This issue can occur if you are using: Hardware that is not listed in the VMware Hardware Compatibility Guide A corrupt ESXi 5.0 installation file supplied by a vendor A vendor-provided USB drive or CD/DVD media that is faulty
Tag: VMware
TSM for VE: FMM16014I The Return Code is 2
You may get this Critical Error once you click the ‘Tivoli Data Protection for VMware’ in the Solution and Application. It means something is incorrect, and leads to the VMCLI command failed to run. The first thing you need to do is to check the log which is located in ‘C:\Program Files (x86)\Common Files\Tivoli\TDPVMware\VMwarePlugin\logs\vmcli’ on … Continue reading TSM for VE: FMM16014I The Return Code is 2
TSM 6.3: Install Data Protection for VMware
Before the installation, it is good to get familiar with TSM Data Protection for VMware Architecture. OK, let’s roll. Login into the ‘Data Protection for VMware vCenter Plug-in Server’ showing in the first figure. This server plays the role of proxy node for backing up VMware. You can install only one Data Protection for … Continue reading TSM 6.3: Install Data Protection for VMware
ESXi 5.0 PXE Install
ESXi PXE install has no differences from other PXE installs, you need DHCP server, tftp server and the installation ISO. In my example, I build the DHCP server and tftp server on CentOS 6.3 minimal installation. 1) Install and configure the DHCP Server yum –y install dhcp cd /etc/dhcp/ cp –a dhcpd.conf dhcpd.conf.bak Modify dhcpd.conf … Continue reading ESXi 5.0 PXE Install
vSphere 5.0 Security Hardening Recommended VM Settings Configure Script
1) Create 3 text files, one for each security profile: profile3_Low.txt RemoteDisplay.maxConnections,2 profile2_Med.txt RemoteDisplay.maxConnections,1floppyX.present,FALSEserialX.present,FALSEparallelX.present,FALSEusb.present,FALSEideX:Y.present,FALSEisolation.tools.unity.push.update.disable,TRUEisolation.tools.ghi.launchmenu.change,TRUEisolation.tools.memSchedFakeSampleStats.disable,TRUEisolation.tools.getCreds.disable,TRUEisolation.tools.autoInstall.disable,TRUEtools.guestlib.enableHostInfo,FALSE profile1_High.txt RemoteDisplay.maxConnections,1floppyX.present,FALSEserialX.present,FALSEparallelX.present,FALSEusb.present,FALSEideX:Y.present,FALSEisolation.tools.unity.push.update.disable,TRUEisolation.tools.ghi.launchmenu.change,TRUEisolation.tools.memSchedFakeSampleStats.disable,TRUEisolation.tools.getCreds.disable,TRUEisolation.tools.autoInstall.disable,TRUEtools.guestlib.enableHostInfo,FALSEisolation.tools.ghi.autologon.disable,TRUEisolation.bios.bbs.disable,TRUEisolation.tools.hgfsServerSet.disable,TRUEisolation.monitor.control.disable,TRUE 2) Create the ‘vSphere_Security_Configure.ps1’ script #Uncomment if this SnapIn has not been added#Add-PSSnapIn VMware.VimAutomation.Core CLS #Specify the VM name here$VM = Get-VM "DEV-LINUX-01" #Specify the security profile file$file = Import-Csv c:\powercli\profile3_Low.txt -Header Key,Value $creds = Get-VICredentialStoreItem -file “C:\powercli\credfile.xml”Connect-viserver -Server … Continue reading vSphere 5.0 Security Hardening Recommended VM Settings Configure Script