Mar 25

So you P2V’d a Linux box (CentOS, RedHat, Oracle, etc.) that is using LVM and now when it boots you get:

Reading all physical volumes. This may take awhile…
Volume group “VolGroup00” not found
Unable to access resume device (/dev/VolGroup00/LogVol01)
mount: could not find filesystem ‘/dev/root’
setuproot: moving /dev failed: No such file or directory
setuproot: error mounting /proc: No such file or directory
setuproot: error mounting /sys: No such file or directory
switchroot: mount failed: No such file or directory
Kernel panic – not syncing: Attempted to kill init!

Well that sucks–basically initrd didn’t have the right drivers to access the file system.

Reboot the VM with the Linux distro ISO attached

Then it boots from the CD follow the instructions to enter Linux Rescue (usually you type “linux rescue” at the boot prompt)

Now we can rebuild initrd with the missing drivers.

Enter:

 

Type:

Now hit tab and it will auto complete then add the text that was autocompleted when you hit tab except for the .img

So your command should look like:

Hit enter and it will do it’s thing with a lot of output coming out, when it’s done type exit annd exit again and the VM will reboot automatically.  Should boot up just fine this time.

Mar 7
P2V: Domain Controllers in-depth
icon1 Michael Requeny | icon2 VMware | icon4 03 7th, 2011| icon33 Comments »

The official VMware KB 1006996 on virtualizing existing domain controllers recommends 4 options (simplified below):

  1. Demote the DC via dcpromo, do the conversion, then promote the DC back again using dcpromo–With all that trouble why not just build a new one?
  2. Cold Clone–Cool, except if I’m working remote I need a working out of band management solution to boot the DC with the ISO…or setup a PXE server to provide a bootable cold clone image to do this, regardless too much extra leg work.
  3. Use Directory Services Restore Mode (DSRM) and do a hot conversion, cool, but now I need to reboot these guys and hope someone remembers the DSRM password, or reset it before hand…
  4. Get rid of the old DC via dcpromo and build a new VM and promote it–no conversion at all, wait what?

Having to P2V over a hundred DCs we didn’t particually like any of these options, the KB focuses on the possibility of a corrupt NTDS.DIT if you don’t follow any of those recommendations.  For our first few we did the DSRM route:

Read the rest of this entry »

Feb 27

This is an updated version with more Intel removal goodness…see my previous post for more information on Automated P2V Cleanup: Remove/Uninstall Dell OpenManage & Broadcom/Intel Drivers

This Removes:

  • Dell OpenManage Server Administrator
  • Broadcom Drivers and Management Applications
  • Broadcom NetXtreme II Driver Installer
  • Intel(R) PROSet for Wired Connections
  • Intel(R) PRO Network Connections

Read the rest of this entry »

Feb 15

Close to a year ago we proposed the idea to virtualize all the servers at our remotes sites.  It took a significant amount of time to prove the value of virtualizing these remote sites, build the business case, present it, finally get approval, then create the in-depth project plan.  As of today we have 10% of our sites virtualized.

One of the major decisions we made was to use ESXi Free–we had a lot of push back at first, but continued to explain any risk of using the free product was mitigated with our plan.  For the technical folks it was simple, ask them:  What does licensing ESXi get you?  Most people who were asked this didn’t know the answer–the big hit is vCenter.

No vCenter?

Yes thats right–no vCenter.  The biggest frown here is no centralized console to manage everything from.  To us that isn’t a big deal–we’ve been manging distributed systems for years without a centralized management console.  All the hosts are setup with  Active Directory authentication so Role Baesd Access Control (RBAC) is cake, and the staff that need access have just the access they need.

We do not have shared storage in the remote sites so we can’t really take advantage of clusters–and along with that DRS, DPM, HA, FT, etc.  as well as vMotion…

vCenter does provide all the hardware and performance monitoring, but we have that covered to…

What about monitoring?!

At the VMware level

The hosts are monitored by Veeam Monitor Free is a fantastic product that will give us the nice dashboard and aggregate alarms and performance from all the remote hosts.  It’s awesome that Veeam offers this product for free.  The only limitation we’ve really noticed thus far is email alerts of these alarms.

At the Hardware level

Hardware is monitored using Whatsup Gold! with a monitor against the DRAC for hardware status–Whatsup will generate the email alerts on any hardware issues.

I posted howto setup this monitor on the WhatsUp Gold Community site: Dell Server Hardware Monitor VIA DRAC (SNMP Monitor)

What about updates?

While vCenter Update Manager is nice we can patch the hosts  using the vSphere Management Assistant (vMA) appliance–look out for posts in the future on how we accomplish this.

Here we are about a month and a half into the actual conversion process!

I’ve already posted some of our obstacles in previous posts and how we avoided/got around them, but stay tuned for more–like how we actually handled provisioning 180+ ESXi hosts.

Feb 12

So how many times have you done a P2V only to have to go back and manually cleanup all the extra crud a physical server requires–Dell OpenManage Server Administrator(Dell OSMA), Broadcom Drivers and Management Applications, Intel Drivers and Management Applications, etc.  Now expand that to having to do over 500 P2Vs in a few month span and you find the need to automate….

Presenting a huge honking script to automate those pesky uninstalls, right now it’s only Dell specific, but I plan to expand it to other vendors like IBM & HP.

This Removes:

  • Dell OpenManage Server Administrator
  • Broadcom Drivers and Management Applications
  • Broadcom NetXtreme II Driver Installer
  • Intel(R) PROSet for Wired Connections
  • Intel(R) PRO Network Connections

Read the rest of this entry »

Jan 23

VMware makes some pretty nice graphics for all their documentation/presentations.  If you ever wanted to use any of those graphics (like the one to the side of this post), VMware provides a number of these diagrams, icons, and stencils on their community website.  Theres three “packs” of Diagrams and Stencils currently out there:

2009 Pack

2010 Packs

Next time you need to do a presentation or some documentation kick it up a notch and use these diagrams.  Those graphic artists at VMware do a great job making some fantastic stuff.

Dec 8

So, you have to build a Windows Server 2008 R2 VM Template ESX/ESXi?  Theres a lot of folks out there that give their 2 cents on the matter, and a few walkthroughs but everytime you read one thing you come across something new…So I decided to put my procedure online and I also added some notes about each task with reasoning for why I do each task.

I integrated bits and pieces from: SOLORI’s Blog, Jeremy Waldrop’s Blog, Techhead and  Yellow Bricks as well as various bits from technet.

Remember to setup vCenter for Guest Customizations by placing the sysprep files for all the various versions of Windows in the proper locations, refer to this VMware KB Article for locations and instructions: VMware KB: 1005593

Give your feedback, if you don’t agree with something let me know!

Read the rest of this entry »

Nov 26

So I bought an exam voucher for $99 bucks last night, plan to knock this out in the next few months.  (Need to tackle Security+ first)

I should have taken this last year after I got my CVE (Certified Virtualization Expert) but wasn’t thinking.  I don’t expect it to be very difficult at all after reviewing the Exam Blueprint, for the technical bits, it looks like 99% point-click GUI knowledge and 1% command-line (apart from all the various product version/requirements stuff).  I think I will move for the VCAP-DA after getting my VCP out of the way, the CVE course really forces you to learn command-line and not rely on the GUI for everything.  I feel prepared pretty well for VCAP-DA as well, though that will require some brushup and lab work.  The only bits I haven’t used that VCAP expects are are Orchestrator, vShield Zones, and vCenter Linked mode.

Not sure what I’m going to do about the course requirement, I never attended any of the required VMware training courses…

Aug 24
Linux P2V Issues
icon1 Michael Requeny | icon2 VMware | icon4 08 24th, 2010| icon3No Comments »

Took me awhile to get what should have been a simple Linux P2V done at work!

This stuff wasn’t clearly stated anywhere–I couldn’t find anyone with similar issues, so I’m posting this up hoping to help someone else out in the future.  Working with VMware they pointed out the lack of support for dvSwitches after passing through a few levels of support their.

Error: Unable to connect to the Converter helper server on the target virtual machine

Cause: VMware does not support the usage of dvSwitches for Linux Conversions!  Make sure the network you select isn’t a dvSwitch

Error: Unable to obtain the IP address of the target virtual machine running the Converter helper server.

Cause: Related to the above error, relying on DHCP while using a network that is a dvSwitch for a conversion will get you the above error.

FAILED: MethodFault.summary

The last task before removal will be something like: Connecting the Converter helper ISO image to the target virtual machine.

Cause: ESX(i) 4.1 is not supported at this time by VMware Converter–this was with version 4.0.1–the latest version at the time this post was made.

Leave a comment if these notes helped you out or if you have any other uncommon errors you ran into.

Jul 2

Something cool for your ESX/ESXi labs–Rather then relying on using the VIC (VMware Infrastructure Client) to remote control your VMs you can enable VNC access to them.

To do this power off the VM and add the lines below to the VMs .vmx file, you will need to choose a different port for each VM you wish to do this on.

remotedisplay.vnc.port=”5900″

remotedisplay.vnc.enabled=”true”

If your using ESX you can password protect the VNC connection by adding this line:

remotedisplay.vnc.password = “password”

« Previous Entries Next Entries »