent content explaining the position of IA products is as follows:
It is of critical importance for customers to apply the available BASH patches immediately.
Check with the Operating System Vendor to determine if your version of BASH is affected and apply the vendor’s patch as necessary.
Further details are available in the Symantec overview of ShellShock:
The Symantec products in the table below may interface with a vulnerable version of BASH on the host operating system. None of these IA products have been proven to be vulnerable.  As a precaution, for the Symantec products in the table below, we recommend that services are stopped and restarted after a patch for BASH has been applied.

                                Product BASH Status
Storage Foundation for Unix/Linux (SF) BASH is not distributed with this product
Storage Foundation and High Availability solutions (SFHA) BASH is not distributed with this product
Storage Foundation Cluster File System (SFCFS) BASH is not distributed with this product
Storage Foundation for Oracle RAC (SFRAC) BASH is not distributed with this product
Storage Foundation for Windows BASH is not distributed with this product
Volume Manager (VxVM) BASH is not distributed with this product
Volume Replicator (VVR) BASH is not distributed with this product
File Replicator (VFR) BASH is not distributed with this product
Dynamic Multi-Pathing (DMP) BASH is not distributed with this product
Veritas File System (VxFS) BASH is not distributed with this product
Cluster Server (VCS) for Unix/Linux BASH is not distributed with this product
Cluster Server  for Windows (VCSW) BASH is not distributed with this product
ApplicationHA BASH is not distributed with this product
FileStore (S/W Appliance) A vulnerable version of BASH is distributed with FileStore, see technote TECH225136
FileStore N8300 (H/W appliance) A vulnerable version of BASH is distributed with FileStore, see technote TECH225136
Data Insight BASH is not distributed with this product
Veritas Operations Manager (VOM) BASH is not distributed with this product
CommandCentral Storage (CCS) BASH is not distributed with this product
Veritas Enterprise Administrator (VEA) BASH is not distributed with this product
Symantec Disaster Recovery Orchestrator (DRO) BASH is not distributed with this product

FileStore Product:
If you are using the Symantec FileStore product, a patch for BASH is available from Symantec, reference tech note TECH225136 <http://www.symantec.com/docs/TECH225136> for more information on how to obtain this patch.

Providing availability of vCenter Server v5.x with Symantec ApplicationHA v6.1

It’s been a while coming but I’ve finally got some time to write this article on protecting vCenter Server availability. It’s probably also come as an opportune time as not so long ago VMware announced the end of availability of vCenter Heartbeat so now many of you are probably looking for ways to protect vCenter Server more than ever especially due to the criticality that it brings in management and operations of your vSphere environment. This article will highlight areas that need to be protected and what options you have.
With release after release of vSphere more functionality goes into vCenter Server and more of the virtualized environment relies on it being available to serve the needs of the administrator. although vCenter Server can typically reside on a single server, it is made up of many critical parts. If you’ve sat through an install of vCenter Server you will know that its broken up into 4 core areas, these are Single Sign-on (SSO), Inventory Service, vCenter Server itself and lastly there is also the vSphere Web Client & Services. SSO is a core component of vSphere since its introduction in v5.1, it’s there to handle authentication requests and also is a security broker handling requests coming from the various vSphere solutions. Although there were some operational hiccups in v5.1, subsequent versions have become stronger and deployment options have increased, I’ll take a look at those in a minute. The Inventory Service is another key component that has two functions firstly it stores the custom tags for the vSphere Web Client and secondly it’s also a proxy for the vSphere Web Client which actually assists in reducing the load on the vCenter Server (VXPD), knowing this little tidbit can actually help in deployment scenarios so if you are breaking up the components onto separate servers then it’s best to keep the Inventory Service close to the vSphere Web Client Services. Next there is the vCenter Server itself which is made up of a number of services and critical to the whole environment. Lastly there is the vCenter Web Server/Services which provides the administrator with a web UI for management and operations of the entire environment.
Now we’ve gone through the critical services let’s take a look at deployment and availability options within each group. Ignoring the simple install option of vCenter for the moment, options available when using the custom install method for SSO provide the ability to install in 3 types of deployment modes, these are single SSO, SSO installed in HA mode and SSO installed for multi-site environment. With single deployment it’s just that, SSO is installed onto a system and acts as a single entity for the whole vSphere environment. HA mode provides the ability to add another SSO system to an existing SSO system and provides a failover mechanism in case the primary SSO system fails; typically a load balancer is used in front of the SSO servers for ease of configuration. Lastly the multisite option provides local authentication in a multiple site scenario, be aware though that there is no failover between sites so if a failed site fails then local authentication for that site will fail too. I don’t want to focus too much on the different scenarios too much as there are plenty of blogs out there which highlight best practices for deploying SSO. What is important is the availability of the services especially in a single SSO deployment which let’s face it will be used by large number of SMBs and enterprise customers.
When deployed on a single system SSO services consist of 5 key services, these are the VMware Certificate Services, VMware Directory Services, VMware Identity Management Services, VMware KDC Services and the VMware Secure Token Services when these services are installed the default Windows Service Manager recovery configuration for most of these services are set to restart upon 1st and 2nd failure, you may think this will be OK for availability but what if the service keeps failing, what if the service doesn’t restart, what effect will it have on the other key components in the environment which as we know now are critical to operations. What’s needed is a method to monitor these services and the other components intelligently and remediate any issues that occur within the environment. The other services such as Inventory, vCenter Server and Web Services do not have any recovery options enabled so the administrator is pretty much left to manage those independently.
Using a solution like Symantec ApplicationHA can assist in protecting all of the vCenter Server services and still have the ability to utilize VMware features like VMwareHA and DRS especially useful if vCenter Server has been deployed onto a virtual machine, which I assume you have. Symantec ApplicationHA provides the ability to monitor all of the key components and in the event it is unable to resolve issues it can pass control to VMwareHA to reset the virtual machine. ApplicationHA has a number of application agents it supports and also has a vCenter agent which can be used to protect vCenter. There is also a wizard which can be launched from with vSphere Web/Desktop Client which can be used to protect vCenter. The current version of the wizard does not include SSO configuration but can be added after the wizard is run. Symantec are aiming to update their wizard to include SSO so for the moment we can script the additional services pretty easily with ApplicationHA commands.

Symantec ApplicationHA auto detects the services within the deployment and provides the ability to also monitor the connection between the SQL database and vCenter itself.

This is of available vCenter services are displayed within the configuration

The dependency of the services is shown by viewing the dependency component view.

Finally the additional SSO services can be added to the configuration by running the script containing the commands below.
haconf -makerw
hatype -modify GenericService RestartLimit 1
hares -add VMWareCertificateService GenericService vCenterServer_SG
hares -modify VMWareCertificateService ServiceName VMWareCertificateService
hares -modify VMWareCertificateService Enabled 1
hares -add VMwareDirectoryService GenericService vCenterServer_SG
hares -modify VMwareDirectoryService ServiceName VMwareDirectoryService
hares -modify VMwareDirectoryService Enabled 1
hares -add VMwareIdentityMgmtService GenericService vCenterServer_SG
hares -modify VMwareIdentityMgmtService ServiceName VMwareIdentityMgmtService
hares -modify VMwareIdentityMgmtService Enabled 1
hares -add VMwareKdcService GenericService vCenterServer_SG
hares -modify VMwareKdcService ServiceName VMwareKdcService
hares -modify VMwareKdcService Enabled 1
hares -add VMwareSTS GenericService vCenterServer_SG
hares -modify VMwareSTS ServiceName VMwareSTS
hares -modify VMwareSTS Enabled 1
hares -add vmwarelogbrowser GenericService vCenterServer_SG
hares -modify vmwarelogbrowser ServiceName vmwarelogbrowser
hares -modify vmwarelogbrowser Enabled 1
hares -link vspherewebclientsvc vpxd
hares -link vimQueryService vctomcat
hares -link vpxd VMwareKdcService
hares -link vpxd VMwareSTS
hares -link vpxd VMWareCertificateService
hares -link VMwareIdentityMgmtService VMwareDirectoryService
hares -link VMwareSTS VMwareIdentityMgmtService
hares -link vmwarelogbrowser vspherewebclientsvc
hares -unlink vimQueryService vpxd
haconf –dump –makero
Here is the final list of all services being monitored by ApplicationHA

And the dependency component view is also updated to include all of the services and the correct dependencies.

Now that the configuration is complete testing for fault scenarios can commence. For more information on ApplicationHA please follow the product link below.
Symantec ApplicationHA

Using VMware vSphere Web Client with Symantec ApplicationHA and Symantec Cluster Server (VCS)

Using VMware vSphere Web Client with Symantec ApplicationHA and Symantec Cluster Server (VCS)

Since v5.1 of vSphere, VMware have focused on providing web based management for the vSphere environment, with v5.5 more functionality has been placed into the vSphere Web Client to bring its capabilities on par to that of the Windows based vSphere Client. Moving forward VMware have stated that any new feature VMware introduces typically is only going to be available within the vSphere Web Client. Due to the move by VMware away from the Windows based vSphere Client Symantec has also developed integration into the vSphere Web Client so that customers using Symantec High Availability solutions can leverage the vSphere Web Client also. This paper describes the steps needed to enable management of Symantec high availability solutions with the vSphere Web Client.

Solution features and support

Symantec High Availability Solutions that leverage vSphere Web Client management include Symantec ApplicationHA and Symantec Cluster Server (VCS), traditionally these solutions use a Windows system that runs the Symantec HA Console for management, guest deployment and application single sign-on all of which are managed via a plugin into the Windows vSphere client. To support the vSphere Web Client the Symantec architecture, Veritas Operations Manager 6.1 (VOM) is used for presenting the information into the Web Client including registration of the plugin for vCenter Servers within the environment. With this release certain functionality is omitted but will be added in subsequent releases.

Operations that are enabled within the vSphere Web Client include

  • Registration of the Symantec High Availability plugin for vSphere Web Client.
  • Configuration/discovery of applications to be placed under Symantec ApplicationHA & VCS control.
  • Management of applications including start/stop and other management tasks.
  • Single sign-on for application authentication from VOM to the vSphere Web Client.
  • Dashboard view and management of applications configured visible from the Cluster or Datacenter views of the vSphere Web Client.

Management tasks omitted in the 6.1 release from the Symantec HA plugin for vSphere Web Client include.

  • Ability to install guest component via vSphere Web Client: You cannot use the vSphere Web Client to install the Symantec ApplicationHA or VCS guest component into the virtual machine. Use either the Windows vSphere Client to install the guest components and then migrate them to the Web Client or use the installer from the Symantec solutions DVD image to push the components to multiple VMs.
  • Symantec High Availability home page will not be available on the vSphere Web Client, and the operations related to Symantec High Availability License Management, single sign-on configuration between sites (for VMware Site Recovery Manager) are not available. The keyless license model is recommended which can be managed through VOM.
  • Integration with Symantec Backup Exec is not supported.


Supported environments.

To use the Symantec HA Console plugin for VMware vSphere Web Client the following platforms and software are supported.

  • VMware vSphere 5.1 or later
  • Symantec ApplicationHA 6.1 or later

    * Earlier versions can be used but the VOM managed host package VRTSsfmh needs to be updated

  • Symantec Cluster Server (Windows) 6.0.1 or later
  • Symantec Cluster Server (Linux) 6.0.2 or later

    * Symantec Cluster Server below v6.1 for both Windows and Linux require the VOM managed host package VRTSsfmh to be updated.

  • Veritas Operations Manager 6.1 or later.

Steps Required to implement solution.

Step 1 – Installation of Veritas Operations Manager.

Veritas Operations Manager (VOM) 6.1 is required to be installed and configured for use with the vSphere environment. VOM is available to download from the Symantec website at http://www.symantec.com/operations-manager click the download link on the page and follow the steps required to download the code. Note that the full package will include the add-ons required by default, select the full package download file to minimize the steps otherwise the add-ons required will need to be installed separately. The VOM management server can be installed on either a Windows or Linux host information on current supported platform is at http://www.symantec.com/operations-manager/system-requirements . Carry out the install by running the installation bin or exe file depending on the desired platform that was downloaded from the Symantec website and follow the install wizard including the management configuration. There are a great set of videos at http://www.symantec.com/connect/vom-videos which have been posted and these are great to review to understand the steps required. Once configured, log in to the VOM server with system administrator privileges and the home page will be presented.

Step 2 – Configuration of the Control Host and Virtualization Add-on.

Once the VOM server is installed, the Control Host (CH) add-on needs to be installed next. The Control host facilitates the discovery of the environment and will be used to discover the vSphere environment, this is carried out via the “Settings icon and then selecting the “Deployment” section, depending on your environment the CH may need to be installed on separate server but for this paper it will be installed on the VOM server. Expand the “Add-on” section and right click on “Control Host and select “Install“. After a few minutes the Control Host will be enabled and installed.

Once the CH is installed next step is to enable the Symantec HA Plugin for vCenter Web Client, this is enable by selecting the “Symantec HA Plugin for vSphere Web Client” Add-on in the left hand column and then right click on the Symantec HA Plugin and select “Install“.


The Add-on must be installed on the VOM Management Server; the VOM Web Server will need to be restarted after the Installation of the add-on. To restart the Web server, click “Restart Web Server” button on the task bar.



Log back into the management server after the restart of the web services. Once logged in, the verification of the add-on installation can be made by selecting the “Repository” or the “Add-on” section in the left hand column and verify that the Control Host and Symantec HA plugin for vSphere Web Client have both been enabled.

Next step is to enable the Virtualization management within VOM. This is carried out by going to the “Settings” section and select “Virtualization“.

Click “Add Virtualization Server” from the task pane and fill in details of the vCenter Server environment that requires the plugin. Multiple vCenter Servers can be added if required.

Discovery of the environment is carried out and selection of ESX servers can be made.

Discovery process completes and information on the environment is displayed.

Side Note: The ESX servers are not used for the registration process but information from the environment can be gained and can be useful. Information such as memory/CPU/network and storage is discovered by the Control Host. Specific information on the environment that has been discovered also includes Storage and Datastores associated to the environment. Information on the environment is viewed from VOM within the virtualization perspective; access to this type of information can be given to users where access via the vSphere Client is restricted.

Step 3 – Registration of the Symantec HA plugin for vSphere Web Client.

Register the plugin against the discovered vCenter servers by carrying out a register task within the Virtualization perspective from the home view. Select the “Solutions” panel at the left hand side and click on “Symantec HA plugin for vSphere Web Client“. Right click on the vCenter Servers that require the plugin to be registered and select “Register“.

Step 4 – Adding Symantec ApplicationHA and VCS guest hosts to the VOM server.

With the plugin registered the next step is to add the virtual machines with ApplicationHA and VCS installed to the VOM server. Do this by selecting “Settings” from the home page and select “Add Hosts” on the task pane, select “Agent” as the type and fill in the required information. Note if you have multiple VMs to be added then a CSV file can be uploaded to the wizard to fill in the required information. The format of the CSV follows.

Host, User, Password


host2, user2,password2

host3, user3,password3


Once the VMs have been added and discovery completes the information of the VMs is displayed. Make sure that the VMs Agent is in a connected state.

Step 5 – Management of the Symantec HA plugin via vSphere Web Client.

Next and final step is to check connectivity via the vSphere Web Client. The VOM Management Servers SSL security certificate must be added to the workstations Trusted Root Cert Authorities repository within the internet options so that a secure communication can be made from the Web Client to VOM.

The Symantec HA plugin should be displayed under the “Monitor” tab within the vSphere Web Client as displayed below. From this point onwards the configuration or management of the application can be carried out.

The Symantec HA Dashboard which provides visibility across all VMs with ApplicationHA or VCS installed within a single view and is available from the vSphere Cluster or Datacenter views as displayed below.

This concludes the steps required to enable the Symantec HA plugin from within the vSphere Web Client. For more information on ApplicationHA and VCS please review the links below.

Symantec Cluster Server


Symantec ApplicationHA