Lesson 1Data Cataloging and Normalization: Building Spreadsheets or CMDB Entries, Tagging Strategy for Migration PrioritizationExplore how fi catalog servers, applications, an' data into structured inventories or CMDBs. Learn normalization, naming, an' tagging strategies dat support migration waves, ownership tracking, an' post-migration governance in AWS, yuh see.
Designing inventory spreadsheets and CMDB fieldsNormalizing application and system namingDefining ownership, criticality, and SLA attributesCreating AWS-aligned tagging taxonomiesTagging for migration waves and prioritizationLesson 2Two Discovery Tools Researched: AWS Application Discovery Service and VMware vRealize Network Insight — How to Use Each for Inventory, Dependency Mapping, and Export FormatsDive into AWS Application Discovery Service an' VMware Aria Operations for Networks. Learn setup, data collection, dependency mapping, an' export formats fi feed AWS Migration Hub an' downstream planning tools, mon.
Configuring AWS Application Discovery ServiceCollecting agentless and agent-based ADS dataSetting up VMware Aria Operations for NetworksBuilding dependency maps and flow visualizationsExporting inventories to AWS Migration HubLesson 3Interview Guide for Stakeholders: App Owners, DBAs, Network, Security, Operations, Business StakeholdersDevelop a structured interview guide for technical an' business stakeholders. Learn which questions fi ask app owners, DBAs, network, security, an' operations teams fi uncover hidden dependencies an' migration constraints, yuh know.
Identifying key technical and business stakeholdersPreparing role-specific interview question setsRunning effective discovery workshops and sessionsValidating findings with follow-up interviewsDocumenting decisions, risks, and open issuesLesson 4Storage and I/O Characteristics: Datastore Types, IOPS, Throughput, Shares, Deduplication, Backup SchedulesUnderstand storage an' I/O characteristics dat influence AWS design. Learn fi document datastore types, performance profiles, deduplication, an' backup schedules fi choose suitable EBS, EFS, or FSx options an' policies, irie.
Classifying datastore and array types in useMeasuring IOPS, throughput, and latency profilesIdentifying storage tiers, QoS, and share settingsDocumenting snapshots, backups, and retentionMapping storage needs to AWS storage servicesLesson 5Collecting Server and VM Inventory: CPU, Memory, Storage, OS Versions, VM Tools, SnapshotsLearn how fi collect detailed server an' VM inventory from VMware an' guest OSs. Catch CPU, memory, storage, OS versions, tools, an' snapshots fi support right-sizing, compatibility checks, an' migration planning to AWS, seen.
Gathering CPU, memory, and NUMA informationCapturing disk layout, datastore, and capacity dataRecording OS versions, editions, and patch levelsIdentifying VMware Tools status and versionsDetecting snapshots and orphaned VM artifactsLesson 6Application and Tier Dependencies: Web, App, DB Processes, Inter-Host Ports, Service MapsLearn how fi identify an' document application tiers an' dem dependencies across web, application, an' database layers. Understand ports, protocols, an' service maps required fi safely re-platform workloads into AWS, yuh hear.
Identifying web, app, and database tiersDocumenting inter-tier ports and protocolsBuilding end-to-end service dependency mapsDetecting hidden batch jobs and background tasksCapturing external third-party service callsLesson 7Operational Procedures and Runbooks: Backup/Restore, Patching, Deployment, Escalation PathsReview existing operational procedures an' runbooks dat keep workloads healthy on-premises. Translate backup, patching, deployment, an' escalation practices into requirements an' constraints for AWS landing zones an' operations, mon.
Cataloging backup and restore proceduresDocumenting patching and maintenance workflowsCapturing deployment and release processesUnderstanding monitoring and alerting runbooksMapping escalation paths and on-call rotationsLesson 8Network Topology and Connectivity: VLANs, Subnets, Routing, Firewalls, NAT, Load BalancersUnderstand how fi document current network topology, including VLANs, subnets, routing, an' security layers. Learn how dis information informs AWS VPC design, connectivity options, an' security group an' NACL strategies, irie.
Mapping VLANs, subnets, and IP address rangesDocumenting routing, VRFs, and default gatewaysCapturing firewall, NAT, and ACL configurationsIdentifying load balancers and VIP dependenciesRelating on-prem networks to AWS VPC designLesson 9Assumptions to State Explicitly When Gaps Exist: Sample Load, Unavailable Metrics, Maintenance Windows, Licensing ConstraintsLearn how fi document an' communicate assumptions when discovery data is incomplete. Catch sample loads, missing metrics, maintenance windows, an' licensing constraints fi manage risk an' stakeholder expectations, yuh see.
Identifying missing or unreliable data areasDefining traffic and load sampling assumptionsStating maintenance and outage window limitsCapturing licensing and support constraintsRecording risks and validation follow-upsLesson 10Scripts and Manual Techniques: PowerCLI, govc, vSphere API Calls, Linux/Windows Commands to Collect ConfigurationLearn scripts an' manual techniques fi extract VMware an' OS configuration when tools are limited. Use PowerCLI, govc, vSphere APIs, an' OS commands fi build reliable inventories an' validate automated outputs, seen.
Using PowerCLI to export VM configurationLeveraging govc and vSphere REST APIsRunning Linux commands for system inventoryRunning Windows commands for system inventoryValidating manual data against tool outputsLesson 11Database Specifics: Engine, Version, Schema Size, Transaction Rates, Replication, Maintenance WindowsFocus on database-specific discovery across engines an' platforms. Catch engine type, version, schema size, transaction rates, an' replication fi inform AWS database service choices an' migration strategies, mon.
Cataloging database engines and versionsMeasuring schema size and growth trendsCapturing transaction and query rate metricsDocumenting replication and HA configurationsIdentifying maintenance and backup windowsLesson 12Usage and Performance Metrics: CPU/Memory Utilization, Latency, Throughput, Peak Patterns, Retention WindowsLearn how fi collect an' interpret usage an' performance metrics for VMware workloads. Use CPU, memory, I/O, an' latency data fi right-size AWS instances, plan storage performance, an' understand peak an' seasonal patterns, irie.
Identifying authoritative metric data sourcesCapturing CPU and memory utilization baselinesMeasuring disk IOPS, throughput, and latencyAnalyzing network throughput and connection countsDetecting peaks, seasonality, and retention needsLesson 13Third-Party Tool Options Overview: Cloudamize and Turbonomic Use Cases for TCO, Sizing, and Migration PrioritizationReview third-party discovery an' optimization tools such as Cloudamize an' Turbonomic. Understand dem strengths for TCO analysis, sizing, an' migration prioritization, an' how fi integrate outputs into AWS plans, yuh know.
Cloudamize capabilities and data collectionTurbonomic workload optimization featuresComparing sizing recommendations across toolsUsing tools for TCO and cost modelingExporting results into migration backlogsLesson 14Security and Compliance Artifacts: ACLs, Firewall Rules, Encryption, Logs, Audit Trails, Identity StoresDiscover how fi inventory security an' compliance artifacts dat affect migration. Document ACLs, firewall rules, encryption, logging, an' identity stores fi design secure AWS landing zones an' control mappings, seen.
Cataloging firewall rules and security zonesDocumenting ACLs, security groups, and NACLsIdentifying encryption methods and key custodyReviewing logging, SIEM, and audit requirementsMapping identity stores and access modelsLesson 15Discovery Methods and Evidence Sources: Agentless Queries, Hypervisor APIs, SNMP, Syslogs, Perf Counters, InterviewsExplore discovery methods an' evidence sources for VMware environments. Compare agentless scans, hypervisor APIs, SNMP, logs, an' interviews, an' learn how fi combine dem into a repeatable, auditable discovery process, mon.
Using vCenter and hypervisor API integrationsLeveraging agentless OS and network scansCollecting SNMP, syslog, and perf counter dataCorrelating logs with configuration evidenceCombining automated discovery with interviews