Solved

vSphere vMA

Posted on 2013-06-13
2
117 Views
Last Modified: 2015-08-07
I have installed and configured the vMA 5.x.  I have added and registered my vcenter server and two hosts (ESXi01, ESXi02).  When i connect to the vMA using vi-admin and target the ESXi02 host i can run all my commands with out issues.  However when I connect to the ESXi01 host and i try a command like resxtop i am prompted for user credentials, any credentials I try fails with "Login failed, reason: vim.fault.NoPermission" or "Login failed, reason: vim.fault.InvalidLogin".  Even though when I first connect using the vi-admin account I have tried supplying the vi-admin account, I've also tried using my windows credentials and that fails, also I've tried using the root account of the host and that fails as well.  Both hosts look exactly the same so I don't know what is prompting credentials for one host and not the other.  This is really bugging me so any help is greatly appreciated.
0
Comment
Question by:cgitst
2 Comments
 
LVL 30

Expert Comment

by:IanTh
Comment Utility
have a look in the vpxd.log  it will give us more info
0
 
LVL 19

Accepted Solution

by:
compdigit44 earned 500 total points
Comment Utility
What is the build number of your vMA? Version 5.0 has a know bug with REsxtop:

https://www.vmware.com/support/developer/vima/vma50/vma_50_relnotes.html

Resxtop commands fail with the vim.fault.NoPermission error.
Log in to vMA as vi-admin and add targets. Log in as vi-user and initialize the target using the vifptarget command. Now, when you run resxtop commands, the commands fail with the vim.fault.NoPermission error.
Workaround: Do one of the following:

    Log in to vMA as vi-admin to run the command.
    Log in to a different shell as vi-user and run the command without vi-fastpass.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
Teach the user how to configure vSphere Replication and how to protect and recover VMs Open vSphere Web Client: Verify vsphere Replication is enabled: Enable vSphere Replication for a virtual machine: Verify replicated VM is created: Recover replica…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now