Few words about DCIM

Share This: Current issues in data centre management In the past, managing a data centre was not as complicated as it is nowadays. As data grows larger and the demand for processing power increases, data centres have become more demanding and complicated. Onyshkevych (2013) quotes “Complicating the situation, operational decisions at the data centre now […]
Continue reading…

 

Esxi 5.1 catch 22 with local logcache and faulty local datastore

Share This: Esxi catch 22 with local logcache and explosive SSD’s Based upon: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2056181 This issue happen to us twice in the past , both times resulting in restart of the ESXi host = out of hours downtime for the VM’s. We knew it’s once again failed SSD which was configured as a local logcache […]
Continue reading…

 

Zabbix 2.2 Vmware 5.1 config tuning

Share This: For virtual machine monitoring to work, Zabbix should be compiled with the –with-libxml2 and –with-libcurl compilation options. https://www.zabbix.com/documentation/2.2/manual/vm_monitoring After linking it with Vcenter, here are some recommended changes to the service. /etc/zabbix/zabbix-server.conf StartIPMIPollers=5 ( for ICMP – also requires installation of fping) StartPingers=25 (ICMP etc) StartHTTPPollers=5 StartVmwareCollectors=10 (Essential for monitoring vm’s) VMwareFrequency=60 (frequency) […]
Continue reading…

 

Zabbix 2.2 mysql tuning

Share This: Bits needs tuning, My environment ~500 devices, 5x15K 600GB SAS, 32GB of RAM, 2x Xeon E5 CPU /etc/my.cnf [mysqld] port = 3306 socket = /var/lib/mysql/mysql.sock datadir = /var/lib/mysql connect_timeout = 60 wait_timeout = 28800 max_connections = 2048 max_allowed_packet = 64M max_connect_errors = 1000 tmp_table_size = 512M max_heap_table_size = 64M table_cache = 512 # […]
Continue reading…

 

Qlogic Sanbox 5200 5800V/5802V configuration and upgrade guide

Share This: 1 Fabric view:   2 Log into new fabric with the information located on the switch (default 10.0.0.1, admin password). Make sure your IP address is in the correct range. As a medium use cross-over cable. Check of the current firmware version on each switch on the Fabric:   3. Tools -> Upload […]
Continue reading…

 

Configuring XDASv2 missing libexpat.so OES fix

Share This: Following the instruction from novell/netiq:   #rpm -Uvh <eDirectory build extracted folder>/eDirectory/setup/novell-edirectory- xdasinstrument-8.8.7-1.x86_64.rpm –nodeps #rpm -Uvh <eDirectory build extracted folder>/eDirectory/setup/novell-edirectory- xdaslog-8.8.7-1.x86_64.rpm –nodeps #rpm -Uvh <eDirectory build extracted folder>/eDirectory/setup/novell-edirectory- xdaslog-conf-8.8.7-1.noarch.rpm –nodeps   Create simlinks for libexpat.so     ln -s /usr/lib64/libexpat.so.1.5.0 /opt/novell/eDirectory/lib64/ libexpat.so.0.1.0   ln -s /opt/novell/eDirectory/lib64/libexpat.so.0.1.0 /opt/novell/ eDirectory/lib64/libexpat.so.0   ln -s /opt/novell/eDirectory/lib64/libexpat.so.0.1.0 /opt/novell/ […]
Continue reading…

 

DatacenterDynamics Energy Efficiency Best Practice course review

Share This: Last week I have attended DCProfessional Development training course regarding Energy Efficiency Best Practices at Hilton hotel in East London. I was slightly concerned that I was by far the youngest member of the training course as well as the least experienced. Nonetheless it was my decision not to follow their framework and […]
Continue reading…

 

Moving GroupWise mailboxes between post offices

Share This: The reason for this article is to illustrate the simplicity of moving user mailbox on the other post office within Novell GroupWise. First of aware the user that the will be no access to his e-mail throughout the move. Find the user in eDirectory (GroupWise tree) -> right click -> properties -> GroupWise […]
Continue reading…

 

ISO 27001 (17799) – brief Overview

Share This: Security of information is essential for reliability, and perhaps even the survival of the organisation. Every IT infrastructure uses data clusters for storing the information and they are often being targeted by attackers who want to infiltrate their resources for many different reasons, quite often financial. It’s not as it use to be […]
Continue reading…

 

Security Auditing

Share This: Security auditing is not very appreciated process within any organization due to the fact that someone external is going to check already hired individuals and their skills. It may be a bit difficult to explain why security is so important and why certain mechanisms should be implemented especially for non-technical management. On the […]
Continue reading…