Davoud Teimouri - Virtualization & Datacenter

A technology blog mainly focusing on virtualization and datacenter

VMware Tools Client – Interact with a VM without Network Connectivity

VMware Tools Client

VMware Tools Client is a beta tools to interact with VMs without network connectivity. May know, there is some vSphere API that developers can write some codes and developing their tools for vSphere environments.

VMware Tools Client written by Pierre Lainé is a useful tool to managing virtual machines via vSphere Guest API and VMware Tools.

The tool developed by Java, so JRE or JDK should installed on manage machine. As Java is cross-platform run-time, so VMware Tools Client will run on any machine, Windows, Linux, Unix and Mac.

VMware Tools Client allows administrators to:

  • Upload and download files between management client machine and virtual machine.
  • Run scripts to reconfigure operating system, troubleshooting and other tasks.
  • Troubleshooting network by ping some addresses from within the virtual machine.

VMware Tools Client be able to connect to vCenter and load vCenter inventory, so administrators can select and manage any virtual machine.

PowerCLI also provides commands such as Invoke-VMScript to run script or batch via VMware Tools on virtual machines but VMware Tools Client is more featured.

It’s beta version yet but available on this link for public download:

Download Link


VMware Tools Client - Main Window

VMware Tools Client - VM Window

562 total views, 562 views today

Nakivo VM Backup Appliance – QNAP

NAKIVO VM Backup Appliance based on QNAP NAS is available

NAKIVO VM backup appliances based on QNAP NAS combine backup hardware, backup software, backup storage, and data deduplication in a single device. This setup frees up virtual infrastructure resources previously used for backup and results in a smaller footprint and less maintenance. Compared to purpose-build backup appliances, the combination of NAKIVO Backup & Replication and QNAP NAS is up to 5X more affordable, while delivering the same or higher levels of performance and reliability.

Nakivo VM Backup Appliance - QNAP

NAKIVO VM backup appliances based on QNAP NAS also deliver higher VM backup speed when compared to VM-based backup solutions. This is because backup data is written directly to the NAS disks, bypassing network protocols such as NFS and CIFS. NAKIVO VM backup appliance based on QNAP NAS can boost VM backup performance by up to 2X.

NAKIVO VM backup appliances based on QNAP NAS separate virtual infrastructure and backup software, which improves reliability and ensures that recovery can be performed even if a portion of a virtual infrastructure is unavailable.

NAKIVO VM backup appliances based on QNAP NAS can be deployed onsite or offsite – even in locations with no virtual infrastructure – and can be used to store primary and secondary VM backups. NAKIVO VM backup appliances based on QNAP NAS provides all components that are required for operational and disaster recovery: hardware to run restores, backup data, and backup software.

NAKIVO Backup & Replication supports VMware, Hyper-V, and AWS EC2 environments and offers advanced features that increase VM backup performance, improve reliability, speed up recovery, and help save time and money. NAKIVO Backup & Replication provides:

  • Proper backups: Native, agentless, image-based, application-aware VM backup and replication
  • Fast backups: Forever-incremental backups, LAN-free data transfer, network acceleration
  • Small backups: Exclusion of SWAP files and partitions, global backup deduplication, variable backup compression
  • Guaranteed recovery: Instant backup verification with screenshots of test-recovered VMs, backup copy offsite/to the cloud
  • Faster recovery: Instant recovery of VMs, files, Exchange objects, Active Directory objects, instant disaster recovery with VM replicas.

563 total views, 51 views today

HPE Customized ESXi Image Download – May 2017 (Latest)

HPE has released new image for ESXi 6.5 at this month (May 2017). The customized image contains HPE certified devices drivers and HPE management agents.

It’s recommended that install ESXi on HPE servers by these customized images. Because the images contains all management tools and also all certified device drivers. 

The HPE customized images are available on the below links, you can download vSphere 6.5 directly but other links are available on VMware website only:


Don’t use VMware images for your server hardware and also don’t use other vendors images for your hardware because you will face with many problems such as purple screens. 

1,187 total views, 23 views today

Veeam Availability Suite 9.5 – Download May 2017 Updates

Veeam has released updates for adding some improvements and also fixing some issues on Veeam Availability Suite 9.5 at May 2017.

  1. Veeam Backup & Replication 9.5 Update 2

  2. Veeam ONE 9.5 Update 1

Veeam has added some new platforms to Veeam Backup & Replication 9.5 supported platforms by this update:

  • Cisco HyperFlex Systems (formerly HX-Series/SpringPath) support for Backup from Storage Snapshots functionality.
  • HPE 3PAR StoreServ 3.3.1 support and improved scalability by migrating some API calls from SSH to RESTful API.
  • Microsoft Hyper-V BigEndian platform support.
  • Microsoft Exchange 2016 CU5 support for mailbox item recovery with Veeam Explorer for Microsoft Exchange.
  • NetApp ONTAP 9.1 support.
  • Oracle 12.2 support for all Oracle database backup and restore functionality.
  • Veeam Agent for Linux 1.0 Update 1 (build support, including new 1-Click FLR via Veeam Backup Enterprise Manager.
  • Veeam Agent for Microsoft Windows 2.0 (build support, including application-item recovery support from agent backups.
  • VMware vCloud Director 8.20 support.
  • VMware vSAN 6.6 support.

Also Veeam ONE 9.5 will support vSphere 6.5 after installing the update.

The updates release notes are available on the below links:

Release Notes for Veeam Backup & Replication 9.5 Update 2

Release Notes for Veeam ONE 9.5 Update 1

Also the updates are available on the below links for direct download:

Update 2 for Veeam Backup & Replication 9.5

Update 1 for Veeam ONE 9.5

671 total views, 14 views today

kernel: WARNING: at fs/sysfs/dir.c:536 sysfs_add_one+0xbb/0xe0 – Oracle Enterprise Linux

Most of modern servers hardware are using UEFI instead of legacy BIOS and modern OS has dedicated partition to stores boot and EFI values.

Some times, the partition gets full or OS generate the below log:

kernel: WARNING: at fs/sysfs/dir.c:536 sysfs_add_one+0xbb/0xe0

Kernel includes a CONFIG_EFI_VARS_PSTORE feature, and a feature that dumps kernel message log (= the “dmesg” command output) into UEFI variables for persistent storage if the system is crashing (or even if the system is working normally, depending on the options chosen).

The cause of the warning is duplicate dump file in EFI partition and OS is trying to write values on same file.

There is a simple solution, remove old dump file!

I hope this article help you to find out root cause of the warning and resolve that.

Here is the complete log on our virtual machine:

kernel: WARNING: at lib/kobject.c:196 kobject_add_internal+0x205/0x260()
kernel: Hardware name: VMware7,1
kernel: kobject_add_internal failed for dump-type2-0-0-1493749396-cfc8fc79-be2e-4ddc-97f0-9f98bfe298a0 with -EEXIST, don’t try to register things with the same name in the same directory.
kernel: Modules linked in: vmw_vsock_vmci_transport vsock oracleasm autofs4 ipv6 vfat fat uinput vmw_balloon coretemp crc32c_intel ghash_clmulni_intel microcode pcspkr sg ixgbe hwmon dca vmw_vmci i2c_piix4 shpchp ext4 jbd2 mbcache dm_round_robin scsi_dh_emc sd_mod crc_t10dif sr_mod cdrom aesni_intel ablk_helper cryptd lrw aes_x86_64 xts gf128mul vmxnet3 qla2xxx scsi_transport_fc scsi_tgt mptspi mptscsih mptbase scsi_transport_spi pata_acpi ata_generic ata_piix vmwgfx ttm drm i2c_core dm_multipath dm_mirror dm_region_hash dm_log dm_mod scsi_dh_alua [last unloaded: speedstep_lib] kernel: Pid: 5934, comm: kworker/60:2 Tainted: G        W    3.8.13-16.2.1.el6uek.x86_64 #1
kernel: Call Trace:
kernel: [<ffffffff8105d2af>] warn_slowpath_common+0x7f/0xc0
kernel: [<ffffffff8105d3a6>] warn_slowpath_fmt+0x46/0x50
kernel: [<ffffffff81286865>] kobject_add_internal+0x205/0x260
kernel: [<ffffffff81286a78>] kobject_add_varg+0x38/0x60
kernel: [<ffffffff81286af3>] kobject_init_and_add+0x53/0x70
kernel: [<ffffffff8128f140>] ? sprintf+0x40/0x50
kernel: [<ffffffff814755ec>] efivar_create_sysfs_entry+0x12c/0x1b0
kernel: [<ffffffff81475b95>] efi_pstore_write+0x1b5/0x200
kernel: [<ffffffff81214b48>] pstore_console_write+0xd8/0x100
kernel: [<ffffffff8105e027>] ? msg_print_text+0xc7/0x1e0
kernel: [<ffffffff8105f063>] call_console_drivers.clone.3+0xa3/0x100
kernel: [<ffffffff8105f4c4>] console_unlock+0x274/0x2c0
kernel: [<ffffffff8105fa75>] vprintk_emit+0x325/0x520
kernel: [<ffffffff8109e5f6>] ? find_busiest_group+0x36/0x4d0
kernel: [<ffffffff8138a189>] dev_vprintk_emit+0x69/0x90
kernel: [<ffffffff8109ebbe>] ? load_balance+0x12e/0x670
kernel: [<ffffffff8138a1e9>] dev_printk_emit+0x39/0x40
kernel: [<ffffffff81079e6f>] ? insert_work+0x3f/0x60
kernel: [<ffffffff8138a22e>] __dev_printk+0x3e/0x90
kernel: [<ffffffff8138a565>] dev_printk+0x45/0x50
kernel: [<ffffffff81048099>] ? default_spin_lock_flags+0x9/0x10
kernel: [<ffffffffa0116939>] fc_timeout_deleted_rport+0x229/0x350 [scsi_transport_fc] kernel: [<ffffffff8107b6f0>] process_one_work+0x180/0x410
kernel: [<ffffffff8107d71e>] worker_thread+0x12e/0x390
kernel: [<ffffffff8107d5f0>] ? manage_workers+0x180/0x180
kernel: [<ffffffff81082a6e>] kthread+0xce/0xe0
kernel: [<ffffffff810829a0>] ? kthread_freezable_should_stop+0x70/0x70
kernel: [<ffffffff8159b66c>] ret_from_fork+0x7c/0xb0
kernel: [<ffffffff810829a0>] ? kthread_freezable_should_stop+0x70/0x70
kernel: —[ end trace 940656e1b6e55a3d ]—

OS information:

OEL 6.5 and kernel is 3.8.13-16.2.1.el6uek.x86_64

1,428 total views, 23 views today

New Release – Kali Linux 2017.1

Kali Linux is one of most popular Linux distributions and many security experts are using this distribution as penetration testing system. Kali Linux is a Debian based distribution and most Kali’s packages are imported from Debian repositories.

Kali has more than 300 preinstalled tools for penetration testing such as Armitage (a graphical cyber attack management tool), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners.

Kali development team has released new version and it’s available for download.

Kali Linux

Kali Linux is available for both 32-bit and 64-bit platforms and also the team focus on ARM devices and also there is an image for ARM architecture.

Also Kali Linux NetHunter is also available for smartphones such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models.

Kali Linux hardware requirements:

  • A minimum of 20 GB disk space for the Kali Linux install.
  • RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
  • CD-DVD Drive / USB boot support

Kali Linux will be installed on some Apple devices such as Apple MacBook Air, Pro, and Retina models.

Also it will be installed on virtual platforms such as VMware Workstation and Oracle VirtualBox

Read more information on Kali Linux documentation.

1,619 total views, 10 views today

Service Pack for ProLiant (SPP) Version 2017.04.0

HPE has released Service Pack for ProLiant (SPP) and it’s available for download, if you have valid customer account, you can download it and update your server hardware firmware.

The Service Pack for ProLiant (SPP) is a comprehensive systems software and firmware update solution, which is delivered as a single ISO image. This solution uses HP Smart Update Manager (HP SUM) as the deployment tool and is tested on all HPE ProLiant Gen9, Gen8 and earlier servers as defined in the Service Pack for ProLiant Server Support Guide found at

Important Notes:

In order to reduce the frequency at which servers need to be updated, HPE is changing the packaging and delivery of the SPP.

Going forward, two types of SPPs will be released:

  • A single “Production SPP” that contains the firmware and drivers for the all of the production server generations, and
  • Multiple server generation specific “Post-Production SPPs” that contain the firmware and drivers for a specific post-production server generation (e.g. Gen8 only Post-Production SPP that contains the firmware and drivers for all of Gen8 server models).

When a server generation transitions to “Post-Production,” the firmware and drivers for that server generation are frozen, packaged together on a “Post-Production SPP,” and released. The “Post-Production SPP” is supported through the EOS (end of support) for that server generation, and all future firmware and driver updates are released as hot fixes.  This eliminates the need for yearly updates.

The 2017.04.0 SPP is the last production SPP to contain components for the G7 and Gen8 server platforms. For additional information, please refer to Reducing Server Updates.

Release Summary:

This release provides support for the following Linux operating systems:

  • Red Hat Enterprise Linux 6.9
  • Red Hat Enterprise Linux 7.3
  • SUSE Linux Enterprise Server 12 SP2

This is the last SPP to contain updates for the following operating systems:

  • Microsoft Windows Server 2008 and 2008 R2
  • Red Hat Enterprise Linux 6 32-bit
  • SUSE Linux Enterprise Server 11 32-bit

 See the Service Pack for ProLiant Release Notes for more information.  See the Service Pack for ProLiant Server Support Guide for information on supported HPE servers.

Here is the download link:


Extract the files and then burn ISO file on a DVD or mount it as virtual drive on your server.

Note: Upgrading your server hardware by the ISO file is your own risk.

17,260 total views, 276 views today

Teimouri.net © 2012 Frontier Theme