Aug 06

TAM Lab 067 – vSphere 7 w/Kubernetes Walk-Through

In this session, Kelly Dare (@vKDare) and Scottie Ray (@H20nly) explore some of the foundational components of vSphere 7 w/K8s. They walk through some generic Cluster API concepts and show how they are implemented in VMware’s newest offering. They explore namespace creation, the idea of native pods, Tanzu Kubernetes Cluster service, as well as some tie-ins to other portions of the VMware portfolio.

NOTE: This video is roughly 60 minutes in length so it would be worth blocking out some time to watch it!

Rating: 5/5


Jul 23

TAM Lab 066 – vSphere 7 with ADFS Authentication

With the release of vSphere 7, customers can now move beyond authentication mechanisms like SSO domain users, LDAP(S), and joining vCenter to their Active Directory domains. Identity Federation allows for us to leverage enterprise identity providers, like Microsoft Active Directory Federation Services (ADFS), to grant access to vSphere! Join Bill Hill (@virtual_bill), for this TAM Lab session where we walk through what this looks like and how our customers can leverage this in their environment.

Rating: 5/5


Jun 03

Run Kubernetes for FREE- The open source way

On this session, Kenny Coleman will show how you can combine all the open-source components needed to run Kubernetes on vSphere. From CSI, CCM, Cluster API, Kubeadm, and more. Then we dive into the Tanzu portfolio and look at Tanzu Kubernetes Grid, vSphere with Kubernetes, and Tanzu Mission Control.

Rating: 5/5


Mar 11

Identity Federation in vSphere 7

Bob Plankers (@plankers) explains the Identity Federation in vSphere 7, a method for attaching vCenter Server to enterprise identity providers. He discuss what this changes, why this is great, and how this impacts security and operations.

Rating: 5/5


Mar 11

Overview of vSphere 7

Bob Plankers (@plankers) explains vSphere 7 improved features.

Rating: 5/5


Mar 11

vSphere Trust Authority in vSphere 7

Bob Plankers (@plankers) explains vSphere Trust Authority in vSphere 7 as a step forward for being able to enforce trustworthiness in hardware and software. He talk about why it’s helpful and some architectural considerations around implementing it.

Rating: 5/5