Microsoft Exchange 2016 DAG Error Setting Witness Server and WitnessDirectory

We have a number of 2 node DAGs which provide our Microsoft Exchange 2016 service. Being a 2 node DAG a file share witness server is in place. We had a datacentre event that took out one of the nodes and the witness server, rendering the one of the DAGs unhealthy and a second in […]

More...

Dell PowerScale – Find Connected Clients

Finding the connected clients to a Dell PowerScale storage cluster is fairly straightforward, however you should be aware that it only shows clients that have active IO (input-output) operations in flight at the time you run the command. You can still have clients connected, but are idling, so are invisible. You can also specify a […]

More...

VMware vCenter – Extending Disk to Resolve Log Disk Exhaustion

If and when a log disk begins to fill up you will see messages such as “Log Disk Exhaustion on <vcenter name>”.  Within the vCenter console and VAMI you can see the log drive is running low on space. If you are using VMware HA for vCenter, i.e. two vCenter appliances, you will need to […]

More...

Extreme Networks Port Mirroring (Spanning) for Packet Capturing

The capture of network traffic can be useful in troubleshooting issues. Although it is possible to complete this on the switch itself your milage may vary. You require a machine with some packet capture software running and listening on the relevant network interface. XOS In this example we’ll be mirroring port 1 to port 10, […]

More...

What can people really see when you use un-encrypted connections?

Although its becoming increasingly rare nowadays to be using un-encrypted connections, let’s see what it really means at the network level. Un-encrypted connections on their own are not necessarily a problem, its all about what value what you are sending has and therefore what could be exposed to a nefarious actor. If you are viewing […]

More...