When you have to deal with a large environment and several jobs in Veeam, automation via powershell is the only possible solution.
Category: Tech
Everything tech: deepdive on the most important technologies, tips and tricks for everyday’s work, tutorial, step-by-step guides, videos and manuals.
Encrypt passwords in powershell scripts
In powershell, in order to use credentials to authenticate against different systems you have different options. When running scripts interactively, we can configure the powershell command to ask us for username and password, but saving passwords in clear text into a script is a bad security practice. Powershell however has a way to hide passwords in commands and scripts.
A free solution to test VVOLs in my lab, at last! (thanks to EMC)
During the just concluded VMworld 2015, EMC released a VSA named VVols Tech Preview to help people to test this technology in their labs. I was just waiting for the first vendor to offer the possibility to easily test VVOLs capabilities, so thanks to EMC for this. Time to deploy it in my lab!
Why a configuration option is in a registry key and not in the interface?
My job at Veeam is the first time in my IT career working in a software company, and I’ve learned a ton of things about software development. Not as a developer myself, since I don’t have any code writing skill (I wouldn’t call my low scripting capabilities “coding”), but partecipating to internal discussions about development has been so far an interesting experience. One of the most fascinating things I’ve learned is UX (User Experience) development, in particular around the User Interface.
Send email notifications to Slack
A nice and easy way to receive email notifications into Slack.
How Veeam Cloud Connect in-flight Encryption works
If you want to learn how Veeam Cloud Connect uses encryption to protect and secure communications over an unsecure channel like the Internet, this video I recorded is for you.
Deep Dive: Memory consumption of a Veeam repository
Veeam repositories, both Windows and Linux based, are running a software component responsible for receiving and storing data as they are processed by proxies. One of the most important parameter when sizing a repository is its expected memory consumption. Here are some informations for its proper configuration.
My adventures with Ceph Storage. Part 10: Upgrade the cluster
As any existing software, Ceph is subject to minor and major releases. My entire series of posts has been realized using version Giant (0.87), but by the time I completed the series, Hammer (0.94) was released. Note that Ceph, as other linux softwares, uses a major release naming scheme based on the letter of the alphabet, so Giant is the 7th major release. Ceph releases both minor and major versions of the software, so it’s important to know how to upgrade it.