If you have plan to deploy vCenter Server Appliance (vCSA) without DNS server, installation will be failed, if you have add standard information for deploying virtual appliance. Because installer ask you to add FQDN of server before start to deploy. By adding FQDN, installer will be try to resolve it.
Category: How To
Virtualization Tutorials, Operating System Tutorials, Software Tutorials And Other IT Tutorials
VNC is a fast and secure way to managing Linux systems via GUI remotely. VNC needs proper configuration to work without issue. Configure VNC on Linux systems will be difficult and confusing for beginners. Fortunately, Red Hat provides an application to create VNC configuration as a script automatically.
VNX Storage arrays can be added to a domain for centralization logging and management for multiple storage arrays. Also Unisphere Central can be added to a VNX domain.
Sometimes, storage administrator makes mistake about adding or removing VNX storage arrays from VNX domain. As an example, administrator has to remove a VNX for send to repairing but forget removing storage array from domain. Another example, when there is multiple domains with multiple range of IP addresses, may be administrator add array to domain wrongly and after that, change IP and add to another domain.
In these situations, domains will contain some systems as unverified system, the unverified systems should verify again and otherwise should be removed.
At the first part, we’ve reviewed GSM (Greenbone Security Manager – Formerly OpenVAS) as a security manager or assessment tool for discovering vulnerabilities on virtual environments, the second part was more functional and we talked more about GSM. You leaned that how can you create a target on Greenboone Security Manager and scan it to discover vulnerabilities.
As I said at the end of second part of the blog post, the third part is related to resolving security issues. Any software and specially operating systems have “Hardening Guide”. You must follow steps of hardening guide to reduce security vulnerabilities effect on production environments.
We have reviewed reasons of have Vulnerability Assessment or Vulnerability Manager in virtual environments and how these software help us to find vulnerabilities on any component of virtual infrastructure. We have reviewed OpenVAS or Greenbone Security Manager and talked about features and abilities.
Now, it’s time to use the GSM server that we had prepared on the previous part. In this part of blog post, we’ll configure a target (ESXi Server) on OpenVAS server, create a task for scan and find the result of scan.
I’ve installed ESXi 6U1 (3029758) on a virtual machine and there is no customized configuration, all configurations are default.
In virtual environments, any vulnerability has affect on virtual infrastructure and those who get the service including internal and external services. So at least, any organization should have process to identifying vulnerabilities. Identifying vulnerabilities needs tools in IT infrastructure to scan devices, operating systems and applications and find vulnerabilities (Especially security vulnerabilities).
If you have any version of Veeam Backup & Replication for protecting virtual machines in your virtual environment and using vSphere 4 and later, the below problem might happen to you.
You maybe have to disable or enable vMotion traffic on some VMKernel ports on ESXi for doing some maintenance tasks. Disabling or enabling takes lot of time for many servers in datacenter. You can disable or enable vMotion via PowerCLI by run a simple script.
As you know, virtual machines can sync their time with ESXi host when VMware Tools is installed on the virtual machines. Also the configuration should be enabled on virtual machine configuration manually. The configuration...
There is a standard way to configure iLO for HPE ProLiant servers, HPE iLO can be configured after boot-up via SETUP utility on all type of servers and generations. If you press [F8] during boot-up, iLO configuration utility will be appeared and then you can configure all iLO configuration such as network connection.
VMware has explained the solution on this KB article: https://kb.vmware.com/s/article/1035107
To resolve this issue:
Restart the system.
During the reboot, when the hypervisor screen appears, press Shift+O.
In the boot option, type overrideDuplicateImageDetection and press Enter.
Post Error: 333-HPE RESTful API Error – Unable to communicate with iLO FW. BIOS configuration resources may not be up-to-date. Action: Reset iLO FW and reboot the server. If issue persists, AC power cycle the server.
Soft Diagnostic Failure A soft diagnostics Error will typically be present after an intentional or unintentional restart of one or both HSV controllers. It will be logged in the controller event log and displayed...
“Cabling is inconsistent between SPs” is a fault on storage system and it’s related to SAS cables between DPE and DAEs.
What’s Syslog? Syslog is a standard for message logging. It allows software to generating messages with a standard format and store the messages as log files on a local disk or shared storage for...