This is a short post to help anyone who may have been temporarily stumped trying to enable per-VM EVC for VMotion between clusters.
If you want to know more about per-VM Enhanced VMotion Compatibility, check out the VMWare KB HERE
Your business. Connected. Secure.
This is a short post to help anyone who may have been temporarily stumped trying to enable per-VM EVC for VMotion between clusters.
If you want to know more about per-VM Enhanced VMotion Compatibility, check out the VMWare KB HERE
I was recently working on a UniFi deployment which included a UniFi cloud key gen 2 plus. The cloud key came from Ubiquiti with firmware version 0.9.8. Attempting to update the firmware resulted in the error “something went wrong” without getting past 1% on the progress.
Updating the controller and protect software was successful, but attempting to update the cloud key firmware from within the network application also failed.
When deploying VMWare VCSA in a lab environment the installer often gets stuck at stage 2 starting services. In my case, starting authentication network 2%. This seems to be an issue with VCSA wanting to verify the SSO domain through DNS resolution.
The solution for me was to create an entry in the hosts file of the VCSA appliance through SSH to the CLI. Before doing so, it is best to start from scratch. Delete the partially deployed VCSA appliance. Deploy VCSA through Stage 1 but do not enter Stage 2.
With the advent of Office 2019, Microsoft has moved away from GPO deployment via MSI. There is no MSI of Office, Visio, Project, etc available to download anymore. Microsoft is moving toward using SCCM or the Office Deployment tool. I was tasked with coming up with a method for deploying Office via GPO in a fully automated manner.
There may be more than one way to accomplish GPO deployment of Office, and I do not claim to have the best method. It took me quite a bit of research and troubleshooting to get this method to work. I hope it helps someone looking to accomplish the same thing I was.
interface GigabitEthernet0/0.4
encapsulation dot1q 4
ip address 10.2.1.1 255.255.255.0
Testing with https://www.testconnectivity.microsoft.com/ shows green across the board. If you are dealing with this issue, start with this tool and run the following tests:
Testing with Microsoft Lync Connectivity Analyzer showed ready for 2013 mobility client.
After examining the Lync Front End server event log, I found event 32054, LS Storage service:
Storage Service had an EWS Autodiscovery Failure. The underlying connection was closed. Could not establish a trust relationship SSL/TLS.
The issue would seem to be the published autodiscover Uri for Exchange not matching the installed certificate on the Exchange 2016 DAG members. The Uri in the event log was reporting autodiscover.domain.local. The certificates and all other services in the infrastructure were pointing to autodiscover.domain.org. On the Exchange server, running powershell Get-ClientAccessService | fl AutoDiscoverServiceInternalUri will display the currently assigned URLs.
Issuing a Set-CsClientAccessService -Identity exchange.domain.local -AutoDiscoverServiceInternalUri https://autodiscover.domain.org/Autodiscover/Autodiscover.xml for both servers in the Exchange DAG solved the mobility client address book issue.
First off, you need to remove the physical hard drive from the device. You will want the primary (boot) disk. You may also need the secondary hard drives if you installed critical apps in non-standard locations.
Second, you need a hard-drive caddy of some sort. Something like this: http://www.newegg.com/Product/Product.aspx?Item=N82E16817270043 would work just fine. Any enclosure will due.
Third, you need a working computer to plug the enclosure in to. This will mount the OS drive as an external drive on the chosen machine. We need to convert this drive to a format virtualization programs will understand. The most common of which is Virtual Hard Disk (VHD/VHDX) format. To do this, we need a program like Disk2vhd http://technet.microsoft.com/en-us/sysinternals/ee656415.aspx
Run Disk2vhd, check the appropriate partitions from the connected external drive. Choose a location with enough space and name your VHD. Un-check VHDX if you intend to use VirtualBox as the VM player.
Once the VHD is created, install a VM player. I will be using VirtualBox in this example.
Run VirtualBox and create new VM. Choose the OS settings from the drop downs. This must match the version of the OS that was running on the old machine. If you don’t know the exact version, one way to check is to inspect the ntoskrnl file under /Windows/System32/, look at details and find the product version number. Reference the version number here: http://msdn.microsoft.com/en-us/library/windows/desktop/ms724832%28v=vs.85%29.aspx and here: http://www.gaijin.at/en/lstwinver.php
Select your memory amount and boot the VM. The old OS should boot fine and install all new drivers needed. You may need to perform some system repair, or OS repair due to driver conflicts but most of the time the boot is clean.
Workaround upgrade from 3.x to 7.x SIP then back to SCCP.
You will need the following things:
Set up the switch and plug the PC that you have a TFTP server installed on to the same switch. Unzip the different revisions to individual folders under the root TFTP directory. We will be switching back and forth a lot. Configure the DHCP server with the scope of our choice, and specify option 150. Point option 150 to the IP address of your TFTP server. My switch DHCP pool looked something like this:
ip dhcp pool PHONELAB
network 10.1.1.0 255.255.255.0
default-router 10.1.1.1
This seems to be related to left over Exchange attributes in Active Directory. I tried everything from a multitude of TechNet articles including the following:
Finally I tried just creating another user account in AD and gave it permissions to manage Exchange by adding it to the group ADUC–>Domain.local–>Microsoft Exchange Security Groups–>Organization Management.
That allowed access to the ECP and after some more digging in ADSIedit, I can see old exchange attributes attached to the enterprise Administrator account. I believe this is the problem as the management console lists Administrator as already having a “legacy” mailbox. The attributes are referencing exchange servers that no longer exist in the environment.
I plan to start ripping out old exchange attributes to test this theory.
Lots of websites describe the method for removing ADCs from AD using ADSIedit.
Open ADSIedit
Expand Configuration –> Services –> Microsoft Exchange –> Active Directory Connections
Delete ADC under Active Directory Connections
Replicate changes to all Domain Controllers
Running the Schema prep another time results in the same error:
After some digging we found the rogue connector buried in Active Directory Sites and Services.
Open the sites and services mmc and look for any machines that aren’t active servers. Delete anything that doesn’t belong and run the tool again. It should finish successfully.