Category Archives: ESXi 5.5

vCenter Server Appliance 5.5 root account locked out after password expiration

A new VMware KB article has been published which could potentially have wide spread impact, particularly in lab, development, or proof of concept environments.  The VMware KB article number is 2069041 and it is titled The vCenter Server Appliance 5.5 root account locked out after password expiration.

In summary, the root account of the vCenter Server Appliance version 5.5 becomes locked out 90 days after deployment or root account password change.  This behavior is by design which follows a security best practice of password rotation.  In this case, the required password rotation interval is 90 days after which the account will be forcefully locked out if not changed.

The KB article describes processes to prevent a forced lockout as well as unlocking a locked out root account.

Approximately 90 days have elapsed since the release of vSphere 5.5 and I imagine this issue will quickly begin surfacing in large numbers where the vCenter Server Appliance 5.5 has been deployed using system defaults.


Release: VMware vCenter Server 5.5.0.b & vCenter Server Appliance 5.5.0.b

On December 22 VMware released vCenter Server 5.5.0.b as well as vCenter Server Appliance 5.5.0.b.

This release (version b) does not contain new features or enhancements but contains resolved issues only.

The release notes are here.

Download here

Resolved issues

Upgrade and Installation

  • Upgrading the vSphere Web Client to vSphere 5.5 fails with an error
    Attempts to upgrade the vSphere Web Client to vSphere 5.5 fails when they are installed in a custom, non-default location. An error message similar to the following is displayed:Error 29107. The service or solution user already registered...This issue is resolved in this release.

vCenter Server, vSphere Client, and vSphere Web Client

  • vCenter Server 5.5 displays a warning message in the yellow configuration issues box on the Summary tab of the hosts
    When you connect to VMware vCenter Server 5.5 using the vSphere Client or the vSphere Web Client, the Summary tab of the ESXi 5.5 host displays a warning message similar to the following in the yellow configuration issues box:Quick stats on <hostname> is not up-to-dateThis issue is resolved in this release.
  • Attempts to export log bundle using the Log Browser fails
    When you attempt to export a log bundle using the Log Browser interface, the browser window displays a Secure Connection Failed error page with the following message:Your certificate contains the same serial number as another certificate issued by the certificate authority. Please get a new certificate containing a unique serial number.This issue is resolved in this release.

    Note: If you are upgrading from the vCenter Server 5.5 version, see the workaroundprovided in the known issues section.

  • Attempts to log in to vSphere Web Client result in an error message
    Attempts to log in to the vSphere Web Client result in an error message if the Local OS identity source is not configured in the SSO configuration page. An error message similar to the following is displayed:Failed to authenticate to inventory service <server IP>:10443This issue is resolved in this release.

vCenter Single Sign-On

  • After installation of vCenter Single Sign-On 5.5 attempts to connect to the vCenter Single Sign-On server might fail
    After you install the vCenter Single Sign-On 5.5 on a Windows system that is not domain joined and has multiple network interfaces, attempts to connect to the SSO server from other components might fail. You might see a message similar to the following:Could not connect vCenter Single Sign On....make sure the IP address is specified in the URL.This issue is resolved in this release.
  • When upgrading from vCenter Server Appliance 5.0.x to 5.5, vCenter Server fails to start if you select an external vCenter Single Sign-On
    If you select an external vCenter Single Sign-On instance while upgrading the vCenter Server Appliance from 5.0.x to 5.5, vCenter Server fails to start after the upgrade. In the appliance management interface, vCenter Single Sign-On is listed as Not configured.This issue is resolved in this release.
  • Attempts to upgrade vCenter Single Sign-On to 5.5 fails if the SSL certificates being in PKCS12 format
    When you upgrade from vCenter Single Sign-On 5.1 to 5.5, the installer fails and rolls back, before you select an SSO deployment method, with the following error message:vCenter Single Sign-On Setup Wizard ended prematurely because of an errorAn error message similar to the following is logged in the vim-sso-msi.log file:

    DEBUG: Error 2896: Executing action ExtractKeystoreInfo failed.

    This issue is resolved in this release by displaying the following warning message:

    Setup has detected a problem with your current configuration which will cause upgrade to fail. Your certificate key store format might be unsupported. See VMware KB 2061404.

  • Upgrade to vCenter Single Sign-On 5.5 fails before you select the deployment type
    Attempts to upgrade to vCenter Single Sign-On 5.5 fail before you can select the deployment type. Error messages similar to the following are logged in the vminst.logfile:VMware Single Sign-On-build-1302472: 09/26/13 15:18:19 VmSetupMsiIsVC50Installed exit: Error = 1605
    VMware Single Sign-On-build-1302472: 09/26/13 15:18:19 VmSetupGetMachineInfo exit: Error code = 1605This issue is resolved in this release.
  • Active Directory is not added automatically as identity resource in vCenter Single Sign-On 
    When you initially install the vCenter Single Sign-On in a Windows system that is part of an Active Directory, the Active Directory is not automatically added as the default identity resource in the vCenter Single Sign-On server.This issue is resolved in this release.
  • Unable to edit a vSphere 5.5 Identity Source in the vSphere Web Client
    You cannot edit a vSphere 5.5 Identity Source in the vSphere Web Client as the Edit icon is disabled for the Active Directory Identity Source. You see a warning message similar to the following:Edit Identity Source (Not available)This issue is resolved in this release.
  • Unable to modify password or remove users from system-domain after you upgrade from vCenter Server 5.1 to 5.5
    After you upgrade from vCenter Server 5.1 to vCenter Server 5.5, you are unable to remove the users from system-domain or modify the password for these users.This issue is resolved in this release.
  • vCenter Single Sign-On Identity Management service repeatedly logs the message: Enumerate trusts failed Failed to enumerate domain trusts for domain_name (dwError – 5)
    When you configure the Active Directory (Integrated Windows Authentication) Identity Source in vCenter Single Sign-On, the vmware-sts-idmd.log file, located atC:\ProgramData\VMware\CIS\logs\vmware-sso, repeatedly logs the following message:INFO [ActiveDirectoryProvider] Enumerate trusts failed Failed to enumerate domain trusts for domain_name(dwError - 5)This issue is resolved in this release.

Virtual Machine Management

  • Attempts to clone, create, or storage vMotion a virtual machine fails when the destination data store is a Storage DRS POD
    In vCenter Server, operations that consume storage space such as virtual machine creation, cloning, or storage vMotion might fail if the destination data store is a Storage DRS POD and the storage device has the de-duplication feature turned on. The following error is displayed:Insufficient disk space on datastore xxxxxThis issue is resolved in this release.

Free ESXi (vSphere) Hypervisor Limitations Removal

Taken from’s Excellent Site

Post in Full:

Last week I ran into another discussion about the hypervisor under a XenApp deployment it had to be free or very cheap. So the customer was thinking about loading Hyper-V below it. Ok can be a viable option but the admins hoped it would be VMware ESX because they know that hypervisor and it has never let them down in the past six years. So I got the question what is possible, can we use the Free vSphere Hypervisor?  I than remembered from VMworld San Francisco 2013 the limitations of the Free vSphere Hypervisor have been lifted.

So now you can use the vSphere Hypervisor 5.5 with:

  • Unlimited number of cores per physical CPU
  • Unlimited number of physical CPUs per host
  • Maximum eight vCPUs per virtual machine
  • But most important the limitation of 32GB RAM per server/host has been removed from the free Hypervisor.

So now you can use it below a XenApp deployment or in a stack where you do not need DRS, HA and vMotion. If you do need a central management solution you can use the Essentials Kit and if you need DRS, HA, vMotion etc. you can use the vSphere 5.5 essentials kit it is for max. 3 servers with 2 physical CPUs per Server.

EssentialsKit edition.png

In Europe the Essentials Kit will cost 690 Euro for 3 years and the Essentials Plus Kit will cost 5.554 euro for 3 years. If you want to have support on your VMware vSphere Hypervisor you can now purchase Per Incident Support for it.

vSphere Hardening (Updated with General Availability)


One of the more solid cases in the VMware vs Hyper-V arguments is the ‘footprint’ of the hypervisor, VMware wins in terms of sizing and claims a massive advantage in being Linux based with a smaller attack surface.  However, this is often taken as an excuse by admins to leave a default configuration on hosts and within the vSphere components used to make up a virtualisation solution.  VMware have made things a little easier for those concerned that vulnerability in even a single host can mean chaos for your virtual environment, they have now release an updated hardening guide for the following components:

  • Virtual Machines
  • ESXi hosts
  • Virtual Network
  • vCenter Server plus its database and clients.
  • vCenter Web Client
  • vCenter SSO Server
  • vCenter Virtual Appliance (VCSA) specific guidance
  • vCenter Update Manager

To directly download the guide you can use this link and this one for the change log.

VMware Blog Details Here

Thanks to Mike Foley for confirming the version status of the document being published

VMworld 2013 Technical Keynote Summary (from

Original post here

Today’s General Session is all about the technology behind the solutions provided by VMware and the partner eco system. Featuring Carl Eschenbach, VMware’s President and COO, along with VMware’s engineering leaders they are showcasing state-of-the-art technology that is transforming IT by virtualizing and automating compute, storage, networking and security across private and hybrid clouds.

It may be or is the largest IT event in Europe for a few years now. From 1.400  to 8.500+ now. Lets summarise yesterdays announcements and releases.



VMware has the mission to virtualise the whole x86 datacenter. Carl says: “We are not there yet, but we are on the road towards it.”


Software will reduce the friction between business and IT enabling increased business value.  Increase velocity. Use more budget on innovation, less on maintenance. This requires an agile datacenter. Automate IT for IT. The world will be a Hybrid cloud in the near future. How? Through the Software-Defined Data Center. Where all infrastructure is virtualised and delivered as a service.

How? by 3 imperatives.

1. Virtualize all of IT

2. IT management gives way to automation

3. Use a compatible hybrid cloud

Carl introduces Kit Colbert – Principal Engineer on stage. Kit is showing us several new or improved products to help to achieve the 3 imperatives. And to speed up the delivery of services to the business. IT requirements are complex and besides that we need to keep the lights on so there is a lot of pressure on the IT guys.

Kit shows VMware vCloud Automation Center deployment of a project (Vulcan) through a Service Catalog on a private cloud infrastructure. After deploying the project in the private cloud he also shows us how to use the hybrid cloud option to deploy it the same way in the Hybrid Cloud. By taking all the guess work out.Where you must understand that running it in a public cloud isn’t always cheaper! While deploying it in the private cloud or the hybrid cloud, you can now use Auto-scaling options. By enabling the Enable Auto Scale feature you can choose that amount of maximum nodes. Control IT through policy to keep it simple for the business.

Governance equals control. Automation brings Self-service and governance together.

Kit shows us IT Service in action: – Self service – Transparent pricing – Governance – Automation, where we get a great cost overview in vCAC – total cloud cost – operational analysis (price per VM) – demand analysis. Even a breakdown in detail of cost by department and underlying projects.

How much does a vm cost over time. Now we can answer and give the business a lot of detail. Or even a live dashboard. Showing transparency in pricing, not only for private clouds but even for public connected. Showing demand analysis. Kit is demoing the IT Business Management Suite (ITBM) product integrated in vCAC. We see lots of products nicely integrated and working together!

Next up is the vCloud Application Director for application provisioning showing us the VMware vCloud Application Director v6.0-Beta. Showing us a detailed visual overview of the multi-tier application blueprint. Application provisioning delivers: -Streamlined app provisioning -Decoupling app &infra -Automation reduces steps, risk & faults.

Conventional networking is a barrier to quick app delivery. Kit explains networking with NSX, decoupling the logical network from the underlying hardware, giving lots more agility. With the demo, Kit shows us all networking actions in previous vCAC demo were automatically executed by NSX. Traditional network routing between VMs on the same host introduces hair pinning of network traffic NSX routes on vSphere hosts. Applications can perform faster because hair pinning is eliminated by NSX on local host.

How does NSX handle security? It also handles it at the local host level to prevent unnecessary network traffic. Also load balancing is handled the same way as routing and security. This results in faster networking & better performance & happy users. NSX can be easily implemented in existing vSphere infrastructures with traditional vSwitches without downtime!  You have mutliple options to move VMs to a NSX network layer. You can turn them off and bring them up again, but that is with downtime. But you can also use vMotion to move them through the NSX bridge to move them to the new NSX based network!! For physical servers you can also connect them through a physical NSX bridge.

Making Storage Dynamic

With just a few clicks you can create a vSAN. Making it super simple to use. In combination with NSX there will be a very fast network combining all local storage like SSD and Flash for the virtual environment, based on a Highly Resilient Architecture. Kit shows us a demo how to make storage dynamic with Software-Defined-Storage (VMware vSAN). vSAN clusters use local storage to create storage pools using SSDs & disks preserving vSphere advanced features.Adding a host in a vSAN cluster gives more compute, networking and storage capacity. Building blocks now contain storage! vSAN is highly resilient by writing multiple copies.

vSAN delivers: -storage policy set at time of provisioning -storage that scales -leverage existing DAS storage

It is time for End User Computing. End user freedom with IT control where VDI now goes mainstream! No reason NOT to virtualize desktops. Every application even high graphics workloads can be on the platform. Horizon Workspace gives users SSO to all applications and even application execution of non supported OS, like One Note or Visio on a Mac. Provisioning a virtual desktop through vCAC is now possible and even to the cloud through Desktone, which VMware acquired earlier.

Horizon Suite delivers: -Self serv to apps & data o any device -Policy, automation, security & compliance -Enhanced productivity for users & IT

These were great demos Kit thanks for showing us all the possibilities.

Carl introduces Joe Baguley (VMware CTO EMEA) on stage next.

Conventional Approach to Management is Rigid. Complex and Fragile. It is the reality because the problem lays in the system of silos for networking, storage, compute. We have to start accelerating, by starting to do it through a policy based approach. This is the VMware Approach to Management.

New approach needs policy based automation to deliver agile, scalable and simple IT infrastructures.

There are a couple of challenges by given by Carl to Joe before he can start the demo. Carl says: “Seemlesly extend to the public cloud. Workloads back into the private cloud. No change to IT policies or whatsoever.”

Joe shows us a vCAC demo but also adding to Carl not to pickup the phone yet because the Vulcan project is Red at the moment but to read the words below the pretty picture ;-) It says: Automated remediation action. System gonna fix itself.

Integration of Operations Manager and vCloud Automation Center creates a self-healing infrastructure.

Automated Operations delivers -policy driven, automated, proactive resp -Intelligent analytics -creating visibility into application health.

vCOPS has connectors for other components in infrastructure for full overview from a single pane of glass. Log Insight intelligently filters and categorises large quantities of log data. Reducing 65M events to 15 events.

The same templates used for managing VMs on premise are synchronized and available in vCloud Hybrid Service and vice versa.

It is a fundamentally different way than in the past. IT is changing welcome to the next era!

VMware commitment is…

  1. no rip and replace in the datacenter
  2. get more out of the data center.
  3. Build on existing skills.

So lets tear down the world of silo-ed IT and create an One IT team!!

This ends the keynote. Thanks all and have a great VMworld.

Paper: VMware Horizon View Large-Scale Reference Architecture

From (it’s a good blog that you should read!)

VMware has released a paper titled: “VMware Horizon View Large-Scale Reference Architecture“. The paper which contains 30 pages details a reference architecture based on real-world test scenarios, user workloads and infrastructure system configurations. The RA uses the VCE Vblock Specialized System for Extreme Applications, composed of Cisco UCS server blades and EMC XtremIO flash storage, to support a 7,000-user VMware Horizon View 5.2 deployment. Benchmarking was done using the Login VSI Max benchmarking suite.


The paper covers the following topics:

  • Executive Summary
  • Overview
    • VCE Vblock Specialized System for Extreme Applications
    • VMware Horizon View
    • Storage Components
    • Compute and Networking Components
    • Workload Generation and Measurement
  • Test Results
    • Login VSI
    • Timing Tests
    • Storage Capacity
  • System Configurations
    • vSphere Cluster Configurations
    • Networking Configurations
    • Storage Configurations
    • vSphere Configurations
    • Infrastructure and Management Servers
    • Horizon View Configuration
    • EMC XtremIO Storage Configurations


Our test results demonstrate that it is possible to deliver an Ultrabook-quality user experience at scale for every desktop, with headroom for any desktop to burst to thousands of IOPS as required to drive user productivity, thanks to the EMC XtremIO storage platform, which provides considerably higher levels of application performance and lower virtual desktop costs than alternative platforms. The high performance and simplicity of the EMC XtremIO array and the value-added systems integration work provided by VCE as part of the Vblock design contributed significantly to the overall success of the project.