VMware vSAN 8 Update 2 and vSAN Max
VMware announced vSAN 8 Update 2 and an exciting new offering, VMware vSAN Max. We welcome Pete Keohler to discuss the details this week on The Virtually Speaking Podcast.
Daniel Micanek virtual Blog – Like normal Dan, but virtual.
VMware announced vSAN 8 Update 2 and an exciting new offering, VMware vSAN Max. We welcome Pete Keohler to discuss the details this week on The Virtually Speaking Podcast.
🆕 vSphere 8.0 Update 1c is now available! vSphere 8.0 Update 1c was just released and one of the resolved issues mentioned in the ESXi release notes is the following: […]
VMware is gearing up for a significant update with vSphere 8 Update 2, and it’s set to make waves in the realm of virtualization. Anticipated for release in Q3 2023, this update promises to bring exciting changes that will have a positive impact on the daily routines of VMware administrators.
Security Fixes in Release 4.3(2b)
Defect ID – CSCwf30468
Cisco UCS M5 C-series servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
wget https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
# sh spectre-meltdown-checker.sh --variant downfall --explain
EVC Intel “Skylake” Generation
CVE-2022-40982 aka 'Downfall, gather data sampling (GDS)'
> STATUS: VULNERABLE (Your microcode doesn't mitigate the vulnerability, and your kernel doesn't support mitigation)
> SUMMARY: CVE-2022-40982:KO
EVC Intel “Broadwell” Generation
CVE-2022-40982 aka 'Downfall, gather data sampling (GDS)'
> STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not affected)
> SUMMARY: CVE-2022-40982:OK
Mitigation with an updated kernel
When an update of the microcode is not available via a firmware update package, you may update the Kernel with a version that implements a way to shut off AVX instruction set support. It can be achieved by adding the following kernel command line parameter:
gather_data_sampling=force
When the mitigation is enabled, there is additional latency before results of the gather load can be consumed. Although the performance impact to most workloads is minimal, specific workloads may show performance impacts of up to 50%. Depending on their threat model, customers can decide to opt-out of the mitigation.
There will be an Intel SGX TCB Recovery for those Intel SGX-capable affected processors. This TCB Recovery will only attest as up-to-date when the patch has been FIT-loaded (for example, with an updated BIOS), Intel SGX has been enabled by BIOS, and hyperthreading is disabled. In this configuration, the mitigation will be locked to the enabled state. If Intel SGX is not enabled or if hyperthreading is enabled, the mitigation will not be locked, and system software can choose to enable or disable the GDS mitigation.
The VMware Explore 2023 Las Vegas – Video Library recordings for all on-demand sessions is now available!
VMware and NVIDIA today announced the expansion of their strategic partnership to ready the hundreds of thousands of enterprises that run on VMware’s cloud infrastructure for the era of generative AI.
Multi-TEP High Availability
Introduction A tunnel end point (TEP) is a virtual interface that can serve as an uplink for overlay traffic. On an ESXi host, a TEP is tightly associated to the physical interface through which it sends and receives its traffic. In the current TEP high availability (TEP HA) model, a TEP never fails. If the link of the ESXi interface to which a TEP is associated goes down, the TEP is simply moved
Are you ready to embark on an exciting journey at VMware Explore 2023 in Las Vegas? Join us as we hear directly from the VMware Explore Events Team, your trusted guides, on how to plan and navigate your way through this exceptional event.
Curious about the upcoming #hackathon at #VMwareExplore? We’ve got you covered. Join our informative session where you’ll learn all the ins and outs. Discover how to participate, what to expect, and much more. You can still participate! @vmwarecode
ESXi 8 Log Message Formats
ESXi Log Message Formats change in ESXi 8.0.0 and newer.