Posts Tagged ‘sysadmin’

HOW TO: Synchronize Changes in a Linux P2V with VMware vCenter Converter Standalone 9.0 (Part 101)

Thursday, November 27th, 2025

If you’ve ever attempted a P2V migration using VMware vCenter Converter Standalone 9.0, you’ll know that the product can be as unpredictable as a British summer. One minute everything looks fine, the next minute you’re stuck at 91%, the Helper VM has thrown a wobbly, and the Estimated Time Remaining has declared itself fictional.

And yet… when it works, it really works.

This post is the follow-up to Part 100: HOW TO: P2V a Linux Ubuntu PC, where I walked through the seed conversion. In Part 101, I push things further and demonstrate how to synchronize changes — a feature newly introduced for Linux sources in Converter 9.0.

I won’t sugar-coat it: recording this episode took over 60 hours, spread across five days, with 22 hours of raw footage just to create a 32-minute usable video. Multiple conversion attempts failed, sequences broke, the change tracker stalled, and several recordings had to be completely redone. But I was determined to prove that the feature does work — and with enough perseverance, patience, and the power of video editing, the final demonstration shows a successful, validated P2V Sync Changes workflow.


Why Sync Changes Matters

Traditionally, a P2V conversion requires a maintenance window or downtime. After the initial seed conversion, any new data written to the source must be copied over manually, or the source must be frozen until cutover.

Converter 9.0 introduces a long-requested feature for Linux environments:

Synchronize Changes

This allows you to:

  • Perform an initial seed P2V conversion

  • Keep the source machine running

  • Replicate only the delta changes

  • Validate the final migration before cutover

It’s not quite Continuous Replication, but it’s closer than we’ve ever had from VMware’s free tooling.


Behind the Scenes: The Reality of Converter 9.0

Converter 9.0 is still fairly new, and “quirky” is an understatement.

Some observations from extensive hands-on testing:

  • The Helper VM can misbehave, especially around networking

  • At 91%, the Linux change tracker often stalls

  • The job status can report errors even though the sync completes

  • Estimated Time Remaining is not to be trusted

  • Each sync job creates a snapshot on the destination VM

  • Converter uses rsync under the hood for Linux sync

Despite all this, syncing does work — it’s just not a single-click process.


Step-by-Step Overview

Here’s the condensed version of the procedure shown in the video:

  1. Start a seed conversion (see Part 100).

  2. Once complete, use SSH on the source to prepare a 10GB test file for replication testing.

  3. Run an MD5 checksum on the source file.

  4. Select Synchronize Changes in Converter.

  5. Let the sync job run — and don’t panic at the 91% pause.

  6. Review any warnings or errors.

  7. Perform a final synchronization before cutover.

  8. Power off the source, power on the destination VM.

  9. Verify the replicated file using MD5 checksum on the destination.

  10. Celebrate when the checksums match — Q.E.D!


Proof of Success

In the final verification during filming:

  • A 10GB file was replicated

  • Both source and destination MD5 checksums matched

  • The Linux VM booted cleanly

  • Snapshot consolidation completed properly

Despite five days of interruptions, failed jobs, and recording challenges, the outcome was a successful, consistent P2V migration using Sync Changes.


Watch the Full Video (Part 101)

If you want to see the whole process — the setup, the problems, the explanations, the rsync behaviour, and the final success — the full video is now live on my YouTube channel:

Part 101: HOW TO: Synchronize Changes using VMware vCenter Converter Standalone 9.0

If you missed the previous part, you can catch up here:
Part 100: HOW TO: P2V a Linux Ubuntu PC Using VMware vCenter Converter Standalone 9.0


Final Thoughts

This video was one of the most challenging pieces of content I’ve created. But the end result is something I’m genuinely proud of — a real-world demonstration of a feature that many administrators will rely on during migrations, especially in environments where downtime is limited.

Converter 9.0 may still have rough edges, but with patience, persistence, and a bit of luck, it delivers.

Thanks for reading — and as always, thank you for supporting Andysworld!
Don’t forget to like, share, or comment if you found this useful.

Part 4: DIY UnRAID NAS – Insert new 10GBe NIC

Saturday, November 22nd, 2025

 

 

DIY UnRAID NAS Build – Part 4: Installing a 10GBe Intel X710-DA NIC (Plus an Outtake!)

Welcome back to another instalment of my DIY UnRAID NAS Build series.
If you have been following along, you will know this project is built around an Intel NUC chassis that I have been carefully (and repeatedly!) taking apart to transform into a compact but powerful UnRAID server.

In Part 4, we move on to a major upgrade: installing a 10GBe Intel X710-DA network interface card. And yes, the eagle-eyed among you will notice something unusual at the beginning of the video, because this episode starts with a blooper. I left it in for your entertainment.


A Fun Outtake to Start With

Right from the intro, things get a little chaotic. There is also a mysterious soundtrack playing, and I still do not know where it came from.
If you can identify it, feel free to drop a comment on the video.


Tearing Down the Intel NUC Again

To install the X710-DA NIC, the NUC requires almost complete disassembly:

  • Remove the back plate
  • Remove the backplane retainer
  • Take off the side panels
  • Open the case
  • Remove the blanking plate
  • Prepare the internal slot area

This NUC has become surprisingly modular after taking it apart so many times, but it still puts up a fight occasionally.


Installing the Intel X710-DA 10GBe NIC

Once the case is stripped down, the NIC finally slides into place. It is a tight fit, but the X710-DA is a superb card for a NAS build:

  • Dual SFP+ ports
  • Excellent driver support
  • Great performance in VMware, Linux, and Windows
  • Ideal for high-speed file transfers and VM workloads

If you are building a NAS that needs to move data quickly between systems, this NIC is a great option.


Reassembly

Next, everything goes back together:

  • Side panels reinstalled
  • Back plate fitted
  • Case secured
  • System ready for testing

You would think after doing this several times I would be quicker at it, but the NUC still has a few surprises waiting.


Booting into Windows 11 and Driver Issues

Once everything is reassembled, the NUC boots into Windows 11, and immediately there is a warning:

Intel X710-DA: Not Present

Device Manager confirms it. Windows detects that something is installed, but it does not know what it is.

Time to visit the Intel website, download the correct driver bundle, extract it, and install the drivers manually.

After a reboot, success. The NIC appears correctly and is fully functional.


Why 10GBe

For UnRAID, 10GBe significantly improves:

  • VM migrations
  • iSCSI and NFS performance
  • File transfers
  • Backup times
  • SMB throughput for Windows and macOS clients

It also future-proofs the NAS for any future network upgrades.


The Mystery Soundtrack

Towards the end of the video I ask again: what is the music playing in the background?
I genuinely have no idea, so if you recognise it, please leave a comment on the video.


Watch the Episode

You can watch the full episode, including all teardown steps, NIC installation, Windows troubleshooting, and the blooper, here:


Thank You for Watching and Reading

Thank you for following along with this NAS build.
Part 5 will continue the series, so stay tuned.

If you have built your own UnRAID NAS or have a favourite NIC for homelab projects, feel free to comment and share your experience.

Regards,
Andy

What’s Occurin’ on Andysworld!

Friday, June 6th, 2025

Hey everyone — welcome back to Andysworld!, where there’s always something bubbling in the pot (usually tech-flavoured, sometimes coffee, sometimes bees).

500 Hacks a Day — Mission Accomplished!

After a consistent streak of daily pwnage, I’ve finally hit 500 hacks a day on TryHackMe! It’s been an epic ride, sharpening my skills and staying sharp in the ever-evolving world of cybersecurity. But… that’s it for now. As much as I’ve loved the challenge, life’s too hectic to keep up the daily grind — and honestly, it’s time to re-balance.

Still, 500-a-day? I’ll take that win ?

Hancock’s VMware Half Hour – Rolling On

If you’ve not tuned into Hancock’s VMware Half Hour yet, what are you doing? ? The YouTube channel is keeping me plenty busy — but it’s worth every minute. From real-world scenarios to community spotlights and the latest from the VMwareverse, it’s been great to share stories, learn, and laugh with fellow techies around the world.

Catch the next episode if you haven’t already — things are just heating up.

vExpert PRO – 5 Years Strong!

Big news landed this month — I’m proud (and humbled) to announce that I’ve been recognised as a VMware vExpert PRO for the fifth year running. Not only that, but I’ve also picked up the vExpert VCF badge, too!

This recognition means a lot — it’s not just about titles; it’s about community, contribution, and passion. The vExpert family has been a huge part of my journey, and it’s an honour to continue helping others grow and succeed in the ecosystem.

and that’s not forget the Bees !

Beekeeping at Meltonby Honey

Bees are a mixed bag this is to say, some are doing really well, and some are not doing so well, so this month of June, in the June Gap – need to start sorting out and selecting hives to work this Summer, and dare I say it starting Winter preparations, and a week today attend a Bee Health Day, sponsored by DEFRA !


That’s it for now — life’s buzzing, tech is flying, and the blog never sleeps (even if I do). Thanks to everyone who’s been along for the ride so far.

Until next time — stay curious, stay hacking, and don’t forget to say “What’s Occurin’?” ?

Andy

Hacking for Fun (and Learning) on TryHackMe

Friday, June 6th, 2025

 

If you’ve been following me for a while — either here on Andysworld! or on social — you’ll probably have noticed I’ve got a bit of a thing for TryHackMe. That’s right: the gamified, hands-on cybersecurity platform that lets you “learn hacking the fun way.”

While I’ve worn many hats over the years — from building corporate desktops in the 90s to deploying Thin Clients, backing VMware before it was cool, and even keeping bees in my spare time — I’ve always had a quiet curiosity for cybersecurity.

But in recent years, that curiosity has turned into something more structured. I’ve been diving head-first into daily challenges, CTFs, and red team/blue team rooms on TryHackMe. Every day I log in and test my “hacking” and “penetration” skills. (Legally, of course. Let’s not get too excited.)

Why TryHackMe?

Simple: it’s accessible, addictive, and just plain fun. The platform breaks down complicated security concepts into digestible learning paths and real-world scenarios. Whether you’re into Linux fundamentals, web app hacking, or breaking into Windows environments, there’s something for everyone — and something new to learn every day.

I started with a few easy rooms — some were fun, some had me questioning my life choices — but before long I found myself chasing streaks, solving buffer overflows, exploiting SQL injections, and pivoting through internal networks like it was second nature. It’s part puzzle, part education, and part thrill.

That Daily Streak… and the Climb

I’ll admit it: I got hooked on the daily streak. There’s something about seeing that little flame icon next to your

name that sparks a sense of achievement. Each day I carve out time to complete at least one room, even if it’s a short task or a simple walkthrough. And in doing so, I’ve kept my streak alive and sharpened my skills without ever feeling like it’s a chore.

And here’s the kicker — recently, after being ranked #1,060 out of over 3 million TryHackMe users, I finally cracked the four-digit barrier and rose to #998!
Top 1,000 in the world. Not bad for a “beekeeper with a hacking habit,” eh?

Oh — and right now, I’m sitting on a 461-day hacking streak.
That’s right. 461 consecutive days of training, solving, cracking, and learning.
I’m not far off the 500-day HackStreak badge, and believe me — I will get there. It’s part stubbornness, part obsession, but mostly just a whole lot of fun.

What’s Next?

Honestly, I’d love to get into some deeper reverse engineering, exploit development, and maybe even take on some of the harder red team labs. And who knows — maybe I’ll finally take a proper cert (OffSec, I’m looking at you) just to prove to myself I can.

TryHackMe has rekindled my passion for hands-on learning, just like Experts Exchange did in the early days. It’s reminded me that whether you’re troubleshooting snapshots, spinning up ESXi hosts, or brute-forcing a login page, there’s always more to learn.


Whether you’re an old-school sysadmin like me, a student just starting out, or someone who’s just curious about hacking without getting arrested — I highly recommend giving TryHackMe a spin.

And if you’re already in the game — drop me a message. I’ll see you on the leaderboard ?


Want me to whip up a graphic showing your current rank and streak progress? I can give it that polished blog badge feel.