Skip to main content

vRealize Automation 8.5



 VMware recently announced general availability of vRealize Automation 8.5. 

Generally speaking, vRealize Automation 8.5 adds capabilities focusing on the areas of multi-cloud support with Azure, extensibility with vRealize Orchestrator and ABX as well as expansion of network automation capabilities with vSphere and NSX.

What’s new in vRealize Automation 8.5

  • Project Administrator can act as Approver for all approval requests – When creating an approval policy, administrators can select a Project Administrator (for the project in which the approval was triggered) as the approver.
  • Configure when IP address from IPAM is released – You can configure how long it takes for an IP address to be released from allocation once it is no longer used. This allows for faster provisioning of new workloads where IP addresses are scarce.
  • Limit the number of namespaces for a project on a Kubernetes zone – The maximum number of supervisor namespaces that can be deployed for the project on a given K8s zone now has a configurable limit.
  • VMware vRealize Orchestrator plug-in for vRealize Automation 8.5 – The updated vRealize Automation plug-in supports scripting objects generation such as cloud accounts, cloud zones, projects, tags, and CRUD operations to build your own content.
  • Enable resources across Azure regions to be added to the same resource group – An Azure resource group is created in an Azure region. However, resources from any Azure region can be added into it. This feature enables admins to add resources from other regions into the Azure RG.
  • Snapshot management for Azure disks – You can now pass the resource group name, encryption set, and network policy while creating the disk snapshot.
  • Ability to enable/disable boot diagnostics for Azure VMs – You can enable/disable boot diagnostics for Azure VMs as a day 2 action.
  • Support for NSX-V to NSX-T migration with vSphere 6.7 – vRealize Automation NSX-V to NSX-T migration now supports migrating deployments that are running on vSphere 6.7.
  • Support for existing global security group as part of NSX-T Federation – vRealize Automation can now discover global security groups configured under NSX-T global manager. These groups can be leveraged in network profiles and VMware Cloud Templates to build deployments.
  • Custom Roles API – The APIs for Custom Roles (RBAC) are now available (Create, Read, List, Update, Delete).
  • Notifications – The Service Broker administrator can view the list of available email notification scenarios and enable or disable them for all users in their organization.
  • Terraform runtime environment authentication – This release introduces authentication for adding Terraform service runtime version to vRA for more secure environments.


Comments

Popular posts from this blog

Dell EMC VxRail – VMware Virtual SAN Stretched Cluster

Logical Diagram of VMware vSAN Stretched Cluster Physical Diagram of VMware vSAN Stretched Cluster Last week I deployed a test environment of VMware vSAN Stretched Cluster which is running on Dell EMC VxRail Appliance. In this post we will describe how to setup VMware vSAN Stretched Cluster on Dell EMC VxRail Appliance. Above figure is the high level of physical system diagram. In site A/B there are six VxRail Appliances and two 10GB Network Switch which are interconnected by two 10GB links, and each VxRail Appliance has one 10GB uplink connects to each Network Switch. In site C, there are one vSAN Witness host and one 10GB Network Switch. For the details of configuration of each hardware equipment in this environment, you can reference the followings. Site A (Preferred Site) 3 x VxRail E460 Appliance Each node includes 1 x SSD and 3 x SAS HDD, 2 x 10GB SFP+ ports 1 x 10GB Network switch Site B (Secondary Site) 3 x VxRail E460 Appliance Each node includes 1 x SSD and...

Console Mouse Not Working in Windows 2012 VMs

I recently ran into some problems while deploying a Windows Server 2012 R2 VM in my vSphere 6.5 U2 lab. I’ve come to expect that the console mouse response is going to be terrible until VMware Tools is installed, but for some odd reason I had no mouse control whatsoever. Thinking it may be a quirk of the Web Console, I tried both the Remote Console and the HTML5 client to no avail. The VM appeared to be healthy and would register keyboard input, but the motion of the mouse cursor was erratic or the cursor would not move at all. Thinking that I just needed to battle on and get Tools installed, I attempted to use the keyboard for this purpose – what a chore. You think it would have been easy, but the installer kept losing focus and falling behind other open windows. Many of the windows keyboard shortcuts I’d normally use were not functioning because they register on my laptop – not in the console. I couldn’t RDP to the VM either because the NIC needed to be configured with a vali...

Certificate Error During Datastore Upload

“The operation failed for an undetermined reason. Typically, this problem occurs due to certificates that the browser does no trust. If you are using self-signed or custom certificates, open the URL below in a new browser tab and accept the certificate, then retry the operation.” In my case, the URL that it listed was to one of my ESXi hosts in the compute-a cluster called Clu-1 . The error then goes on to reference VMware KB 2147256 . It may seem odd that the vSphere Client would be telling you to visit a random ESXi host’s UI address when you are trying to upload a file via vCenter. But if you stop to think about it for a second, vCenter has no access whatsoever to your datastores. Whether you are trying to create a new VMFS datastore, upload a file or even just browse, vCenter must rely on an ESXi host with the necessary access to do the actual legwork. That ESXi host then relays the information back through the Web Client. vCenter Server will broker th...