SMF - Just Installed!
sudo apt update
sudo apt install curl software-properties-common ca-certificates apt-transport-https -y
wget -O- https://download.docker.com/linux/ubuntu/gpg | gpg --dearmor | sudo tee /etc/apt/keyrings/docker.gpg > /dev/null
echo "deb [arch=amd64 signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/ubuntu jammy stable"| sudo tee /etc/apt/sources.list.d/docker.list > /dev/null
sudo apt update
apt-cache policy docker-ce
sudo apt install docker-ce -y
sudo systemctl status docker
sudo apt-get install docker-compose
sudo curl -L "https://github.com/docker/compose/releases/download/v2.38.2/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
sudo chmod +x /usr/local/bin/docker-compose
curl -sOL https://vdc-download.vmware.com/vmwb-repository/dcr-public/2ee5a010-babf-450b-ab53-fb2fa4de79af/2a136212-2f83-4f5d-a419-232f34dc08cf/VMware-ovftool-4.4.3-18663434-lin.x86_64.zip
unzip VMware-ovftool-*.zip
mv ovftool /opt/
/opt/ovftool/ovftool vi://<user>:<password>@<vm_host>/<vm_folder>/<vm_name> <path/to/export>
/opt/ovftool/ovftool vi://root@esxi1.cloud-life.site /win11 ./
ЦитироватьУ команды ovftool есть много полезных опций. Наиболее полезны noSSLVerify и powerOffSource:
/opt/ovftool/ovftool --noSSLVerify --powerOffSource vi://root@esxi1.cloud-life.site/win11 ./
* noSSLVerify — не выполняет проверку сертификата. Удобно, если у нас самоподписанный сертификат на хосте vmware. powerOffSource — автоматически выключит виртуальную машину, если она включена (включенную машину нельзя экспортировать).
qm importovf <VMID> ./<vm_name>/<vm_name>.ovf <pve_storage>
qm importovf 333 ./win11/win11.ovf ssd1
/usr/bin/vmware-uninstall-tools.pl
systemctl disable vmtoolsd --now
apt purge open-vm-tools
yum erase open-vm-tools
apt update
apt install qemu-guest-agent
yum install qemu-guest-agent
systemctl enable qemu-guest-agent --now
qm template 333
vi /etc/pve/qemu-server/<VMID>.conf
sed -i 's/scsi0/sata0/' /etc/pve/qemu-server/333.conf
esxcli network ip interface ipv4 set -i vmk1 -t static -g 10.10.10.1 -I 10.10.10.5 -N 255.255.255.0
Set-VpnConnection -Name "My VPN Connection" -MachineCertificateIssuerFilter 'C:\mycerts\cert_export_MikrotikIKEv2-CA.crt'
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters" /v DisableIKENameEkuCheck /t REG_DWORD /d 1
ip http server
ip http authentication local
no ip http server
no ip http secure-server
username NAME privilege 15 secret PASSWORD
exit
show access-list
show ip access-lists
configure terminal
access-list 10 permit 192.168.1.22
access-list 10 permit 192.168.3.10
ip http access-class 10
no ip http access-class 10
ip admission max-login-attempts 5
show ip admission configuration
exit
write
vmware -v
esxcli software vib list | grep 'Install\|esx-base'
esxcli software profile get
esxcli network firewall ruleset set -e true -r httpClient
esxcli software sources profile list --depot=https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml
esxcli system maintenanceMode set --enable=true
esxcli software profile update -p ESXi-8.0U2b-23305546-standard -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml
esxcli network firewall ruleset set -e false -r httpClient
Reboot
esxcli system maintenanceMode set --enable=false
esxcli software profile get
shell
service-control --stop vmware-updatemgr
/usr/lib/vmware-updatemgr/bin/updatemgr-util reset-db
python /usr/lib/vmware-updatemgr/bin/updatemgr-utility.py reset-db
rm -rf /storage/updatemgr/patch-store/*
service-control --start vmware-updatemgr
software-packages stage --iso --acceptEulas
software-packages list --staged
software-packages install --staged