Sometimes you need to do troubleshooting about storage connectivity but you don’t have access to datacenter or SAN switches and you need to shutdown one of HBA ports to check server side problem. If the port was a network adapter port, disabling was to easy but what about HBA port on operating system?
Category: How To
Virtualization Tutorials, Operating System Tutorials, Software Tutorials And Other IT Tutorials
This is second part of VMware vSphere 7 upgrade series which about hardware compatibility.
After the upgrade path is prepared and you are ready to pay for new hardware or upgrade current hardware, you have to choose compatible hardware, so you must know that why hardware compatibility is so important?
This post is first part of vSphere 7 Upgrade Series which about vSphere upgrade path to vSphere 7.
HPE C7000 Blade System using Onboard Administrator (OA) KVM module to manage devices and interconnects in chassis. To manage devices directly, OA will redirect to iLO of each device. OA...
If you have plan to deploy vCenter Server Appliance (vCSA) without DNS server, installation will be failed, if you have add standard information for deploying virtual appliance. Because installer ask you to add FQDN of server before start to deploy. By adding FQDN, installer will be try to resolve it.
VNC is a fast and secure way to managing Linux systems via GUI remotely. VNC needs proper configuration to work without issue. Configure VNC on Linux systems will be difficult and confusing for beginners. Fortunately, Red Hat provides an application to create VNC configuration as a script automatically.
VNX Storage arrays can be added to a domain for centralization logging and management for multiple storage arrays. Also Unisphere Central can be added to a VNX domain.
Sometimes, storage administrator makes mistake about adding or removing VNX storage arrays from VNX domain. As an example, administrator has to remove a VNX for send to repairing but forget removing storage array from domain. Another example, when there is multiple domains with multiple range of IP addresses, may be administrator add array to domain wrongly and after that, change IP and add to another domain.
In these situations, domains will contain some systems as unverified system, the unverified systems should verify again and otherwise should be removed.
At the first part, we’ve reviewed GSM (Greenbone Security Manager – Formerly OpenVAS) as a security manager or assessment tool for discovering vulnerabilities on virtual environments, the second part was more functional and we talked more about GSM. You leaned that how can you create a target on Greenboone Security Manager and scan it to discover vulnerabilities.
As I said at the end of second part of the blog post, the third part is related to resolving security issues. Any software and specially operating systems have “Hardening Guide”. You must follow steps of hardening guide to reduce security vulnerabilities effect on production environments.