Dell EMC Unity – Bulk create Filesystems & NFS/SMB Shares

I’ve been quite impressed by the new UI for the new Unity arrays. The pains of JAVA/Flash annoyances are a thing of the past with the new sleek, smooth interface on board. There are still some things missing however. One of the tasks I had before me was to create Continue Reading

Dell EMC Unity – Bulk create Filesystems & NFS/SMB Shares

I’ve been quite impressed by the new UI for the new Unity arrays. The pains of JAVA/Flash annoyances are a thing of the past with the new sleek, smooth interface on board. There are still some things missing however. One of the tasks I had before me was to create Continue Reading

ESXi 5.5 – Automating VMFS UNMAP w/ PowerCLI and PowerShell

With vSphere 6.5 recently released, a nice feature was the automated execution of the UNMAP command against thin provisioned datastores to reclaim space. This requires no user interaction, it’s fully automated for you and can free up significant amounts of space from your datastores. There’s some good information regarding the Continue Reading

VMware DRS rule manipulation using PowerCLI (EMC VPLEX use case) Part 1.

VPLEX is another of my favourite products,  and for good reason. I currently run a Metro cluster underneath a VMware platform that has proven to be super reliable. One important design consideration for this is to ensure that VM’s are configured for site bias. Why ? Glad you asked. In Continue Reading

Dell PowerVault MD3660f – Firmware Upgrade Process

The DELL PowerVault MD series Storage Arrays are solid and reliable units. Whilst I don’t use any for what may be considered “Primary” Storage, I use them for many workloads. Backup targets, Image Respositories, Archives, Unstructured data etc. In a 5 RU form factor, it’s a dense package with over Continue Reading

EMC XtremIO 4.x – AD LDAP Configuration

Configuring Active Directory (or really LDAP) based authentication for your infrastructure is basically standard fare. Default accounts should always be changed and centralized management and control of access credentials saves you effort over time, and is “Security 101” With that in mind I set about configuring LDAP authentication against an Active Continue Reading