I.use[iCloud.Storage] 200GB

Today I decided once again to stop fighting against apple’s devil plan to rule my wallet : I subscribed to an iCloud 200 GB storage plan.

I already have plenty of “databox”, either personal/free or corporate accounts, with free space. And to be honest, Apple’s databox is not the best one, nor the cheapest too. Yet I did the maths and came to the conclusion that for my particular use case, it’s a good enough solution with a fair price.

It’s a major mind shift for me : I always considered cloud databoxes overpriced.

My use case is pretty simple : I want to backup my iPhone, which hold up to 128 GB of data. Here is my context :

  • My main computer is a MacBook Air,
  • 256 GB SSD, I value every single GB of it worthy to be traded on the comex market,
  • Anyway, my phone is plugged on the Mac approximately every ~never,
  • My central “home Mac mini” holding the “global” iTunes DB is left for dead for years now : so yesterday solution design,
  • I don’t want to feel the pain of managing (and carrying) USB drives & creating symlinks on my airbook to divert iPhone’s backup to it anymore : I value my time too much for that.

So I decided to be a nice cloud consumer, and delegate the hassle of running/maintaining the storage infrastructure : there is zero value doing it myself (geeky time is too precious to manage a backup nas@home).

Apple charge me 2.99€/month for 200 GB : that’s 35,88€/year.

200 GB is enough to hold all the data of my oneday-potentially full iphone (which is not atm), and leave me plenty of room for files on iCloud Drive and other “maybe one day” interesting services (iCloud photo library).

For the security & personal information aspect, I am willing to trust the cryptographic science (call me foolish).

A 200GB HDD is around 25€ on Amazon, so iCloud storage subscription is ~30% more expensive than a naked disk.

I consider this premium, as the price of peace of mind :

  • No need to provision space on the home nas,
  • Don’t need to run that disk 24/7 and care about HDD failure,
  • Nothing to do when I come home : it’s just backed up, no matter where I was the whole day/week.

Okay, an HDD you own is a onetime purchase, while Apple’s service is a subscription : I pay the HDD again every year.

So basically, it could be like I throw my 200GB HDD through the window each year and buy a new one : it make no economical or ecological sense.

But in fact it’s a greener option! The cloud storage have already been bought by someone else anyway : I am just using it. That drive space is absolutely more efficient than the one in my nas sitting on the living room : deduped/compressed for sure.

And finally, I can cancel my subscription anytime if I am considering that I can go without that iphone backup for a period.

That’s agility baby!

Crash Test – What happen when you loose L1&L2 on an UCSM Cluster?

Nexus-L1L2L1 & L2, What’s it?

The L1 & L2 links are dedicated physical ports (GbE) on UCS Fabric Interconnect platform, responsible of carrying the heartbeat traffic for the UCSM cluster. To be clear, both links are crucial to the survival of the cluster!

For the record, the Fabric Interconnects (or FI), are based on a Nexus hardware platform, tweaked for the job :

  • FI Gen 1 (6100XP) are based on Nexus 5000 physical platforms,
  • FI Gen 2 (6200UP) are based on Nexus 5500 physical platforms.

If you are wondering “What are theses L1 & L2 things for, on my brand new and shiny Nexus?”, here is the answer : nothing (on a Nexus). They are here from day one on Nexus, because it was planned from the start to decline the same hardware base and reuse it for Fabric Interconnects.

It’s just about rationalization of the production line : it’s cheaper to let the 4 GbE ports on all cases than handling several products.

Yes, the company that produced the Nexus line of product (Nuova Systems, acquired by Cisco on 2008) had UCS on mind from the beginning. If you look closer at the résumé of the co-founders of Nuova, all pieces comes together. They are the three musketeers as I tend to call them (even if “band” is mainly from Italy) : Mario Mazzola, Prem Jaim & Luca Cafiero. It’s not their first shot at creating a startup. But I will keep this story for another day – for another blog post, why not.

Talking back about L1 & L2 ports, if we keep on the analogy to the Nexus platform, we can say that L1 & L2 could play the same role of VPC Peer-Links on a VPC,  minus some details. Explained that way, I am sure it is more clear for everybody 🙂

Note : L1 & L2 ports connection are done this way :

  • FI-A L1 <-> FI-B L1,
  • FI-A L2 <-> FI-B L2.

Key point, no switch between L1 & L2!!! They are channel bonded, and expect another Fabric Interconnect at the other edge. Don’t try to workaround, and connect both Fabric Interconnects through a switch : this is explicitly not supported.

The heartbeat traffic

UCSM is the management software of the UCS platform. It’s embedded on each Fabric Interconnect and run in an Active/Stand-by way. The motivation and the revelence behind this choice, rather than opting for an installed of VM hosted application could feed an entire tribe of Trolls.

– We do love Trolls around here, but they will be fed another time on another blog post (again!) –

Like any clustered application, signaling link is required to keep up a good knowledge of each member’s health : it’s usually the role of a redundant heartbeat link, in other words a messaging bus.

So we are dealing here with a two member cluster, and it is not a detail.

Loosing a member and Split-Brain

The cluster use the heartbeat link to monitor the health status of each member, and failover the services on the healthy member when disaster occur. A member is deemed healthy, if a quorum can be reached among cluster members. When the cluster consist of only two members, it’s the word of one against the other … So we need a referee (called “Tie-Breaker”, “Failover Monitor” or “Witness” depending on the technology), in order to avoid split-brain. On a UCSM cluster, it’s the default gateway that play this referee job when one member can’t join the other.

Note : UCSM cluster do some other testing between FI and chassis. The FI check if the chassis’s SEEPROM is reachable. The following article on UCSGuru dive a bit more about the tests and the particular case of C-Series servers, which don’t have SEEPROM : HA with UCSM Integrated Rack Mounts.

What’s happening when L1&L2 link is down on a UCSM Cluster.

Ok, that was a pretty long introduction, to finally come the first question. What’s the observed behaviour from an operator/administrator point of view?

When one of the links become down, a “major” alert is raised on UCSM for each FI : “HA Cluster Interconnect Link Failure”.

  • Error “immediately” visible,
  • No impact on data path.

When both links are down (L1 & L2), after a timeout period (about minutes) :

  • A new error is raised, this one is “Critical” : “HA Cluster Interconnect Total link failure”,
    • Subordinate FI is deemed unreachable,
    • The B side is shut (assuming that B was the subordinate), DATA PATH included :
      • FEX,
      • LAN & SAN uplinks.

So keep an eye on your L1 & L2 links, and be sure that at least one of them is always up.

Unfortunately I don’t know the exact duration of the timeout. At least, I can say we are talking about minutes.

To keep comparing with Nexus and VPC, we can see a similar behaviour when VPC Peer-Link is down : the secondary is sacrificed on the split-brain altar.

Back to a nominal situation

As soon as at least one link is back alive :

  • Resync of subordinate FI on the primary,
  • Data links reactivation,
  • UCSM cluster back alive.

Some best practices about L1&L2

  • L1 & L2 links should be direct-connected, no switch between them,
  • During a migration or a physical move, it may happen to have only L1 active for a period of time, but keep it as short as possible and bring him back his L2 buddy as soon as possible,
  • It is about Ethernet : keep in mind distance limitations, don’t stretch more than 100 meters!

Updating an UCS system – from FI to OS drivers

Update October 27th 2015
At the time writing this article, I mentioned my experience on upgrading from version 2.2(3a), and the unexpected reboots of “some” blades. It turns this bug have been identified and is fixed since 2.2(3g). I forgot to update this article as promised : thanks to Patrick for asking after in the comments. 🙂

First to narrow the scope, the problem affected only UCS B200 M4. It was not obvious for me, as the deploye was a greenfield with only B200 M4 blades. It’s logged under bug number CSCut61527.

What is it about? The B200 M4’s BMC (Baseboard Management Card, a part of IPMI/CIMC system) sometimes return an invalid FRU and make the blade reboot … Yeah you read it right : a management controller taking potentially down production workloads …

This caveat is around since 2.2(3a) and 2.2(1b), and was fixed first on release 2.2(3g). Here is the link to the proper section of Release Notes for UCSM 2.2. When you are there, just look for CSCut61527 at the 10th row in the table.


Lesson learned : always double-check your current UCSM version before adding B200 M4 blades if it’s not a greenfield deployment!

There is plenty of writing about “how to upgrade UCS” (from official Cisco documentation to independent blog posts) but I found none going from UCSM up to ESXi drivers (disclaimer : I looked after it less than 5min :-).

So here is my 2 cents on the matter.

What do I need to update my UCS system?

The detailed list of objects you need to upgrade are the following, from top-to-bottom :

  1. UCSM itself, which is a cluster management software running in Active/Passive mode on Fabric Interconnects,
  2. The Fabric Interconnects,
  3. The IO Modules, aka FEXs,
  4. Servers (either Blade or Rack format), whichcan be separated in three major section :
    1. BIOS,
    2. Controllers (SAS, CIMC),
    3. Adapters cards,
  5. Drivers, specific to your Operating System.

This document is old and some information may be outdated, but still describe quite well the “What” : Cisco UCS Firmware Versioning.

Where should I look for the software pieces?

It is rare enough for Cisco products to be mentioned : you don’t need to have a system linked to your CCOID to be able to download UCS related software 🙂

Fortunately, all pieces of software listed on the previous section are grouped by bundles and you don’t have (anymore) to download each packages separately :

  • Infrastructure Bundle : it contains UCSM, FI and FEX softwares/firmwares,
  • B-Series or C-Series Bundle : it contains BIOS, Controllers and Adapter cards firmwares,
  • An ISO with all C-Series or B-Series drivers.

Note : Instead of downloading 2GB of drivers, if you are looking for drivers on a particular Operating System, it may be better to look for Cisco UCS drivers on the OS editor’s site. For example if you look for the lastest Cisco UCS enic and fnic drivers for VMware, you can find them on It’s a 2MB download versus 2GB …

Updating the UCS system

In this section, I will not go for a screen-by-screen explanation but will rather explain the key steps and possible warnings you need to be aware of before starting the upgrade.

First, the documentation you should definitely check :

At the time of writing this article, with the current version being 2.2(3e), the recommend upgrade path is Top-to-Bottom, it’s generally the way to go. Yet on some earlier versions (1.4 if I am correct), required Bottom-to-Top.

It’s really unlikely that would change back again, but you should definitely check the documentation and the last release note update to know what’s the current and supported method. Here is Upgrading Cisco UCS from Release 2.1 to Release 2.2 document.

This doodle illustrate the updated parts and the actual order to follow.

Update UCS

Step 0 is about preparation. You need to upload the firmware packages to the Fabric Interconnect boot flash (the packages are copied to both fabric interconnects).

  1. Upgrade the UCSM Software. It’s supposed to be non-disruptive for data path and you should only relaunch the UCSM client. My recent experience when upgrading from 2.2(3a) to 2.2(3d) was catastrophic : some blades rebooted randomly 4-5 times … Not so “non-disruptive”. I managed to reproduce the same behavior on another system and a SR is currently open. I may update this post later depending on the SR’s issue.
  2. Stage the Firmware (~10-20min) on all FEXs (“Update Firmware” on Equipment>Firmware Management>Installed Firmware”) and set it to be active on next reboot (“Activate Firmware” without forgetting the related “active on next reboot” checkbox). This will save you a reboot, as the FEX will reboot anyway when the Fabric Interconnect will be upgraded,
  3. Upgrade the Fabric Interconnect which is holding the secondary role, wait for reboot (~15min) then change the cluster lead to get primary on the newly updated FI,
  4. Upgrade the remaining Fabric Interconnect and wait for reboot (~15min), then take back the cluster lead to the initial state (there is no automatic fail-back for UCSM),
  5. Update the blades : best way is through Maintenance and Firmware Policies,
    1. Be sure that your service profile is set to “User Ack” for maintenance Policy,
    2. For ESXi node, take it in maintenance mode first from your vSphere Client,
    3. Ack the reboot request on UCSM as your ESX nodes are in Maintenance mode.

Note : you can edit the default “Host Firmware Package” policy to use the right package version (for blade and rack), even without any service profile created. This way, any UCS server connected to the fabric will be automatically updated to the desired baseline. This will effectively prevent running different firmware due to different shipping/buying batches.

Most upgrade guides stop here, right after updating the hardware. Let me say that it’s golden path to #fail 🙂. The next part is about updating your ESXi driver to the most current driver version, supported by your UCS firmware release.

 Updating VMware ESXi drivers

At the end of the day, what matter is how your Operating System handle your hardware. That is the driver’s job. If it’s obsolete, either it works non-optimized and without “new features/enhancements” (that’s the best option) or it may lead to some unpredictable behaviors …

Bets are high you installed your ESXi on a UCS server using a Custom ISO, available at Bets are higher that as the VIC card’s exposed vETH and vHBA are recognized, nobody has bothered to update them. If so, you run with a 2-3 years old driver …

You can check your current enic (vETH) and fnic (vHBA) driver version on your ESXi host with the following commands :

#vmkload_mod -s enic
#vmkload_mod -s fnic

If you find Enic version 2.12.42 and Fnic version, you run the ISO’s version and I would highly recommend to upgrade.

Download your drivers at following this navigation path : > download > vsphere > Driver & Tools.

  1. Select the relevant vSphere version (5.X, do not choice “update 01, 02” links),
  2. Download Drivers for Cisco enic and fnic.


It’s 1MB per download on, compared to the UCS Drivers ISO on which contains all drivers for all systems, but worth 2GB …

To apply the update, you have choice between esxcli on the esx shell, or via Update Manager.

No rocket science here, just follow this standard VMware KB and pick an option you are comfortable with : or KB1032936 for vSphere 4.x.

Reminder : you do NOT need a Windows based vCenter when using Update Manager. You just have to plan a Windows system to install VMware Update Manager utility, then you can enjoy using vCenter Appliance.

In addition, this Troubleshooting Technote go into all the details regarding how to check and update UCS Drivers for ESXi, Windows Server and Linux (Red Hat & Suse).


VMware don’t play nice with CoD. For now. Me neither …

No, I am not going to talk about Call of Duty. At least not today, not on this blog post, even maybe not during this life … 🙂

So what’s CoD and what the hell this have to do with VMware? CoD stands for Cluster-on-Die, a new NUMA setting found on some shiny Intel Haswell processors, aka E5-v3.

It’s active by default.

Side note on this Feature
With Haswell, Intel have gone wild and each processor can hold up to 18 cores! That’s a lot, but nothing new here. The bottom line is that with so many cores on a single socket, it may lead to more latency toward memory access with some workloads.
So there is a bunch of new features, to get you confused have choice and find the best suiting option for your context.

Here is a link to a Cisco white paper, talking about the UCS B200 M4 and BIOS tuning for performance. You could find there plenty of details on each new BIOS settings. The following is an abstract for the “Cluster on Die Snoop” functionality

Cluster on Die Snoop
Cluster on Die (CoD) snoop is available on Intel Xeon processor E5-2600 v3 CPUs that have 10 or more cores. Note that some software packages do not support this setting: for example, at the time of writing, VMware vSphere does not support this setting. CoD snoop is the best setting to use when NUMA is enabled and the system is running a well-behaved NUMA application. A well-behaved NUMA application is one that generally accesses only memory attached to the local CPU. CoD snoop provides the best overall latency and bandwidth performance for memory access to the local CPU. For access to remote CPUs, however, this setting results in higher latency and lower bandwidth. This snoop mode is not advised when NUMA is disabled.

Problem : VMware doesn’t support this new option. It’s outlined on the KB2087032, for vSphere 5.1 in the front line, but you can read that this problem persist for vSphere 5.5.
I ran on this problem with a brand new UCS M4, the result (that I am aware of) is pretty fun : vSphere host see 4 sockets instead of 2 sockets … Licensing guys @VMware will be happy 🙂

Workaround : This is a well-known issue today for vSphere, and no doubt it will be fixed soon by VMware. In the mean time, the recommended action is to “disable” this setting. Actually, you cannot “disable” it, you just have to choose another CPU snoop mode. The best balanced mode seems to be “Home Snoop” mode.

Home Snoop
Home Snoop (HS) is also available on all Intel Xeon processor E5-2600 v3 CPUs and is excellent for NUMA applications that need to reach a remote CPU on a regular basis. Of the snoop modes, HS provides the best remote CPU bandwidth and latency, but with the penalty of slightly higher local latency, and is the best choice for memory and bandwidth-intensive applications: such as, certain decision support system (DSS) database workloads.

The Third available mode for CPU Snooping defined by Intel on E5-2600 v3 is “Early Snoop”, which is best suited for low latency environments.

So to configure that parameter on a UCS system, the best option is to define a custom BIOS policy through UCSM, tweaking the QPI snoop mode and choose “Home-Snoop”.

Changing the BIOS policy for this value take effect immediately, without needing to reboot. vSphere see that change immediately and report the correct socket number.

Just remember to be at least in firmware version 2.2(3c) to get that feature available, but my advice would be to run at least UCSM 2.2(3d), that’s the current recommended firmware version for B200 M4 as writing.

UPDATE March 25th : “Home Snoop” is the default setting for B200 M4 BIOS, when your system is shipping with UCSM > 2.2.3(c).

Integrating with wordpress … as much as I can, with a free account…

I am using as a content curation platform, mainly when I don’t have the time or think that the news is not enough to publish a full blog post.

I don’t want to blend my “curated content” with my “written content” in an indistinct way, so the obvious choice was to integrate the entries on a separate WordPress page. To do that on a tightly integrated way, you need to get a paid account (worth several hundred bucks), or if you don’t mind tinkering a bit you can :

  • use the RSS feed, my choice,
  • use the API, but this one is out of my reach. I am busy enough to not scatter more than I already do:-)

So to “integrate” your entries within a WordPress page, you need :

  • your RSS feed address (you can get it on the apps section, choosing  the “ Topic Widget”,
  • a WordPress plugin able to warp a Feed in PHP or shortcode.

I use RSSImport, and the Shortcode parameters below give an output like what you can see here.

  • html=true
  • before_date=”<p><small>Scooped on “
  • date=true
  • before_creator=” by “
  • creator=true
  • after_creator=”</small> “
  • display=10
  • feedurl=””
  • displaydescriptions=”true”
  • use_simplepie=”true”
  • truncatedescchar=350
  • truncatedescstring=” …”
  • after_desc=” <a href=’%href%’ target=’_blank’>show insight</a> <p>”]

The plugin’s page is full of description and samples, about how to use it.

It’s not perfect, nor the first way I imagined it, but it’s there … Ideally, I would like to extract my insight from the feed entry and print it right below each bullet.

Any sugestion or help from a more talented coder tinkerer than me (no so hard …) is welcome!

Links collection #2

Here is the Links Collection #2

This one is pretty short, and focused on VMFS & VMDK.
The thinking on the first link about all possible alternatives and the trade-offs is really interesting from a design point-of-view.

Next, some useful links about vCloud Director & vCloud Automation Center.


vCloud Director

SSH keys & OSX

Put your private & public key on folder ~/.ssh
All private keys must have 600 rights (-rw——-), or they will be ignored.

  1. List your currently load keys:
    ssh-add -l
  2. Load your keys on ssh-agent and store them on OSX Keychain for future use
    ssh-add -K /path/of/private/key

    Eventually type the SSH key’s secret if prompted.

All your SSH keys should have been added to your “session” keychain for the application SSH.
From now on, when you need to connect with SSH, you can load all of your private keys at once with the following command

    ssh-add -A

To go further

Get speedy with a config file

You can setup a config file for your frequently accessed servers, and preconfigure all the connection details:

  • user,
  • ssh port,
  • etc …

Reuse existing putty keys (*.ppk)

Make a good use of puttygen … (To be described one day, maybe …)


I used the following informations found on the web and obviously the manual to get the whole thing working.
Thanks you to each of the authors for their valuable informations.

Adding a Private Key to Your Mac OSX Keychain
Simplify Your Life With an SSH Config File
Using an SSH Config File

Using markdown to write plain text … such a briliant idea!


I am currently exploring some new tools to optimize my workflow, and this lead me among other things, to markdown. I am really not on the bleeding edge, this language is out there since 2004. You can find plenty of articles explaining why markdown is awesome, and how it has revolutionized the workflow of everyone using it.

Shortly, Markdown is a plain text formatting syntax that help you to:

  • write in plain text with your favorite text editor,
  • keep focus on writing, and being less tempted to procrastinating,
  • It’s really easy, and simpler than HTML ou WIKI syntax.

You are not bound on any file format (docx, odt, etc), it’s just plain text. It will hardly break or become corrupted … if you stick with plain a text editor (see below on this part).

Then, when the file is processed by a “markdown aware” viewer, the magic works a you get a nicely formatted text.

My first enhanced Markdown Editor : The Journalist, Crash & Restore …

So I started taking notes with textwrangler, and soon I felt the need for :

  • A preview of the text rendered, as I type,
  • an easy way to manage all theses files.

As I was just starting to explore Markdown, I looked for a free app to start with. A quick search on the Mac App Store led me to the application “The Journalist”.

The application looks pretty and my two former requirements seemed to be fulfilled. But after a day of notes, The Journalist crashed badly and my content was gone! It seems like something got finally corrupted…

Useless to explain how I was scared … I started digging to find where the application actually stored his data, without success… An email to the application developer, and a couple of hours later I got a kind answer! The folder to look for was the following ( and I would never guess it alone …) :


Rescue the data!

Basically, The Journalist store data in a sqlite database. I figured it trying to open files with a basic text editor. So all I need, is to open this database file and query it!

Here are the steps to follow in order to recover your “precious” content:

  1. copy the sqlite file:

    ~/Library/Containers/com.mimietpaul.journalistmac/Data/Library/Application Support/TheJournalist
  2. rename to .sqlite extension,
  3. Open the database using a sqlite editor (1)
  4. query the table “ZJNOTE” to list all the notes

  5. query on “ZBODY” field obtain to actual content : your notes!
  6. copy/paste in your favorite text editor,
  7. you are free!

(1) The Firefox extension SQLite Manager is a perfect fit for this simple need.


This misadventure has allowed me to learn a little more about the specifications for my note-taking tool:

  • The potential markdown application must generate raw text files!
  • If the application is enhancing the writing experience (adding metadata, pictures, etc …) : metadata must be kept separately from files.

Be sure that I will check twice before storing my data on an application …



Here is some useful references and stories about Markdown:

Apps and Tools

Some useful tools for Markdown on OSX

  • Textwrangler, the free edition of the great BBEdit. It recognize markdown syntax (*.md extension),
  • QLMarkdown is a OSX plugin for Quicklook. It enable the rendering of markdown files (*.md extension) right in the finder and A how-to guide to assist you installing it.

I am currently evaluating Ulysse III as my main editor and text file repository. Later on this as I continue digging about it.

CLI memo #1

Here is a quick memo of some CLI commands I use. Just a quick reminder for the few commands I may need on my daily operations.

Today’s task is just creating a vlan on a Brocade network switchs, running NOS (Network OS).

conf t
interface vlan <vlan id>
description <your vlan description>


Update : 2015-06
Yes, you silly Cisco-Admin, you read it right : @Brocade NOS, with this command you don’t create an SVI, but just a vlan 🙂

A quick extract from the Admin Guide:

On Brocade VDX hardware, VLANs are treated as interfaces from a configuration point of view. By default all the DCB ports are assigned to VLAN 1 (VLAN ID equals 1).

The vlan_ID value can be 1 through 3963. VLAN IDs 3964 through 4090 are internally-reserved VLAN IDs.
However, the reserved-vlan command can modify this range. VLANs above 4090 are not configurable. Refer to the Network OS Command Reference.

Here are some links to deep dive in Brocade Network OS, as usual you have to RTFM to become a master:

There is some other basic command I may cover later like VCS, port-channels, etc …

Links collection #1

Here is a collection of some interesting articles & papers I stumbled upon last week.
This list is mainly for my own record and allow me to not keep a web browser with more than 20 tabs opened over one month. 🙂

Sure “cloud bookmarks” solutions are great. There is plenty of them out there, and I use them.
But the drawbacks are the following :
– it’s quicker for me to write down that link rather than struggling with folder and tags,
– I would need my credentials or an agent to access my bookmarks,
– it could be lengthy to find back that link 2 years later,
– that link is maybe only needed on a temporary basis or particular context, and do not deserve a bookmark.

Finally, I think it’s easier to share with others over a blog (no need to affiliate on a profile, etc …).
So, after this long introduction, here is “Link Collection #1”.


  1. RecoverPoint Comes Clean with VPLEX (clearpathsg)
  2. Interesting use cases for VPLEX (vijay swami)
  3. A Deeper Look at VPLEX (Scott Lowe)

vMSC (vSphere Metro Streched Cluster)

  1. vSphere Metro Stretched Cluster with vSphere 5.5 and PDL AutoRemove (longwhiteclouds)


  1. Support for virtual machine disks larger than 2 TB in vSphere 5.5 (2058287) (vmware)
  2. vsphere 5.5 Jumbo VMDK Deep dive (longwhiteclouds)

vSphere, vCenter & vCloud Director 5.5

  1. VMware vCenter Server Appliance (VCSA) 5.5 deployment tips and tricks (ivobeerens)
  2. Top 10 things you must read about vSphere 5.5 (vsphere land)
  3. Comparison of vCloud Director Maximums 1.5 / 5.1 / 5.5 (virtualizationexpress)

  4. Comparison of vSphere Maximums 5.1 / 5.5 (vsphere land)

  5. vCenter, vSphere & vCloud Director 5.5 configuration maximums (vmware)
  6. vCloud Director 5.1 Configuration Maximums (2036392) (vmware)
  7. vSphere 5.1 configuration maximums (vmware)

Open Source Clouds

  1. Beyond Chef and Puppet: Ten essential DevOps tools (TechTarget)