WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
  • VKS
  • Homelab
    • Resources
    • Nested Virtualization
  • VMware Nostalgia
  • Apple

ESXi on Arm Fling is LIVE!

10.06.2020 by William Lam // 17 Comments


The highly anticipated ESXi on Arm Fling has just been announced and is NOW generally available as a new VMware Fling! Head over to https://community.broadcom.com/flings and be sure to carefully read through the documentation before try out the bits.

History

Although ESXi-Arm was publicly demo'ed at VMworld Europe 2018 during the closing keynote by Ray O'Farrell (former CTO of VMware), the reality was there was a ton more to do before ESXi-Arm could be a reality for VMware customers. The newly formed ESXi-Arm team at VMware has been hard at work these last couple of years working with both Arm and its eco-system in extending hardware standards, firmware standards (open contribution to UEFI), and certification beyond the existing Arm server ecosystem, which enabled us to support platforms like SmartNICs and the ubiquitous Raspberry Pi. This is just a glimpse into what it took to get where we are at today.

I am also excited to share that the Virtually Speaking Podcast crew has invited us back for an exclusive episode featuring both Andrei Warkentin and myself to dive deeper into the development of ESXi-Arm project at VMware. This is an episode you will not want to miss!

Hardware

The ESXi-Arm Fling supports a number of different Arm platforms ranging from a traditional Datacenter form-factor to both Near and Far Edge systems including the highly requested Raspberry Pi (rPI)! With the rPI, only the 4b model will be supported and although both the 4GB and 8GB memory model works with ESXi-Arm. We highly recommend folks invest in the 8GB model to be able to take advantage of more vSphere features and be able to run more workloads.


For a complete list of supported Arm hardware platforms, please refer to the ESXi-Arm documentation.

vCenter Support

For customers with an existing x86 vCenter Server or those that would like to deploy a new vCenter Server, you will be able to attach and manage ESXi-Arm hosts just like you normally would as long as you are using vCenter Server 7.0 or greater.


We expect the majority of vSphere platform features to "just work" like vMotion but there may be some features that may not work or have additional requirements.


For example, to enable vSphere HA and/or vSphere FT, the Fault Domain Manager (FDM) Client VIB must be installed on an ESXi-Arm host. Today, this VIB is distributed as part of vCenter Server and only x86 version of the client is available. We do provide FDM Client VIBs for ESXi-Arm as part of the ESXi-Arm Fling, but support will be limited to vCenter Server 7.0c and 7.0d. For detailed instructions, please refer to the ESXi-Arm documentation.

VMware Tools

VMware Tools for ESXi-Arm GuestOS is not bundled as part of ESXi-Arm Fling, but can be installed. To do so, you will need to compile open-vm-tools for your respective GuestOS. Instructions can be found in the ESXi-Arm Fling documentation and below, you can see a screenshot of VMware Tools for Arm successfully running on Ubuntu 20.04 GuestOS running on ESXi-Arm on the rPI 4.

vSAN Witness

Lastly, a popular use case that has been brought up when ESXi-Arm was initially demo'ed was the use of the rPI as an inexpensive vSAN Witness, which is a fantastic use case for ROBO & Edge locations. I am very happy to share that using an rPI 8GB as a vSAN Witness works! As you can see from the screenshot below, I have two physical Intel NUC 9th Pro configured in a 2-Node vSAN Cluster and I am using the rPI as vSAN Witness 😀


In case this was not clear, this is NOT officially supported but it does demonstrate the viability of this concept and and feedback from the our users would help drive the priority and the potential support for such a configuration. More details will be shared in a future blog post outlining the instructions on using rPI as vSAN Witness. Stay tuned!

As you can see, this is just a small taste of what can be done with the ESXi-Arm Fling and the possibilities are truly endless! The ESXi-Arm team is very excited to see what the community will do with the ESXi-Arm Fling, what type of use cases are you solving or workloads that you are running. Below are a few ways in how you can engage with the ESXi-Arm team and community.

Categories // ESXi-Arm, VSAN, vSphere Tags // Arm, ESXi, Raspberry Pi, witness

PowerCLI Module for managing vCenter Single Sign-On (SSO)

10.05.2020 by William Lam // 18 Comments

A few years back I had submitted a PowerCLI Feature Request (PCLI-44) via the public PowerCLI Ideas platform requesting for a PowerCLI module that would support vCenter Single Sign-On (SSO) Administrative functionality such as managing SSO Users, Groups, Password, Lockout Policy and Identity Sources.


This was one of the most popular Idea voted by the PowerCLI community, which also stressed the need for such functionality which I came across on a regular basis on some of the Automation I was writing. In the past, I have written numerous blog articles in working around this limitation as the vCenter SSO Admin APIs were not and leveraging Guest Operations API, one could still automate various SSO operations using the various SSO CLIs that is included within the vCenter Server Appliance (VCSA).

Today, I received a notification from the PowerCLI Ideas platform that this feature as "Shipped" and it looks like the PowerCLI team has just released an Open Source Module called VMware.vSphere.SsoAdmin that includes the following 12 cmdlets:

  • Add-ActiveDirectoryIdentitySource
  • Add-GroupToSsoGroup
  • Add-LDAPIdentitySource
  • Add-UserToSsoGroup
  • Connect-SsoAdminServer
  • Disconnect-SsoAdminServer
  • Get-IdentitySource
  • Get-SsoAuthenticationPolicy
  • Get-SsoGroup
  • Get-SsoLockoutPolicy
  • Get-SsoPasswordPolicy
  • Get-SsoPersonUser
  • Get-SsoTokenLifetime
  • New-SsoGroup
  • New-SsoPersonUser
  • Remove-GroupFromSsoGroup
  • Remove-IdentitySource
  • Remove-SsoGroup
  • Remove-SsoPersonUser
  • Remove-UserFromSsoGroup
  • Set-LDAPIdentitySource
  • Set-SsoAuthenticationPolicy
  • Set-SsoGroup
  • Set-SsoLockoutPolicy
  • Set-SsoPasswordPolicy
  • Set-SsoPersonUser
  • Set-SsoSelfPersonUserPassword
  • Set-SsoTokenLifetime

To get started with the new PowerCLI SSO Module, take a look at the instructions below.

[Read more...]

Categories // Automation, PowerCLI, vSphere Tags // PowerCLI, sso

Full OVA/OVF property support coming to Terraform provider for vSphere

06.11.2020 by William Lam // 23 Comments

Terraform is one of the most popular Infrastructure as Code (IaC) tool out there today and it should come as no surprise there is Terraform provider for vSphere which many of our customers have been using. In fact, VMware just recently released a couple more new providers (here and here) supporting VMware Cloud on AWS and NSX-T solutions respectively.

Although I have used Terraform and the vSphere provider in the past, it has not been my tool of choice for automation as it still lacks a number of basic vSphere capabilities which I require on a regular basis. The most common one being the ability to deploy a Virtual Appliance (OVA/OVF) which has been my biggest barrier and I know this has been a highly requested feature from the community as well.

In early May of this year, I noticed that v1.18 of the vSphere provider finally added support for OVA/OVF deployment and I was pretty excited to give this a try and may even have been the first to kick the tires on this feature? Although OVA/OVF support was added, it looks like support for customizing OVF properties which is commonly included as part of an OVA/OVF would only possible if you are cloning from an existing imported OVA/OVF image. One of the most common use case is to import an OVF/OVA from either your local computer or from a URL and it looks like this use case was not possible.

I filed two Github issues, one for supporting OVF properties for initial OVA/OVF deployment and another regarding a bug I ran into when importing OVA/OVF from a remote URL. Just yesterday, I got the good news that my feature request has been completed and I was given an early drop of the vSphere provider to try out this feature. I may have also hinted to the Engineering team to use my popular Nested ESXi Appliance OVA as a reference test implementation as I knew this was something many customers will want to deploy 🙂

UPDATE (11/05/21) - Thanks to Ryan Johnson, it looks like there has been some changes to the Terraform Provider for vSphere in how to deploy OVF/OVA. I've gone ahead an updated the example below to reflect these changes, it certainly looks a bit more verbose than before, which is a bit unfortunate from readability standpoint.

UPDATE (06/23/20) - Support for OVA/OVF properties is now available as part of 1.20 of the Terraform Provider for vSphere

[Read more...]

Categories // Automation, vSphere Tags // ova, ovf, Terraform

  • « Previous Page
  • 1
  • …
  • 35
  • 36
  • 37
  • 38
  • 39
  • …
  • 109
  • Next Page »

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • VMUG Connect 2025 - Minimal VMware Cloud Foundation (VCF) 5.x in a Box  05/15/2025
  • Programmatically accessing the Broadcom Compatibility Guide (BCG) 05/06/2025
  • Quick Tip - Validating Broadcom Download Token  05/01/2025
  • Supported chipsets for the USB Network Native Driver for ESXi Fling 04/23/2025
  • vCenter Identity Federation with Authelia 04/16/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...