[Release] Project Magpie for NSX

Getting started with Project Magpie

The original launch post can be found here.

Project Magpie’s goal is to provide an OVA based appliance that will serve as a framework for various tools to support operation and management of VMware NSX deployments.

Get started with Magpie today over at Github.

The instructions are straightforward. Download and install the OVA. I am using Fusion. From there, these simple gifs step through what is required.

The Setup

  1. Using root/changeme log in to the appliance
  2. Change the password as prompted.
  3. Retrieve the IP address allocated to the Magpie VM.

 

Using Magpie

Once Magpie is setup it is time to use it.

  1. Using root/changeme log in to the appliance
  2. Change the password as prompted.
  3. Retrieve the IP address allocated to the Magpie VM.

Dynamic documentation

PSdocs forms the basis of the documentation. PSdocs generates HTML output for each cmdlet equipment to running get-help new-nsxedge -full.

This means administrators have the full documentation at their fingertips in a browsable format.

 

SSH access

SSH access can be used for PowerNSX/PowerCLI. This provides access to PowerNSX/PowerCLI for the users of Magpie.

 

Multi-user support.

Magpie supports multiple web and powernsx users. This means numerous administrators can use Magpie simultaneously. Running create_powernsx_user <username> will create a user and present a password prompt.

Using `set_powernsx_user_pass <username> will start a password reset process. These actions are performed via SSH.

In summary

The ‘Multi Access General Purpose Infrastructure Explorer’ is specifically designed to be modular, allowing new tools to be rapidly integrated into Magpie in future releases.

Today’s release is ‘MVP’ (Minimum Viable Product) but the team is sitting on some great plugins that will launch as soon as they are ready. Watch this space!

Contain yourself PowerNSX, please!

Recently, PowerNSX was released to work with PowerShell Core. This was a substantial undertaking from Nick Bradford to submit some pull requests to PowerShell Core, create a new method of handling web requests, and then wholesale adjusting PowerNSX to work.

Now that this groundwork has been done PowerNSX can be added into the VMware docker image that contains PowerCLI core. William Lam detailed the container release here

docker run --rm -it --entrypoint='/usr/bin/powershell' vmware/powerclicore

This will allow docker to run the image vmware/powerclicore and drop the current shell into the directory /usr/bin/powershell.

To import PowerNSX run the command import-module PowerNSX and you’re cooking with gas. Time to connect to my NSX Manager.

PS /powershell> Connect-NsxServer 192.168.120.25 -Username admin -Password default -DisableVIAutoConnect

Version : 6.3.0
BuildNumber : 4637061
Credential : System.Management.Automation.PSCredential
Server : 192.168.120.25
Port : 443
Protocol : https
ValidateCertificate : False
VIConnection :
DebugLogging : False
DebugLogFile : \[email protected]_01_04_02_16_00.log

And a quick command to verify everything is working as expected.

PS /powershell> Get-NsxSecurityTag | select name

name
----
pester_st_testtag1

Now you can have PowerCLI and PowerNSX on any device any where. Happy days!