Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Kevin Soltow
  • Kevin Soltow
  • March 23, 2021

How to Replace Your Default ESXi SSL certificate With the Help of a Local Domain Certificate Authority (CA): a 101 Introduction

In the previous article, I have shared a working algorithm on replacing the ESXi SSL certificate with a self-signed one, but, as you know well, there’s always room for perfection. So, I have been practicing with a more universal scenario that could also work with a domain infrastructure and domain certificate services. That’s what I came up with.
Read more
Vladan Seget
  • Vladan Seget
  • March 18, 2021

VMware vSphere Replication 8.4 details and enhancements

Along with various recent updates, VMware released its new version of vSphere Replication 8.4. It’s a free perk that comes included with the vSphere package and has a limited potential to enable and operate VM replication to remote locations. Although it’s quite a basic feature, it can still provide valuable benefits for small deployments scenarios.
Read more
Florent Appointaire
  • Florent Appointaire
  • March 16, 2021

Azure Automanage for your virtual machines

Operating VMs can be overwhelming when you’re overseeing an enterprise-class IT environment. Azure Automanage is a new feature that applies Azure best practices configurations to a VM based on its services. Once the VM is onboard, the feature applies the most appropriate configs to it, monitors it for drift, and auto-corrects it in case of deviation.
Read more
Paolo Valsecchi
  • Paolo Valsecchi
  • March 11, 2021

VMware Horizon: grant permissions in Active Directory

Having a controlled minimum set of permissions in your Active Directory (AD) will ensure nothing will slip during clone publishing. Otherwise, VMware Horizon, when instant clones are published, can make unwanted corrections in the AD service account while creating computer objects in the target organizational unit. You don’t want that.
Read more
Florent Appointaire
  • Florent Appointaire
  • March 9, 2021

Discover Kubernetes Resource View

Azure Kubernetes Service (AKS) recently introduced the ability to view the state of your AKS resources from a GUI. Azure Portal now enables you to view in-depth details of your workloads in real-time. You can view the workload of your deployments, pods, and replica sets, and various other capabilities without digging in the cmdline.
Read more
Romain Serre
  • Romain Serre
  • March 4, 2021

Filter Web Content with Microsoft Defender for Endpoint

Among many good things, remote work creates new challenges for business cybersecurity. Regardless of whether the user uses VPN, having additional security measures can never hurt. Microsoft Defender for Endpoint introduces additional layers where you can also set web content filters to avoid your employees creating unwanted cyber threats.
Read more
Benoit Voirin
  • Benoit Voirin
  • March 2, 2021

Assessing Your Active Directory

Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.
Read more
Vladan Seget
  • Vladan Seget
  • February 25, 2021

VMware vSphere and basic storage concepts in K8s, vSAN and vSphere Virtual Volumes (vVols)

Good understanding of storage is vital to every IT admin, freshman or not. vSphere continues to innovate how it uses storage, so it’s better to brush up on existing ways before getting into novelties. So before checking out vSphere 7 and Tanzu with their Paravirtual Container Storage Interface (pvCSI), let’s repeat the core material.
Read more
Florent Appointaire
  • Florent Appointaire
  • February 23, 2021

Certificate rotation for your AKS cluster to improve the security

The issue with, for example, employees leaving your company is that they can take the Kube file with them. With that file, they can access your Azure Kubernetes Service (AKS). One way to avoid that is to remove the opportunity of access entirely by renewing certificate authority for the designated AKS cluster.
Read more