Book Image

Intelligent Automation with VMware

By : Ajit Pratap Kundan
Book Image

Intelligent Automation with VMware

By: Ajit Pratap Kundan

Overview of this book

This book presents an introductory perspective on how machine learning plays an important role in a VMware environment. It offers a basic understanding of how to leverage machine learning primitives, along with a deeper look into integration with the VMware tools used for automation today. This book begins by highlighting how VMware addresses business issues related to its workforce, customers, and partners with emerging technologies such as machine learning to create new, intelligence-driven, end user experiences. You will learn how to apply machine learning techniques incorporated in VMware solutions for data center operations. You will go through management toolsets with a focus on machine learning techniques. At the end of the book, you will learn how the new vSphere Scale-Out edition can be used to ensure that HPC, big data performance, and other requirements can be met (either through development or by fine-tuning guidelines) with mainstream products.
Table of Contents (20 chapters)
Title Page
About Packt
Contributors
Preface
Index

VMware vReaIize Network Insight


VMware vRealize Network Insight provides customers intelligent operations for software-defined networking and security. It helps customers to build an efficient, always-on, and secure network infrastructure across different cloud infrastructures. We can plan, design, and deploy micro-segmentation to have visibility across virtual and physical networks. It is very useful in managing VMware NSX deployments and is available as a service offering as VMware Network Insight. vRNI polls third-party devices periodically (between 5 and 10 minutes on average) on a read-only basis. The protocols used include Secure Shell (SSH), Simple Network Management Protocol (SNMP), and Representational State Transfer (REST).

vRNI administrators must configure the vRNI data source interfaces with the read-only credentials that have been predefined on these devices. Additionally, vRNI must be able to access these devices where there are no firewalls and other types of security restrictions...