AWS Cloudformation – 1 VPC, Two EC2 Instances
Another very simple AWS Cloudformation example. The template deploys the following:
More...The ramblings of a computer geek
Another very simple AWS Cloudformation example. The template deploys the following:
More...AWS Cloudformation is a tool and declaritive language you can use to declare what you want your “stack” (i.e. your deployment of AWS resources) to look like. You define all the resources you want AWS to spin up in a blueprint document, click a button, and then AWS magically creates it all. This blueprint is […]
More...The Path Selection Policy is set for devices to determine how the ESXi host will utilise the paths to the storage, for example, you can have “Fixed” or “Round Robin” or “Most Recently Used”, you can also have storage vendor provided ones such as “NIMBLE_PSP_DIRECTED”. The scripts and commands I’ve found keep mentioning “Multipathing”, if […]
More...We had a very odd situation occur on one of our VMware ESXi 7.0.3 clusters (VMware ESXi, 7.0.3, 20328353), which is using iSCSI with HPE Nimble Storage. Some new storage was presented to the hosts via iSCSI. The first host was scanned, the datastore prepared as normal. Once complete, then started to perform a re-scan […]
More...Sometimes it is helpful just to get a script running on a machine to generate some disk IO load. I use this for two main reasons, one is during the testing or proving of a storage platform in terms of its availability during a fail-over or maintenance situation (e.g. it’s storage processors), the other is […]
More...Hashicorp’s Terraform is an Infrastructure as Code (IaC) declarative language that allows you to define the existence and state of objects within your infrastructure and then publish this new state to your infrastructure. Terraform is agnostic of platform, you can use a wide range of “providers” to manage a number of different infrastructure components from […]
More...IT Security continues to be a very important topic in the IT ecosystem, ensuring your Information Security is as good as it can be also makes good business sense, through the reduction of risk of loss and showing commitment to your customers of your organisation’s quality and capability. Information Security doesn’t just come from technical […]
More...I’ve recently had a problem on some new servers where a BIOS Admin Password had been set by accident, HPE provide this as a solution on their forums: https://community.hpe.com/t5/proliant-servers-ml-dl-sl/how-do-i-disable-the-bios-admin-password-on-a-gen10-dl360/m-p/7166755#M178013 However the Gen10Plus (+) servers appear to be a bit different, upon entering the forward slash “/” on the end of the password to remove it, […]
More...I had a host that was showing devices with no datastore, saying “Not Consumed”. This is what you’d expect to see for a device where the device has yet to be formatted with VMFS. Now in this case it definitely had a VMFS filesystem created. The fix for this was fairly simple. Essentially the host […]
More...If you want to check the (MD5/SHA) hash of a file you can do this on Microsoft Windows with “Get-FileHash” within PowerShell. Here is a simple script to take a File, the Hash Algorithm Type and Expected Hash for the file to compare, it hashes the file and then compares it with the expected hash […]
More...