Piszki Lab | EN

My case study in the clouds…

2018/02/09
by Piotr Pisz
0 comments

VMware Integrated Containers 1.3 – HTML5 Plugin SSL Hadshake error (EN)

One of the main innovations in VMware Integrated Containers 1.3 (VIC) is the extended plugin for vSphere Client UI (html5) with which you can configure and run the VMware Container Host (VCH). This plugin depends on the correct SSL configuration in vCenter. And here the river theme appears, what is the correct configuration? As it turns out, everyone who has generated a certificate from VMCA signed by Root CA (aka custom certificate) has an almost good configuration. Where the problem arises, I will describe below.

vic-product

Continue Reading →

2017/09/18
by Piotr Pisz
0 comments

Trend Micro Deep Security – SSL Traffic Inspection

About Trend Micro Deep Security on this blog I wrote many times, but I have not mentioned yet one of the features of this solution, ie SSL traffic inspection. According to recent Google statistics, more than 70% of network traffic is already encrypted. This means that all IDS/IPS/WAF solutions that can not sniff SSL traffic and inspect it are immune to attacks! For Deep Security, we have the ability to enable SSL inspection at the Intrusion Prevention module level. Of course, we will not achieve such efficiency and effectiveness as in the case of BIG-IP F5 , but we will clearly increase the level of security of the protected services.

pobrane

Continue Reading →

2017/09/04
by Piotr Pisz
0 comments

vSphere Integrated Containers 1.1.1 – create base image and push it into Harbor (and run container with persistent volume)

For how to install and configure vSphere Integrated Containers I recently wrote here. Today we will create our own base docker image (with CentOS 7 system) with any application, and load it into the registry (image repository) on Harbor. In addition, we will create a persistent volume that will connect to our new container. The topic of VIC is quite new, so there is not much information on the Internet related to it, this article was created as an attempt to systematize the knowledge associated with it.

doc8

Continue Reading →

2017/09/04
by Piotr Pisz
1 Comment

vSphere Integrated Containers 1.1.1 – Installation and configuration

VMware has long been unable to react to the Docker revolution. Ultimately, it was decided that no changes had been made to ESXi so that the containers would not run directly in the ESXi kernel. VMware went the other way, interesting enough to look at it. Their own interpretation of the containerization is based on the PhotonOS project (CentOS-based ultra-light Linux system) and is called vSphere Integrated Containers. In this solution, VMware allows you to run a single container as an ultralight virtual machine. Sounds like a denial of the Docker idea? No, its development, with this approach, Docker host  is a whole vSphere environment, not a single Linux machine. From the viewpoint of the vSphere Administrator, machines with running dockers are the same problems, they are large, loaded, it is not known what is running on them. Using VMware’s approach, it is much easier to manage containers in a vSphere environment. In this article, I will show you how to install VIC, how to start VCH docker host, and how to use Admiral and Harbor.

vic1

Continue Reading →

2017/03/13
by Piotr Pisz
0 comments

Trend Micro Deep Security 10 – What’s new?

On this blog many times I wrote about Trend Micro Deep Security, I believe this product to be one of the most interesting on the market. Deep Security provides a comprehensive protection to VMware vSphere. Here we have agents and agentless anti-virus protection, HIDS, IPS, inspection logs, and the newly introduced, application control. Trend Micro develops its product in a sustainable manner, new versions appear not too often but quite regularly. In this post I will try to describe briefly what’s new in Trend Micro Deep Security 10.

deep2

Continue Reading →

2017/01/18
by Piotr Pisz
0 comments

My Lab network design with DD-WRT and Cisco SG300-10

Building at home test environment often start with a very basic configuration. A small computer, NAS and router from your ISP are perfectly adequate. From the time when knowledge and skills grow, so are the demands that we make against the environment also grow. As we know, have fun with virtualization sooner or later will lead us to the point where we find that several tagged VLAN that is what we would like to have. In this post I will present what I had initial configuration and how it expanded with the behavior of existing functionality. The idea of what I guided mainly to get rid of the ISP router as the primary device on the network, and the introduction of tagged network (VLAN X) with maintaining existing non tagged network (VLAN 1). Described configuration applies to specific hardware, but it can be successfully used with the equipment of other suppliers (eg. TP-Link + Netgear).

C50-2008-call02-ro

Continue Reading →