Unlocking the Full Potential of Your IT Infrastructure with HCX Architecture

vTECH STATION: Understanding the Components of VMware HCX

As a System Engineer in the Information Technology field, I have always been fascinated by virtualization technology and its potential to revolutionize the way we manage and deploy IT infrastructure. In my journey so far, I have had the opportunity to work with various virtualization platforms, but none have captivated my attention like VMware’s HCX (Hyper-Converged Infrastructure) solution. In this blog post, I will delve into the components of VMware HCX and explore how they work together to provide a robust and scalable infrastructure for cloud computing and virtualization.

HCX Components Overview

————————

VMware HCX comprises multiple virtual management appliances at the source and destination sites, including five service appliance types that are usually deployed based on the customer scenario, migration use-cases, and purchased HCX license. The HCX manager is deployed as an OVA appliance that integrates HCX with the vSphere setup and enables it to deliver HCX services. HCX Connector is deployed at the source site, while HCX Cloud Manager is deployed at the target site. HCX Managers are deployed one to one with each vCenter Server, and the source and destination sites are paired together for HCX operations.

HCX Service Appliances

————————-

The HCX service appliances are responsible for providing the core functionality of HCX, including migration services, WAN optimization services, network extension services, and OS Assisted Migration (OSAM) services. These appliances are typically deployed in the context of a site pair, with each site having its own set of appliances.

1. Migration Services Appliance: This service appliance is deployed when migration services are enabled. It automatically tunnels to its peer at the remote site over the Internet and private lines, providing strong encryption, traffic engineering, and virtual machine mobility.

2. WAN Optimization Services Appliance: This service appliance is deployed when WAN optimization services are enabled for a site pair. The WAN Optimization component only communicates with the HCX-IX and does not make direct connections to its peer.

3. Network Extension Services Appliance: This component automatically tunnels to its peer at the remote site and provides an encrypted service path for migration services.

4. OS Assisted Migration (OSAM) Services Appliance: This appliance is deployed when HCX OS Assisted Migration (OSAM) services are required. OSAM is considered when we need to migrate workloads from a non-VMware Hypervisor such as Hyper-V or KVM.

HCX Manager and HCX Connector

——————————-

The HCX Manager is deployed as an OVA appliance that integrates HCX with the vSphere setup and enables it to deliver HCX services. The HCX Connector is deployed at the source site and provides the user interface for registering the system with vCenter appliances, authenticating users to manage HCX, and deploying HCX service virtual machines across both the source and destination sites.

HCX Cloud Manager

—————–

The HCX Cloud Manager is deployed at the target site and provides a centralized management platform for managing HCX services, including migration services, WAN optimization services, network extension services, and OS Assisted Migration (OSAM) services. The HCX Cloud Manager also enables users to monitor and troubleshoot HCX services, as well as perform advanced configuration and management tasks.

Conclusion

———-

In conclusion, VMware HCX is a powerful and flexible infrastructure solution that enables organizations to deploy and manage cloud computing and virtualization environments with ease. The components of HCX, including the migration services appliance, WAN optimization services appliance, network extension services appliance, OS Assisted Migration (OSAM) services appliance, HCX Manager, and HCX Connector, work together to provide a robust and scalable infrastructure for cloud computing and virtualization. As a System Engineer in the Information Technology field, I am excited about the potential of VMware HCX to revolutionize the way we manage and deploy IT infrastructure, and I look forward to exploring this technology further in future blog posts.

Unlocking the Full Potential of Enterprise Applications with vSphere and vRealize

Virtualizing Enterprise Applications on vSphere: Best Practices and Considerations

As more and more businesses move their infrastructure to virtualization, it’s important to understand the best practices and considerations for running enterprise applications on vSphere. In this blog post, we will discuss the key points to keep in mind when virtualizing three large enterprise applications – Enterprise JAVA, Oracle, and SQL – on vSphere.

Enterprise JAVA Applications

When it comes to enterprise JAVA applications, there are four components that need to be tuned perfectly, regardless of whether the application is running in a physical or virtual environment:

1. Load Balancer: Provides load balancing algorithms and API integrations with vSphere. This tier is responsible for handling application traffic demands.

2. Web Server: The web server should be tuned according to the exact number of HTTP threads to cater to the application demand. JAVA-based applications give the ability to tune JVM to cater to the traffic demand via Java threads, JDBC, or GC parameters.

3. JAVA Application: Many JAVA-based applications allow for fine-tuning of the JVM to cater to the traffic demand. This includes tuning parameters such as heap size, garbage collection, and thread pools.

4. DB Server: Databases are the heart of any application, and VMware has extensive documentation on running various databases on vSphere. Similar best practices can be applied to JAVA applications.

vCPU Best Practices for JAVA Workloads

When it comes to vCPU best practices for JAVA workloads, there are a few key considerations:

1. Memory is allocated based on the maximum heap size of the application, and not on the physical CPU count.

2. Overcommitment of memory can lead to performance issues and should be avoided.

3. Use NUMA-aware placement for critical virtual machines to ensure locality and optimal performance.

Memory Best Practices for JAVA Workloads

Understanding memory is crucial for any application, and JAVA applications are no exception. When it comes to memory best practices for JAVA workloads, there are a few key considerations:

1. SQL Max Server Memory should be set to the maximum heap size of the application.

2. ThreadStack should be set to the maximum number of worker threads * ThreadStackSize.

3. ThreadStackSize is 1MB on x86, 2MB on x64, and 4MB on IA64.

4. OS Mem should be set to 1GB for every 4 CPU Cores.

RDM vs VMFS Volume

When it comes to storing data, vSphere supports Raw Device Mapping (RDM) which allows a virtual machine to directly access a volume from physical storage without formatting it in VMFS. RDM can also reach up to 64TB. Both RDM and VMFS can provide similar performance characteristics, and a detailed study on this has been documented.

Oracle Applications

When it comes to Oracle applications, there are a few key considerations:

1. Memory is allocated based on the maximum server memory size of the application, and not on the physical CPU count.

2. Overcommitment of memory can lead to performance issues and should be avoided.

3. Use NUMA-aware placement for critical virtual machines to ensure locality and optimal performance.

SQL Applications

When it comes to SQL applications, there are a few key considerations:

1. Memory is allocated based on the maximum server memory size of the application, and not on the physical CPU count.

2. Overcommitment of memory can lead to performance issues and should be avoided.

3. Use NUMA-aware placement for critical virtual machines to ensure locality and optimal performance.

In conclusion, when it comes to running enterprise applications on vSphere, there are a few key considerations that should be kept in mind. By understanding these best practices and considerations, you can ensure that your applications run smoothly and efficiently, regardless of whether they are running in a physical or virtual environment.

References:

* vSphere Documentation

* VMware Knowledge Base

* Performance Optimization and Best Practices for vSphere

* Running Oracle on vSphere: Best Practices and Considerations

* Running SQL on vSphere: Best Practices and Considerations

Microsoft KB5021131 Update May Impact vCenter Login

Microsoft’s KB5021131 Security Update: Breaks VMware vCenter Login?

In recent news, Microsoft published a security update for Windows that has raised some concerns among VMware users. The update, KB5021131, enforces applications to use the more secure AES algorithm for Kerberos encryption instead of the unsecure RC4-HMAC. While this is a good idea in theory, it has been reported that the update may break vCenter login functionality when used with VMware vCenter.

In this blog post, we will delve into the details of KB5021131 and explore how it may impact vCenter login functionality. We will also provide a suggested workaround to ensure seamless authentication with vCenter.

What is KB5021131?

KB5021131 is a security update for Windows that enforces applications to use the more secure AES algorithm for Kerberos encryption instead of the unsecure RC4-HMAC. The update aims to improve the security of Windows systems by using the more secure AES algorithm, which is widely considered to be more secure than RC4-HMAC.

How does KB5021131 impact vCenter login?

The issue arises when you have vCenter joined to a Microsoft Active Directory (AD) domain. VMware talks to AD for authenticating users using Kerberos protocol. If there are unwanted changes in the way Microsoft used Kerberos, it can hit vCenter login functionality.

To address this issue, VMware support recommends setting encryption type for vCenter objects in AD to 24 (decimal). This will ensure seamless authentication with vCenter.

Testing Results

I conducted some testing in my lab to verify the impact of KB5021131 on vCenter login functionality. Here are the results:

1. Without patch: I checked the used encryption type for Kerberos tickets and found that it was 0x12, which is AES256-CTS-HMAC-SHA1-96. This is the default encryption type for most environments.

2. With patch: After applying the KB5021131 update, I checked the used encryption type again and found that it was 0x17, which is RC4-HMAC. This is the encryption type that Microsoft wants to avoid.

Workaround

To resolve the issue, VMware support recommends setting encryption type for vCenter objects in AD to 24 (decimal). This will ensure seamless authentication with vCenter. Here are the steps to set encryption type for vCenter objects in AD:

1. Open Active Directory Users and Groups administration tool.

2. Navigate to the vCenter object in AD.

3. Right-click on the object and select “Edit”.

4. In the “Attribute Editor” window, navigate to the “msDS-SupportedEncryptionTypes” attribute.

5. Set the value of this attribute to 24 (decimal).

Conclusion

In conclusion, KB5021131 may break vCenter login functionality when used with VMware vCenter. However, by setting encryption type for vCenter objects in AD to 24 (decimal), you can ensure seamless authentication with vCenter. We recommend that you test this solution in your lab before implementing it in your production environment.

If you have any further questions or concerns, please feel free to ask. We are here to help!

Critical Log4j Vulnerability – VMSA-2021-0028

The recent zero-day vulnerability in the Log4j 2.14.1 library has caused a stir in the cybersecurity community, with many experts warning of the potential dangers of this critical remote code execution (RCE) flaw. The vulnerability, tracked as CVE-2021-44228, has been rated as a perfect 10/10 on the CVSS scale due to its ease of exploitation and the potential for widespread attacks.

The vulnerability is caused by a feature in Log4j that allows for JNDI (Java Naming and Directory Interface) lookups, which can be used to execute malicious code on targeted systems. The attack vector involves sending a specially crafted string to the Log4j library, which will then perform the JNDI lookup and execute the resulting code. This can allow an attacker to gain remote access to the affected system and execute arbitrary code, potentially leading to a complete takeover of the system.

The vulnerability was first reported in 2013, but it has only recently come to light due to its discovery in the popular Apache Struts framework, which uses Log4j as its logging mechanism. The affected version of Log4j is 2.14.1, and there have been reports of attacks against this version dating back to at least March 2021.

The good news is that a patch for the vulnerability has already been released in the form of Log4j 2.15.0, which includes a fix for the JNDI lookup feature. Additionally, there are several alternative solutions available, such as disabling JNDI lookups or blocking access to the affected ports.

However, given the severity of the vulnerability and the ease with which it can be exploited, it is essential that all affected systems are patched as soon as possible. This includes not only Apache Struts but also any other applications that use Log4j 2.14.1. It is recommended to update to Log4j 2.15.0 or later as soon as possible, and to thoroughly test any alternative solutions before deploying them in production environments.

Furthermore, it is important to be aware of the potential risks of this vulnerability and to take appropriate measures to prevent exploitation. This includes monitoring for suspicious activity, such as unusual network traffic or unexpected changes to system files, and being cautious when clicking on links or opening attachments from unknown sources.

In conclusion, the recent zero-day vulnerability in Log4j 2.14.1 is a critical threat that should be taken seriously by all cybersecurity professionals and IT teams. It is essential to patch affected systems as soon as possible and to take appropriate measures to prevent exploitation. By staying informed and taking proactive steps, we can help protect our systems and data from this potentially devastating vulnerability.

Discover the Power of Linux Lite

Linux Lite: A Lightweight and User-Friendly Linux Distribution

Introduction:

Linux Lite is a free and open-source operating system based on Ubuntu LTS (Long Term Support) releases. It is designed to be lightweight, easy to use, and compatible with older hardware. The distro aims to provide a smooth transition for Windows users who want to switch to Linux, as well as a satisfying experience for existing Linux users who prefer a simple and elegant desktop environment. In this blog post, we will explore the features and benefits of Linux Lite and why it is a popular choice among Linux users and enthusiasts.

Easy Installation Process:

The installation process of Linux Lite is straightforward and easy to follow. After booting the ISO that you can download from the website, you boot into a live environment where you simply click the “Install Linux Lite” button and start the installer. Then you’re asked to erase the base disk for the partition layout. The distro is really made for people who aren’t advanced Linux admins, and it is very easy to use and personalize indeed. While entering and personalizing the login/password combination, the system copies the files in the background, so the time you click next, the installer has almost finished!

Familiar and Intuitive Interface:

Linux Lite offers a familiar and intuitive interface that makes it easy for new users to navigate. The distro is designed to be lightweight, which means it requires less resources than other Linux distributions, making it ideal for older hardware. Additionally, Linux Lite provides a long-term support and stability, which ensures that users can rely on the distro for an extended period.

Rich and Diverse Software Repository:

Linux Lite has a rich and diverse software repository that offers a wide range of applications for various tasks. The distro includes popular software such as Firefox, LibreOffice, and Thunderbird, among others. Additionally, the distro is compatible with other Linux applications, making it easy to customize and personalize according to individual preferences.

Advantages of Using Linux Lite:

There are several advantages of using Linux Lite over other Linux distributions. Some of these advantages include:

1. Lightweight: Linux Lite is designed to be lightweight, which makes it ideal for older hardware and low-end devices.

2. Easy to use: The distro offers a familiar and intuitive interface that makes it easy for new users to navigate.

3. Long-term support: Linux Lite provides long-term support and stability, ensuring that users can rely on the distro for an extended period.

4. Compatible with older hardware: The distro is designed to be compatible with older hardware, making it ideal for those who want to breathe new life into their old devices.

5. Rich software repository: Linux Lite has a rich and diverse software repository that offers a wide range of applications for various tasks.

Conclusion:

Linux Lite is a popular and user-friendly Linux distribution that offers a lightweight, easy to use, and compatible operating system for both new and experienced Linux users. The distro provides a long-term support and stability, and a rich and diverse software repository that makes it an excellent choice for anyone who wants to enjoy the benefits of Linux without sacrificing performance, functionality, or aesthetics. Whether you’re a new user looking for a simple and easy-to-use distro or an experienced user looking for a lightweight distro that is compatible with older hardware, Linux Lite is an excellent choice.

Exploring the Blockchain Revolution with @kiwi_si and @davidmdavis

The Future of Money: Understanding Blockchain, Cryptocurrency, and Mining

In recent years, the world has witnessed an explosion in the popularity of cryptocurrencies such as Bitcoin and Ethereum, and the underlying technology that powers them – blockchain. This innovative decentralized ledger system has the potential to disrupt a wide range of industries, from finance and banking to supply chain management and healthcare. However, with this newfound popularity comes a host of questions and concerns about the future of money itself. In this article, we’ll delve into the world of blockchain and cryptocurrency, exploring what they are, how they work, and what the future might hold for these emerging technologies.

What is Blockchain?

At its core, blockchain is a decentralized digital ledger that records transactions across multiple computers within a network. The term “blockchain” refers to the chain of blocks that contain this information, with each block representing a group of transactions. Each block is connected to the previous one through a unique code called a “hash,” creating an unalterable and transparent record of all transactions that have taken place within the network.

The key feature of blockchain technology is its decentralized nature, meaning that no single entity controls the data or transactions stored within the ledger. Instead, the network of computers within the blockchain ecosystem work together to validate and add new blocks to the chain, ensuring that all transactions are secure, transparent, and tamper-proof.

What is Cryptocurrency?

Cryptocurrency is a digital or virtual currency that uses cryptography for security and is decentralized, meaning it is not controlled by any government or financial institution. The most well-known cryptocurrency is Bitcoin, but there are many others, including Ethereum, Litecoin, and Monero, to name a few.

Cryptocurrencies use blockchain technology as their underlying infrastructure, leveraging the decentralized ledger system to record transactions and manage the creation of new units within the network. Unlike traditional fiat currencies, which are printed or minted by central banks and governments, cryptocurrencies are created through complex mathematical algorithms that require significant computational power to solve.

Mining: The Backbone of Cryptocurrency

One of the critical components of the blockchain ecosystem is mining, which is the process of validating transactions and adding them to the blockchain ledger. Miners use powerful computers to solve complex mathematical algorithms, known as “proof-of-work” (PoW) or “proof-of-stake” (PoS), which verify transactions and add new blocks to the chain.

Miners are rewarded for their efforts with a small amount of cryptocurrency, incentivizing them to continue validating transactions and maintaining the integrity of the blockchain network. Without mining, it would be impossible to validate transactions within the decentralized ecosystem, and the blockchain network would quickly become unreliable and vulnerable to fraud.

The Future of Money

As cryptocurrencies continue to gain traction and mainstream acceptance, many are beginning to question what this might mean for the future of money itself. Will traditional fiat currencies eventually be replaced by digital currencies? Could we see a shift towards decentralized banking and financial systems? Only time will tell, but one thing is certain – blockchain technology has the potential to revolutionize the way we think about money and financial transactions.

Conclusion

In conclusion, blockchain and cryptocurrency are two interconnected technologies that have the potential to transform the world of finance and beyond. Understanding these innovations is crucial for anyone looking to navigate the rapidly changing landscape of the digital economy. Whether you’re an investor, a business owner, or simply someone curious about the future of money, blockchain and cryptocurrency are worth paying attention to. As the space continues to evolve, we can expect to see new use cases emerge, new technologies arise, and potentially even a shift towards decentralized financial systems that put power back into the hands of the people.

Troubleshooting vCenter Single Sign-On Issues with Subject Alternative Names

Recently, we added some extra values to the Certificate Subject Alternative Name (SAN) for diversification in accessibility to the vCenter Server Appliance (vCSA). However, when trying to reach the vCSA by the new SAN value, we received an error message: “[400] An error occurred while sending an authentication request to the vCenter Single Sign-On server – An error occurred when processing metadata during vCenter Single Sign-On setup: the service provider validation failed. Verify that the server URL is correct and is in FQDN format, or that the hostname is a trusted service provider alias.”

To “solve” this issue, we can apply a workaround provided by VMware. The steps are as follows:

Step 1: Log into your vCSA through SSH and stop the vSphere UI

First, log in to your vCSA using SSH. You can use the following command to do so:

ssh [vCSA_IP]

Once you have logged in, run the following command to stop the vSphere UI:

sudo /etc/init.d/vsphere-ui stop

Step 2: Find the webclient.properties file and edit it

Next, find the webclient.properties file in the /usr/local/vmware/appliance/conf directory. You can use the following command to do so:

sudo find /usr/local/vmware/appliance/conf -name webclient.properties

Once you have found the file, edit it by removing the comment (#) in front of the line “sso.serviceprovider.alias.whitelist=” and adding the desired SAN values. Use comma separated if you want to add multiple names. For instance:

# sso.serviceprovider.alias.whitelist=vcenter,vsphere

sso.serviceprovider.alias.whitelist=vcenter,vsphere,new-san-value

Step 3: Save the file and start the vSphere UI

After editing the file, hit escape followed by :wq! to save the file. This will overwrite the previous version of the webclient.properties file with your changes.

Finally, start the vSphere UI by running the following command:

sudo /etc/init.d/vsphere-ui start

Step 4: Test the login process (optional)

If you still run into problems logging in after making the above adjustments, it could help to clear your browsing data (history, cookies, cache etc). You can do this by using a privacy-focused web browser such as Brave or DuckDuckGo.

That’s it! With these steps, you should now be able to log in to your vCSA with the new SAN value. Note that the login process may take a while to finish after making the adjustments. If you still encounter issues, clearing your browsing data as mentioned above may help.

It’s important to note that this workaround is only temporary and should be used with caution. The permanent solution is to update the vCenter Server Appliance to the latest version, which includes a fix for this issue. VMware has acknowledged this issue and has provided a fix in the latest version of the vCenter Server Appliance. Therefore, it is recommended to update your vCSA as soon as possible to avoid any further issues.

NSX ALB Virtual Service Migrator Update

NSX ALB Virtual Service Migrator v1.2: Cutover and Removal of Prefixes

In this article, we will discuss the usage of NsxAlbVirtualServiceMigrator v1.2 to migrate virtual services from one NSX-T cloud to another. We will cover the cutover and removal of prefixes processes.

Prerequisites

Before proceeding with the migration process, ensure that you have already performed the following tasks:

* Set up the source and target NSX-T clouds

* Configured the same IP address space for both clouds

* Created a replica of the source virtual services in the target cloud

* Migrated the virtual services using NsxAlbVirtualServiceMigrator v1.2

Cutover Process

Once the migration is successful, we need to perform a cutover to switch over to the migrated virtual services. To do this, follow these steps:

* Disable the existing virtual services in the source cloud

* Enable the migrated virtual services in the target cloud

* Ensure that all traffic is directed to the migrated virtual services

Removal of Prefixes

After the cutover, we need to remove the prefixes appended to the objects during migration. To do this, follow these steps:

* Run NsxAlbVirtualServiceMigrator v1.2 in remove_prefix mode

* Select the run ID of the migration job

* Wait for the job to complete

* Review the output file to ensure that there are no errors

Cleanup Process

If at any stage of the migration process, we need to perform a cleanup of the migrated objects (either because the tool encountered an error or because the post-migration validation failed), we can run the tool in cleanup mode. To do this, follow these steps:

* Run NsxAlbVirtualServiceMigrator v1.2 in cleanup mode

* Select the run ID of the migration job

* Wait for the job to complete

* Review the output file to ensure that there are no errors

Conclusion

In this article, we have covered the cutover and removal of prefixes processes of NsxAlbVirtualServiceMigrator v1.2. We have also discussed the cleanup process in case of any errors or validation failures during the migration process. With these processes in place, you should now be able to successfully migrate your virtual services from one NSX-T cloud to another.

Hari Krishnan is the author of this article and has extensive experience with NSX-T. If you have any questions or feedback, please reach out to him at hari@vxplanet.com.

Mastering the Art of Troubleshooting Stuck TMC Self-Managed Deployments in VCD

Troubleshooting a Stuck TMC Self-Managed Deployment in VCD

As a follow-up to my previous blog post on the VCD Extension for Tanzu Mission Control, I would like to share some troubleshooting tips for when your self-managed deployment gets stuck during configuration. Specifically, I will discuss how to resolve issues that arise when passing an incorrect value for the DNS zone, leading to a stuck deployment that does not terminate automatically.

Background

———-

In my previous post, I covered the end-to-end deployment steps for TMC self-managed in VCD. During configuration, I made a mistake by passing an incorrect value for the DNS zone, which led to a stuck deployment that did not terminate automatically. After waiting for a couple of hours, I realized that the task was still running and preventing me from installing it with the correct configuration.

Symptoms

———-

On checking the pods in the tmc-local namespace, I found that many of them were stuck in either ‘CreateContainerConfigError’ or ‘CrashLoopBackOff’ states. Additionally, when I checked the failed task ‘Execute global ‘post-create’ action,’ I noticed that the installer was complaining about the tmc package installation reconciliation failure.

Causes and Resolution

———————–

After discussing the problem with the Engineering team, we determined that this is a known issue with the solution addon agent in VCD. The subtask timed out after 2 hours, but the task status was not updated because VCD killed its agent and uses a fixed time of 2 hours for addon agents. To resolve the issue, we need to set a smaller timeout value when creating the TMC instance, for example, 5400s.

Steps to Resolve

——————-

To troubleshoot and resolve this issue, follow these steps:

1. (Optional) Export Environment Variables: Before running the below commands in a production environment, consult the GSS team. You can export the environment variables to check if there are any issues with the DNS zone or other configuration settings.

2. Generate VCD Auth Token: To generate a VCD auth token, run the following command:

“`

vcd authentication generate

“`

3. Retrieve the TMC-SM RDE: To retrieve the TMC self-managed (SM) resource definition exchange (RDE), run the following command:

“`

vcd tmc-sm rde retrieve

“`

4. Mark the TMC-SM Instance as Failed: To mark the TMC-SM instance as failed, run the following command:

“`

vcd tmc-sm instance fail –name

“`

5. Forcefully Fail the TMC-Sm Instance: After forcefully failing the TMC-SM instance, the deletion went fine, and the instance was cleaned.

Conclusion

———-

In this blog post, I discussed how to troubleshoot a stuck TMC self-managed deployment in VCD when configuration fails due to an incorrect DNS zone value. By understanding the known issue with the solution addon agent in VCD, setting a smaller timeout value, and following the steps outlined above, you can resolve this issue and successfully deploy TMC self-managed in VCD.

Stay tuned for my next post, where I will discuss another troubleshooting scenario that I encountered in my lab. Feel free to share this on social media if it is worth sharing. Don’t forget to subscribe to this blog by providing your email address below to receive notifications of new posts by email.

Unlocking Networking and Security Convergence

The provided text is the third part of a series of blog posts on NSX-T integration with VMware Cloud Director (VCD). The current post covers the following topics:

1. Changing the network interfaces of VM-1 and VM-2 to Segment-C, which was created in the previous section.

2. Manual failover of VM-1 from Tenant-A-vAPP to Tenant-B-vAPP.

3. Verifying the IP connectivity between VM-1 and VM-2 belonging to the same Provider VDC.

4. Checking the network topology in NSX-T and reviewing the configuration.

The author has also provided a summary of the previous parts of the series and has mentioned that in the next series, they will configure micro-segmentation in VCD using NSX-T. Additionally, the author has included information about their background and experience in VMware and networking technologies.