Category: Data Center

Windows DTrace Architecture 0

DTrace Came to Windows

DTrace is a comprehensive dynamic tracing framework created by Sun Microsystems for troubleshooting kernel and application problems on production systems in real time. Originally developed for Solaris, it has since been released under the free Common Development and Distribution License (CDDL) in OpenSolaris and it’s descendant illumos, and has been ported to several other Unix-like systems.

old 0

End of General Support for vSphere 6.0

If you are using vSphere 5.5 on your environment, please don’t read this post otherwise it will be useful for you. Currently, vSphere is most popular server virtualization software and any changes or notifications which published by VMware, has impact on may organizations IT infrastructure. What’s the newest? Answer: Say good bye to vSphere 6.0 .

zentyal 0

Linux Distributions for Small and Medium-Sized Enterprise

What do you need for Small and Medium-Sized Enterprise businesses in IT department? Directory service, Mail service, Firewall. Anti-Spam, and many other services. You have to pay for each service if you want to have proprietary software such as Microsoft’s products. When we are talking about cost, open-source software will help you to reduce costs. Please consider that open-source software has cost for you but it will lower than closed-source software.

Veeam Backup & Replication Community Edition 2

Veeam Backup & Replication Community Edition

Veeam Backup & Replication Community Edition [formerly known as Veeam Backup Free Edition] is a must have FREE tool for ad-hoc virtual machine (VM) backup, restore and management in VMware vSphere and Microsoft Hyper-V virtual environments. With no agents to deploy, powerful recovery options and VeeamZIP, you get flexibility in options and a reliable solution for important VMs. Whether you are locked in a legacy backup contract or are operating within a tight budget, you’ll find this FREE VM backup software helpful for your daily VM management. Why use Veeam Backup & Replication Community Edition? Even for small infrastructures, virtualization with either VMware ESXi or Hyper-V brings many benefits in terms of savings and ease of administration. Have you ever wanted to back up a VM before making changes to it, clone a VM for testing purposes or make a compressed data archive prior to a VM decommission — just in case? Veeam’s FREE backup tool will cover all your needs! Veeam Backup & Replication Community Edition works perfectly with both standalone ESXi and Hyper-V hosts, as well as with large virtual deployments. Whether you run a test lab or a production environment, it’ll be a perfect match. Are you on a budget or still experimenting with VM backup? Veeam...

ceph 2

What’s SDS (Software-Defined Storage) – Part 2 (Ceph)

Whether you want to provide Ceph Object Storage and/or Ceph Block Device services to Cloud Platforms, deploy a Ceph Filesystem or use Ceph for another purpose, all Ceph Storage Cluster deployments begin with setting up each Ceph Node, your network, and the Ceph Storage Cluster. A Ceph Storage Cluster requires at least one Ceph Monitor, Ceph Manager, and Ceph OSD (Object Storage Daemon). The Ceph Metadata Server is also required when running Ceph Filesystem clients.

Veeam Availability Suite Update 4 1

Veeam Backup & Replication 9.5 Update 4

Veeam Backup & Replication 9.5 Update 4, part of Veeam Availability Suite, delivers Availability for ALL your virtual, physical and cloud-based workloads. Through a single management console, you can manage fast, flexible and reliable backup, recovery and replication of all your applications and data to eliminate legacy backup solutions forever. The following is a list of the major new features and functionalities added in Update 4.

Veeam Availability Suite Update 4 0

Veeam ONE 9.5 Update 4

Veeam has released update for Veeam ONE 9.5. The new update came with new features and improvements. Veeam ONE 9.5 update 4 is available for download from January 22, 2019 on Veeam website.

win retired 2

Say Goodbye to Windows 7 and Windows Server 2008 (R2)

Windows 2008 was born on February 2018 and Microsoft released Windows 2008 R2 on October 2009. I think, Windows 2008 R2 was one of most popular Windows servers in history.

Now, Windows 7, Windows 2008 and Windows 2008 R2 are old men. We have to say goodbye to these guys in this year and next year.

Virtual Desktop Infrastructure 4

Recommended Settings on Windows 10 for VDI

Windows is still most popular operating system for clients in over the world. Windows is installed on more than 80% of all desktop and laptops. So our users are addicted to Windows. I have real experience about our customers with other operating systems. Actually, most people is born in a home with Windows desktops or Windows laptops. They have grown up with Microsoft Outlook and other Windows application, so they can’t work with other operating systems.

PowerShell 3

NTP Configuration in iLO: Best and Fast Solution by PowerShell

In order to keep synchronize iLO time with NTP server or time server, you have to enable NTP configuration and add proper NTP server address. Configuring NTP on more than one server is a difficult task for any administrator, because you have to do it via iLO command line or web based GUI manually. At this post I want to share an example for NTP configuration as a PowerShell script.

Linux Distribution 1

How to Secure SSH Connection on Linux

Why We Should Mitigate SSH Based Attack SSH (Secure Shell) is a most popular remote protocol. SSH allows remote login and execute commands. That providing secure way to login and run commands on remote systems in unsecured networks. Telnet replace with SSH cause of offering more security. But SSH has some weaknesses, in order to reducing SSH based attack, those weaknesses can be mitigated. There is some hardening tips, the tips turn your SSH server into a rock solid communication daemon. Best SSH Hardening Tips In the next minutes, we’ll review 15 solutions from best SSH hardening tips. Each hardening tip will a shield against SSH based attacks. Most of the tips are SSH configurations, some of those tips are different on Linux distributions, so please check the configurations on your distribution documents as well. Also Windows 10 and Windows 2019 have OpenSSH server by adding Win32-OpenSSH to Windows, so read Microsoft documents as well. You must restart SSH server daemon after applying configurations. 1. Custom SSH Port SSH server listening on port 22 by default, so attackers trying to attack your server on port 22. Changing SSH port to another port is a solution to reduce attacks. In order to change...