Thursday, October 17, 2013

Powershell: Restart a Remote Machine

Option 1: Prompt user for machine name to be restarted
CLS $cname = Read-Host "Enter Machine Name or IP Address" Restart-Computer -computerName $cname -Force

 Option 2: Enter the name directly in the code. cls Restart-Computer -computerName "EnterMachineNameHere" -Force

 Option 3: Reboot multiple Machines
cls $cname ="Server01, Server02, Server03" Restart-Computer -computer $cname -force

Joe Piggee





Powershell: List services on remote machine

# Use This to list\view services on remote server(s)
#Joe Piggee
---  Begin Code----
cls
gwmi win32_service -comp (gc c:\servers.txt) | select __server,name,startmode,state,status | Out-Gridview

--- End Code ---

Disable IPv6

 

By Joseph Piggee Sr.

http://support.microsoft.com/kb/929852

IPv6 can be disabled either through the DisabledComponents registry value or through the check box for the Internet Protocol Version 6 (TCP/IPv6) component in the list of items on the Networking tab for the properties of connections in the Network Connections folder. The following figure shows an example.

The DisabledComponents registry key affects all interfaces on the host. However, the check box on the Networking tab affects only the specific interface. The DisabledComponents registry value does not affect the state of the check box. Therefore, even if the DisabledComponents registry key is set to disable IPv6, the check box in the Networking tab for each interface can still be checked. This is expected behavior.

Note Unchecking the checkbox on a network adapter will not disable IPv6 on the host. It will unbind IPv6 from this adapter. To disable IPv6 on the host, follow the steps below.

To use the DisabledComponents registry value to check whether IPv6 was disabled, run the following command at a Windows command prompt: 
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters /v DisabledComponents

You may receive the following error message: 
ERROR: The system was unable to find the specified registry key or value. 
If you receive this error message, the DisabledComponents registry value is not set. If the DisabledComponents value is set, it overrides the settings in the connection properties. 

To enable or to disable IPv6 or to selectively enable or disable components of IPv6 automatically, click the Fix this problem link. Then, click Runin the File Download dialog box, and follow the steps in this wizard.

Backup Active Directory

Joe Piggee

  1. Open NTBACKUP by either going to Run, then NTBACKUP and pressing Enter or by going to  Start / Accessories / System Tools. Or my personal method, Click Start/ Run/ Type NTBACKUP.
  2. If you are prompted by the Backup or Restore Wizard, I suggest you un-check the "Always Start in Wizard Mode" checkbox, and click on the Advanced Mode link.
  3. Inside NTBACKUP's main window, click on the Backup tab.
  4. Click to select the System State checkbox. Note you cannot manually select components of the System State backup. It's all or nothing.
  5. Enter a backup path for the BKF file. If you're using a tape device, make sure NTBACKUP is aware and properly configured to use it.
    Press Start Backup.
  6. The Backup Job Information pops out, allowing you to configure a scheduled backup job and other settings. For the System State backup, do not change any of the other settings except the schedule, if so desired. When done, press Start Backup. After a few moments of configuration tasks, NTBACKUP will begin the backup job.
  7. When the backup is complete, review the output and close NTBACKUP.

Windows Activation Error - 0x80072EE2 & 0x8007EFE

Joe Piggee

Error x80072EE2 & 0x8007EFE

This error normally indicates a connection issue. Very vague, but true. To fix this try the following:

Turn off the firewall, and retry activation
Check Date & time settings. If you needed to change anything on the date or time, restart the server before retrying the activation
Finally, make sure you aren't using a KMS key without a KMS server.
And verify the key code is correct.

To View or Change the Tombstone LifeTime

*To perform the following steps you'll need to be a member of the Enterprise Admins group.

By Joe Piggee Sr.
To view or change attribute values by using ADSIEdit:
  1. On the Start menu, point to Run and then type ADSIEdit.msc and press Enter.
  2. In the next window, click Action-> Connect to
  3. In the center, change the connection point to "Select a well known Naming Context"
  4. Click the drop down menu, and select Configuration, then click OK ADSIEDIT-1
  5. Navigate to Configuration->CN=Services->CN=Windows NT->CN=Directory Service, Right click, and select properties
  6. ADSIEDIT-2
  7. Scroll down to "tombstoneLifetime" and double click to edit. It will be displaying the current value, which will be in days.
  8. When done just click OK.
  9. Click OK and then close ADSIEdit.
* When you view properties on cn=Directory Service,cn=Windows NT, cn=Services,cn=Configuration,dc=, if no value is set it means that the default value is in effect. Any value that you type in the Edit Attribute box replaces the default value when you click Set .

Query Active Directory for a particular User

If you just want to know, for example, where a given user exists in your Active Directory, then searching for an account is a snap:
--- Begin code -----
cls
# sending LDAP query to Active Directory
#Change sAMAccountName for your query
$searcher = [ADSISearcher]'(&(objectClass=User)(objectCategory=person)(sAMAccountName=jpiggee*))'
# finding first match
$searcher.FindOne()
# finding ALL matches
$searcher.FindAll()
#This would find all user accounts with a SamAccountName that starts with "tobias". You can now use this approach to easily find out where an account is located:
# find account location
$searcher.FindAll() | Select-Object -ExpandProperty Path

---End Code ----

Joe Piggee

Get More Detailed Information Using GetDirectoryEntry()

To get more detailed information about an accounts using GetDirectoryEntry() to turn the search result into actual account objects:
# send LDAP query to Active Directory
$searcher = [ADSISearcher]'(&(objectClass=User)(objectCategory=person)(sAMAccountName=*))' 
# get 10 results max
$searcher.SizeLimit = 10 
# find account location
$searcher.FindAll() |
  # get account object
  ForEach-Object { $_.GetDirectoryEntry() } |
  # display all properties
  Select-Object -Property * |
  # display in a grid view window (ISE needs to be installed for this step)

  Out-GridView

# Joe Piggee

Wednesday, October 16, 2013

List machines with thier FQDN

Prerequisites: Create a file that has the list of machines netbios names, and create an empty systems.txt file on your root.
<#
Reference URL: http://blogs.technet.com/b/heyscriptingguy/archive/2010/03/11/hey-scripting-guy-march-11-2010.aspx
This file will read Machinelist from a file, try to get their DNS information,
and append that output to a txt file.
You can use the above mentioned URL for more information and exaples of the Try\Catch\Finally
#>
ForEach ($entry in (Get-Content c:\scripts\machinelist2.txt)) {
    Try {
        [net.dns]::GetHostEntry($entry).Hostname | Out-File -FilePath c:\systems.txt -Append
    } Catch {
        $entry | Out-File -FilePath c:\scripts\Machine_WithFQDN.txt -Append
    }
}
Joe P.

Friday, September 20, 2013

How to enable the Disk Cleanup tool on Windows Server 2008 R2

I recommend you use using option #2 below for two reasons:
  • Installing the Desktop Experience feature will not only install Disk Cleanup, but a lot of other crap you don't need or want on your server.
  • Installing the Desktop Experience feature will require a server reboot

Enabling Disk Cleanup Tool

1) Go to Programs & Features, and in the Features section, enable/install "Desktop Experience".   The downside to this is that you will need to reboot your server after installing this and it installs other components you do not need on a server.

2) [RECOMMENDED] -  All you really need to do is copy some files that are already located on your server into specific system folders, as described at http://technet.microsoft.com/en-us/library/ff630161(WS.10).aspx

The location of the files you need to copy depend on your version of Windows:
Operating System
Architecture
File Location
Windows Server 2008 R2
64-bit
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_6.1.7600.16385_none_c9392808773cd7da\cleanmgr.exe
Windows Server 2008 R2
64-bit
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b9cb6194b257cc63\cleanmgr.exe.mui
Windows Server 2008
64-bit
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.0.6001.18000_en-us_b9f50b71510436f2\cleanmgr.exe.mui
Windows Server 2008
64-bit
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_6.0.6001.18000_none_c962d1e515e94269\cleanmgr.exe.mui
Windows Server 2008
32-bit
C:\Windows\winsxs\x86_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.0.6001.18000_en-us_5dd66fed98a6c5bc\cleanmgr.exe.mui
Windows Server 2008
32-bit
C:\Windows\winsxs\x86_microsoft-windows-cleanmgr_31bf3856ad364e35_6.0.6001.18000_none_6d4436615d8bd133\cleanmgr.exe

Once you’ve located the files move them to the following locations:
  1. Copy Cleanmgr.exe to %systemroot%\System32.
  2. Copy Cleanmgr.exe.mui to %systemroot%\System32\en-US.

You can now launch the Disk cleanup tool by running Cleanmgr.exe from the command prompt.

By Joe Piggee

System Center 2012: Cannot Access the Web Console . Error MSG Access Denied

 1. Go to the Server where Ops Manager web console is installed.
 2. Click on Start -> Administrative Tools -> Internet Information Services (IIS) Manager
 3. Expand the Host Name and Go to Sites
 4. On Default Web Site, Click on "OperationsManager"


 5. Click on "Authentication"



6.  Confirm that Windows Authentication is enabled
 7. Right Click Windows Authentication and Select Providers
 8. Inside the Providers Window make sure that NTLM is first.


 9. Restart IIS Service and the WWW service.

Joe Piggee
MCSE, VCP5

Thursday, May 30, 2013

Windows Diagnostic tools

Most of these tools can be easily launched if you know their names — just open your Start menu or Start screen, search for the name of the program, and press Enter. On Windows 8, you may have to select the Settings category on the search screen first. There are a few more, but these are the most common.

Windows Memory Diagnostic

Windows includes a Memory Diagnostic tool that can restart your computer and test your memory for defects, like the popular MemTest86 application. If you want to check your computer’s memory for errors, you don’t need a third-party tool — just open the Windows Memory Diagnostic tool.

Resource Monitor

The Resource Monitor application offers a detailed look at your computer’s resource usage. You can view computer-wide CPU, disk, network, and memory graphics, or drill down and view per-process statistics for each type of resource.

This means that you can see which processes are using your disk or network heavily, view which processes are communicating with which Internet addresses, and more. The Resource Monitor provides much more detailed resource statistics than the Task Manager does.

You can launch the Resource Monitor by opening the Task Manager, clicking the Performance tab, and selecting Resource Monitor. It can also be accessed by searching for Resource Monitor at the Start menu or Start screen.

Performance Monitor

The Performance Monitor application allows you to collect performance reports and view them. It can be used to log performance data over time, including determining how system changes affect performance, or to monitor the performance of a remote computer in real-time.

Computer Management and Administrative Tools

The Performance Monitor is actually one of many Microsoft Management Console (MMC) tools. Many of these can be found in the Administrative Tools folder, but they can be opened in a single window by opening the Computer Management application. Among other things, this window contains the following tools:

  • Task Scheduler: A tool that allows you to view and customize the scheduled tasks on your computer, in addition to creating your own custom scheduled tasks.
  • Event Viewer: A log viewer that allows you to view and filter system events — everything from software installation to application crashes and blue screens of death.
  • Shared Folders: An interface that displays the folders shared over the network on your computer, useful for viewing what folders are being shared at a glance.
  • Device Manager: The classic Windows Device Manager that allows you to view the devices connected to your computer, disable them, and configure their drivers.
  • Disk Management: A built-in partition manager you can use without downloading any third-party tools.
  • Services: An interface that allows you to view and control the background services running in Windows.

The Administrative Tools folder also contains other useful utilities, such as the Windows Firewall with Advanced Security application that allows you to create advanced firewall rules.

Advanced User Accounts Tool

Windows contains a hidden User Accounts utility that provides some options not present in the standard interface. To open it, press WinKey+R to open the Run dialog, type eithernetplwiz or control userpasswords2, and press Enter.

This window also contains a shortcut to launch the Local Users and Groups tool, which offers more user management tasks, but can’t be used on Home or standard versions of Windows.

Disk Cleanup

Windows’ Disk Cleanup utility isn’t quite as hidden as some of the other utilities here, but not enough people know about it. It will scan your computer for files that can be deleted, from temporary files and memory dumps to old system restore points and leftover files from Windows upgrades. It does the same job a PC cleaning utility does, but it’s free and doesn’t try to extract any money from you. Advanced users may prefer CCleaner, but Disk Cleanup does a decent job.

Access it by searching for Disk Cleanup at your Start screen or Start menu.

Group Policy Editor

The Group Policy Editor is only available on Professional or Ultimate editions of Windows, not the standard or Home editions. It provides a wide variety of settings that are designed for use by system administrators to customize and lock down PCs on their networks, but the local group policy editor also contains some settings that average users might be interested in. For example, on Windows 8, the group policy editor can be used to disable the lock screen and skip directly to the log-in screen.

To open it, type gpedit.msc at the Start menu or Start screen and press Enter.

Registry Editor

Sure, everyone knows about the registry editor — but it’s still hidden, with Microsoft not even providing a Start menu shortcut to it. It must be launched by typing regedit into the Start menu or Start screen and pressing Enter.

Many tweaks that can be made in the Group Policy Editor have equivalent tweaks that can be made in the registry editor. For example, on Windows 8, users with the standard edition of Windows 8 can’t disable the lock screen via the Group Policy Editor — but they can disable the lock screen with a registry hack.

MSConfig

The System Configuration window is another classic tool that many people know about. Prior to Windows 8, which features a startup-program manager built into its Task Manager, this tool was the only included way of controlling startup programs on Windows. It also allows you to customize your boot loader, which is particularly useful if you have multiple versions of Windows installed.

Launch it by typing msconfig into the Start menu or Start screen and pressing Enter.

System Information

The System Information utility allows you to view information about the current computer — everything from the model number of its CD-ROM drive to its attached peripherals, configured environment variables, and startup programs. It doesn’t provide the slickest interface, nor does it provide all the information a third-party system information tool like Speccy does, but it will display a lot of system information without forcing you to install another program.

Open it by searching for System Information at your Start menu or Start screen.


Once you know these utilities exist, you can do more with the tools built into Windows. These tools are available on any Windows computer, so you can always use them without downloading and installing software.

Wednesday, May 22, 2013

Add a New Virtual Machine to Inventory from a Datastore

 

 

By Joe Piggee

If you present new storage to vSphere that already has VM’s stored on it, you can add them to inventory so you can power them on, manage them etc by following these steps.

  1. Open the vSphere/VMware Infrastructure (VI) Client and log in with appropriate credentials.
  2. If connecting to vCenter Server, click on the desired host.
  3. Click the Configuration tab.
  4. Click Storage.
  5. Right-click on the appropriate datastore and click Browse Datastore.
  6. Navigate to the folder named after the virtual machine, and locate the <virtual machine>.vmx file.
  7. Right-click the .vmx file and click Add to inventory. The Add to Inventory wizard opens.
    continue to follow the wizard to add the virtual machine.

If the device is something like an external USB drive, prior to completing the steps above complete the following:

If you have some shared storage, install vCenter 5.1, then connect the External hard drive to the PC you are working from(the one you have the vSphere client installed on) browse to the appropriate datastore, and upload the VM's to the shared storage, or to the local datastore that the ESXi host has. Then complete the steps needed to import the discovered VM's listed above.

What Is vShield?

by Joe Piggee

 vShield is a group of networking and security products for virtualized IT infrastructures.

vShield is comprised of vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint. Products in the vShield Suite operate under the centralized management of vShield Manager.

VShield Zones - provides basic virtual networking security and firewalls to vSphere.

VShield App - adds a firewall for applications in the virtual data center.

VShield Edge - operates on the network edge, securing isolated virtual machines (VMs) and virtualized networks and providing their gateway services.

VShield Data Security - protects sensitive data in the virtual and cloud infrastructure, tracking any violations.

VShield Endpoint - supports agentless antivirus protection for guest OSes, in a secure virtual appliance.

Wednesday, May 15, 2013

Verify ESXi Licensed Featured

By Joe Piggee

Sometimes you’ll see errors, even though everything is configured correctly. I can’t tell you how many times I’ve gone to a clients site and performed troubleshooting tasks, just to findout they aren’t licensed for a particular function. So Verify first before getting to deep.

 

To verify which features are licensed, make sure that the vSphere Client/VMware Infrastructure is connected to vCenter Server/VirtualCenter.

  1. Select the ESX/ESXi host from the inventory in vCenter Server.
  2. Click the Configuration tab.
  3. Click the Licensed Features link.

Ensure that the feature appears on the list and that there are enough CPU licenses. If the feature is not listed, click Edit and enable the feature

vSphere 5.x Firewalls

By Joe Piggee

By default, when ESXi is installed, the firewall is enabled. The default configuration is to permit only the required operational traffic and to deny all others. As a note, the command esxcfg-firewall was retired and replaced by esxcli network firewall in vSphere 5.

To enable the firewall:

esxcli network firewall set –enabled true

To disable the firewall

esxcli network firewall set –enabled false

Enable/Disable pre-configured services

  • List the services and record the proper ruleset ID for your service
    • esxcli network firewall ruleset list
  • To enable:
    • esxcli network firewall ruleset –enabled true –ruleset-id rulesetName
  • To disable:
    • esxcli network firewall ruleset –enabled false –ruleset-id rulesetName

Configure service behavior automation

  1. Login to vSphere client
  2. Enter the Hosts and Clusters View (Ctrl + Shift + H)
  3. Select a host
  4. Click the Configuration tab
  5. Under the Software view, select Security Profile
  6. Under Security Profile > Services, click Properties
  7. Highlight a service
  8. Click Options
  9. The service operational controls are listed
    1. Start automatically if any ports are open, and stop when all ports are closed
    2. Start and stop with host
    3. Start and stop manually (Select this to effectively disable the service)

Open/Close ports in the firewall

  1. Login to vSphere client
  2. Enter the Hosts and Clusters View (Ctrl + Shift + H)
  3. Select a host
  4. Click the Configuration tab
  5. Under the Software view, select Security Profile
  6. Under Security Profile > Firewall, click Properties
  7. Highlight a service
  8. To enable a firewall rule, check the check box next to the traffic label
  9. Click Options to set the service start automation settings as described above
  10. Click the firewall button to define what connections can be made to the services. All connections may be allowed or it can be restricted to a single IPv4 or IPv6 addresses and/or IPv4 or IPv6 networks.

Alternatively, to define the allowed IP addresses, you may configure this from the command line:
esxcli network firewall ruleset allowedip add –ruleset-id RulesetName –ip-address IPAddress/Network
esxcli network firewall ruleset allowedip add –ruleset-id RulesetName –ip-address IPAddress
esxcli network firewall ruleset allowedip remove –ruleset-id RulesetName –ip-address IPAddress/Network
esxcli network firewall ruleset allowedip remove –ruleset-id RulesetName –ip-address IPAddress
esxcli network firewall ruleset allowedip list –ruleset-id RulesetName

Note that you may edit the /etc/vmware/firewall/services.xml file for the pre-configured services. After you update any port numbers, remember to refresh the firewall:
esxcli network firewall refresh

ESXCLI Firewall Commands

By Joe Piggee

esxcli firewall commands

Command Description
esxcli network firewall get Returns the enabled or disabled status of the firewall and lists default actions
esxcli network firewall set –defaultaction Update default actions
esxcli network firewall set –enabled Set to true to enable the firewall, set to false to disable the firewall
esxcli network firewall load Load the firewall module and rule set configuration
esxcli network firewall refresh Refresh the firewall configuration by reading the rule set files if the firewall module is loaded
esxcli network firewall unload Destroy filters and unload the firewall module
esxcli network firewall ruleset list Set the allowedall flag
esxcli network firewall ruleset set –allowedall Enable or disable the specified rule set
esxcli network firewall ruleset set –enabled Enable or disable the specified rule set
esxcli network firewall ruleset allowedip list List the allowed IP addresses of the specified rule set.
esxcli network firewall ruleset allowedip add Allow access to the rule set from the specified IP address or range of IP addresses
esxcli network firewall ruleset allowedip remove Remove access to the rule set from the specified IP address or range of IP addresses.

Configuring VLANs on UCS and VMware

By Joe Piggee

 

 

These are the steps required to add VLANs to both UCS and VMware. In UCS each VLAN is identified by a unique ID. The VLAN ID is a number that represents that particular VLAN. The name that you assign to a VLAN ID adds a layer of abstraction that allows you to globally update all servers associated with service profiles that use the named VLAN. You can also create more than one named VLANs with the same VLAN ID. Note that the name of a VLAN is known only within the UCS environment, and outside of the UCS the VLAN is represented by the unique ID.

 

VLAN Configuration on the UCS

Depending on how the UCS infrastructure is configured, VLAN availability for physical hosts may have to be configured on either a port group or individual host basis. The same applies in the VMWare environment.

 

Follow the steps to configure VLAN on UCS:

 

a) Open UCS manager. In the Navigation pane on the left of the application, select the LAN tab.

clip_image001

 

b) Expand the navigation tree so that the VLANs branch is visible.  Right click on the VLANs branch and select Create VLAN(s).

clip_image002

 

c) Provide a meaningful name for the VLAN, this name cannot be changed once saved. For most situations the Common/Global radio button should be selected to ensure the same configuration is applied to both Fabrics.  Enter the VLAN ID(s), then press the Check Overlap button to ensure there is no conflict with existing configuration and if unique, press OK.

clip_image003

 

.

d) Check that the newly created VLAN appears in the list of configured VLANs in the navigation pane.

clip_image004

 

e) If the platform is using vNIC templates then the next step is to add the created VLAN to the required templates. Expand the vNIC Templates branch of the navigation pane (LAN -> Policies -> root -> vNIC Templates) and select the template which should have the VLAN available.

 

clip_image005

 


f) On the General tab for each Template click Modify VLANs.

clip_image006

 

g) In the window that opens add the new VLAN.

clip_image007

Repeat this for each Template.

 

h) Switch to the servers tab in the Navigation Pane and expand the Service Profiles and the root node, the service profiles for each Chassis/Blade should be visible.

clip_image008

 

.

i) Expand each service profile in turn so that the vNIC for the Chassis/Blade is visible.  If the vNIC is bound to one of the templates modified earlier then the VLAN will be listed under the vNIC.

clip_image009 

j) If the VLAN is not listed then select the vNIC and in the main panel click the Modify VLANs link.  For vNICs bound to templates, this link will be greyed out.

clip_image011

 

k) In the window that opens select the new VLAN.

clip_image007

Repeat this process for each vNIC that is not bound to a template.

 

Once all the vNICs have the VLAN available to them, exit UCS Manager.

 

VLAN Configuration on VMware

Follow these steps to add VLAN on VMware:

 

a) Open vSphere Client and connect to the VCENTER server.  Navigate to the blade that the VLAN is required on (Home -> Inventory -> Hosts and Clusters).  Expand the Navigation tree, to locate the server name and then select the Configuration tab in the main window.  From within the Configuration window, select Networking.

clip_image013

 

b) Click on the Properties link for the Virtual Switch, then in the opened window click on the Add button.

 

clip_image014

 

c) In the next window select Virtual Machine in the Connection Types and click next.

clip_image015

 

 

d) Under Port Group Properties enter a Network Label and the VLAN ID, then click Next 

clip_image016

 

e) Now the new VLAN should show under Host networking vSwitch, click Finish.

clip_image017

clip_image018

 

f) To add a virtual machine to the VLAN, edit the machine configuration, select the Network Adapter and from the Network Connection drop down list select the new VLAN.

clip_image020

 

 

That’s it. You should be all set.

 

Monday, April 29, 2013

EMC VNX CLI Reference – VNX 5300, VNX5500

By Joe Piggee

*Please note that EMC advises using the GUI, or opening a SR prior to using CLI. These commands have been gather from multiple sites and is pretty straight forward

 


 
Server specific commands:
 
server_cpu server_<x> -r now   Reboots a datamover
server_ping <IP>    ping any IP from the control station
server_ifconfig server_2 –all   View all configured interfaces
server_route server_2 {-list,flush,add,delete}   Routing table commands
server_mount     Mount a filesystem
server_export     Export a filesystem
server_stats     Provides realtime stats for a datamover, many different options.
server_sysconfig    Modifies hardware config of the data movers.
server_devconfig    Configures devices on the data movers.
server_sysstat     Shows current Memory, CPU, and thread utilization
server_log server_2    Shows current log
vi /nas/jserver/logs/system_log   Java System log
vi /var/log/messages    System Messages
server_ifconfig server_2 <interface_name> up  Bring up a specific interface
server_ifconfig server_2 <interface_name> down Take a specific interface down
server_date     Sets system time and NTP server settings
server_file     FTP equivalent command
server_dns     Configure DNS
server_cifssupport    Support services for CIFS users
 
To view HBA Statistics:
.server_config server_2 -v “printstats fcp reset”  Toggles the service on/off
.server_config server_2 -v “printstats fcp full”     View the stats table (must wait a while for some stats to collect before viewing)
 
To Join/Unjoin a CIFS Server from the domain:
server_cifs server_2 -Join compname=SERVERNAME,domain=DOMAIN.COM,admin=ADMINID
server_cifs server_2 -Unjoin compname=SERVERNAME,domain=DOMAIN.COM,admin=ADMINID
 
To view the current domain controllers visible on the data mover:
.server_config server_2 -v “pdc dump”
 
To enable or disable a domain controller on the data mover:
.server_config server_2 -v “pdc enable=<ip_address>”  Enable a domain controller
.server_config server_2 -v “pdc disable=<ip_address>”  Disable a domain controller
 
To stop and start the CIFS service:
server_setup server_2 -P cifs -o stop   Stop CIFS Service
server_setup server_2 -P cifs -o start  Start CIFS Service
 
To stop, start or check the status of the iSCSI service:
server_iscsi server_2 -service -start     Start iSCSI service
server_iscsi server_2 -service -stop      Stop iSCSI service
server_iscsi server_2 -service -status  Check the status of the iSCSI service
 
To enable/disable NDMP Logging:
Turn it on:
.server_config  server_x  “logsys set  severity  NDMP=LOG_DBG2″
.server_config  server_x  “logsys set  severity  PAX=LOG_DBG2″
Turn it off:
.server_config  server_x  “logsys  set severity  NDMP=LOG_ERR”
.server_config  server_x  “logsys set severity   PAX=LOG_ERR”
 
For gathering performance statistics:
server_netstat server_x -i               Interface statistics
server_sysconfig server_x -v         Lists virtual devices
server_sysconfig server_x -v -i vdevice_name  Informational stats on the virtual device
server_netstat server_x -s -a tcp  Retransmissions
server_nfsstat server_x                    NFS SRTs
server_nfsstat server_x -zero        Reset NFS stats
 
Filesystem specific commands:
 
fs_ckpt      Manage Checkpoints
fs_dhsm     Manage File Mover
fs_group     Manage filesystem groups
 
Complete List of  “nas_”  Commands:
 
This is just for reference, you can easily pull up this list from a Celerra by typing nas_ and hitting the tab key.
 
nas_acl
nas_ckpt_schedule
nas_dbtable
nas_emailuser
nas_inventory
nas_pool
nas_slice
nas_task
nas_automountmap
nas_cmd
nas_devicegroup
nas_event
nas_license
nas_quotas
nas_stats
nas_version nas_cel
nas_copy
nas_disk
nas_fs
nas_logviewer
nas_replicate
nas_storage
nas_volume
nas_checkup
nas_cs
nas_diskmark
nas_fsck
nas_message
nas_server
nas_symm
nas_xml
 
Complete list of  “server_”  Commands:
 
This is just for reference, you can easily pull up this list from a Celerra by typing server_ and hitting the tab key.
 
server_archive
server_cifssupport
server_file
server_log
server_name
server_ping6
server_sysconfig
server_vtlu
server_arp
server_cpu
server_ftp
server_mgr
server_netstat
server_rip
server_sysstat
server_cdms
server_date
server_http
server_mount
server_nfs
server_route
server_tftp
server_cepp
server_dbms
server_ifconfig
server_mountpoint
server_nfsstat
server_security
server_umount
server_certificate
server_devconfig
server_ip
server_mpfs
server_nis
server_setup
server_uptime
server_checkup
server_df
server_iscsi
server_mpfsstat
server_param
server_snmpd


server_usermapper
server_cifs
server_dns
server_kerberos
server_mt
server_pax
server_standby
server_version
server_cifsstat
server_export
server_ldap
server_muxconfig
server_ping
server_stats
server_viruschk
 
Complete list of  “fs_” Commands:
 
This is just for reference, you can easily pull up this list from a Celerra by typing fs_ and hitting the tab key.
 
fs_ckpt
fs_dedupe
fs_dhsm
fs_group
fs_rdf
fs_timefinder

*reference sites: http://emcsan.wordpress.com/2011/06/03/useful-celerra-commands/

https://mydocs.emc.com/VNX/relatedDocs.jsp

Thursday, April 25, 2013

Check my Exchange Server Version

by Joe Piggee Sr.

1. Open EMS

2. Type  Get-ExchangeServer | fl name,edition,admindisplayversion

Check build numbers here.

Thursday, April 18, 2013

How To Add Holidays to Outlook 2010

By Joe Piggee Sr.

1. Open Outlook and Click on the File Tab. Step1
2. Scroll Down and Select “Options” Step2
3. Click Calendar
4. Click Add Holidays
Step3n4

Wednesday, April 17, 2013

How to Remove a Domain Controller

 
By Joe Piggee Sr.
Removing a domain controller by using the Windows interface

You can use the Active Directory Domain Services Installation Wizard to remove a domain controller from an existing domain.

Administrative credentials

To perform this procedure, you must be a member of the Domain Admins group in the domain.

Click Start, click Run, type dcpromo, and then press ENTER.
  1. On the Welcome to the Active Directory Domain Services Installation Wizard page, click Next.

  2. If the domain controller is a global catalog server, a message appears to warn you about the effect of removing a global catalog server from the environment. Click OK to continue.

  3. On the Delete the Domain page, make no selection, and then click Next.

  4. If the domain controller has application directory partitions, on the Application Directory Partitions page, view the application directory partitions in the list, and then remove or retain application directory partitions, as follows:

    • If you do not want to retain any application directory partitions that are stored on the domain controller, click Next.
    • If you want to retain an application directory partition that an application has created on the domain controller, use the application that created the partition to remove it, and then click Refresh to update the list.
  5. If the Confirm Deletion page appears, select the option to delete all application directory partitions on the domain controller, and then click Next.

  6. On the Remove DNS Delegation page, verify that the Delete the DNS delegations pointing to this server check box is selected, and then click Next.

  7. If necessary, enter administrative credentials for the server that hosts the DNS zones that contain the DNS delegation for this server, and then click OK.

  8. On the Administrator Password page, type and confirm a secure password for the local Administrator account, and then click Next.

  9. On the Summary page, to save the settings that you selected to an answer file that you can use to automate subsequent operations in Active Directory Domain Services (AD DS), click Export settings. Type a name for your answer file, and then click Save. Review your selections, and then click Next to remove AD DS.

  10. On the Completing the Active Directory Domain Services Installation Wizard page, click Finish.

  11. You can either select the Reboot on completion check box to have the server restart automatically or you can restart the server to complete the AD DS removal when you are prompted to do so.

  12. Open Server Manager. Click Start, point to Administrative Tools, and then click Server Manager.

  13. In Roles Summary, click Remove Roles.

  14. If necessary, review the information on the Before You Begin page, and then click Next.

  15. On the Remove Server Roles page, clear the Active Directory Domain Services check box, and then click Next.

  16. On the Confirm Removal Selections page, click Remove.

  17. On the Removal Results page, click Close, and then click Yes to restart the server.

*http://technet.microsoft.com/en-us/library/cc771844(v=ws.10).aspx