Virtualization Adapted Adapting Business Processes for Virtual Infrastrcuture (and vice-versa)


Unix Network IP Address Configuration

Filed under: virtualization — iben @ 13:56

To temporarily configure an IP address, you can use the ifconfig command in the following manner. Just modify the IP address and subnet mask to match your network requirements.

sudo ifconfig eth0 netmask

To verify the IP address configuration of eth0, you can use the ifconfig command in the following manner.

ifconfig eth0

eth0 Link encap:Ethernet HWaddr 00:15:c5:4a:16:5a

inet addr: Bcast: Mask:

inet6 addr: fe80::215:c5ff:fe4a:165a/64 Scope:Link


RX packets:466475604 errors:0 dropped:0 overruns:0 frame:0

TX packets:403172654 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:2574778386 (2.5 GB) TX bytes:1618367329 (1.6 GB)


To configure a default gateway, you can use the route command in the following manner. Modify the default gateway address to match your network requirements.

sudo route add default gw eth0

To verify your default gateway configuration, you can use the route command in the following manner.

route -n

Kernel IP routing table

Destination Gateway Genmask Flags Metric Ref Use Iface U 1 0 0 eth0 UG 0 0 0 eth0

If you require DNS for your temporary network configuration, you can add DNS server IP addresses in the file /etc/resolv.conf. The example below shows how to enter two DNS servers to /etc/resolv.conf, which should be changed to servers appropriate for your network. A more lengthy description of DNS client configuration is in a following section.



If you no longer need this configuration and wish to purge all IP configuration from an interface, you can use the ip command with the flush option as shown below.

ip addr flush eth0


Flushing the IP configuration using the ip command does not clear the contents of /etc/resolv.conf. You must remove or modify those entries manually.

via Network Configuration.


report linkedin spam

Filed under: virtualization — iben @ 06:19


Someone sent me a connection request saying they know me or work with me but I’m pretty sure they don’t. These guys shouldn’t be mis-representing them selves on line. It lowers the trust we have in “the system”. What can I do?


  • Use the Help Center link in the lower left of your screen to contact customer service.
  • More serious messages that might be illegal should be emailed to
  • If it’s an invitation you can sign in to linkedin, click on the response “I Don’t Know this person”.
    Once someone has received 5 IDKs, the account is restricted
  • My favorite method is to click the report spam button to the right of the message in your inbox.
    You do have to sign in to linkedin to do this. See the picture on the right as an example.




arp mac esxi vmkernel storage

Filed under: it,security,virtualization — iben @ 19:44

troubleshooting arp mac esxi vmkernel storage

The guys were getting some new storage setup and had the IP address set incorrectly. Usually a vmkping would be enough to prove the vmkernel interfaces were setup correctly but the vendor came back with “the firewall is blocking NFS” so I needed a way to see the ARP table to prove the MAC for the NAS was showing up on the correct VMK interface with no gateway in the data path.

This was tested to work on latest ESXi version 5 build 469512.

Here are the results:

~ # vmkping
PING ( 56 data bytes
64 bytes from icmp_seq=0 ttl=64 time=0.201 ms
64 bytes from icmp_seq=1 ttl=64 time=0.187 ms

— ping statistics —
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max = 0.187/0.194/0.201 ms
~ # esxcfg-vmknic -l
Interface Port Group/DVPort IP Family IP Address Netmask Broadcast MAC Address MTU TSO MSS Enabled Type
vmk0 Management Network IPv4 00:25:90:52:91:21 1500 65535 true STATIC
vmk1 VMkernel-152 IPv4 00:50:56:76:23:45 1500 65535 true STATIC
vmk2 VMkernel-150 IPv4 00:50:56:70:34:56 1500 65535 true STATIC
~ # esxcli network ip neighbor list
Neighbor Mac Address Vmknic Expiry State
————– —————– —— ————– —– 00:50:56:2a:12:34 vmk2 993 sec


Displaying the ARP and Neighbor Discovery cache for VMkernel network interfaces

HP Cloud Beta

Filed under: virtualization — iben @ 19:35
I just started testing the cool new HP Cloud which is in beta right now. While you can’t create or upload your own machine templates you can choose from some popular open source choices (all 64 bit os):

  • CentOS 5.6 or 6.2
  • Ubuntu 10 or 11
  • Debian 6

You get full root access and have ability to run yum or apt-get to install or update as you wish however you cannot update the kernel. (See this post:

What virtualization technology does HP Cloud Compute use?

HP Cloud Compute is based on KVM virtualization technology.

What instance types are available for HP Cloud Compute?

Standard instances offer a number of virtual server types. Select the size that’s right for you based on the amount of memory, number of virtual cores, and local storage required. Although you won’t be billed during the beta I imagine once they do stop billing you the choice you make here could have an impact on your pocketbook.


Standard Instance Types RAM (GB) # of Virtual Cores Local Disk (GB)
Extra Small 1 1 30
Small 2 2 60
Medium 4 2 120
Large 8 4 240
Extra Large 16 4 480
Double Extra Large 32 8 960


How to SSH to your VM

NOTE: the workflow for this is a little unintuitive. You get to the keypair dialog only when you are creating a VM. Be sure to take the time to follow these steps WHILE you are setting up your VM.

Setup a Keypair


By, 1 week 3 days ago

Creating a Keypair is the first necessary step in launching an instance for the first time. Only one keypair is needed for a series of instances launched under that keypair name.

The Keypair creation menu is located on the left side of the “keypair” dropdown of the AZ’s management page:

A separate keypair must be generated for each AZ (Availability Zone)

After entering the keypair management page, type a name for the keypair, then click “Create”.

Once the keypair has been created, a black text brick appears below. Copy and paste the entire text field.

Save it within a word processing document (notepad, text edit, word, etc.) and rename the file with a .pem extension. This allows use of the file by HP Cloud’s compute instances to identify the authorized user in part.

Once you have created a keypair, you can then enter your instance. Please see our Creating an instance and connect with Putty guide for further steps to gain access to your instance.

Create PEM file on Mac OS X

Open a terminal window

vi testkeypair.pem , press i to insert, copy and paste the text from above into the terminal, esc, :wq to save the file and quit vi

chmod 400 testkeypair.pem

Add a Public IP address to your VM

Be sure to go back and click the check box for this.

Login with SSH

ssh -i testkeypair.pem your-servers-public-ip-address

Setup IPv6 on your VM


Possible Probable Plausible

Filed under: Uncategorized — iben @ 21:05

Possibility is the condition or fact of being possible. The Latin origins of the word hint at ability. Possibility also refers to something that “could happen”, that is not precluded by the facts, but usually not probable. Impossible denotes that something literally cannot happen or be done.

Probability, or chance, is a way of expressing knowledge or belief that an event will occur or has occurred. In mathematics the concept has been given an exact meaning in probability theory, that is used extensively in such areas of study as mathematics, statistics, finance, gambling, science, and philosophy to draw conclusions about the likelihood of potential events and the underlying mechanics of complex systems.

Plausible deniability is, at root, credible (plausible) ability to deny a fact or allegation, or to deny previous knowledge of a fact. The term most often refers to the denial of blame in (formal or informal) chains of command, where upper rungs quarantine the blame to the lower rungs, and the lower rungs are often inaccessible, meaning confirming responsibility for the action is nearly impossible. In the case that illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such act or any connection to the agents used to carry out such acts. It typically implies forethought, such as intentionally setting up the conditions to plausibly avoid responsibility for one’s (future) actions or knowledge.

Powered by WordPress