Wednesday 20 May 2009

Installing ESX 4.0 GA

As most people probably know by now, vSphere 4.0 was released in GA earlier today (2009.05.21). To try it out, I have installed ESX 4.0 in Workstation 6.5.1 on a Lenovo T61 - and it works fine. For those who haven't had a chance to play with it yet, here's some screenshots of the installation process, see below.

Workstation VM settings:
  • OS type: Redhat Enterprise Linux 4 64-bit
  • Mem: 2 GB (that was minimum on the beta)
  • Network: Bridged (tick the "Replicate physical network connection state)
  • Processor: 1, choose Intel-VT or AMD-V as preferred mode
















Tuesday 19 May 2009

P2V - Error with NIC after migration with static IP

When doing a P2V and the server has to have a static IP address after the migration, then you may recieve an error message stating that there's an IP conflict and the ip is already configured on an existing NIC - even though only one VMware NIC is visible in network connections.

The reason is that the physical NICs have not been entirely uninstalled in Windows, they still exist in the device manager as hidden devices. Do the following to uninstall the hidden NICs:

Open a command prompt and type the following commands:

set devmgr_show_nonpresent_devices=1
start DEVMGMT.MSC

Click ‘View’ and then click ‘Show Hidden Devices’.
Expand the Network Adapters tree and right click the dimmed network adapter and click ‘Uninstall’ (You may also see a hidden 'RAS async adapter' device under NICs. This cannot be uninstalled. However, it doesn't matter as it doesn't influence the NIC issue, so just leave it).

Sunday 3 May 2009

iSCSI on a Windows box with Starwind

If you want to run shared storage in e.g. a test setup, then Starwind's iSCSI application can be recommended. Earlier, I have tried Openfiler (iSCSI in a linux distro VM) which works fine, It's not too complicated to configure, but still it's much easier with Starwind iSCSI in a Windows environment. The application is free but there's a 2 TB storage limit.


Starwind installation guide. It's easy to install, just go next next done. Load the serial key, connect to the localhost (user: test, pw: test), add a new device, and then follow install guide page pp 5.


For a guide on how to configure iSCSI in ESX 3 and 4, click here

A typical test setup could be one physcial host with 8 GB of memory and one quad core cpu. Check vm-help.com for a list of compatible whitebox ESX hardware.

From ESX 4 it's possible to run ESX as a VM within an ESX. Even VMotion will work (go to vcritical.com for a demonstration). And if you have a VM with an iSCSI target running on it, then you have a full enterprise setup running on one box.

Friday 1 May 2009

Computer Terms and their Meanings


Here is a quick list of computer terms, most being requests from Tips4pc members. You can also get a free 59 page PDF Computer Terms Dictionary when you sign up for the Tips4pc newsletter at the bottom of every post.
Basic Computer Terminology:
1. Bit: A binary unit of data storage with only 2 digits 0 and 1.
2. BIOS: Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk.
3. Boot: Another Computer term for “Starting a Computer”. Similarly reboot means restart.
4. Byte: 8 bits of data which has a possible value from 0 to 255.
5. Program: A series of instructions to the computer from a user to process different types of tasks according to our need and necessity.
6. Operating System (OS): An operating system works an interface between User and the hardware. It is basically the platform on which users work. Various OS include Windows, MAC OSX, and Linux etc.
7. Application: Application is program that runs on an Operating System. For ex. music player, browser, messengers etc.
8. Internet: It is a worldwide system of computer networks – a network of networks in which users at any one computer can get information from any other computer.
9. Browser: It is a program that displays the files and data on internet through World Wide Web. Examples Include Mozilla Firefox, Google Chrome etc.
10.  Driver: A specially written program which understands the operation of the device it interfaces to, such as a printer, video card, sound card or CD ROM drive. It provides an interface for the operating system to use the device.
11.  File: A collection of data into a permanent storage structure stored on the hard drive.
12.  Floppy disk: A very low capacity storage media which can be written to as easily as it is read. It is highly out of date.
13.  Floppy Drive: The hardware component that is used to read or write to a floppy disk.
14.  Hardware: Describes the physical parts of your computer which you can physically touch or see such as your monitor, case, disk drives etc.
15.  Memory: Used to provide the temporary storage of information function.
16.  Network: A general term describing to the cables and electronic components that carry data between computers. It is also generally used to refer to the server computers that provide services such as printing, file sharing, e-mail, and other services.
17.  Protocols: A standard method used for communications or other internet and network functions.
18.  Security flaw: A software bug allowing an attacker a method to gain unauthorized access to a system.
19.  Serial: A data transmission method where data is sent on a single line and one bit is sent at a time. This is similar to a line which one item must come one after another.
20.  Software: Describes the programs that run on your system.
21.  SPAM: A term used to describe junk and unsolicited e-mail.
22.  Storage Media: A term used to describe any magnetic device that computer data can be permanently stored on such as a hard drive or floppy drive.
23.  URL: Uniform Resource Locator is the term used to describe a link which points to a location of a file on the internet.
24. Virus: A program that runs on a system against the owner’s or user’s wishes and knowledge and can spread by infecting files or sending itself through e-mail.
25.  Vulnerability: Software errors that allow some kind of unauthorized access when they are used or exploited.
26.  Word: Two bytes or 16 bits of data with a possible unsigned value from 0 to 16535.
27.  Worm: A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer without the user doing anything but connecting to an infected network.
Next previous home