July 31, 2018 asvignesh

If you’re looking into data protection solutions you’re probably have heard the phrase “3-2-1 backup”. You’ll hear it from most IT consultants, professionals as well as many backup vendors and admins. Every admin should have backups. This 3-2-1 principle works for any virtual environment regardless of the hypervisors you are running (VMware, Hyper-V or whatever). and it can effectively address any failure scenario Keep at least 3 copies of your data That includes the original copy and at least two backups. Keep the backed-up data on 2 different storage types The chances of having two failures of the same storage type…

July 25, 2018 asvignesh 1Comment

While having the discussion at Nimesa about the cost-saving options for AWS cloud, we found one of the most costly of AWS sins is the pervasive habit of running dev test EC2 instances after business hours. Whether you are leaving AWS instances running that were intended for short-term use or running dev-test, pre-prod, developer instances outside of business hour, the effect on your total bill can be massive. One of the best ways for cost saving on your AWS spend is to shut down your Dev/ Test AWS Instances outside of business hours and during weekends. But to turn on and off…

July 7, 2018 asvignesh

Cloud Server/network outages are wrecking balls, and it can happen with a dominant market player like the Amazon Web Services (AWS), The latest is an extensive outage brought on by a human error at an AWS data center in Virginia. Many consider it to be the worst hit in four years. And in June 2016: The storms that battered Sydney also shook AWS services. An extensive power outage led to the failure of a number of Elastic Compute Cloud (EC2) instances and Elastic Block Store (EBS) volumes, many of which hosted critical workloads for big brands. The result was that…

June 22, 2018 asvignesh

Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. A backup refers to the copying into an archive file of computer data so it may be used to restore the original after a data loss event. If a computer system is not having active IOs to the backup directory and we copy the data to archival location then we have a good copy of backup ( consistent backup ) . If a computer system is in use while it is being backed up, the…

January 28, 2018 asvignesh

Cloud computing came through long way by replacing layer after a layer we used bare metal server then Virtual servers then Containers now Serverless computing Serverless is the next evolution of application and system design and deployment. Serverless applications are built upon functions—small code artifacts, which are compact and specific to a disc Serverless doesn’t mean servers are no more required to run workloads, it simply means that developers no longer have to think about them, this will make the developers focus more on tasks than servers. Serverless is often called as Function as service Amazon AWS has FaaS called…

January 28, 2018 asvignesh 15Comment

AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume – there is no charge when your code is not running. With Lambda, you can run code for virtually any type of application or backend service – all with zero administration. Just upload your code and Lambda takes care of everything required to run and scale your code with high availability. You can set up your code to automatically trigger from other AWS services or call it directly from any web or mobile app. In my last post, i wrote…

January 22, 2018 asvignesh 1Comment

Recently, An Indiana hospital paid a ransom of $55,000 to get rid of ransomware that had infected its systems and was hindering operations. when attackers breached the network of Hancock Health, a regional hospital in the city of Greenfield, Indiana. Hancock Health CEO Steve Long said the hackers are believed to be in eastern Europe and may have used a type of ransomware called SamSam, SamSam encrypted files and renamed them with the phrase “I’m sorry”, according to a local newspaper who broke the news. The hospital said that despite having backups it opted to pay the ransom demand of…

January 6, 2018 asvignesh

Amazon Linux a free, very up-to-date OS, complete with all AWS tools, Amazon has made it pretty compelling to use their OS over any others. But it was not open source. Now Amazon released Amazon Linux 2 an open source* Linux operating system. It provides a high performance, stable, and secure execution environment for cloud and enterprise applications. Amazon Linux 2 will offer the extended availability of software updates for the core operating system through 5 years of long-term support and provides access to the latest software packages through the Amazon Linux Extras repository. Earlier Amazon Linux was available only as AMI…

February 29, 2016 asvignesh

Shadow Copies  are possible for almost all volumes and not “all volumes”. There are few cases which the shadow copy may not work Enough Space The shadow storage volume must contain enough free space. At the very minimum you need at least 300 MB or so, for a single shadow copy, for multiple shadow copies, the space can increase more depending on the I/O usage. You can always run the command VSSADMIN LIST SHADOWSTORAGE to see how much space is used for the existing shadow copies. Only Fixed Drives Only fixed drives are supported. You cannot enable Shadow Copy on removable,…

September 8, 2015 asvignesh 2Comment

Recently My client have been having some issues with the vSphere web client plugins, they were getting #1009 error often Initially i googled and try to find the solution and root cause, many blogs are suggesting disable the installed plugins and try again. Later i read somewhere ( forget the link) , clearing cache would help This issue is because of the cached objects and it happened when you are navigating through the inventory in the vSphere 6.0, usually this error message pops up, you have to refresh your full web page Error 1009, click yes…

August 8, 2015 asvignesh

I’ve been developing an automation scripts to provision and expand VMFS Datastore. Expand not Extent… I increased the storage volume size and need to increase the size of VMFS datastore without affording the downtime Here is the VIjava / YAVI Java code for expanding the datastore   https://gist.github.com/cd02090562b8cf2ee0e3   [amazon_link asins=’B002SSBD8A’ template=’ProductLink’ store=’asvignesh-21′ marketplace=’IN’ link_id=’2f839008-c0c9-11e7-a460-f1aec9ea1733′]

May 22, 2015 asvignesh 1Comment

VSS hardware provider can be initiate and test using DiskShadow Commands Open the Powershell and Enter Diskshadow PS C:\Users\Administrator> diskshadow Microsoft DiskShadow version 1.0 Copyright (C) 2013 Microsoft Corporation On computer: WIN-VigneshDev, 5/22/2015 12:06:35 AM DISKSHADOW> List the Hardware Providers DISKSHADOW> list providers * ProviderID: {74600e39-7dc5-4567-a03b-f091d6c7b092} Type: [2] VSS_PROV_SOFTWARE Name: Hyper-V IC Software Shadow Copy Provider Version: 1.0.0.0 CLSID: {3e02620c-e180-44f3-b154-2473646e4cb8} * ProviderID: {89300202-3cec-4981-9171-19f59559e0f2} Type: [4] VSS_PROV_FILESHARE Name: Microsoft File Share Shadow Copy provider Version: 1.0.0.1 CLSID: {fce59da7-7bac-40da-8d21-3e7311ba51cd} * ProviderID: {b57190af-4567-4dd0-ad8d51abd60b20d5 Type: [3] VSS_PROV_HARDWARE Name: Vignesh Test Provider Version: 6.2.9200.16384 * ProviderID: {b5946137-7b9f-4925-af80-51abd60b20d5} Type: [1] VSS_PROV_SYSTEM Name: Microsoft Software Shadow Copy…

January 6, 2015 asvignesh

Inconsistent Backup The oldest type of backup probably not consistent. The process of taking the backup was so simple, backup application starts at the beginning of a file structure and copies all of the data until it reaches the end, resulting in a backup (Inconsistent). The reason which can make this backup inconsistent is that if any user added/modified after a backup but before it completed that would result in an inconsistent backup; the files in the backup are not consistent. Mainly the volumes which have Random read and random writes application like databases these types of backups do not…

September 24, 2018 asvignesh

For Amazon Linux 2 or the Amazon Linux AMI, the username is ec2-user.For a Centos AMI, the username is centos.For a Debian AMI, the username is admin or root.For a Fedora AMI, the username is ec2-user or fedora.For an RHEL AMI, the username is ec2-user or root.For a SUSE AMI, the username is ec2-user or root.For an Ubuntu AMI, the username is ubuntu.

August 17, 2018 asvignesh

To increased security to your AWS root account, Amazon web services recommend configuring multi-factor authentication (MFA) to help protect your AWS resources. MFA adds extra security because it requires users to type a unique authentication code from an approved authentication device or SMS (Short Message Service) text message when they access AWS websites or services. Security token-based type of MFA requires you to assign an MFA device (hardware or virtual) to the IAM user or the AWS account root user. A virtual device is a software application running on a phone or other mobile device that emulates a physical device. Either…

May 10, 2018 asvignesh

With vSphere 6.7 web services SOAP API  includes the creation date of a Virtual Machine and will be persisted with the life-cycle of the VM itself. You can get it from Virtual Machine -> Config -> createDate. Earlier to 6.7, we can track the VM Creation Time using EventManager. We should create an EventFilterSpec to filter the events by Virtual Machine creation or deployed, Registered or Cloned Events. new String[]{“VmCreatedEvent”, “VmBeingDeployedEvent”, “VmRegisteredEvent”, “VmClonedEvent”} Get Virtual Machine Creation Time earlier to vSphere 6.7 Java https://gist.github.com/asvignesh/fd97f4cbc41ac55e5b289c3424c0f09a vSphere Power CLI https://gist.github.com/asvignesh/327169f8456bbd613eebfad3d9768fa8

May 5, 2018 asvignesh

I recently had a demand to deploy an OVF (Open Virtualization Format is an open-source standard for packaging and distributing software applications for virtual machines) which is located on Datastore of ESXi Server. When you try to deploy from vSphere web client ( Flash / HTML) you can specify the OVF URL or the location accessible from my computer. Specifying the path from the local computer is simple if browser detects the VMware Client Integration tool. But you cant see the option to deploy from Datastore. How to Deploy an OVF from ESXi Datastore In vSphere, you have an option to…

April 10, 2018 asvignesh

To fetch the querystring parameters in Controller we usually use request().queryString() Map<String, String[]> queryString = request().queryString(); If we have multiple query-string keys and want to use a POJO to use query-string instead of parsing everything in Controller we can use QueryStringBindable If you have take a look in your project you will see just simple parameters as argument ( Path argument ) in your GET method controller, In order to use Java POJO as input for query string i implements QueryStringBindable<T> in my POJO Here is my sample POJO and my controller method https://gist.github.com/asvignesh/911ff1b6dd4b96a5368e9d113a6591d0 Added a entry in routes, GET…