Versions this guide is based on:
EVE Image Foldername | Downloaded Filename | Version | vCPUs | vRAM | Console | |
---|---|---|---|---|---|---|
1. | scrutinizer-19.1.1 | Scrutinizer_KVM_Image_19.1.1.tar.gz | 19.1.1 | 4 | 6144 | telnet/https |
Instructions |
---|
Other versions should also be supported following bellow’s procedure.
Fill the form to download KVM image: Scrutinizer_KVM_Image_19.1.1.tar.gz, or other version https://www.plixer.com/evaluate/scrutinizer/ Deploying KVM .qcow2 image 1. Untar downloaded image Scrutinizer_KVM_Image_19.1.1.tar.gz until you get Scrutinizer_VA_19-disk1.qcow2. You can either to untar it on Windows using any archivator application, for example 7zip.org or using Linux tar command. 2. SSH to your EVE as root and create image folder scrutinizer-19.1.1. It is case sensitive name and hyphen after word scrutinizer is a must. mkdir /opt/unetlab/addons/qemu/scrutinizer-19.1.1
3. Upload un-tared image Scrutinizer_VA_19-disk1.qcow2 to the EVE /opt/unetlab/addons/qemu/scrutinizer-19.1.1/ folder using for example FileZilla or WinSCP.
4. From the EVE cli, go to newly created image folder.
cd /opt/unetlab/addons/qemu/scrutinizer-19.1.1/
5. Rename original filename to virtioa.qcow2 mv Scrutinizer_VA_19-disk1.qcow2 virtioa.qcow2
6. Fix permissions: /opt/unetlab/wrappers/unl_wrapper -a fixpermissions
Default cli username is plixer with password scrutinizer, https access is admin/admin |