-
I recently came by a situation where confidential email was mistakenly sent to the wrong users. I was asked to find a way to delete the email. I knew I could use the Search-mailbox cmdlet since this is an Exchange 2010 deployment, but totally forgot I had to configure a Role assignment before this could…
-
As it turns out, I already have two Virtual machines running on one of the cluster nodes. I set these up before the cluster creation. The VMs are currently not cluster roles/resources. I will go ahead and make one of the VMs (WK7) a cluster role by adding it to the cluster. PS C:\> Get-VM…
-
Here we go over my steps for the actual cluster creation, cluster and node validation, quorum setup and cluster shared volume configuration.We have by running a cluster validation on each node. This can be achieved with the following cmdlets: Test-Cluster -Node hyperv01 Test-Cluster -Node hyperv03 In this case, the test passed. The process basically gives…
-
In the next part of the series, we will create a simple 1GB iSCSI virtual disk, assign it to the already configured target and verify the disk is visible to the iSCSI initiators. New-IscsiVirtualDisk -Description “Witness Disk” -Path g:\iscsivirtualdisks\Witness00.vhd -Size 1GB -ComputerName labtarget -Verbose (Create the 1GB iSCSI virtual disk) Add-IscsiVirtualDiskTargetMapping -TargetName Target00 -Path g:\iscsivirtualdisks\Witness00.vhd…
-
Telnet is a widely used protocol for accessing and administering Cisco devices. But this protocol is not exactly secure and transmits data over a network in plain text. Ssh is a secure protocol and it’s best practice to secure your access to all devices. Configuring ssh on most Cisco switch models is a straightforward process.…
-
So we recently restructured the Company network from a flat network to multiple Vlans. The need has arisen to route traffic for specific vlans through a different ISP for business reasons. This means routing traffic to a path different from the default route configured on the Core switch , which in this case is a…
-
In this part of the series, we will configure two hosts as iSCSI initiators. The hosts have already been defined at the Target and ready to log on. Both hosts are running WS 2012 Hyper-v Core and I made sure to install the Failover Clustering and Hyper-v windows features. Following is a snapshot of the cmdlets available…
-
We’re currently working on virtualizing a large number of our servers and going through the process of deciding whether to deploy a 3rd party SAN or WS 2012 iSCSI Target in production. In the meantime, I have gone ahead and deployed a basic iSCSI Target and Two host WS 2012 Failover cluster in the lab…