?
Solved

cannot mount snapshot volume on ESXi 5.5

Posted on 2013-11-11
3
Medium Priority
?
1,320 Views
Last Modified: 2013-11-11
Hi
I'm trying to mount a snapshot to be presented on a newly installed ESXi 5.5 just to be able to recover a VM.

I bring the snapshot online on EQL, add the host iscsi name
I can see the volume on ESXi, try to add datastore, I choose resignature and get this
  resignature error
0
Comment
Question by:Bes4dmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 123

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 39638582
if you use the console, (or remotely via ssh), and use:-

esxcfg-volume -l

example output

~ # esxcfg-volume -l
VMFS3 UUID/label: 4cc89503-f054d0d4-2865-00221958e471/nas3-vmfs
Can mount: Yes
Can resignature: No (the volume is being actively used)
Extent name: naa.600140588e9bab7d2b7ed4b53dadc1de:1     range: 0 - 1048319 (MB)

and then

esxcfg-volume -m 4cc89503-f054d0d4-2865-00221958e471

or

esxcfg-volume -m nas3-vmfs
0
 
LVL 1

Author Comment

by:Bes4dmin
ID: 39638645
thanks hanccoka

When I executed esxcfg-volume -m 4cc89503-f054d0d4-2865-00221958e471 I got "Error: Read only"
Then it hit me that the snapshot were set to read only on EQL so when I changed that to read & write I could mount and resignature even from vSphere client.
Thanks!
0
 
LVL 123
ID: 39638651
vSphere Client is prone to not reporting or feedback correctly!
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question