Get the root password for a Guest Introspection VM (SVM)

I recently had an issue where I needed to collect logs from a Guest Introspection VM as part of troubleshooting McAfee Anti-Virus performance problems. In order to collect the logs I needed to obtain the root password for my Guest Introspection VMs. I quickly realized there wasn’t a great source online for doing so and decided to publish this article.

  • SSH to the NSX Manager appliance and login with the admin account.
  • Enter the following command to elevate to root. When prompted, enter the root password you set while deploying the NSX Manager appliance.


  • Enter the following command to enter tech support mode. When prompted for the password type:

st eng

  • Issue the following command to output the root password for the Guest Introspection VMs:



Setting Up LastPass & Duo

This weekend I decided that it was finally time to give LastPass another try. One of my long term concerns with LastPass was the need for a cheap and conveinent 2-factor authentication solution.LastPass_Duo_Logo When I originally looked into LastPass (a long time ago!) the only real option was a YubiKey. This key not only cost money but also used 1 of my very valuable USB ports. So I’m glad to report that LastPass now offers a variety of 2-factor authentication and 2 step verification options. In exploring LastPass’ 2-step verification options I saw that they supported Duo which brought a smile to my face because not only is Duo free, but it’s also already installed on my iPhone. So I promptly configured Duo with LastPass and wanted to share how simple that process is.

Step 1: Sign-up for LastPass

The first step in this setup is obviously to get a LastPass account. So head on over to, create a new account and be sure to choose an ultra-sophisticated master password. Remember, once you’re done with this guide this will be the only password you need to remember so you can afford to use all of your brain power!

Step 2: Sign-up for Duo

Bounce over to and make a new Duo account. Even the free account will be perfectly fine for use with LastPass.

Note: I highly recommend using a Duo Push as your preferred verification method.

Read More

Change the Port CommVault Uses


In some cases it may be necessary to change the port that the CommVault agent uses. By default the agent uses both port 8400 and 8402.

This can be verified by issuing the netstat -aob command on the client.


  • RDP to the client
  • Open RegEdit
  • Browse to HKLM\SOFTWARE\CommVault Systems\Galaxy\Instance001\Session
  • Change the nCVDPORT or nEVMGRPORT key to the new port you would like to use










  • Restart the CommVault services on the client
  • Verify the changes with the netstat -aob command.

Note: It also appears the port(s) can be changed during the installation of the client if you push the software from the CommServe.

Import a Public SSH Key in 3PAR CLI


This page documents the process of importing a public SSH key into the 3PAR CLI. This will allow for private key authentication instead of password based authentication.


  • Create a private/public key.


  • Open an SSH session to the 3PAR CLI
    • Login with the username that will use the SSH key for authentication
  • Issue the following command:


  • Copy the contents of the public key that was created in the prep-steps.
  • Paste the contents into the SSH window
  • Hit enter twice