<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VMware Arena</title>
	<atom:link href="https://www.vmwarearena.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vmwarearena.com/</link>
	<description>Reserved Space for Virtualization</description>
	<lastBuildDate>Fri, 07 Feb 2025 06:57:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>NAKIVO Backup &#038; Replication v11.0.1: Expanding Global Reach with Multilingual Support!</title>
		<link>https://www.vmwarearena.com/nakivo-backup-replication-v11-0-1-expanding-global-reach-with-multilingual-support/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nakivo-backup-replication-v11-0-1-expanding-global-reach-with-multilingual-support</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 06:51:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=8015</guid>

					<description><![CDATA[<p>As we are already well aware, NAKIVO Backup &#38; Replication v11 offers comprehensive data protection for virtual, physical, cloud, and SaaS environments. With enhanced features like agentless backup for Proxmox VE, cloud backup for Microsoft 365, and improved NAS backup capabilities, it provides streamlined, secure data management. The update also includes support for new languages, [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/nakivo-backup-replication-v11-0-1-expanding-global-reach-with-multilingual-support/">NAKIVO Backup &amp; Replication v11.0.1: Expanding Global Reach with Multilingual Support!</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size">As we are already well aware, <a href="https://www.nakivo.com/resources/download/trial-download/">NAKIVO Backup &amp; Replication v11</a> offers comprehensive data protection for virtual, physical, cloud, and SaaS environments. With enhanced features like agentless backup for Proxmox VE, cloud backup for Microsoft 365, and improved NAS backup capabilities, it provides streamlined, secure data management. The update also includes support for new languages, enabling broader accessibility for users. Enhanced security features, such as backup encryption and immutability, protect against cyber threats. With faster backup and recovery times, v11 ensures minimal downtime and operational continuity.</p>



<p class="has-medium-font-size">Recently, NAKIVO released the latest update for NAKIVO Backup &amp; Replication v11, now available as   <a href="https://www.nakivo.com/resources/releases/v11.0.1/">Nakivo Backup &amp; Replication V11.0.1</a></p>



<p class="has-large-font-size"><strong>Introducing NAKIVO Backup &amp; Replication v11.0.1 </strong></p>



<p class="has-medium-font-size">Enjoy a more tailored data protection experience with new language options in BETA, including French, German, Italian, Polish, and Chinese, alongside complete support for English and Spanish.</p>



<p class="has-medium-font-size"><strong>Improved Multilingual Support</strong><br>The NAKIVO solution is now accessible in additional languages.<br>Navigate NAKIVO Backup &amp; Replication in the new BETA languages: French, German, Italian, Polish, and Chinese, in addition to full support for English and Spanish.<br>Easily manage backup and recovery tasks without language barriers and reduce training time by using the interface in your preferred language.</p>



<figure class="wp-block-image size-full is-resized"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1.png"><img fetchpriority="high" decoding="async" width="804" height="490" src="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1.png" alt="" class="wp-image-8018" style="aspect-ratio:1.6408163265306122;width:686px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1.png 804w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1-300x183.png 300w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1-768x468.png 768w" sizes="(max-width: 804px) 100vw, 804px" /></a></figure>



<p class="has-medium-font-size"><strong>Enhanced Microsoft 365 Backup Workflows</strong><br>Improve data protection operations with quicker processing times for Microsoft 365 workloads.<br>Rapidly recover lost or corrupted emails, attachments, folders, files, or any other items from backups to minimize downtime and ensure business continuity.</p>



<figure class="wp-block-image size-full is-resized"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-2.png"><img decoding="async" width="722" height="545" src="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-2.png" alt="" class="wp-image-8019" style="aspect-ratio:1.3247706422018348;width:560px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-2.png 722w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image-2-300x226.png 300w" sizes="(max-width: 722px) 100vw, 722px" /></a></figure>



<p class="has-medium-font-size">With the addition of multilingual support and exciting new features, <a href="https://www.nakivo.com/blog/nakivo-backup-and-replication-v11-release/">NAKIVO Backup &amp; Replication v11.0.1 </a>takes data protection to a global level, ensuring seamless, secure, and efficient backup and recovery for users worldwide.</p>
<p>The post <a href="https://www.vmwarearena.com/nakivo-backup-replication-v11-0-1-expanding-global-reach-with-multilingual-support/">NAKIVO Backup &amp; Replication v11.0.1: Expanding Global Reach with Multilingual Support!</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Unlocking the Power of Data Protection: NAKIVO Backup &#038; Replication v11</title>
		<link>https://www.vmwarearena.com/unlocking-the-power-of-data-protection-nakivo-backup-replication-v11/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unlocking-the-power-of-data-protection-nakivo-backup-replication-v11</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sun, 02 Feb 2025 06:18:12 +0000</pubDate>
				<category><![CDATA[Nakivo Backup & Replication]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=8011</guid>

					<description><![CDATA[<p>NAKIVO provides exceptional protection for workloads across physical, virtual, and cloud environments. NAKIVO Backup &#38; Replication offers a quick, dependable, and cost-effective solution for safeguarding business data in virtual, physical, cloud, and SaaS environments. Known for its comprehensive feature set, NAKIVO is recognized for fast recovery times and robust security capabilities. After a successful closed [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/unlocking-the-power-of-data-protection-nakivo-backup-replication-v11/">Unlocking the Power of Data Protection: NAKIVO Backup &amp; Replication v11</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>NAKIVO provides exceptional protection for workloads across physical, virtual, and cloud environments. NAKIVO Backup &amp; Replication offers a quick, dependable, and cost-effective solution for safeguarding business data in virtual, physical, cloud, and SaaS environments. Known for its comprehensive feature set, NAKIVO is recognized for fast recovery times and robust security capabilities.</p>



<p>After a successful closed beta testing phase, N<a href="https://www.nakivo.com/resources/download/trial-download/">AKIVO Backup &amp; Replication version 11</a> is now available for download!</p>



<p>This update brings agentless backup support for Proxmox VE, offering a more efficient method for managing and protecting virtual machine backups. Additionally, it introduces major improvements to the Microsoft 365 and NAS backup functionalities, including cloud backup integration, enhanced ransomware protection, and new features for MSP management.</p>



<p>Get your free trial of NAKIVO Backup &amp; Replication v11 today to explore the latest features in your environment.</p>



<p class="has-large-font-size"><strong>What&#8217;s new with NAKIVO Backup &amp; Replication v11</strong></p>



<p class="has-medium-font-size"><strong>Agentless Backup for Proxmox VE</strong><br>Organizations using Proxmox VE can now safeguard their virtual environments more effectively and with reduced overhead. The solution allows direct VM backups at the host level, eliminating the need for agents on each VM. Incremental backups at the block level are performed using native change-tracking technology, ensuring only modified data blocks are copied.</p>



<p>Backups can be stored on a variety of destinations, including local storage, cloud, and <a href="https://www.nakivo.com/s3-compatible-storage/">S3-compatible services</a>, deduplication appliances, CIFS/NFS shares, or Tape. Additionally, offsite backup copies can be created to support the 3-2-1 or 3-2-1-1 backup strategies for enhanced data availability in all scenarios.</p>



<p>Recovery options include restoring entire Proxmox VMs with full data or quickly recovering individual files and application objects to their original or alternative locations. Immutability can be enabled for both local and cloud backups, or air-gapped backups on tape, to protect against ransomware, with encryption added to prevent unauthorized access during the backup lifecycle.</p>



<p class="has-medium-font-size"><strong>Cloud Backup for Microsoft 365</strong><br><a href="https://www.nakivo.com/microsoft-office-365-backup/">NAKIVO Backup for Microsoft 365</a> reaches a new milestone with the introduction of additional storage options, ransomware-proof backup support, and automated backup tiering.</p>



<p>With version 11, you can back up Microsoft 365 data to local folders as well as cloud platforms like Amazon S3, Wasabi, Azure Blob, and Backblaze B2, along with S3-compatible services, NFS/SMB shares, and deduplication appliances. The ability to create additional backup copies and automate their transfer to various storage destinations—including tape—using job chaining is now available.</p>



<p>This new flexibility allows for easier migration between storage platforms, ensuring better storage utilization and improved data resilience. Immutability is also supported for backups in both local and cloud repositories to safeguard against ransomware, deletion, and modification.</p>



<p class="has-medium-font-size"><strong>NAS Backup</strong><br><a href="https://www.nakivo.com/nas-backup/">NAKIVO NAS Backup</a> offers the ability to back up SMB and NFS file shares located on NAS devices, Windows, and Linux systems. Version 11 expands the backup destination options, allowing backups to be sent to cloud platforms, S3-compatible services, local folders, NFS/SMB shares, and deduplication appliances. Support for backup copy and job chaining is also now available, enabling automatic movement of backups between different storage locations, including tape.</p>



<p>Immutability options are also included for both local and cloud repositories, offering enhanced protection against ransomware and unauthorized deletions, ensuring the durability of file share backups.</p>



<p class="has-medium-font-size"><strong>Source-Side Backup Encryption</strong><br>In response to the rising number of data breaches, NAKIVO version 11 introduces source-side encryption for backups. This allows backups to be encrypted before they are transferred or stored, ensuring the highest level of security. Integration with AWS KMS is supported to mitigate the risk of losing decryption keys.</p>



<p>Self-backups that contain system configurations can also be encrypted, with backups stored across various platforms, including local folders, public cloud services, and S3-compatible storage. For even greater security, combining backup encryption with immutable storage offers stronger protection against cyber threats.</p>



<p class="has-medium-font-size"><strong>Backup from NetApp Storage Snapshots</strong><br>Version 11 enhances the Backup from Storage Snapshots feature by adding support for NetApp FAS and NetApp AFF storage arrays. This feature allows VM backups to be created from storage snapshots rather than regular VM snapshots for supported storage devices like HPE 3PAR, Nimble Storage, Primera, and Alletra. Using storage snapshots minimizes the performance impact on production environments during backup operations.</p>



<p class="has-medium-font-size"><strong>Federated Repository</strong><br>The Federated Repository, introduced in version 11, provides a scalable and flexible backup repository solution. This expandable storage pool consists of multiple standalone repositories, called “members,” that can be added to quickly without complicated configurations. If a repository fails or reaches full capacity, backup operations can continue uninterrupted using other available members, and data can be recovered from accessible recovery points.</p>



<p>This functionality improves storage expansion, resource utilization, and overall backup reliability, creating a more consistent framework for data protection.</p>



<p class="has-medium-font-size"><strong>Tenant Overview Dashboard</strong><br>The Tenant Overview Dashboard in the MSP Console enhances visibility for Managed Service Providers (MSPs) by providing a centralized view of all tenant environments and data protection activities. Version 11 offers real-time insights, such as node status, available resources, scheduled tasks, and inventory details. MSPs can easily manage tenants, resolve issues, and optimize resource and license allocation more efficiently.</p>



<p><strong>Additional Enhancements</strong></p>



<ul class="wp-block-list">
<li><strong>Immutable Storage on NEC HYDRAstor</strong>: Version 11 adds support for the WORM (write-once, read-many) technology in NEC HYDRAstor to create immutable backups, offering enhanced protection against ransomware and other unwanted modifications.</li>



<li><strong>Real-Time Replication BETA for VMware</strong>: The introduction of support for VMware vSphere 8.0 expands the Real-Time ReplicationBETA, allowing for disaster recovery with RPOs as low as 1 second, even when upgrading to vSphere 8.0.</li>



<li><strong>Spanish Interface</strong>: Version 11 is now fully available in Spanish, improving the user experience for Spanish-speaking users across all aspects of the solution.</li>
</ul>



<p><strong>Try NAKIVO Backup &amp; Replication v11 for Free</strong><br>Explore the advanced features of <a href="https://www.nakivo.com/resources/download/trial-download/">NAKIVO Backup &amp; Replication v11</a> with a fully-featured free trial. Install and start using version 11 in minutes to experience its powerful, latest enhancements.</p>



<figure class="wp-block-image size-large"><a href="https://www.nakivo.com/resources/download/trial-download/"><img decoding="async" width="1024" height="316" src="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1024x316.png" alt="" class="wp-image-8013" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/02/image-1024x316.png 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image-300x93.png 300w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image-768x237.png 768w, https://www.vmwarearena.com/wp-content/uploads/2025/02/image.png 1290w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
<p>The post <a href="https://www.vmwarearena.com/unlocking-the-power-of-data-protection-nakivo-backup-replication-v11/">Unlocking the Power of Data Protection: NAKIVO Backup &amp; Replication v11</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Backup vCloud Director Appliance</title>
		<link>https://www.vmwarearena.com/how-to-backup-vcloud-director-appliance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-backup-vcloud-director-appliance</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sun, 19 Jan 2025 16:29:45 +0000</pubDate>
				<category><![CDATA[vCloud Director]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=7998</guid>

					<description><![CDATA[<p>VMware Cloud Director enables cloud providers to design a sophisticated organizational hierarchy through its intuitive user interface, known as the three-tier tenancy model. This model allows providers to create a hierarchical structure consisting of multiple layers, with each layer possessing distinct administrative privileges. Specifically, providers can establish sub-provider organizations, which are autonomous entities that operate [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-backup-vcloud-director-appliance/">How to Backup vCloud Director Appliance</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>VMware Cloud Director enables cloud providers to design a sophisticated organizational hierarchy through its intuitive user interface, known as the three-tier tenancy model. This model allows providers to create a hierarchical structure consisting of multiple layers, with each layer possessing distinct administrative privileges. Specifically, providers can establish sub-provider organizations, which are autonomous entities that operate within a parent organization.</p>



<p>As organizations increasingly migrate their workloads to cloud environments, safeguarding critical data has become paramount. One of the key players in this virtualization arena is VMware vCloud Director (vCD), a powerful platform for managing and automating the provisioning of cloud infrastructure resources. While vCD offers many features geared toward improving efficiency and optimizing resource allocation, its effectiveness can be significantly undermined if data backup strategies are not put in place.</p>



<p>In this article, we will explain the step-by-step procedure to back up the vCloud director Embedded database using vCloud director admin UI and also via CLI.</p>



<p>Log in as <strong>root</strong> to the appliance management UI of the primary, standby, or application cell at https://cell_eth0_ip_address:5480.</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1.jpg"><img decoding="async" width="1024" height="463" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1-1024x463.jpg" alt="" class="wp-image-7999" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1-1024x463.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1-300x136.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1-768x347.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-1.jpg 1421w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Click on the Backup Tab.</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2.jpg"><img decoding="async" width="1024" height="426" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2-1024x426.jpg" alt="" class="wp-image-8000" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2-1024x426.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2-300x125.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2-768x319.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-2.jpg 1427w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>In the left panel, click the <strong>Backup</strong> tab. On the Backup page, you can see a list of previous backups. Click <strong>Backup Now</strong>.</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3.jpg"><img decoding="async" width="1024" height="348" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3-1024x348.jpg" alt="" class="wp-image-8001" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3-1024x348.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3-300x102.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3-768x261.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-3.jpg 1431w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>To confirm the backup, click <strong>Backup</strong>.</p>



<p>VMware Cloud Director appliance creates the backup files in the  <strong>/opt/vmware/vcloud-director/data/transfer/backups directory</strong>. The backups for the earlier VMware Cloud Director versions are located in the <strong>/opt/vmware/vcloud-director/data/transfer/pgdb-backup directory</strong>. However, earlier version backups are incompatible with VMware Cloud Director 10.3.1 and later.</p>



<figure class="wp-block-image size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-4.jpg"><img decoding="async" width="656" height="317" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-4.jpg" alt="" class="wp-image-8002" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-4.jpg 656w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-4-300x145.jpg 300w" sizes="(max-width: 656px) 100vw, 656px" /></a></figure>



<p>When the backup finishes, click <strong>Close</strong>.</p>



<figure class="wp-block-image size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-5.jpg"><img decoding="async" width="650" height="253" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-5.jpg" alt="" class="wp-image-8003" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-5.jpg 650w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-5-300x117.jpg 300w" sizes="(max-width: 650px) 100vw, 650px" /></a></figure>



<p>The newly created file appears in the list of backups. The backup name is in the format  backup-date-<var>time</var>&#8211;<var>format</var>.tgz. For VMware Cloud Director appliance 10.3.2 and later, the backup name is in the format backup-date-<var>time</var>&#8211;<var>format</var>.zip.</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8.jpg"><img decoding="async" width="1024" height="480" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8-1024x480.jpg" alt="" class="wp-image-8006" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8-1024x480.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8-300x141.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8-768x360.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-8.jpg 1428w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can also Initiate the backup via CLI by logging into one of the cloud cells, preferably the primary cell node. CD into <strong>/opt/vmware/appliance/bin</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6.jpg"><img decoding="async" width="1024" height="272" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6-1024x272.jpg" alt="" class="wp-image-8004" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6-1024x272.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6-300x80.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6-768x204.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-6.jpg 1208w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Type the command to run the backup script in the vCloud director</p>



<p><strong>./create-backup.sh</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7.jpg"><img decoding="async" width="1024" height="566" src="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7-1024x566.jpg" alt="" class="wp-image-8005" srcset="https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7-1024x566.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7-300x166.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7-768x425.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2025/01/How-to-backup-vcloud-director-cells-7.jpg 1302w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>That&#8217;s it. We have gone through the two different methods to back up the vCloud director via admin UI and also via Shell. I hope this is informative for you. Thanks for Reading!!. Be social and share it on social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-backup-vcloud-director-appliance/">How to Backup vCloud Director Appliance</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Repair a Corrupt Exchange Database?</title>
		<link>https://www.vmwarearena.com/how-to-repair-a-corrupt-exchange-database/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-repair-a-corrupt-exchange-database</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Fri, 17 Jan 2025 05:13:16 +0000</pubDate>
				<category><![CDATA[Stellar Repair for Exchange]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=7994</guid>

					<description><![CDATA[<p>Exchange Server heavily dependent on the Active Directory as all the configuration is stored in the Active Directory Schema. On the other hand, all the users’ data and other important items are stored in the Exchange Database (EDB) file. In addition, the Exchange Server uses Transaction Logs to temporarily hold information, until it is committed [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-repair-a-corrupt-exchange-database/">How to Repair a Corrupt Exchange Database?</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>Exchange Server heavily dependent on the Active Directory as all the configuration is stored in the Active Directory Schema. On the other hand, all the users’ data and other important items are stored in the Exchange Database (EDB) file. In addition, the Exchange Server uses Transaction Logs to temporarily hold information, until it is committed to the database. The transaction log files act as a buffer between the database and the requests from users or systems. If the transaction log files get damaged/corrupted or one of the files is missing, then the database will not be able to mount and the state of the database will be marked as Dirty Shutdown. Until the state is changed to Clean Shutdown, the Exchange Server will not allow you to mount the database, resulting in users not being able to access their mailboxes.</p>



<p>Some other factors or reasons, like human errors, sudden loss of power, malware infection, natural disasters, etc. can also damage your database. In such situations, restoring the database from backup would fix the problem but you will suffer data loss from when the backup was executed to when the issue has occurred. Another option is to repair the corrupted database. In this article, we will be going through the process of repairing the corrupt database in the Exchange Server setup.</p>



<p class="has-large-font-size"><strong>How to Repair the Corrupt Database In Exchange Server?</strong></p>



<p>In Exchange Server, the Extensible Storage Engine Utilities (ESEUtil) is a command-line tool that is used to check the database integrity and repair the databases. You can use the ESEUtil commands to repair an Exchange Server database or salvage the data. Let see the step-by-step process.</p>



<p class="has-medium-font-size"><strong>Step 1: Locate the Scripts and Commands</strong><strong></strong></p>



<p>You need to first locate the scripts and commands. Usually, the location is <strong>&lt;Exchange Server installation folder>\V15\Bin. </strong>If the installation is at the default path, open a command prompt with administrator privileges and run the following command.</p>



<p><strong>cd &#8220;C:\Program Files\Microsoft\Exchange Server\V15\Bin&#8221;</strong></p>



<p class="has-medium-font-size"><strong>Step 2: Check the Database Status</strong><strong></strong></p>



<p>Next, you need to check the status of the database by using the <strong>MH</strong> switch with the <a href="https://www.stellarinfo.com/blog/how-to-use-eseutil-for-exchange-database-repair/" target="_blank" rel="noreferrer noopener"><u>ESEUtil command</u></a> as given below:</p>



<p><strong>eseutil /mh &#8220;M:\ExchangeDatabases\mydatabase.edb&#8221;</strong></p>



<p><strong>Note:</strong>&nbsp;Replace the path in parenthesis with the path of your Exchange Server database.</p>



<p>If the database or the supporting files are damaged, you should see the <strong>State</strong>&nbsp;as <strong>Dirty</strong>&nbsp;<strong>Shutdown</strong>. This means that the database needs to be repaired as it is not healthy to operate.</p>



<p class="has-medium-font-size"><strong>Step 3: Perform Database Recovery</strong><strong></strong></p>



<p>There are two repair options &#8211; Soft Recovery and Hard Recovery. Soft Recovery is used in cases of small corruption issues in the database. This will try to restore the database to a consistent state without any data loss. To perform soft recovery, you can run the ESEUtil command with the <strong>R</strong>&nbsp;switch (see the below example).</p>



<p><strong>eseutil /R &#8220;M:\ExchangeDatabases\mydatabase.edb&#8221;</strong></p>



<p>Once the recovery process is completed, you can rerun the command with the <strong>MH</strong>&nbsp;switch to check the database state. If it shows the <strong>State</strong>&nbsp;as <strong>Clean</strong>&nbsp;<strong>Shutdown</strong>, then you can go ahead and mount the database.</p>



<p>If the above fails, you need to perform the hard recovery. However, you need to remember that the hard recovery process results in data loss. In hard recovery, anything which is deemed as corrupted will be purged from the database and there might be false positives. Depending on the damage, there will be data loss. So, it is important to backup the database before performing such operation.<strong>&nbsp;</strong><strong></strong></p>



<p>In addition, you need to have enough storage space (almost double) available as this operation creates a new database and you might end up with no space on the server. The operation will take some time to finish and cannot be stopped once started.</p>



<p>To perform hard recovery, execute the ESEUtil command using the <strong>P</strong>&nbsp;switch (see the below example).</p>



<p><strong>eseutil /P &#8220;M:\ExchangeDatabases\mydatabase.edb&#8221;</strong></p>



<p>When you execute the command, you will get a warning of data loss. You need to accept the data loss to proceed with the operation. After the process is complete, run the command with the <strong>MH</strong>&nbsp;switch to check the <strong>state</strong>&nbsp;of database. Mount the database if it is in <strong>Healthy</strong>&nbsp;<strong>Shutdown state</strong>.</p>



<p>After a successful repair of the database, it is suggested to create a new database and move all the mailboxes to the new database.</p>



<p class="has-medium-font-size"><strong>An Easy and Quick Solution to Repair Corrupt Exchange Database</strong></p>



<p>When a situation arises, there is a lot of pressure on Exchange admins to get the services up and running within minimal downtime and no data loss. This means that every minute and every email counts for the business continuity. For quick recovery of data, you can rely on specialized <a href="https://www.stellarinfo.com/edb-exchange-server-recovery.htm" target="_blank" rel="noreferrer noopener"><u>Exchange database recovery software</u></a>, such as Stellar Repair for Exchange<strong>.</strong> This tool is renowned for its performance and compatibility. It allows you to directly open Exchange Server databases from any version, of any size, and in any state. After a quick/deep scan, you will be able to view the entire structure of the database and then granularly export the recovered data to PST and other file formats. You can also use the tool to directly export the recovered user mailboxes, shared mailboxes, user archives, disabled mailboxes, purged/deleted items, and public folders, to a live Exchange Server database or Microsoft 365 tenant. This helps reduce the recovery time, while ensuring no data loss.</p>



<p class="has-medium-font-size"><strong>Best Practices to Follow</strong></p>



<ul class="wp-block-list">
<li>Before attempting to repair any database, it is imperative to take its backup.</li>



<li>Always check the Event Viewer to find out where the problem is.</li>



<li>Daily backups should be used to ensure that the transaction logs are committed. This helps reduce the risk of corruption and increase the chances of recoverability.</li>



<li>Monitor the services, operating system, performance, and storage of the server. This helps find the issue before more damage is caused.</li>



<li>Ensure that you have the right tools in hand that can help meet the company’s RPO and RTO and restore the services with minimal impact.</li>



<li>Set up Database Availability Groups (DAG) to ensure business resilience and disaster recovery.</li>
</ul>



<p class="has-medium-font-size"><strong>Conclusion</strong></p>



<p>Above, we have explained the process of repairing a corrupt database using the ESEUtil commands in the Exchange Server. This is a delicate process which would need precision. In addition, there are chances of data loss when performing hard recovery on the database. As an alternative solution, you can use an Exchange repair tool, like Stellar Repair for Exchange. This tool can easily repair the corrupt database and recover all the mailboxes and other items without any data loss. It can also export the recovered mailboxes and other items to a live Exchange database or Office 365 (Microsoft) account.</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-repair-a-corrupt-exchange-database/">How to Repair a Corrupt Exchange Database?</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Back-Up Proxmox VM with NAKIVO Backup &#038; Replication</title>
		<link>https://www.vmwarearena.com/back-up-proxmox-vm-with-nakivo-backup-replication/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=back-up-proxmox-vm-with-nakivo-backup-replication</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Wed, 20 Mar 2024 13:49:56 +0000</pubDate>
				<category><![CDATA[Nakivo Backup & Replication]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=7983</guid>

					<description><![CDATA[<p>NAKIVO delivers an unprecedented level of protection for workloads in physical, virtual, and cloud environments. NAKIVO Backup &#38; Replication is a fast, reliable, and affordable solution for business data protection in virtual, physical, cloud, and SaaS environments. Nakivo is known for its rich feature sets such as faster recovery and its security features. Proxmox Virtual Environment (VE) is [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/back-up-proxmox-vm-with-nakivo-backup-replication/">Back-Up Proxmox VM with NAKIVO Backup &#038; Replication</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://www.nakivo.com/" target="_blank" rel="noreferrer noopener">NAKIVO</a> delivers an unprecedented level of protection for workloads in physical, virtual, and cloud environments. NAKIVO Backup &amp; Replication is a fast, reliable, and affordable solution for business data protection in virtual, physical, cloud, and SaaS environments. Nakivo is known for its rich feature sets such as faster recovery and its security features.</p>



<p>Proxmox Virtual Environment (VE) is a free, open-source virtualization management platform based on Debian Linux with a custom kernel. This solution fully integrates the KVM hypervisor, allowing users to deploy and manage virtual machines via a user-friendly GUI web interface.</p>



<p>Proxmox comes with Proxmox Backup Server, a native tool to back up virtual machines. However, you may need to use advanced backup/recovery features such as direct backup to the cloud, application-aware backup, flexible scheduling and retention, immutability, granular recovery, etc. Moreover, in hybrid and mixed environments, it is easier to use a single third-party backup solution like NAKIVO Backup &amp; Replication to manage all data protection activities from a centralized interface.</p>



<p>Nakivo Backup &amp; Replication now supports <a href="https://www.nakivo.com/proxmox-backup/">Backup for Proxmox VE</a> as well along with other industry-leading virtualization platforms like VMware, Hyper-V, Nutanix AHV.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-ProxMox.jpg"><img decoding="async" width="343" height="405" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-ProxMox.jpg" alt="" class="wp-image-7985" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-ProxMox.jpg 343w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-ProxMox-254x300.jpg 254w" sizes="(max-width: 343px) 100vw, 343px" /></a></figure>
</div>


<p class="has-large-font-size"><strong>Powerful Proxmox VE Backup Solution by NAKIVO</strong></p>



<p>With Nakivo Porxmox backup solution, you can protect your VM data and ensure business continuity with reliable, fast and agent-based Proxmox backup and recovery from NAKIVO with below features:</p>



<ul class="wp-block-list">
<li>Full and instant object recovery</li>



<li>Ransomware resilience</li>



<li>Affordable subscription and perpetual licenses</li>



<li>Top-rated solution on review platforms</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-Proxmox-benefits.jpg"><img decoding="async" width="275" height="698" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-Proxmox-benefits.jpg" alt="" class="wp-image-7987" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-Proxmox-benefits.jpg 275w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Nakivo-Proxmox-benefits-118x300.jpg 118w" sizes="(max-width: 275px) 100vw, 275px" /></a></figure>
</div>


<p>NAKIVO Backup &amp; Replication provides reliable agent-based backup, instant granular recovery and ransomware protection for Proxmox VM data. With flexible storage and retention options, strong security controls and excellent performance, the solution helps you keep critical data protected and available at all times.</p>



<p>Nakivo Backup &amp; Replication for Proxmox provides comprehensive protection with handfull of below benefits:</p>



<p><strong>Efficient, agent-based backups</strong><br>Perform agent-based incremental backups of Proxmox VM data to improve transfer speed and save storage space. After an initial full backup, only data that has changed since the last backup cycle is copied in subsequent backup runs.</p>



<p><strong>Application support</strong></p>



<p>Ensure data consistency for applications and databases (e.g., Microsoft SQL Server, Exchange Server, Active Directory) with app-aware backup processing.</p>



<p><strong>Flexible retention</strong><br>Create hundreds of recovery points and rotate them daily, weekly, monthly or yearly, or based on a custom period.</p>



<p><strong>Diverse storage targets</strong><br>Send Proxmox VM data backups to local repositories, public clouds, S3-compatible storage, NAS and tape.</p>



<p><strong>Direct backup to cloud</strong><br>Transfer backups directly to public cloud platforms like Amazon S3, Wasabi, Azure Blob and Backblaze B2 and other S3-compatible storage targets.</p>



<p><strong>Ransomware protection</strong><br>Enable immutability for VM data backups stored in local and cloud-based repositories to protect against unwanted modification and ransomware encryption.</p>



<p><strong>Malware detection</strong><br>Check backups for viruses and ransomware before recovering the data to isolate potential threats.</p>



<p><br>Impressed with the feature set of Nakivo Backup and Replication for ProxMox? What&#8217;s Next? I would recommend downloading <a href="https://www.nakivo.com/resources/download/trial-download/">Nakivo Backup &amp; Replication for ProxMox</a> and trialing the new feature sets of Nakivo Backup and Replication for ProxMox VM. I hope this is informative for you. Thanks for Reading. Be social and share it on social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/back-up-proxmox-vm-with-nakivo-backup-replication/">Back-Up Proxmox VM with NAKIVO Backup &#038; Replication</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remove USB Controller from the VMware Virtual Machine &#8211; PowerCLI Script</title>
		<link>https://www.vmwarearena.com/remove-usb-controller-from-the-vmware-virtual-machine/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=remove-usb-controller-from-the-vmware-virtual-machine</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sun, 10 Mar 2024 09:16:40 +0000</pubDate>
				<category><![CDATA[PowerCLI Scripts]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=7965</guid>

					<description><![CDATA[<p>VMware has released mutiple vulnerabilities in VMware ESXi, Workstation, and Fusion ((CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255) recently that was privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products. The individual vulnerabilities documented on this VMSA for ESXi have severity Important but combining these issues will result in Critical severity. Known [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/remove-usb-controller-from-the-vmware-virtual-machine/">Remove USB Controller from the VMware Virtual Machine &#8211; PowerCLI Script</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>VMware has released mutiple vulnerabilities in VMware ESXi, Workstation, and Fusion ((CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255) recently that was privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products. The individual vulnerabilities documented on this VMSA for ESXi have severity Important but combining these issues will result in Critical severity.</p>



<p><strong>Known Attack Vectors</strong></p>



<p>A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine&#8217;s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.</p>



<p>VMWare also released a Response Matrix for these vulnerabilities, which includes Fixed Version and Workarounds.  It is always good to upgrade and patch our systems to fix any vulnerabilities. However, In some cases, applying a workaround would also give us an option to remediate the reported vulnerabilities.</p>



<p><strong>Response Matrix</strong></p>



<figure class="wp-block-image size-large is-resized"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility.jpg"><img decoding="async" width="1024" height="441" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility-1024x441.jpg" alt="" class="wp-image-7967" style="aspect-ratio:2.3219954648526078;width:840px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility-1024x441.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility-300x129.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility-768x331.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility-1536x662.jpg 1536w, https://www.vmwarearena.com/wp-content/uploads/2024/03/VMware-Vulnerbaility.jpg 1595w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-medium-font-size"><strong>Steps to remove a USB controller from a VMware ESXi virtual machine</strong></p>



<p>ESXi&nbsp;host supports the hot-removal of a USB controller, the guest operating system of the virtual machine must also support the hot-removal functionality. In the event that the guest operating system does not support hot removal of a USB controller, then the VM will need to be powered off.</p>



<p><br>In addition, please ensure that the USB controller is not in-use prior to removing it from the virtual machine.The vSphere UI (vCenter Server, ESXi Embedded Host Client) only allows for the configuration of virtual USB 2.0 or virtual USB 3.0 controllers in VMs.</p>



<p><br>When a virtual USB 2.0 controller is added to a VM in vSphere, both a virtual USB 1.1 AND a virtual USB 2.0 controller are added to the VM by default.<br>Removing the virtual USB 2.0 controller will also remove the virtual USB 1.1 controller from the VM.</p>



<p class="has-medium-font-size"><strong><mark style="background-color:rgba(0, 0, 0, 0);color:#746161" class="has-inline-color">Remove USB Controller from vSphere UI</mark></strong></p>



<p>1) Ensure that the USB controller is not in use</p>



<p><em>2) </em>Power off the Virtual machine (If required &#8211; No requirement to power off if the guestOS supports hot removal&#8221;</p>



<p>3)&nbsp;Right-click the virtual machine and click &#8220;<strong>Edit Settings</strong>&#8220;.</p>



<p>4)&nbsp;Remove all USB controllers from the VM.&nbsp;</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine.jpg"><img decoding="async" width="1024" height="692" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine-1024x692.jpg" alt="" class="wp-image-7968" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine-1024x692.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine-300x203.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine-768x519.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Remove-USB-Controller-from-Virtual-machine.jpg 1073w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-medium-font-size"><strong><mark style="background-color:rgba(0, 0, 0, 0);color:#534e4d" class="has-inline-color">PowerCLI command to get list of VM&#8217;s attached with USB Controller</mark></strong></p>



<p>Below Powercli command can be used to list all the virtual machines with a USB controller.<br>Any VM reported should be investigated to determine if it can be safely removed</p>



<p><strong>Get-VM | ?{$_.ExtensionData.Config.Hardware.Device.DeviceInfo.Label -match &#8220;USB&#8221;}</strong></p>



<figure class="wp-block-image size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Get-list-of-VMs-attached-with-USB-Controller.jpg"><img decoding="async" width="892" height="166" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Get-list-of-VMs-attached-with-USB-Controller.jpg" alt="" class="wp-image-7970" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Get-list-of-VMs-attached-with-USB-Controller.jpg 892w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Get-list-of-VMs-attached-with-USB-Controller-300x56.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Get-list-of-VMs-attached-with-USB-Controller-768x143.jpg 768w" sizes="(max-width: 892px) 100vw, 892px" /></a></figure>



<p class="has-medium-font-size"><strong><mark style="background-color:rgba(0, 0, 0, 0);color:#504848" class="has-inline-color">PowerCLI Script to Remove USB Controller from the VM list</mark></strong></p>



<p>With <a href="https://kb.vmware.com/s/article/87617">VMware KB 87617</a>, Provided the powercli script to remove the USB controller from all VMs in specific vCenter Server. You can use the script in the KB article to remove the USB controller from all VMs in the Specific script. </p>



<p>In the majority of the production environment, We will not be able to remove the USB controller from all VMs at the same time. Either we might have to go by customer-by-customer VMs or by cluster or even only for the specific list of the VMs provided by some input file. I have a use case to remove USB controllers from VMs only belonging to specific customers. In that case, I can specify the VM list that belongs to a specific customer in the text file. So below script will only remove the USB controller from the provided list of VMs input via text file in the specific vCenter server.</p>



<p></p>



<pre class="wp-block-code"><code>#Script To Remove USB controller from Virtual Machines
#
 
#Import PowerCLI modules
Add-PSSnapIn VMware* -ErrorAction SilentlyContinue
$ErrorActionPreference = "Stop"
$errresult = 0


#VC FQDN or IP Address variable
#$VCFQDN = "x.x.x.x"
$VCFQDN = Read-Host -Prompt "`nPlease enter vCenter Server IP or FQDN"

#Array to store results
$USBFinalCheck = @()

#Result files names
$FinalResultFilename = "C:\Temp\USB_Controller_Final_Result.csv"

#Read Credentials and Connect to vCenter Server
if (Test-Connection $VCFQDN -Count 1 -ErrorAction SilentlyContinue)
{
    $VCCredentials = Get-Credential -Message "Please Enter User Name and Password which has Administrator permission on vCenter Server" -UserName Administrator@vsphere.local
    Connect-VIServer -Server $VCFQDN -Credential $VCCredentials
}
else
{
    write-host "VC FQDN or IP is Not Reachable, please retry with right entry"
    Exit
}

# Get all VMs with a USB controller
<em><strong>$VMlist = Get-Content "vmname.txt"</strong></em>
$VMs = Get-VM <strong>$vmlist</strong> | ? {$_.ExtensionData.Config.Hardware.Device.DeviceInfo.Label -match "USB"}

$ListofConnectedVMs = 0

# Identify the number of Connected VMs with USB Controller
$VMs | % { 
       
            if ($_.ExtensionData.Runtime.ConnectionState -eq "connected")
            {
                $ListofConnectedVMs = $ListofConnectedVMs+1
            } 
         }

# User Confirmation to remove the USB Controllers
$Confirmation = Read-Host -Prompt "`nScript will remove USB Controller from $ListofConnectedVMs VMs, please confirm with ('Y or Yes') to continue ?"

if ($Confirmation -eq "y" -or $Confirmation -eq "Y" -or $Confirmation -eq "Yes" -or $Confirmation -eq "yes" -or $Confirmation -eq "YES" )
{
    echo "`nContinuing with the Script Execution as per user selection"    
}
else
{
    echo "`nTerminating the script based on user selection"
    exit
}

#Now loop through that list and remove the controller from the VM
foreach ($vmx in $VMs)
{
    if ($vmx.ExtensionData.Runtime.ConnectionState -eq "connected")
    {
        echo "Found VM $vmx with USB Controller"

        $vmxv = $vmx | Get-View
        $vmxv.Config.Hardware.Device | where {$_.DeviceInfo.Label -match "USB"} | %{
            $myObj = "" | select Dev
            $myObj.Dev = $_
            $vmConfigSpec = New-Object VMware.Vim.VirtualMachineConfigSpec
            $vmConfigSpec.DeviceChange += New-Object VMware.Vim.VirtualDeviceConfigSpec
            $vmConfigSpec.DeviceChange&#91;-1].device = $myObj.Dev
            $vmConfigSpec.DeviceChange&#91;-1].operation = "remove"
            sleep 5
            Write-Host "Removing USB Device From $vmx`n"
			Try 
			{
			$vmxv.ReconfigVM($vmConfigSpec)
			}
			Catch
			{
			$_.exception.message
			$errresult = 1
			Write-Host "Error removing USB controller from $vmx`n*******************************`n"
			} 
			
			If ($errresult -ne 1)
			{
			Write-Host "Removed USB controller from $vmx`n*******************************`n"
			}
			$errresult = 0
			sleep 5
         }
    }
}

Write-Host "`nVerifying the USB Controller Status on Virtual Machines"

#Verification of USB Controller post removal task
sleep 10
$VMs = Get-VM

foreach ($vmx in $VMs)
{
    $USBResult = new-object PSObject
    $USBResult | add-member -type NoteProperty -Name VMName -Value $vmx.Name
    $USBResult | add-member -type NoteProperty -Name VMStatus -Value $vmx.ExtensionData.Runtime.ConnectionState
    
    if ($vmx.ExtensionData.Runtime.ConnectionState -eq "connected")
    {
        if ($vmx.ExtensionData.Config.Hardware.Device.DeviceInfo.Label -match "USB")
        {
            $USBResult | add-member -type NoteProperty -Name USB_Controller_Status -Value "Virtual Machine Has a USB controller configured"
        }
        else
        {
            $USBResult | add-member -type NoteProperty -Name USB_Controller_Status -Value "No USB Controller configured"
        }
    }
    else
    {
        $USBResult | add-member -type NoteProperty -Name USB_Controller_Status -Value "Not Checked (VM Not in Connected State)"
    }
    
    $USBFinalCheck+=$USBResult
}

try
{
    $USBFinalCheck | export-csv $FinalResultFilename -notype -ErrorAction Stop
    Write-Host "`nPlease check the verification result of VMs with USB Controller - " $FinalResultFilename
}

catch
{
    $ResultFilename = "USB_Controller_Verification_Result" + (Get-Date).tostring("dd-MM-yyyy-hh-mm-ss") + ".csv"
    $USBFinalCheck | export-csv $ResultFilename -notype
    $result = Get-Item $ResultFilename
    Write-Host "`nPlease check the verification result of VMs with USB Controller - " $result.fullname
}</code></pre>



<p></p>



<p class="has-medium-font-size"><strong>How to Run the Powercli Script to Remove the USB Controller from the VM list</strong>?</p>



<ol class="wp-block-list">
<li>Save the list of the VM&#8217;s in the text file named &#8220;vmname.txt&#8221; in the same directory as your powercli script is located</li>
</ol>



<figure class="wp-block-image size-full"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-input-file.jpg"><img decoding="async" width="304" height="214" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-input-file.jpg" alt="" class="wp-image-7972" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-input-file.jpg 304w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-input-file-300x211.jpg 300w" sizes="(max-width: 304px) 100vw, 304px" /></a></figure>



<p>2. Save the powercli script as &#8220;Remove_USBController_Vmlist.ps1&#8221;  and Run the Powercli script.</p>



<p>3. It will ask to enter the vCenter Server IP or FQDN address and &nbsp;Prompt the user to allow for the USB controllers to be removed</p>



<p>4. Find all virtual machines with a USB controller and attempt to remove the USB controller from the virtual machines</p>



<p><br>5. Review the environment and provide a CSV file output detailing whether a virtual machine has a USB controller or not</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM.jpg"><img decoding="async" width="1024" height="521" src="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-1024x521.jpg" alt="" class="wp-image-7973" srcset="https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-1024x521.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-300x153.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM-768x391.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2024/03/Powercli-Script-Remove-USB-controller-from-VM.jpg 1256w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>I hope this is informative for you. This post will help you with automation steps to remove the USB controller from the list of virtual machines. Thanks for Reading. Be social and share it with social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/remove-usb-controller-from-the-vmware-virtual-machine/">Remove USB Controller from the VMware Virtual Machine &#8211; PowerCLI Script</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Replace a Faulty NSX-T Edge Node in Edge Cluster</title>
		<link>https://www.vmwarearena.com/how-to-replace-a-faulty-nsx-t-edge-node-in-edge-cluster/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-replace-a-faulty-nsx-t-edge-node-in-edge-cluster</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sun, 15 Oct 2023 09:46:01 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.vmwarearena.com/?p=7938</guid>

					<description><![CDATA[<p>NSX Edge nodes can be virtual appliances or Bare metal instances. NSX-T Edge nodes are service appliances with pools of capacity, dedicated to running network services that cannot be distributed to the hypervisors.The NSX-T Edge appliance provides routing services and connectivity (North-South) to networks that are external to the NSX-T environment. An NSX Edge is [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-replace-a-faulty-nsx-t-edge-node-in-edge-cluster/">How to Replace a Faulty NSX-T Edge Node in Edge Cluster</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>NSX Edge nodes can be virtual appliances or Bare metal instances. NSX-T Edge nodes are service appliances with pools of capacity, dedicated to running network services that cannot be distributed to the hypervisors.<br>The NSX-T Edge appliance provides routing services and connectivity (North-South) to networks that are external to the NSX-T environment. An NSX Edge is required if you want to deploy a tier-0 router or a tier-1 router with stateful services such as NAT, DHCP Server, Edge Firewall, etc.</p>



<p>NSX Edges provides routing services and connectivity to networks that are external to the NSX-T deployment. You use an NSX-T Edge for establishing external connectivity from the NSX-T domain by using a Tier-0 router using BGP or static routing.</p>



<p style="font-size:23px"><strong>How to Replace Faulty NSX-T Edge Node in Edge Cluster</strong></p>



<p>Recently I came across a situation in one of my production environments, The Customer has a Tier-0 gateway and edge cluster associated with it. My Tier-0 is Active -Passive node. We noticed an issue of all TCP packets failing when the traffic goes through one of the edge nodes. </p>



<p>To identify the issue, We have manually powered off the active edge node of the Tier-0 gateway. You can take a look at my article <a href="https://www.vmwarearena.com/identify-the-active-edge-node-of-nsx-t-tier-0-tier-1-gateway/">How to Identify the Active Edge Node of NSX-T Tier-0/Tier-1 Gateway</a></p>



<p>Other Edge node in the edge cluster became active and everything started working. No issues were found. This behavior is only observed when the faulty edge node becomes Active. We did involve VMware support for the same. They also suggested replacing the faulty edge node with the new node.</p>



<p>In this article, I will explain to you the detailed step-by-step procedure to replace the faulty NSX-T edge node in the Edge cluster.</p>



<p><em><strong>Note: If the NSX Edge node to be replaced is not running, the new NSX Edge node can have the same name, management IP address, and TEP IP address. If the NSX Edge node to be replaced is running, the new NSX Edge node must have a different name, management IP address and TEP IP address.</strong></em></p>



<p>In my case, My faulty edge node is edgenode-02a which is currently up and running. So I have deployed the edgenode-03a with the same configuration as edgenode2a but with a different name, Management IP, and TEP IP (Auto assigned by IP Pool).</p>



<figure class="wp-block-image size-large"><a href="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node.jpg"><img decoding="async" width="1024" height="533" src="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-1024x533.jpg" alt="" class="wp-image-7956" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-1024x533.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-300x156.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-768x400.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node.jpg 1185w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can also verify the edge nodes under Fabric -> Node -> Edge Transport Nodes which are part of the Edge cluster. In my case , <strong>Edgenode01a</strong> and <strong>02a</strong> is part of the edge cluster &#8220;<strong>EdgeCluster-01a&#8221;</strong></p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3.jpg"><img decoding="async" width="1024" height="274" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3-1024x274.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7942" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3-1024x274.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3-300x80.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3-768x205.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-3.jpg 1501w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can also validate the same from the Edge cluster view. Expand fabric -> Edge Clusters -> Click cluster name. It will show the transport node (edge nodes) part of this edge cluster.</p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4.jpg"><img decoding="async" width="1024" height="283" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4-1024x283.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7943" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4-1024x283.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4-300x83.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4-768x212.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-4.jpg 1209w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Before replacing the faulty edge with a new node, We have to place the faulty edge node &#8220;edgenode-02a&#8221; into NSX Maintenance Mode. </p>



<p>To place the NSX-T edge node into maintenance mode, Select the NSX-T Edge node -> Select <strong>&#8220;Enter NSX Maintenance Mode</strong>&#8221; under actions</p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5.jpg"><img decoding="async" width="1024" height="286" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5-1024x286.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7944" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5-1024x286.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5-300x84.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5-768x215.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-5.jpg 1414w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Click YES to confirm to keep the edge node &#8221; edgenode-02a&#8221; in NSX Maintenance Mode.</p>



<figure class="wp-block-image size-full is-resized"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-6.jpg"><img decoding="async" width="296" height="141" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-6.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7945" style="aspect-ratio:2.099290780141844;width:840px;height:auto"/></a></figure>



<p>Faulty edge node <strong>edgenode-02a </strong>is entered into &#8220;NSX Maintenance Mode&#8221; and Node status is showing as &#8220;Down&#8221; as well.</p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7.jpg"><img decoding="async" width="1024" height="235" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7-1024x235.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7946" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7-1024x235.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7-300x69.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7-768x176.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-7.jpg 1299w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>To replace the faulty edge node. Go to the Edge cluster from <strong>System -> Fabric ->Edge Cluster -> Select the Edge cluster &#8220;EdgeCluster-01a&#8221;</strong>. </p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8.jpg"><img decoding="async" width="1024" height="299" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8-1024x299.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7947" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8-1024x299.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8-300x88.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8-768x224.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-8.jpg 1237w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Select <strong>Replace Edge Cluster Member</strong> under Actions.</p>



<figure class="wp-block-image size-full is-resized"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-9.jpg"><img decoding="async" width="760" height="185" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-9.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7948" style="aspect-ratio:4.108108108108108;width:840px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-9.jpg 760w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-9-300x73.jpg 300w" sizes="(max-width: 760px) 100vw, 760px" /></a></figure>



<p>Select the faulty NSX-T edge node from the drop-down under the Replace option. In my case, select  <strong>Edgenode-02a</strong>.</p>



<figure class="wp-block-image size-full is-resized"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-10.jpg"><img decoding="async" width="634" height="230" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-10.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7949" style="aspect-ratio:2.756521739130435;width:840px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-10.jpg 634w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-10-300x109.jpg 300w" sizes="(max-width: 634px) 100vw, 634px" /></a></figure>



<p>Select the newly deployed edge node from the drop-down under <strong>With</strong> Option. In my case, my newly deployed edge node is <strong>edgnode-03a</strong> and click <strong>Save.</strong></p>



<figure class="wp-block-image size-full is-resized"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-11.jpg"><img decoding="async" width="638" height="240" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-11.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7950" style="aspect-ratio:2.658333333333333;width:849px;height:auto" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-11.jpg 638w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-11-300x113.jpg 300w" sizes="(max-width: 638px) 100vw, 638px" /></a></figure>



<p>After the edge node replacement, edge node <strong>edgnode-01a</strong> and <strong>edgenode-03a</strong> is part of the edge cluster &#8220;Edgecluster-01a&#8221; now and Tunnel is up and also Node status also became UP.</p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12.jpg"><img decoding="async" width="1024" height="205" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12-1024x205.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7951" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12-1024x205.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12-300x60.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12-768x153.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-12.jpg 1286w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>You can also validate the edge cluster members from the edge cluster view. Now edge cluster members are <strong>edgnode-01a</strong> and <strong>edgenode-03a</strong>.</p>



<figure class="wp-block-image size-large"><a href="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13.jpg"><img decoding="async" width="1024" height="281" src="http://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13-1024x281.jpg" alt="Replace Faulty NSX-T Edge Node" class="wp-image-7952" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13-1024x281.jpg 1024w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13-300x82.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13-768x211.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/10/Replace-Faulty-NSX-T-Edge-Node-13.jpg 1070w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Post Faulty Edge node replacement, you can also validate the traffic and Tier-0 gateway status. In my case, Everything turned be healthy.  That&#8217;s it. We are done with replacing the faulty NSX-T edge node in the Edge cluster.</p>



<p>You can also watch the detailed step-by-step video on How to Replace the Faulty NSX-T Edge node in the NSX-T edge cluster from my YouTube channel.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="How to Replace Faulty NSX T Edge node in NSX-T Edge cluster #vmware#vmwarensx #vmwaretroubleshooting" width="640" height="360" src="https://www.youtube.com/embed/gT14A7NXo-s?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>I hope this is informative for you. Thanks for Reading!!. Be social and share it with social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/how-to-replace-a-faulty-nsx-t-edge-node-in-edge-cluster/">How to Replace a Faulty NSX-T Edge Node in Edge Cluster</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Identify the Active Edge Node of NSX-T Tier-0/Tier-1 Gateway</title>
		<link>https://www.vmwarearena.com/identify-the-active-edge-node-of-nsx-t-tier-0-tier-1-gateway/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=identify-the-active-edge-node-of-nsx-t-tier-0-tier-1-gateway</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sat, 07 Oct 2023 16:55:19 +0000</pubDate>
				<category><![CDATA[NSX-T Series]]></category>
		<category><![CDATA[Troubleshooting]]></category>
		<guid isPermaLink="false">http://www.vmwarearena.com/?p=7915</guid>

					<description><![CDATA[<p>NSX-T Edge Nodes are service appliances dedicated to running centralized network services that cannot be distributed to the hypervisors. They can be instantiated as a bare metal appliance or a virtual machine form factor. They are grouped in one or several clusters. Each cluster represents a pool of capacity. A multi-node edge cluster of NSX Edges [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/identify-the-active-edge-node-of-nsx-t-tier-0-tier-1-gateway/">How to Identify the Active Edge Node of NSX-T Tier-0/Tier-1 Gateway</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NSX-T Edge Nodes are service appliances dedicated to running centralized network services that cannot be distributed to the hypervisors. They can be instantiated as a bare metal appliance or a virtual machine form factor. They are grouped in one or several clusters. Each cluster represents a pool of capacity.</p>
<p class="shortdesc">A multi-node edge cluster of <span id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__productname_8E8192889A1D48628CF2FD722D67728A" class="ph productname">NSX Edge</span>s helps ensure that at least one <span id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__productname_8E8192889A1D48628CF2FD722D67728A" class="ph productname">NSX Edge</span> is always available. In order to create a tier-0 logical router or a tier-1 router with stateful services such as NAT, load balancer, and so on, you must associate it with an <span id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__productname_8E8192889A1D48628CF2FD722D67728A" class="ph productname">NSX Edge</span> cluster.</p>
<p class="shortdesc">Within a single <span id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__productname_8E8192889A1D48628CF2FD722D67728A" class="ph productname">NSX Edge</span> cluster, all <span id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__productname_8E8192889A1D48628CF2FD722D67728A" class="ph productname">NSX Edge</span> nodes must be the same type – either physical servers (bare metal) or VMs. When you create a T0 or T1, you can configure the HA (high availability) mode of a tier-0 gateway to be active-active or active-standby.</p>
<p>In the active-active mode, traffic is load-balanced across all members. In active-standby mode, all traffic is processed by an elected active member. If the active member fails, a new member is elected to be active.</p>
<h2><strong>How to Identify the Active Edge Node of  NSX-T Tier-0/Tier-1 gateway?</strong></h2>
<p>Now when you perform any maintenance on the Edge nodes. How do you identify which edge node is an active node that is forwarding traffic for a specific T-0 router? This is extremely important to know which is an active edge node before you perform any maintenance on your edge nodes of an edge cluster.</p>
<p>In NSX-T 4.x or later, it is very easy to identify the Active Edge node of the NSX-T Tier-0/Tier-1 gateway but this is not easy in NSX-T 3.x version. I tried to search the options around the different views in the NSX-T 3.x UI and even in CLI to identify the active edge node of NSX-T Tier0/Tier1.  Don&#8217;t worry. I will explain you the procedure in the blog post.</p>
<h3><span style="color: #800000;"><strong>Find the Active Edge Node of NSX-T Tier-1 gateway</strong></span></h3>
<section id="GUID-898099FC-4ED2-4553-809D-B81B494B67E7__context_9D689D6917AA44A0B6DA8D1CE1BAD8D3" class="section context">
<div class="tasklabel">Finding the active Edge node of Tier-1 gateway in NSX-T 3. x is straightforward. Click <strong>Networking -&gt; Tier-1 Gateways</strong> -&gt; Expand the Tier-1 gateway and Click &#8220;<strong>Auto Allocated</strong>&#8221; in the Edges.</div>
</section>
<p><img decoding="async" class="aligncenter size-full wp-image-7917" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/1.NSX-T-T1-Active-Edge-Node.jpg" alt="" width="1416" height="517" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/1.NSX-T-T1-Active-Edge-Node.jpg 1416w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.NSX-T-T1-Active-Edge-Node-300x110.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.NSX-T-T1-Active-Edge-Node-768x280.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.NSX-T-T1-Active-Edge-Node-1024x374.jpg 1024w" sizes="(max-width: 1416px) 100vw, 1416px" /></p>
<p>This will pop up the Edge node names along with the HA status of the Edge nodes for the particular Tier-1 Gateway. This is a straightforward option. isn&#8217;t it?</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7916" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/2.-NSX-T-T1-Active-Edge-Node.jpg" alt="" width="433" height="384" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-NSX-T-T1-Active-Edge-Node.jpg 433w, https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-NSX-T-T1-Active-Edge-Node-300x266.jpg 300w" sizes="(max-width: 433px) 100vw, 433px" /></p>
<h3><span style="color: #800000;"><strong>Find the Active Edge Node of NSX-T Tier-0 gateway</strong></span></h3>
<p>Finding the Active edge of the NSX-T Tier-1 gateway is simple but it is not the case with finding the active edge node of the Tier-0 gateway. How do to find the active edge for the Tier-0 gateway in NSX-T? It is not straightforward. Let me explain the detailed step-by-step option to identify the active edge node.</p>
<p>In the Tier-0 gateways, It only shows the HA mode of the T0  gateway whether it is Active Active or Active-Standby but not the active or passive edge node.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7918" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/3.NSX-T-T0-Active-Edge-Node.jpg" alt="" width="1703" height="389" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/3.NSX-T-T0-Active-Edge-Node.jpg 1703w, https://www.vmwarearena.com/wp-content/uploads/2023/09/3.NSX-T-T0-Active-Edge-Node-300x69.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/3.NSX-T-T0-Active-Edge-Node-768x175.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/3.NSX-T-T0-Active-Edge-Node-1024x234.jpg 1024w" sizes="(max-width: 1703px) 100vw, 1703px" /></p>
<p><strong>Tip:</strong> We are in Policy View now. which is the default view of NSX-T Manager UI in NSX-T 3.x or later. We can identify the active edge node of the Tier-0 gateway in NSX-T Manager UI &#8211; Manager View.</p>
<p>Let&#8217;s find a way how to change the default view of the NSX-T Manager UI. To Change the Default Mode, go to <strong>System -&gt; General Settings -&gt; User Interface -&gt;  Click Edit option in &#8220;User Interface Mode Toggle&#8221;</strong></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7919" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/4.NSX-T-General-Settings.jpg" alt="" width="856" height="611" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/4.NSX-T-General-Settings.jpg 856w, https://www.vmwarearena.com/wp-content/uploads/2023/09/4.NSX-T-General-Settings-300x214.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/4.NSX-T-General-Settings-768x548.jpg 768w" sizes="(max-width: 856px) 100vw, 856px" /></p>
<p>You can control Toggle visibility to a specific group of people like &#8220;<strong>Visible to users with Enterprise Admine role only or Visible to All Users&#8221;.</strong> The default option is <strong>&#8220;Hidden from All users&#8221;</strong>.</p>
<p>In my case, I have selected &#8221; Visible only to Enterprise Admin role only&#8221;. Click Save.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7920" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/5.NSX-T-Manage-Mode.jpg" alt="" width="602" height="273" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/5.NSX-T-Manage-Mode.jpg 602w, https://www.vmwarearena.com/wp-content/uploads/2023/09/5.NSX-T-Manage-Mode-300x136.jpg 300w" sizes="(max-width: 602px) 100vw, 602px" /></p>
<p>Select the respective option for toggle visibility and click <strong>Save.</strong></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7921" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/6.NSX-T-Manage-Mode-Save.jpg" alt="" width="529" height="257" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/6.NSX-T-Manage-Mode-Save.jpg 529w, https://www.vmwarearena.com/wp-content/uploads/2023/09/6.NSX-T-Manage-Mode-Save-300x146.jpg 300w" sizes="(max-width: 529px) 100vw, 529px" /></p>
<p>Now, we have set the toggle visibility to users with Enterprise Admin roles. Let&#8217;s log in with a user account with an enterprise admin role.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7922" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/7.NSX-T-Manage-Mode-Save2.jpg" alt="" width="564" height="203" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/7.NSX-T-Manage-Mode-Save2.jpg 564w, https://www.vmwarearena.com/wp-content/uploads/2023/09/7.NSX-T-Manage-Mode-Save2-300x108.jpg 300w" sizes="(max-width: 564px) 100vw, 564px" /></p>
<p>I have logged into the NSX-T manager with an admin account here. Now I have the view to toggle between Policy and Manager view in NSX-T UI.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7923" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/9.NSX-T-Manager-Mode-view.jpg" alt="" width="1276" height="224" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/9.NSX-T-Manager-Mode-view.jpg 1276w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.NSX-T-Manager-Mode-view-300x53.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.NSX-T-Manager-Mode-view-768x135.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.NSX-T-Manager-Mode-view-1024x180.jpg 1024w" sizes="(max-width: 1276px) 100vw, 1276px" /></p>
<p>Let&#8217;s identify the Active-standby edge node of the Tier-0 gateway. Click on <strong>Manager view. </strong></p>
<p>Under <strong>Networking -&gt; Tier-0 Logical Routers -&gt; Click the Active-Standby</strong> (link type) under High Availability Mode of particular Tier-0 Logical Routes.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7924" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/10.NSX-T-Active-Edge-Node-1.jpg" alt="" width="1282" height="393" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/10.NSX-T-Active-Edge-Node-1.jpg 1282w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.NSX-T-Active-Edge-Node-1-300x92.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.NSX-T-Active-Edge-Node-1-768x235.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.NSX-T-Active-Edge-Node-1-1024x314.jpg 1024w" sizes="(max-width: 1282px) 100vw, 1282px" /></p>
<p>In the NSX-T UI Manager View,   It now shows which the Active and Standby Edge nodes is the Tier-0 gateway. In my case, Edge-03 is Active node and edge-4 is the standby node.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7925" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/11.-NSX-T-Active-Edge-Node-1-for-T0.jpg" alt="" width="1290" height="354" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-NSX-T-Active-Edge-Node-1-for-T0.jpg 1290w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-NSX-T-Active-Edge-Node-1-for-T0-300x82.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-NSX-T-Active-Edge-Node-1-for-T0-768x211.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-NSX-T-Active-Edge-Node-1-for-T0-1024x281.jpg 1024w" sizes="(max-width: 1290px) 100vw, 1290px" /></p>
<p>That&#8217;s it. We have identified how to find the active edge node of the Tier-0 gateway in NSX-T 3. x. This is a simple post but really valuable when it comes to troubleshooting your NSX-T Tier-1/Tier-0 connectivity issues.</p>
<p>I hope this is informative for you. Thanks for reading. Be social and share it with social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/identify-the-active-edge-node-of-nsx-t-tier-0-tier-1-gateway/">How to Identify the Active Edge Node of NSX-T Tier-0/Tier-1 Gateway</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Master Guide &#8211; vCenter Server Certificate Replacement with Custom CA</title>
		<link>https://www.vmwarearena.com/master-guide-vcenter-server-certificate-replacement/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=master-guide-vcenter-server-certificate-replacement</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 15:37:00 +0000</pubDate>
				<category><![CDATA[vCenter Certificate Replacement]]></category>
		<category><![CDATA[vCenter server]]></category>
		<guid isPermaLink="false">http://www.vmwarearena.com/?p=7821</guid>

					<description><![CDATA[<p>VMware vSphere uses Certificates to ensure secure communication between all the VMware components such as vCenter and the ESXi nodes, etc. VMWare vSphere’s internal certificate authority, VMware Certificate Authority (VMCA), provides all the certificates necessary for ESXi and vCenter Server. VMCA is installed on every vCenter Server host, immediately securing the solution without any other modification. [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/master-guide-vcenter-server-certificate-replacement/">Master Guide &#8211; vCenter Server Certificate Replacement with Custom CA</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>VMware vSphere uses Certificates to ensure secure communication between all the VMware components such as vCenter and the ESXi nodes, etc. VMWare vSphere’s internal certificate authority, VMware Certificate Authority (VMCA), provides all the certificates necessary for ESXi and vCenter Server. VMCA is installed on every vCenter Server host, immediately securing the solution without any other modification. By default, the vCenter Server Certificate is a Self-signed certificate.</p>
<p>VMware vSphere also provides a mechanism to replace Self-signed certificates with custom CA-signed certificates as well for securing communications using signed certificates. In this article, I will explain detailed information about vCenter server certificates, how to check the certificate validity, replace with vCenter server self-signed certificate with custom CA-signed certificates.</p>
<h3><span style="color: #003366;"><strong>How to find the expiration date of vCenter Server certificates?</strong></span></h3>
<p>You can check the vCenter server certificate expiry from various methods. Let&#8217;s check each method.</p>
<p><span style="color: #993300;"><strong>Check Cert validity from vCenter Server appliance SSH :</strong></span></p>
<p>It is very important to understand the expiration date of your vCenter Server certificates. Run the below command to get the status of the environment&#8217;s certificates.</p>
<pre>for store in $(/usr/lib/vmware-vmafd/bin/vecs-cli store list | grep -v TRUSTED_ROOT_CRLS); do echo "[*] Store :" $store; /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store $store --text | grep -ie "Alias" -ie "Not After";done;</pre>
<p><img decoding="async" class="aligncenter size-full wp-image-7886" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/1.-Checking-VC-certificate-expirtaion-dates-1.jpg" alt="Checking VC certificate expiration dates" width="1837" height="734" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/1.-Checking-VC-certificate-expirtaion-dates-1.jpg 1837w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.-Checking-VC-certificate-expirtaion-dates-1-300x120.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.-Checking-VC-certificate-expirtaion-dates-1-768x307.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/1.-Checking-VC-certificate-expirtaion-dates-1-1024x409.jpg 1024w" sizes="(max-width: 1837px) 100vw, 1837px" /></p>
<p><span style="color: #993300;"><strong>Check Cert validity from Web Browser:</strong></span></p>
<p>When you open the vCenter Server URL in the web browser. You will receive a Certificate error if it is a Self-signed certificate. Click on View Certificate. This will show the Certificate&#8217;s validity.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7823" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/2.-Certificate-details-from-Browser.jpg" alt="Vcenter Certificate Replacement" width="967" height="755" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-Certificate-details-from-Browser.jpg 967w, https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-Certificate-details-from-Browser-300x234.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-Certificate-details-from-Browser-768x600.jpg 768w" sizes="(max-width: 967px) 100vw, 967px" /></p>
<p>If click on Certification details, it will show you the full certificate details including the issuer, Signature algorithm, valid from and to, etc.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7824" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/2.-VC-Self-signed-certificate.jpg" alt="Vcenter Certificate Replacement" width="470" height="633" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-VC-Self-signed-certificate.jpg 470w, https://www.vmwarearena.com/wp-content/uploads/2023/09/2.-VC-Self-signed-certificate-223x300.jpg 223w" sizes="(max-width: 470px) 100vw, 470px" /></p>
<p><span style="color: #993300;"><strong>Check Cert validity from vSphere Client:</strong></span></p>
<p>Log in to the vCenter server using vSphere Client (HTML5 client) -&gt; Click on Administration -&gt; Certificate Management. This will list all the vCenter server certificates.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7825" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/4.-VC-Certificate-Mgmt-GUI.jpg" alt="Vcenter Certificate Replacement" width="1884" height="670" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/4.-VC-Certificate-Mgmt-GUI.jpg 1884w, https://www.vmwarearena.com/wp-content/uploads/2023/09/4.-VC-Certificate-Mgmt-GUI-300x107.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/4.-VC-Certificate-Mgmt-GUI-768x273.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/4.-VC-Certificate-Mgmt-GUI-1024x364.jpg 1024w" sizes="(max-width: 1884px) 100vw, 1884px" /></p>
<h2><span style="color: #003366;"><strong>Replace vCenter Server Self-Signed Certificate with Custom CA signed </strong></span><strong><span style="color: #003366;">Certificate</span></strong></h2>
<p>VMware products use certificates to encrypt session information sent over Secure Socket Layer (SSL) protocol connections between components.</p>
<p>vCenter Server and ESXi hosts come default by Self-Signed certificates. A self-signed SSL certificate is a digital certificate that’s not signed by a publicly trusted Certificate Authority (CA).</p>
<p>Self-signed certificates are considered different from traditional CA-signed certificates because they are created, issued, and signed by the company or developer who is responsible for the website or software associated with the certificate, rather than a CA. These default Self-Signed certificates are not signed by a commercial certificate authority (CA) and <b>may not provide strong security</b>. You can replace default vCenter Server certificates with certificates signed by an Internal Microsoft CA or Commercial CA.</p>
<p>We will take a look at the detailed procedure for the replacement of the vCenter Server Self-signed certificate with Microsoft Custom Certificate Authority includes the below summary of actions:</p>
<p><span style="color: #ff6600;">1. Create vCenter Server CSR request (Certificate Signing Request)</span></p>
<p><span style="color: #993300;">     1a. Generate vCenter CSR request from vSphere Client (UI)</span></p>
<p><span style="color: #993300;">     1b. Generate CSR from the vCenter server &#8220;Certificate Manager&#8221; command line via SSH.</span></p>
<p><span style="color: #ff6600;">2. Submit the vCenter Server Certificate request to the Certificate Authority (CA)</span></p>
<p><span style="color: #333300;">      <span style="color: #993300;">2a. Submit Certificate Request to Root CA</span></span></p>
<p><span style="color: #993300;">      2b. Submit Certificate Request to Intermediate CA  </span></p>
<p><span style="color: #ff6600;">3. </span><span style="font-size: 16px; color: #ff6600;">Prepare the Certificate Chain for vCenter Server Certificate </span><span style="color: #ff6600;"><span style="font-size: 16px;">Replacement</span></span></p>
<p><span style="color: #ff6600;">4. Upload the certificates to the vCenter Server.</span></p>
<p><span style="color: #ff6600;">5. Run the vCenter Certificate manager tool to import and replace Self-signed certs with Custom CA certs</span></p>
<h3><span style="color: #ff6600;"><strong>1, How to Create vCenter Server CSR Request (Certificate Signing Request)</strong></span></h3>
<p>A certificate signing request (CSR) is one of the first steps towards getting your own SSL/TLS certificate. Generated on the same server you plan to install the certificate on, the CSR contains information (e.g., common name, organization, country) the Certificate Authority (CA) will use to create your certificate. It also contains the public key that will be included in your certificate and is signed with the corresponding private key.</p>
<p><b>A certificate signing request</b> (also <b>CSR</b> or <b>certification request</b>) is a message sent from an applicant to a certificate authority of the public key infrastructure in order to apply for a digital identity certificate.</p>
<p>The CSR usually contains the public key for which the certificate should be issued, identifying information (such as a domain name) and a proof of authenticity including integrity protection (e.g., a digital signature).</p>
<p>There are two ways you can create CSR from the vCenter Server:</p>
<p><span style="color: #993300;">1a. Generate vCenter CSR request from vSphere Client (UI)</span><br />
<span style="color: #993300;">1b. Generate CSR from the vCenter server &#8220;Certificate Manager&#8221; command line via SSH.</span></p>
<h4><span style="color: #993300;"><strong>1a. Generate vCenter CSR from vSphere Client (UI)</strong></span></h4>
<p>Log in with the <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e105" class="ph productname">vSphere Client</span> to the <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e108" class="ph productname">vCenter Server using administrator@vsphere.loca</span><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e187" class="ph cmd">I.</span><br />
<span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e194" class="ph cmd">From the <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e196" class="ph uicontrol">Home</span> menu, select <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e199" class="ph uicontrol">Administration</span>. </span><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e206" class="ph cmd">Under <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e208" class="ph uicontrol">Certificates</span>, click <strong><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__d32e211" class="ph uicontrol">Certificate Management</span></strong>.</span><br />
<span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__cmd_1A293A8BF07542FA88482E615975768F" class="ph cmd"></span></p>
<p><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__cmd_1A293A8BF07542FA88482E615975768F" class="ph cmd">For the certificate that you want to replace,<strong> under </strong><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__uicontrol_54ED1D8D12C24E2E83D81FEC04331D6E" class="ph uicontrol"><strong>Machine SSL Certificate</strong></span>, click <span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__menucascade_ED7F6C0BDA6A4A77A2F7120C0F610384" class="ph menucascade"><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__uicontrol_1AA111B554994D9490AF094B9082C33B" class="ph uicontrol">Actions</span><abbr title="and then"> &gt; </abbr><span id="GUID-2F83112B-961A-4ECB-B23F-63758E34106B__uicontrol_6BC12A2C794F49DC834F959CCD1E37AD" class="ph uicontrol"><strong>Generate Certificate Signing Request (CSR)</strong></span></span><strong>.</strong></span></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7826" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/5.-Generate-Vcenter-CSR-from-GUI.jpg" alt="Vcenter Certificate Replacement" width="1394" height="691" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/5.-Generate-Vcenter-CSR-from-GUI.jpg 1394w, https://www.vmwarearena.com/wp-content/uploads/2023/09/5.-Generate-Vcenter-CSR-from-GUI-300x149.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/5.-Generate-Vcenter-CSR-from-GUI-768x381.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/5.-Generate-Vcenter-CSR-from-GUI-1024x508.jpg 1024w" sizes="(max-width: 1394px) 100vw, 1394px" /></p>
<p>Enter the below details to generate a CSR. Leave Common name and host as default. The common name and host are the fqdn of vCenter Server.</p>
<p>Specify the other details like organization, organization unit, country, state, locality, email address, and key size. Click Next</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7828" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/7.-Generate-VC-CSR-from-vCenter-GUI.jpg" alt="Vcenter Certificate Replacement" width="811" height="672" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/7.-Generate-VC-CSR-from-vCenter-GUI.jpg 811w, https://www.vmwarearena.com/wp-content/uploads/2023/09/7.-Generate-VC-CSR-from-vCenter-GUI-300x249.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/7.-Generate-VC-CSR-from-vCenter-GUI-768x636.jpg 768w" sizes="(max-width: 811px) 100vw, 811px" /></p>
<p>Click <strong>Copy</strong> to save the content of CSR in the file or click <strong>Download </strong>to download the CSR file of the vCenter Server.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7829" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/8.-download-CSR-from-vCenter-GUI.jpg" alt="" width="816" height="675" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/8.-download-CSR-from-vCenter-GUI.jpg 816w, https://www.vmwarearena.com/wp-content/uploads/2023/09/8.-download-CSR-from-vCenter-GUI-300x248.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/8.-download-CSR-from-vCenter-GUI-768x635.jpg 768w" sizes="(max-width: 816px) 100vw, 816px" /></p>
<p>If you download the file. The file will be in &#8220;.csr&#8221; format.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7830" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/9.-Save-CSR-to-local-disk.jpg" alt="" width="1052" height="381" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/9.-Save-CSR-to-local-disk.jpg 1052w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.-Save-CSR-to-local-disk-300x109.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.-Save-CSR-to-local-disk-768x278.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/9.-Save-CSR-to-local-disk-1024x371.jpg 1024w" sizes="(max-width: 1052px) 100vw, 1052px" /></p>
<p>It looks like the.CSR was created successfully but the private key is not shown and don&#8217;t have the option to download the private key in the CSR step when you generate CSR from the vSphere client UI.</p>
<p>The private key is stored inside the VECS certificate store under the __MACHINE_CSR alias. It would have been better if VMware had shown the user a notification in the vSphere Client when a . CSR is generated. But No worries, I will explain how to get the Private key for the CSR request.</p>
<p><strong><span style="color: #33cccc;">How do get a Private Key when generating CSR from vSphere Client?</span></strong></p>
<p>To obtain the private key, log in to vCenter Server Appliance using SSH and run the below command:</p>
<pre><code class="_34q3PgLsx9zIU5BiSOjFoM">/usr/lib/vmware-vmafd/bin/vecs-cli entry getkey --store MACHINE_SSL_CERT --alias __MACHINE_CSR &gt; /path/filename.key</code></pre>
<p>Copy this private key to a notepad file and save it as private.key. Now this file can be used while importing the validated certificate file into the vSphere Client.</p>
<h4><span style="color: #993300;"><strong>1b. Generate vCenter Server CSR from Certificate Manager tool from CLI</strong></span></h4>
<p>To Generate CSR from the certificate manager tool. Login to vCenter Server Appliance via SSH and run the below command:</p>
<figure class="wp-block-image size-large is-resized"><figcaption>
<pre>/usr/lib/vmware-vmca/bin/certificate-manager</pre>
</figcaption></figure>
<p>Choose option <strong>“1”</strong> &#8211; &#8220;Replace Machine SSL certificate with Custom Certificate.&#8221;</p>
<p>Again, choose option <strong>&#8220;1&#8221;</strong> &#8211; “Generate certificate signing request(s) and Key(s) for machine SSL Certificate.&#8221;</p>
<p>Specify the output directory path: /root/vc-certs. It can be any folder in the VCSA directory.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7831" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/10.-Generate-CSR-from-VC-SSH-Shell.jpg" alt="Vcenter Certificate Replacement" width="1147" height="910" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/10.-Generate-CSR-from-VC-SSH-Shell.jpg 1147w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.-Generate-CSR-from-VC-SSH-Shell-300x238.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.-Generate-CSR-from-VC-SSH-Shell-768x609.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/10.-Generate-CSR-from-VC-SSH-Shell-1024x812.jpg 1024w" sizes="(max-width: 1147px) 100vw, 1147px" /></p>
<p>Provide the below parameters during the vCenter Server CSR generation:</p>
<table>
<tbody>
<tr>
<td colspan="1" rowspan="1"><strong>Property</strong></td>
<td colspan="1" rowspan="1"><strong>Value</strong></td>
</tr>
<tr>
<td colspan="1" rowspan="1">Country</td>
<td colspan="1" rowspan="1">Leave Default, specify own. In our example, AE (Arab Emirates), Only 2 Letters are allowed.</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Name</td>
<td colspan="1" rowspan="1">FQDN of vCenter Server Example, vc01.md.local</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Organization</td>
<td colspan="1" rowspan="1">Default, specify own. For example, VMware Arena</td>
</tr>
<tr>
<td colspan="1" rowspan="1">OrgUnit</td>
<td colspan="1" rowspan="1">Default, specify own. Example, IT</td>
</tr>
<tr>
<td colspan="1" rowspan="1">State and Locality</td>
<td colspan="1" rowspan="1">Default, specify own. Example, Dubai</td>
</tr>
<tr>
<td colspan="1" rowspan="1">IPAddress</td>
<td colspan="1" rowspan="1">Specify the IP address of the vCenter Server.</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Hostname</td>
<td colspan="1" rowspan="1">FQDN of vCenter Server Example, vc01.md.local</td>
</tr>
<tr>
<td colspan="1" rowspan="1">VMCA Name</td>
<td colspan="1" rowspan="1">FQDN of vCenter Server Example, vc01.md.local</td>
</tr>
</tbody>
</table>
<p><img decoding="async" class="aligncenter size-full wp-image-7832" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/11.-Generate-CSR-request-from-VC-SSH-Shell.jpg" alt="Vcenter Certificate Replacement" width="1627" height="876" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-Generate-CSR-request-from-VC-SSH-Shell.jpg 1627w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-Generate-CSR-request-from-VC-SSH-Shell-300x162.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-Generate-CSR-request-from-VC-SSH-Shell-768x414.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/11.-Generate-CSR-request-from-VC-SSH-Shell-1024x551.jpg 1024w" sizes="(max-width: 1627px) 100vw, 1627px" /></p>
<p>vCenter server CSR File is generated and stored in the specified output location. In my case “/root/vc-certs&#8221;.</p>
<p>The default CSR file name is vmca_issue_csr.csr Along with the CSR file, a private key file is also generated and saved in the same location. The private key file name is &#8220;vmca_issues_key.key&#8221;.</p>
<p>The private key will be automatically generated when you generate CSR with the certificate manager tool in CLI.</p>
<p>Valid the CSR and private key file by browsing towards the specified output location.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7833" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/12.-CSR-files.jpg" alt="Vcenter Certificate Replacement" width="762" height="149" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/12.-CSR-files.jpg 762w, https://www.vmwarearena.com/wp-content/uploads/2023/09/12.-CSR-files-300x59.jpg 300w" sizes="(max-width: 762px) 100vw, 762px" /></p>
<h3><span style="color: #ff6600;"><strong>2. How to submit a vCenter Certificate request to the Microsoft Certificate Authority (CA)</strong></span></h3>
<p>Digital certificates created by a Public Key Infrastructure (PKI) Certificate Authority (CA) are verified using a chain of trust. The trust anchor for the digital certificate is the Root Certificate Authority (CA), and any Certificate Authority (CA) that comes under Root Certificate Authority (Root CA) is known as a subordinate Certificate Authority (CA) or Intermediate Certificate Authority.</p>
<p>In this blog, we will discuss how to submit vCenter Server Certificate requests to both Microsoft ROOT CA and Microsoft Intermediate CA.</p>
<h4><span style="color: #993300;"><strong>2a. Submit vCenter Certificate request to Microsoft ROOT CA</strong></span></h4>
<p>Download the CSR file (VMCA_Issued_CSR.CSR) with WinSCP and keep it saved in your desktop system to request a CA signed certificate for your vCenter server.</p>
<p>Login to http://CA/certsrv and click <strong>Request a Certificate</strong></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7834" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA.jpg" alt="Vcenter Certificate Replacement" width="1325" height="583" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA.jpg 1325w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-300x132.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-768x338.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-1024x451.jpg 1024w" sizes="(max-width: 1325px) 100vw, 1325px" />Click &#8221; Submit an<strong> Advanced Certificate Request</strong>&#8221;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7835" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/14.-Certitificate-request-from-ROOT-CA.jpg" alt="Vcenter Certificate Replacement" width="679" height="371" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/14.-Certitificate-request-from-ROOT-CA.jpg 679w, https://www.vmwarearena.com/wp-content/uploads/2023/09/14.-Certitificate-request-from-ROOT-CA-300x164.jpg 300w" sizes="(max-width: 679px) 100vw, 679px" /></p>
<p>Open the CSR file &#8220;<strong>vmca_issue_csr.csr</strong>&#8221; and copy the full contents of the file.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7836" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/15.-Copy-CSR-contents.jpg" alt="Vcenter Certificate Replacement" width="1050" height="515" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/15.-Copy-CSR-contents.jpg 1050w, https://www.vmwarearena.com/wp-content/uploads/2023/09/15.-Copy-CSR-contents-300x147.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/15.-Copy-CSR-contents-768x377.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/15.-Copy-CSR-contents-1024x502.jpg 1024w" sizes="(max-width: 1050px) 100vw, 1050px" /></p>
<p>Paste the contents of the .csr file and Select the &#8220;vCenter template&#8221; from the certificate template drop-down. In my case, I have cloned the web server template and created a new certificate template called the &#8220;vCenter template&#8221; in my CA. It won&#8217;t be present by default. In your case, you can select &#8220;Web Server&#8221; from the certificate template drop-down.</p>
<p>Click Submit.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7837" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/16.-Request-VC-CA-certificate.jpg" alt="Vcenter Certificate Replacement" width="1897" height="701" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/16.-Request-VC-CA-certificate.jpg 1897w, https://www.vmwarearena.com/wp-content/uploads/2023/09/16.-Request-VC-CA-certificate-300x111.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/16.-Request-VC-CA-certificate-768x284.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/16.-Request-VC-CA-certificate-1024x378.jpg 1024w" sizes="(max-width: 1897px) 100vw, 1897px" /></p>
<p>Select <strong>Base 64 encoded</strong> and click <strong>Download Certificate</strong>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7838" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Download-CA-certificate.jpg" alt="Vcenter Certificate Replacement" width="777" height="383" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Download-CA-certificate.jpg 777w, https://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Download-CA-certificate-300x148.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Download-CA-certificate-768x379.jpg 768w" sizes="(max-width: 777px) 100vw, 777px" /></p>
<p>If you open the downloaded certificate, you can check the Certificate Path/Chain, it shows the full certificate path DC-CA (Microsoft Certificate Authority) -&gt; vc01.md.local (vCenter Server)</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7839" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Vcenter-CA-certificate.jpg" alt="Vcenter Certificate Replacement" width="508" height="646" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Vcenter-CA-certificate.jpg 508w, https://www.vmwarearena.com/wp-content/uploads/2023/09/17.-Vcenter-CA-certificate-236x300.jpg 236w" sizes="(max-width: 508px) 100vw, 508px" /></p>
<p>It is required to generate the custom CA certificate with a full chain. This is important as VCSA will import the customer root and intermediate CA certificate (If present) from the full chain. You can go back to the page in Microsoft Certificate Service page and select &#8220;<b>Download a CA certificate (root certificate).&#8221;</b></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7834" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA.jpg" alt="Vcenter Certificate Replacement" width="1325" height="583" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA.jpg 1325w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-300x132.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-768x338.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/13.-Cretificate-Generation-from-ROOT-CA-1024x451.jpg 1024w" sizes="(max-width: 1325px) 100vw, 1325px" />I have saved the root-cert as &#8220;root-cert&#8221; in the local folder.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7840" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/18.-Root-CA-certificate.jpg" alt="Vcenter Certificate Replacement" width="937" height="278" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/18.-Root-CA-certificate.jpg 937w, https://www.vmwarearena.com/wp-content/uploads/2023/09/18.-Root-CA-certificate-300x89.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/18.-Root-CA-certificate-768x228.jpg 768w" sizes="(max-width: 937px) 100vw, 937px" /></p>
<p>If you open the root certificate, it will show the certification path.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7841" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/19.-Root-CA-certificate1.jpg" alt="Vcenter Certificate Replacement" width="504" height="643" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/19.-Root-CA-certificate1.jpg 504w, https://www.vmwarearena.com/wp-content/uploads/2023/09/19.-Root-CA-certificate1-235x300.jpg 235w" sizes="(max-width: 504px) 100vw, 504px" /></p>
<h4><span style="color: #993300;"><strong>2b. How to Submit vCenter Certificate Request to Microsoft Intermediate Certificate Authority</strong></span></h4>
<p>In most organizations, Certificates will be issued by the intermediate Certificate Authority (CA) not directly from the ROOT CA. This is for security reasons.</p>
<p>Subordinate CAs – these live between the root and end entity certificates and their main purpose is to define and authorize the types of certificates that can be requested from the root CA.</p>
<p>We will also look at how to submit a CSR file to the Intermediate certification authority (CA) and generate CA signed certificate for the vCenter Server.</p>
<p>Login to your Microsoft Intermediate Certificate authority and run the command:</p>
<pre>certreq -submit -attrib "CertificateTemplate:WebServer"</pre>
<p><img decoding="async" class="aligncenter size-full wp-image-7842" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request.jpg" alt="Vcenter Certificate Replacement" width="971" height="214" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request.jpg 971w, https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request-300x66.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request-768x169.jpg 768w" sizes="(max-width: 971px) 100vw, 971px" /></p>
<p>Select the vCenter Server CSR (.csr) file saved in the local folder and click open.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7843" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request1.jpg" alt="Vcenter Certificate Replacement" width="946" height="595" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request1.jpg 946w, https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request1-300x189.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/20.-Subordinate-CA-certificate-request1-768x483.jpg 768w" sizes="(max-width: 946px) 100vw, 946px" /></p>
<p>This triggers the Certification Authority window to open. Select the <span class="ph uicontrol">Certification Authority</span> to use (In my case sv01-CA is my sub-ordinate CA server) and click <span class="ph uicontrol">OK</span>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7847" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-server.jpg" alt="Vcenter Certificate Replacement" width="490" height="313" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-server.jpg 490w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-server-300x192.jpg 300w" sizes="(max-width: 490px) 100vw, 490px" /></p>
<p>The certificate Request has been successfully submitted to Intermediate CA and the Request ID is &#8220;7&#8221;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7846" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-Request-number.jpg" alt="Vcenter Certificate Replacement" width="863" height="255" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-Request-number.jpg 863w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-Request-number-300x89.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-select-CA-Request-number-768x227.jpg 768w" sizes="(max-width: 863px) 100vw, 863px" /></p>
<p>Open Certificate Authority MMC on your subordinate CA server. You can see the certificate request number &#8220;7&#8221; under &#8220;pending requests.&#8221;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7844" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.-Arpprove-cert-request.jpg" alt="Vcenter Certificate Replacement" width="1899" height="325" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-Arpprove-cert-request.jpg 1899w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-Arpprove-cert-request-300x51.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-Arpprove-cert-request-768x131.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-Arpprove-cert-request-1024x175.jpg 1024w" sizes="(max-width: 1899px) 100vw, 1899px" /></p>
<p>Under the pending request, Right-click the certificate request number &#8220;7&#8221; -&gt; All tasks -&gt; click <strong>&#8220;Issue&#8221;</strong></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7848" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.issue-vcenter-certificate.jpg" alt="Vcenter Certificate Replacement" width="807" height="278" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.issue-vcenter-certificate.jpg 807w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.issue-vcenter-certificate-300x103.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.issue-vcenter-certificate-768x265.jpg 768w" sizes="(max-width: 807px) 100vw, 807px" /></p>
<p>Once the certificate is issued by CA certificate request ID &#8220;7&#8221; will appear under &#8220;issued Certificates&#8221;.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7845" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.-download-issued-certificate.jpg" alt="Vcenter Certificate Replacement" width="1897" height="220" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-download-issued-certificate.jpg 1897w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-download-issued-certificate-300x35.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-download-issued-certificate-768x89.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.-download-issued-certificate-1024x119.jpg 1024w" sizes="(max-width: 1897px) 100vw, 1897px" /></p>
<p>Double-click the certificate in the &#8220;Issued Certificates&#8221;. It opens up the certificate and click &#8220;<strong>Copy to file&#8221; </strong>under details which in turn opens up the certificate export wizard. Click <strong>Next</strong>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7849" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-certificate.jpg" alt="Vcenter Certificate Replacement" width="1194" height="650" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-certificate.jpg 1194w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-certificate-300x163.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-certificate-768x418.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-certificate-1024x557.jpg 1024w" sizes="(max-width: 1194px) 100vw, 1194px" /></p>
<p>Specify the certificate file name. In my case &#8220;vc01.cert&#8221; and click Next.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7850" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-vc-cert.jpg" alt="Vcenter Certificate Replacement" width="669" height="653" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-vc-cert.jpg 669w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-vc-cert-300x293.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.save-vc-cert-55x55.jpg 55w" sizes="(max-width: 669px) 100vw, 669px" /></p>
<p>Select the &#8220;<strong>Base-64 encoded X.509 (.CER) format</strong>&#8221; file format in the format list and click <strong>Next</strong>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7851" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-base64-cert.jpg" alt="Vcenter Certificate Replacement" width="667" height="657" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-base64-cert.jpg 667w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-base64-cert-300x296.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-base64-cert-83x83.jpg 83w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-base64-cert-55x55.jpg 55w" sizes="(max-width: 667px) 100vw, 667px" /></p>
<p>You will receive the popup &#8221; The export was successful&#8221; and Click OK.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7853" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/22.VC-Subordinate-CA-chain.jpg" alt="Vcenter Certificate Replacement" width="668" height="651" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/22.VC-Subordinate-CA-chain.jpg 668w, https://www.vmwarearena.com/wp-content/uploads/2023/09/22.VC-Subordinate-CA-chain-300x292.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/22.VC-Subordinate-CA-chain-55x55.jpg 55w" sizes="(max-width: 668px) 100vw, 668px" /></p>
<p>If you open the exported certificate &#8220;vc01.cer&#8221;, you can now see the full certificate chain which includes <strong>ROOT CA -&gt; Subordinate CA -&gt; vCenter Server.</strong></p>
<p><img decoding="async" class="aligncenter size-full wp-image-7852" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-Subordinate-CA-chain.jpg" alt="Vcenter Certificate Replacement" width="509" height="633" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-Subordinate-CA-chain.jpg 509w, https://www.vmwarearena.com/wp-content/uploads/2023/09/21.VC-Subordinate-CA-chain-241x300.jpg 241w" sizes="(max-width: 509px) 100vw, 509px" /></p>
<p>It is also important that you need to export the certificate of root and subordinate CA using the same procedure as above. to export ROOT CA certificate. Click ROOT CA (DC-CA) and &#8220;View certificate&#8221;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7854" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/23.-certchain-import.jpg" alt="Vcenter Certificate Replacement" width="536" height="633" data-temp-aztec-id="2610674c-5c1a-4902-96f8-2764104cae53" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/23.-certchain-import.jpg 536w, https://www.vmwarearena.com/wp-content/uploads/2023/09/23.-certchain-import-254x300.jpg 254w" sizes="(max-width: 536px) 100vw, 536px" /></p>
<p>Click Details. select &#8220;Copy to File&#8221; and export the certificate using the certificate export wizard.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7855" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/24.-rootca-import.jpg" alt="Vcenter Certificate Replacement" width="512" height="644" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/24.-rootca-import.jpg 512w, https://www.vmwarearena.com/wp-content/uploads/2023/09/24.-rootca-import-239x300.jpg 239w" sizes="(max-width: 512px) 100vw, 512px" /></p>
<p>Save generated VC CA certificate, ROOTCA, and Subordinate CA cert files.</p>
<h3><img decoding="async" class="aligncenter size-full wp-image-7857" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/25.Full-certificates.jpg" alt="Vcenter Certificate Replacement" width="977" height="313" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/25.Full-certificates.jpg 977w, https://www.vmwarearena.com/wp-content/uploads/2023/09/25.Full-certificates-300x96.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/25.Full-certificates-768x246.jpg 768w" sizes="(max-width: 977px) 100vw, 977px" /><strong><span style="font-size: 16px; color: #ff6600;">3. Prepare the Certificate Chain for vCenter Server Certificate </span><span style="color: #ff6600;"><span style="font-size: 16px;">Replacement</span></span></strong></h3>
<blockquote><p><span style="color: #800000;"><b>During the import of the new vCenter certificate, you need to import the certificate chain with a single file. Therefore, the below steps are very important steps when you are using multiple CAs like Root CA and Intermediate CA.</b></span></p></blockquote>
<p>Just to summarize, I have put down the table of what each file contains after this certificate chain file creation.</p>
<table>
<tbody>
<tr>
<td colspan="1" rowspan="1"><strong>Type</strong></td>
<td colspan="1" rowspan="1"><strong>Path</strong></td>
</tr>
<tr>
<td colspan="1" rowspan="1">Machine certificate</td>
<td colspan="1" rowspan="1">Contains full chain of contents of machine certificate (generated from a certificate authority), RootCA, and subordinate CA certificates.</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Key File machine SSL</td>
<td colspan="1" rowspan="1">A private key file was generated during the VC CSR request.</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Signing certificate</td>
<td colspan="1" rowspan="1">Contains chain of contents of RootCA and Subordinate CA</td>
</tr>
</tbody>
</table>
<p>Follow the below steps in order:</p>
<ul>
<li>Open the exported <strong>subca.cer</strong> (intermediate certificate file) with notepad.</li>
<li>Highlight and Copy everything in the open doc.</li>
<li>Open the <strong>Rootca.cer</strong> file with Notepad and paste the information from the <strong>Intermediate.cer</strong> file to the bottom of the <strong>root.cer</strong> file.</li>
<li>Save the <strong>Rootca.cer</strong> file but don’t close it.  <strong>Root.cer</strong> File should look like the below example.</li>
</ul>
<div class=""></div>
<div class="">
<pre><span style="color: #993366;">-----BEGIN CERTIFICATE-----
ROOT CERTIFICATE
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
INTERMEDIATE CERTIFICATE (IF YOU HAVE ONE)
-----END CERTIFICATE-----
</span></pre>
</div>
<p><img decoding="async" class="aligncenter size-full wp-image-7856" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/25.-COpy-SubCA-to-rootCA.jpg" alt="Vcenter Certificate Replacement" width="612" height="776" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/25.-COpy-SubCA-to-rootCA.jpg 612w, https://www.vmwarearena.com/wp-content/uploads/2023/09/25.-COpy-SubCA-to-rootCA-237x300.jpg 237w" sizes="(max-width: 612px) 100vw, 612px" /></p>
<ul>
<li>Select and copy all text in the <strong>Root.cer</strong></li>
<li>Open the generated VC Machine Certificate &#8220;<strong>vc01.cert</strong>&#8221; file with Notepad.</li>
<li>Paste the copied text from <strong>Root.cer</strong> file to the bottom of the doc</li>
<li>You will now have the full chain and three certs embedded. <strong>VC Machine cert -&gt; ROOT CA -&gt; SUB CA</strong></li>
<li>Save the MachineCertificate file &#8220;<strong>vc01.cert</strong>&#8220;.  vc01.cert file Should be like the below example.</li>
</ul>
<pre><span style="color: #993366;">-----BEGIN CERTIFICATE-----
MACHINE CERTIFICATE (VCENTER CERTIFICATE)
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
ROOT CERTIFICATE
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
INTERMEDIATE CERTIFICATE (IF YOU HAVE ONE)
-----END CERTIFICATE-----
</span></pre>
<p><img decoding="async" class="aligncenter size-full wp-image-7859" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/27.-edit-VC-machine-certficate-with-full-chain.jpg" alt="Vcenter Certificate Replacement" width="575" height="898" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/27.-edit-VC-machine-certficate-with-full-chain.jpg 575w, https://www.vmwarearena.com/wp-content/uploads/2023/09/27.-edit-VC-machine-certficate-with-full-chain-192x300.jpg 192w" sizes="(max-width: 575px) 100vw, 575px" /></p>
<h3><strong><span style="color: #ff6600;">4. Upload the certificates to the vCenter Server.</span></strong></h3>
<p>Once all the certification chains and files are updated as mentioned in the above steps. Now copy the below 3 highlighted files to the vCenter server appliance via WinSCP.</p>
<ul>
<li><strong>rootca.cer</strong> (Contains chain of contents of rootCA and Subordinate CA)</li>
<li><strong>vc01.cer</strong> (contains the full chain of contents of machine certificate, rootCA, and subordinate CA)</li>
<li><strong>vc01.key</strong> (private key generated during CSR request)</li>
</ul>
<h3><img decoding="async" class="aligncenter size-full wp-image-7860" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/28.-copy-certs-to-VC.jpg" alt="Vcenter Certificate Replacement" width="726" height="290" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/28.-copy-certs-to-VC.jpg 726w, https://www.vmwarearena.com/wp-content/uploads/2023/09/28.-copy-certs-to-VC-300x120.jpg 300w" sizes="(max-width: 726px) 100vw, 726px" /></h3>
<h3><strong><span style="color: #ff6600;">5. Run the vCenter Certificate manager tool to import and replace Self-signed certs with Custom CA Certificates</span></strong></h3>
<p>I have copied the above-mentioned 3 files to the directory &#8220;<strong>/root/finalcerts</strong>&#8221; in the vCenter server appliance.</p>
<p>To import the new CA signed certificate from the certificate manager tool. Login to vCenter Server Appliance via SSH and run the below command:</p>
<figure class="wp-block-image size-large is-resized"><figcaption><strong><em>/usr/lib/vmware-vmca/bin/certificate-manager</em></strong></figcaption></figure>
<p>Choose option <strong>“1”</strong> &#8211; &#8220;Replace Machine SSL certificate with Custom Certificate.&#8221;</p>
<p>Then, choose option <strong>&#8220;2&#8221;</strong> &#8211; “Import Custom Certificate (s) and key(s) to replace existing Machine SSL Certificate.&#8221;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7861" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/29.-Replace-VC-SSL-with-CA-signed.jpg" alt="Vcenter Certificate Replacement" width="1172" height="977" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/29.-Replace-VC-SSL-with-CA-signed.jpg 1172w, https://www.vmwarearena.com/wp-content/uploads/2023/09/29.-Replace-VC-SSL-with-CA-signed-300x250.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/29.-Replace-VC-SSL-with-CA-signed-768x640.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/29.-Replace-VC-SSL-with-CA-signed-1024x854.jpg 1024w" sizes="(max-width: 1172px) 100vw, 1172px" /></p>
<p>Specify the location of the Machine certificate, key file, and signing certificate as below:</p>
<table>
<tbody>
<tr>
<td colspan="1" rowspan="1"><strong>Type</strong></td>
<td colspan="1" rowspan="1"><strong>Path</strong></td>
</tr>
<tr>
<td colspan="1" rowspan="1">Machine certificate</td>
<td colspan="1" rowspan="1">/root/finalcerts/vc01.cer</p>
<p>(Contains full chain of contents of machine certificate, RootCA, and subordinate CA</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Key File machine SSL</td>
<td colspan="1" rowspan="1">/root/finalcerts/vc01.key</p>
<p>(Private key file generated during the VC CSR request)</td>
</tr>
<tr>
<td colspan="1" rowspan="1">Signing certificate</td>
<td colspan="1" rowspan="1">/root/finalcerts/rootca.cer</p>
<p>(Contains chain of contents of rootCA and Subordinate CA)</td>
</tr>
</tbody>
</table>
<p>Hit enter and Type <strong>&#8220;Y&#8221;</strong> to proceed to replace the Machine SSL certificate with the Custom CA certificate</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7862" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/30.-Replace-VC-SSL-with-CA-signed1.jpg" alt="Vcenter Certificate Replacement" width="1207" height="467" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/30.-Replace-VC-SSL-with-CA-signed1.jpg 1207w, https://www.vmwarearena.com/wp-content/uploads/2023/09/30.-Replace-VC-SSL-with-CA-signed1-300x116.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/30.-Replace-VC-SSL-with-CA-signed1-768x297.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/30.-Replace-VC-SSL-with-CA-signed1-1024x396.jpg 1024w" sizes="(max-width: 1207px) 100vw, 1207px" /></p>
<p>Services will be updated with the new custom certificate, therefore the vCenter server services will be restarted.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7863" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/31.-Replace-VC-SSL-with-CA-signed2.jpg" alt="Vcenter Certificate Replacement" width="1456" height="986" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/31.-Replace-VC-SSL-with-CA-signed2.jpg 1456w, https://www.vmwarearena.com/wp-content/uploads/2023/09/31.-Replace-VC-SSL-with-CA-signed2-300x203.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/31.-Replace-VC-SSL-with-CA-signed2-768x520.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/31.-Replace-VC-SSL-with-CA-signed2-1024x693.jpg 1024w" sizes="(max-width: 1456px) 100vw, 1456px" /></p>
<p>This process will restart all the vCenter Services. You can notice that &#8220;100% completed [All tasks completed successfully)</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7864" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/32.-Replace-VC-SSL-with-CA-signed3.jpg" alt="Vcenter Certificate Replacement" width="1166" height="976" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/32.-Replace-VC-SSL-with-CA-signed3.jpg 1166w, https://www.vmwarearena.com/wp-content/uploads/2023/09/32.-Replace-VC-SSL-with-CA-signed3-300x251.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/32.-Replace-VC-SSL-with-CA-signed3-768x643.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/32.-Replace-VC-SSL-with-CA-signed3-1024x857.jpg 1024w" sizes="(max-width: 1166px) 100vw, 1166px" /></p>
<p>After the vCenter Server Self Signed Certificates (SSL) certificates are replaced with Custom CA signed certificates, try to access the vCenter Server using the Web browser. You no longer see the Certificate error in the browser. You can see the Lock symbol which is nothing but a secure site.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7865" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/33.-VC-with-CA-signed-certificate.jpg" alt="Vcenter Certificate Replacement" width="867" height="400" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/33.-VC-with-CA-signed-certificate.jpg 867w, https://www.vmwarearena.com/wp-content/uploads/2023/09/33.-VC-with-CA-signed-certificate-300x138.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/33.-VC-with-CA-signed-certificate-768x354.jpg 768w" sizes="(max-width: 867px) 100vw, 867px" />Click on the Certificate and check the certification path. you will see a full chain of vCenter server certificates.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7866" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/34.-VC-with-CA-signed-certificate1.jpg" alt="Vcenter Certificate Replacement" width="785" height="585" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/34.-VC-with-CA-signed-certificate1.jpg 785w, https://www.vmwarearena.com/wp-content/uploads/2023/09/34.-VC-with-CA-signed-certificate1-300x224.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/34.-VC-with-CA-signed-certificate1-768x572.jpg 768w" sizes="(max-width: 785px) 100vw, 785px" /></p>
<p>You can also validate the same after login to the vCenter server and Certificate Management page.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7868" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/36.VC-with-CA-signed-certificates.jpg" alt="Vcenter Certificate Replacement" width="1569" height="773" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/36.VC-with-CA-signed-certificates.jpg 1569w, https://www.vmwarearena.com/wp-content/uploads/2023/09/36.VC-with-CA-signed-certificates-300x148.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/36.VC-with-CA-signed-certificates-768x378.jpg 768w, https://www.vmwarearena.com/wp-content/uploads/2023/09/36.VC-with-CA-signed-certificates-1024x504.jpg 1024w" sizes="(max-width: 1569px) 100vw, 1569px" /></p>
<p>That&#8217;s it. We have gone through the detailed procedure to replace the vCenter Server self-signed certificate with a Custom CA-signed certificate. I hope this is informative for you. Thanks for Reading. be social and share it with social media, if you feel worth sharing it.</p>
<p>The post <a href="https://www.vmwarearena.com/master-guide-vcenter-server-certificate-replacement/">Master Guide &#8211; vCenter Server Certificate Replacement with Custom CA</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BDRSuite – v7.0.0 Release Candidate &#8211; Backup KVM, Azure VM, Amazon EC2 and more</title>
		<link>https://www.vmwarearena.com/bdrsuite-v7-0-0-release-candidate/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bdrsuite-v7-0-0-release-candidate</link>
		
		<dc:creator><![CDATA[Mohammed Raffic]]></dc:creator>
		<pubDate>Sun, 10 Sep 2023 07:37:04 +0000</pubDate>
				<category><![CDATA[Vembu Backup]]></category>
		<guid isPermaLink="false">http://www.vmwarearena.com/?p=7870</guid>

					<description><![CDATA[<p>Vembu is a leading software product development that has been focusing on Backup and Disaster Recovery software for data centers over a decade.  It’s flagship offering- the BDR Suite of products consists of VMBackup for VMware vSphere and Hyper-V, BDRSuite is the most cost-effective and comprehensive backup &#38; disaster recovery software designed to protect data across virtual (VMware, [&#8230;]</p>
<p>The post <a href="https://www.vmwarearena.com/bdrsuite-v7-0-0-release-candidate/">BDRSuite – v7.0.0 Release Candidate &#8211; Backup KVM, Azure VM, Amazon EC2 and more</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Vembu is a leading software product development that has been focusing on Backup and Disaster Recovery software for data centers over a decade.  It’s flagship offering- the BDR Suite of products consists of VMBackup for <a href="http://www.vmwarearena.com/category/vsphere-6-5/">VMware vSphere</a> and <a href="http://www.cloudinspiration.com/category/microsoft-virtualization/" target="_blank" rel="noopener">Hyper-V</a>,</p>
<p>BDRSuite is the most cost-effective and comprehensive backup &amp; disaster recovery software designed to protect data across virtual (VMware, Hyper-V, KVM), Server (Windows, Linux, FileShare/NAS), Endpoints (Windows, Linux, Mac), Cloud (AWS, Azure), SaaS (Microsoft 365, Google Workspace) and Applications &amp; Databases (Microsoft Exchange Server, SQL Server, SharePoint and MySQL).</p>
<p>Vembu Backup is will be releasing <a href="https://www.bdrsuite.com/bdrsuite-v7-0-0-release-candidate/">BDRSuite 7.0.0</a> Release candidate (RC) soon for general availability. BDRSuite 7.0.0 will be soon releasing with great features. We will take a look at what&#8217;s included in BDRSuite 7.0.0 Release candidate(RC) in this article.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-7871" src="http://www.vmwarearena.com/wp-content/uploads/2023/09/Vembu-BDR-Suite.jpg" alt="Vembu BDR Suite" width="970" height="523" srcset="https://www.vmwarearena.com/wp-content/uploads/2023/09/Vembu-BDR-Suite.jpg 970w, https://www.vmwarearena.com/wp-content/uploads/2023/09/Vembu-BDR-Suite-300x162.jpg 300w, https://www.vmwarearena.com/wp-content/uploads/2023/09/Vembu-BDR-Suite-768x414.jpg 768w" sizes="(max-width: 970px) 100vw, 970px" /></p>
<h2 class="wp-block-heading"><strong>Key features and components of Vembu BDRSuite v7.0.0:</strong></h2>
<h3 class="newfeatureheading"><strong>KVM Backup and Recovery</strong></h3>
<p>BDRSuite now offers agentless backup for KVM virtual machines through seamless integration with KVM Hypervisor. It also includes changed block tracking, automated scheduling, flexible recovery options, and wide backup storage target compatibility.</p>
<p>Agentless Backup &amp; Recovery of KVM VMs through seamless KVM Hypervisor Integration. BDRSuite Provides below features:</p>
<div id="hpcolumn-both" class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first">
<div class="fusion-column-wrapper fusion-flex-column-wrapper-legacy">
<ul>
<li class="fusion-li-item-content">Agentless backup for KVM virtual machines</li>
<li class="fusion-li-item-content">Changed block tracking for incremental backups</li>
<li class="fusion-li-item-content">Retain VM backup data as long as you need</li>
<li class="fusion-li-item-content">Store backup data on local disk, NAS, SAN, Tape, S3, KVM Blob, Google Cloud, Wasabi, etc.</li>
<li class="fusion-li-item-content">Flexible recovery options include instant boot VM, file recovery &amp; more</li>
<li class="fusion-li-item-content">Scheduled and automated backups</li>
<li class="fusion-li-item-content">End-to-End encryption &amp; compression</li>
<li class="fusion-li-item-content">Centralized monitoring &amp; reporting capabilities</li>
</ul>
<h3><strong>Azure Backup and Recovery</strong></h3>
</div>
</div>
<p>BDRSuite offers agentless backup for Azure virtual machines using Azure Native APIs. It also includes incremental backups, automated scheduling, flexible recovery options, and wide backup storage target compatibility.</p>
<p>Native Agentless Backup &amp; Recovery for Microsoft Azure Virtual Machines provides below features:</p>
<ul>
<li>Agentless backups for Azure virtual machines</li>
<li>Incremental backups to efficiently backup only changed blocks</li>
<li>Application-aware backups &amp; Pre/Post Scripts</li>
<li>Store backups locally or on cloud storage – Azure Blob, S3, Google Cloud, Wasabi, etc</li>
<li>Customizable backup policies include scheduling, retention &amp; more</li>
<li>Flexible restore options include entire VM, file recovery, etc</li>
<li>Cross Subscription Restore</li>
<li>Automated snapshots &amp; retain them to launch VMs instantly</li>
<li>Built-in encryption &amp; compression for backups</li>
</ul>
<div id="hpcolumn-both" class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last">
<div class="fusion-column-wrapper fusion-flex-column-wrapper-legacy"></div>
</div>
<h3 class="newfeatureheading"><strong>AWS Backup and Recovery</strong></h3>
<p>In the previous version, configuring and scheduling automated snapshots of EC2 instances was supported for backups. This release brings the added capability of configuring backups to be stored locally or in the cloud, alongside support for multiple recovery options.  Most Cost-Effective AWS Backup &amp; Recovery Solution for EC2 Instances provides below features:</p>
<ul>
<li>Agentless backups for Amazon EC2 Instances</li>
<li>Incremental backups to efficiently backup only changed blocks</li>
<li>Application-aware backups &amp; Pre/Post Scripts</li>
<li>Store backups locally or on cloud storage – S3, Azure Blob, Google Cloud, Wasabi, etc</li>
<li>Customizable backup policies include scheduling, retention &amp; more</li>
<li>Flexible restore options include entire EC2 Instance, Volume recovery, etc</li>
<li>Schedule &amp; manage automated snapshots</li>
<li>Built-in encryption &amp; compression for backup data</li>
</ul>
<div id="hpcolumn-both" class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first">
<div class="fusion-column-wrapper fusion-flex-column-wrapper-legacy">
<p>I would strongly recommend to  keep an eye out for further announcements and updates as we work towards the complete Main Release BDRSuite v7.0.0, which will include even more features and improvements. Meantime, You can download the <a href="https://www.bdrsuite.com/bdrsuite-v7-0-0-release-candidate/" target="_blank" rel="noopener">BDRSuite v7.0.0 RC</a>  to play around with the rich feature sets to keep your hands dirty.</p>
<p>I hope this is informative for you. Thanks for Reading. Be social and share it with social media, if you feel worth sharing it.</p>
</div>
</div>
<div id="hpcolumn-both" class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last">
<div class="fusion-column-wrapper fusion-flex-column-wrapper-legacy">
<p>&nbsp;</p>
</div>
</div>
<p>The post <a href="https://www.vmwarearena.com/bdrsuite-v7-0-0-release-candidate/">BDRSuite – v7.0.0 Release Candidate &#8211; Backup KVM, Azure VM, Amazon EC2 and more</a> appeared first on <a href="https://www.vmwarearena.com">VMware Arena</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
