
Search Results
252 results found with an empty search
- Upgrading Operations for Logs through Suite Lifecycle
Recently VMware has announced that there are few vulnerabilities which are affecting VMware Aria Operations for Logs which are documneted under VMSA As per VMSA , we need to upgrade VMware Aria Operations for Logs ( formerly vRLI ) to version 8.12. Remember this resolves another certificate issue documented under KB91441 Procedure VMware Aria Operations for Logs 8.12 is supported along with VMware Aria Suite Lifecycle 8.12 Which means before uprgading VMware Aria Operations for Logs , we should upgrade VMware Aria Suite Lifecycle to 8.12 I have documented how to upgrade Suite Lifecycle to 8.12 in this blog post . This descrived CD Rom method. I'll share screenshots from Online method. It's pretty much same just the source is different. After a while upgrade is done. vRSLCM is now VMware Aria Suite Lifecycle We will refer the new VMware Aria Suite Lifecycle as Suite Lifecycle to make it much easier If we go to Product Support Pack pane under settings , we can see that the new policy 8.12.0.0 which is the out of the box policy which comes with upgrade adds support for VMware Aria Operations 8.12 VMware Aria Automation 8.12 VMware Aria Orchestrator 8.12 VMware Aria Automation Config 8.12 VMware Aria Operations for Logs 8.12 Now , let's browse our environment and see what all products we have Note: Even though the version of the managed products are still old for example verison 8.10 and below, we still show VMware Aria Branding as it's difficult to maintain both vRealize and VMware Aria branding together. No matter what version of the product is available, we will show only the new "VMware Aria" branding once we uprgade Suite Lifecycle to version 8.12 Now let's uprgade our existing vRLI environment whcih call in the UI as Logs Let's begin with downloading the binary and wait till it's completed. Once done , let's go to the product and perform inventory sync Inventory Sync is now completed. Let's now start VMware Aria Operations for Logs upgrade to version 8.12 Just performed inventory sync so i'll directly proceed with upgrade Ensure appropriate binary is mapped Take and Retain Snapshot Validations Successful Review and Submit the request It took 24 minutes end to end to complete the uprgade process , remember this includes This is a single node VMware Aria Operations for Logs Diving into logs a bit.... Important Logs to Monitor /storage/core/loginsight/var/upgrade.log /var/log/vrlcm/vmware_vrlcm.log ****** Reference: /storage/core/loginsight/var/upgrade.log ****** ******Certificiate , Version and Disk Space checks are performed ****** 2023-04-23 00:41:51,607 loginsight-pak-upgrade INFO Certificate verified: VMware-vRealize-Log-Insight.cert: C = US, ST = California, L = Palo Alto, O = "VMware, Inc." error 18 at 0 depth lookup:self signed certificate OK 2023-04-23 00:41:51,629 loginsight-pak-upgrade INFO Signature of the manifest validated: Verified OK 2023-04-23 00:41:52,466 loginsight-pak-upgrade INFO Current version is 8.10.2-21145187 and upgrade version is 8.12.0-21618456. Version Check successful! 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Available Disk Space at /tmp: 3402510336 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Available Disk Space at /storage/core: 468438704128 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Available Disk Space at /storage/var: 19037392896 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:41:52,467 loginsight-pak-upgrade INFO Loading eula license successful! 2023-04-23 00:41:52,468 loginsight-pak-upgrade INFO Done! 2023-04-23 00:41:53,409 loginsight-pak-upgrade INFO Certificate verified: VMware-vRealize-Log-Insight.cert: C = US, ST = California, L = Palo Alto, O = "VMware, Inc." error 18 at 0 depth lookup:self signed certificate OK PAK file is verified 2023-04-23 00:41:53,422 loginsight-pak-upgrade INFO Signature of the manifest validated: Verified OK 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Current version is 8.10.2-21145187 and upgrade version is 8.12.0-21618456. Version Check successful! 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Available Disk Space at /tmp: 3402534912 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Available Disk Space at /storage/core: 468438573056 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Available Disk Space at /storage/var: 19037380608 2023-04-23 00:41:53,658 loginsight-pak-upgrade INFO Disk Space Check successful! 2023-04-23 00:46:30,378 loginsight-pak-upgrade INFO Checksum validation successful! ****** Upgrade is triggered ****** 2023-04-23 00:46:30,381 loginsight-pak-upgrade INFO Attempting to upgrade to version 8.12.0-21618456 2023-04-23 00:46:30,696 upgrade-driver INFO Starting 'upgrade-driver' script ... 2023-04-23 00:46:30,696 upgrade-driver INFO Start processing the manifest file ... 2023-04-23 00:46:30,708 upgrade-driver INFO Log Insight TO_VERSION in manifest file is 8.12.0-21618456 2023-04-23 00:46:30,708 upgrade-driver INFO Parsed version is 8.12.0-21618456 2023-04-23 00:46:30,708 upgrade-driver INFO Creating file /storage/core/upgrade-version to store upgrade version. 2023-04-23 00:46:30,718 upgrade-driver INFO The file /storage/core/upgrade-version is created successfully. 2023-04-23 00:46:30,739 upgrade-driver INFO Start upgrading cassandra sstable schema... 2023-04-23 00:46:33,487 upgrade-driver INFO Cassandra sstable schema upgrading done. 2023-04-23 00:46:39,873 upgrade-driver INFO Cassandra snapshot run time: 0:00:06.386209 2023-04-23 00:46:39,874 upgrade-driver INFO Start processing key list ... 2023-04-23 00:46:39,874 upgrade-driver INFO Start processing rpm list ... 2023-04-23 00:46:39,874 upgrade-driver INFO Rpm by name upgrade-image-8.12.0-21618456.rpm 2023-04-23 00:49:24,515 upgrade-driver INFO INFO: Running /storage/core/upgrade/kexec-li - Resize|Partition|Boot ... Starting to run kexec-li script ... Reading and saving /etc/ssh/sshd_config Reading and saving old ssh keys if key based Authentication is enabled cp: cannot stat '/root/.ssh//id_rsa': No such file or directory cp: cannot stat '/root/.ssh//id_rsa.pub': No such file or directory cp: cannot stat '/root/.ssh//known_hosts': No such file or directory Reading and saving /etc/hosts Reading and saving ssh host keys Reading and saving /var/lib/loginsight-agent/liagent.ini Reading and saving hostname Reading and saving old cassandra keystore Failed copying /usr/lib/loginsight/application/lib/apache-cassandra-*/conf/keystore* Reading and saving old default keystore Reading and saving old default truststore Reading and saving old tomcat configs chmod ing /storage/core/upgrade/vmdk-extracted-root/usr/lib/loginsight/application/etc/3rd_config/keystore* chmod ing /storage/core/upgrade/vmdk-extracted-root/usr/lib/loginsight/application/etc/truststore* Reading and saving old loginsight.conf Reading and saving old password in /etc/shadow Root password info root P 04/22/2023 0 365 7 -1 Root password change date is 04/22/2023 Root password is set. Password reset will not be required on first login. Reading and saving /etc/fstab Reading and saving cacerts Copying java.security to java.security.old Reading and saving network configs Reading and saving resolv.conf Checking for certificate renewal Current certificate fingerprint: 69:3F:9C:F7:52:7B:B6:F8:2C:E3:AF:A1:C1:2A:16:0B:A1:A7:53:92 Cassandra and tomcat certificate fingerprints are different. Updating... Lazy partition is sda5 sda partition count is 5 /storage/core/upgrade/kexec-li script run took 233 seconds Partition sda5 , which is lazy partition, will be formatted and will become root partition Photon to Photon upgrade flow will be called, where base OS was Photon ... Starting to run photon2photon script ... Root partition copy took 194 seconds clean up upgrade-image.rpm Removing lock file /storage/core/upgrade/photon2photon-base-photon.sh script run took 196 seconds Rebooting... After the reboot and services are up , upgrade is now complete.
- What's CAP in VMware Aria Suite Lifecycle 8.12
CAP is a Common Appliance Platform, an approach to standardize appliance management for all VMware appliances which would significantly reduce overhead and operational inefficiencies CAP improves appliance upgrade experience for VMware Aria Suite Lifecycle, this is a direct replacement for VMware Appliance Management Interface , also known as VAMI Benefits of CAP
- What's New in vRealize Automation 8.8.1
vRealize Automation 8.8.1 capabilities are focusing on the areas of multi-cloud support with ability to Enable/Disable Log Analytics for Azure VMs Manage resource RBAC permission with quick create VM Resolved CVE-2022-22965. The benefits of vRealize Automation 8.8.1 include: Cloud Guardrails initial functionality to access the out of the template library, the ability to combine templates into desired states, and the ability to enforce desired states Ability to enable/disable Log Analytics for Azure VMs - Day2 - Customers can now enable/disable Azure VM log Analytics. Manage resource RBAC permission with quick create VM : Quick create VM / Quick create VM with existing network /Quick create VM with new/existing storage Updated Spring version 5.3.18 to resolve CVE-2022-22965 - please see https://www.vmware.com/security/advisories/VMSA-2022-0010.html Support for remote vSphere agents - vRealize Automation on-premises will support management of remote vCenter Server Cloud accounts Updated vRO AWS plugin that supports newer AWS Java SDK Documentation and Links Download links: vRealize Automation 8.8.1 vRealize Orchestrator 8.8.1 vRealize Automation Saltstack Config 8.8.1 Release Notes: vRealize Automation 8.8.1 vRealize Orchestrator 8.8.1 Documentation Links: vRealize Automation 8.8.1 vRealize Orchestrator 8.8.1
- Upgrading to VMware Aria Suite Lifecycle 8.12
Current version of vRSLCM in my lab is of version 8.10 PSPACK 9. Goal is to upgrade to version 8.12. As we all know from this version onwards vRSLCM will now be refferred as VMware Aria Suite Lifecycle I have mapped updaterepo iso on the vRSLCM appliance using datastore iso option Login into vRSLCM and then click on check for upgrade Remember to take a snapshot without fail before attempting an upgrade Here you go there's my update There's a product pane which tells you to acknowledge that necessary prerequisites have taken place , accept to move forward There are 6 validations performed Upgrade started During this phase check /var/log/vrlcm/vmware_vrlcm.log /opt/vmware/var/log/vami/updatecli.log /opt/vmware/bootstrap/postupdate.log After few minutes , here you go , the all nee VMware Aria Suite Lifecycle 8.12 Here's the home page Environments pane Remember , I just upgraded by vRSLCM and once done , as expected all my existing products would start displaying the new names. Unless i upgrade the product, on the product end it would still show the old branding. That's the system settings This concludes uprgade of vRSLCM to what now we call VMware Aria Suite Lifecycle 8.12
- Changing VMware Aria Automation Config Passwords using Suite Lifecycle API's
There are 2 local accounts of VMware Aria Automation Config for which VMware Aria Suite Lifecycle would be able to change passwords They are admin ( root ui account ) root Variables used {{lcmurl}} FQDN of Suite Lifecycle {{envid}} Environment ID where this product resides {{vsscprdid}] VMware Aria Automation Config Product ID. This is always "vssc" {{vsscnodetype}} Node Type for VMware Aria Automation Config. This is always vssc-raas for now {{currentpasswordvmid}} Fetch from the Environment API response. VMID of the password used by the product {{currentpasswordalias}} Fetch from the Environment API response. Alias of the current password being used by product {{tenantid}} If it is a vRA Integrated , then the tenant would be vIDM. If it is a standalone one , then it would be Standalone vRSSC as shown below Details of API's admin password Method: PUT URL: {{lcmurl}}/lcm/lcops/api/v2/environments/{{envid}}/products/{{vsscprdid}}/admin-password?tenantId=Standalone+vRASSC Body: { "adminPassword" : "locker:password:{{newpasswordvmid}}:{{newpasswordalias}}" , "currentAdminPassword" : "locker:password:{{currentpasswordvmid}}:{{currentpasswordalias}}" } Expected Response Code: root password Method: PUT URL: {{lcmurl}}/lcm/lcops/api/v2/environments/{{envid}}/products/{{vsscprdid}}/nodes/{{vsscnodetype}}?tenantId=Standalone+vRASSC Body: { "currentPassword" : "locker:password:{{currentpasswordvmid}}:{{currentpasswordalias}}" , "hostName" : " {{sschostname}} " , "newPassword" : "locker:password:{{newpasswordvmid}}:{{newpasswordalias}}" , "userNameToUpdate" : "root" } Expected Response Code: Working Example ( admin ) Login into VMware Aria Suite Lifecycle Method: POST URL: {{lcmurl}}/lcm/authzn/api/login Authentication: Basic Auth admin@local / Password of admin@local Expected Response Code: 200 OK Outcome: There's a JSESSIONID generated and added as a cookie Fetch existing details of saltstack using API Method: GET URL: {{lcmurl}}/lcm/lcops/api/v2/environments Authentication: Basic Auth admin@local / Password of admin@local Expected Response Code: 200 OK Now, that we have details needed for successful password change , let's create a new password in locker specifically for VMware Aria Automation Config For creating a new password object using API inside locker , follow below procedure Method: POST URL: {{lcmurl}}/lcm/locker/api/v2/passwords Authentication: Basic Auth admin@local / Password of admin@local Body: { "alias" : "autoconfig_20042023" , "password" : "AutoConfig2023!" , "passwordDescription" : "Auto Config Password" , "userName" : "" } Expected Response Code: 200 OK Changing Admin Password Method: PUT URL: {{lcmurl}}/lcm/lcops/api/v2/environments/{{envid}}/products/{{vsscprdid}}/admin-password?tenantId=Standalone+vRASSC Authentication: Basic Auth admin@local / Password of admin@local Body: { "adminPassword" : "fc0cbc52-deab-4a14-810a-a78b09e01721:autoconfig_20042023" , "currentAdminPassword" : "locker:password:e5c77612-310c-4793-972f-d4cb6a93d1f7:installerPassword" } Expected Response Code: 200 OK Outcome: There is a request id generated Now upon checking UI the request is completed and the password is changed Login into VMware Aria Automation Config UI and then check out that you should be able to login using new passwords. Working Example ( root ) Method: PUT URL: {{lcmurl}}/lcm/lcops/api/v2/environments/{{envid}}/products/{{vsscprdid}}/nodes/{{vsscnodetype}}?tenantId=Standalone+vRASSC Authentication: Basic Auth admin@local / Password of admin@local Body: { "currentPassword" : "locker:password:eb04d7cc-c101-44b2-9723-a89586afce4c:newpassword" , "hostName" : " {{sschostname}} " , "newPassword" : "locker:password:e5c77612-310c-4793-972f-d4cb6a93d1f7:installerPassword" , "userNameToUpdate" : "root" } Expected Response Code: 200 OK Outcome: There is a request id generated
- Adding a new webhook for git results in failure
Recently , worked on a case where user had challenges in creating a webhook for git We were hitting an exception stating 400 Bad Request from POST http://identity-service-prelide-sb.cluster.local:8000/csp/gateway/am/api/auth/api-tokens/authorize When we fill all the information needed to save / create the webhook , we hit above exception. So what's happening in the background . We will find all the information w.r.t this error in codestream logs -------------------------------------------------------------------------------------------------------------------------- When an API call is made to authorize -------------------------------------------------------------------------------------------------------------------------- 2022-05-24T02:13:15.501Z DEBUG codestream [host='codestream-app-74cd595686-6vxfc' thread='parallel-9' user='' org='' trace='' parent='' span=''] o.s.w.r.f.client.ExchangeFunctions.traceDebug:119 - [4baaf594] HTTP POST http://identity-service.prelude.svc.cluster.local:8000/csp/gateway/am/api/auth/api-tokens/authorize -------------------------------------------------------------------------------------------------------------------------- This returns a 400 response stating invalid refresh token -------------------------------------------------------------------------------------------------------------------------- 2022-05-24T02:13:15.895Z INFO identity-service [host='identity-service-app-7857cb8674-4v5nq' thread='pool-3-thread-1' user='' org='' trace=''] com.vmware.identity.rest.RestClient.lambda$logRequest$1:74 - POST https://sso.iaas.nz.service.test/SAAS/API/1.0/oauth2/token?grant_type=refresh_token 2022-05-24T02:13:15.916Z ERROR identity-service [host='identity-service-app-7857cb8674-4v5nq' thread='reactor-http-epoll-3' user='' org='' trace=''] c.v.i.c.RestResponseEntityExceptionHandler.logBriefError:213 - Handling bad request exception: java.lang.IllegalArgumentException: REST error received: { "error": "invalid_grant", "error_description": "Invalid refresh token: Njg3MDIxNjg2MjI0OmsuDq93TLejOHGxNc0uR5eMuskn" }, status code: 400 BAD_REQUEST thrown at com.vmware.identity.common.util.WebClientUtil.handleException:36 2022-05-24T02:13:15.916Z INFO identity-service [host='identity-service-app-7857cb8674-4v5nq' thread='reactor-http-epoll-1' user='' org='' trace=''] reactor.netty.http.server.AccessLog.info:270 - 10.244.0.76 - - [24/May/2022:02:13:15 +0000] "POST /csp/gateway/am/api/auth/api-tokens/authorize HTTP/1.1" 400 303 8080 414 ms -------------------------------------------------------------------------------------------------------------------------- After exception in identity-service, codestream throws the same exception -------------------------------------------------------------------------------------------------------------------------- 2022-05-24T02:13:15.916Z DEBUG codestream [host='codestream-app-74cd595686-6vxfc' thread='reactor-http-epoll-12' user='' org='' trace='' parent='' span=''] o.s.w.r.f.client.ExchangeFunctions.traceDebug:119 - [4baaf594] [166c65f5-1] Response 400 BAD_REQUEST 2022-05-24T02:13:15.918Z INFO codestream [host='codestream-app-74cd595686-6vxfc' thread='reactor-http-epoll-10' user='' org='' trace='' parent='' span='] reactor.netty.http.server.AccessLog.info:270 - 10.244.0.63 - - [24/May/2022:02:13:15 +0000] "POST /codestream/api/git-webhooks HTTP/1.1" 400 330 8000 438 ms The reason for exception is that there is a section called API Token in WebHooks. This API token is the refresh token generated from vRA This token has to be valid Once this was changed and a valid token was provided , we were able to save the webhook or create it. One more method to verify if the token is expired is through the API response The Expires HTTP header contains the date/time after which the response is considered expired. Invalid expiration dates with value 0 represent a date in the past and mean that the resource is already expired
- vIDM 3.3.x appliance has no space left on device /db/data postgres DB taking all the space
vIDM DB partition is full or nearly out of space. To validate the DB partition is using most of the space run the following commands: du -sh /db/elasticsearch du -sh /db/rabbitmq du -sh /db/data This will allow to see that /db/data taking most of the space. If it is one of the other disk trees, please see other KBs (ie audit data). Apply the following steps to clean up the bloated DB table Step:1 Take Product Snapshot Step:2 Stop Services service horizon-workspace stop Step:3 Fetch the Password to connect with postgres database cat /usr/local/horizon/conf/db.pwd If you do not want to expose the password then use below command as it is. It will export the password into PGPASSWORD export PGPASSWORD=`cat /usr/local/horizon/conf/db.pwd` example snippet root@idm [ /opt/vmware/horizon/workspace/logs ]# export PGPASSWORD=`cat /usr/local/horizon/conf/db.pwd` root@idm [ /opt/vmware/horizon/workspace/logs ]# /opt/vmware/vpostgres/current/bin/psql -U postgres saas psql.bin (9.6.21 (VMware Postgres 9.6.21.0-18007711 release)) Type "help" for help. saas=# \q root@idm [ /opt/vmware/horizon/workspace/logs ]# When you execute below Step:4 command to login then it will not prompt you for password again Step:4 Connect to Postgres database using below command. Output snippet shown below too. Remember the password shown below is from my lab. Don't use it in your environment /opt/vmware/vpostgres/current/bin/psql -U postgres saas example snippet: root@idm [ ~ ]# cat /usr/local/horizon/conf/db.pwd X9cEZskwwWRdeqP8hPE30TB_KKYx_Lq2 root@idm [ ~ ]# /opt/vmware/vpostgres/current/bin/psql -U postgres saas Password for user postgres: psql.bin (9.6.21 (VMware Postgres 9.6.21.0-18007711 release)) Type "help" for help. saas=# Step:5 Fetch the table sizes using below query SELECT nspname || '.' || relname AS "relation", pg_size_pretty(pg_total_relation_size(C.oid)) AS "total_size" FROM pg_class C LEFT JOIN pg_namespace N ON (N.oid = C.relnamespace) WHERE nspname NOT IN ('pg_catalog', 'information_schema') AND C.relkind <> 'i' AND nspname !~ '^pg_toast' ORDER BY pg_total_relation_size(C.oid) DESC LIMIT 20; Step:6 Truncate the table as shown below using command truncate table "OAuth2RefreshToken" CASCADE; Step:7 Check the row count for three tables select count(*) from "OAuth2RefreshToken"; select count(*) from "OAuth2AccessToken"; select count(*) from "SuiteTokenCache"; Step:8 Execute Full Vacuum using below command vacuum full verbose; Output would be sometime like below saas=# vacuum full verbose; INFO: vacuuming "saas.databasechangelog" INFO: "databasechangelog": found 0 removable, 1368 nonremovable row versions in 47 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.07 sec. INFO: vacuuming "saas.databasechangeloglock" INFO: "databasechangeloglock": found 18 removable, 1 nonremovable row versions in 1 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. INFO: vacuuming "saas.ForbiddenTenantName" INFO: "ForbiddenTenantName": found 0 removable, 0 nonremovable row versions in 0 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. INFO: vacuuming "saas.MasterKey" INFO: "MasterKey": found 0 removable, 0 nonremovable row versions in 0 pages * * * * INFO: vacuuming "saas.ResourceTypeRegistry" INFO: "ResourceTypeRegistry": found 2 removable, 3 nonremovable row versions in 1 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.02 sec. INFO: vacuuming "saas.EndUserCatalogStorage" INFO: "EndUserCatalogStorage": found 0 removable, 0 nonremovable row versions in 0 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. VACUUM saas=# Step:9 Re-Index table OAuth2RefreshToken and perform full vacuum again To ReIndex reindex table "OAuth2RefreshToken"; Full Vacuum vacuum full verbose; example snippets saas=# vacuum full verbose; INFO: vacuuming "saas.databasechangelog" INFO: "databasechangelog": found 0 removable, 1368 nonremovable row versions in 47 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.07 sec. INFO: vacuuming "saas.databasechangeloglock" INFO: "databasechangeloglock": found 18 removable, 1 nonremovable row versions in 1 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. INFO: vacuuming "saas.ForbiddenTenantName" INFO: "ForbiddenTenantName": found 0 removable, 0 nonremovable row versions in 0 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. INFO: vacuuming "saas.MasterKey" INFO: "MasterKey": found 0 removable, 0 nonremovable row versions in 0 pages * * * * INFO: vacuuming "information_schema.sql_features" INFO: "sql_features": found 0 removable, 671 nonremovable row versions in 7 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.01 sec. INFO: vacuuming "saas.ResourceProfileMapping" INFO: "ResourceProfileMapping": found 0 removable, 0 nonremovable row versions in 0 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. INFO: vacuuming "saas.IDPOrgNetwork" INFO: "IDPOrgNetwork": found 0 removable, 2 nonremovable row versions in 1 pages DETAIL: 0 dead row versions cannot be removed yet. CPU 0.00s/0.00u sec elapsed 0.00 sec. VACUUM Step:10 Exit Database \q Step:11 Execute a Postgres Service Restart root@idm [ ~ ]# service vpostgres restart root@idm [ ~ ]# Step:12 Start Horizon Application service horizon-workspace start Step:13 Wait for the application to completely initialize Log Location: /opt/vmware/horizon/workspace/logs Initially you would see information being logged under workspace.log , then connector.log and horizon.log Monitor for any exceptions Step:14 Once the whole application is initialized you may perform check on the table again by logging into database as shown below Also perform table size check if needed Step:15 Check the disk space now and perform a health check to see if everything is working as expected
- Identifying vRA Version through API
Let me show an example of how we can identify version of vRA through API Request As a first step we need to fetch the authentication token API: POST {{vraurl}}/csp/gateway/am/api/login?{{access_token}} Headers: Content-Type: application/json Body: { "username" : " {{username}} " , "password" : " {{password}} " } Tests: var data = JSON . parse ( responseBody ); postman . setEnvironmentVariable ( "access_token" , data . cspAuthToken ); Params {{access_token}} Response { "cspAuthToken" : "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjMxMzk2MzUxOTA5ODI4MzAxNjUifQ.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.uGIvog_oQ_cl-LeP9h_NcuBUmlqJDmFRkKxfU7YZXaRhlmJW9HC6ycTGjKW8yNJ83v6HMAEMz2PiVNgT09JMUHysrzQJUGnkcBGYnwD1T5SfvVvsFNsjdvq1vZ4tDc_wnZuX_VnHrgRP9QpMvNrU0KXvRNb23tAdfx8bVuvDCpmNQ3jUQZDpS5gvIqw3jS-vLhzAO-Mo0gE4am9h-zHvNg_UKyrfz2gMpWdyKYPw4ARHS8CDFuFcKimakPdbzE1AWeTtVWXfZwbNgaoQ-oGqw2N4MgQSy4Ov6oi6mPfz5YY1hGkwKEM5z8sX25VZC7lxwIRkkoLLmo9Yckic0v0vvQ" } Once we execute you would be fetching an authentication token. Replace the variables with appropriate values Request Create an API to fetch version API: GET {{vraurl}}/config.json Authorization: {{access_token}} Response { "applicationVersion" : "dlJlYWxpemUgQXV0b21hdGlvbiA4LjcuMC4yMTE2OSAoMTk1MDg1MDUpCg==" , "vac" : { "tableName" : "symphony_tango_ui" , "collectorId" : "vRA_ui.8_7" , "endpointEnv" : "production" }, "disableTelemetry" : true , "disablePendo" : true , "cloudFront" : false , "deployment" : "onprem" , "featureFlags" : { "ENABLE_SEGMENT_IO" : false , "ENABLE_REQUEST_FORM_CUSTOMIZATION" : true , "ADMIN_MENU_ENABLED" : true , "DISABLE_WORKFLOW_ENUMERATION" : true , "ENABLE_MIGRATION" : true , "ENABLE_STANDALONE_ASSESSMENT" : false , "ENABLE_V2T_MIGRATION" : true , "QUICKSTART_TILE_ENABLED" : true } } We will now use the applicationVersion base64 value , decode it to get version of vRealize Automation Login into https://www.base64decode.org/ Copy the string from the previous step dlJlYWxpemUgQXV0b21hdGlvbiA4LjcuMC4yMTE2OSAoMTk1MDg1MDUpCg==
- Comprehensive Guide to Upgrade & PSPAK Implementation for vRealize Suite Lifecycle Manager 8.x
I wanted to explore what really happens in the background and understand the whole flow during upgrade and product support pack implementation. This is the most comprehensive guide ever written for vRSLCM in terms of upgrade So , I decided to deploy a vRSLCM 8.6.2 and then upgrade it to 8.8. After that's successful , i would then apply 8.8.0.1 Policy that's PSPAK1 Here's the link to the whole documentation , download the pdf which has compete steps and snippets Attaching mind map here just for reference. This is present in the pdf too. Snippets in the document explains what log you need to check on each phase of the upgrade
- Blank Error Message on vRSLCM 8.8.x when we check for System Upgrade
When you perform an upgrade to latest version of vRSLCM that's 8.8.2.3 and you perform a "Check for Upgrade" it would throw a red banner which looks like an exception with no message This is a cosmetic issue and has no impact of product functionality Ideally , when your on latest version of vRSLCM , then you perform a system upgrade check you would be returned that there is no upgrade available. This is still the behavior in the background. Due to a known issue instead of a message we get an exception. This behavior is being fixed in upcoming release of vRSLCM From logs perspective , when you click on "check for upgrade" this is what happens in the background Reference: vmware_vrlcm.log ## checks if it's a vcf based env, it's not ## 2022-08-11 08:29:17.676 INFO [http-nio-8080-exec-4] c.v.v.l.l.c.DeploymentsController - -- is vcF user ::false ## executes update check command ## 2022-08-11 08:29:17.677 INFO [http-nio-8080-exec-4] c.v.v.l.u.ShellExecutor - -- Executing shell command: /opt/vmware/bin/vamicli update --check 2022-08-11 08:29:17.679 INFO [http-nio-8080-exec-4] c.v.v.l.u.ProcessUtil - -- Execute /opt/vmware/bin/vamicli ## result returned is absolutely right. There are no further upgrades available for 8.8.2 ## 2022-08-11 08:29:18.582 INFO [http-nio-8080-exec-4] c.v.v.l.u.ShellExecutor - -- Result: [Checking for available updates, this process can take a few minutes... . Available Updates - No available updates found]. 2022-08-11 08:29:18.583 INFO [http-nio-8080-exec-4] c.v.v.l.u.u.LCMUpgradeUtil - -- Output of update check : Checking for available updates, this process can take a few minutes... . Available Updates - No available updates found 2022-08-11 08:29:18.583 INFO [http-nio-8080-exec-4] c.v.v.l.l.c.DeploymentsController - -- Authentication object is not null org.springframework.security.authentication.UsernamePasswordAuthenticationToken@fe908ae6: YXYXYXYX org.springframework.security.core.userdetails.User@c220133a: Username: admin@local; Password: YXYXYXYX Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: LCM_ADMIN; Credentials: [PROTECTED]; Authenticated: true; Details: org.springframework.security.web.authentication.WebAuthenticationDetails@957e: RemoteIpAddress: 127.0.0.1; SessionId: null; Granted Authorities: LCM_ADMIN ## Ideally or in the previous versions following message would be displayed in UI stating "No upgrade available" 2022-08-11 08:29:18.583 INFO [http-nio-8080-exec-4] c.v.v.l.l.c.DeploymentsController - -- is vcF user ::false 2022-08-11 08:29:18.583 INFO [http-nio-8080-exec-4] c.v.v.l.u.u.LCMUpgradeUtil - -- No upgrade available. ## Now we get a banner with an incomplete error which ideally should not be the case due to this below error ## 2022-08-11 08:29:18.583 ERROR [http-nio-8080-exec-4] c.v.v.l.l.c.InputValidationExceptionHandlingController - -- Handling InvalidInputException with error message: null
- vRealize Network Insight Upgrade from 6.7 to 6.8
Pre-Requisite Ensure vRSLCM 8.10 PSPACK 1 is implemented Download / Upload the product binary Click here for vRSLCM 8.10 PSPACK 1 Release Notes Click here for vRNI 6.8 Release Notes Select the product from the Environment Pane and click on Upgrade Trigger Inventory Sync . Ensure it's completed. Then click on Upgrade Ensure appropriate binary or upgrade bundle is selected Take a Product Snapshot , if you want to retrain the snapshot after upgrade you may do so Run Precheck What Prechecks are performed ? vRNI healthy platform check vRNI SSH status check on platform vRNI SSH status check on collector vRNI version check vRNI number of VMs check Submit upgrade request Upgrade Workflow is now started Different states in the upgrade are as below Stage:1 Shutting down Guest OS Stage:2 Shutting down Guest OS Stage:3 Creating Node Snapshot (Platform and Collector) Stage:4 Power On VM Stage:5 Power On VM Stage:6 productHealthCheck Stage:7 Create snapshot Inventory Stage:8 upgradevrni Stage:9 deleteNodeSnapshot Stage:10 productupgradeinventoryupdate Let's inspect Stage:8 in detail Inside stage 8 we have Start VRNI Upload Upgrade Bundle VRNI Upgrade Bundle Status Upgrade Precheck Upgrade Precheck Status VRNI Online Upgrade Check Upgrade Status VRNI VCF Watermark Configuration On VRNI VCF Watermark Configuration Success Product Patch Upgrade Notification Modification Modify Notification Scheduler Final Deep Dive on Stage:8 will be updated soon.... This concludes the upgrade. Remember to perofrm inventory sycn for sure before you upgrade vRNI. This is very important.
- Upgrading vRealize Operations using vRSLCM ......
Attaching a pdf which has same information Author ARUN NUKULA Environment vROps Source Version: 8.6.2 Target Version : 8.6.4 vRSLCM 8.8.2 PSPACK 2 Note: This blog does not contain any customer facing data. It's performed in a lab environment whic has been destroyed Procedure These are the different environments in my vRSLCM. Upgrade would be performed on tvrops environment It's a single node vROps instance Took a snapshot before beginning any sort of a task on the product Logging into the product , i have three integrations all of those adapters are in functional state vCenter 8.x LogInsight NSXT Logged into vRSLCM , then performed inventory sync Once that's successful , go ahead and then click on upgrade Then we would be prompted with the repository url There would be an APUAT test performed. Once the APUAT test is completed , we can download the report or view it by clicking on view report When we click on download report , it would download a zip file with following contents Opt for a snapshot even though i've taken one just before the upgrade manually You may open index.html using browser which would show you the report Its pretty much a new system so there is nothing really in it. Hence the report is blank Then the services check would happen Once prechecks are done , you can download the report if one want's to use it as an articfact for upgrade and then click on next Validate all inputs for uprgade and click on submit to trigger uprgade The moment we click on submit upgrade is iniitiated There are 10 stages for this upgrade ( stages will vary if it is a cluster ) Stage 1: Clusteronlineofflineconfiguration 1. Start 2. Configure Cluster Init 3. Configure Cluster Online Offline State 4. Check Cluster Online Offline State 5. Final Stage 2: Shutting down Guest OS 1. Start 2. Shutdown Guest OS 3. Final Stage 3: Creating Node Snapshot 1. Start 2. Get vMoid of the virtual machine using name 3. Virtual machine using vMoid 4. Final Stage: 4 Power On VM 1. Start 2. Get vMoid of the virtual machine using name 3. Power On Virtual Machine 4. Final Stage: 5 vRealize Operations Manager Service Check 1. Start 2. vRealize Operations Manager Services Status Check task 3. Final Stage: 6 Clusteronlineofflineconfiguration 1. Start 2. Configure Cluster Init 3. Configure Cluster Online Offline State 4. Check Cluster Online Offline State 5. Final Stage: 7 Create Snapshot Inventory 1. Start 2. Product Snapshot Inventory create 3. On Environment Snapshot Complete Stage: 8 vROps Upgrade 1. Start 2. Start Upgrade 3. Find healthy adapters before upgrade 4. Install vROps uprgade pak 5. Check cluster status 6. vRealize Operations Manager SDDC Manager Watermark 7. Final Stage: 9 Delete Node Snapshot 1. Start 2. Get VMID delete snapshot 3. Delete Node Snapshot 4. Final Stage: 10 Product Upgrade Inventory update 1. Start 2. Product Upgrade Inventory Upgrade 3. Final After all of the above stages vROps upgrade is now complete What happens during Stage 8 : vROps Upgrade vROps Upgrade is started 2022-09-16 05:29:57.733 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- State to find :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.StartUpgradeTask Deepdive into various phases of the upgrade 1. FindHealthyAdapterTask is triggered 2022-09-16 05:29:57.733 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- State to find :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.FindHealthyAdapterTask 2022-09-16 05:29:57.755 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- Invoking Task :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.FindHealthyAdapterTask 2. Adapter response is logged 2022-09-16 05:30:00.976 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- adapters response message {"adapterInstancesInfoDto":[{"resourceKey":{"name":"nsxt","adapterKindKey":"NSXTAdapter","resourceKindKey":"NSXTAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"AUTO_DISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"NSXTHOST","dataType":"STRING","isPartOfUniqueness":true},"value":"nsxtm.cap.org"},{"identifierType":{"name":"UNMONITORED_SERVICES","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"vmc_config_limits_file_name","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":""}]},"description":"","collectorId":1,"collectorGroupId":"9659e5d0-d36a-45c0-b7c0-11ef73d04363","credentialInstanceId":"35621c3f-bc32-4e26-95d4-98c24e3274e9","monitoringInterval":5,"numberOfMetricsCollected":1648,"numberOfResourcesCollected":110,"lastHeartbeat":1663306196138,"lastCollected":1663306155060,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/35621c3f-bc32-4e26-95d4-98c24e3274e9","rel":"RELATED","name":"linkToCredential"}],"id":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9"},{"resourceKey":{"name":"vRealizeOpsMgrAPI (vRealize Operations Manager Collector-tvrops)","adapterKindKey":"vRealizeOpsMgrAPI","resourceKindKey":"vRealizeOpsMgrAPI Adapter Instance","resourceIdentifiers":[]},"collectorId":1,"monitoringInterval":1,"numberOfMetricsCollected":0,"numberOfResourcesCollected":0,"lastHeartbeat":1663306196138,"lastCollected":1663306182865,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/c7fd85d1-1537-4513-a63d-9b443913bee5","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"linkToCredential"}],"id":"c7fd85d1-1537-4513-a63d-9b443913bee5"},{"resourceKey":{"name":"vc8","adapterKindKey":"VMWARE","resourceKindKey":"VMwareAdapter Instance","resourceIdentifiers":[{"identifierType":{"name":"AUTODISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"CLOUD_TYPE","dataType":"STRING","isPartOfUniqueness":false},"value":"PRIVATE_CLOUD"},{"identifierType":{"name":"DV_PORT_GROUP_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"DVS_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"ENABLE_ACTIONS","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"GFS_SKIP_PATTERNS","dataType":"STRING","isPartOfUniqueness":false},"value":"docker/devicemapper/mnt"},{"identifierType":{"name":"IS_REAL_TIME_MONITORING_ENABLED","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"PDRS_STATS_PROVIDER","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"PROCESSCHANGEEVENTS","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"VCURL","dataType":"STRING","isPartOfUniqueness":true},"value":"vc8.cap.org"},{"identifierType":{"name":"VM_FOLDER_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"VM_LIMIT","dataType":"STRING","isPartOfUniqueness":false},"value":"2000000000"},{"identifierType":{"name":"VMC_CONFIG_LIMITS_FILE_NAME","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":"0d0a4688-0836-448b-a97d-0910ba336f61"}]},"description":"","collectorId":1,"collectorGroupId":"9659e5d0-d36a-45c0-b7c0-11ef73d04363","credentialInstanceId":"0f88a896-0de5-4225-b268-4d736e1aabda","monitoringInterval":5,"numberOfMetricsCollected":64,"numberOfResourcesCollected":4,"lastHeartbeat":1663306196138,"lastCollected":1663306126082,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/78b711a1-4f09-4080-aaab-81d9a12a0c72","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/0f88a896-0de5-4225-b268-4d736e1aabda","rel":"RELATED","name":"linkToCredential"}],"id":"78b711a1-4f09-4080-aaab-81d9a12a0c72"},{"resourceKey":{"name":"Container","adapterKindKey":"Container","resourceKindKey":"ContainerAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"ClusterId","dataType":"STRING","isPartOfUniqueness":true},"value":"tvrops"}]},"collectorId":1,"collectorGroupId":"9659e5d0-d36a-45c0-b7c0-11ef73d04363","monitoringInterval":1,"numberOfMetricsCollected":0,"numberOfResourcesCollected":0,"lastHeartbeat":1663306196138,"lastCollected":1663306182864,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/bbb977cd-648b-49fa-84f3-02a720b1f780","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"linkToCredential"}],"id":"bbb977cd-648b-49fa-84f3-02a720b1f780"},{"resourceKey":{"name":"li","adapterKindKey":"LogInsightAdapter","resourceKindKey":"LoginSight Adapter Instance","resourceIdentifiers":[{"identifierType":{"name":"IS_SINGLETON","dataType":"STRING","isPartOfUniqueness":true},"value":""},{"identifierType":{"name":"LOGINSIGHTURL","dataType":"STRING","isPartOfUniqueness":false},"value":"li.cap.org"}]},"description":"","collectorId":1,"collectorGroupId":"9659e5d0-d36a-45c0-b7c0-11ef73d04363","monitoringInterval":5,"numberOfMetricsCollected":0,"numberOfResourcesCollected":0,"lastHeartbeat":1663306196138,"lastCollected":1663306122860,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/fc977e44-9ab1-4b30-badb-031878cef5c6","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"linkToCredential"}],"id":"fc977e44-9ab1-4b30-badb-031878cef5c6"},{"resourceKey":{"name":"vRealize Operations Manager Adapter - tvrops","adapterKindKey":"vCenter Operations Adapter","resourceKindKey":"vCenter Operations Adapter Instance","resourceIdentifiers":[{"identifierType":{"name":"ClusterId","dataType":"STRING","isPartOfUniqueness":true},"value":"tvrops"},{"identifierType":{"name":"COLLECTORID","dataType":"STRING","isPartOfUniqueness":false},"value":"1"},{"identifierType":{"name":"NODEID","dataType":"STRING","isPartOfUniqueness":true},"value":"24127062-16cc-48cb-81de-1249e3c8a722"}]},"collectorId":1,"monitoringInterval":5,"numberOfMetricsCollected":9940,"numberOfResourcesCollected":11,"lastHeartbeat":1663306196138,"lastCollected":1663306133374,"messageFromAdapterInstance":"","links":[{"href":"/suite-api/api/adapters/5a1812aa-c575-4aa2-9074-4a313572ef79","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"linkToCredential"}],"id":"5a1812aa-c575-4aa2-9074-4a313572ef79"}]} 3. Formatting above json we get following list of adapters NSXTM vc8 vRealizeOpsMgrAPI Container li vRealize Operations Manager Adapter 4. Fetches the id's 2022-09-16 05:30:00.983 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- adapterIds : [2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9, c7fd85d1-1537-4513-a63d-9b443913bee5, 78b711a1-4f09-4080-aaab-81d9a12a0c72, bbb977cd-648b-49fa-84f3-02a720b1f780, fc977e44-9ab1-4b30-badb-031878cef5c6, 5a1812aa-c575-4aa2-9074-4a313572ef79] 5. Goes and connects to each adapter to check its status ******************************************************* ### nsxt adapter response as a whole as an example ### ******************************************************* 2022-09-16 05:30:00.984 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9 2022-09-16 05:30:00.985 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.061 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9: 200 200 2022-09-16 05:30:01.061 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- adapter resource response :: Response{statusCode=200, responseMessage='200', responseData='{"description":"","creationTime":1663301784638,"resourceKey":{"name":"nsxt","adapterKindKey":"NSXTAdapter","resourceKindKey":"NSXTAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"AUTO_DISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"NSXTHOST","dataType":"STRING","isPartOfUniqueness":true},"value":"nsxtm.cap.org"},{"identifierType":{"name":"UNMONITORED_SERVICES","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"vmc_config_limits_file_name","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":""}]},"credentialInstanceId":"35621c3f-bc32-4e26-95d4-98c24e3274e9","resourceStatusStates":[{"adapterInstanceId":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"COMPLIANCE","color":"GREY","score":-1.0},{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/35621c3f-bc32-4e26-95d4-98c24e3274e9","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9"}', responseDataBytes=[123, 34, ****** 34, 125], headers={Transfer-Encoding=[chunked], Keep-Alive=[timeout=15, max=100], null=[HTTP/1.1 200 200], Server=[Apache], Access-Control-Allow-Origin=[*], X-Request-ID=[DQ4uW0p6ZuEfKZdR02H9FCSyztsyRT0p], X-Content-Type-Options=[nosniff], Connection=[Keep-Alive], Pragma=[no-cache], Date=[Fri, 16 Sep 2022 05:30:00 GMT], X-Frame-Options=[SAMEORIGIN], Strict-Transport-Security=[max-age=31536000; includeSubDomains], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Content-Security-Policy=[default-src https: wss: data: 'unsafe-inline' 'unsafe-eval'; child-src *; worker-src 'self' blob:], Vary=[User-Agent], Expires=[0], X-XSS-Protection=[1; mode=block], Content-Type=[application/json;charset=UTF-8]}} 2022-09-16 05:30:01.074 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- adapter resource response :: {"description":"","creationTime":1663301784638,"resourceKey":{"name":"nsxt","adapterKindKey":"NSXTAdapter","resourceKindKey":"NSXTAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"AUTO_DISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"NSXTHOST","dataType":"STRING","isPartOfUniqueness":true},"value":"nsxtm.cap.org"},{"identifierType":{"name":"UNMONITORED_SERVICES","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"vmc_config_limits_file_name","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":""}]},"credentialInstanceId":"35621c3f-bc32-4e26-95d4-98c24e3274e9","resourceStatusStates":[{"adapterInstanceId":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"COMPLIANCE","color":"GREY","score":-1.0},{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/35621c3f-bc32-4e26-95d4-98c24e3274e9","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9"} 6. In the same way it connects to all other adapters too 2022-09-16 05:30:01.079 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5 2022-09-16 05:30:01.079 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.120 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5: 200 200 2022-09-16 05:30:01.136 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72 2022-09-16 05:30:01.137 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.209 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72: 200 200 2022-09-16 05:30:01.237 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780 2022-09-16 05:30:01.237 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.274 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780: 200 200 2022-09-16 05:30:01.293 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6 2022-09-16 05:30:01.295 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.342 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6: 200 200 2022-09-16 05:30:01.361 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79 2022-09-16 05:30:01.362 INFO [pool-3-thread-39] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 05:30:01.403 INFO [pool-3-thread-39] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79: 200 200 7. Once we fetch all adapter data , validates everything is good. pak file installation is triggered 2022-09-16 05:30:01.424 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- healthyAdapters : ["2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","78b711a1-4f09-4080-aaab-81d9a12a0c72","bbb977cd-648b-49fa-84f3-02a720b1f780","5a1812aa-c575-4aa2-9074-4a313572ef79","fc977e44-9ab1-4b30-badb-031878cef5c6","c7fd85d1-1537-4513-a63d-9b443913bee5"] 2022-09-16 05:30:01.424 INFO [pool-3-thread-39] c.v.v.l.p.c.v.t.FindHealthyAdapterTask - -- Upgrade Start: Executing Product Pak Installation 8. Takes around 45 minutes to complete the upgrade 2022-09-16 06:15:41.621 INFO [pool-3-thread-42] c.v.v.l.p.c.v.t.InstallvROpsProductUpgradePakTask - -- Product Pak installtion completed 2022-09-16 06:15:41.621 INFO [pool-3-thread-42] c.v.v.l.p.a.s.Task - -- Injecting Edge :: OnInstallvROpsProductUpgradePakCompleted 9. Starts cluster status check and completes it 2022-09-16 06:15:42.500 INFO [pool-3-thread-49] c.v.v.l.p.c.v.t.VropsClusterStatusCheckTask - -- Starting VropsClusterStatusCheckTask 2022-09-16 06:15:52.452 INFO [pool-3-thread-49] c.v.v.l.d.v.VropsEndpoint - -- returned data 200 :::: {"cluster_name":"tvrops","installation_state":"DONE","ha_state":"DISABLED","ca_state":"DISABLED","remove_node_state":"NONE","initialization_state":"NONE","online_state":"ONLINE","online_state_time":1663308803575,"online_state_reason_info":{"online_state_reason":"online_state.change_reason.upgrade_successful","last_status_date":"1663308803575"},"out_of_diskspace_slice":"","is_pak_installation_active":false,"is_pak_uninstall_active":false,"migration_state":null,"is_shrinking":false,"fail_going_offline":false} 2022-09-16 06:15:52.453 INFO [pool-3-thread-49] c.v.v.l.p.c.v.t.VropsClusterStatusCheckTask - -- cluster state :ONLINE 2022-09-16 06:15:52.453 INFO [pool-3-thread-49] c.v.v.l.p.a.s.Task - -- Injecting Edge :: OnVropsClusterStatusCheckSuccess 10. After OnVropsClusterStatusCheckSuccess , VropsCheckAdapterInstancesStateTask is triggered 2022-09-16 06:15:53.421 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- Responding for Edge :: OnVropsClusterStatusCheckSuccess 2022-09-16 06:15:53.422 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- State to find :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.VropsClusterStatusCheckTask 2022-09-16 06:15:53.422 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- State to find :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.VropsCheckAdapterInstancesStateTask 2022-09-16 06:15:53.452 INFO [scheduling-1] c.v.v.l.a.c.EventProcessor - -- Invoking Task :: com.vmware.vrealize.lcm.plugin.core.vrops.tasks.VropsCheckAdapterInstancesStateTask 11. This is where all adapters are verified post upgrade or application of the pak file 2022-09-16 06:15:55.944 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- Check adapter instance, repeat count : 1 2022-09-16 06:15:55.944 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- logging healthyAdapters ["2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","78b711a1-4f09-4080-aaab-81d9a12a0c72","bbb977cd-648b-49fa-84f3-02a720b1f780","5a1812aa-c575-4aa2-9074-4a313572ef79","fc977e44-9ab1-4b30-badb-031878cef5c6","c7fd85d1-1537-4513-a63d-9b443913bee5"] 2022-09-16 06:15:55.946 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9 2022-09-16 06:15:55.948 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:55.989 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9: 401 401 2022-09-16 06:15:55.989 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/auth/token/acquire 2022-09-16 06:15:55.990 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.092 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- POST /suite-api/api/auth/token/acquire: 200 200 2022-09-16 06:15:56.093 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9 2022-09-16 06:15:56.095 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.161 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9: 200 200 2022-09-16 06:15:56.162 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"description":"","creationTime":1663301784638,"resourceKey":{"name":"nsxt","adapterKindKey":"NSXTAdapter","resourceKindKey":"NSXTAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"AUTO_DISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"NSXTHOST","dataType":"STRING","isPartOfUniqueness":true},"value":"nsxtm.cap.org"},{"identifierType":{"name":"UNMONITORED_SERVICES","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"vmc_config_limits_file_name","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":""}]},"credentialInstanceId":"35621c3f-bc32-4e26-95d4-98c24e3274e9","resourceStatusStates":[{"adapterInstanceId":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"COMPLIANCE","color":"GREY","score":-1.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/35621c3f-bc32-4e26-95d4-98c24e3274e9","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"2dbdcd2c-bd1d-47be-9092-8ff59a7e03c9"} 2022-09-16 06:15:56.171 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72 2022-09-16 06:15:56.172 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.237 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72: 200 200 2022-09-16 06:15:56.238 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"description":"","creationTime":1663302194599,"resourceKey":{"name":"vc8","adapterKindKey":"VMWARE","resourceKindKey":"VMwareAdapter Instance","resourceIdentifiers":[{"identifierType":{"name":"AUTODISCOVERY","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"CLOUD_TYPE","dataType":"STRING","isPartOfUniqueness":false},"value":"PRIVATE_CLOUD"},{"identifierType":{"name":"DV_PORT_GROUP_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"DVS_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"ENABLE_ACTIONS","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"GFS_SKIP_PATTERNS","dataType":"STRING","isPartOfUniqueness":false},"value":"docker/devicemapper/mnt"},{"identifierType":{"name":"IS_REAL_TIME_MONITORING_ENABLED","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"PDRS_STATS_PROVIDER","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"PROCESSCHANGEEVENTS","dataType":"STRING","isPartOfUniqueness":false},"value":"true"},{"identifierType":{"name":"VCURL","dataType":"STRING","isPartOfUniqueness":true},"value":"vc8.cap.org"},{"identifierType":{"name":"VM_FOLDER_DISABLED","dataType":"STRING","isPartOfUniqueness":false},"value":"false"},{"identifierType":{"name":"VM_LIMIT","dataType":"STRING","isPartOfUniqueness":false},"value":"2000000000"},{"identifierType":{"name":"VMC_CONFIG_LIMITS_FILE_NAME","dataType":"STRING","isPartOfUniqueness":false},"value":""},{"identifierType":{"name":"VMEntityVCID","dataType":"STRING","isPartOfUniqueness":false},"value":"0d0a4688-0836-448b-a97d-0910ba336f61"}]},"credentialInstanceId":"0f88a896-0de5-4225-b268-4d736e1aabda","resourceStatusStates":[{"adapterInstanceId":"78b711a1-4f09-4080-aaab-81d9a12a0c72","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"COMPLIANCE","color":"GREY","score":-1.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=78b711a1-4f09-4080-aaab-81d9a12a0c72","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=78b711a1-4f09-4080-aaab-81d9a12a0c72","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/78b711a1-4f09-4080-aaab-81d9a12a0c72/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/0f88a896-0de5-4225-b268-4d736e1aabda","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"78b711a1-4f09-4080-aaab-81d9a12a0c72"} 2022-09-16 06:15:56.241 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780 2022-09-16 06:15:56.248 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.290 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780: 200 200 2022-09-16 06:15:56.291 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"creationTime":1663298162604,"resourceKey":{"name":"Container","adapterKindKey":"Container","resourceKindKey":"ContainerAdapterInstance","resourceIdentifiers":[{"identifierType":{"name":"ClusterId","dataType":"STRING","isPartOfUniqueness":true},"value":"tvrops"}]},"resourceStatusStates":[{"adapterInstanceId":"bbb977cd-648b-49fa-84f3-02a720b1f780","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":1,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=bbb977cd-648b-49fa-84f3-02a720b1f780","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=bbb977cd-648b-49fa-84f3-02a720b1f780","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/bbb977cd-648b-49fa-84f3-02a720b1f780/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"bbb977cd-648b-49fa-84f3-02a720b1f780"} 2022-09-16 06:15:56.298 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79 2022-09-16 06:15:56.299 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.336 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79: 200 200 2022-09-16 06:15:56.337 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"creationTime":1663298161446,"resourceKey":{"name":"vRealize Operations Manager Adapter - tvrops","adapterKindKey":"vCenter Operations Adapter","resourceKindKey":"vCenter Operations Adapter Instance","resourceIdentifiers":[{"identifierType":{"name":"ClusterId","dataType":"STRING","isPartOfUniqueness":true},"value":"tvrops"},{"identifierType":{"name":"COLLECTORID","dataType":"STRING","isPartOfUniqueness":false},"value":"1"},{"identifierType":{"name":"NODEID","dataType":"STRING","isPartOfUniqueness":true},"value":"24127062-16cc-48cb-81de-1249e3c8a722"}]},"resourceStatusStates":[{"adapterInstanceId":"5a1812aa-c575-4aa2-9074-4a313572ef79","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=5a1812aa-c575-4aa2-9074-4a313572ef79","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=5a1812aa-c575-4aa2-9074-4a313572ef79","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/5a1812aa-c575-4aa2-9074-4a313572ef79/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"5a1812aa-c575-4aa2-9074-4a313572ef79"} 2022-09-16 06:15:56.344 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6 2022-09-16 06:15:56.345 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.383 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6: 200 200 2022-09-16 06:15:56.384 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"description":"","creationTime":1663302105758,"resourceKey":{"name":"li","adapterKindKey":"LogInsightAdapter","resourceKindKey":"LoginSight Adapter Instance","resourceIdentifiers":[{"identifierType":{"name":"IS_SINGLETON","dataType":"STRING","isPartOfUniqueness":true},"value":""},{"identifierType":{"name":"LOGINSIGHTURL","dataType":"STRING","isPartOfUniqueness":false},"value":"li.cap.org"}]},"resourceStatusStates":[{"adapterInstanceId":"fc977e44-9ab1-4b30-badb-031878cef5c6","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":5,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=fc977e44-9ab1-4b30-badb-031878cef5c6","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=fc977e44-9ab1-4b30-badb-031878cef5c6","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/fc977e44-9ab1-4b30-badb-031878cef5c6/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"fc977e44-9ab1-4b30-badb-031878cef5c6"} 2022-09-16 06:15:56.391 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- url to connect https://tvrops.cap.org/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5 2022-09-16 06:15:56.392 INFO [pool-3-thread-22] c.v.v.l.u.SSLUtil - -- Disabled SNI for SSL socket. 2022-09-16 06:15:56.426 INFO [pool-3-thread-22] c.v.v.l.d.v.VropsConnector - -- GET /suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5: 200 200 2022-09-16 06:15:56.426 INFO [pool-3-thread-22] c.v.v.l.p.c.v.t.VropsCheckAdapterInstancesStateTask - -- adapter resource response :: {"creationTime":1663298393242,"resourceKey":{"name":"vRealizeOpsMgrAPI (vRealize Operations Manager Collector-tvrops)","adapterKindKey":"vRealizeOpsMgrAPI","resourceKindKey":"vRealizeOpsMgrAPI Adapter Instance","resourceIdentifiers":[]},"resourceStatusStates":[{"adapterInstanceId":"c7fd85d1-1537-4513-a63d-9b443913bee5","resourceStatus":"DATA_RECEIVING","resourceState":"STARTED","statusMessage":""}],"resourceHealth":"GREEN","resourceHealthValue":100.0,"dtEnabled":true,"monitoringInterval":1,"badges":[{"type":"EFFICIENCY","color":"GREEN","score":100.0},{"type":"RISK","color":"GREEN","score":0.0},{"type":"HEALTH","color":"GREEN","score":100.0}],"relatedResources":[],"links":[{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5","rel":"SELF","name":"linkToSelf"},{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5/relationships","rel":"RELATED","name":"relationsOfResource"},{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5/properties","rel":"RELATED","name":"propertiesOfResource"},{"href":"/suite-api/api/alerts?resourceId=c7fd85d1-1537-4513-a63d-9b443913bee5","rel":"RELATED","name":"alertsOfResource"},{"href":"/suite-api/api/symptoms?resourceId=c7fd85d1-1537-4513-a63d-9b443913bee5","rel":"RELATED","name":"symptomsOfResource"},{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5/statkeys","rel":"RELATED","name":"statKeysOfResource"},{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5/stats/latest","rel":"RELATED","name":"latestStatsOfResource"},{"href":"/suite-api/api/resources/c7fd85d1-1537-4513-a63d-9b443913bee5/properties","rel":"RELATED","name":"latestPropertiesOfResource"},{"href":"/suite-api/api/credentials/","rel":"RELATED","name":"credentialsOfResource"}],"identifier":"c7fd85d1-1537-4513-a63d-9b443913bee5"} 12. Post this the watermark task is triggred 2022-09-16 06:15:58.463 INFO [pool-3-thread-6] c.v.v.l.p.c.v.t.VropsUpgradeVcfWaterMarkingTask - -- SDDC Manager Water mark configurations are skipped as it is not SDDC Manager user 2022-09-16 06:15:58.464 INFO [pool-3-thread-6] c.v.v.l.p.a.s.Task - -- Injecting Edge :: OnWaterMarkConfigurationsCompleted 13. Upgrade eventually completes If we detect that theree are adapter instances which were logged successfully before upgrade and not post upgrade then we thrown an error stating You may continue finishing your upgrade by clicking on RETRY and select skip option to be true and move on This should conclude your upgrade Note: This Post Upgrade adapter check has been removed from vROps upgrade flow in vRSLCM 8.10. Hence this issue will not ben seen anymore. There are health checks which can be enabled and disabled on environment level which would cater to this requirement.










