Cisco Discovery Protocol

Cisco Discovery Protocol Cisco Discovery Protocol (CDP) allows ESX administrators to determine which Cisco switch port is connected to a given vSwitch. When CDP is enabled for a particular vSwitch, you can view properties of the Cisco switch (such as device ID, software version, and timeout) from the vSphere Client. Enable CDP on an ESX…

Read more

Introduction to Virtualization

Virtualization is the process of creating virtual versions of physical components,such as servers, storage devices and network devices. Virtualization servers as an effective way to reduce IT expenses while boosting efficiency and agility-not just for large enterprises, but also for small and midsize businesses. With Virtualization, you can run multiple operating systems and applications on…

Read more

How to deploy OVF Template

How to deploy OVF Template Login to the vSphere Client and click on File and select Deploy OVF Template. It will prompts “browse to the path containing the OVA file.” and select the path where OVA exists. The OVF template details will shown in the next window. Accept the agreement, then click Next. Give the…

Read more

Location of vCenter Server Logs

Location of vCenter Server Logs: The vCenter Server log files are on the vCenter Server system: •      Location for vCenter Server on Windows 2008/2012: – %ALLUSERSPROFILE%\VMWare\vCenterServer\logs •     Location for VMware vCenterTM Server ApplianceTM: – /var/log/vmware/ Subdirectories exist for vCenter Server components, such as vCenter Service, VMware vCenterTM Single Sign-OnTM, vCenter Inventory…

Read more

Various types of RAM

Dynamic RAM (DRAM) DRAM is a classic form of RAM and has since been replaced by the faster and less expensive SDRAM. DRAM stores data electrically in a storage cell and refreshes the storage cell every few milliseconds. Extended Data-Out RAM (EDO RAM) EDO RAM is faster than DRAM. EDO RAM has also been replaced…

Read more

Why Windows Crashes

Why Windows Crashes Windows crashes (i.e.: stops executions and displays the blue screen) for many different reasons: a reference to a memory address that causes an access violation, an unexpected exception or trap, a faulting kernel mode driver and so on. Blue screen: when the system encounters a hardware problem, data inconsistency, or similar error,…

Read more

Organizational Unit

Organizational Unit Organization unit provides the ability to organize the network in a logical manner and the physical structure of the network . Active Directory uses a special container known as an OU’s to organize the objects within a domain for the purpose of administration. OU’s can be used to split a domain into administrative…

Read more

Consolidating snapshots

Consolidating snapshots for a virtual machine When you initiate a Delete or DeleteAll operation on snapshots, the snapshot is immediately deleted from Snapshot Manager, then the backing Virtual Machine Disk .vmdk files are consolidated on-disk. If the consolidation fails, some Virtual Disk files may remain on disk and/or be actively used on the Datastore, consuming storage capacity.…

Read more

Differences between ESX and ESXi

  Capability VMware ESX VMware ESXi Service Console Service VMware Console is a standard Linux environment through which a user has privileged ESXi is like a computing appliance. access to the VMware ESX kernel. VMware ESXi behaves more like firmware than traditional software. This Linux-based privileged access allows you to manage your VMware ESXi does…

Read more

VMware ESXi Hypervisor

VMware ESXi Hypervisor The core of the vSphere product suite is the hypervisor, which is the virtualization layer that serves as the foundation for the rest of the product line. In vSphere 5 and later, including vSphere 5.5, the hypervisor comes in the form of VMware ESXi. Long-time users of VMware vSphere may recognize this…

Read more

Bug Check Code Reference

To find the DRIVER_POWER_STATE_FAILURE Error and It’s details, Please click here and below are some Bug Check Code Reference. Bug Check Code Reference Code Name 0x00000001 APC_INDEX_MISMATCH 0x00000002 DEVICE_QUEUE_NOT_BUSY 0x00000003 INVALID_AFFINITY_SET 0x00000004 INVALID_DATA_ACCESS_TRAP 0x00000005 INVALID_PROCESS_ATTACH_ATTEMPT 0x00000006 INVALID_PROCESS_DETACH_ATTEMPT 0x00000007 INVALID_SOFTWARE_INTERRUPT 0x00000008 IRQL_NOT_DISPATCH_LEVEL 0x00000009 IRQL_NOT_GREATER_OR_EQUAL 0x0000000A IRQL_NOT_LESS_OR_EQUAL 0x0000000B NO_EXCEPTION_HANDLING_SUPPORT 0x0000000C MAXIMUM_WAIT_OBJECTS_EXCEEDED 0x0000000D MUTEX_LEVEL_NUMBER_VIOLATION 0x0000000E NO_USER_MODE_CONTEXT 0x0000000F SPIN_LOCK_ALREADY_OWNED…

Read more

Active Directory Domain Services

Active Directory Domain Services 1. Identify the Hardware and Software requirements 2. Install Windows Server 2008/2008 R2/2012 3. Configure appropriate TCP/IP and DNS server addresses. 4. Verify that a Domain Name System (DNS) infrastructure is in place. 5. Designing of Active Directory Logical structure • Create a Forest Design • Create a Domain design for…

Read more

Memory Balloning

Memory Balloning When ESXi host memory is overcommitted and scarce, ESXi may force a guest operating system to relinquish some of its memory so that it can be used by other virtual machines. This is accomplished in the guest operating system by using the VMware Tools-installed vmmemctl driver to force memory pages to the guest…

Read more

System State backup error

Query:    Active backup destination: File Media name: “Small Business Server Backup (02).bkf created 03/10/2009 at 06:37” Volume shadow copy creation: Attempt 1. “Registry Writer” has reported an error 0x800423f4. This is part of System State. The backup cannot continue. Error returned while creating the volume shadow copy:800423f4 Aborting Backup. ———————- The operation did not successfully…

Read more

ESXi Partition

ESXi 5.0, the system creates at least five partitions whose size and layout the user cannot control. Bootpartition (4 MB): This partition is needed for booting Bootbank (250 MB): The compressed boot image is saved on this FAT partition. It will be extracted during the boot process and loaded into the system memory. At the…

Read more

Disabling VAAI using the vSphere Client

Disabling VAAI using the vSphere Client To disable VAAI using the vSphere Client: Open the VMware vSphere Client. In the Inventory pane, select the ESXi/ESX host. Click the Configuration tab. Under Software, click Advanced Settings. Click DataMover. Change the DataMover.HardwareAcceleratedMove setting to 0. Change the DataMover.HardwareAcceleratedInit setting to 0. Click VMFS3. Change the VMFS3.HardwareAcceleratedLocking setting…

Read more

Difference between ESX and ESXi

  Capability ESX ESXi ServiceConsole Present Removed Troubleshootingperformed via Service Console ESXi Shell ActiveDirector Authentication Enabled Enabled SecureSyslog Not Supported Supported ManagementNetwork Service Console Interface VMkernel Interface JumboFrames Supported Supported HardwareMontioring 3 rd Party agents installed inService console Via CIM Providers Bootfrom SAN Supported in ESX Supported in ESXi Softwarepatches and updates Needed as similar…

Read more

Virtual Center Default roles

  Roles Description NoAccess Cannot view orchange the assigned object.vSphere Client tabs associated with an object appear without content.Can be used to revoke permissions that would otherwise be propagated to anobject from a parent object.Available in ESX/ESXi and vCenter Server. ReadOnly View the stateand details about the object.View all the tab panels in the vSphere…

Read more

VMware Index

Index: 1.What is VM, VM files and Key Properties. 2. ESXi Architecture 3. Minimum H/W Requirements and Partition table 4. Pre and Post Installation steps for ESX 5. Vsphere – Managing of ESX 6. Virtual Center and It’s Features Features: a. Snapshot b. Template and clone C. VMotion and SV Motion d. HA and DRS…

Read more

WSUS Windows Server Update Services

WSUS (Windows Server Update Services): Purpose and Scope Effective patch management is a crucial factor in any IT organization’s change control and security practices.  This document serves as a procedural guide to standardize how patches are managed and applied to all servers managed using WSUS software.The procedures documented below not only provide the benefit of…

Read more

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP, computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user…

Read more

Domain Naming service(DNS)

DNS (Domain Naming service): It resolves hostname to IP address and IP address to hostname (Vice versa). Zones: Zones are categorized in one of 2 categories. Forward lookup zone — DNS servers maps FQDNs to IP address ii.Reverse lookup zone — DNS Servers maps IP address to FQDNs. (FQDN- Fully Qualified Domain name) Zone types:…

Read more

Password Recovery

Windows Password Recovery Download the Offline Windows Password and Registry Editor at http://pogostick.net/~pnh/ntpasswd/bootdisk.html . In the download section download the zipped file that contains the bootable CD image in ISO format. Copy the ISO image to one of the datastores on the host that the VM is on. In Vcenter right click on your VM,…

Read more

AD Port Details

Protocol and Port AD and AD DS Usage Type of traffic TCP and UDP 389 Directory, Replication, User and Computer Authentication, Group Policy, Trusts LDAP TCP 636 Directory, Replication, User and Computer Authentication, Group Policy, Trusts LDAP SSL TCP 3268 Directory, Replication, User and Computer Authentication, Group Policy, Trusts LDAP GC TCP 3269 Directory, Replication,…

Read more

VSS writers are not listed when you run vssadmin list writers

Issue: VSS writers are not listed when you run vssadmin list writers. Cause: This issue occurs registry data type for the TypeLib setting is incorrect. Procedure to fix the issue: 1. Type command regedit . Locate and then click the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem\{26c409cc-ae86-11d1-b616-00805fc79216}\EventClasses\{FAF53CC4-BD73-4E36-83F1-2B23F46E513E}-{00000000-0000-0000-0000-000000000000}-{00000000-0000-0000-0000-000000000000} Locate the TypeLib registry value. NOTE: The registry type of TypeLib should be shown…

Read more

Angular4 Material Setup

Creating a project with Angular4 Material from beginning on wards: Create a new project >ng new hg_material1 Once command has entered then navigate to hg_material1 folder and open in any IDE. Here am working on Visual studio code IDE. >cd hg_material1 Now Install the dependencies by following through below command: > npm install –save @angular/material…

Read more

Security Update for Microsoft Silverlight (KB3126036)

Security Update for Microsoft Silverlight (KB3126036) This security update to Silverlight includes fixes outlined in Security update KB3126036. Version: Hyaking_Image_silverlight-logo 5.1.41212.0 File Name: 41212.00\Silverlight.dmg 41212.00\Silverlight.exe 41212.00\Silverlight_Developer.exe 41212.00\Silverlight_Developer_x64.exe 41212.00\Silverlight_x64.exe This security update to Silverlight includes fixes outlined in Security update KB3126036. Non-security related changes are also included in this release and have been documented in the…

Read more

Hide the Display Background Page

  Hide the Display Background Page (All Windows)  This option hides the background page stopping users from changing any background display settings. Open your registry and find or create the key below. Create a new DWORD value, or modify the existing value, called “NoDispBackgroundPage” and set it according to the value data below. Exit your…

Read more

IPv6 Advantages

IPv6 Advantages ICANN – Internet Corporation for assigned network numbers (IPv6) IPv4 for AINA – Assigned  Internet network authorative. Address Assignment Features: IPv6 address assignment allows eaiser renumbering dynamic allocation and recovery of address with nice feature for mobile devices to move around and  keep their IP Address. Aggregation: IPv6 use address space makes for…

Read more

Page Fault in Nonpaged Area

Page Fault in Nonpaged Area Are you following error message on a blue screen? STOP 0x00000050 – PAGE_FAULT_IN_NONPAGED_AREA PAGE_FAULT_IN_NONPAGED_AREA “Page fault in nonpaged area” is the error message for the 0x50 stop error on a Windows PC. But what does that mean? At its most basic, the error means that your PC asked for a…

Read more

Edit the TCP/IP hosts File

Click the Windows Start button in the lower left corner. In the “Search Programs and Files” field, type “explorer.exe” and press Enter.  This should start Windows Explorer. In Windows Explorer, navigate to the directory titled c:\windows\system32\drivers\etc\. Right-click on the “hosts” file and select Properties. Uncheck “read-only” and select OK. Edit the file (this requires Administrator…

Read more

Drivers Signing

Drivers Signing On the Start menu, click Control Panel. In the Control Panel window, click the Performance and Maintenance link. From the Or Pick a Control Panel Icon area, click the System link. In the System Properties dialog box, click the Hardware tab. Windows device drivers and operating system files have been digitally signed by…

Read more

Disk Cleanup

Disk Cleanup On the Start menu, select All Programs, choose Accessories, select System Tools, and then click Disk Cleanup. The Disk Cleanup program is used to free up space by files that are no longer being used in the hard drive. In the Disk Cleanup dialog box, click the Disk Cleanup tab. In the Files…

Read more

Monitoring Disk Activity

Monitoring Disk Activity On the Start menu, select All Programs, choose Administrative Tools*, and click Performance. In the Performance window, click the Add button on the toolbar in the graph area. In the Add Counters dialog box, select either the Use Local Computer Counters or the Select Counters From Computer radio button to determines where…

Read more

FSMO Roles

FSMO Role Description Schema Master The schema master role belongs to only one domain controller in the entire forest. The schema is simply a schematic, or blueprint, of all Active Directory objects and their attributes. The schema determines what kinds of objects can be stored in the directory and what attributes define those objects. Any…

Read more

Windows Media Encoder Desktop Experience Component Not Installed

Windows Media Encoder Desktop Experience Component Not Installed To install the Windows Media Encoder Desktop Experience component by using the Windows Server 2008 Server Manager Click Start, click Administrative Tools, and then click Server Manager. In the left navigation pane, click Features, and then right click and select Add Features. On the Select Features pane, select…

Read more

Windows Backup

Backups There are two types of Backups. User State Backup System State Backup    1.  User State Backup: Again there are 5 types. Normal Backup Incremental Backup Differential Backup Copy Backup Daily Backup Normal Backup: It is preferred if you are taking the backup of files and folders for the first time. It is independent…

Read more

Changing the thick or thin provisioning of a virtual disk

Changing the thick or thin provisioning of a virtual disk [highlight bgcolor=”#f7f7f7″]To change the provisioning of a virtual machine base disk from thin to thick from the Datastore Browser:[/highlight]Power off the virtual machine. In vSphere Client, right-click the virtual machine in the inventory. Click Edit Settings to display the Virtual Machine Properties dialog box. Click…

Read more

vMotion fails at 10% with the error

vMotion fails at 10% with the error: Operation timed out When you attempt to use vMotion to migrate a virtual machine, the task fails at 10%. In virtual machine’s vmware.log file, you see these errors:vmx| MigrateStatusFailure: Now in new log file. vmx| MigrateStatusFailure: Timed out waiting for migration start request. In the source ESXi/ESX host’s…

Read more

How to reset password for the Vsphere local user

How to reset password for the Vsphere local user – administrator@vsphere.local 1. Log in to the vCenter Server with a domain administrator account. 2. Open an elevated command prompt. 3. Run c:\Program Files\VMware\Infrastructure\VMware\CIS\vmdird\vdcadmintool.exe. 4. Press 3 to enter the Reset account password option. 5. When prompted for the Account DN, enter: cn=Administrator,cn=users,dc=vSphere,dc=local 6. A new…

Read more

Interview Questions on Vmware

1. What is a Hypervisor? A: It is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host’s processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system…

Read more

New Features in vSphere 6.5

vCenter Migration Tool Improved appliance management Native high availability Native backup and restore HTML5-based vSphere Client Improved Appliance Management VMware vCenter High Availability Improved vSphere Web Client vCSA includes vSphere Update Manager Improved Host Profiles Improved Auto Deploy VMware Tools version now showen in client Security Virtual Machine Encryption Encrypted vMotion Secure Boot Support VM…

Read more

vCenter and ESXi upgrade process

vCenter and ESXi upgrade process Pre requisites: Need to take Backup for Vcenter server DB, Host and License part. Download the latest vSphere 5.x and esxi 5.x on vCenter server Procedure: Install a local Microsoft SQL Server 2008 R2 Express instance / using an existing supported database go to Simple Install Stop the Virtual Center…

Read more

Procedure to reset the Administrator password for Windows Server

Procedure to reset the Administrator password for Windows Server Procedure for resetting the Administrator password for Windows Server: Download the Gparted live(gparted-live-0.29.0-1-i686.iso) from website https://gparted.org/download.php Right click on VM—Edit Settings Map the  .iso file to the VM. Boot the Server with the iso file. 5. Continue the boot. 6. Select “don’t touch keymap” and press…

Read more

VMware ESXi address side-channel analysis due to speculative execution

VMware ESXi, Workstation and Fusion updates address side-channel analysis due to speculative execution. “Spectra and Meltdown” are also know as “side-channel analysis due to speculative execution.” Bounds-Check bypass and Branch Target Injection issues CPU data cache timing can be abused to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual…

Read more

Cloud Computing

Cloud Computing Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example network, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Formal definition of Cloud computing as proposed by NIST (National Institute…

Read more

Software testing

Software testing is the process used to assess the quality of computer software. Testing is a process of exercising or evaluating a system or system component by manual or automated means to verify that it satisfies specified requirements. Software testing is divided into two parts : 1) Functional testing 2) Non Functional testing Software Development…

Read more

Web Console Installation for SCOM

Web Console Installation for SCOM Prerequisites: Microsoft IIS services are required for both Reporting and SCOM Web console installation. If your server is Windows 2008, then follow the below procedure to enable the IIS services. Installation Steps: On your installation media, start exe. This starts the System Center Operations Manager 2007 R2 Setup on the Start…

Read more

SCOM reporting component installation

SCOM reporting component installation On your installation media, start exe. This starts the System Center Operations Manager 2007 R2 Setup on the Start page. 2. Under the Prepare heading, click Check Prerequisites to start the Prerequisite Viewer. 3. In the Components box, select the Reporting component, and click Check. 4. When you are done with the…

Read more

Install Base Management Packs

Install Base Management Packs Overview: This section provides the path to obtain latest Management Packs (MP), download, Install and importing MP procedure. Where can I get the latest MPs? All the updated management can be found in the below location. You can select based on your Operations Manager version which is shown in the below…

Read more

Following are the contents to Install the SCOM

To Install the SCOM , following are the contents Overview Prerequisites Hardware Configuration (Recommended) Software Configuration (Recommended) Service Accounts Bits Location SQL Server 2008 SP1 installation Overview Requirements Prerequisites Steps to install SQL Server SCOM Installation Overview Prerequisites Check prerequisites for RMS installation Installing RMS Backup the Encryption key POST Installation Steps Overview POST Installation…

Read more

SCOM Installation and Configuration

SCOM Installation and Configuration The below installation procedure will install SCOM components (RMS), Operations Manager DB. The root management server (RMS) is the only management server in a management group that runs the System Center Data Access (previously named the SDK service) and the System Center Management Configuration (previously named the config service) services, and…

Read more

Installation of SQL Server for SCOM

Installation of SQL Server for SCOM Overview The below configuration and installation steps are aimed for All-in-One server installation of SCOM, SQL and Reporting components. Hardware Configuration (Recommended): Intel(R) Xeon (R) CPU 2.33 Ghz or above (2 Processors and 64 bit Server) 32 GB RAM 2 TB Hard Drive Software Configuration (Recommended): Microsoft Windows 2008…

Read more

Steps to install PDC in RedHAT 6

Steps to install PDC in RedHAT 6 Steps to install PDC in RedHAT 6 Install BIND – yum install bind* Copy localhost from /var/named to in /var/named/chroot/var/named with anyextension – forward lookup (ex. hyaking.for) Cp /var/named/named.localhost /var/named/chroot/var/name/india.for Configure hyaking.for IN SOA @ hostname(FQDN) & root server in domain (              123; 1D; 1H; 1W; 3H;) NS…

Read more

Lenovo Chassis Management Module 2

Lenovo Chassis Management Module 2 The Lenovo Chassis Management Module 2 (CMM) is a hot-swap Lenovo Flex System module that you use to configure and manage all installed Lenovo Flex System components. The CMM provides system-management functions for all components in a Lenovo Flex System Enterprise Chassis. It controls a serial port for connection to a local console or a serial management network and…

Read more

Symantec Endpoint protection Manager Installation and Configuration

Symantec Endpoint protection Manager Installation and Configuration Symantec Endpoint Protection, developed by Symantec Corporation, is an antivirus and personal firewall product leveled at centrally managed corporate environments security for servers and workstations.  Table of Contents Symantec Endpoint Protection Specifications Installing the SEPM and deploying clients involves the following steps Installation and Configuration Screenshots Specifications: The…

Read more

Massive ransomware infection

Massive ransomware infection Massive ransomware infection spreading across the globe. It exploits the EternalBlue exploit from the Shadowbrokers dump released last month. File Name : tasksche.exe SHA : ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa Please apply this patch immediately to all endpoints. https://technet.microsoft.com/en-us/library/security/ms17-010.aspx Wannacry Ransomware fixes from Microsoft. For all OS. Windows XP SP3 http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe Windows Vista x86 http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.0-kb4012598-x86_13e9b3d77ba5599764c296075a796c16a85c745c.msu Windows…

Read more

Leveraged Finance

Leveraged Finance Leveraged finance was established to oversee and expand the role of a bank in the leveraged finance market. Most of the companies use debt to finance operations. By doing so, a company increases its leverage because it can invest in business operations without increasing its equity. Leveraged finance is funding a company or…

Read more

Securities Underwriting

Securities Underwriting The types of securities underwriting are as follows: Underwriting – 1. Equity Underwriting   2. Debt Underwriting. Initial Public Offering (IPO) Private placements. Underwriting is the concept of securing the price and selling a new issue of stocks and securities. The firms may take the risk and responsibility of selling a specific amount of…

Read more

Investment Banking

Investment Banking An investment bank is an intermediary organization that provides fee-based services. It uses its expertise and financial knowledge for the growth in business or investment opportunities of companies, institutions, and governments. The following functions are performed by investment banking: It links companies that need money to grow with other companies, institutions, or investors…

Read more

BFS Investment Banking and Brokerage

BFS Investment Banking and Brokerage At a broad level, financial Instruments can be classified into three types Variable Income Instruments (shares and warrants) Fixed Income Instruments (bonds, Treasury bills etc.) Derivatives (Options, Futures, Forward Contracts and Swaps) Warrant: A warrant gives the holder of the warrant the option to buy a preferred or a common…

Read more

Requirements Traceability Matrix (RTM)

Requirements Traceability Matrix (RTM) A document showing the relationship/mapping between Test Requirements and Test Cases. (RTM) captures the complete user and system requirements for the system, or a portion of the system. The RTM captures all requirements and their traceability in a single document, and is a mandatory deliverable at the conclusion of the lifecycle.…

Read more

Data Center Virtualization

What is Data Center Virtualization? From a technical perspective, Datacenter Virtualization is the conversion of the hardware devices in a datacenter into software resources. Consider your physical data center that typically includes a number of physical servers and other networking and storage devices. These Physical devices are expensive, consume a lot of space and power…

Read more

vSphere 6.0 Architecture

vSphere 6.0 Architecture vSphere 6.0 represents the core of the software-defined datacenter by virtualizing the entire IT Infrastructure servers,storage and networks with software. It groups these heterogeneous resources and transforms the rigid,inflexible infrastructure into a simple and unified manageable set of elements in the virtualized environment. Infrastructure services such as compute,storage and network services abstract,…

Read more

vSphere 6.0 Configuration Maximus

vSphere 6.0 Configuration Maximus In vSphere 6.0, clusters can scale to as many as 64 hosts and support 8000 virtual machines in a single cluster. This enables greater consolidation ratios, more efficient use of VMware vSphere Distributed Resource Scheduler(vSphere DRS) and fewer clusters that must be seperately managed. Each vSphere 6.0 instance can support as…

Read more

Hardware Version VM11 Features

Hardware Version VM 11 Features Windows VMXNET3 driver support — Supports large recieve offload, resulting in reduced associated CPU Costs by reducing network packet processing. 2 IDE Controller devices upto 3 parllel ports upto 32 serial/com ports VMCI Controller 1 USB Controller 20 Devices 1 Floppy Controller 2 Devices upto 4 SCSI Adapters — 15…

Read more

slapd service

slapd Service NAME slapd – Stand-alone LDAP Daemon SYNOPSIS /usr/sbin/slapd [-[4|6]] [-T (a|c|i|p)] [-d debug-level] [-f slapd-con- fig-file] [-h URLs] [-n service-name] [-s syslog-level] [-l sys- log-local-user] [-r directory] [-u user] [-g group] [-t] [-c cookie] DESCRIPTION Slapd is the stand-alone LDAP daemon. It listens for LDAP connections on any number of ports (default 389),…

Read more

Pre-requisites for VSAN Deployment

Pre-requisites for VSAN Deployment Pre-requisites for VSAN Deployment 4 (optionally 5) hosts as per the VMware Compatibility Guide with vSphere 5.5 Update 1 installed. 4 hosts must contain local storage. Local storage must comprise of at least one empty HDD & one empty SSD, and must be supported by VSAN as per the VMware Compatibility…

Read more

Virtual Volumes(VVOL)

Virtual Volumes(VVOL) What is VVOL? Virtual volumes is a new virtual machine disk management and integration framework that enables array-based operations at the virtual disk level. It makes SAN and NAS storage systems capable of being managed at a virtual machine level. With virtual volumes, most of the data operations are offloaded to the storage…

Read more

AngularJS

Angular JS : Angular JS is a very powerful, Open source, structural JavaScript framework for developing dynamic web applications. Angular JS is purely for client side. Angular JS is maintained by Google. Angular JS provides its own runtime environment, compile process at client side. Dynamic Web Applications: Using Angular JS we can develop client side…

Read more

Angular JS Environment Setup

Angular JS Environment Setup To build AngularJS application only one script is required. Download Angular JS from https://angularjs.org/ Click on “Download Angular JS1” Branch: 1.5.x (Stable) Build: zip Download Angular – 1.5.0.zip Extract it Include Angular.js (Development Version) or Angular.min.js (Production Version) in our HTML document. Or We can use the CDN (Content Delivery Network).…

Read more

Modules and Controllers

Modules and Controllers: Angular JS supports modular approach. A module is container for different parts of your application i.e., controllers, services, filters, directives etc to keep the code clean. We define modules in separate JavaScript files. Why module is required? Modules are like main() method in other types of applications. Modules are the angular equivivalent…

Read more

Angular JS ng-src directive

Angular JS ng-src directive Angular JS ng-src directive: <img src= “{{country.flag}}”> Using a binding expression with the image “src” attribute results in a 404 error (File not found) Hard conding: (No errors) <div ng-controller=”myController”> <img src=”images/india.jpg”> </div> E.g.: Myapp.js: Var myApp=angular.module(‘myApp’,[]); Var myCtrl=myApp.controller(‘CountryCtrl’,function($scope) { Var country={ Name: ‘INDIA’, Capital:’Delhi’, Flag: ‘images/india.jpg’ }; $scope.country=Country; }); Country.html:…

Read more

Trend Micro Server Protect password recovery

Trend Micro Server Protect password recovery ServerProtect 5.5x – Password Recovery To reset the password, perform the following steps: 1. Open the Windows Registry. 2. Back up the Windows system registry before attempting to modify it. for more information refer to http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp? solutionID=1939 3. Open the registry editor and on the left pane, go to…

Read more

Critical issue / Lenovo System X servers inoperable after November 2017 Cumulative update for Windows Server 2012, 2012 R2, and 2016

Critical issue / Lenovo System X servers inoperable after November Cumulative update for Windows Server 2012, 2012 R2, and 2016 Summary: After applying the November 2016 Cumulative Update for Windows Server 2016 or November 2016 Security Monthly Quality Rollup for Windows Server 2012 / 2012 R2 or Security Update MS16-040, a Lenovo System X M5…

Read more
Hyaking_Image_Sysprep2

Sysprep

Sysprep The System Preparation (Sysprep) tool prepares an installation of Windows for duplication. Duplication, also called imaging, enables to capture a customized Windows image that it can reuse. It is for automated Windows installations that allows unique SIDs to be created. This document consists of Pre-requisites, Installation steps and Post-configuration steps. Pre-requisites: 1. Take full…

Read more

Procedure for Backup and restoring ESXi configuration

Procedure for Backup and restoring ESXi configuration Backing up and restoring ESXi configuration using the vSphere Command-Line Interface and vSphere PowerCLI Backing up ESXi host configuration data: Download the vCLI: The installer will install the tools and also the ActivePerl sdk – the download link is currently here: https://my.vmware.com/web/vmware/details?downloadGroup=VSP510-VCLI-510&productId=285 Using the vSphere CLI To back…

Read more

vCops 5.7 to 5.8 upgrade process

vCops 5.7 to 5.8 upgrade process The procedure consists of two step: Upgrade vCenter Operations Manager vApp; Upgrade the OS to SUSE Linux Enterprise Server 11 to SPx. Download the upgrade media file from my.VMware.com: PAK file to upgrade vCOPs vAPP from 5.0.x, 5.6, 5.7 or 5.8 Name: VMware-vcops-5.8.4-2199700.pak Release Date: 2014-10-28 Build Number: 2199700 PAK file…

Read more

Interview Questions on vmware

Interview Questions on vmware What are the VMware certifications? VMware Certified Professional 5 – Infrastructure as a Service (VCP5-IaaS) VMware Certified Professional (VCP) VMware Certified Advanced Professional on vsphere 4 (VCAP4) VMware Certified Advanced Professional on vsphere 5(VCAP5) VMware Certified Design Expert (VCDX) VMware Certified Associate (VCA4-DT) VMware Certified Professional (VCP4-DT) VMware Certified Professional (VCP5-DT)…

Read more

Vmware P2V Conversion

Vmware P2V Conversion Log onto Physical Server, shutdown any application services such as WWW, SQL etc. Log into VCenter Server (Server_Name) From the Plugins menu, select Manage Plugins, click on the Installed Tab, Verify VMware Converter is enabled. Right click on either of the ESX server and choose Import Machine. Click Next. Choose Physical Computer…

Read more

HA Cluster

HA(High Availability) Cluster It allows to virtual center automatically migrate and restart the VM’s to another ESXi hosts when an host fails. Configuration steps: Host Failures  – 1 [Default]                                  – 4 [Max.] VM Restart Priority – Medium [Default] Isolation Response – Power off [Default] Admission Control: Doesn’t allow to poweron the VM’s if they…

Read more

vSphere Distributed Switch

vSphere Distributed Switch A vSphere Distributed Switch acts as a single virtual switch across all associated hosts. This allows virtual machines to maintain consistent network configuration as they migrate across hosts. Like a virtual switch, a distributed virtual switch is a network hub for virtual machines. A vSphere Distributed Switch can route traffic internally between…

Read more

DRS Cluster

DRS (Distributed Resource Scheduler) It is a load balance technique and it will balance the load across the ESXi hosts. Configuration Steps: i. Automation level Manual Partial Automatic Fully Automatic (Recommended) ii. Migration Threshold *======*=====*=====*=====* Conservative                         Aggressive (Slow Migration)                    (Fast Migration) Recommended is three or more stars. iii. VM Swap File location[vmname.vswp] Same as VM…

Read more

vMotion

vMotion VMware VMotion enables the live migration of running virtual machines from one physical server to another with zero downtime, continuous service availability, and complete transaction integrity. It is transparent to users. Port : TCP port 8000. It is also known as Hot Migration/Live migration. Host Maintainence e.g.: While upgrading ESX hardware /ESX updates 2.…

Read more

Alarms

Alarms — To Monitor the ESXi hosts and VM’s. Types of Alarms: Basic Alerts Advanced Alerts Configuring Alarms: Server up/Down Services up/down Performance issues – CPU over 75%, 90%. – Memory over 75%, 90%. – Disk over 75%, 90%. – Network latency issues Minimum requirements to create an Alarm: Systems should be online Need to…

Read more

ESXi Logfiles Information

Log File Name Details /var/log/vmkernel Vmkernel Records activities related to the virtual machines and ESX host /var/log/vmkwarning Vmkernel Warnings A copy of everything marked as a warning or higher severity from vmkernel log. Easier to look through than vmkernel log /var/log/vmksummary Vmkernel Summary Used for avaialability and uptime statistics. Human-readable summary in vmksummary.txt /var/log/vmware/hostd.log Host…

Read more

Disk Management

Disk Management  Managing a Hard disk is known as Disk Management. In a new HDD, we can’t store the data Directly. Raw HDD is divided into some portions to store the data. The hard disk is of two types. Basic Disk Dynamic Disk Basic Disk : If the HDD in Basic disks, the divided portion…

Read more

Hardware requirements and Installation steps for Windows Server 2008

Hardware requirements and Installation steps for Windows Server 2008 To use Windows Server 2008, we need to meet the following hardware requirements: Component Requirement Processor • Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor) • Recommended: 2GHz or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for Itanium-based Systems Memory…

Read more

Server core 2008 commands

Task Steps Set the local administrative password At a command prompt, type: Net user administrator * Join a computer to a domain 1. At a command prompt, type on one line: Netdom join %computername% /domain:<domain> /userd:<domain>\username> /password:* 2. Restart the computer. Confirm that the domain has changed At a command prompt, type: Set Remove a…

Read more

Authoritative Restoration

  Authoritative Restoration To perform an authoritative restoration, you must first recover AD from a backup by performing the following steps: Restart the domain controller (DC). When you see the menu to select the OS, press F8. From the Windows Advanced Options Menu, select Directory Services Restore Mode, then press Enter Select the Windows  OS,…

Read more

IBM Hardware Firmware iso download and it’s process

IBM Hardware Firmware iso download and it’s process Please find the below steps to update the firmware of the machine Download the version suitable for the Operating system you are using: https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=TOOL-BOMC 1- Open the file, it will open up a GUI interface stating “Welcome to the Bootable Media Creator”, click NEXT. 2- In the…

Read more

WSUS (Windows Server Update Services)

WSUS (Windows Server Update Services) Purpose and Scope Effective patch management is a crucial factor in any IT organization’s change control and security practices. This document serves as a procedural guide to standardize how patches are managed and applied to all servers managed using WSUS software.The procedures documented below not only provide the benefit of…

Read more

SNMP Installation on windows server

SNMP Installation on windows server 2012 Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. Microsoft Windows Server 2003 provides SNMP agent software that works with third-party SNMP management…

Read more

Snapshots

Snapshots Pre-reserve state of VM. When a snapshot is created, it is comprised of these files: <vmname>-<number>.vmdk and <vm>-<number>-delta.vmdkA collection of .vmdk and -delta.vmdk files for each virtual disk is connected to the virtual machine at the time of the snapshot. These files can be referred to as child disks, redo logs, or delta links.…

Read more

VMware Hosted Labs

Hosted Labs  Try Hands-on Labs – Explore VMware Products in a virtual lab environment. VMware’s NSX network virtualization platform is the critical third pillar of VMware’s Software Defined Data Center (SDDC) architecture. The NSX network virtualization delivers for networking what VMware has already delivered for compute and storage. Explore NSX in a virtual hands-on lab…

Read more

vCloud Architecture

vCloud Architecture VMware vCloud® is a VMware® cloud solution built on VMware technologies and solutions to deliver cloud computing. Cloud computing is a new approach to computing that leverages the efficient pooling of on-demand, self-managed virtual infrastructure to provide resources consumable as a service.  A simple cloud architecture might contain a VMware® vCloud Director® server…

Read more

vCloud Director Architecture

vCloud Architecture The vCloud architecture graphic shows the core and the optional components of vCloud. Other VMware components can be added to increase capabilities or control. One example is VMware® vCenterTM ChargebackTM. vCenter Chargeback provides resource metering and reporting to facilitate resource showback/chargeback. vCenter Chargeback is composed of a vCenter Chargeback server and vCenter Chargeback…

Read more

Multiple Cell Architecture

Multiple Cell Architecture Each Cell will have a different role automatically assigned. Multiple cells provide load-balancing. Each vCloud Director cell is automatically assigned a role. When communications requests come into the load balancer requests fall into one of four major categories: •    User Interface (UI). This is the main Web console that administrators and operators…

Read more

vCloud Components: vSphere

vCloud Components: vSphere  Use vSphere Web Client for vSphere configuration and preparation. • vCenter Server and vCenter objects: – Data centers, host clusters, resource pools, vSphere distributed switches, storage service levels • ESX/ESXi host configuration: – Virtual switches and networks – Datastores vSphere resources, when attached, are managed by vCloud Director. vCloud infrastructures rely on…

Read more

vCloud Components: vCloud Director

vCloud Components: vCloud Director vCloud Director cell: • RunsonRedHatEnterpriseLinux • RunscloudWebserverportalforthevCloudDirectorWebconsole –    Split between consumers (organization portals) and administrators (system) • AccesstovSphereinfrastructurecanbeonaprivatenetworksegmentforsecurity reasons. • Requirements: – – – Runs on a physical or a virtual machine. A virtual machine is preferred. Connects to an LDAP server for user management. Connects to an SMTP server for…

Read more

vCloud Director Scaling

vCloud Director Scaling vCloud Director multicell environment: HTTPS load balancer in front of cells   All cells share vCloud Director database.   vCloud Director cells scale horizontally.   NFS server for vSphere vApp file transfer service Recommendation: • All cells are on a single site. • All infrastructure local to site.    Scaling vCloud Director to large environments…

Read more

vCloud Director Components: vCloud Director Web Console

vCloud Director Components: vCloud Director Web Console Web browser–based interface for consumers and administrators: • Windows Internet Explorer, Mozilla Firefox, or Google Chrome • Supporting Adobe Flash Player 10.2 or later, 32-bit version RFB-based consoles for virtual machine guest operating system. The Remote Framebuffer (RFB) protocol is used by the vCloud Director Web console. VMware…

Read more

vCloud Components: vCloud Networking and security

vCloud Components: vCloud Networking and security vCloud Networking and Security is responsible for deploying and managing VMware® vShield Edge™ devices as requested by vCloud Director: •Edge gateway and vApp network devices •    Connects to the vCenter Server system through the VMware vSphere® API for vShield Edge deployment •    Manages configurations through VMware VIX API Virtual…

Read more

vCloud Components: vCenter Chargeback

vCloud Components: vCenter Chargeback vCenter Chargeback server: • Runs Web portal (Apache Tomcat server) for users and administrative interface • Abstracts vCenter Server and vCloud Director objects into the vCenter Chargeback hierarchy • Allows resource cost assignment aligned to vCloud Director resource allocation models • Generates cost and usage reports • Built-in load balancer for…

Read more

vCenter Chargeback Scaling

vCenter Chargeback Scaling Configure additional installations of vCenter Chargeback server to connect with the built-in load balancer that is included in the first instance. The load balancer spreads load from requests across multiple vCenter Chargeback servers. DataCollectors: Multiple instances can be installed and configured separately. • First instance is installed with vCenter Chargeback server (option…

Read more

vCloud Components: vCloud Connector

  vCloud Components: vCloud Connector vCloud Connector appliance: • The vCloud Connector appliance is a Tomcat server and embedded. Postgres database to bridge vCloud Director and vSphere environments. • vCloud Connector uses temporary storage to facilitate file transfer. vCloud Connector plug-in for vSphere Client: • Unified view across vSphere and private and public clouds •…

Read more

vCloud Connector Architecture

vCloud Connector Architecture vCloud Connector is a virtual appliance. vCloud Connector installs in vSphere and handles all the business logic of dealing with other clouds. The vCloud Connector UI is displayed in the vSphere Web Client through a browser plug-in.   You have two considerations about where to place your vCloud Connector appliance: The virtual…

Read more

VMware vSphere Replication

  vSphere Replication is a proprietary, host-based replication engine for VMware virtual machines. After initial replication of a virtual machine has been completed, changed blocks are tracked and only these deltas are sent to the target location. This approach lowers bandwidth utilization and enables more-aggressive recovery point objectives (RPOs) than manual, full-system virtual machine copies. What are use…

Read more

VMware vCenter Orchestrator

VMware vCenter Orchestrator is a development- and process-automation platform that provides a library of extensible workflows to allow you to create and run automated, configurable processes to manage the VMware vSphere infrastructure as well as other VMware and third-party technologies. (Or) VMware vRealize Orchestrator simplifies the automation of complex IT tasks and integrates with VMware…

Read more

Orchestrator System Requirements

Orchestrator System Requirements Hardware Requirements for Orchestrator Verify that your system meets the minimum hardware requirements before you install Orchestrator. 0GHz or faster Intel or AMD x86 processor. At least two CPUs are recommended. Processor requirements might differ if your database runs on the same hardware. 4GB RAM. You might need more RAM if your…

Read more

Setting Up Orchestrator Components

Setting Up Orchestrator Components You can install Orchestrator on a computer running Microsoft Windows or you can download and deploy the Orchestrator Appliance. In both cases, the Orchestrator server is preconfigured, and after successful installation or deployment, the service starts automatically. To enhance the availability and scalability of your Orchestrator setup, you can follow several guidelines :…

Read more

Installing and Upgrading Orchestrator

Installing and Upgrading Orchestrator Orchestrator consists of a server component and a client component. You can install the Orchestrator components on the machine on which vCenter Server is installed or on a separate machine. You can also download and deploy the Orchestrator Appliance. To improve performance, install the Orchestrator server component on a separate machine.…

Read more

Configuring the Orchestrator Server

Configuring the Orchestrator Server  Orchestrator Web Configuration tool to configure the components that are related to the Orchestrator engine, such as network, database, server certificate, and so on. The correct configuration of these components ensures the proper functioning of the applications running on the Orchestrator platform. The Orchestrator Web Configuration tool is installed silently with…

Read more

Event ID 1090 – Windows failed to record RSoP Information

  Event ID 1090 – Windows failed to record RSoP Information Product: Windows Operating System ID: 1090 Source: Microsoft-Windows-GroupPolicy Version: 6.0 Symbolic Name: gpEvent_FAILED_WBEM_SERVICES Message: Windows failed to record Resultant Set of Policy (RSoP) information, which describes the scope of Group Policy objects applied to the computer or user. This could be caused by Windows…

Read more

Windows Deployment Services

Windows Deployment Services(WDS) The Windows Deployment Services is the updated and redesigned version of Remote Installation Services (RIS). Windows Deployment Services enables you to deploy Windows operating systems, particularly Windows Vista. You can use it to set up new computers by using a network-based installation. This means that you do not have to install each…

Read more

Group Policies

Group Policy is an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs). Types of Group Policy: OU  Level Domail Level Site Level Policy a.…

Read more

Remote Desktop Services

The Remote Desktop Services server role in Windows Server 2008 R2 provides technologies that enable users to access Windows®-based programs that are installed on a Remote Desktop Session Host (RD Session Host) server, or to access the full Windows desktop. With Remote Desktop Services, users can access an RD Session Host server from within a…

Read more