Archive for the ‘VMware Info’ Category

Raspberry Pi ESXi ARM Edition – running Photon OS 4.0 & installing mini Kubernetes Cluster (K3s)

Samstag, Februar 27th, 2021
root@vm-iot-jsho-photon-01 [ ~ ]# tdnf update
Refreshing metadata for: ‚VMware Photon Linux 4.0 (aarch64)‘
Refreshing metadata for: ‚VMware Photon Extras 4.0 (aarch64)‘
Refreshing metadata for: ‚VMware Photon Linux 4.0 (aarch64) Updates‘
Nothing to do.
root@vm-iot-jsho-photon-01 [ ~ ]#
root@vm-iot-jsho-photon-01 [ ~ ]# tdnf upgrade
Nothing to do.
root@vm-iot-jsho-photon-01 [ ~ ]#
# vi /etc/ssh/sshd_config
PermitRootLogin yes
root@vm-iot-jsho-photon-01 [ ~ ]# tdnf install -y open-vm-tools
Installing:
libxml2-devel aarch64 2.9.10-6.ph4 photon-release 421.22k 431333
xmlsec1 aarch64 1.2.30-3.ph4 photon-release 1008.09k 1032280
libxslt aarch64 1.1.34-2.ph4 photon-release 386.52k 395799
libtirpc aarch64 1.2.6-1.ph4 photon-release 193.34k 197978
libmspack aarch64 0.10.1alpha-1.ph4 photon-release 71.67k 73386
libdnet aarch64 1.11-7.ph4 photon-release 119.49k 122353
open-vm-tools aarch64 11.2.5-1.ph4 photon-release 2.58M 2707646
Total installed size: 4.73M 4960775
Downloading:
libxml2-devel 86552 100%
xmlsec1 293410 100%
libxslt 167035 100%
libtirpc 95455 100%
libmspack 44444 100%
libdnet 44766 100%
open-vm-tools 770464 100%
Testing transaction
Running transaction
Installing/Updating: libdnet-1.11-7.ph4.aarch64
Installing/Updating: libmspack-0.10.1alpha-1.ph4.aarch64
Installing/Updating: libtirpc-1.2.6-1.ph4.aarch64
Installing/Updating: libxml2-devel-2.9.10-6.ph4.aarch64
Installing/Updating: libxslt-1.1.34-2.ph4.aarch64
Installing/Updating: xmlsec1-1.2.30-3.ph4.aarch64
Installing/Updating: open-vm-tools-11.2.5-1.ph4.aarch64
Created symlink /etc/systemd/system/vmtoolsd.service.requires/vgauthd.service → /usr/lib/systemd/system/vgauthd.service.
Created symlink /etc/systemd/system/multi-user.target.wants/vmtoolsd.service → /usr/lib/systemd/system/vmtoolsd.service.
Complete!
root@vm-iot-jsho-photon-01 [ ~ ]#
root@vm-iot-jsho-photon-01 [ ~ ]# systemctl enable vmtoolsd.service
root@vm-iot-jsho-photon-01 [ ~ ]# systemctl start vmtoolsd.service
root@vm-iot-jsho-photon-01 [ ~ ]# tdnf install kubernetes iptables docker
Package iptables is already installed.
Package docker is already installed.
Installing:
perl aarch64 5.30.1-3.ph4 photon-release 55.31M 57992259
libnfnetlink aarch64 1.0.1-1.ph4 photon-release 49.72k 50912
libnetfilter_queue aarch64 1.0.5-1.ph4 photon-release 48.51k 49673
libnetfilter_cttimeout aarch64 1.0.0-1.ph4 photon-release 38.48k 39403
libnetfilter_cthelper aarch64 1.0.0-1.ph4 photon-release 34.33k 35156
libnetfilter_conntrack aarch64 1.0.8-1.ph4 photon-release 137.78k 141086
libmnl aarch64 1.0.4-3.ph4 photon-release 23.30k 23863
socat aarch64 2.0.0.b9-2.ph4 photon-release 628.81k 643902
ethtool aarch64 5.10-1.ph4 photon-release 609.21k 623833
etcd aarch64 3.4.13-3.ph4 photon-release 32.68M 34267406
ebtables aarch64 2.0.10-4.ph4 photon-release 349.42k 357804
cri-tools aarch64 1.19.0-3.ph4 photon-release 45.79M 48018673
conntrack-tools aarch64 1.4.6-1.ph4 photon-release 474.84k 486235
cni aarch64 0.8.7-3.ph4 photon-release 44.24M 46384160
kubernetes aarch64 1.19.7-1.ph4 photon-release 513.26M 538193740
Total installed size: 693.62M 727308105
Is this ok [y/N]: y
Downloading:
perl 15877896 100%
libnfnetlink 28557 100%
libnetfilter_queue 27192 100%
libnetfilter_cttimeout 22016 100%
libnetfilter_cthelper 21970 100%
libnetfilter_conntrack 59955 100%
libmnl 16888 100%
socat 224709 100%
ethtool 219694 100%
etcd 9586835 100%
ebtables 123332 100%
cri-tools 11159142 100%
conntrack-tools 182380 100%
cni 6937689 100%
kubernetes 97613424 100%
Testing transaction
Running transaction
Installing/Updating: libmnl-1.0.4-3.ph4.aarch64
Installing/Updating: libnfnetlink-1.0.1-1.ph4.aarch64
Installing/Updating: libnetfilter_queue-1.0.5-1.ph4.aarch64
Installing/Updating: libnetfilter_conntrack-1.0.8-1.ph4.aarch64
Installing/Updating: libnetfilter_cttimeout-1.0.0-1.ph4.aarch64
Installing/Updating: libnetfilter_cthelper-1.0.0-1.ph4.aarch64
Installing/Updating: conntrack-tools-1.4.6-1.ph4.aarch64
Created symlink /etc/systemd/system/multi-user.target.wants/conntrackd.service → /usr/lib/systemd/system/conntrackd.service.
Installing/Updating: ethtool-5.10-1.ph4.aarch64
Installing/Updating: cni-0.8.7-3.ph4.aarch64
Installing/Updating: cri-tools-1.19.0-3.ph4.aarch64
Installing/Updating: etcd-3.4.13-3.ph4.aarch64
Installing/Updating: socat-2.0.0.b9-2.ph4.aarch64
Installing/Updating: perl-5.30.1-3.ph4.aarch64
Installing/Updating: ebtables-2.0.10-4.ph4.aarch64
Installing/Updating: kubernetes-1.19.7-1.ph4.aarch64
Complete!
root@vm-iot-jsho-photon-01 [ ~ ]#
root@vm-iot-jsho-photon-01 [ ~ ]# vi /etc/systemd/scripts/ip4save
-A INPUT -p tcp -m tcp –dport 8080 -j ACCEPT
-A INPUT -p tcp -m tcp –dport 6443 -j ACCEPT
-A INPUT -p tcp -m tcp –dport 10250 -j ACCEPT
root@vm-iot-jsho-photon-01 [ ~ ]# systemctl stop iptables
root@vm-iot-jsho-photon-01 [ ~ ]# systemctl disable iptables
root@vm-iot-jsho-photon-01 [ ~ ]# vi /etc/kubernetes/config
KUBE_MASTER=“–master=http://vm-iot-jsho-photon-01:8080″
root@vm-iot-jsho-photon-01 [ ~ ]# vi /etc/kubernetes/kubelet
# KUBELET_HOSTNAME=“–hostname-override=127.0.0.1″
root@vm-iot-jsho-photon-01 [ ~ ]# vi kuberbetes.sh
for SERVICES in etcd kube-apiserver kube-controller-manager kube-scheduler kube-proxy kubelet docker;
do
systemctl restart $SERVICES
systemctl enable $SERVICES
# systemctl status $SERVICES
done
root@vm-iot-jsho-photon-01 [ ~ ]# kubectl get nodes
NAME STATUS ROLES AGE VERSION
vm-iot-jsho-photon-01 Ready <none> 15s v1.19.7
root@vm-iot-jsho-photon-01 [ ~ ]# kubectl get services
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.254.0.1 <none> 443/TCP 36m
root@vm-iot-jsho-photon-01 [ ~ ]#

Raspberry Pi ESXi ARM Edition – running Photon OS 4.0

Samstag, Februar 27th, 2021

Raspberry Pi ESXi ARM Edition – Photon OS 4.0 & Kubernetes Cluster (K3s)

Freitag, Februar 26th, 2021

Kubernetes is a 10-letter word stylized as K8s so something half as big as Kubernetes would be a 5-letter word stylized as K3s

  K3s.io – is a highly available certified Kubernetes distribution designed for production workloads in unattended resource-constrained remote locations or inside IoT appliances and it is packaged as a single <40MB binary that reduces the dependencies and steps needed to install run and auto-update a production Kubernetes cluster

   Photon OS – is a Linux based open source security-hardened enterprise grade appliance operating system that is purpose built for Cloud and Edge applications

Raspberry Pi ESXi ARM Edition – running Ubuntu 20.04.2 LTS

Freitag, Februar 26th, 2021

VMware ESXi 7.0 ARM Edition UEFI Firmware v1.23 – on a Raspberry Pi 4

Donnerstag, Februar 25th, 2021
On Raspberry Pi OS:
# apt-get update -y
# apt-get full-upgrade -y
# rpi-update
# rpi-eeprom-update
-a : automatically install bootloader and USB (VLI) EEPROM updates
-d : use the default bootloader config
# rpi-eeprom-update -d -a

Things you need to download:

Latest Raspberry Pi Firmware:
https://github.com/raspberrypi/firmware

UEFI Raspberry Pi Firmware:
https://github.com/pftf/RPi4/releases

Edit config.txt
arm_64bit=1
enable_uart=1
uart_2ndstage=1
enable_gic=1
armstub=RPI_EFI.fd
disable_commandline_tags=1
disable_overscan=1
device_tree_address=0x1f0000
device_tree_end=0x200000
dtoverlay=miniuart-bt
gpu_mem=16

On ESXi (SSH):
[root@localhost:~] /etc/init.d/usbarbitrator stop
watchdog-usbarbitrator: Terminating watchdog process with PID 66927
stopping usbarbitrator…
usbarbitrator stopped
[root@localhost:~]
[root@localhost:~] chkconfig usbarbitrator off
[root@localhost:~]
[root@localhost:~] ls /dev/disks/
mpx.vmhba32:C0:T0:L0
mpx.vmhba32:C0:T0:L0:1
mpx.vmhba33:C0:T0:L0
mpx.vmhba33:C0:T0:L0:1
mpx.vmhba33:C0:T0:L0:5
mpx.vmhba33:C0:T0:L0:6
mpx.vmhba33:C0:T0:L0:7
vml.0000000000766d68626133323a303a30
vml.0000000000766d68626133323a303a30:1
vml.01000000003443353330303031303531313237313032353733556c74726120
vml.01000000003443353330303031303531313237313032353733556c74726120:1
vml.01000000003443353330303031303531313237313032353733556c74726120:5
vml.01000000003443353330303031303531313237313032353733556c74726120:6
vml.01000000003443353330303031303531313237313032353733556c74726120:7
[root@localhost:~]
[root@localhost:~] partedUtil mklabel /dev/disks/mpx.vmhba32:C0:T0:L0 msdos
[root@localhost:~]

… VM Container mit Kali Linux 2021.1

Fling-on-Raspberry-Pi  ESXi-Arm-Fling-Doc

VMware Security Advisories – VMware vCenter Server Workaround Instructions for CVE-2021-21972 and CVE-2021-21973

Mittwoch, Februar 24th, 2021

   VMware Security Advisories – VMware vCenter Server Workaround Instructions for CVE-2021-21972 and CVE-2021-21973

VMware vSphere ESXi 7.0 Hypervisor(s) – Direct Console User Interface (DCUI) über SSH öffnen

Dienstag, Februar 23rd, 2021

   Es ist allgemein bekannt dass man über SSH auf die Shell eines ESXi Servers zugreifen kann dies ist zwar nur in Ausnahmefällen erforderlich in erster Linie für das Troubleshooting und es erlaubt die Nutzung der verschiedenen Kommandozeilen Tools des Hosts bei dieser Gelegenheit lässt sich auch die menügeführte gelb-graue Oberfläche (DCUI) remote aufrufen

PuTTY Change Settings –> Window –> Translation –> Remote Character Set –> Use font encoding

# dcui

VMware Workstation Pro – Network Condition Simulation

Donnerstag, Februar 18th, 2021

   VMware Workstation Pro  – Network Condition Simulation is a new feature that allows simulating various types of network features

These features include:

Bandwidth (Kbps)
Latency
Packet Loss

You can control these features of your connection for both the incoming and outgoing connections

Oracle VirtualBox 6.1.x – nested virtualization with VMware vSphere ESXi 7.0 Hypervisor(s)

Mittwoch, Februar 17th, 2021

There is a special tool included with VirtualBox that allows enabling the nested virtualization flag. This is the vboxmanage utility. Using vboxmanage, you can easily enable nested virtualization on your VirtualBox VM

vboxmanage modifyvm „<your vm name>“ –nested-hw-virt on

VMware vSphere ESXi 7.0 Hypervisor(s) – create a new VM for Kali Linux 2020.4 use the following configuration ‚Guest OS Version: Debian GNU/Linux 11 (64-Bit)‘

Freitag, Februar 5th, 2021

Microsoft SQL Server 2019 – Licensing for On-Premises VMware vSphere Implementations

Mittwoch, Februar 3rd, 2021

Microsoft SQL Server Licensing for On-Premises VMware vSphere Implementations – Part One

Microsoft SQL Server Licensing for On-Premises VMware vSphere Implementations – Part Two

VMware vSphere ESXi 6.x/7.x Hypervisor(s) – Ransomware operators are exploiting two vulnerabilities CVE-2019-5544 and CVE-2020-3992 to encrypt virtual hard disks

Dienstag, Februar 2nd, 2021

   VMware vSphere ESXi 6.x/7.x Hypervisor(s) – both CVE-2019-5544 and CVE-2020-3992 vulnerabilities in VMware ESXi impact the Service Location Protocol (SLP) reside in the OpenSLP open-source implementation of the Service Location Protocol (SLP) which allows the software to locate resources on a network

VMware Unified Access Gateway 2012 – released with new features

Mittwoch, Januar 13th, 2021

VMware vSphere ESXi 7.0 Hypervisor(s) – Dude 6.46.8 Server Installation

Donnerstag, Dezember 24th, 2020

VMware vSphere ESXi 7.0 Hypervisor(s) – manually attach USB Device as a VMFS Datastore

Freitag, Dezember 18th, 2020

   Stop the USB arbitrator service – this service is used to passthrough USB device from an ESXi host to a virtual machine but when disabling it you can no longer passthrough USB devices to VMs

[root@JSHO-VM7-01:~] ls /dev/disks/
mpx.vmhba32:C0:T0:L0 vml.010000000020202020202047544630303250414b4d48583746486974616368
t10.ATA_____Hitachi_HDS721010KLA330_______________________GTF002PAKMHX7F vml.0100000000323133303237323738393430506f72746162
t10.ATA_____Hitachi_HDS721010KLA330_______________________GTF002PAKMHX7F:1 vml.0100000000323133303237323738393430506f72746162:1
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____ vml.010000000035303032364237373832314643463831202020204b494e475354
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:1 vml.010000000035303032364237373832314643463831202020204b494e475354:1
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:5 vml.010000000035303032364237373832314643463831202020204b494e475354:5
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:6 vml.010000000035303032364237373832314643463831202020204b494e475354:6
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:7 vml.010000000035303032364237373832314643463831202020204b494e475354:7
t10.ATA_____Samsung_SSD_850_EVO_500GB_______________S2RBNXAH334538W_____ vml.0100000000533252424e58414833333435333857202020202053616d73756e
t10.ATA_____Samsung_SSD_850_EVO_500GB_______________S2RBNXAH334538W_____:1 vml.0100000000533252424e58414833333435333857202020202053616d73756e:1
[root@JSHO-VM7-01:~] partedUtil mklabel /dev/disks/mpx.vmhba32\:C0\:T0\:L0 gpt
[root@JSHO-VM7-01:~] eval expr $(partedUtil getptbl /dev/disks/mpx.vmhba32\:C0\:T0\:L0 | tail -1 | awk ‚{print $1 “ \\* “ $2 “ \\* “ $3}‘) – 1
976768064
[root@JSHO-VM7-01:~] partedUtil showGuids
Partition Type GUID
vmfs AA31E02A400F11DB9590000C2911D1B8
vmkDiagnostic 9D27538040AD11DBBF97000C2911D1B8
vsan 381CFCCC728811E092EE000C2911D0B2
virsto 77719A0CA4A011E3A47E000C29745A24
VMware Reserved 9198EFFC31C011DB8F78000C2911D1B8
Basic Data EBD0A0A2B9E5443387C068B6B72699C7
Linux Swap 0657FD6DA4AB43C484E50933C84B4F4F
Linux Lvm E6D6D379F50744C2A23C238F2A3DF928
Linux Raid A19D880F05FC4D3BA006743F0F84911E
Efi System C12A7328F81F11D2BA4B00A0C93EC93B
Microsoft Reserved E3C9E3160B5C4DB8817DF92DF00215AE
Unused Entry 00000000000000000000000000000000
[root@JSHO-VM7-01:~] partedUtil setptbl /dev/disks/mpx.vmhba32\:C0\:T0\:L0 gpt „1 2048 976768064 AA31E02A400F11DB9590000C2911D1B8 0“
gpt
0 0 0 0
1 2048 976768064 AA31E02A400F11DB9590000C2911D1B8 0
[root@JSHO-VM7-01:~] vmkfstools -C vmfs5 -S USB-Stick /dev/disks/mpx.vmhba32\:C0\:T0\:L0:1
create fs deviceName:’/dev/disks/mpx.vmhba32:C0:T0:L0:1′, fsShortName:’vmfs5′, fsName:’USB-Stick‘
deviceFullPath:/dev/disks/mpx.vmhba32:C0:T0:L0:1 deviceFile:mpx.vmhba32:C0:T0:L0:1
ATS on device /dev/disks/mpx.vmhba32:C0:T0:L0:1: not supported
.
Checking if remote hosts are using this device as a valid file system. This may take a few seconds…
Creating vmfs5 file system on „mpx.vmhba32:C0:T0:L0:1“ with blockSize 1048576 and volume label „USB-Stick“.
Successfully created new volume: 5fdb5f37-a8d660b9-c730-001517148cea
[root@JSHO-VM7-01:~] ls /dev/disks/
mpx.vmhba32:C0:T0:L0 vml.010000000020202020202047544630303250414b4d48583746486974616368
mpx.vmhba32:C0:T0:L0:1 vml.010000000020202020202047544630303250414b4d48583746486974616368:1
t10.ATA_____Hitachi_HDS721010KLA330_______________________GTF002PAKMHX7F vml.0100000000323133303237323738393430506f72746162
t10.ATA_____Hitachi_HDS721010KLA330_______________________GTF002PAKMHX7F:1 vml.0100000000323133303237323738393430506f72746162:1
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____ vml.010000000035303032364237373832314643463831202020204b494e475354
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:1 vml.010000000035303032364237373832314643463831202020204b494e475354:1
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:5 vml.010000000035303032364237373832314643463831202020204b494e475354:5
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:6 vml.010000000035303032364237373832314643463831202020204b494e475354:6
t10.ATA_____KINGSTON_SA400S37120G___________________50026B77821FCF81____:7 vml.010000000035303032364237373832314643463831202020204b494e475354:7
t10.ATA_____Samsung_SSD_850_EVO_500GB_______________S2RBNXAH334538W_____ vml.0100000000533252424e58414833333435333857202020202053616d73756e
t10.ATA_____Samsung_SSD_850_EVO_500GB_______________S2RBNXAH334538W_____:1 vml.0100000000533252424e58414833333435333857202020202053616d73756e:1