As of the last post I have now moved this blog and a couple of others to a free EC2 instance. As long as I don’t get hammered, the performance should be perfectly adequate. So far, the experience has been quite good. There are some peculiarities with using AWS that you have to get used to, but otherwise, it’s pretty nice. Maybe more about this later.
I made another attempt at using VT-d for my cameras by going with Zoneminder under Linux. This actually worked and seemed to work ok but I really dislike Zoneminder! I tried Motion and kMotion instead and the good news is it works…for longer. I’m still having problems with kernel crashes after a day or two. It’s encouraging but I’m not sure I want to fuss with it anymore. Maybe I’ll try Zoneminder one more time just in case the kernel wants to behave.
Actually, it works but with limitations. No shock there. It turns out the PV-149 CCTV capture card I’m trying to pass through presents each channel as a separate Video and Audio device. What that means is I end up with 8 PCI devices that need to be extended. I’m running into a problem that might be specific to VMWare or VT-d where I can’t passthrough more than 6 PCI devices. This isn’t too big a deal as I don’t use the audio channels but I’m worried now that the missing audio is causing some BSOD’s. I’m still investigating.
Otherwise, vSphere is running pretty nice.
Everything’s working great so far with a few exceptions I can live with. I have 5 VM’s running, mostly lightweight stuff, including my security camera system. For that I’m using Win XP and feeding the PV-149 CCTV capture card through via VT-d. Video streaming from BlueIris is working just fine and I also have PIAF running all of the phones, PFSense as a server on a stick running DHCP and DNS forwarding and the VMWare mobile appliance so I can watch it on my iPad.
I’ve started to install SageTV but it’s not done yet. So far everything’s got plenty of pep. No quality problems with PIAF so far either.
Speaking of PIAF, the years old post about SIP trunking between Asterisk and a Cisco 1760 that has gotten so much attention, yeah, that’s old school now! I just converted to a Linksys SPA3102 for my PSTN connectivity and it’s working perfectly. I think it might forward calls through a little more quickly too. The 1760 developed a bad fan and I couldn’t see spending money on it. I’ll probably try to ebay it.
Finally, I’m thinking about passing through the USB bus for SageTV to take advantage of the improved throughput but I believe I’ll need to be careful not to allocate the same bus that has the keyboard (KVM) on it. More later…
I’ve just started my quest to get this working. It’s been difficult finding examples of success from others but I finally found a reference to a specific motherboard and CPU combo that has worked for others.
I’m using an Intel DQ67SWB3 motherboard with an i5-2400 CPU. Of course I had to get a separate Intel NIC since the onboard isn’t supported.
My plan is to use this for a number of servers including my CCTV security camera system. This is using a PV-149 PCI video capture card which would have to be passed through via VT-d for the VM Guest to see it. I’ve successfully installed ESXi 4.1 update 1 via a USB key and I’m in the process of adding some VM’s. A couple of issues have come up. First, I don’t have performance stats updating in vSphere client. I’m not sure if this is a driver issue with the “unsupported” motherboard or if it’s a problem with the ESXi install. I can see the overall utilization on the summary pages though so it’s not like I’m blind. Also, I’m able to add devices via VT-d but it’s not clear to me yet if I can pass-through multiple devices to a single Guest.
I’m installing XP in a Guest right now and as soon as that’s done patching (lot’s of patches) I’ll be working on getting that capture card visible.
I also plan on running PIAF (Asterisk) and SageTV in other VMs. I’m probably going to need a really basic DNS server as well. At some point I might try passing through the onboard NIC to a firewall VM, perhaps PFSense or Untangle. Not sure about that yet.
It’s taken me a while but I finally have another review to provide. I was due for my CCNP recert so I decided to go for the Switching test, 642-813. I started with this book:
My focus was on the switching section so this review really only addresses that part. I’ve been taking Cisco tests for a while so the process was familiar to me. I also had a good foundation in switching technologies. The book does a good job of breaking down the separate areas that the test focuses on. You couldn’t use this book to study for the CCNP if you’re coming right from the CCNA. It’s strictly a refresher level of knowledge. What I found was that there were several parts of the test that were more obscure but were referenced in the book. It wasn’t verbatim of course, but it was familiar enough to help me pass.
Another thing I found relevant is that the distilled information in this book is good for reminding me of the little things that can be done to tweak a network. I think most of us are content to worry about HSRP priorities and STP roots. We don’t so much focus on the other loop prevention tools that Cisco’s made available. Thanks to the short and direct content in this book, you can quickly get a sense for the other technologies at your disposal.
And I passed. Highly recommended!
It’s now a month or so after the release of iOS4 and the Cisco Anyconnect Secure Mobile Client for iPhone is nowhere to be found. What’s up Cisco??? I want my Anyconnect!
And anyone believes they’ll actually ship the Cius? HA!