German VMUG UserCon on 2023 in Frankfurt

There are only a few days left until the German VMUG UserCon opens its doors.

Following an old tradition, the event will take place again at Kap Europa near the main train station.

An extensive agenda with sessions from VMware and community speakers as well as interesting practical examples from partners on VMware integrations are on the agenda. In between, there will be enough coffee breaks to network with other visitors.

Save the Date

Thursday, June 29th 2023

8:30 – 18:00

Location

KAP Europa
Osloer Str. 5

Frankfurt am Main

Show in Google Maps…

Registration

UserCon participation is free of charge and requires only a VMUG membership (also free of charge).

Register here: German VMUG UserCon 2023

Agenda

Details and complete agenda

See you

Hope to meet you in Frankfurt.

TechX 300 Copenhagen – Powered by VMUGDK

2-days – Level 300 Event – September 20th and 21st

Join VMUG DK for an immersive experience where you’ll explore the intricacies of VMware’s cutting-edge technologies and gain in-depth insights from industry experts.

On 20th to 21st September VMUG DK will be hosting a Level 300 deep technical event in Copenhagen, and you are invited to join. Whether you’re an IT professional, a system administrator, or a technology enthusiast, TechX 300 is your gateway to unlocking the full potential of VMware solutions. Get ready to elevate your expertise and shape the future of virtualization at TechX 300!

This will be a hardcore technical event hosted by hardcore techies for hardcore techies. We consider this to be an extension of VMware Explore and the focus will be on creating the opportunities you need to interact with speakers and engineers in the Breakout, Lightning, and Community sessions, as well as at Meet-the-Experts, in smaller group discussions, in the Solution Exchange, and during the overall event.

These are some of the experts that have already confirmed for TechX300:

  • Cormac Hogan, Director and Chief Technologist – Cloud Infrastructure at VMware
  • Frank Denneman, Chief Technologist – Cloud Infrastructure at VMware
  • Johan Amersfoort, Technologist EUC & AI at ITQ
  • Katarina Brookfield, Staff Technical Marketing Architect for vSphere with Tanzu at VMware
  • Niels Hagoort, Staff Technical Marketing Architect for VMware Cloud at VMware
  • Mark Brookfield, Principal Technologist at Creative ITC

Let’s make it easy for you to join

If you are joining us from outside of Denmark, we will help make your trip and stay in Copenhagen as smooth as possible. Your local VMUG community can provide you with suggestions for hotels, restaurants, and optimal flights and you will also have the chance to travel as a group. Please reach out to your local community if you would like more information after registering for this event. If you are unsure about which local community you belong to, please feel free to reach out to VMUGDK, and we will assist you in finding the relevant contact information.

Attend the TechX 300 Copenhagen to:

  • Participate in technical deep dives led by a variety of industry experts
  • Expand your network with like-minded IT professionals
  • Learn about the latest products and solutions from trusted VMUG partners
  • Win cool SWAG & prizes

Location

Palads Cinema, Axeltorv 9, 1609 Copenhagen V

Call for community sessions

Calling all tech enthusiasts and subject matter experts! Are you passionate about a specific VMware-related topic within the realm of advanced technology? At TechX 300, we’re excited to offer the opportunity to showcase your expertise through our Level 300 Community Sessions.

We believe in the power of community-driven knowledge sharing, and that’s why we’re opening the doors for you to contribute to the event. To apply for a Level 300 Community Session, simply submit your session proposal highlighting the key takeaways, the target audience, and the VMware-specific expertise required.

Please fill out the form: Call for papers

Register

Register for TechX300

VMware NSX Legacy Load Balancing is Going Away – Migrate to Avi

VMware will be sunsetting the NSX native load balancers. Customers should be migrating to the currently supported NSX Advanced Load Balancer (Avi) which simplifies operations today while getting you ready for your multi-cloud and container strategies tomorrow. Avi works across all environments beyond the NSX framework, expanding use cases to public cloud, containers and app security while adding capabilities for GSLB, WAF and analytics. A migration tool will be available to make the migration of your existing configuration to the current technology easy and painless.

Veeam Storage Plugin for DataCore – V1.2.0 improvements

I already discussed the initial version of this plugin in https://www.elasticsky.de/en/2020/06/veeam-storage-plugin-for-datacore-deepdive/.

The cosmetical “1970” bug mentioned in the blog post above has already been fixed in an interims release. With V1.2.0 now we get full CDP support. CDP in this context does not relate to Veeam’s functionality of the same name. DataCore maintains a feature with this acronym for at least 10 years already.

I also explained a workaround to leverage CDP rollback points with the old version of the plugin already. We will not need the workaround any more, as the plugin now detects CDP rollback points just like it detects snapshots on your SanSymphony volumes!

The first installation of the plugin is pretty straightforward and was also discussed already. To update your installation, the new version of the plugin can be installed on top of the old one. Just disable all jobs beforehand and wait for VBR to become idle. The installer will replace the plugin files within the path.

C:\Program Files\Veeam\Backup and Replication\Plugins\Storage\DataCore Software Corporation

Once installed and configured, VBR will detect all CDP rollback points you create from the DataCore console right away and will let you do all recoveries as with common snapshots. The difference is, that you do not need to have any snapshot schedules. Just enable CDP for your volumes. Only when necessary, create your rollback to the exact moment in time needed. Could e.g. be just a few seconds BEFORE the ransomware started to encrypt your fileserver. This allows to lower your RPO for all VMs to a few seconds.

In contrast to snapshots you are currently not able to generate rollback points from within your Veeam console. You have to jump to DataCores console. This is because some extra decisions have to be made to generate a rollback point:

  1. Exact point in time to spawn the rollback point to
  2. Type of the rollback point: either “Expire Rollback” or “Persistant Rollback”

The amount of time you can rewind depends on your license within DataCore on one hand and the size of the history buffer you reserved on the other. I would strive for at least 8h here, to allow for rolling back a regular working day. But more is even better of course. For a 24h buffer you would have to reserve your daily change rate as a history buffer at least. So have some extra disk space ready.

An “Expire Rollback” will automatically be disposed, once the rollback point in time moves out of this history buffer. This could of course be dangerous in a recovery scenario, as you would all of a sudden loose the valuable restore point. Maybe right in the middle of a recovery. This is why in the default settings only a “Persistant Rollback” will be detected by Veeam. But this can be changed of course. Read about the details in this whitepaper.

I would though recommend to stick with only detecting “Persistant Rollbacks”. Those rollbacks should preferably only be used with mirrored volumes. Here a rollback will still be secured once it reaches the end of the history buffer. Now the productive volume on the side of the history buffer will be disconnected. With a mirrored volume this will result in a volume running from only one side of your cluster. But your VMs will be available and so will the rollback point.

One should plan for CDP accordingly. Have an independent disk pool for your history buffer to minimize performance penalties. This buffer should offer the same performance rate as the productive pool does. I would recommend 32MB as a SAU (Storage Allocation Unit) size for the buffer pool. For the productive pool I usually stick to 128MB, though 1024MB is the default now. This enhances granularity for AST