explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Aurora DSQL launches new connectors that simplify building .NET and Rust applications

31 March 2026 @ 5:34 pm

Today we are announcing the release of Aurora DSQL connectors for .NET (Npgsql) and Rust (SQLx) that make it easy to build .NET and Rust applications on Aurora DSQL. The connectors streamline authentication and eliminate security risks associated with traditional user-generated passwords by automatically generating tokens for each connection, ensuring valid tokens are always used while maintaining full compatibility with existing Npgsql and SQLx features. The connectors handle IAM token generation, SSL configuration, and connection pooling, enabling customers to scale from simple scripts to production workloads without changing their authentication approach. They also provide opt-in optimistic concurrency control (OCC) retry with exponential backoff, custom IAM credential providers, and AWS profile support, making it easier to develop client retry logic and manage AWS credentials. To get started, visit the

AWS Service Availability Updates

31 March 2026 @ 5:00 pm

We’re announcing availability changes to the following AWS services and features. Services moving to Maintenance Services moving to maintenance will no longer be accessible to new customers starting April 30, 2026. Customers already using these services and features can continue to do so. AWS will continue to operate and support these services and features. We recommend that customers learn about the changes in the product pages and documentation. Amazon Application Recovery Controller (ARC) - Readiness Check Feature Amazon Comprehend - Topic Modeling, Event Detection, and Prompt Safety Classification Features

Amazon ECS Managed Instances now supports Amazon EC2 instance store

31 March 2026 @ 4:30 pm

Amazon ECS Managed Instances now supports Amazon EC2 instance store volumes as a data volume option for container workloads. You can now leverage instance store volumes on your ECS container instances instead of provisioning an Amazon EBS data volume, reducing storage costs and accelerating I/O performance for latency-sensitive workloads. Amazon ECS Managed Instances is a fully managed compute option designed to eliminate infrastructure management overhead, dynamically scale EC2 instances to match your workload requirements, and continuously optimize task placement to reduce infrastructure costs. With today’s launch, you can enable local storage by configuring a custom ECS Managed Instances capacity provider and selecting the desired Amazon EC2 instance types that include instance store volumes. When an instance lacks instance

AWS DevOps Agent is now generally available

31 March 2026 @ 3:11 pm

Now generally available, AWS DevOps Agent is your always-available operations teammate that resolves and proactively prevents incidents, optimizes application reliability and performance, and handles on-demand SRE tasks across AWS, multicloud, and on-prem environments. Building on the preview launch, DevOps Agent now adds new use cases, broader integrations, enhanced intelligence, and enterprise-ready features, including the ability to investigate applications in Azure and on-prem environments, add custom agent skills to extend capabilities, and create custom charts and reports for deeper operational insights. DevOps Agent investigates incidents and identifies operational improvements as an experienced teammate would: by learning your applications and their relationships, working with your observability tools, runbooks, code repositories, and CI/CD pipelines, and correlating telemetry, code, and deployment data. It autonomously triages incidents and guides teams to rapid re

AWS Security Agent on-demand penetration testing is now generally available

31 March 2026 @ 2:00 pm

Today, AWS announced the general availability of AWS Security Agent for on-demand penetration testing in six AWS Regions. AWS Security Agent delivers autonomous penetration testing that operates 24/7 at a fraction of the cost than manual penetration tests. This milestone transforms penetration testing from a periodic bottleneck into an on-demand capability that scales with your development velocity across AWS, Azure, GCP, other cloud-providers, and on-premises. With multicloud support, AWS Security Agent allows you to consolidate penetration testing across your entire infrastructure.  Previewed at re:Invent 2025, AWS Security Agent represents a new class of frontier agents that are 

AWS Private CA now publishes utilization metrics to Amazon CloudWatch

31 March 2026 @ 1:00 pm

AWS Private Certificate Authority (AWS Private CA) now publishes certificate authority (CA) utilization metrics to Amazon CloudWatch, providing visibility into your CA usage. AWS Private CA enforces service quota limits on the number of certificates a CA can issue and the number of CAs you can create per Region. The new metrics track the number of certificates issued by each CA and the total number of CAs in each Region, enabling you to monitor usage against these quotas and proactively manage CA lifecycle to maintain high availability. With these metrics, you can configure CloudWatch alarms to prevent quota-related service disruptions. For example, you can set alarms to trigger automation that replaces a CA approaching its certificate issuance quota and transitions certificate issuance to a new CA. This is particularly important when using AWS services that rely on AWS Private CA certificates, such as Amazon EKS, Amazon ECS Service Connect, and Amazon WorkSpaces. T

Amazon CloudWatch Logs introduces lookup query command

31 March 2026 @ 10:00 am

Amazon CloudWatch Logs Insights now supports a new lookup command that enables customers to enrich log query results with data from reference tables. Developers, DevOps engineers, and SREs working with complex distributed systems often encounter logs containing opaque identifiers such as GUIDs, IP addresses, or internal resource IDs that are difficult to interpret without additional context. With the lookup command, you can join log data against a lookup table at query time, automatically enriching your results with meaningful values. For example, you can translate a customer ID into a customer name or map an internal IP address to the team that owns it. The new command makes log analysis faster and more intuitive without requiring pre-processing pipelines.  The lookup command is available today in all commercial AWS Regions.  To get started, upload a CSV file by navigating to CloudWat

AWS Transform custom introduces new AWS-managed transformations to modernize code at scale

31 March 2026 @ 8:00 am

AWS Transform custom now offers seven new AWS-managed transformations to help you modernize code at scale. These transformations address common modernization scenarios across multiple languages and frameworks. Generally available transformations includes comprehensive codebase analysis transformation, enabling you to generate hierarchical, cross-referenced documentation covering architecture, business logic, and technical debt, with actionable insights on outdated components and maintenance concerns. The Node.js version upgrade transformation is now generally available and includes comprehensive library upgrade support, enabling you to upgrade Node.js applications from any source version to any target version with full dependency modernization. Those transformations available in early access include Java performance optimization transformation helps you analyze Java Flight Recorder (JFR) profiling data to detect CPU and memory hotspots and anti- patterns, then appl

Announcing Amazon RDS for Oracle on AWS Outposts

31 March 2026 @ 8:00 am

Amazon Relational Database Service (Amazon RDS) for Oracle is now available on AWS Outposts. AWS Outposts is a fully managed service that extends AWS infrastructure, AWS services, APIs, and tools to virtually any data center, co-location space, or on-premises facility for a consistent hybrid experience. As a result, customers can run applications using AWS features and services in their on-premises environment for applications that require data residency, regulatory, or other business constraints. With Amazon RDS for Oracle on AWS Outposts, customers can now use a managed Oracle database service on premises, just as they do in the cloud. Amazon RDS for Oracle on AWS Outposts offers fully managed database management experience such as automated backups, automated patching, point-in-time recovery, monitoring with Amazon CloudWatch, and data encryption at rest with AWS KMS. Amazon R

AWS Transform custom announces general availability of automated codebase analysis

31 March 2026 @ 8:00 am

AWS Transform custom announces the general availability of the comprehensive codebase analysis transformation. This up-front analysis reduces documentation maintenance burden and preserves critical institutional knowledge. This enables you to better understand the current state of your codebase before starting a modernization effort, reducing the time and guesswork involved in planning large-scale upgrades. It performs deep static analysis and generates structured documentation covering architecture, technical debt, code metrics, reference documentation, migration planning, and diagrams. Behavior analysis is available in early access. The transformation analyzes codebases in any language, including Python, Java (Maven and Gradle), Node.js, .NET, and applications exceeding one million lines of code. It produces a technical debt report that identifies outdated components and end-of-life dependencies, and recommends specific AWS-managed transformations to address them — helping y

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Why Seattle’s AI ambitions started with a hypervisor migration

31 March 2026 @ 9:00 am

3 key takeaways > Prioritize workload-specific placement over “all-cloud” mandates to ensure higher uptime, lower costs, and total data sovereignty. Maintain a “recoverable position” by using extensible platforms that allow you to reclaim and redeploy data across different providers. Clean up legacy “bloat” first. A solid hybrid foundation is necessary to scale AI pilots into meaningful operational value. Seattle, the largest city in the Pacific Northwest, was facing a $250 million budget gap. Like many large organizations, the city suspected inefficiencies were hiding in plain

How Lumen is dismantling decades of network complexity

30 March 2026 @ 6:27 pm

Any network built through years of acquisitions will typically accumulate the structural debt of overlapping infrastructure, fragmented inventory, and no single view of what is running where.For Lumen Technologies, that debt compounded across four decades and dozens of acquisitions. Lumen is an enterprise network infrastructure company serving large enterprise, government and wholesale customers, with a fiber network spanning roughly 500,000 route miles globally and $12.4 billion in 2025 revenue. The company has been repositioning from its legacy telephone carrier roots toward AI-era enterprise connectivity and network-as-a-service (

Amazon waives entire month’s AWS charges after Iranian drone attack

30 March 2026 @ 4:04 pm

In a highly unusual move, Amazon has confirmed that it is waiving an entire month’s usage charges for customers using two Middle Eastern datacenters disrupted by Iranian drone attacks earlier this month. The attacks on March 1 damaged two Amazon datacenters in the region, ME-CENTRAL-1 (United Arab Emirates) and ME-SOUTH-1 (Bahrain), something the company acknowledged the following day. “These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage,”

Network and storage patterns for AI workloads: The overlooked bottleneck

30 March 2026 @ 9:00 am

I used to think AI performance was mostly a GPU problem.  Then I watched a “healthy” GPU fleet crawl. Not because we ran out of compute, but because we ran out of movement. Tokens waiting on data. GPUs waiting on batches. Services waiting on east-to-west traffic. Storage queues quietly turning into tail latency.  Today, I do not even call this a storage problem. It is an information supply chain problem. In real enterprise AI, data is scattered across on-prem, cloud and edge footprints. Training and inference cycles get longer. Expensive resources like GPUs stay scarce. And the system pays a time tax every time data has to hop, copy, translate or wait.

An “Unstoppable Web” is a reality that Tether is orchestrating

30 March 2026 @ 7:59 am

The current web is optimized for surveillance capitalism; this is positive compared to other ways our data can be used. Data from activities on native utility applications and communications on social messaging applications, both offline and online, are routed through centralized systems managed by admins who decide whether these actions proceed to completion at all and what happens to the data post-communication. The theory of decentralization for user-centric systems is “absolute user control.” Born out of extreme necessity, decentralization has made significant progress in finance thanks to blockchain technology, but it struggles in other aspects of human communication. Encryptio

European Commission data stolen in a cyberattack on the infrastructure hosting its web sites

27 March 2026 @ 9:18 pm

The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday, the Commission revealed there had been an attack on its Europa.eu platform, offering few details, then, on Friday, security news site Bleeping Computer reported that the attack had involved the compromise of an account or accounts on Amazon Web Services (AWS). Th

Equinix launches AI platform to simplify control of distributed AI resources

27 March 2026 @ 7:25 pm

An age-old problem for enterprise IT managers has always been data sprawl. However, in the era of AI, where data is needed from every potential source available, scale in data sprawl become unmanageable. Existing architectures weren’t designed for distributing processing, which is part and parcel of AI training. Data center provider Equinix says it has the solution:  The Distributed AI Hub powered by Equinix Fabric Intelligence. The

Return of the PTT: Poste Italiane looks to snap up telco TIM

27 March 2026 @ 4:42 pm

During a wave of privatization in the 1980s and 90s, there was a separation of postal services and telecoms throughout Europe as governments looked to tap into the liberalization of telecoms markets by breaking up their national PTTs — government agencies with a monopoly on operating postal, telephone, and telegraph services. Now, for one country at least, it’s back to square one: Poste Italiane is ready to snap up Italian telecoms provider TIM in a deal worth €10.8 billion. Postal services have been hit badly over the past few decades: The

Networking terms and definitions

27 March 2026 @ 2:09 pm

To find a brief definition of the networking term you are looking for user your browser’s “Find” feature then follow links to a fuller explanation. Abstraction interface (SAI) An abstraction interface (SAI) is an API designed to allow network software (such as an operating system) to control the hardware of a network switch. Traditionally, if you bought a switch from a specific vendor, you had to use its software to run it. If you wanted to switch hardware, you had to redo management system. SAI c

Intel: Latest news and insights

26 March 2026 @ 9:08 pm

More processor coverage on Network World:AMD news and insights | Nvidia news and insights Intel is hoping for a turnaround under its new CEO, Lip-BuTan. Intel’s Q1 2025 revenue was $12.7 billion, flat year-over-year. While revenue for its client computing group dropped 8%, the data center and AI segment showed an 8% increase, dr

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Unable to load the feed. Please try again later.

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

SSL Certificates are changing. Here’s what you need to know.

17 March 2026 @ 10:12 am

The rules around SSL certificates are changing across the whole internet. The good news is that for most customers, very little will change on your side. This is an industry-wide... The post SSL Certificates are changing. Here’s what you need to know. appeared first on Heart Internet.

Hosting VPS Linux vs Windows VPS

9 March 2026 @ 3:03 pm

The post Hosting VPS Linux vs Windows VPS appeared first on Heart Internet.

Domain Name Transfer Checklist: Everything You Need to Know

3 March 2026 @ 2:56 pm

The post Domain Name Transfer Checklist: Everything You Need to Know appeared first on Heart Internet.

Heart Internet Win Gapstars Innovation Award 2026

23 February 2026 @ 11:57 am

We’re incredibly proud to celebrate our Site Reliability Engineering team, who have won the Gapstars Innovation Award for their outstanding work improving platform stability, security, and visibility across our shared... The post Heart Internet Win Gapstars Innovation Award 2026 appeared first on Heart Internet.

A/B Testing Explained: A Practical Guide To Better Results | Part 1

20 February 2026 @ 8:32 am

If you want to improve your website you probably need to do A/B testing, otherwise known as split testing. Instead of guessing, A/B testing allows you to experiment more scientifically.... The post A/B Testing Explained: A Practical Guide To Better Results | Part 1 appeared first on Heart Internet.

How to enable two-factor authentication (2FA) on your Heart Internet account

28 January 2026 @ 12:37 pm

Account security matters, and switching on two-factor authentication (2FA) is a quick win. 2FA adds a second check during the sign-in process, so even if someone compromises your password, they still can’t get in.  To enable 2FA:  Step 1: Open your... The post How to enable two-factor authentication (2FA) on your Heart Internet account appeared first on Heart Internet.

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business... The post What is Web Hosting and Why Does Your Business Need It? appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Is it possible to have custom reload/restart-like commands in systemctl for a daemon?

31 March 2026 @ 4:07 pm

I'm developing a daemon that runs under control of systemd, and that has a feature to reload code that's inbetween "systemctl reload" and "systemctl restart". Unlike "systemctl reload" that sends a signal to re-read just the configuration, it also reloads the code, but unlike "systemctl restart" it's not a true hard restart that forgets all the state, but instead the state is written to a file and a signal causes the daemon to replace its code with execve() and then it reads the old state from the file. Is there any feature in systemd that would allow me to add some custom command to systemctl that would be inbetween reload and restart, just for this daemon? Technically the feature would be implemented by some signal such as SIGUSR1 or SIGUSR2. I'm expecting that there could be cases where a hard restart will be done instead of the lighterweight "dump state + execve + reload state", so it would be useful to have

Powering down idle HDDs in a ZFS pool to conserve power

31 March 2026 @ 8:35 am

I've got a storage server with some NVMe SSDs for system and metadata cache and 24 3.5" HDDs for storing historic data. Since this data is very infrequently accessed (at least once per day for synchronization, often that is the only access at all for several days), it would be good to spin down the drives during the remaining time to conserve power. The system is running Debian (actually Proxmox, but no VMs there) and ZFS. The storage pool is made up of 3x 8-way raidz1, with a mirrored special device on NVMes for metadata storage. The disks are Seagate Exos SAS drives. My questions: Will the drive lifetime decrease (or increase) if they are only active maybe 1/4 of the time, but with at least one spin-down/spin-up every day? Can or do I need to tell ZFS about this behavior, so that it isn't confused by very long initial access times when a drive needs to spin up first? Does ZFS even let a drive go to sleep, or does

libnss-extrausers use cases and details

31 March 2026 @ 5:40 am

What are the use cases for libnss-extrausers? I've seen a couple of examples but the details are lacking. If you use libnss-extrausers, don't you have to change all user and group IDs to keep from colliding with the corresponding /etc files? If this is done then effectively only files with "world" access in directories with "world" access are available. What about home directories, do you use a common directory such as /tmp or what do you do? This is why I'm asking about the use cases to better understand the benefit.

Mutual TLS Abruptly Stopped Working on Tomcat 9 and 11 Servers

30 March 2026 @ 11:06 pm

I have several java webapps running on 2 tomcat servers--with various JDK (17 and 25) and Tomcat versions (9 and 11), in a test/development environment--where the server is configured to request a client certificate. When the browser prompts me, I select my CAC card certificate on the browser popup and then am prompted to enter my pin. The prompts for certificate selection and pin entry have always occurred immediately after navigating to the url (so there is no post-handshake authentication). Unfortunately, this stopped working for me; one day it was working and another day it totally stopped. I am 100% certain that no server nor personal configurations changed since the time it was working; no server, connector, JDK, or any other settings were manually changed. And even more strange, it is very inconsistent between users: it still works 100% for one team member, it works only on Firefox for another team member, a third memeber can only get it to sometimes work in Chrome's p

Strange permissions on shared Start Menu folders in Windows 10 IoT Enterprise LTSC

30 March 2026 @ 9:04 pm

I have a fleet of Dell OptiPlex 3000 machines that were purchased due to one reason only: legal license for Windows 10 IoT Enterprise LTSC. I am getting very strange set of permissions on a clean re-install on certain folders that relate to the shared Start Menu: C:\Users\All Users\Start Menu\Programs S-1-5-21-3671523672-3566060235-3176437112-1000:(I)(OI)(CI)(DE,DC) DESKTOP-UROR7BK\admin:(I)(OI)(CI)(DE,DC) NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F) BUILTIN\Administrators:(I)(OI)(CI)(F) BUILTIN\Users:(I)(OI)(CI)(RX) Everyone:(I)(OI)(CI)(RX) C:\Users\All Users\Start Menu Everyone:(DENY)(S,RD) Everyone:(RX) NT AUTHORITY\SYSTEM:(F) BUILTIN\Administrators:(F) C:\Users\All Users NT AUTHORITY\SYSTEM:(OI)(CI)(F) BUILTIN\Administrators:(OI)(CI)(F) CREATOR OWNER:(OI)(CI)(IO)(F) BUILTIN\Users:(OI)(CI)(RX) BUILTIN\Users:(CI)(WD,AD,WEA,WA) C:\Users NT AUTHORITY\SYSTEM:(OI)(CI)(F) BUILTIN\Administrators:(OI)(CI)(F) BUILTIN\Users:(RX) BUILTIN\Users:(OI)(CI)(IO)(

Delete Fails when Windows NFS mounted on Linux vm

30 March 2026 @ 5:37 pm

I have a windows NFS setup with AD and on mounting it in linux vm. I’m able to create and edit the files but not able to delete the files. The user seems to be correctly mapped but delete fails. I have even given full control to the user but it still doesn’t work. Can someone help me understand the possible causes for this? The delete works correctly on the windows machine.

Exchange Server 2019 Root URL Gives 500 Error But OWA/ECP Work Fine

30 March 2026 @ 3:52 pm

We have a pair of Windows Server 2019 servers running Microsoft Exchange 2019 called mail01 and mail02. I recently noticed that browsing to https://mail01.domain.com/ gives a 500 error (well actually it gives Server Error in '/' Application but the logs show the 500 error). However, browsing to https://mail01.domain.com/owa or ecp works fine. Additionally, browsing to https://mail02.domain.com/ also works fine. So it is something in the standard root URL redirection on that one server. The event viewer has the following error: Could not load file or assembly 'Microsoft.Exchange.HttpUtilities, Version=15.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35' or one of its dependencies. Event code: 3008 Event message: A c

IPv6 address randomly drops on Ubuntu 24.04 (Oracle Cloud) after switching from ufw to nftables

29 March 2026 @ 9:09 am

I'm experiencing an intermittent IPv6 connectivity issue on an Oracle Cloud Infrastructure (OCI) instance after migrating my firewall from ufw to nftables. Environment: OS: Ubuntu 24.04 Cloud Provider: Oracle Cloud (OCI) Local Network: Dual-stack (IPv4 and IPv6 available) The Problem: My SSH connection to the server via IPv6 is intermittent, while SSH via IPv4 remains perfectly stable. Upon investigation, I noticed that when the connection fails, the IPv6 address completely disappears from the network interface (checked via ip addr). When the connection is working, the IPv6 address is present. Troubleshooting Steps Taken: I have already allowed all ICMPv6 traffic in the Oracle Cloud Web Console (Security Lists). If I change my local nftables input chain default policy to accept, the IPv6 address reappears in ip addr after a few minutes, and SSH via IPv6 works perfectly again. However, if I change the nftables defa

Cisco ISE logs issue

29 March 2026 @ 8:45 am

I am sending Cisco ISE logs to an end receiver. Problem is that some of the logs are across multiple lines This causes it be considered as a new log event by the end system. For example below log get broken up into multiple log events :- <181> CISE_RADIUS_Accounting 0015021690 1 0 2020-03-01 09:36:46.766 +01:00 0376002501 3002 NOTICE Radius-Accounting: RADIUS Accounting watchdog update, ConfigVersionId=261, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, cisco-av-pair=lldp-tlv=lldpSystemDescription=Cisco AP Software\, ap3g3-k9w8 Version: 8.10.130.0\ <13> Support: http://www.cisco.com/techsupport\ <13> (c) 1986-2020 by Cisco Systems\, Inc.\ <13> Wed Jul 29 00:28:31 PDT 2020 by aut, cisco-av-pair=lldp-tlv=lldpSystemName=sw-14, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Type=Device Type#All Device Types#Switch#DynamiskNett, #015 1st part <181> CISE_RADIUS_Accounting 0015021690 1 0 2021-03-01

How can I get my kvm switch and VMs that are on the same VLAn to comm8unicate?

29 March 2026 @ 5:12 am

I've setup a kvm host using a vlan trunk (using 2 bonded nics) and then created several vms on the host. The host is configured with an IP in the native VLAN. Some of the vms are connected to vlan 1, the native vlan, others are connected to VLAN 20 and VLAN 50. I have communication between all the VMs, regadless of which VLAN they are connected to and other devices on the network can communicate with all the VMs and with the host server. The host server and vms connected to VLAN 20 or 50 can also communicate. However there is no communication between the host server and the vms connected to the native vlan. I've setup the kvm host using as follows, (using https://intelligentsysadmin.wordpress.com/2023/01/24/bridged-vlans-with-networkmanager/ as a general guide): Create the bond interface connection: nmcli con add type bond con-n

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10