Deploying WebLM in Virtualized Environment R81x Issue2 Dec2019
Deploying WebLM in Virtualized Environment R81x Issue2 Dec2019
Deploying WebLM in Virtualized Environment R81x Issue2 Dec2019
Virtualized Environment
Release 8.1.x
Issue 2
July 2018
© 2018, Avaya Inc. YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU
All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR
AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED
Notice SERVICE.
While reasonable efforts have been made to ensure that the Licenses
information in this document is complete and accurate at the time of
printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO,
document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya
of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY
AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS,
Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED
“Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA
which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL
performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER.
of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING,
Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE
deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA
such modifications, additions, or deletions were performed by or on AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA
the express behalf of Avaya. End User agrees to indemnify and hold RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU
harmless Avaya, Avaya's agents, servants and employees against all AND ANYONE ELSE USING OR SELLING THE SOFTWARE
claims, lawsuits, demands and judgments arising out of, or in WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR
connection with, subsequent modifications, additions or deletions to USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO,
this documentation, to the extent made by End User. YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM
YOU ARE INSTALLING, DOWNLOADING OR USING THE
Link disclaimer SOFTWARE (HEREINAFTER REFERRED TO
Avaya is not responsible for the contents or reliability of any linked INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
websites referenced within this site or Documentation provided by THESE TERMS AND CONDITIONS AND CREATE A BINDING
Avaya. Avaya is not responsible for the accuracy of any information, CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
statement or content provided on these sites and does not APPLICABLE AVAYA AFFILIATE (“AVAYA”).
necessarily endorse the products, services, or information described Avaya grants You a license within the scope of the license types
or offered within them. Avaya does not guarantee that these links will described below, with the exception of Heritage Nortel Software, for
work all the time and has no control over the availability of the linked which the scope of the license is detailed below. Where the order
pages. documentation does not expressly identify a license type, the
Warranty applicable license will be a Designated System License as set forth
below in the Designated System(s) License (DS) section as
Avaya provides a limited warranty on Avaya hardware and software. applicable. The applicable number of licenses and units of capacity
Refer to your sales agreement to establish the terms of the limited for which the license is granted will be one (1), unless a different
warranty. In addition, Avaya’s standard warranty language, as well as number of licenses or units of capacity is specified in the
information regarding support for this product while under warranty is documentation or other materials available to You. “Software” means
available to Avaya customers and other parties through the Avaya computer programs in object code, provided by Avaya or an Avaya
Support website: https://support.avaya.com/helpcenter/ Channel Partner, whether as stand-alone products, pre-installed on
getGenericDetails?detailId=C20091120112456651010 under the link hardware products, and any upgrades, updates, patches, bug fixes,
“Warranty & Product Lifecycle” or such successor site as designated or modified versions thereto. “Designated Processor” means a single
by Avaya. Please note that if You acquired the product(s) from an stand-alone computing device. “Server” means a set of Designated
authorized Avaya Channel Partner outside of the United States and Processors that hosts (physically or virtually) a software application
Canada, the warranty is provided to You by said Avaya Channel to be accessed by multiple users. “Instance” means a single copy of
Partner and not by Avaya. the Software executing at a particular time: (i) on one physical
“Hosted Service” means an Avaya hosted service subscription that machine; or (ii) on one deployed software virtual machine (“VM”) or
You acquire from either Avaya or an authorized Avaya Channel similar deployment.
Partner (as applicable) and which is described further in Hosted SAS License types
or other service description documentation regarding the applicable
hosted service. If You purchase a Hosted Service subscription, the Designated System(s) License (DS). End User may install and use
foregoing limited warranty may not apply but You may be entitled to each copy or an Instance of the Software only: 1) on a number of
support services in connection with the Hosted Service as described Designated Processors up to the number indicated in the order; or 2)
further in your service description documents for the applicable up to the number of Instances of the Software as indicated in the
Hosted Service. Contact Avaya or Avaya Channel Partner (as order, Documentation, or as authorized by Avaya in writing. Avaya
applicable) for more information. may require the Designated Processor(s) to be identified in the order
by type, serial number, feature key, Instance, location or other
Hosted Service specific designation, or to be provided by End User to Avaya through
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN AVAYA electronic means established by Avaya specifically for this purpose.
HOSTED SERVICE SUBSCRIPTION FROM AVAYA OR AN AVAYA Heritage Nortel Software
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE
FOR HOSTED SERVICES ARE AVAILABLE ON THE AVAYA “Heritage Nortel Software” means the software that was acquired by
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO UNDER Avaya as part of its purchase of the Nortel Enterprise Solutions
THE LINK “Avaya Terms of Use for Hosted Services” OR SUCH Business in December 2009. The Heritage Nortel Software is the
SUCCESSOR SITE AS DESIGNATED BY AVAYA, AND ARE software contained within the list of Heritage Nortel Products located
APPLICABLE TO ANYONE WHO ACCESSES OR USES THE at https://support.avaya.com/LicenseInfo under the link “Heritage
HOSTED SERVICE. BY ACCESSING OR USING THE HOSTED Nortel Products” or such successor site as designated by Avaya. For
SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON Heritage Nortel Software, Avaya grants Customer a license to use
BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE Heritage Nortel Software provided hereunder solely to the extent of
DOING SO (HEREINAFTER REFERRED TO INTERCHANGEABLY the authorized activation or authorized usage level, solely for the
AS “YOU” AND “END USER”), AGREE TO THE TERMS OF USE. IF purpose specified in the Documentation, and solely as embedded in,
YOU ARE ACCEPTING THE TERMS OF USE ON BEHALF A for execution on, or for communication with Avaya equipment.
COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT Charges for Heritage Nortel Software may be based on extent of
YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY TO THESE activation or use authorized as specified in an order or invoice.
TERMS OF USE. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF
Copyright PARTNER ACKNOWLEDGES AND AGREES THE AVAYA
CHANNEL PARTNER IS RESPONSIBLE FOR ANY AND ALL
Except where expressly stated otherwise, no use should be made of RELATED FEES AND/OR ROYALTIES. THE H.264 (AVC) CODEC
materials on this site, the Documentation, Software, Hosted Service, IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE
or hardware provided by Avaya. All content on this site, the FOR THE PERSONAL USE OF A CONSUMER OR OTHER USES
documentation, Hosted Service, and the product provided by Avaya IN WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I)
including the selection, arrangement and design of the content is ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD
owned either by Avaya or its licensors and is protected by copyright (“AVC VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS
and other intellectual property laws including the sui generis rights ENCODED BY A CONSUMER ENGAGED IN A PERSONAL
relating to the protection of databases. You may not modify, copy, ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER
reproduce, republish, upload, post, transmit or distribute in any way LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS GRANTED
any content, in whole or in part, including any code and software OR SHALL BE IMPLIED FOR ANY OTHER USE. ADDITIONAL
unless expressly authorized by Avaya. Unauthorized reproduction, INFORMATION FOR H.264 (AVC) AND H.265 (HEVC) CODECS
transmission, dissemination, storage, and or use without the express MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
written consent of Avaya can be a criminal, as well as a civil offense
WWW.MPEGLA.COM.
under the applicable law.
Compliance with Laws
Virtualization
You acknowledge and agree that it is Your responsibility for
The following applies if the product is deployed on a virtual machine.
complying with any applicable laws and regulations, including, but not
Each product has its own ordering code and license types. Unless
limited to laws and regulations related to call recording, data privacy,
otherwise stated, each Instance of a product must be separately
intellectual property, trade secret, fraud, and music performance
licensed and ordered. For example, if the end user customer or
rights, in the country or territory where the Avaya product is used.
Avaya Channel Partner would like to install two Instances of the
same type of products, then two products of that type must be Preventing Toll Fraud
ordered.
“Toll Fraud” is the unauthorized use of your telecommunications
Third Party Components system by an unauthorized party (for example, a person who is not a
corporate employee, agent, subcontractor, or is not working on your
“Third Party Components” mean certain software programs or
company's behalf). Be aware that there can be a risk of Toll Fraud
portions thereof included in the Software or Hosted Service may
associated with your system and that, if Toll Fraud occurs, it can
contain software (including open source software) distributed under
result in substantial additional charges for your telecommunications
third party agreements (“Third Party Components”), which contain
services.
terms regarding the rights to use certain portions of the Software
(“Third Party Terms”). As required, information regarding distributed Avaya Toll Fraud intervention
Linux OS source code (for those products that have distributed Linux
OS source code) and identifying the copyright holders of the Third If You suspect that You are being victimized by Toll Fraud and You
Party Components and the Third Party Terms that apply is available need technical assistance or support, call Technical Service Center
in the products, Documentation or on Avaya’s website at: https:// Toll Fraud Intervention Hotline at +1-800-643-2353 for the United
support.avaya.com/Copyright or such successor site as designated States and Canada. For additional support telephone numbers, see
by Avaya. The open source software license terms provided as Third the Avaya Support website: https://support.avaya.com or such
successor site as designated by Avaya.
Party Terms are consistent with the license rights granted in these
Software License Terms, and may contain additional rights benefiting Security Vulnerabilities
You, such as modification and distribution of the open source
software. The Third Party Terms shall take precedence over these Information about Avaya’s security support policies can be found in
Software License Terms, solely with respect to the applicable Third the Security Policies and Support section of https://
Party Components to the extent that these Software License Terms support.avaya.com/security.
impose greater restrictions on You than the applicable Third Party Suspected Avaya product security vulnerabilities are handled per the
Terms. Avaya Product Security Support Flow (https://
The following applies only if the H.264 (AVC) codec is distributed with support.avaya.com/css/P8/documents/100161515).
the product. THIS PRODUCT IS LICENSED UNDER THE AVC Downloading Documentation
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE For the most current versions of Documentation, see the Avaya
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH Support website: https://support.avaya.com, or such successor site
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC as designated by Avaya.
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A Contact Avaya Support
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS See the Avaya Support website: https://support.avaya.com for
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. product or Hosted Service notices and articles, or to report a problem
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, with your Avaya product or Hosted Service. For a list of support
L.L.C. SEE HTTP://WWW.MPEGLA.COM. telephone numbers and contact addresses, go to the Avaya Support
website: https://support.avaya.com (or such successor site as
Service Provider designated by Avaya), scroll to the bottom of the page, and select
THE FOLLOWING APPLIES TO AVAYA CHANNEL PARTNER’S Contact Avaya Support.
HOSTING OF AVAYA PRODUCTS OR SERVICES. THE PRODUCT Trademarks
OR HOSTED SERVICE MAY USE THIRD PARTY COMPONENTS
SUBJECT TO THIRD PARTY TERMS AND REQUIRE A SERVICE The trademarks, logos and service marks (“Marks”) displayed in this
PROVIDER TO BE INDEPENDENTLY LICENSED DIRECTLY FROM site, the Documentation, Hosted Service(s), and product(s) provided
THE THIRD PARTY SUPPLIER. AN AVAYA CHANNEL PARTNER’S by Avaya are the registered or unregistered Marks of Avaya, its
HOSTING OF AVAYA PRODUCTS MUST BE AUTHORIZED IN affiliates, its licensors, its suppliers, or other third parties. Users are
WRITING BY AVAYA AND IF THOSE HOSTED PRODUCTS USE not permitted to use such Marks without prior written consent from
OR EMBED CERTAIN THIRD PARTY SOFTWARE, INCLUDING Avaya or such third party which may own the Mark. Nothing
BUT NOT LIMITED TO MICROSOFT SOFTWARE OR CODECS, contained in this site, the Documentation, Hosted Service(s) and
THE AVAYA CHANNEL PARTNER IS REQUIRED TO product(s) should be construed as granting, by implication, estoppel,
INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE or otherwise, any license or right in and to the Marks without the
AGREEMENTS, AT THE AVAYA CHANNEL PARTNER’S EXPENSE, express written permission of Avaya or the applicable third party.
DIRECTLY FROM THE APPLICABLE THIRD PARTY SUPPLIER. Avaya is a registered trademark of Avaya Inc.
WITH RESPECT TO CODECS, IF THE AVAYA CHANNEL
PARTNER IS HOSTING ANY PRODUCTS THAT USE OR EMBED
THE H.264 CODEC OR H.265 CODEC, THE AVAYA CHANNEL
All non-Avaya trademarks are the property of their respective owners.
Linux® is the registered trademark of Linus Torvalds in the U.S. and
other countries.
Contents
Chapter 1: Introduction............................................................................................................ 9
Purpose.................................................................................................................................. 9
Prerequisites........................................................................................................................... 9
Change history...................................................................................................................... 10
Chapter 2: Virtualized Environment overview...................................................................... 11
®
Avaya Aura Virtualized Environment overview........................................................................ 11
Kernel-based Virtual Machine overview................................................................................... 11
Supported applications in Virtualized Environment................................................................... 12
Virtualized Environment components...................................................................................... 12
Chapter 3: Planning and configuration................................................................................. 13
Hardware support.................................................................................................................. 13
Supported hardware for VMware...................................................................................... 13
Supported hardware for KVM........................................................................................... 13
Configuration tools and utilities............................................................................................... 13
Supported tools for deploying the KVM OVA...................................................................... 14
Supported footprints for WebLM Server .................................................................................. 14
Software details of WebLM..................................................................................................... 14
Downloading software from PLDS.......................................................................................... 14
Site preparation checklist for KVM.......................................................................................... 15
Customer configuration data for WebLM.................................................................................. 16
Deployment guidelines........................................................................................................... 17
SAL Gateway........................................................................................................................ 17
Chapter 4: Deploying WebLM on VMware............................................................................ 18
®
Checklist for deploying WebLM on VMware ........................................................................... 18
Deploying the WebLM OVA by using vSphere Web Client......................................................... 19
Deploying the application OVA using vSphere Web Client by accessing the host directly............ 21
Deployment of cloned and copied OVAs.................................................................................. 22
Installing a WebLM patch, feature pack, or service pack........................................................... 23
Starting the WebLM server virtual machine.............................................................................. 23
Chapter 5: Deploying WebLM on Kernel-based Virtual Machine....................................... 25
Extracting KVM OVA.............................................................................................................. 25
Deploying KVM OVA by using Virt Manager............................................................................. 25
Deploying WebLM KVM OVA from CLI by using virsh............................................................... 26
Deploying application by using OpenStack.............................................................................. 27
Connecting to OpenStack Dashboard............................................................................... 27
Uploading the qcow2 image............................................................................................. 27
Flavors........................................................................................................................... 28
Creating a security group................................................................................................. 28
Adding rules to a security group........................................................................................ 29
Purpose
This document provides procedures for deploying the Avaya WebLM virtual application on
VMware customer-provided Virtualized Environment and Kernel-based Virtual Machine(KVM). The
document includes installation, configuration, installation verification, troubleshooting, and basic
maintenance checklists and procedures.
The primary audience for this document is anyone who is involved with installing, configuring, and
verifying WebLM at a customer site. The audience includes and is not limited to implementation
engineers, field technicians, business partners, solution providers, and customers.
This document does not include optional or customized aspects of a configuration.
Prerequisites
Before deploying the Avaya WebLM OVA, ensure that you have the following knowledge, skills
and tools.
Knowledge
• For KVM: KVM hypervisor installation and set up
• For VMware: VMware® vSphere™ virtualized environment
• Linux® Operating System
• WebLM
Skills
To administer:
• VMware® vSphere™ virtualized environment
• KVM hypervisor
Tools
For information about tools and utilities, see “Configuration tools and utilities”.
Change history
The following changes have been made to this document since the last issue:
Issue Date Summary of changes
2 October 2019 For Release 8.1.1, updated the following sections:
• Software details of WebLM on page 14
• Supported footprints for WebLM Server on page 14
• Verifying the WebLM software version on page 53
1 June 2019 Release 8.1 document.
You can deploy the Avaya Aura® applications in one of the following Virtualized Environment:
• VMware in customer-provided Virtualized Environment
• Kernel-based Virtual Machine Virtualized Environment
Hardware support
Note:
If you use the WebLM server to acquire licenses for more than 5000 clients, use Profile 2.
In addition to PLDS, you can download the product software from http://support.avaya.com using
the Downloads and Documents tab at the top of the page.
Note:
Only the latest service pack for each release is posted on the support site. Previous service
packs are available only through PLDS.
Procedure
1. Enter http://plds.avaya.com in your Web browser to access the Avaya PLDS website.
2. Enter your login ID and password.
3. On the PLDS home page, select Assets.
4. Click View Downloads.
5. Click on the search icon (magnifying glass) for Company Name.
6. In the %Name field, enter Avaya or the Partner company name.
7. Click Search Companies.
8. Locate the correct entry and click the Select link.
9. Enter the Download Pub ID.
10. Click Search Downloads.
11. Scroll down to the entry for the download file and click the Download link.
12. In the Download Manager box, click the appropriate download link.
Note:
The first link, Click to download your file now, uses the Download Manager to
download the file. The Download Manager provides features to manage the download
(stop, resume, auto checksum). The click here link uses your standard browser
download and does not provide the download integrity features.
13. If you use Internet Explorer and get an error message, click the install ActiveX message
at the top of the page and continue with the download.
14. Select a location where you want to save the file and click Save.
15. If you used the Download Manager, click Details to view the download progress.
Deployment guidelines
• Deploy maximum number of virtualized environment on the same host.
• Deploy the virtualized environment on the same cluster if the cluster goes beyond the host
boundary.
• Segment redundant elements on a different cluster, or ensure that the redundant elements
are not on the same host.
• Plan for rainy day scenarios or conditions. Do not configure resources only for traffic or
performance on an average day.
• Do not oversubscribe resources. Oversubscribing affects performance.
• Monitor the server, host, and virtualized environment performance.
SAL Gateway
You require a Secure Access Link (SAL) Gateway for remote access and alarming.
Through SAL, support personnel or tools can gain remote access to managed devices to
troubleshoot and debug problems.
A SAL Gateway:
1. Receives alarms from Avaya products in the customer network.
2. Reformats the alarms.
3. Forwards the alarms to the Avaya support center or a customer-managed Network
Management System.
For more information about SAL Gateway and its deployment, see the Secure Access Link
documentation on the Avaya Support website at http://support.avaya.com.
1. Download the WebLM OVA file from the Avaya Downloading software from
Product Licensing and Delivery System (PLDS) PLDS on page 14
website at https://plds.avaya.com/
2. Install the vSphere client 6.0, 6.5, or 6.7.
3. Keep a copy of license files of Avaya Aura®
products handy so you can replicate with the new
Host ID after the OVA file installation.
4. Keep the network configuration data handy. Customer configuration data on
page 16
5. Deploy the WebLM OVA file. Deploying the WebLM OVA by
using vSphere Web Client on
page 19
6. Start the WebLM virtual machine. Starting the WebLM server virtual
machine on page 23
7. Verify the installation of the WebLM virtual
machine.
8. Install the WebLM 8.1.1 feature pack file. Installing a WebLM patch, feature
pack, or service pack on page 23
9. Restart the WebLM virtual machine from CLI to
get the updated kernel running in memory.
18. On the Customize template page, enter the configuration and network parameters.
For information about the configuration and network parameters, see Configuring the
network parameters fields and descriptions on page 47.
Note:
• If you do not provide the details in the mandatory fields, you cannot power on the
virtual machine even if the deployment is successful.
• During the startup, the system validates the inputs that you provide. If the inputs are
invalid, the system prompts you to provide the inputs again on the console of the
virtual machine.
19. Click Next.
20. On the Ready to complete page, review the settings, and click Finish.
Wait until the system deploys the OVA file successfully.
21. To start the WebLM virtual machine, if WebLM is not already powered on perform one of
the following steps:
• Click VM radio button, and click Actions > Power > Power On.
• Right-click the virtual machine, and click Power > Power On.
• On the Inventory menu, click VirtualMachine > Power > Power On.
The system starts the WebLM virtual machine.
When the system starts for the first time, configure the parameters for WebLM. For
instructions, see Configuring the network parameters fields and descriptions on page 47.
22. Click the Console tab and verify that the system startup is successful.
Next steps
Note:
Modifying the network or management configuration is not recommended before the patch
deployment.
Related links
Deploying the application OVA using vSphere Web Client by accessing the host directly on
page 21
Application Deployment field descriptions on page 47
14. On the Ready to complete page, review the settings, and click Finish.
Wait until the system deploys the OVA file successfully.
15. To edit the virtual machine settings, click VM radio option and perform the following:
• Click Actions > Edit Settings to edit the required parameters.
• Click Save.
Note:
Ensure that the virtual machine is powered down to edit the settings.
16. To ensure that the virtual machine automatically starts after a hypervisor reboot, click VM
radio option, and click Actions > Autostart > Enable.
Note:
If you do not enable autostart, you must manually start the virtual machine after the
hypervisor reboot. Autostart must be enabled on the Host for the virtual machine
autostart to function.
17. To start the virtual machine, if application is not already powered on perform one of the
following steps:
• Click VM radio option, and click Actions > Power > Power On.
• Right-click the virtual machine, and click Power > Power On.
• On the Inventory menu, click Virtual Machine > Power > Power On.
The system starts the application virtual machine.
When the system starts for the first time, configure the parameters for application.
18. Click Actions > Console, select the open console type, verify that the system startup is
successful, then input the application configuration parameters.
Related links
Deploying the WebLM OVA by using vSphere Web Client on page 19
Application Deployment field descriptions on page 47
3. If you have deployed WebLM through vSphere, at the system prompt, enter the network
parameters.
4. Confirm the network parameters. Press n to reenter the values.
The WebLM boot-up sequence continues and WebLM configuration starts.
5. Right-click the deployed WebLM server virtual machine, and select Open Console.
The WebLM server virtual machine starts.
Note:
You must re-host all the required licenses after upgrading WebLM. For a fresh
installation, you need not re-host the licenses.
6. On the Create a new virtual machine Step 3 of 4 window, perform the following:
a. In Memory (RAM), enter the required memory.
b. In CPU, enter the number of CPUs for the virtual machine based on the application
profile.
c. Click Forward.
7. On the Create a new virtual machine Step 4 of 4 window, perform the following:
a. In Name, type the name of the virtual machine.
b. Select the Customize Configuration before Install check box.
c. Check Network selection and verify the required network interface.
d. Click Finish.
8. In the left navigation pane, click Disk 1. In the Advanced options section, perform the
following:
a. In Disk bus, select SCSI.
b. In Storage format, type qcow2.
c. Click Apply.
9. In the left navigation pane, click Boot Options and perform the following:
a. In Boot device order, click Hard Disk.
b. Click Apply.
10. Click Begin Installation.
The system creates a new virtual machine.
Next steps
On first boot of the virtual machine, provide the configuration and networking parameters.
2. In the left navigation pane, click Project > Compute > Images.
3. On the Images page, click Create Image.
The system displays the Create An Image dialog box.
4. In Name, type the name of the image.
5. In Description, type the description of the image.
6. In Image Source, click Image Location or Image File, and perform one of the following:
• In Image Location, type the exact URL of the qcow2 image.
• In Image File, click Browse. In the Choose File to Upload dialog box, select the qcow2
image from your local system, and click Open.
7. In Format, click QCOW2 - QEMU Emulator.
8. Click Create Image.
The system displays the created image on the Images page.
Flavors
Flavors are footprints of an application. The administrator must create flavors for each application.
For information about the footprints, see the profiles and footprints information for the application.
b. Click Next.
6. In Flavors, perform the following:
a. In the Available section, select a check box corresponding to a flavor name.
The system displays the selected flavor in the Allocated section.
b. Click Next.
7. In Networks, perform the following:
a. In the Available section, select a check box corresponding to a network name.
The system displays the selected network in the Allocated section.
b. Click Next.
8. In Network Ports, leave the default settings, and click Next.
9. In Security Groups, perform the following:
a. In the Available section, select a check box corresponding to a security group name.
The system displays the selected security group in the Allocated section.
b. Click Next.
10. In Key Pair, leave the default settings, and click Next.
11. In Configuration, leave the default settings, and click Next.
12. In Metadata, leave the default settings.
13. Click Launch Instance.
The system displays the created instance on the Instances page. The Status column
displays: Spawning. When the system creates the application instance, the Status
column displays: Active.
The system displays the static IP Address of the application in the IP Address column.
Next steps
Configure the application instance. Use the static IP Address to configure the application instance.
2.
Click Settings icon ( ) > Image Configuration.
The system displays the Image Configuration dialog box.
3. Click + Upload Image.
The system displays the Create Image dialog box.
4. In NAME, type the name of the image.
5. In ANNOTATION, type the description of the image.
6. In IMAGE TYPE, click DISK.
7. In STORAGE CONTAINER, click the storage container of the image.
8. In IMAGE SOURCE, perform one of the following:
• Select From URL, type the exact URL of the qcow2 image. For example: nfs://
<127.0.0.1>/<Storage Container Name>/<Image Name>
• Select Upload a file, click Browse. In the Choose File to Upload dialog box, select the
qcow2 image from your local system, and click Open.
9. Click Save.
The system displays the created image on Image Configuration.
After the operation is successful, the system displays the created virtual machine on the
VM page.
Next steps
Start the virtual machine.
When the system starts the virtual machine, the system displays a green upward arrow key ( )
corresponding to the virtual machine name.
Next steps
Launch the console. On the first boot of the virtual machine, provide the configuration and
networking parameters
Adding a location
About this task
You can define the physical location of the host and configure the location specific information.
You can update the information later.
Procedure
1. On the Locations tab, in the Locations section, click New.
2. In the New Location section, perform the following:
a. In the Required Location Information section, type the location information.
b. In the Optional Location Information section, type the network parameters for the
virtual machine.
3. Click Save.
The system displays the new location in the Application Management Tree section.
Procedure
1. On the Platforms tab, click Add.
2. In Platform Name, type the name of the platform.
3. In Platform FQDN or IP, type the FQDN or IP address of the base operating system.
4. In User Name, type the user name of the base operating system.
For a software-only deployment, the user name must be a direct access admin user. If the
software-only application is already deployed, provide the application cli user credentials.
5. In Password, type the password of the base operating system.
6. In Platform Type, select OS.
7. Click Save.
If the platform has some applications running, the system automatically discovers those
applications and displays the applications in the Applications tab.
• If Solution Deployment Manager is unable to establish trust, the system displays the
application as Unknown.
• If you are adding OS, only Add and Remove operations are available on the Platforms
tab. You cannot perform any other operations. On the Applications tab, the system
enables the New option. If the application is System Manager, the system enables
Update App on Solution Deployment Manager Client
The system displays the added base operating system on the Platforms tab.
Managing vCenter
4. To provide complete administrative-level privileges, select the All Privileges check box.
5. (Optional) To provide minimum mandatory privileges, do the following.
a. In All Privileges, select the following check boxes:
• Datastore
• Datastore cluster
• Distributed switch
• Folder
• Host profile
• Network
• Resource
• Tasks
• Virtual machine
• vApp
Note:
You must select all the subprivileges under the list of main set of privileges. For
example, when you select the Distributed switch check box, ensure that you
select all the related subprivileges. This is applicable for all the main privileges
mentioned above. If you do not select all the subprivileges, the system might not
work properly.
b. In All Privileges, expand Host, and select the Configuration check box.
Note:
You must select all the subprivileges under Configuration.
6. Click OK to save the privileges.
Next steps
Assign this role to the user for mapping vCenter in Solution Deployment Manager. To assign the
role to the user, see the VMware documentation.
Editing vCenter
Before you begin
Ensure that you have the required permissions.
Procedure
1. In the lower pane, click Map vCenter.
2. On the Map vCenter page, select a vCenter server and click Edit.
3. In the Edit vCenter section, change the vCenter information as appropriate.
4. If vCenter is migrated from an earlier release, on the Certificate page, click Save, and then
click Accept Certificate.
5. To edit the location of ESXi hosts, in the Managed Hosts section, do one of the following:
• Select an ESXi host and click the edit icon ( ).
• Select one or more ESXi hosts, select the location, click Bulk Update > Update.
6. Click Commit to get an updated list of managed and unmanaged hosts.
If you do not click Commit after you move the host from Managed Hosts to Unmanaged
Hosts or vice versa, and you refresh the table, the page displays the same host in both the
tables.
Name Description
IP The IP address of the vCenter server.
FQDN The FQDN of the vCenter server.
Note:
Use FQDN to successfully map and log in to
vCenter from Solution Deployment Manager.
With IP address, the system displays an error
message about the incorrect certificate and
denies connection.
License The license type of the vCenter server.
Status The license status of the vCenter server.
Certificate Status The certificate status of the vCenter server. The
options are:
• : The certificate is correct.
• : The certificate is not accepted or invalid.
Button Description
View Displays the certificate status details of the vCenter
server.
Generate/Accept Certificate Displays the certificate dialog box where you can
generate and accept a certificate for vCenter.
For vCenter, you can only accept a certificate. You
cannot generate a certificate.
Button Description
Add Displays the New vCenter page where you can add
a new ESXi host.
Edit Displays the Edit vCenter page where you can
update the details and location of ESXi hosts.
Delete Deletes the ESXi host.
Refresh Updates the list of ESXi hosts in the Map vCenter
section.
Name Description
Password The password that you use to log in to vCenter.
Authentication Type The authentication type that defines how Solution
Deployment Manager performs user authentication.
The options are:
• SSO: Global username used to log in to vCenter
to authenticate to an external Active Directory
authentication server.
• LOCAL: User created in vCenter
If you select the authentication type as SSO, the
system displays the Is SSO managed by Platform
Service Controller (PSC) field.
Is SSO managed by Platform Service Controller The check box to specify if PSC manages SSO
(PSC) service. When you select the check box, the system
enables PSC IP or FQDN.
PSC IP or FQDN The IP or FQDN of PSC.
Button Description
Save Saves any changes you make to FQDN, username,
and authentication type of vCenter.
Refresh Refreshes the vCenter details.
Managed Hosts
Name Description
Host IP/FQDN The name of the ESXi host.
Host Name The IP address of the ESXi host.
Location The physical location of the ESXi host.
IPv6 The IPv6 address of the ESXi host.
Edit The option to edit the location and host.
Bulk Update Provides an option to change the location of more
than one ESXi hosts.
Note:
You must select a location before you click
Bulk Update.
Update Saves the changes that you make to the location or
hostname of the ESXi host.
Commit Commits the changes that you make to the ESXi
host with location that is managed by vCenter.
Unmanaged Hosts
Name Description
Host IP/FQDN The name of the ESXi host.
ESXi Version Displays the versions of the ESXi host linked to
vCenter FQDN.
Note:
For Release 8.1, do not select the 5.0 and 5.1
versions.
IPv6 The IPv6 address of the ESXi host.
Button Description
Commit Saves all changes that you made to vCenter on the
Map vCenter page.
Name Description
IPv4 Address The IPv4 address of the WebLM virtual machine.
Netmask The IPv4 subnetwork mask to assign to the WebLM virtual machine.
IPv4 Default Gateway The gateway IPv4 address to assign to the WebLM virtual machine.
IP Address of DNS Server The DNS IPv4 address to assign to the WebLM virtual machine. Separate
the IP addresses with commas (,).
Short Hostname The short hostname to assign to the WebLM virtual machine.
IPv6 Address The IPv6 address of the WebLM virtual machine.
IPv6 Network Prefix The IPv6 subnetwork mask to assign to the WebLM virtual machine.
IPv6 Gateway The gateway IPv6 address to assign to the WebLM virtual machine.
Domain Name The domain name of the WebLM virtual machine.
Default Search List The short hostname to assign to the WebLM virtual machine.
NTP Server IP/FQDN The IP address or FQDN of the NTP server.
The field is optional. Separate the IP addresses with commas (,).
Timezone The timezone where the WebLM virtual machine is located. A list is
available where you select the name of the continent and the name of the
country.
Networking Parameters
When you deploy the application on Appliance Virtualization Platform, the system displays the
Automatically Mapped VM Network Interfaces section with the VM Interfaces, Mapped to Host
Network, and Server NIC columns.
Name Description
Public The port number that is mapped to public port group.
You must configure Public network configuration parameters only when
you configure Out of Band Management. Otherwise, Public network
configuration is optional.
Services The port number that is mapped to the services port group when AVP
Utilities is deployed in the solution.
AVP Utilities provides routing from the services port to the virtual
machines and additional functions, such as alarm conversion.
Out of Band Management The port number that is mapped to the out of band management port
group.
When you deploy the application on VMware, the system displays the Select a Network Mapping
for VM Network Interfaces section.
Name Description
Public The port number that is mapped to public port
group.
You must configure Public network configuration
parameter only.
Button Description
Deploy Displays the EULA acceptance screen. To accept EULA and start the
deployment process, click Accept.
Post-upgrade checklist
Sr. No. Tasks Links/Notes
1 Log on to the WebLM web console See Logging on to the WebLM web console on
and verify the WebLM page 52.
<version_number>.
2 Rehost the license file that you See Rehosting license files on page 53. For
generated on the WebLM server. more details, refer Administering Avaya
WebLM.
Note:
If you had upgraded the
application by using Solution
Deployment Manager client,
you do not need to rehost the
license file separately.
3 Configure the EASG settings, if See Enhanced Access Security Gateway
required. (EASG) overview on page 57.
4 Rollback the upgrade in case the See Rolling back an upgrade on page 57.
upgrade fails.
5 Delete the virtual machine -
snapshots, if required.
Button Description
Delete Deletes the upgrade job.
Re-run Checks Performs the upgrade job again.
Edit Configuration Displays the Upgrade Configuration page where you can change the upgrade
configuration details.
Rollback process
Upgrade rollback
The upgrade rollback is initiated in two cases:
• Upgrade process of an element fails: Administrator need not rollback upgrade of all the
elements. When the element upgrade fails, the system stops the entire upgrade process and
displays the failure status on the Upgrade Management page. The entire upgrade process
does not roll back. Only the failed element upgrade rolls back.
• Upgrade process of the entire system fails: Admin specifies rollback all when the system
upgrade fails. The system stops the upgrade and rolls back the overall upgrade process.
Maintenance
This chapter describes the procedures to change the WebLM IP address, FQDN, and other
parameters from Command Line Interface (CLI). This chapter also provides information about
performing backup and restore of WebLM.
Note:
The existing license files become invalid when you:
• change the WebLM IP address
• perform a WebLM update
• clone a virtual machine
When you redeploy the WebLM, then you must reinstall a new license file to match the new
Host ID generated in the WebLM server.
Warning:
Do not change the IP address settings from VMware tools when WebLM is in the
Power Off state.
Note:
After a WebLM IP/FQDN change, the licenses become invalid. You must re-host the
licenses. The license data varies based on the installed license as part of the license
re-host.
2. To add more than one IP address for the DNS server, type changeIPFQDN –dns
primary_DNS_IPaddress, secondary_DNS_IPaddress, DNS_N_IPadress....”
to “changeIPFQDN –dns primary_DNS_IPaddress,
secondary_DNS_IPaddress, ..., DNS_N_IPadress.
You must separate each DNS IP address by a comma (,). For example, changeIPFQDN -
dns 10.14.16.2,14.17.13.5.
The system takes a few seconds to apply the DNS changes to the network.
Note:
The command to configure multiple DNS IP addresses overrides all the previous DNS
IP address entries.
Related links
Rehosting license files on page 53
WebLM CLI operations on page 65
Note:
Copy the WebLM
feature pack or
patches that you
install to /home/
admin/.
5. weblm_passwo <reset> Reset option backs up weblm_password
rd the existing user reset
<restore>
configuration and
weblm_password
applies the predefined
restore
password.
Restore option restores
the backed-up user
configuration. The utility
also supports the non-
root user, such as
admin.
6. configureTLS <TLSv1.2> Configures the TLS Type one of the
support. following option:
<TLSv1.1>
• enable TLSv1.2
<TLSv1>
• enable TLSv1.2 and
TLSv1.1
• enable TLSv1.2,
TLSv1.1 and TLSv1.0
7. collectLogs Collects the WebLM
logs in the /tmp/
WebLM_Logs_XXXXXXX
XXXXXXXX.zip file.
History
Name Description
Job ID The unique name of the virtual machine
management job.
IP/FQDN The IP address or host name of the virtual machine
or the host where the operation is performed.
Operation The operation performed on the virtual machine or
host. For example, host refresh, virtual machine
deployment, and patch installation.
Status The status of the job.
Start Time The start time of the job.
End Time The end time of the job.
Monitoring an application
Procedure
1. Click Monitor Applications.
2. In the Monitor VMs page, do the following:
a. In Hosts, click a host.
b. In Virtual machines, click a virtual machine on the host that you selected.
3. Click Generate Graph.
The system displays the graph regarding the CPU/memory usage of the virtual machine
that you selected.
6. In the Content Type filter, click a document type, or click Select All to see a list of all
available documents.
For example, for user guides, click User Guides in the Content Type filter. The list
displays the documents only from the selected category.
7. Click Enter.
• Publish a PDF of the current section in a document, the section and its subsections, or the
entire document.
• Add content to your collection by using My Docs ( ).
Navigate to the My Content > My Docs menu, and do any of the following:
- Create, rename, and delete a collection.
- Add content from various documents to a collection.
- Save a PDF of selected content in a collection and download it to your computer.
- Share content in a collection with others through email.
- Receive content that others have shared with you.
• Add yourself as a watcher by using the Watch icon ( ).
Navigate to the My Content > Watch list menu, and do the following:
- Set how frequently you want to be notified, starting from every day to every 60 days.
- Unwatch selected content, all content in a document, or all content on the Watch list page.
As a watcher, you are notified when content is updated or deleted from a document, or the
document is removed from the portal.
• Share a section on social media platforms, such as Facebook, LinkedIn, and Twitter.
• Send feedback on a section and rate the content.
Note:
Some functionality is only available when you log in to the portal. The available functionality
depends on the role with which you are logged in.
Training
The following courses are available at http://www.avaya-learning.com/. To search for the course,
enter the course code in the Search field and click Go.
Course code Course title
71200V Integrating Avaya Aura® Core Components
Support
Go to the Avaya Support website at https://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release notes,
downloads, and resolutions to issues. Use the online service request system to create a service
request. Chat with live agents to get answers to questions, or request an agent to connect you to a
support team if an issue requires additional expertise.
If you are an authorized Avaya Partner or a current Avaya customer with a support contract, you
can access the Knowledge Base without extra cost. You must have a login account and a valid
Sold-To number.
Use the Avaya InSite Knowledge Base for any potential solutions to problems.
1. Go to http://www.avaya.com/support.
2. Log on to the Avaya website with a valid Avaya user ID and password.
The system displays the Avaya Support page.
3. Click Support by Product > Product-specific Support.
4. In Enter Product Name, enter the product, and press Enter.
5. Select the product from the list, and select a release.
6. Click the Technical Solutions tab to see articles.
7. Select relevant articles.
BIOS
For optimal performance, turn off power saving server options. See the technical data provided by
the manufacturer for your particular server regarding power saving options.
For information about how to use BIOS settings to improve the environment for latency-sensitive
workloads for an application, see the technical white paper, “Best Practices for Performance
Tuning of Latency-Sensitive Workloads in vSphere VMs” at https://www.vmware.com/.
The following sections describe the recommended BIOS settings for:
• Intel Virtualization Technology
• Dell PowerEdge Servers
• HP ProLiant Servers
Related links
Intel Virtualization Technology on page 74
Dell PowerEdge Server on page 75
HP ProLiant G8 and G9 Servers on page 75
Note:
The VT setting is locked as either On or Off when the server starts. After enabling VT in the
system BIOS, save your changes to the BIOS settings and exit. The BIOS changes take effect
after the host server reboots.
Other suggested BIOS settings
Servers with Intel Nehalem class and newer Intel Xeon CPUs offer two more power management
options: C-states and Intel Turbo Boost. These settings depend on the OEM make and model of
the server. The BIOS parameter terminology for current Dell and HP servers are described in the
following sections. Other server models might use other terminology for the same BIOS controls.
• Disabling C-states lowers latencies to activate the CPUs from halt or idle states to a fully
active state.
• Intel Turbo Boost steps up the internal frequency of the processor if the workload requires
more power. The default for this option is enabled. Do not change the default.
Related links
BIOS on page 74
Related links
BIOS on page 74
VMware Tools
The VMware Tools utility suite is built into the application OVA. The tools enhance the
performance of the guest operating system on the virtual machine and improve the management
of the virtual machine.
VMware tools provide:
• VMware Network acceleration
• Host to Guest time synchronization
• Disk sizing
For more information about VMware tools, see Overview of VMware Tools at http://
kb.vmware.com/kb/340.
Important:
Do not upgrade the VMware tools software that is packaged with each OVA unless instructed
to do so by Avaya. The supplied version is the supported release and has been thoroughly
tested.
Timekeeping
For accurate timekeeping, use the Network Time Protocol (NTP) as a time source instead of the
ESXi hypervisor.
The NTP servers can be local or over the Internet. If the NTP servers are on the Internet, the
corporate firewall must open UDP port 123 so that the NTP service can communicate with the
external NTP servers.
The VMware tools time synchronization method is disabled at application deployment time to
avoid dueling clock masters. You must configure the NTP service first because the applications
are not receiving clock updates from the hypervisor. To verify that VMware Tools Timesync is
disabled, run the command /usr/bin/vmware-toolbox-cmd timesync status.
In certain situations, the ESXi hypervisor pushes an updated view of its clock into a virtual
machine. These situations include starting the virtual machine and resuming a suspended virtual
machine, If this view differs more than 1000 seconds from the view that is received over the
network, the NTP service might shutdown. In this situation, the guest OS administrator must
manually set the guest clock to be the same or as close as possible to the network time source
clock. To keep the NTP service active, the clock on the ESXi host must also use an accurate clock
source, such as the same network time source that is used by the guest operating system.
If you use the names of the time servers instead of the IP address, you must configure the Domain
Name Service in the guest OS before you administer the NTP service. Otherwise, the NTP service
cannot locate the time servers. If you administer the NTP service first, you must restart the NTP
service after administering the DNS service.
After you administer the NTP service in the application, run the ntpstat or /usr/sbin/ntpq
-p command from a command window. The results from these commands:
• Verify if the NTP service is getting time from a network time source.
• Indicate which network time source is in use.
• Display how closely the guest OS matches the network time.
• Display how often the guest OS checks the time.
The guest OS polls the time source every 65 to 1024 seconds. Larger time intervals indicate that
the guest clock is tracking the network time source closely. If the time source is local, then the
NTP service is not using a network time source and a problem exists.
If the clock value is consistently wrong, look through the system log for entries regarding ntpd.
The NTP service writes the activities it performs to the log, including when the NTP service loses
synchronization with a network time source.
• Configure all VMkernel vNICs to be the same IP Maximum Transmission Unit (MTU).
Networking Avaya applications on VMware ESXi – Example 1
This configuration describes a simple version of networking Avaya applications within the same
ESXi host. Highlights to note:
• Separation of networks: VMware Management, VMware vMotion, iSCSI (SAN traffic), and
virtual machine networks are segregated to separate physical NICs.
• Teamed network interfaces: vSwitch 3 in Example 1 displays use of a load-balanced NIC
team for the Virtual Machines Network. Load balancing provides additional bandwidth for the
Virtual Machines Network, while also providing network connectivity for the virtual machines
in the case of a single NIC failure.
• Virtual networking: The network connectivity between virtual machines that connect to the
same vSwitch is entirely virtual. In example 2, the virtual machine network of vSwitch3 can
communicate without entering the physical network. Virtual networks benefit from faster
communication speeds and lower management overhead.
Networking Avaya applications on VMware ESXi – Example 2
This configuration shows a complex situation using multiple physical network interface cards. The
key differences between example 1 and example 2 are:
• VMware Management Network redundancy: Example 2 includes a second VMkernel Port at
vSwitch2 to handle VMware Management Network traffic. In the event of a failure of vmnic0,
VMware Management Network operations can continue on this redundant management
network.
• Removal of Teaming for Virtual Machines Network: Example 2 removes the teamed physical
NICs on vSwitch3. vSwitch3 was providing more bandwidth and tolerance of a single NIC
failure instead of reallocating this NIC to other workloads.
Storage
For best performance, use WebLM only on disks local to the ESXi Host, or Storage Area Network
(SAN) storage devices. Do not store WebLM on an NFS storage system.
select the Quick Format option, the format tool in Microsoft Windows writes information to all
sectors on the disk, which in turn inflates the thin-provisioned disk to full size.
VMware Snapshots
A snapshot preserves the state and data of a virtual machine at a specific point in time. You can
create a snapshot before upgrading or installing a patch.
The best time to take a snapshot is when no applications in the virtual machine are
communicating with other computers. The potential for problems is greatest if the virtual machine
is communicating with another computer. For example, if you take a snapshot while the virtual
machine is downloading a file from a server on the network, the virtual machine continues
downloading the file and communicating its progress to the server. If you revert to the snapshot,
communications between the virtual machine and the server are confused and the file transfer
fails.
Caution:
Snapshot operations can adversely affect service. Before performing a snapshot
operation, you must stop the application that is running on the virtual machine or place
the application out-of-service. When the snapshot operation is complete, start or bring
the application back into service.
Snapshots can:
• Consume large amounts of data resources.
• Increase CPU loads on the host.
• Affect performance.
• Affect service.
To prevent adverse behaviors, consider the following recommendations when using the Snapshot
feature:
• Do not rely on VMware snapshots as a robust backup and recovery method. Snapshots are
not backups. The snapshot file is only a change log of the original virtual disk.
• Do not run a virtual machine from a snapshot. Do not use a single snapshot for more than 24
to 72 hours.
• Take the snapshot, make the changes to the virtual machine, and delete or commit the
snapshot after you verify the virtual machine is working properly. These actions prevent
snapshots from growing so large as to cause issues when deleting or committing the
snapshots to the original virtual machine disks.
• When taking a snapshot, do not save the memory of the virtual machine. The time that the
host takes to write the memory to the disk is relative to the amount of memory that the virtual
machine is configured to use. Saving the memory can add several minutes to the time taken
to complete the operation. If the snapshot is active, saving memory can make calls appear to
be active or in progress and can cause confusion to the user. To create a clean snapshot
image from which to boot, do the following when you create a snapshot:
- In the Take Virtual Machine Snapshot window, clear the Snapshot the virtual
machine’s memory check box.
- Select the Quiesce guest file system (Needs VMware Tools installed) check box to
ensure that all write instructions to the disks are complete. You have a better chance of
creating a clean snapshot image from which to boot.
• If you are going to use snapshots for a long time, you must consolidate the snapshot files
regularly to improve performance and reduce disk usage. Before merging the snapshot delta
disks back into the base disk of the virtual machine, you must first delete stored snapshots.
Note:
If a consolidation failure occurs, end-users can use the actual Consolidate option without
opening a service request with VMware. If a commit or delete operation does not merge
the snapshot deltas into the base disk of the virtual machine, the system displays a
warning on the user interface.
Related resources
Title Link
Best practices for virtual machine snapshots in the Best Practices for virtual machine snapshots in the
VMware environment VMware environment
Understanding virtual machine snapshots in Understanding virtual machine snapshots in
VMware ESXi and ESX VMware ESXi and ESX
Working with snapshots Working with snapshots
Configuring VMware vCenter Server to send alarms Send alarms when virtual machines are running
when virtual machines are running from snapshots from snapshots
VMware vMotion
VMware uses the vMotion technology to migrate a running virtual machine from one physical
server to another physical server without incurring down time. The migration process, also known
as a hot migration, migrates running virtual machines with zero downtime, continuous service
availability, and complete transaction integrity.
With vMotion, you can:
• Schedule migration to occur at predetermined times and without the presence of an
administrator.
• Perform hardware maintenance without scheduled downtime.
• Migrate virtual machines away from failing or underperforming servers.
Before using vMotion, you must:
• Ensure that each host that migrates virtual machines to or from the host uses a licensed
vMotion application and the vMotion is enabled.
• Ensure that you have identical vSwitches. You must enable vMotion on these vSwitches.
• Ensure that the Port Groups are identical for vMotion.
• Use a dedicated NIC to ensure the best performance.
Note:
If WebLM is being used either as a master WebLM server or a local WebLM server in an
enterprise licensing deployment for a product, after migration of virtual machine to another
physical server using vMotion, validate connectivity from the master WebLM server for all the
added local WebLM servers to ensure that the master WebLM server can communicate with
the local WebLM servers.
VMware cloning
WebLM supports VMware cloning. However, WebLM does not support the Guest Customization
feature. Therefore, do not use the Guest Customization wizard in the VMware cloning wizard while
cloning WebLM.
Note:
Do not perform WebLM cloning. If a clone of a WebLM VMware is created, all existing
licenses become invalid. You must rehost all the licenses.
If WebLM is the master server in an enterprise licensing deployment for a product, after
cloning the master WebLM server, the enterprise license file is invalidated on the clone. You
must then rehost the enterprise license file on the cloned WebLM server and redo the
enterprise configurations. The administrator must add the local WebLM server again and
change allocations for each WebLM server to use the cloned master WebLM server with the
existing local WebLM servers.
If WebLM is the local WebLM server in an enterprise licensing deployment for a product, after
cloning the local WebLM server, the allocation license file on the local WebLM server is
invalidated due to the changed host ID. The administrator must validate the connectivity for
the local WebLM server from the master WebLM server and change allocations to push a new
allocation license file to the local WebLM server with a valid host ID.
ESXi A virtualization layer that runs directly on the server hardware. Also
known as a bare-metal hypervisor. Provides processor, memory, storage,
and networking resources on multiple virtual machines.
PLDS Product Licensing and Download System. The Avaya PLDS provides
product licensing and electronic software download distribution.
Storage vMotion A VMware feature that migrates virtual machine disk files from one data
storage location to another with limited impact to end users.
vCenter Server An administrative interface from VMware for the entire virtual
infrastructure or data center, including VMs, ESXi hosts, deployment
profiles, distributed virtual networking, and hardware monitoring.
vMotion A VMware feature that migrates a running virtual machine from one
physical server to another with minimal downtime or impact to end users.
vMotion cannot be used to move virtual machines from one data center to
another.
vSphere Client The vSphere Client is an interface for administering vCenter Server and
ESXi. Downloadable versions are VMware 5.5 and 6.0. A browser-based
Web client version is VMware 6.5 and later.
EASG
certificate information ................................................... 58
L
disabling ....................................................................... 57 license files
enabling ........................................................................ 57 rehost ............................................................................53
status ............................................................................ 57 location
EASG site certificate ............................................................58 adding ...........................................................................38
editing logging on
vCenter ......................................................................... 43 WebLM web console .................................................... 52
editing upgrade configuration .............................................. 55 log on
editing vCenter .....................................................................43 Nutanix Web console ....................................................31
Edit vCenter ......................................................................... 44 Red Hat Virtualization Manager Web console .............. 35
Enhanced Access Security Gateway
EASG overview ............................................................ 57
ESXi host M
adding ...........................................................................38
Map vCenter ............................................................ 41, 43, 44
extracting
monitoring
KVM OVA ......................................................................25
application .................................................................... 68
platform .........................................................................67
F multiple DNS IP addresses ............................................60, 61
My Docs ...............................................................................70
field descriptions
Job History ....................................................................67
Map vCenter ................................................................. 43 N
finding content on documentation portal ..............................70
network restart ..................................................................... 50
finding port matrix ................................................................ 70
New vCenter ........................................................................ 44
flavor .................................................................................... 28
NTP server
configure .......................................................................62
G NTP time source .................................................................. 76
guidelines
deployment ................................................................... 17 O
OVA file
H deploy ..................................................................... 19, 21
overview ............................................................................... 11
high availability
VMware ........................................................................ 83
P
I PCN notification ................................................................... 84
performing WebLM backup ..................................................63
InSite Knowledge Base ........................................................72 performing WebLM restore .................................................. 63
installing a patch .................................................................. 23 platform
installing a service pack .......................................................23 monitoring .....................................................................67
installing WebLM feature pack .............................................23 PLDS
Intel Virtualization Technology ............................................. 74 downloading software ...................................................14
port matrix ............................................................................70
J post-upgrade checklist
WebLM ......................................................................... 52
Job History .....................................................................66, 67 power on VM ........................................................................34
preupgrade job status .......................................................... 54
PSN notification ................................................................... 84
K
Kernel-based Virtual Machine R
overview ........................................................................11
supported hardware ......................................................13 refresh elements job status ..................................................54
W
watch list .............................................................................. 70
WebLM
admin user ....................................................................47
CLI user ........................................................................ 47
deployment checklist .................................................... 18
update network parameters ..........................................50
WebLM; restore ................................................................... 63
WebLM backup ........................................................ 60, 63, 64
WebLM CLI operations ........................................................ 65
WebLM command line interface operations .........................65
WebLM configuration data ................................................... 16
WebLM field descriptions
Application Deployment ................................................47
WebLM memory
update ...........................................................................50
WebLM resource requirements
footprints .......................................................................14
WebLM restore .............................................................. 60, 64
WebLM server; time zone .................................................... 62
WebLM VMware configuration data .....................................16