Revamped IAM Interface in Prism Central: Independent and Streamlined for Enhanced Usability

Introduction Nutanix Prism Central continues to evolve, providing administrators with cutting-edge tools to manage their IT infrastructure effectively. One of the standout features in the latest release, Prism Central 2024.1, is the revamped Identity and Access Management (IAM) interface. This update introduces a more independent and streamlined IAM system, enhancing usability and providing more granular control over user roles and […]

Feature: Nutanix QoS

Nutanix Storage QoS – Feature magnifier

Two weeks ago, Nutanix released its new AoS version 5.11. This release has many new features. The introduction of these features is definitely worth looking into. During this post, I will explain the Nutanix Storage QoS feature. Within the next weeks, I hope to find some time to look into more new features. Storage QoS explanation Nutanix Storage QoS allows […]

LACP on vSphere

LACP Configuration with VMware ESXi – Part 2 (Switch config & Troubleshooting tools)

This is part 2 of “Configuring LACP on VMware ESXi”, If you did not yet read part 1, we highly suggest doing so. In the previous post, we made a step by step approach on how to configure the LAG on VMware vCenter. In this blog, we will be continue our configuration on the physical switch and show validation and […]

LACP on vSphere

LACP configuration with VMware ESXi – Part 1 (vCenter config)

While LACP on VMware ESXi has been around for a while, I noticed that many of our customers do not like to implement this feature in their environment. Reasons vary between, complexity, incorrect understanding on the ‘added value’ and many more. Because of these reasons, I had a discussion on this topic with my colleague and co-blogger Jens. As a […]

Replacing VMCA Self Signed certificate with a Windows Signed certificate

While many companies advise to ‘simply ignore’an invalid certificate warning on internal sites, this will encourage incorrect public browser behavior. As a result, employee’s will more likely ignore browser warnings on public sites as well, which can end in exposing the company vulnerable to malware and other exploits. The correct use of an SSL certificate signed by a trusted certificate […]