There are a several good points made my new blogging buddy, Miguel. Number one, you don’t include in your design features for the sake of features. This may seem obvious, but perhaps for a passionate (maybe overzealous!) VMware Architect, implementing features on which on-site staff are not proficient or can’t manage is not a benefit. As Miguel shares in this “palm-to-face” anecdote, such features in the hands of untrained staff can have the opposite effect for which they’re designed. So take into account the staff’s abilities before including advanced features in your design. Number two, communication is key in any environment. Communicating to the customer the gravity of the decisions they make in regards to what’s included in the design and certainly sharing planned maintenance times with all stakeholders. A communication strategy and change control process are key to making this work. Number three, as Miguel shared with me, if an admin is looking at his virtual infrastructure like a hog looks at a wristwatch, well, things are pretty bad. And finally, always remember: VMware’s easy.

Google

vmmojo's avatarvmmojo

I had a long-term project at a customer site where I was to analyze, design, and architect a solution based on the equipment, environment, and requirements. Before I rolled in to the customer site as the new VMware SME, there had been a recommendation by a junior and recent VCP to implement distributed switching, linked vCenters and a few other feature sets of VMware and NetApp. There was not any experience with distributed switching by the on-site staff and their exposure to VMware was minimal, although many thought themselves as experts after a few weeks with the product. I kept hearing the comment that VMware was easy. I recommended a hybrid solution with the MC using standard switching, and VM network\storage on distributed switching as a compromise to a fully distributed solution. They decided against this even after I presented them with the advantages.
A few weeks later they had…

View original post 378 more words


ESXi 5 Purple Screen of Death in VMware Workstation 8


While I’m traveling, I carry a beefy laptop as a mobile test lab. I fired it up recently after several weeks of no lab work and to my chagrin, looked up and saw the dreaded purple screen of death for the first time. I saw this as a good opportunity to research this particular PSoD and post my findings.

Read the rest of this entry »


Replacing a Cisco Nexus 2224 Fabric Extender


So my team and I got a call to swing by a customer’s site on our way to another job. They told us half the ports went bad on a FEX and we were to install the replacement that just arrived onsite. In this post, I’ll explain how to replace the FEX (which is trivial) and more importantly how to verify that it’s working after installation.

Read the rest of this entry »


2011 in review


The WordPress.com stats helper monkeys prepared a 2011 annual report for this blog.

Here’s an excerpt:

A San Francisco cable car holds 60 people. This blog was viewed about 1,200 times in 2011. If it were a cable car, it would take about 20 trips to carry that many people.

Click here to see the complete report.

Google


How to Configure LUN Masking with Openfiler 2.99 and ESXi 4.1


This is a duplicate post on this blog but for good reason. I’m back home for vacation and my on-ramp to the interwebs is finally high speed DSL and more reliable than when I first posted several months ago. Therefore, I’m able to include my original screenshots with this post. I had to remove the screenshots in the first post because they wouldn’t upload. I hope this post will give you that visual aid that’s so helpful in walkthroughs.

Read the rest of this entry »


I passed the VCP 5 exam!


A happy day for me, indeed! I passed my VMware Certified Professional on vSphere 5 exam today in Rolla, MIssouri. I’ve been studying vSphere 5 now for about 5 months.

Because my current project is implementing vSphere 4.1 data centers, I was planning on attending the Install, Configure, and Manage course for vSphere 4.1 – I even bought the 4.1 course. Then vSphere 5 came out and my course provider, Global Knowledge, changed my 4.1 course to version 5. That was ok by me. I just changed gears and started studying for vSphere 5. I’ve been able to set up version 5 test labs at different customer sites parallel to our 4.1 implementations. The test labs have all consisted of nested ESXi boxes.

Read the rest of this entry »


Windows Server 2003 won’t boot after a P2V


So far, our Physical-to-Virtual migrations of Exchange 2003 on x86 Server 2003 Enterprise boxes have gone mostly smoothly – until this evening, that is. In the past, a failure soon after the P2V process started was resolved with a reboot or by disabling the TCP Offload Engine on the Broadcom NICs (this was easily accomplished with the cmd.exe command netsh int ip set chimney DISABLED).

This evening’s P2Vs were a bit more challenging.

Read the rest of this entry »


Installing vCenter Server does not complete with Windows Server 2008


This is a quickie post to share what I found when installing vCenter Server on a 64-bit Windows Server 2008 Enterprise Edition virtual machine. This VMware KB article is the error we received.

Apparently, during the installation of vCenter Server, Active Directory Lightweight Directory Services is installed. I hadn’t noticed this before. We had no server roles installed prior to installing vCenter, but after clicking through the error boxes that appeared, we saw that AD LDS, sure enough, appeared to be installed.

Keep reading


Upgrading NX-OS on the Nexus 5020


During another virtualization implementation at a customer’s site, I had the opportunity to upgrade Nexus 5020 switches. We upgraded from 5.0(2)N2(1) to 5.0(3)N2(1). The process was surprisingly simple. The steps include

1. Setting up an TFTP server
2. Uploading both the NX-OS binary and the kickstart binary
3. Installing the binaries

Keep reading


The Quick and Dirty (and Free!) IP Scanner


(edit: 12Aug24) PowerShell version:

& {for ($i=1;$i -le 254;$i++) {ping 192.168.86.$i -n 1 | Select-String “bytes=32”} } | out-file c:\temp\ping.txt

If, on occasion, you need to scan a range of IP addresses for live devices but don’t have access to the many tools for such a task, free or otherwise, memorize this little trick and move on to more important things!

Open a command prompt and type

for /L %i in (1,1,254) do ping -n 1 xxx.xxx.xxx.%i | find “Reply” >> c:\ping.txt

Be sure to replace the x’s in the above command with the correct portion of the IP address range you want to scan.

The output below is what the command looks like when it’s running.

Keep reading