The "right way" to use telnet client !!??
Run CMD as Local Admin
type
telnet <IP address or hostname or fqdn> <port>
shortcuts in telnet
To disconnect from remote server, type:
close servername port
c server001 8080
Tuesday, 30 September 2014
device manager - hidden devices
device manager:
from cmd:
set devmgr_show_nonpresent_devices=1
devmgmt.msc
from gui:
show hidden devices
from cmd:
set devmgr_show_nonpresent_devices=1
devmgmt.msc
from gui:
show hidden devices
install uninstall Telnet client on W2008 / Win 7
install Telnet client on W2008 / Win 7
start run cmd
dism /online /Enable-Feature /FeatureName:TelnetClient
uninstall the Telnet client using command line
dism /online /Disable-Feature /FeatureName:TelnetClient
server will ask for a reboot
legacy command - package manager is now deprecated
pkgmgr /iu:"TelnetClient"
uninstall the Telnet client using command line
start run cmd
dism /online /Enable-Feature /FeatureName:TelnetClient
uninstall the Telnet client using command line
dism /online /Disable-Feature /FeatureName:TelnetClient
server will ask for a reboot
legacy command - package manager is now deprecated
pkgmgr /iu:"TelnetClient"
uninstall the Telnet client using command line
pkgmgr
/up:”TelnetClient”
SCCM info
SCCM
Manuel start of Contorl Panel ConfigMgr Client
"C:\Windows\CCM\SMSCFGRC.cpl"
Missing Software Center shortcut run it from
C:\Windows\ccm\SCClient.exe
To make SCCM look for packages to download
Control Panel > Config Mgr
Call for "Machine Policy & Eval Cycle"
Wait a minute
Open software center.
SCCM Log
C:\Windows\Debug\SCCMInstallMonitor.log
Look in Control Panel for Config Mgrv.5 = SCCM 2012
v.4 = SCCM 2007
Regedit key to uninstall software
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
Information for uninstall
MsiExec.exe /X{C2A5E62E-F1C9-491C-8C3A-F8F2CBBF1EF0}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Manuel start of Contorl Panel ConfigMgr Client
"C:\Windows\CCM\SMSCFGRC.cpl"
Missing Software Center shortcut run it from
C:\Windows\ccm\SCClient.exe
To make SCCM look for packages to download
Control Panel > Config Mgr
Call for "Machine Policy & Eval Cycle"
Wait a minute
Open software center.
SCCM Log
C:\Windows\Debug\SCCMInstallMonitor.log
Look in Control Panel for Config Mgrv.5 = SCCM 2012
v.4 = SCCM 2007
Regedit key to uninstall software
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
Information for uninstall
MsiExec.exe /X{C2A5E62E-F1C9-491C-8C3A-F8F2CBBF1EF0}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
set a manual MAC address for a virtual network adapter 00:50:56:00:00:00 - 00:50:56:3F:FF:FF
For static MAC addresses in a vCenter you can use a MAC addresses in this range
My friend Bjorn found a bash command on the net and modified it for my needs:
for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X,” $x $y $z;done;done;done >> GuysMacs.txt
if it doesnt work try this one ( %02X; instead of %02X, )
for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X;” $x $y $z;done;done;done >> GuysMacs.txt
It generates a text file called GuysMacs.txt with all of the mac addresses in scope.
it’s a 74 Megabyte textfile. roughly 4,2 million mac-addresses
If you want a copy of this file get in contact with me...
You can open this file in Excel - but only versions that support .xlsx
Thank you Mr Bjorn Fredriksson
find all the static macs on a vCenter with powercli - thanks to someone on internet who i stole this from - sorry can't reference you...forgotten already !
Get-VM | Where-Object {($_ | Get-NetworkAdapter).ExtensionData.AddressType -eq "manual"} | ` Select-Object -Property Name, PowerState, @{"Name"="MAC";"Expression"={($_ | Get-NetworkAdapter).MacAddress}}
From VMware KB219 and this link below:
00:50:56:00:00:00 - 00:50:56:3F:FF:FF
for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X,” $x $y $z;done;done;done >> GuysMacs.txt
if it doesnt work try this one ( %02X; instead of %02X, )
for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X;” $x $y $z;done;done;done >> GuysMacs.txt
It generates a text file called GuysMacs.txt with all of the mac addresses in scope.
it’s a 74 Megabyte textfile. roughly 4,2 million mac-addresses
If you want a copy of this file get in contact with me...
You can open this file in Excel - but only versions that support .xlsx
Thank you Mr Bjorn Fredriksson
find all the static macs on a vCenter with powercli - thanks to someone on internet who i stole this from - sorry can't reference you...forgotten already !
Get-VM | Where-Object {($_ | Get-NetworkAdapter).ExtensionData.AddressType -eq "manual"} | ` Select-Object -Property Name, PowerState, @{"Name"="MAC";"Expression"={($_ | Get-NetworkAdapter).MacAddress}}
From VMware KB219 and this link below:
You can set a static MAC address using the VMware OUI prefix by adding the following line to a virtual machine‘s configuration file:
ethernet<number>.address = 00:50:56:XX:YY:ZZ
In the example, <number> refers to the number of the Ethernet adapter, XX is a valid hexadecimal number between 00 and 3F, and YY and ZZ are valid hexadecimal numbers between 00 and FF. The value for XX cannot be greater than 3F to avoid conflict with MAC addresses that are generated by the VMware Workstation and VMware Server products. The maximum value for a manually generated MAC address is shown in the sample.
ethernet<number>.address = 00:50:56:3F:FF:FFhttp://pubs.vmware.com/vsphere-51/topic/com.vmware.vsphere.networking.doc/GUID-F9243FED-F081-498F-B4A9-EF950292AF77.html
Mount commands for *nix
AIX syntax:
mount -v nfs3 -o rw,bg,soft,intr server001:/DataMoverNFS /mnt
Linux syntax:
mount -t nfs server001:/DataMoverNFS /mnt
Solaris syntax:
mount -F nfs g/mnt
mount -F nfs server001:/DataMoverNFS /mnt
Thanks to Svend !
mount -v nfs3 -o rw,bg,soft,intr server001:/DataMoverNFS /mnt
Linux syntax:
mount -t nfs server001:/DataMoverNFS /mnt
Solaris syntax:
mount -F nfs g/mnt
mount -F nfs server001:/DataMoverNFS /mnt
Thanks to Svend !
xcopy / robocopy specific files from a folder
use %% in a script or use % if running it interactively fromcommand line
the . at the end is 'copy to the current dir'
for %%g in ("\\servername\file1.txt", "\\servername\file2.bat") do xcopy %%g .
robocopy
Thursday, 1 August 2013
view horizon info
view reference architecture
http://www.vmware.com/support/pubs/view_pubs.html http://pubs.vmware.com/view-52/topic/com.vmware.ICbase/Welcome/welcome.html https://blogs.vmware.com/euc http://www.derekseaman.com/category/vmware/vmware-view http://jpaul.me/?p=4047 http://www.ntpro.nl/blog/archives/2395-New-Book-VMware-View-Security-Essentials.html http://www.itninja.com/blog/view/how-to-setup-a-vmware-view-transfer-server Favorite End User Computing (VDI) Blog http://vsphere-land.com/news/top-blog-2012-results.html
vSphere 5 cli
vSphere Command-Line Interface Concepts and Examples
http://pubs.vmware.com/vsphere-51/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-51-command-line-interface-solutions-and-examples-guide.pdf
http://pubs.vmware.com/vsphere-51/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-51-command-line-interface-solutions-and-examples-guide.pdf
Wednesday, 24 July 2013
srm database table showing users
SRM service wont start after upgrade to 5.1 (SSO)
log in to sql manager
select the srm db and find the tables below
right click on table and edit top 200 rows
dbo.pd_acedata
dbo.pd_authorization
this is part of vmware kb 2038046
log in to sql manager
select the srm db and find the tables below
right click on table and edit top 200 rows
dbo.pd_acedata
dbo.pd_authorization
this is part of vmware kb 2038046
how to test sql server connection udl file
Tuesday, 23 July 2013
dell / ibm esxi 5 upgrade "error could not obtain module order from esximage db" oem.xml /etc/vmware/support
from dell blog
http://en.community.dell.com/techcenter/b/techcenter/archive/2012/06/28/upgrade-from-dell-customized-vmware-esxi-5-0-to-a-later-update-using-dell-customized-esxi-5-iso-fails.aspx
this worked once the roll back had completed and the host rebooted
~# esxcli software vib remove –n Dell-Configuration-VIB
~# esxcli software vib remove –n Dell-License-VIB
also from vmware kb 2036167
maybe i should have also done
esxcli software vib remove -n Dell-esx-boot-options
same for IBM hosts:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1019361
Monday, 8 July 2013
Remove VIB from ESXi host - vCLI
Remove the Cisco Nexus 1V from ESX host cisco-vem-v152-esx C:\Program Files\VMware\VMware vSphere CLI>esxcli --server=greenesxi3 software vib list Enter username: root Enter password: Name Version Vendor Acceptance Level Install Date ---------------------- ------------------------------------ -------- ---------------- ------------ misc-cnic-register 1.72.1.v50.2-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bnx2 2.2.3e.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bnx2x 1.74.19.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-cnic 1.74.04.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-tg3 3.124c.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 scsi-bnx2fc 1.74.02.v50.2-1OEM.500.0.0.406165 Broadcom VMwareCertified 2013-04-29 scsi-bnx2i 2.74.07.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bna 3.2.0.0-1OEM.500.0.0.472560 Brocade VMwareCertified 2013-04-29 scsi-bfa 3.2.0.0-1OEM.500.0.0.472560 Brocade VMwareCertified 2013-04-29 cisco-vem-v152-esx 4.2.1.2.1.1a.0-3.0.1 Cisco PartnerSupported 2013-05-23 OpenManage 7.2-0000 Dell VMwareAccepted 2013-05-23 dell-configuration-vib 5.0-2A00 Dell PartnerSupported 2013-04-29 ima-be2iscsi 4.2.324.12-1OEM.500.0.0.472629 Emulex VMwareCertified 2013-04-29 net-be2net 4.2.327.0-1OEM.500.0.0.472560 Emulex VMwareCertified 2013-04-29 scsi-be2iscsi 4.2.324.12-1OEM.500.0.0.472629 Emulex VMwareCertified 2013-04-29 scsi-lpfc820 8.2.4.141.55-1OEM.500.0.0.472560 Emulex VMwareCertified 2013-04-29 net-igb 4.0.17-1OEM.500.0.0.472560 Intel VMwareCertified 2013-04-29 net-ixgbe 3.11.32-1OEM.500.0.0.472560 Intel VMwareCertified 2013-04-29 scsi-mpt2sas 15.00.01.00.1vmw-1OEM.500.0.0.472560 LSI VMwareCertified 2013-04-29 ima-qla4xxx 500.2.01.31-1vmw.0.0.060523 QLogic VMwareCertified 2013-04-29 net-qlcnic 5.0.750-1OEM.500.0.0.472560 QLogic VMwareCertified 2013-04-29 scsi-qla4xxx 634.5.7.0-1OEM.500.0.0.472560 QLogic VMwareCertified 2013-04-29 ata-pata-amd 0.3.10-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-atiixp 0.4.6-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-cmd64x 0.2.5-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-hpt3x2n 0.3.4-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-pdc2027x 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-serverworks 0.4.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-sil680 0.4.8-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-via 0.3.3-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 block-cciss 3.6.14-10vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ehci-ehci-hcd 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 esx-base 5.0.0-2.33.1117897 VMware VMwareCertified 2013-05-23 esx-tboot 5.0.0-2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-devintf 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-msghandler 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-si-drv 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 misc-drivers 5.0.0-2.26.914586 VMware VMwareCertified 2013-04-29 net-e1000 8.0.3.1-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-e1000e 1.1.2-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-enic 1.4.2.15a-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-forcedeth 0.61-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-nx-nic 4.0.557-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-qlge 2.0.0.54-1vmw.500.0.0.472560 VMware VMwareCertified 2013-04-29 net-r8168 8.013.00-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-r8169 6.011.00-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-s2io 2.1.4.13427-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-sky2 1.20-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ohci-usb-ohci 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-ahci 3.0-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-ata-piix 2.12-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-nv 3.5-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-promise 2.12-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-sil 2.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-svw 2.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-aacraid 1.1.5.1-9vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-adp94xx 1.0.8.12-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-aic79xx 3.1-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-fnic 1.5.0.3-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-hpsa 5.0.0-17vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-ips 7.12.05-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid-mbox 2.20.5.1-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid-sas 5.34-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid2 2.00.4-9vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-mptsas 4.23.01.00-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-mptspi 4.23.01.00-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-rste 2.0.2.0088-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 uhci-usb-uhci 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 vmware-fdm 5.1.0-1123961 VMware VMwareCertified 2013-07-05 tools-light 5.0.0-2.32.1024429 VMware VMwareCertified 2013-05-15 scsi-qla2xxx 934.5.6.0-1OEM.500.0.0.472560 qlogic VMwareCertified 2013-04-29 C:\Program Files\VMware\VMware vSphere CLI>esxcli --server=greenesxi3 software vib remove --vibname=cisco-vem-v152-esx Enter username: root Enter password: Removal Result Message: Operation finished successfully. Reboot Required: false VIBs Installed: VIBs Removed: Cisco_bootbank_cisco-vem-v152-esx_4.2.1.2.1.1a.0-3.0.1 VIBs Skipped: C:\Program Files\VMware\VMware vSphere CLI>
Friday, 5 July 2013
Prerequisites for the vCenter Server Upgrade - Remove it from the linked mode group
except the vcenter server linked mode configuration wizard shows the "Isolate this vCenter Server instance from linked mode group" shaded or greyed out.
Fix: right click on vcenter server linked mode configuration and run as administrator
Fix: right click on vcenter server linked mode configuration and run as administrator
Tuesday, 11 June 2013
vcenter wont start - sql database transaction log disk full
set db to simple mode backup
and shrink the log file of the vc db
http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1003980
and shrink the log file of the vc db
http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1003980
Monday, 10 June 2013
Enabling Changed Block Tracking (CBT) for VMs in order for Tivoli Storage Manager (TSM) to perform an incremental backup of VMs
Enabling Changed Block Tracking (CBT) for VMs that have been migrated from ESX3.
In order for Tivoli Storage Manager TSM to perform an incremental backup of VMs.
Until these changes are made the backups will perform, but will be entire fulls each time.
With ref to these 2 KBs
Changed Block Tracking (CBT) on virtual machines
Enabling Changed Block Tracking (CBT) on virtual machines
As part of the migration process it is recommended to follow these steps:
1. VM is located on the vSphere4 host ready to be migrated to vSphere5. Power down VM.
2. Migrate VM to new vSphere5 host and datastore.
3. Leave the VM powered off on the new host and edit its settings adding the line ctkEnabled = "TRUE"
4. Power on VM and upgrade the VM Tools – this will reboot the VM.
5. Power off VM and upgrade the VM H/W
Step 3 Details:
The easiest way to add the extra line is to do it from the GUI when the VM is powered off: Click on the "Configuration Parameters..." button in the VM Edit Settings - Options - General...
Now Power on the VM…
Additional Information:
The actions above are editing the vmx file which can be found in the the VM’s working location
Eg
[DATASTORE_004] XPIE8_1/
With the VM powered off you can putty in to the VMs datastore location and manually edit the vmx file:
vmfs/volumes/4ba56729-6dd5tg6u-6194-001e6yh79a10/XPIE8 # cd /vmfs/volumes/DATASTORE004/XPIE8/
make a backup of the vmx file
cp *.vmx original.vmx
Edit the vmx
/vmfs/volumes/4ba56729-6dd5tg6u-6194-001e6yh79a10/XPIE8 # vi XPIE8.vmx
And add the line
ctkEnabled = "TRUE"
(now use vi commands: shift G for bottom of file, i for insert new text, type ctkEnabled = "TRUE" , then ESC, type :wq )
Power on the VM
If you have been successful you will see ctk files have been created….
You can check this using the following commands , in this example vm003prod is used as the example::
/vmfs/volumes/51b888a4-97643c51-e5r2-94r33c0f4359/vm003prod # grep -i ctk vm003prod.*
vm003prod.vmdk:changeTrackPath="vm003prod-ctk.vmdk"
vm003prod.vmx:scsi0:0.ctkEnabled = "true"
vm003prod.vmx:scsi0:1.ctkEnabled = "true"
vm003prod.vmx:scsi0:2.ctkEnabled = "true"
vm003prod.vmx:ctkEnabled = "true"
/vmfs/volumes/51b888a4-97643c51-e5r2-94r33c0f4359/vm003prod # ls -l
-rw------- 1 root root 13 Jun 7 09:36 vm003prod-aux.xml
-rw------- 1 root root 3932672 Jun 7 09:40 vm003prod-ctk.vmdk
-rw-r--r-- 1 root root 78 Jun 7 09:39 vm003prod-ee17dbd8.hlog
-rw------- 1 root root 8589934592 Jun 7 09:36 vm003prod-ee17dbd8.vswp
-rw------- 1 root root 64424509440 Jun 7 10:07 vm003prod-flat.vmdk
-rw------- 1 root root 8684 Jun 7 09:40 vm003prod.nvram
-rw------- 1 root root 591 Jun 7 09:39 vm003prod.vmdk
-rw-r--r-- 1 root root 0 Jun 7 09:36 vm003prod.vmsd
-rwxr-xr-x 1 root root 3739 Jun 7 09:40 vm003prod.vmx
-rw-r--r-- 1 root root 269 Jun 7 09:36 vm003prod.vmxf
-rw------- 1 root root 1310592 Jun 7 09:40 vm003prod_1-ctk.vmdk
-rw------- 1 root root 21464350720 Jun 7 09:39 vm003prod_1-rdm.vmdk
-rw------- 1 root root 559 Jun 7 09:40 vm003prod_1.vmdk
-rw------- 1 root root 1310592 Jun 7 09:40 vm003prod_2-ctk.vmdk
-rw------- 1 root root 21464350720 Jun 7 09:39 vm003prod_2-rdm.vmdk
-rw------- 1 root root 559 Jun 7 09:39 vm003prod_2.vmdk
-rw-r--r-- 1 root root 1760385 Jun 7 09:39 vmware-0.log
-rw------- 1 root root 152182 Jun 7 09:36 vmware-16.log
-rw------- 1 root root 152185 Jun 7 09:36 vmware-17.log
-rw------- 1 root root 152756 Jun 7 09:36 vmware-18.log
-rw------- 1 root root 152937 Jun 7 09:36 vmware-19.log
-rw------- 1 root root 153280 Jun 7 09:36 vmware-20.log
-rw------- 1 root root 1711582 Jun 7 09:36 vmware-21.log
-rw-r--r-- 1 root root 129214 Jun 7 09:41 vmware.log
-rw------- 1 root root 52428800 Jun 7 09:36 vmx-vm003prod-3994541016-1.vswp
Wednesday, 29 May 2013
configure snmp on an esxi host
Configure SNMP for ESXi
based on this www
http://pubs.vmware.com/vsphere-50/topic/com.vmware.vsphere.monitoring.doc_50/GUID-8EF36D7D-59B6-4C74-B1AA-4A9D18AB6250.html
numbers in brackets indicate the step is optional
0
download and install the vsphere cli to desktop - from the vcli command prompt:
1
Display snmp agent configuration
**********
vicfg-snmp.pl --server esxi001.domain.com -s
**********
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 0
UDP port : 161
Communities :
Notification targets :
Options :
EnvEventSource=indications
2
Configure SNMP Communities
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
Changing community list to: public1...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 0
UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications
3
If the SNMP agent is not enabled, enable it by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
Enabling agent...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 1UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications
4
Configure the SNMP Agent to Send Traps
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
Changing notification(trap) targets list to: solarwinds.domain.com@162/public1...
Complete.
5
Send a test trap to verify that the agent is configured correctly by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
Sending test nofication(trap) to all configured targets...
Complete. Check with each target to see if trap was received.
(6)
Configure the SNMP Agent for Polling (- not necessary - already done by default)
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
Changing udp port to 161...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications
(7)
Configure the Source used by the SNMP Agent for Hardware Events (- not necessary - already done by default)
**********
for vsphere4
vicfg-snmp.pl --server hostname --username username --password password -y sensors
for vsphere5
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
Changing source of hardware event source: indications...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com --username root --password Secret!! -s
Current SNMP agent settings:
Enabled : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications
8
(9)
Configure the SNMP Agent to Filter Traps
vicfg-snmp.pl --server hostname --username username --password password -n oid_list
From the vSphere CLI, vicfg-snmp.pl --server hostname --username username --password password -n oid_list
oid_list is a list of OIDs for the traps to filter, separated by commas. This list replaces any OIDs that were previously specificed using this command.
For example, to filter out coldStart (OID 1.3.6.1.4.1.6876.4.1.1.0) and warmStart (OID 1.3.6.1.4.1.6876.4.1.1.1) traps, type vicfg-snmp.pl --server hostname --username username --password password -n 1.3.6.1.4.1.6876.4.1.1.0,1.3.6.1.4.1.6876.4.1.1.1
To clear all trap filters, typevicfg-snmp.pl --server hostname --username username --password password -n reset
based on this www
http://pubs.vmware.com/vsphere-50/topic/com.vmware.vsphere.monitoring.doc_50/GUID-8EF36D7D-59B6-4C74-B1AA-4A9D18AB6250.html
numbers in brackets indicate the step is optional
0
download and install the vsphere cli to desktop - from the vcli command prompt:
1
Display snmp agent configuration
**********
vicfg-snmp.pl --server esxi001.domain.com -s
**********
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 0
UDP port : 161
Communities :
Notification targets :
Options :
EnvEventSource=indications
2
Configure SNMP Communities
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
Changing community list to: public1...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 0
UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications
3
If the SNMP agent is not enabled, enable it by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
Enabling agent...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 1UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications
4
Configure the SNMP Agent to Send Traps
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
Changing notification(trap) targets list to: solarwinds.domain.com@162/public1...
Complete.
5
Send a test trap to verify that the agent is configured correctly by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
Sending test nofication(trap) to all configured targets...
Complete. Check with each target to see if trap was received.
(6)
Configure the SNMP Agent for Polling (- not necessary - already done by default)
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
Changing udp port to 161...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications
(7)
Configure the Source used by the SNMP Agent for Hardware Events (- not necessary - already done by default)
**********
for vsphere4
vicfg-snmp.pl --server hostname --username username --password password -y sensors
for vsphere5
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
Changing source of hardware event source: indications...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com --username root --password Secret!! -s
Current SNMP agent settings:
Enabled : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications
8
Configure SNMP Management Client Software
(9)
Configure the SNMP Agent to Filter Traps
vicfg-snmp.pl --server hostname --username username --password password -n oid_list
From the vSphere CLI, vicfg-snmp.pl --server hostname --username username --password password -n oid_list
oid_list is a list of OIDs for the traps to filter, separated by commas. This list replaces any OIDs that were previously specificed using this command.
For example, to filter out coldStart (OID 1.3.6.1.4.1.6876.4.1.1.0) and warmStart (OID 1.3.6.1.4.1.6876.4.1.1.1) traps, type vicfg-snmp.pl --server hostname --username username --password password -n 1.3.6.1.4.1.6876.4.1.1.0,1.3.6.1.4.1.6876.4.1.1.1
To clear all trap filters, typevicfg-snmp.pl --server hostname --username username --password password -n reset
Friday, 24 May 2013
free vsphere tools and utilites
Flings
http://labs.vmware.com/
Top 10 Free Tools that must be in every VMware Administrators toolkit
http://vsphere-land.com/top-10-list/top-10-free-tools-that-must-be-in-every-vmware-administrators-toolkit.html
A List of FREE VMware vSphere Tools
http://kendrickcoleman.com/index.php/Tech-Blog/a-list-of-free-vmware-vsphere-tools.html
Top 10 Free VMware vSphere Tools and Utilities for 2011
http://www.kendrickcoleman.com/index.php/Tech-Blog/top-10-free-vmware-vsphere-tools-and-utilities-for-2011.html
VM Advanced ISO. Free Tools For Advanced Tasks
http://www.kendrickcoleman.com/index.php/Tech-Blog/vm-advanced-iso-free-tools-for-advanced-tasks.html
Foglight for Virtualization, Free Edition
http://www.quest.com/foglight-for-virtualization-free-edition/
Thursday, 23 May 2013
vmware tools install upgrade error how to force uninstall
force uninstall of vmtools / vmware tools
mount the vmtools cdrom in the vm using VM -> Guest -> Install / Upgrade VMware Tools - choose interactive install
from the VM command prompt cd to the cdrom drive and run the command
setup64 /c
this does the uninstall - no reboot needed
then run setup64 (from gui) to reinstall
error when trying to upgrade = isolation.tools.guestInitiatedUpgrade.disable = "FALSE"
mount the vmtools cdrom in the vm using VM -> Guest -> Install / Upgrade VMware Tools - choose interactive install
from the VM command prompt cd to the cdrom drive and run the command
setup64 /c
this does the uninstall - no reboot needed
then run setup64 (from gui) to reinstall
error when trying to upgrade = isolation.tools.guestInitiatedUpgrade.disable = "FALSE"
Wednesday, 22 May 2013
service mgmt-vmware stop start restart -ash: service: not found - Usage: /etc/init.d/hostd {start|stop|restart}
KB: 2030663
~ # service mgmt-vmware restart
-ash: service: not found
~ # /etc/init.d/hostd status
Usage: /etc/init.d/hostd {start|stop|restart}
~ # ps -s | grep hostd
16978 16978 hostd-worker WAIT UFUTEX 0-31 hostd
16979 16978 hostd-poll WAIT UPOL 0-31 hostd
16980 16978 hostd-worker WAIT USLP 0-31 hostd17006 16978 vix-high-p WAIT UPOL 0-31 hostd
17007 17007 nssquery WAIT UPIPER 0-31 /usr/libexec/hostd/nssquery
17008 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17010 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17011 16978 hostd-worker WAIT UFUTEX 0-31 hostd17087 16978 vix-poll WAIT UPOL 0-31 hostd
17275 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17390 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17506 16978 hostd-worker WAIT UFUTEX 0-31 hostd
~ # /etc/init.d/vpxa status
-ash: /etc/init.d/vpxa: not found
~ # ps -s | grep vpxa
16987 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
16997 16987 vpxa WAIT UPOL 0-31 /opt/vmware/vpxa/vpx/vpxa
16998 16987 vpxa WAIT USLP 0-31 /opt/vmware/vpxa/vpx/vpxa
16999 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17001 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17002 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17003 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17004 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17005 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17271 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17278 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17279 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17282 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17293 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17294 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17295 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17296 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17297 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
~ # service mgmt-vmware restart
-ash: service: not found
~ # /etc/init.d/hostd status
Usage: /etc/init.d/hostd {start|stop|restart}
~ # ps -s | grep hostd
16978 16978 hostd-worker WAIT UFUTEX 0-31 hostd
16979 16978 hostd-poll WAIT UPOL 0-31 hostd
16980 16978 hostd-worker WAIT USLP 0-31 hostd17006 16978 vix-high-p WAIT UPOL 0-31 hostd
17007 17007 nssquery WAIT UPIPER 0-31 /usr/libexec/hostd/nssquery
17008 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17010 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17011 16978 hostd-worker WAIT UFUTEX 0-31 hostd17087 16978 vix-poll WAIT UPOL 0-31 hostd
17275 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17390 16978 hostd-worker WAIT UFUTEX 0-31 hostd
17506 16978 hostd-worker WAIT UFUTEX 0-31 hostd
~ # /etc/init.d/vpxa status
-ash: /etc/init.d/vpxa: not found
~ # ps -s | grep vpxa
16987 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
16997 16987 vpxa WAIT UPOL 0-31 /opt/vmware/vpxa/vpx/vpxa
16998 16987 vpxa WAIT USLP 0-31 /opt/vmware/vpxa/vpx/vpxa
16999 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17001 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17002 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17003 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17004 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17005 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17271 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17278 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17279 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17282 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17293 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17294 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17295 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17296 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17297 16987 vpxa WAIT UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
Subscribe to:
Comments (Atom)



