{"id":2828,"date":"2013-09-06T13:43:36","date_gmt":"2013-09-06T19:43:36","guid":{"rendered":"http:\/\/www.jasemccarty.com\/blog\/?p=2828"},"modified":"2014-06-25T18:37:04","modified_gmt":"2014-06-26T00:37:04","slug":"vmware-vcsa-5-5-ready-for-prime-time-the-war-fighter","status":"publish","type":"post","link":"https:\/\/www.jasemccarty.com\/blog\/vmware-vcsa-5-5-ready-for-prime-time-the-war-fighter\/","title":{"rendered":"VMware vCSA 5.5 &#8211; Ready for Prime-time &#038; the War Fighter"},"content":{"rendered":"<p>At VMworld US in San Francisco last week, VMware had quite a few different announcements around the 5.5 release of vSphere.<\/p>\n<p>Announcements around the vCenter Server Appliance really hit home for me in the Federal space.<\/p>\n<p><strong>Ready for Prime-time<br \/>\n<\/strong>In vSphere 5.5, the vCenter Server Appliance limitations have been extremely raised when using the vCenter Server Appliance:<\/p>\n<p><em>Previous to vSphere 5.5, the limits were:<\/em><\/p>\n<ul>\n<li>5 vSphere Hosts<\/li>\n<li>50 Virtual Machines<\/li>\n<\/ul>\n<p>With vSphere 5.5, the limits are now:<\/p>\n<ul>\n<li>100 vSphere Hosts &amp; 3,000 Virtual Machines using the embedded database<\/li>\n<li>Up to 1,000 vSphere Hosts &amp; 10.000 Virtual Machines using an\u00a0<span style=\"text-decoration: underline;\">external<\/span> Oracle database<br \/>\nSource:\u00a0<strong><a href=\"https:\/\/www.vmware.com\/pdf\/vsphere5\/r55\/vsphere-55-configuration-maximums.pdf?src=vmw_so_vex_jmcca_429\">https:\/\/www.vmware.com\/pdf\/vsphere5\/r55\/vsphere-55-configuration-maximums.pdf<\/a>\u00a0(<\/strong>page 7)<\/li>\n<\/ul>\n<p>In short the vCenter Server Appliance now has the horsepower to run in many, if not most vSphere Environments &#8211; even in the Fed space.<\/p>\n<p><!--more--><strong>More Secure<\/strong><br \/>\nMy good friend Mike Foley at VMware, posted a couple articles about the vCenter Server Appliance in version 5.5. \u00a0In Part 1, he denotes some of the hardening that has been added to the vCenter Server Appliance, as well as other virtual appliances. \u00a0Check that post out here:<br \/>\n<strong><a title=\"Virtual Appliances getting more secure with vSphere 5.5 \u2013 Part 1\" href=\"http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-1.html?src=vmw_so_vex_jmcca_429\" target=\"_blank\">http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-1.html<\/a><\/strong><\/p>\n<p><strong>STIGs<\/strong><br \/>\nNow, more specifically targeting the &#8220;War Fighter.&#8221; It is no secret that DISA (the Defense Information Systems Agency) provides a significant amount of guidance around the process of securing different Information Technology assets. These include, but are not limited to Operating Systems, Applications, etc. \u00a0One of the terms often used is STIGs. \u00a0This is an acronym for Security Technical Implementation Guides. \u00a0These can be found here:\u00a0<strong><a title=\"STIGs Home\" href=\"http:\/\/iase.disa.mil\/stigs\/\" target=\"_blank\">http:\/\/iase.disa.mil\/stigs\/<\/a><\/strong><\/p>\n<p><strong>How-To&#8217;s<\/strong><br \/>\nMike has additional posts detail making the vCenter Server Appliance\u00a0<em>more\u00a0<\/em> STIG compliant. \u00a0In Part 1, Mike details how many of the appliances released with vSphere 5.5 have a more secure footprint. In his subsequent posts, he goes into more detail on the process of making the vCenter Server Appliance for vSphere 5.5 STIG Compliant. The additional posts can be found here:<br \/>\n<strong><a title=\"Virtual Appliances getting more secure with vSphere 5.5 \u2013 Part 2\" href=\"http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-2.html?src=vmw_so_vex_jmcca_429\" target=\"_blank\">http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-2.html<br \/>\n<\/a><strong><a title=\"Virtual Appliances getting more secure with vSphere 5.5 \u2013 Part 3\" href=\"http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-3.html?src=vmw_so_vex_jmcca_429\" target=\"_blank\">http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-3.html<\/a><\/strong><br \/>\n<strong><a title=\"Virtual Appliances getting more secure with vSphere 5.5 \u2013 Part 4\" href=\"http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-4.html?src=vmw_so_vex_jmcca_429\" target=\"_blank\">http:\/\/blogs.vmware.com\/vsphere\/2013\/09\/virtual-appliances-getting-more-secure-with-vsphere-5-5-part-4.html<\/a><\/strong><br \/>\n<\/strong><\/p>\n<p>Now the vCenter Server Appliance for vSphere 5.5 has the capability to support more hosts and more virtual machines, in conjunction with the fact that it can be STIG compliant&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At VMworld US in San Francisco last week, VMware had quite a few different announcements around the 5.5 release of vSphere. Announcements around the vCenter &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,9,12],"tags":[],"class_list":["post-2828","post","type-post","status-publish","format-standard","hentry","category-military","category-security","category-virtualization"],"_links":{"self":[{"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/posts\/2828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/comments?post=2828"}],"version-history":[{"count":18,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/posts\/2828\/revisions"}],"predecessor-version":[{"id":3118,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/posts\/2828\/revisions\/3118"}],"wp:attachment":[{"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/media?parent=2828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/categories?post=2828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jasemccarty.com\/blog\/wp-json\/wp\/v2\/tags?post=2828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}