vSphere Upgrade Saga: 6.0 Upgrade through SRM

There are many steps to the upgrade of vSphere, as outlined by KB Article 2109760, with the steps for my environment starting at step 4 (vCNS). However, before I could start my upgrade, I had to upgrade any third-party systems first, as well as to upgrade any Microsoft Windows Servers. Everything went fine for vCNS, View Composer, and View Connection Server. However, problem creep started with the View security server (not really on the list, but if you update the Connection Server, you have to upgrade any security servers at the same time). Continue reading vSphere Upgrade Saga: 6.0 Upgrade through SRM

vSphere Upgrade Saga: vSphere 6.0, Third-Party

In vSphere Upgrade Saga: Planning for vSphere 6.0, I discussed the need to plan your upgrade as well as the need to delay your upgrade until your third-party software has caught up with VMware’s latest release. I now have all the bits for my critical third-party components, and it is time to first upgrade them. Continue reading vSphere Upgrade Saga: vSphere 6.0, Third-Party

RHEV Upgrade Saga: KVM Client Take II

In my June 2014 RHEV Upgrade Saga article, I discussed how to build a KVM client for your own use. The method used the Q35 (2009) chipset features that were dropped from RHEL 7 KVM as of version 7.1. This has caused quite a few issues with my deployment of a KVM client system. However, since I have Ivy Bridge (maybe Haswell) chips in my SuperMicro 3U KVM server, I also have access to Intel VT-d, as well as to VT-x, AES-NI, and many other useful chipset features. The most important for a KVM client is Intel VT-d, as it allows you to map USB and PCI devices directly to a VM. Continue reading RHEV Upgrade Saga: KVM Client Take II

A Quiet Rack

My lab environment sits within a closet in my home office. It is not a particularly large closet, but it has been decked out with its own air conditioning, extra insulation in all the walls, and a double-pane insulated external door. The goal? To keep the rack cool, of course, but also to prevent noise from leaking out to the office and the rest of the house. Continue reading A Quiet Rack

WordPress Hacked: Security Steps and Cleanup Take III

In WordPress Hacked: Security Steps Take II, I wrote about the tools and steps to take to secure your WordPress installation. The current steps to take are the same. The tools, however, have changed significantly.  Even as the steps changed from WordPress Hacked: Security Steps, now we look at the tools once more. I will reiterate the steps at the end of the post for completeness. However, let us begin by examining the tools. I have removed quite a few from my installs that I had previously recommended, and I will explain why below. Continue reading WordPress Hacked: Security Steps and Cleanup Take III

Providing Consulting for all your Cloud, Security, and Virtualization Needs