5 Essential Tips for Maximizing Your Experience at Nutanix .NEXT for Bloggers
To clarify are you using ipmicfg to change the IPMI password on the Hyper-V host? Our IPMI password document (https://portal.nutanix.com/#/page/docs/details?targetId=Hardware_Administration_Reference-NOS_v4_1:har_password_change_ipmi_t.html) covers changing the IPMI password through Hyper-V shell: [list=1] [*]Log into the Hyper-V host with SSH. [*]Determine the user ID of the administrator for which you want to change the password.> ipmiutil user list A sample output is as follows. ID Name Callin Link Auth IPMI Msg Channel Priv Limit2 ADMIN true false false Unknown (0x00)In the sample output, the ID of the administrator for which you want to change the password is 2. [*]Set the new password.> ipmiutil user set password user_id new_password [/list] For example "ipmiutil user set password 2 NEWPASS" for the sample output. Also make sure to update the IPMI password in Zeus config: [list] [*]Update the administrative user password for all hosts in the Zeus configuration.[li
Hi SeanM, NTPD in our platform doesn't use the -x flag which is what makes NTP susceptible to leap second. Therefore you don't have to patch or make any changes to the CVM. We have documented that we not susceptible in KB 2229: [url=https://portal.nutanix.com/#page/kbs/details?targetId=kA060000000TSUmCAO]https://portal.nutanix.com/#page/kbs/details?targetId=kA060000000TSUmCAO[/url] -Ben Nordan Nutanix SRE
Yes, ESXi 6.0 is supported with NOS 4.1.3 or higher.
Hi [url=http://next.nutanix.com/member/profile?mid=26137]JBPrado[/url] Yes, you can follow portal documentation [url=https://portal.nutanix.com/#/page/docs/details?targetId=Web-Console-Guide-Prism-v50:man-nutanix-guest-tool-enable-multiple-vms-t.html]https://portal.nutanix.com/#/page/docs/details?targetId=Web-Console-Guide-Prism-v50:man-nutanix-guest-tool-enable-multiple-vms-t.html[/url]. In this method you add NGT to the base image then confirm you have connectivity from the guest to cluster VIP. Once connectivity is confirmed use that VM as your base image. On each clone of the base VM run the following command to link the new clone to NGT: ncli> ncli ngt mount vm-id=clone_vm_id The vm-id can be found in `ncli vm ls`. This will establish the communication link between the cluster VIP to the guest's NGT agent. Also note in AOS 5.0 we added NGT silent installer which lets you enable NGT a lot easier on multiple guests without clicking through the installer. Documentation can
[url=http://next.nutanix.com/member/profile?mid=26137]JBPrado[/url] happy to help. I just edited my post as well to include to use the NGT installed VM as your base image to clone from. Prior it wasn't as too clear. Also kb 3700 ([url=https://portal.nutanix.com/#/page/kbs/details?targetId=kA032000000TV6ACAW]https://portal.nutanix.com/#/page/kbs/details?targetId=kA032000000TV6ACAW[/url]) how to install a modified VMmobility .msi that bypasses the SHA2 check. After if that .msi is installed prior to running NGT you should not receive an error. -Ben
Can you review KB 4611: https://portal.nutanix.com/#/page/kbs/details?targetId=kA032000000bn1OCAQ? In previous cases I've seen following scenario 2 will resolve the issue. Also if it is AOS 5.5 or higher use the command `manage_ovs --bridge_name br1 create_single_bridge` from the local CVM to create br1.
Can you confirm the following: [list=1] [*]Confirm the br1 exists on the node that the VM is booting on: "allssh manage_ovs show_bridges" [*]Remove the bridge completely with "ovs-vsctl del-br br1" then recreating it with "ovs-vsctl add-br br1"? Then we apply the update_uplinks and net.create commands. [*]Confirm that all hosts have connectivity to all CVMs. On each CVM run: [/list] for i in `hostips`; do ping $i -c 3; done If there is still an issue it would be best to have support take a look. Do you have a valid contract? If so, open a case and PM me the case number. We can hop on a WebEx to get it squared away.
Already have an account? Login
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.