Nutanix Cluster Re-IP

Warning: This step affects the operation of a Nutanix cluster – Schedule a down time before performing

1. Log on to the hypervisor with SSH (vSphere or AHV) or remote desktop connection (Hyper-V), or theIPMI remote console

2. Log on to the any Controller VM
→ vSphere or AHV root@host# ssh nutanix@
→ Hyper-V > ssh nutanix@

3. Change CVM IP
Stop the Nutanix cluster
→ nutanix@cvm$ cluster stop
→ nutanix@cvm$ cluster reconfig
→ nutanix@cvm$ external_ip_reconfg
Follow the prompts to type the new netmask, gateway, and external IP addresses

4. Shutdown each Controller VM in the cluster
→ nutanix@cvm$ cvm_shutdown -P now

5. Change hypervisor IP

6. Change IPMI IP

7. Reboot Hypervisor

8. Log on to the any Controller VM
→ nutanix@cvm$ cluster start

Configure AHV 1GBe Network Links

If you want to configure 1 GbE connectivity for guest VMs, you can aggregate the 1 GbE interfaces (eth0 and eth1) to a bond on a separate OVS bridge, create a VLAN network on the bridge, and then assign guest VM interfaces to the network.

To configure 1 GbE connectivity for guest VMs, do the following:

  1. Log on to the AHV host with SSH.
  2. Log on to the Controller VM.
    root@host# ssh nutanix@

    Accept the host authenticity warning if prompted, and enter the Controller VM nutanix password.

  3. Determine the uplinks configured on the host.
    nutanix@cvm$ allssh manage_ovs show_uplinks

    Output similar to the following is displayed:

    Executing manage_ovs show_uplinks on the cluster
    ================== =================
    Bridge br0:
      Uplink ports: br0-up
      Uplink ifaces: eth3 eth2 eth1 eth0
    ================== =================
    Bridge br0:
      Uplink ports: br0-up
      Uplink ifaces: eth3 eth2 eth1 eth0
    ================== =================
    Bridge br0:
      Uplink ports: br0-up
      Uplink ifaces: eth3 eth2 eth1 eth0
  4. If the 1 GbE interfaces are in a bond with the 10 GbE interfaces, as shown in the sample output in the previous step, dissociate the 1 GbE interfaces from the bond. Assume that the bridge name and bond name are br0 and br0-up, respectively.
    nutanix@cvm$ allssh 'manage_ovs --bridge_name br0 --interfaces 10g --bond_name br0-up update_uplinks'

    The command removes the bond and then re-creates the bond with only the 10 GbE interfaces.

  5. Create a separate OVS bridge for 1 GbE connectivity. For example, create an OVS bridge called br1 (bridge names must not exceed 10 characters.).
    nutanix@cvm$ allssh 'ssh root@ /usr/bin/ovs-vsctl add-br br1'
  6. Aggregate the 1 GbE interfaces to a separate bond on the new bridge. For example, aggregate them to a bond named br1-up.
    nutanix@cvm$ allssh 'manage_ovs --bridge_name br1 --interfaces 1g --bond_name br1-up update_uplinks'
  7. Log on to any Controller VM in the cluster, create a network on a separate VLAN for the guest VMs, and associate the new bridge with the network. For example, create a network named vlan10.br1 on VLAN 10.
    nutanix@cvm$ acli net.create vlan10.br1 vlan=10 vswitch_name=br1
  8. To enable guest VMs to use the 1 GbE interfaces, log on to the web console and assign interfaces on the guest VMs to the network.For information about assigning guest VM interfaces to a network, see “Creating a VM” in the Prism Web Console Guide.

Raspberry Pi Setup, Tips, Hints and Tweaks

Grab a fresh copy of Raspbian Jessie Image and write it to SD Card (A non graphical UI installation is fine)

Step 1: Basic Setup/Tweaks

  • sudo raspi-config
  • Option 8: Update the config tool
  • Option 2: Hostname: set as required
  • Option 1: Change User Password
  • Option 4/I2: Change Timezone: set to appropriate timezone
  • Option 7/A1: expand Filesystem
  • Option 7/A3: Memory Split: Set to 16M since we don’t need a graphical environment
  • reboot on exit or ent  “sudo reboot” at the cli

Step 2: Base Updates

  • sudo apt-get update
  • sudo apt-get upgrade
  • sudo reboot

Step 3: Update Pi firmware

  • sudo apt-get install rpi-update
  • sudo rpi-update

Step 4:

XenMobile APNS certificate creation


• Login credentials to Apple Push Certificates Portal
• Netscaler and XMS Login Details

Creating Certificate Request on Netscaler

  1. Create RSA Key on the right side as shown below
  2. Enter the Key File name and Key Size as 2048 bits, the PEM Passphrase with other details  as shown below and Click on Create. Make sure you remember this passphrase as we are going to use it while creating .pfx file for the APNS certificate
  3. Under Traffic Management -> SSL and Click on Create Certificate Request on the Right Side as shown below.
  4. Enter the Request File Name and for Key File Name, click on Browse
  5. Select the Key File we created in Step 2 above
  6. Enter the Details required for the CSR as shown below. Here common name is the name for which you will be obtaining the APNS certificate for
  7. Click on Create to create the CSR file
  8. Under Traffic Management-> SSL, Click on Manage Certificates/Keys/CSRs under Tools as shown below
  9. Select the CSR you created and click on Download to save it in a local folder on your computer

To submit the CSR to Citrix for signing

  1. Login to the XMS Server and Click on the Support Icon as shown below
  2. Click on APNs Signing Utility
  3. You will be redirected to Click on APNS Certificate Signing Request.
  4. Click on Upload the CSR
  5. Browse for the CSR file we downloaded in Step 9 of the creating CSR section above
  6. Click on Sign
  7. You will see a message saying successfully signed.
  8. A file (with .plist extension) gets downloaded automatically as shown below.

To submit the signed CSR to Apple to obtain the APNS certificate

  1. Click on Apple Push Certificates Portal link as shown below
  2. Sign in to the Portal
  3. Click on Create Certificate
  4. Accept the Terms of Use
  5. Click on Choose File
  6. Select the .plist file we downloaded in step 7 of the Submit the CSR to Citrix for Signing section above
  7. Click on Upload
  8. Download the APNS Certificate which is in .PEM format
  9. Login to Netscaler
  10. Under Traffic Management -> SSL and Click on Manage Certificates/Keys/CSRs on the Right Side
  11. Click on Upload
  12. Select the APNS Certificate PEM file we downloaded in step 8 and click on Open
  13. Click on Close

To create a .pfx APNS certificate by using OpenSSL

  1. Login to the Netscaler Command Line as user nsroot and type shell to get into the shell
  2. Enter the command as shown below

Here is the format:
openssl pkcs12 –export –out /nsconfig/ssl/<APNS file name with .pfx extension> -inkey /nsconfig/ssl/<APNS Key File> -in /nsconfig/ssl/<APNS PEM Certificate uploaded earlier>

Here the Private key and the PEM files are located in /nsconfig/ssl directory. The output file with the .pfx extension will also be located in the same directory.

3. Enter the Passphrase for the Private Key we created for APNS in the creating Certificate Request on Netscaler section.

4. Enter the PFX export password.

5. Re-enter the Export Password. Make sure you remember this password as we are going to use this in our next section while importing the APNS certificate into XMS Server.

6. Under Traffic Management -> SSL and Click on Manage Certificates/Keys/CSRs on the Right Side.

7. Select the PFX file and click Download

Importing the APNS certificate into XMS Server.

1. Login to the XMS Server and Click on Settings under Configure.

2. Click on Certificates

3. Click on Import

4. Select the APNs for the Use as Field, Select KeyStore for Import Field and Keystore Type as PKCS#12

5. Click on Browse to browse for the APNS pfx file we downloaded in Step 7 of the create .pfx APNS certificate section.

6. Select the file

7. Enter the PFX password

8. Click on Import

9. Click OK

10. We can see the APNS certificate which is imported as shown below.