First you need to do ‘inspect element’ to the page
[root@space-005056941e6f ~]# find / | grep junos_space_rgb_360x240.png
find: /proc/27145: No such file or directory
[root@space-005056941e6f ~]# cd /usr/local/jboss/domain/tmp/servers/server1/vfs/deployment1c48889875ac1ea/systemService-web.war-9705d0aeabb62272/images/
[root@space-005056941e6f images]# ls
background-aqua-2560×1458.jpg bgd_gradient_fill.png junos_space_rgb_1800x1200.png login_button_62x24.png preload
background-aqua-2560×1458.png burst-space-192×180.png junos_space_rgb_360x240.png logo_juniper_reversed.png rounded-blue-100×26-btn.png
background-aqua-login-2560×1458.png gradient-background.png login-aqua-2560×1458.png logo-reversed.png
Login via WinSCP to the junos space machine . And remeber that you need to change the Shell Environment from Default to /bin/bash
Copy the logo to your PC and edit it
Don’t forget to backup the one you have on the Junos space machine (just rename it)
If you’re having a problem with permissions just run via the CLI those commands
[root@space-005056941e6f ~]# cd /usr/local/jboss/domain/tmp/servers/server1/vfs/deployment1c48889875ac1ea/systemService-web.war-9705d0aeabb62272/
[root@space-005056941e6f systemService-web.war-9705d0aeabb62272]# chmod 777 images/
First , in order to troubleshoot this issue , you need to be sure that ssh is enabled . How ?
- power off the machine from VMware workstation or vSphere , or suspend it.
- power it on
- after entering user/pass , you’ll be asked to select which mode to enter , check security (5)
- if appears disable ssh , then ssh is enabled . if not , then enable it .
- if then is not your problem , then enter the debugging mode (7) and do the following:
write down the command : $ ls -al /etc/ssh/ssh*key
if appears nothing , or zero as it shows in the picture , then you need to re-generate ssh key using the following command:
sudo ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key
and then click Enter twice .
This should solve your problem .
If not , back to “secuirty (5)” section , and try disabling firewall .
Note: For more information regarding ssh keys , visit the following site.
Within the Junos Space you can find all the .conf files ‘Configuration Files > Config Files Management’ path . But you want to back it up via bach/script file that runs automatically instead of exporting it from the Space GUI , and you don’t know where those files are stored in the JS directories :
First, good luck with that 🙂
Second, here is the path :
# cd /usr/local/jboss/domain/tmp/servers/server1/.conf/RCS/
While you’re trying to backup your Junos Space VM machine via the VMware Tools, and you receive the following error:
FTL – vfm_freeze: method: VMware_v2, type: FIM, function: VMware_v2_freeze
as part of my research in Junos space resources I can see that “Junos Space Network Management Platform is not certified to be used with VMware tools”
This should work From Junos Space Network Management Platform Release 16.1R1 onward.
So how can I know which device is spamming / comsuming all WAN bandwidth
First login to you Network Director
If you don’t see Top Talkers widget , then add it
Click on Maximize
Login to the switch in order to view behind which port this MAC is residing
You will have to reboot the VM instance and once it is coming UP, please get into the ‘greb’ menu and follow the below steps:
Access the grub menu & edit it with ‘e’
The default grub protection username & password is root/abc123
Default grub menu options will be displayed after this as shown below ,
Remove the entries after “root=/dev/mapper/jmpvgnocf-lvroot” in kernel line with init=/bin/bash as shown below ,
Linux /vmlinuz-2.6.32-100.24.1.el5 root=/dev/mapper/jmpvgnocf-lvroot ro /
console =tty1 console=ttys0,9600n8 acpi_enforce_resources=lax
Linux /vmlinuz-2.6.32-100.24.1.el5 root=/dev/mapper/jmpvgnocf-lvroot init=/bin/bash
Boot in to the system with Ctrl-x or F10 & make the file system rw with “mount –o remount,rw /” command.
Finally change admin password with “passwd admin” command then exit & reboot the system.
Note: Grub mode protection is enabled with either “password” or “pbkdf” mode passwords in 13.x ,search for password in /boot/grub/grub.cfg file & replace the password with the one created with either “grub-mkpasswd-pbkdf2” or “grub-md5-crypt” for changing the default password.
** Many thanks to Lijo K. from Juniper support for sharing those information with me**
Abed AL-R. B.
Navigate to discover targets
Devices > Device Discovery > Discover Targets
>> click on next , then edit the snmp credentials , then click next >> edit the “Device login credentials” >> Discover !
You need to pass the -Managed- stage, This will take upto 5 minutes .