Machiavelli

Virtual Member
  • Content count

    4
  • Joined

  • Last visited

Everything posted by Machiavelli

  1. Please check back later for more details. ETA of completion: July 31. Last updated: July 3. There are about 5 more that still need to be manually added to this list which have since been selected. Please note that this website's Twitter channel is @vNetworking. Below is the VMware Top Contributors List that I've found on Twitter. The criteria for being on this list is not just being one of the best but also being a substantial contributor to the advancement of VMware research. @ady189: Adrian Roberts is a VCDX in DCV and CMA, and posts on a wide range of advanced VMware topics. @DuncanYB: Duncan Epping is chief technologist at VMware, runs Yellow-Bricks.com, and is author of Essential Virtual SAN and many other titles. @ericsiebert: The web author of vLaunchPad, which is an excellent list of VMware resources including the top 100 voted-on VMware blogs. @EzzeldinHussein: He is on top of daily news developments in VMware. @MarcHuppert: He is VCDX #181 and shares tutorials often related to VSAN and NSX. @mlydy: Matt Lydy is a well-rounded contributor who covers advanced storage and virtual networking topics. @nathan_owen: Founder of Blue Medora, which develops monitoring tools for VMware vRealize. @PatGelsinger: Pat Gelsinger is the CEO of VMware, and has a strong technical grasp of his business as is self-evident from his keynote presentations. @RoshniMadaiah: She works at VMware and shares helpful info on topics such as vRealize Operations and VSAN. @vCommunityGuy: The vExpert and VMware Community Manager. @VFrontDe: Posts many tutorials, often with an emphasis on VMware updates and patching. @vGhetto: Virtually Ghetto is a channel that provides many VMware DevOps tutorials. @virtRich: Rich Dowling is a VCAP5-DCA/DCD and posts many useful guides on topics including NSX and PowerCLI. @vmwarehorizon: VMware Horizon is an official channel reporting on the most excited VDI use cases worldwide. @vmware_za: VMware South Africa is an official channel which offers useful VMware news from around the world. @wholmes: Wade Holmes is VCDX #15 and specializes in NSX.
  2. It's a good security best practice to control when access is granted to for the command line on the direct console user interface (DCUI). I have tested the instructions below on vSphere 5.5, as a way to enable/disable access to the ESXi shell from within vSphere. How to Enable ESXi Shell From within vSphere Web Client: Click Hosts and Clusters. Select the Host from the list that you wish to grant ESXi access. Click Manage tab. Click Settings tab from within the Manage tab. Go under System in the drop-down menu and select Security Profile. Click Edit in the lower right where the Services panel is. There are three options here: ESXi shell Direct Console UI SSH Start/Stop the ESXi Shell as needed. From within vSphere Windows Client: Click Hosts and Clusters. Select the Host from the list that you wish to grant ESXi access. Go to the Configuration tab. On the Software menu to the left, select Security Profile. On the Services panel at the top, select Properties in the upper right. Scroll down to ESXi Shell and click the Options button found in the lower right. Click Start. ESXi shell access will be available immediately and there will be a triangle with an exclamation point next to the host. Later going here and clicking Stop will set it back and remove the triangle notification next to the host. On the DCUI: Press F2 and enter the root password. Go to Troubleshooting Options and press enter. Select Enable ESXi Shell and press enter. Look to the right to see the status: If it shows Enabled on the right then it’s enabled. Press Esc until you return to the main direct console screen. Press Alt-F1 to open a virtual console window to the host. Type exit followed by the enter key once or twice as needed to exit the shell. Press Alt-F2 to return to the direct console. Afterward, return to the vSphere Web Client and Stop the ESXi Shell.