LIkely your organization updated it's DC's and since your 7-mode box doesn't have the appropriate patch you are broken You need to go to 8.2.5P5. Make sure you read the fixes from P5.
... View more
Scott, Very well written blog. However, not scalable to large enterprises. This works good if you are looking for something quick. The correct answer in my opinion would be fpolicy
... View more
That is not an enterprise solution what you are doing. You should be looking at third policy fpolicy tools The way you are talking is you would need to re-acl the ntfs permissions with auditing and that's not scalable.
... View more
First you are on hardware that is EOL, and second your OS is about 10 years old.
IT's time to upgrade and get off this system, you shouldn't be running this
... View more
Check the man pages.. Here is the full information
C:\PS>$password = ConvertTo-SecureString "p@ssword" -AsPlainText -Force $cred = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList "admin",$password Connect-NcController 10.61.172.155 -Credential $cred
Connect to controller '10.61.172.155' using HTTP/HTTPS but suppress the credential prompt by creating a PSCredential object programmatically.
... View more
@DaveFord wrote:
Some registry changes need to be made on the DCs to enable this eventid otherwise you just get a daily summary message. Once the logging level is increased for LDAP you can get 2889 errors containing the IPs of each attempted connection. We're seeing occasional insecure LDAP connections on our test SVM - even after applying the recommended settings. We can disasble them entirely by fiddling with some of the other cifs security options - but we'd like proper advice on what's appropriate to change
Quick Question, where did you see that RFE
... View more
You need to start off updating your cmdlets, there is a much later version out.
Once that is done, please paste the command you are running
... View more
It would be easier if you plugged newer hardware into the switch, assuming it's not a switchless cluster and do vol moves, but if that's not the case, then svm-dr is the easiest thing for you
... View more
I'm being told there is a fast track RFE on this. I would suggest your company enable the gpo from MS that bypass enforcement of this setting after the patch come out until all vendors are inline with this setting
... View more
Unless you need to pipe it to another script, you can easily add | epcsv c:\temp\sisvols.csv -notypeinformation and then open it and filter or just print out like you did with where-object
LIke this
PS H:\powershell> get-ncvol | Select Name,@{n='sisstatus';e={if (($_.volumesisattributes).issisvolume) {"enabled"} else {"disabled"}}} | ? {$_.sisstatus -eq "enabled"}
... View more
I'm just using a if statement on the boolean to create a more user friendly approach.
And i'm using Select statements to create a customized object
... View more
There are many ways to skin this cat.
Here is the easiest which will print out each volume and you can sort from there
get-ncvol | Select Name,@{n='sisstatus';e={if (($_.volumesisattributes).issisvolume) {"enabled"} else {"disabled"}}} | ft -auto
... View more
Sorry @paul_stejskal - That's a terrible answer
All the answers above are terrible in my mind. You take away the core functionality of snapmirror which there is no better migration tool out there to move data. Bad move on Netapp's part
Netapp 7-mode is still supported, so by taking away TDP, this was a very bad move. Just sayin'
... View more
This is interesting because A320 doesn't technically support 9.5 or lower, which I find kind of crazy.
I would normally say downgrade to 9.5 and TDP over.
... View more
What are you migrating from?
Once you migrate off one worm platform to another you will most likely use client side tools. (rsync,robocopy)
Im curious how you are going to keep the worm data attributes..
... View more