I’ve recently written this post which discusses RAID levels and how to calculate how many disks you need in your RAID sets to provide the required performance levels for your…
As part of my VCAP-DCA study guide, I recently did a post on ESXi Lockdown mode. As discussed in the post, when lockdown mode is enabled, all access to the…
This post is intended to cover the VCAP-DCA objective of understanding the various RAID levels that you will come across when working with vSphere storage. There are already some great…
Following this post on installing and configuring the VMware syslog collector, this post will be about how to configure ESXi hosts to use it. One of the ways to configure…
This post is aimed at covering the VCAP-DCA objectives relating to installing the ESXi Dump Collector and the Syslog Collector. I’ve written about installing and testing the ESXi Dump Collector…
Certificate checking is used by ESXi hosts to check each others identities, which helps prevent man-in-the-middle attacks on the host. The default, self signed, certificates generated by an ESXi host…
As described in the vSphere Security Guide: To increase the security of your ESXi hosts, you can put them in lockdown mode. In lockdown mode, all operations must be performed…
I’ve recently written a post about how to collect data with esxtop and resxtop, but how do you interpret that data? esxtop is a great tool for troubleshooting and determining…
Using the watch command from the ESXi command line is a great way to monitor snapshot removal, as shown in this KB article. # watch -d ‘ls -luth | grep…