So I found a link to an awesome collection of information on Azure Pack and other related technologies, well worth reviewing.
It is maintained by Hans Vredevoort and Marc van Eijk from http://www.hyper-v.nu
So today was a fun day, one of our development office host servers had a storage issue this week and fried the volume where all the development virtual machines were running on.
I managed to fix the storage volume however I found a number of VM’s still would not start. The error indicated there was no boot volume.
To fix the issue and repair a Windows 2012 R2 Start-up issue I followed the below steps:
1. Put the Windows Server 2012 R2 installation disc in the disc drive, and then start the computer.
2. Press any key when the message indicating “Press any key to boot from CD or DVD …”. appears.
3. Select a language, time, currency, and a keyboard or another input method. Then click Next.
4. Click Repair your computer.
5. Click the operating system that you want to repair, and then click Next.
6. In the System Recovery Options dialog box, click Command Prompt.
7. Type Bootrec /RebuildBcd, and then press ENTER.
Dell has released an updated version of Dell Server Update Utility, The SUU is an application used to help patch Dell PowerEdge servers. It will compare currently installed drivers and firmware with those available on the DVD or mounted iso file.
It could be found here:
A new updated version (184.108.40.206) is available here
So another normal day at work, too much to do not enough time. But I planned to update my VMM 2012 R2 servers today to the latest update rollup package.
Update Rollup 4 for System Center 2012 R2 Virtual Machine Manager
However I could not find the download for the VMM server anywhere, I could find the admin console update only. My understanding is that it was pulled late last night or early morning (depending on where you live) because of installation issues upgrading VMM servers using Windows Server 2012.
I would expect the update to be re-released next week
It is sometimes necessary to issue a wildcard certificate from your internal Microsoft CA, I had such a requirement this week and thought it would make a nice blog post.
The post assumes you have a Enterprise CA already deployed and a web server template deployed and available for enrolment.
First we need to create the certificate request that will be issued to your CA.
1. Logon to a Windows 2008 R2 or Windows 7 domain member
2. Open the certificates MMC snap-in
Now create the certificate request
3. Right click the Certificates folder which is found under the personal folder
4. Select All Tasks > Advanced Options > Create Custom Request
5. In the Certificate Enrolment Wizard Click Next
6. In the Certificate Enrollment Page select Custom Request > Proceed without enrolment Policy and then select Next
7. In the Custom Request Page select (No template) Legacy Key from the drop down and then select Next
8.On the Certificate Information Page select the Details link, then select the Properties button
9. On the General tab complete the Friendly name field and optionally you can add a description for the certificate.
10. Select the Subject tab and fill in the relevant information as described below
The name of the certificate. This field is used to identify the certificate. Adding the * before the domain name indicates a wildcard certificate for that domain.
The name of the OU. In most cases this is the IT department
The name of the Organization where the certificate is for.
The location of the registered location of the organization.
The County/State of your organization
The country of your organization
11. Select the Extensions tab
12. In Key usage select Digital and Key encipherment
13. On the Private Key tab set the key size to 4096 and select the option Make private key exportable.
14. Under Key type select Exchange
15. Select OK
15. On the certificate Information page select Next
16. Save the request file
That’s the certificate request file done, which was nice and easy even though there was a number of steps, we next need to use this request to generate the rest of the certificate on the CA.
17. Browse to your internal CA web enrollment pages
18. Select Request a certificate
19. Select advanced certificate request
20. Select the Submit a certificate request link
21.Open the previously created request file in notepad and copy all the data in it to clipboard.
22. Past the clipboard into the Saved Request box
23. Select the web server template
24. Click submit
25. You might get a popup box asking for confirmation, select yes
When the CA done it’s job it will offer you the ability to download the certificate
26. Select Base 64 and select Download certificate
Now back in the local machines Certificate snap-in
27. Right click the Certificates folder in the personal folder store and select import and import the file you downloaded from the CA
Now check in the certificate store you should be a valid certificate with a private key
I have been struggling to get the download for Dell SUU 7.4 however I have found it, if you are also struggling try this
So today I needed to deploy a System Center Operations Manager Gateway in our perimeter network to support external client connections from third party locations and environments that are not part of our internal corp domain. I thought I would write up the vast majority of my steps for future reference and hopefully to help you. I used primarily two sources of information in additional to my general knowledge, both are listed at the bottom of this post.
1. Deploy Windows Server 2012 R2 standalone Server
2. Install Updates
3. Rename the server
4. Host File:
It is very important that all servers are able to resolve the FQDN of each other. Typically this is done through DNS, but if DNS is not possible you should have all the servers setup in a host file.
a. On all of the Management group servers that are unable to use DNS to resolve the FQDN of the Gateway Server edit the host file found locally in “C:\Windows\System32\drivers\etc”
b. Open file with Notepad as a admin with elevated rights
c. Enter the IP address and FQDN of the Gateway servers
d. On all of the Gateway servers enter all the Management group servers that the gateway will connect to
On the Management Server you should have something like:
On the Gateway Server you should have
Save the file and close Notepad.
Before you begin you need to make sure that if there are any firewalls between the servers that port 5723 is open.
Deploying gateway servers requires certificates on all servers in the management group and all gateway servers. These can be internal via a CA or external from a third party vendor like VeriSign. I use an internal CA which is already setup to issue SCOM Gateway Certificates, you can find more information on how to set this up from the sources link at the bottom.
7. Ensure The Management Servers has an Ops Manager Certificate install in it Personal Computer Store, if you do not have one, enrol.
8. Gateway Root Certificate Import
On the Gateway Server, install the CA root certificate.
a. Browse to https://<CA Issuing Server>/certsrv
c. Select the “Download a CA certificate, certificate chain, or CRL link on the web page.
d. Select “Base 64” as the encoding method
e. Select “Download CA certificate chain” and save the file.
f. Open MMC and add the certificate snapin for the local computer.
g. Right click the Trusted Root Certification Authorities\Certificates store and select All Tasks\Import, import the downloaded file into the store. This will ensure that any certificate issued by the internal CA will be trusted by this machine.
9. Gateway Server SCOM Certificate
a. From the Gateway server browse to https://<CA Issuing Server>/certsrv
b. Select “Request a Certificate”
c. Select “Advanced Certificate Request”
d. Select “Create and Submit a request to this CA” If you do not get a prompt check your ActiveX settings as you should get a prompt.
e. Select your Operations Manager certificate form the “Certificate Template” option (Drop Down).
f. In the name field populate with the FQDN of the Gateway Server in the server is in a domain, if it is in a workgroup use the server name..
g. Select PKCS10 as the request format
h. Provide a friendly name so you can identify the certificate at a later date.
i. Select “Submit”
j. Select yes to any popups
k. Select “Install this certificate”
10. Move the Certificate to the correct location
a. On the gateway server in the Certificate MMC for the user export the new certificate to file exporting the private key and import into the personal certificate store for the local computer.
b. Restart the health service (Microsoft Monitoring Agent)
11. Gateway Approval Tool
Now that we have our certs in place we need to run the gateway approval tool on the SCOM RMS server. In the installation media in SUPPORTTOOLS under your respective processor folder you will find two files:
a. Copy both of these files to the SCOM install directory under <installed Drive>Program Files\System Center 2012 R2\Operations Manager\Setup and run the following command in that folder from an elevated command prompt.
Microsoft.EnterpriseManagement.gatewayApprovalTool.exe /ManagementServerName=<FQDN of RMS box> /GatewayName=<FQDN of Gateway Server> /Action=Create
Note: If you are installing a Gateway server in a domain then use the FQDN of the gateway server, if you are installing the gateway in a workgroup just using the server name.
Once complete the command prompt should say something like “The approval of the server <gateway server FQDN> completed successfully”
12. Install Gateway Role
Now we have everything in place to deploy the gateway role.
a. Using the Operation Manager Install media install the “Gateway Management Server” Role using the link on the install media splash screen.
b. Once installed, go back to the SCOM console, in Administration view under Management servers select the properties of the new gateway server and in the security tab enable the server proxy.
c. On the gateway server we need to tell SCOM which certificate to use for authentication, by running the MOMCERTIMPORT.exe tool. In the installation media in SUPPORTTOOLS under your respective processor folder run the MOMCERTIMPORT.exe tool from an elevated command prompt. You should see the cert that you installed previously. Select the correct certificate and Click OK