January 14, 2015 asvignesh

There is an updated rolled out for chrome today which adds adds a new menu in the top-right of the chrome browser that allows the user to manages the user accounts. Many people feels it as ugly and a bit obnoxious, If you are the one who doesn’t switch the accounts often here is the tip to disable the menu To disable it,head into your flags menu. Type in address bar chrome://flags Search the page for “Enable new profile management system” Change the drop-down menu to “Disabled” Restart Chrome That’s it. You’ll lose the user management menu and return to…

January 8, 2015 asvignesh

HTTP GET The HTTP GET method is used to retrieve (or read) a representation of a web resource. In the non-error ( aka Happy path ) path, GET returns a representation in form of XML or JSON and the HTTP Status code will be 200 (OK). In case of any error in the path, it most often returns a 404 (NOT FOUND) or 400 (BAD REQUEST). According to the design of the HTTP specification, GET requests are used only to read data and not change it. Therefore, when used this way, they are considered safe. That is, they can be…

January 8, 2015 asvignesh 1Comment

Representational State Transfer (REST) has gained widespread acceptance across the Web as a simpler alternative to other Web services ( SOAP and WSDL ). REST is an architecture style or design pattern used as a set of guidelines for creating web services which allow anything connected to a network to communicate with one another via a shared common communications protocol known as Hypertext Transfer Protocol (HTTP). The same HTTP verbs (GET, POST, PUT, DELETE etc.) used by web browsers to retrieve and display web pages, audio/video files, images etc. from remote servers and post data back to them when performing…

January 6, 2015 asvignesh

Inconsistent Backup The oldest type of backup probably not consistent. The process of taking the backup was so simple, backup application starts at the beginning of a file structure and copies all of the data until it reaches the end, resulting in a backup (Inconsistent). The reason which can make this backup inconsistent is that if any user added/modified after a backup but before it completed that would result in an inconsistent backup; the files in the backup are not consistent. Mainly the volumes which have Random read and random writes application like databases these types of backups do not…

October 9, 2014 asvignesh

VMware vCenter 5.1 and before the default behavior was to allow all domain admins to login and administrate your ESXi hosts. Once the 5.5 vCenter installed if you try and connect using a domain account you will get the error :The vSphere Client could not connect to “FQDN / IP”. You do not have permission to login to the server: FQDN / IP   To get domain credentials to work you need to login to the VMware vSphere Web Client and setup the relevant permissions. So how to login to vCenter using web client if domain users are not allowed?…

September 19, 2014 asvignesh

Setup iSCSI Initiator iSCSI Initiator is by default installed in Windows 7. You can access it  from Control Panel or Administrative Tools Click on iSCSI Initiator   If the service is not running it will prompt to start the service,Click Yes     Set the Ip of your iSCSI Target server, To create a iSCSI Target server in Ubuntu refer : http://blog.asvignesh.in/setup-iscsi-target-server-in-ubuntu/ Click Quick Connect Select the IP and click Connect Now the IP will show as connected in the Targets, Select Volumes and Devices tab Click Auto Configure Click Ok to close the iSCSI initiator properties Initialize and Format…

September 19, 2014 asvignesh

Setup Environment I have one Ubuntu server for iSCSI target and one Windows Machine for Initiator Target Server vignesh@vignesh-server:~$ sudo su root@vignesh-server:~$ apt-get update root@vignesh-server:~$ apt-get install iscsitarget Note : If you have changed the kernel version (Upgraded your Ubuntu ) you may hit FATAL: Module iscsi_trgt not found. if you hit this issue run apt-get install iscsitarget-dkms Creating Virtual Disk Create a new virtual disk of desired size,I am creating 5000M root@vignesh-server:~$ mkdir /mnt/iscsi root@vignesh-server:~$ dd if=/dev/zero of=/mnt/iscsi/scsivdisk.img bs=1M count=5000 Note dd is the Unix command , reads from STDIN and STDOUT but these can be change using if…

May 8, 2014 asvignesh 1Comment

This is reference article for VMware ESXi 5.x logs, their locations and use-cases. Log File Location Description Troubleshooting /var/log/auth.log ESXi Shell authentication success and failure Security /var/log/dhclient.log DHCP client service, including discovery, address lease requests and renewals Networking /var/log/esxupdate.log ESXi patch and update installation logs Updates, Security /var/log/hostd.log Host management service logs, including virtual machine and host Task and Events, communication with the vSphere Client and vCenter Server vpxa agent, and SDK connections. vCenter, Events, Security, Networking /var/log/shell.log ESXi Shell usage logs, including enable/disable and every command entered Security /var/log/sysboot.log Early VMkernel startup and module loading Host /var/log/syslog.log Management service…

April 14, 2014 asvignesh 6Comment

VMware Vcenter 5.1 and before the default behaviour was to allow all domain admins to login and administrate your ESXi hosts. Once the 5.5 vCenter installed if you try and connect using a domain account you will get the error :The vSphere Client could not connect to “FQDN / IP”. You do not have permission to login to the server: FQDN / IP   To get domain credentials to work you need to login to the VMware vSphere Web Client and setup the relevant permissions. So how to login to vCenter using web client if domain users are not allowed?…

February 18, 2014 asvignesh 4Comment

The OVF in vSphere is not just about deployment and packaging. There is also a runtime part, namely the OVF environment. This is a feature that has been around since the early days of vSphere 4.x, if not earlier which provides a mechanism to retrieve some of this information as well as custom properties. The OVF feature provides users with the capability to pass in any type of metadata information such as application start up parameters, network configuration, password management, etc. directly into the guestOS for flexible guest customization. In this post, i will show how to fetch the runtime…