Categories
Hardware VMware vSphere / vCenter Windows 10

10GbE with TRENDnet TEG-10GECTX and VMware Workstation

So there I was…isn’t that the way it usually starts out with these things? My desktop PC is a great beauty. I built her in late 2018 to provide a solid baseline for light development, gaming, and virtualization with VMware Workstation. She has an Intel i9-9900K processor with 64GB of GSkill TridentZ RGB 3200 memory. […]

Categories
Horizon Kubernetes

PostgreSQL Event DB Support in Horizon 2103

So as I was building my #HomeLab Horizon infrastructure (again), I decided to go with the latest 2103 release. As mentioned previously, I planned to host my events database in a Kubernetes-hosted database server. I was getting ready to deploy the MS SQL Server pod when I came across an interested note in the Release […]

Categories
Hardware Networking VMware

HomeLab Upgrades

Well, I’m learning a painful lesson about running a #HomeLab environment 24/7: Electricity is Expensive! I had always heard electricity was more expensive in Korea, but after 3 consecutive months of a higher electric bill (well above average) I’m now a believer. Unfortunately, I need to find a way to cut the bill before the […]

Categories
Horizon Security

SAML Authentication with Workspace ONE Access: Part 4 SSL Configuration

This is the 4th part of my multi-part series on setting up SAML Authentication using the VMware Workspace ONE Access product. In this article, I will quickly cover the Secure Sockets Layer (or SSL) configuration I will be using. If you missed my earlier posts, you can review them here: Part 1: Preparation Part 1.5: […]

Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 3 Load Balancer Configuration

This is the 3rd part to my series on setting up SAML Authentication using Workspace ONE Access. During this article, we will configure the NSX-T Load Balancer for our Workspace ONE Access cluster. If you need to catch up, here are links to the prior articles in this series: Part 1: Preparation Part 1.5: Database […]

Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 2 Primary Node Deployment and Config

SAML Authentication with Workspace ONE Access Series Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes So, I was originally going to go over setting up the Load Balancer in NSX-T, but I’m having issues getting […]

Categories
Horizon Kubernetes NSX-T

SAML Authentication with Workspace ONE Access: Part 1.5 Database Changes

So there I was…again… Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes You’re probably wondering why this post exists. Well, it’s because after all the kerfuffle (is that even a word???) with my #NSX-T networking, […]

Categories
Networking NSX-T

NSX-T & Ubiquity Networking (Actually) Working…

So, there I was… How many bad stories started out with those very words? After my last setup article, I was having some very quirky behavior with my network infrastructure. Things like, deploying Workload Management on my virtual vSphere cluster wouldn’t successfully deploy. I could ping everything fine and all of the tunnels in NSX-T […]

Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 1 Preparation

Introduction and Architecture This will be a multi-part series where I setup SAML Authentication using a VMware Workspace ONE Access 20.10 server setup. Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes According to the VMware […]

Categories
Security VMware

PowerShell Script to Apply DISA STIG to a VMware Virtual Machine

Most organizations have security compliance requirements for their servers. My past organization was no different. We had to meet Security Technical Implementation Guide (STIG) standards published by the Defense Information Systems Agency (DISA). They have hundreds of configuration guides for various Operating Systems and Applications. These guides are a great starting point if you are […]