Guest Post – When Pets Meet Cattle: OpenStack and VMware, Part 1

VMware is the industry’s leading enterprise virtualization software company. So it’s not OpenStack Logosurprising that one of the most common questions asked by enterprises considering OpenStack is: “How does OpenStack integrate with VMware vSphere and VMware NSX?” In November 2013, Mirantis and VMware set forth plans to work together on integrating Mirantis OpenStack with vSphere and NSX. Now, as a result of our collaboration, we have built what we believe to be the easiest way to configure OpenStack for a VMware environment. And we’ve scheduled a webcast to do some show and tell about how the technologies work together. You can register for the webinar here.

And in case you were wondering about the headline of this post, it was taken from a blog post written by our friend Nick Chase over at Mirantis.  Take a read of his post here.


VMware at RSA Conference 2014 (#RSAC)


  • Company outlines vision for security in the Software-Defined Data Center
  • Product and partner demonstrations in Booth #1615 to showcase growing security portfolio
  • New PCI-DSS 3.0 and FedRAMP reference architectures to be presented

Throughout its history, RSA Conference has consistently attracted the world’s best and brightest in the security field, creating opportunities for attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging and established companies. Continue reading

Elephant Flow Mitigation via Virtual-Physical Communication

Note: this post was developed jointly by Justin Pettit of VMware and Mark Pearson of HP, with additional content from VMware’s Martin Casado and Bruce Davie.

A recent Network Heresy post “Of Mice and Elephants” discussed the impact long-lived flows (elephants) have on their short-lived peers (mice).  A quick summary is that, in a datacenter, it is believed that the majority of flows are short-lived (mice), but the majority of packets are long-lived (elephants). Mice flows tend to be bursty and latency-sensitive, whereas elephant flows tend to transfer large amounts of data, with per-packet latency being of less concern.  These elephants can fill up network buffers, which can introduce latency for mice.

At the HP 2013 Discover Conference, HP and VMware demonstrated a technology preview of detecting and handling elephant flows in an overlay network. The demonstration featured the joint HP-VMware solution announced at VMworld 2013.  VMware NSX provided an overlay network using HP switches as the underlay along with the HP VAN SDN controller. Through controller federation interfaces, the overlay and the underlay co-operated to mitigate the effects of the elephant flows on the mice. The solution shows the power of integration between network virtualization and SDN solutions. Continue reading

VMware @ OpenStack Summit Hong Kong

Next week in Hong Kong, the VMware team will have a major presence at the OpenStack Summit, and we have an ever-growing presence on the agenda of speaking sessions and demos. As we did with the Portland show, he is a show planner with a schedule of all the VMware sessions. Here’s a snapshot of what you can expect (and experience) at the show. Continue reading

VMware Announces General Availability of VMware NSX Network Virtualization Platform

Today at VMworld® in Barcelona, we once again highlighted VMware NSX, the platform for network virtualization. More importantly, we announced general availability of VMware NSX. Interested customers should contact their VMware representative who can put them in touch directly with a VMware NSX specialist.

Originally announced at VMworld in San Francisco, VMware NSX represents another giant step for VMware customers as they look to bring the operational benefits of server virtualization to the network. To read more about the launch, see our full blog post from the August announcement.  We also encourage you to read what our broad set of ecosystem partners had to say.

If you are interested in a deeper dive on VMware NSX, here is a great overview video from VMworld San Francisco in August.

Additionally, make sure you take a look at VMware NSX labs available in Hands-On Labs online portal. You can learn more about these labs in our blog post here.

Roger Fortier

Network Virtualization: The Holy Grail of Workload Agility

This is a guest post from vCloud Service Provider Logicworks which originally appeared on the VMware vCloud Blog. You can read more from Logicworks on their blog, Gathering Clouds.

Everyone is familiar with virtualization. It’s become the IT standard for achieving greater levels of resource efficiency and functionality. While it’s just a tool, the vast majority of new builds utilize it in some way.

This holds true for managed service providers (MSPs) as well. The benefits of virtualization to an MSP are similar to what an enterprise would experience. Given the nature of their business, MSPs put a great emphasis on truly being agile to client requirements, both in terms of build times and modifications of client environments.

Virtualization is absolutely key to that, and has been since the inception of VMware. The ability to resize a component of a client’s infrastructure on-demand and on the fly is an absolute must nowadays.

However, when we talk about virtualization, we mean virtualization of the compute layer, which is what everyone speaks about relative to virtual machines (VMs). And while VMs are an amazing innovation, the really interesting stuff is happening at the storage and network virtualization layers.

Logicworks is very keen on network virtualization, as opposed to the traditional configuration of hardware switches, which is a major reason we joined the NSX Beta Program.

Historically, the challenge with network virtualization’s centered on the limitations of spanning the network virtualization layer from a client’s existing virtual environment to other environments, including other data centers.

One of the major benefits we’re looking to achieve with the NSX beta program is that the technology after the acquisition of Nicira makes it possible to span virtualization between data centers which helps realize the dream of true, still completely active mobile workloads.

One of the challenges that this resolves is lead times in deployments. As it is today, providers still need to log into various switches between different vendors to configure and test them. While this is somewhat automatable, it hasn’t achieved that same degree of automation, which compute virtualization enjoys. Network virtualization gives us the ability, using software and scripts and predetermined runbooks, to deploy clients via API calls to a control cluster instead of logging into physical devices.

In addition, providers also use various vendors’ networks offerings. This means that the set of commands one will have to run on a Juniper device is going to different than on an Extreme device, and complex configurations can be quite a bit different between the two.

If we abstract that away by making the basic configuration of either of those hardware devices as simple as possible, enough to enable network virtualization on top of it, then we can standardize our configurations across our clients. This process becomes more repeatable and much quicker to deploy –like the DevOps model applied to network virtualization, to a degree. If the work being done is as close to possible from one client to another, then we can remove potential errors and increase efficiencies through more automation.

Being on the cutting edge of not-yet-industry-standard technology enables Logicworks to deploy cross-production workloads, and serve as an agile service provider. This dovetails nicely with the next generation of network virtualization in that it mirrors our ability to respond quickly and dynamically to make adjustments in deployments.  For the first time, the capabilities of the technology match exactly what it is that we, as a hosting provider, do every day.

VMware NSX Labs Available in Hands-On Labs Online Portal

At VMworld 2013 in San Francisco, we launched the VMware NSX network virtualization platform to the world. During the keynote, our CEO Pat Gelsinger was joined by representatives from CITI, GE and eBay to discuss the promise of network virtualization and VMware NSX, and more than 20 partners announced support for the platform.

But perhaps the most successful part of our launch were the VMware NSX Hands-On Labs.  These labs were by far the most successful at the show. Attendees consumed more than 2,000 sessions, totaling 124,000 lab minutes during the four days of VMworld. That is roughly equivalent to locking yourself in a room with your laptop and doing nothing but take this lab 24 hours a day, seven days a week, for three months straight.

And now, we are bringing the labs to you online. Remember to participate in the HOL Community page at, take labs at

HOL-SDC-1303 – VMware NSX: The Network Virtualization Platform

A Tech Preview of the exciting new VMware NSX for vSphere product announced at VMworld. Learn how VMware NSX virtualizes your network and simplifies your datacenter operations. This lab is currently based on a beta version of code and you may encounter some user interface issues during the lab exercises. The lab will be improved with newer code as the product moves closer to release. For now, brave the rapids, jump in with both feet and have a go at at VMware NSX, the network virtualization platform.

Enroll in HOL-SDC-1303

HOL-SDC-1319 - VMware NSX for Multi-Hypervisor Environments

Also a Tech Preview, this lab focuses on the multi-hypervisor version of VMware NSX. This is a great opportunity to see how Vmware NSX can support non-vSphere portions of your datacenter.

Enroll in HOL-SDC-1319

Roger Fortier


VMware NSX Featured On Packet Pushers Podcast

This week, VMware’s Brad Hedlund and Scott Lowe spoke with Greg Ferro and Ethan Banks about the VMware NSX network virtualization platform. Check out the latest edition of the  ”Packet Pushers Podcast” below.

You can find all of Greg’s latest musings on networking at

Ethan provides his perspective on networking at


Networking and Security Session Guide for VMworld 2013

So, you’re a network geek, security ninja or cloud architect and you’re wondering what to attend at VMworld 2013. Well, here’s your handy guide to the sessions at this year’s conference in San Francisco you will be most interested in..

This year we have a full agenda of networking and security track sessions. We recognize that there may be overlap in times and many of these sessions will be repeated so make sure you check the schedule builder to catch any repeats.

Monday August 26, 2013
Networking Track
Session ID Session Title Times Audience
NET5529 VMware NSX: A Customer’s Perspective 2:00 – 3:00 pm Cloud Architect
VI / Network Admin
NET5847 NSX: Introducing the World to VMware NSX 2:30 – 3:30 pm Cloud Architect
VI / Network Admin
NET5716 Advanced VMware NSX Architecture 5:00 – 6:00 pm Cloud Architect
VI / Network Admin
SEC5893 Changing the Economics of Firewall Services in the Software-Defined Center – VMware NSX Distributed Firewall 11:00 – 12:00 pm Firewall Architect
Security Architect
SEC5428 VMware Compliance Reference Architecture Framework Overview 11:00 – 12:00 pm Security Admin
Security Architect
SEC5749 Introducing NSX Service Composer:  The New Consumption Model for Security Services in the SDDC 5:00 – 6:00 pm Security Admin
Security Architect
Tuesday Aug 27, 2013
Networking Track
Session ID Session Title Times Audience
NET5266 Bringing Network Virtualization to VMware environments with NSX 11:00 – 12:00 pm VI / Network Admin
NET5184 Designing Your Next Generation Datacenter for Network Virtualization 11:30 – 12:30 pm Cloud Architect
NET7388-S Network Virtualization: Moving Beyond the Obvious 12:30 – 1:30 pm Cloud Architect
NET5270 Virtualized Network Services Model with VMware NSX 12:30 – 1:30 pm VI / Network Admin
NET5516 An Introduction to Network Virtualization 12:30 –  1:30 pm Cloud Architect
NET5521 vSphere Distributed Switch -  Design and Best Practices 2:00 – 3:00 pm Cloud Architect
NET5584 Deploying VMware NSX Network Virtualization 2:00 – 3:00 pm VI / Network Admin
NET5796 Virtualization and Cloud Concepts for Network Administrators 3:30 – 4:30 pm Network Admin
NET5716 Advanced VMware NSX Architecture 3:30 – 6:00 pm Cloud Architect
VI / Network Admin
NET5525 Real-world Deployment Scenarios for VMware NSX 5:00 – 6:00 pm Cloud Architect
NET5790 Operational Best Practices for VMware NSX 5:00 – 6:00 pm VI / Network Admin
SEC5318 NSX Security Solutions In Action – Deploying, Troubleshooting, and Monitoring for VMware NSX Service Composer 11:00 – 12:00 pm Security Admin
Security Architect
SEC5755 VMware NSX with Next-Generation Security by Palo Alto Networks 1:00 – 2:00 pm Firewall Architect
SEC5253 Get on with Business – VMware Reference Architectures Help Streamline Compliance Efforts 3:30 – 4:30 pm Security Architect
SEC5891 Technical Deep Dive: Build a Collapsed DMZ Architecture for Optimal Scale and Performance Based on NSX Firewall Services 3:30 – 4:30 pm Firewall Architect
SEC5775 NSX PCI Reference Architecture Workshop Session 1 – Segmentation 3:30 – 4:30 pm Security Architect
Wednesday, August 28, 2013
Networking Track
Session ID Session Title Time Audience
NET5520 VMware NSX Integration with OpenStack 11:00 – noon Cloud Architect
NET5522 VMware NSX Extensibility: Network and Security Services from 3rd party vendors 8:00 – 9:00 am Cloud Architect
NET5654 Troubleshooting VXLAN and Network Services in a Virtualized Environment 9:30 – 10:30 am VI / Network Admin
Security Track
SEC5624 VMware Compliance Reference Architecture Framework: Accelerate your Deployments 8:30 – 9:30 am Security Architect – Panel Discussion
SEC5828 Datacenter Transformation with Network Virtualization: Today and Tomorrow 9:30 – 10:30 am Cloud Architect, VI /Network Admin
SEC5750 Security Automation Workflows with NSX 10:00 – 11:00 am Security Architect
SEC5889 Troubleshooting and Monitoring NSX Service Composer (and Partner) Policies 1:00 – 2:00 pm Firewall Admin
SEC5820 NSX PCI Reference Architecture Workshop Session 2 – Privileged User Control 2:30 – 3:30 pm Security Architect
SEC5894 Deploying, Troubleshooting, and Monitoring VMware NSX Distributed Firewall 4:00 – 5:00 pm Firewall Admin
SEC5847 NSX PCI Reference Architecture Workshop Session 3 – Operational Efficiencies 4:00 – 5:00 pm Security Architect
Thursday, August 29, 2013
Networking and Security Tracks
Session ID Session Title Time Audience
NET5520 VMware NSX Integration with OpenStack 11:00  – noon Cloud Architect
NET5522 VMware NSX Extensibility: Network and Security Services from 3rd party vendors 8:00 – 9:00 am Cloud Architect
SEC5582 Multi-site Deployments with Network Virtualization 12:30 – 1:30 pm Cloud Architect

Hands-on Labs @VMworld 2013

The team has built some great lab exercises to see Networking and Security in action:Hands-on Labs @VMworld 2013

  • HOL-SDC-1302: vSphere Distributed Switch from A to Z
  • HOL-SDC-1303: VMware NSX Network Virtualization Platform for VMware environments
  • HOL-SDC-1319 – VMware NSX Network Virtualization Platform

Hope you have a great event. Follow us at @VMwareNSX and let us know if you want to come by and meet us at the booth.

See you in San Francisco.

The VMware Team

Picking The Right Abstrations For Your Network Virtualization Solution

In my travels around the internet, I became increasingly frustrated by the fact that most descriptions of SDN and network virtualisation solutions dive right down into the specifics of how stuff works. While I’m all for the details, I feel that there is an opportunity here to step back a bit and talk about the abstractions, which is what the end-user will see and deal with. For this post, (and yes, by association) I will talk about the abstractions used by perhaps the most mature network virtualisation solution on the market today. And yes, this means that I won’t be talking

Dmitri Kalintsev, Solution Architect, VMware

Note – this post appeared on the Telecom Occasionally blog. Read the entire post here.