Solved

Tools to quickly create vSwitch networks and bulk assign VMs to Resource Pools/VM Folders

Posted on 2014-04-04
1
482 Views
Last Modified: 2014-04-07
Hey folks,

I just recently migrated a 10-node cluster over to a new datacenter using a brand new database. I finished up most of the vCenter cluster configuration manually, but we have a ton of VMs and Template folders and many VMs that need to be assigned to resource pools. I also plan to eventually upgrade the hosts from scratch, which will entail also rebuilding the vSwitches.

We don't run Enterprise Plus just yet, so Host profiles and vDS would be the obvious place to start. But I believe a kick starter script during the install may work if it can also do vSwitch configuration (which I don't think is the case). And for the resource pools and VM folders, there isn't a way to do bulk adds instead of manually selecting one VM at a time and moving them to the appropriate pool/folder?

Thanks
0
Comment
Question by:kj_syence
1 Comment
 
LVL 117

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
ID: 39978814
The only tools to aid you and help you are using scripts and Powershell.

This is what we use to complete automated tasks quickly, rather than using the GUI.

I would recommend using the following, also VMware recommends the use of PowerCLI, which is PowerShell interface with vSphere-specific additions.

http://communities.vmware.com/community/vmtn/server/vsphere/automationtools/powercli

One of the simplest PowerCLI examples, and something which is actually extremely useful on its own, is the Get-VM cmdlet. Which lists VMs.

PowerCLI can be a bit overwhelming to use,  But it can be enhanced with a nice toolset and a library of preconfigured scripts to jump-start your mass changes, which is possible with PowerGUI

http://powergui.org/index.jspa

and

VMware Community Pack

http://www.virtu-al.net/featured-scripts/vmware-powerpack/
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

#Citrix #XenApp #Citrix Scout #Citrix Insight Services #Microsoft VMMAP #Microsoft ADEXPLORE #Microsoft RAMMAP #Microsoft TCPVIEW #Microsoft AUTORUNS #Microsoft PROCESS EXPLORER #Microsoft PROCESS MONITOR
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now