Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

esxi kickstart script /w iscsi

Posted on 2016-10-04
3
Medium Priority
?
191 Views
Last Modified: 2016-10-28
So I need to enable iSCSI Software Adapter.

Then I need to set values for the iSCSI
It would be simpliar if the vmhbaxx was the same on all host, however it is not.

Is there a command that can scan and grep for the vmhba (example host one might be vmhba41 whereas host 2 is vmhba38

Then change some of the advance settings including to renaming the iqn to be
iqn.1998-01.com.vmware:%hostname%

So it renames the iqn to whatever the host name is?

enable iSCSI software adapter
esxcli iscsi software set --enabled=true

The advance settings for the iscsi that needs to be set on all host, and new builds are:
LoginTimeout and change the value to 60
uncheck the box for “Delayed ack”

Then chap username/password
and rename iqn
0
Comment
Question by:Indyrb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 124
ID: 41828663
edit esx.conf and change the configuration.

You will be able to change vmhbaxx and alter Advanced settings.
0
 
LVL 5

Author Comment

by:Indyrb
ID: 41832256
So if you create a ks.cfg called upon during deployment, do you also edit esx.conf or can you do that via install and ks,cfg?  if via ks.cfg what are the commands to complete both renaming the detected iSCSI vmhba and setting the iqn based upon hostname once entered when configurating the MGMT port and hostname
0
 
LVL 124

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 41832437
you can create scripts, to alter the esx.conf.

there are no commands, you would use scripts to copy the configuration you require to build up the configuration file.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A recent project that involved parsing Tableau Desktop and Server log files to extract reusable user queries for use in other systems. I chose to use PowerShell to gather the data, and SharePoint to present it...
August and September have been big months for VMware—from VMworld last month to our new Course of the Month in VMware Professional - Data Center Virtualization. We reached out to Andrew Hancock, resident VMware vExpert, to have a more in-depth discu…
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question