• hi@yahyazahedi.com
  • Germany

Multiple vRLI triggered Alerts not Displayed in vROps

Last week, while supporting a customer with vRLI, I encountered an interesting challenge regarding notifications to vROps. At first, setting up the feature seemed relatively straightforward, and the customer started receiving notifications correctly. However, he had a specific requirement: he wanted to be notified when a host went into maintenance mode. Although I managed to set up the feature and […]

vRealize Operations 8.10 – Create View and Dashboard

In the last post, I created a simple super metric, and now I want to show you how to create a view and dashboard for that super metric. Before I go through the configuration steps, I want to explain some terms in vRealize Operations. vRealize Operations displays the information you need in a variety of ways: with views, widgets, dashboards, […]

vRealize Operations 8.10 – Create Super Metric

Super metrics in vRealize Operations are custom metrics that you can define using existing metrics and mathematical functions. They allow you to create new metrics that are specific to your environment and can help you gain deeper insights into the performance and health of your infrastructure. With super metrics, you can perform complex calculations and aggregations of the data collected […]

Rightsizing Virtual Machines with vRealize Operations 8.10

Virtual Machine Rightsizing is the process of optimizing the resources of a virtual machine to match its actual usage by analyzing its CPU and memory. This helps ensure efficient workload performance and reduce costs. VMware vRealize Operations can automate the process by suggesting changes to optimize resource allocation, resulting in improved performance and higher resource utilization. In another post, I […]

Deploying and Configuring vRealize Operations 8.10

In this post, I will go through the deployment and initial configurations of vRealize Operations or vRops. Installing and configuring VMware vRealize Operations involves two main steps that include deploying the vRealize Operations Manager appliance and then Configuring it to access the Web UI using a web browser and work with it. Then you can access dashboards, views, alerts, and […]

An introduction to how vSAN stores and reads data in OSA and ESA

In this post, I will provide an explanation of how vSAN stores and read data in both OSA (Original Storage Architecture) and ESA (Express Storage Architecture) architecture to enhance understanding of vSAN. The explanation will start with the former OSA and then proceed to the latter and newer ESA, covering the data processing and storage aspects. The OSA architecture can […]

Configure Workspace ONE Access – Part 3

Welcome to another post in this series, but not the last! If you’ve followed all the steps I’ve outlined, you should already have a configured Workspace ONE and be able to log in to it, but there was nothing there yet! In this post, I’ll show you how to configure Horizon to give Workspace One access to Horizon resources such […]

Configure Workspace ONE Access – Part 2

Welcome to my VMware Horizon series. In the last post, I implemented and configured Workspace ONE Access and now I want to install and configure the Workspace ONE Access Connector. Workspace ONE Acces connector is a VMware Workspace ONE Access component that integrates with infrastructure such as Active Directory, RSA SecurID, and VMware Horizon to provide directory integration, user authentication, and virtual […]

Configure Workspace ONE Access – Part 1

VMware Workspace ONE is an intelligence-driven digital workspace platform that enables you to simply and securely deliver and manage any app on any device, anywhere. The VMware Workspace ONE Access is part of the VMware Workspace ONE solution. Workspace ONE Access delivers multifactor authentication (MFA), conditional access, and single sign-on (SSO), and acts as an intermediary to other identity stores […]

Deploy and Configure Unified Access Gateway

VMware Unified Access Gateway (UAG) is an appliance that acts as a security gateway for the internal network. It is normally installed in a demilitarized zone (DMZ) to ensure that the only traffic entering the corporate data center is traffic on behalf of a strongly authenticated remote user to enable secure remote access from an external network to a variety […]