Storage Spaces Direct Series Part 1 – What is S2D?

Hey everyone,

today my first blog about gast blog on Altaros Hyper-V Blog was published. It’s the first blog in my storage spaces direct series and should give you a first introduction into S2D.

Please checkout the blog and leave me some feedback in the comments. 🙂

Storage Spaces Direct Series Part 1 – What is S2D?

 

Altaro Webcast with @vBenArmstrong – Hyper-V Deep Dive 24th of april

Hey everyone,

I want to send you a heads up. Ben Armstrong is speaking during an Altaro Webinar at the 24th of April.
If ever wanted to speak with Ben directly and wanted to ask him all about Hyper-V, now is your chance. 🙂 Take it!

You can register for the webcast here.

 

 

Azure Stack PoC deployment stops at step 60.140.149 on HP Server

Hi everyone,

maybe you encounter the following issue already.

When deploying the Azure Stack PoC RTM on a HPE Server, the deployment stop without any error or something at step 60.140.149.

After one week troubleshooting together with the customer and no solution, my dear coworker Alexander Ortha gave me an hint what the issue could be.

He previously hab the same issue with an HPE and he needed to update the Firmware and BIOS of the system. Afterwards the installation went through smoothly.

So I tried and he was right. So just try it yourself and update the firmware of your systems to lastest version.

Cheers,

Flo

Azure Stack RTM PoC Deployment stops @ Step 60.120.121 – deploy identity provider

Hello Community,

some of you maybe encountered following issue during the deployment of the Azure Stack RTM PoC.

Lets look on the field configuration:

  1. One server HP DL360 G8
  2. NIC Type 1GBE Intel i360 (HP OEM Label)
  3. Two Public IPv4 Adresses published directly to the host and host configured as exposed host in the border gateway firewalls
  4. No Firewall Rules for that host on the gateways
  5. Switchports for that host configured as Trunk/Uplink ports with VLAN tagging enabled
  6. We use Azure AD for Authentication

In my case, the important point is the port trunk and the VLAN tagging.

Normally VLAN tagging is no issue because the deployment toolkit should set the tag automatically during deployment for all VMs required and the host system.

In my case and during many test and validation deployments, that didn’t happen. After I start the deployment, a new virtual switch will be deployed and a virtual NIC named “deployment” will be configured for the host. Afterwards the deployment starts. Around 3 hours later, the deployment stops in step 60.120.121 and could not connect to the identity provider.

Whats the reason for the failure?

First you should know, that the Azure Stack Deployment switches between host and BGPNAT VM for internet communication. Mostly all traffic runs through the NAT VM but in that case, the host communicates directly with the internet.

So what happend? After creating the “deployment” NIC for the host, the deployment tool didn’t set the VLAN Tag on that virtual NIC. That breaks the network communication for the host, for the VMs there isn’t any issue because the VLAN is set for the NAT VM correctly.

What is the Workaround?

  1. Start the deployment and configure it like normal
  2. Let the deployment run into the failure
  3. Open a new PowerShell with admin permissions (Run as Administrator)
  4. Type in following Command:
  5. Rerun the deployment with

    From the installation folder.

Afterwards the deployment runs smoothly.

 

Please be aware, after the installation, the VLAN ID is removed again. So you need to set it one more time. 

Once MVP, always part of the MVP community! – Awarded with MVP Reconnect

Many things happen short after another. After I needed to lay down the MVP title on the 1st of July, something awesome happened last night.

Short before midnight, I got a mail from the MVP Reconnect program which invited to join the group of reconnected MVP 🙂

I’m extremely happy about and very thankful 🙂 I really loved to be part of the MVP Community and that’s the chance to be part again, even as a Microsoft employee.