Tuesday, 30 September 2014

Test Port connectivity with Telnet

The "right way" to use telnet client !!??
Run CMD as Local Admin
type
telnet <IP address or hostname or fqdn> <port>



shortcuts in telnet
To disconnect from remote server,  type:
close servername port
c server001 8080

device manager - hidden devices

device manager:
from cmd:

set devmgr_show_nonpresent_devices=1

devmgmt.msc

from gui:
show hidden devices

install uninstall Telnet client on W2008 / Win 7

install Telnet client on W2008 / Win 7

start run cmd

dism /online /Enable-Feature /FeatureName:TelnetClient

uninstall the Telnet client using command line

dism /online /Disable-Feature /FeatureName:TelnetClient

server will ask for a reboot


legacy command - package manager is now deprecated

pkgmgr /iu:"TelnetClient"

uninstall the Telnet client using command line

pkgmgr /up:”TelnetClient”

SCCM info

SCCM

Manuel start of Contorl Panel ConfigMgr Client
"C:\Windows\CCM\SMSCFGRC.cpl"

Missing Software Center shortcut run it from
C:\Windows\ccm\SCClient.exe


To make SCCM look for packages to download
Control Panel > Config Mgr
Call for "Machine Policy & Eval Cycle"
Wait a minute
Open software center.

SCCM Log
C:\Windows\Debug\SCCMInstallMonitor.log

Look in Control Panel for Config Mgrv.5 = SCCM 2012
v.4 = SCCM 2007

Regedit key to uninstall software
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall

Information for uninstall
MsiExec.exe /X{C2A5E62E-F1C9-491C-8C3A-F8F2CBBF1EF0}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
 

set a manual MAC address for a virtual network adapter 00:50:56:00:00:00 - 00:50:56:3F:FF:FF

For static MAC addresses in a vCenter you can use a MAC addresses in this range

00:50:56:00:00:00 - 00:50:56:3F:FF:FF
 
 
My friend Bjorn found a bash command on the net and modified it for my needs:

for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X,” $x $y $z;done;done;done >> GuysMacs.txt

if it doesnt work try this one ( %02X; instead of %02X, )

for x in {0..63};do for y in {0..255};do for z in {0..255};do printf “00:50:56:%02X:%02X:%02X;” $x $y $z;done;done;done >> GuysMacs.txt


It generates a text file called GuysMacs.txt with all of the mac addresses in scope.
it’s a 74 Megabyte textfile. roughly 4,2 million mac-addresses
If you want a copy of this file get in contact with me...

You can open this file in Excel - but only versions that support .xlsx
 Thank you Mr Bjorn Fredriksson

find all the static macs on a vCenter with powercli - thanks to someone on internet who i stole this from - sorry can't reference you...forgotten already !

Get-VM | Where-Object {($_ | Get-NetworkAdapter).ExtensionData.AddressType -eq "manual"} | ` Select-Object -Property Name, PowerState, @{"Name"="MAC";"Expression"={($_ | Get-NetworkAdapter).MacAddress}}

From VMware KB219 and this link below:
You can set a static MAC address using the VMware OUI prefix by adding the following line to a virtual machine‘s configuration file:
ethernet<number>.address = 00:50:56:XX:YY:ZZ
In the example, <number> refers to the number of the Ethernet adapter, XX is a valid hexadecimal number between 00 and 3F, and YY and ZZ are valid hexadecimal numbers between 00 and FF. The value for XX cannot be greater than 3F to avoid conflict with MAC addresses that are generated by the VMware Workstation and VMware Server products. The maximum value for a manually generated MAC address is shown in the sample.
ethernet<number>.address = 00:50:56:3F:FF:FF
http://pubs.vmware.com/vsphere-51/topic/com.vmware.vsphere.networking.doc/GUID-F9243FED-F081-498F-B4A9-EF950292AF77.html

Mount commands for *nix

AIX syntax:
mount -v nfs3 -o rw,bg,soft,intr server001:/DataMoverNFS /mnt
Linux syntax:
mount -t nfs server001:/DataMoverNFS /mnt

Solaris syntax:
mount -F nfs g/mnt
mount -F nfs server001:/DataMoverNFS /mnt


Thanks to Svend !

xcopy / robocopy specific files from a folder


use %% in a script or use % if running it interactively fromcommand line
the . at the end is 'copy to the current dir'

for %%g in ("\\servername\file1.txt", "\\servername\file2.bat") do xcopy %%g .

robocopy

Wednesday, 24 July 2013

srm database table showing users

SRM service wont start after upgrade to 5.1 (SSO)


log in to sql manager
select the srm db and find the tables below
right click on table and edit top 200 rows

dbo.pd_acedata
dbo.pd_authorization


this is part of vmware kb 2038046

how to test sql server connection udl file

create a text file but change the extention from .txt to .udl

Tuesday, 23 July 2013

dell / ibm esxi 5 upgrade "error could not obtain module order from esximage db" oem.xml /etc/vmware/support




from dell blog

http://en.community.dell.com/techcenter/b/techcenter/archive/2012/06/28/upgrade-from-dell-customized-vmware-esxi-5-0-to-a-later-update-using-dell-customized-esxi-5-iso-fails.aspx

this worked once the roll back had completed and the host rebooted

~# esxcli software vib remove –n Dell-Configuration-VIB
~# esxcli software vib remove –n Dell-License-VIB


also from vmware kb 2036167
maybe i should have also done

esxcli software vib remove -n Dell-esx-boot-options


same for IBM hosts:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1019361

Monday, 8 July 2013

Remove VIB from ESXi host - vCLI

Remove the Cisco Nexus 1V from ESX host cisco-vem-v152-esx C:\Program Files\VMware\VMware vSphere CLI>esxcli --server=greenesxi3 software vib list Enter username: root Enter password: Name Version Vendor Acceptance Level Install Date ---------------------- ------------------------------------ -------- ---------------- ------------ misc-cnic-register 1.72.1.v50.2-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bnx2 2.2.3e.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bnx2x 1.74.19.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-cnic 1.74.04.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-tg3 3.124c.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 scsi-bnx2fc 1.74.02.v50.2-1OEM.500.0.0.406165 Broadcom VMwareCertified 2013-04-29 scsi-bnx2i 2.74.07.v50.1-1OEM.500.0.0.472560 Broadcom VMwareCertified 2013-04-29 net-bna 3.2.0.0-1OEM.500.0.0.472560 Brocade VMwareCertified 2013-04-29 scsi-bfa 3.2.0.0-1OEM.500.0.0.472560 Brocade VMwareCertified 2013-04-29 cisco-vem-v152-esx 4.2.1.2.1.1a.0-3.0.1 Cisco PartnerSupported 2013-05-23 OpenManage 7.2-0000 Dell VMwareAccepted 2013-05-23 dell-configuration-vib 5.0-2A00 Dell PartnerSupported 2013-04-29 ima-be2iscsi 4.2.324.12-1OEM.500.0.0.472629 Emulex VMwareCertified 2013-04-29 net-be2net 4.2.327.0-1OEM.500.0.0.472560 Emulex VMwareCertified 2013-04-29 scsi-be2iscsi 4.2.324.12-1OEM.500.0.0.472629 Emulex VMwareCertified 2013-04-29 scsi-lpfc820 8.2.4.141.55-1OEM.500.0.0.472560 Emulex VMwareCertified 2013-04-29 net-igb 4.0.17-1OEM.500.0.0.472560 Intel VMwareCertified 2013-04-29 net-ixgbe 3.11.32-1OEM.500.0.0.472560 Intel VMwareCertified 2013-04-29 scsi-mpt2sas 15.00.01.00.1vmw-1OEM.500.0.0.472560 LSI VMwareCertified 2013-04-29 ima-qla4xxx 500.2.01.31-1vmw.0.0.060523 QLogic VMwareCertified 2013-04-29 net-qlcnic 5.0.750-1OEM.500.0.0.472560 QLogic VMwareCertified 2013-04-29 scsi-qla4xxx 634.5.7.0-1OEM.500.0.0.472560 QLogic VMwareCertified 2013-04-29 ata-pata-amd 0.3.10-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-atiixp 0.4.6-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-cmd64x 0.2.5-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-hpt3x2n 0.3.4-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-pdc2027x 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-serverworks 0.4.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-sil680 0.4.8-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ata-pata-via 0.3.3-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 block-cciss 3.6.14-10vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ehci-ehci-hcd 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 esx-base 5.0.0-2.33.1117897 VMware VMwareCertified 2013-05-23 esx-tboot 5.0.0-2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-devintf 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-msghandler 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ipmi-ipmi-si-drv 39.1-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 misc-drivers 5.0.0-2.26.914586 VMware VMwareCertified 2013-04-29 net-e1000 8.0.3.1-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-e1000e 1.1.2-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-enic 1.4.2.15a-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-forcedeth 0.61-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-nx-nic 4.0.557-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-qlge 2.0.0.54-1vmw.500.0.0.472560 VMware VMwareCertified 2013-04-29 net-r8168 8.013.00-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-r8169 6.011.00-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-s2io 2.1.4.13427-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 net-sky2 1.20-2vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 ohci-usb-ohci 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-ahci 3.0-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-ata-piix 2.12-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-nv 3.5-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-promise 2.12-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-sil 2.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 sata-sata-svw 2.3-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-aacraid 1.1.5.1-9vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-adp94xx 1.0.8.12-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-aic79xx 3.1-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-fnic 1.5.0.3-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-hpsa 5.0.0-17vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-ips 7.12.05-4vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid-mbox 2.20.5.1-6vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid-sas 5.34-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-megaraid2 2.00.4-9vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-mptsas 4.23.01.00-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-mptspi 4.23.01.00-5vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 scsi-rste 2.0.2.0088-1vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 uhci-usb-uhci 1.0-3vmw.500.2.26.914586 VMware VMwareCertified 2013-04-29 vmware-fdm 5.1.0-1123961 VMware VMwareCertified 2013-07-05 tools-light 5.0.0-2.32.1024429 VMware VMwareCertified 2013-05-15 scsi-qla2xxx 934.5.6.0-1OEM.500.0.0.472560 qlogic VMwareCertified 2013-04-29 C:\Program Files\VMware\VMware vSphere CLI>esxcli --server=greenesxi3 software vib remove --vibname=cisco-vem-v152-esx Enter username: root Enter password: Removal Result Message: Operation finished successfully. Reboot Required: false VIBs Installed: VIBs Removed: Cisco_bootbank_cisco-vem-v152-esx_4.2.1.2.1.1a.0-3.0.1 VIBs Skipped: C:\Program Files\VMware\VMware vSphere CLI>

Friday, 5 July 2013

Prerequisites for the vCenter Server Upgrade - Remove it from the linked mode group

except the vcenter server linked mode configuration wizard shows the "Isolate this vCenter Server instance from linked mode group" shaded or greyed out.
Fix: right click on vcenter server linked mode configuration and run as administrator

Monday, 10 June 2013

Enabling Changed Block Tracking (CBT) for VMs in order for Tivoli Storage Manager (TSM) to perform an incremental backup of VMs

Enabling Changed Block Tracking (CBT) for VMs that have been migrated from ESX3.
In order for Tivoli Storage Manager TSM to perform an incremental backup of VMs.
Until these changes are made the backups will perform, but will be entire fulls each time.
With ref to these 2 KBs
Changed Block Tracking (CBT) on virtual machines
Enabling Changed Block Tracking (CBT) on virtual machines
As part of the migration process it is recommended to follow these steps:
1.       VM is located on the vSphere4 host ready to be migrated to vSphere5. Power down VM.
2.       Migrate VM to new vSphere5 host and datastore.
3.       Leave the VM powered off on the new host and edit its settings adding the line ctkEnabled = "TRUE"
4.       Power on VM and upgrade the VM Tools – this will reboot the VM.
5.       Power off VM and upgrade the VM H/W
Step 3 Details:
The easiest way to add the extra line is to do it from the GUI when the VM is powered off: Click on the "Configuration Parameters..." button in the VM Edit Settings - Options - General...






Now Power on the VM…

Additional Information:
The actions above are editing the vmx file which can be found in the the VM’s working location
Eg
[DATASTORE_004] XPIE8_1/
 


With the VM powered off you can putty in to the VMs datastore location and manually edit the vmx file:
vmfs/volumes/4ba56729-6dd5tg6u-6194-001e6yh79a10/XPIE8 # cd /vmfs/volumes/DATASTORE004/XPIE8/

make a backup of the vmx file
cp *.vmx original.vmx
Edit the vmx
/vmfs/volumes/4ba56729-6dd5tg6u-6194-001e6yh79a10/XPIE8 # vi XPIE8.vmx

And add the line
ctkEnabled = "TRUE"
(now use vi commands:  shift G for bottom of file,  i for insert new text,  type ctkEnabled = "TRUE"    , then ESC, type :wq )
Power on the VM
If you have been successful you will see ctk files have been created….     
You can check this using the following commands , in this example vm003prod is used as the example::
/vmfs/volumes/51b888a4-97643c51-e5r2-94r33c0f4359/vm003prod # grep -i ctk vm003prod.*
vm003prod.vmdk:changeTrackPath="vm003prod-ctk.vmdk"
vm003prod.vmx:scsi0:0.ctkEnabled = "true"
vm003prod.vmx:scsi0:1.ctkEnabled = "true"
vm003prod.vmx:scsi0:2.ctkEnabled = "true"
vm003prod.vmx:ctkEnabled = "true"
/vmfs/volumes/51b888a4-97643c51-e5r2-94r33c0f4359/vm003prod # ls -l
-rw-------    1 root     root                 13 Jun  7 09:36 vm003prod-aux.xml
-rw-------    1 root     root            3932672 Jun  7 09:40 vm003prod-ctk.vmdk
-rw-r--r--    1 root     root                 78 Jun  7 09:39 vm003prod-ee17dbd8.hlog
-rw-------    1 root     root         8589934592 Jun  7 09:36 vm003prod-ee17dbd8.vswp
-rw-------    1 root     root        64424509440 Jun  7 10:07 vm003prod-flat.vmdk
-rw-------    1 root     root               8684 Jun  7 09:40 vm003prod.nvram
-rw-------    1 root     root                591 Jun  7 09:39 vm003prod.vmdk
-rw-r--r--    1 root     root                  0 Jun  7 09:36 vm003prod.vmsd
-rwxr-xr-x    1 root     root               3739 Jun  7 09:40 vm003prod.vmx
-rw-r--r--    1 root     root                269 Jun  7 09:36 vm003prod.vmxf
-rw-------    1 root     root            1310592 Jun  7 09:40 vm003prod_1-ctk.vmdk
-rw-------    1 root     root        21464350720 Jun  7 09:39 vm003prod_1-rdm.vmdk
-rw-------    1 root     root                559 Jun  7 09:40 vm003prod_1.vmdk
-rw-------    1 root     root            1310592 Jun  7 09:40 vm003prod_2-ctk.vmdk
-rw-------    1 root     root        21464350720 Jun  7 09:39 vm003prod_2-rdm.vmdk
-rw-------    1 root     root                559 Jun  7 09:39 vm003prod_2.vmdk
-rw-r--r--    1 root     root            1760385 Jun  7 09:39 vmware-0.log
-rw-------    1 root     root             152182 Jun  7 09:36 vmware-16.log
-rw-------    1 root     root             152185 Jun  7 09:36 vmware-17.log
-rw-------    1 root     root             152756 Jun  7 09:36 vmware-18.log
-rw-------    1 root     root             152937 Jun  7 09:36 vmware-19.log
-rw-------    1 root     root             153280 Jun  7 09:36 vmware-20.log
-rw-------    1 root     root            1711582 Jun  7 09:36 vmware-21.log
-rw-r--r--    1 root     root             129214 Jun  7 09:41 vmware.log
-rw-------    1 root     root           52428800 Jun  7 09:36 vmx-vm003prod-3994541016-1.vswp


Wednesday, 29 May 2013

configure snmp on an esxi host

Configure SNMP for ESXi
based on this www

http://pubs.vmware.com/vsphere-50/topic/com.vmware.vsphere.monitoring.doc_50/GUID-8EF36D7D-59B6-4C74-B1AA-4A9D18AB6250.html

numbers in brackets indicate the step is optional

0
download and install the vsphere cli to desktop - from the vcli command prompt:

1
Display snmp agent configuration
**********
vicfg-snmp.pl --server esxi001.domain.com -s
**********
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled  : 0
UDP port : 161
Communities :
Notification targets :
Options :
EnvEventSource=indications

2
Configure SNMP Communities
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -c public1
Changing community list to: public1...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled  : 0
UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications

3
If the SNMP agent is not enabled, enable it by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --enable
Enabling agent...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled  : 1UDP port : 161
Communities :
public1
Notification targets :
Options :
EnvEventSource=indications

4
Configure the SNMP Agent to Send Traps
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -t solarwinds.domain.com@162/public1
Changing notification(trap) targets list to: solarwinds.domain.com@162/public1...
Complete.

5
Send a test trap to verify that the agent is configured correctly by typing
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! --test
Sending test nofication(trap) to all configured targets...
Complete. Check with each target to see if trap was received.

(6)
Configure the SNMP Agent for Polling (- not necessary - already done by default)
**********
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -p 161
Changing udp port to 161...
Complete.

C:\>vicfg-snmp.pl --server esxi001.domain.com -s
Enter username: root
Enter password:
Current SNMP agent settings:
Enabled  : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications

(7)
Configure the Source used by the SNMP Agent for Hardware Events (- not necessary - already done by default)
**********
for vsphere4
vicfg-snmp.pl --server hostname --username username --password password -y sensors
for vsphere5
vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
**********
C:\>vicfg-snmp.pl --server esxi001 --username root --password Secret!! -y indications
Changing source of hardware event source: indications...
Complete.
C:\>vicfg-snmp.pl --server esxi001.domain.com --username root --password Secret!! -s
Current SNMP agent settings:
Enabled  : 1
UDP port : 161
Communities :
public1
Notification targets :
solarwinds.domain.com@162/public1
Options :
EnvEventSource=indications

8
Configure SNMP Management Client Software

After you have configured a vCenter Server system or a host to send traps, you must configure your management client software to receive and interpret those traps.

(9)
Configure the SNMP Agent to Filter Traps
vicfg-snmp.pl --server hostname --username username --password password -n oid_list

From the vSphere CLI, vicfg-snmp.pl --server hostname --username username --password password -n oid_list
oid_list is a list of OIDs for the traps to filter, separated by commas. This list replaces any OIDs that were previously specificed using this command.
For example, to filter out coldStart (OID 1.3.6.1.4.1.6876.4.1.1.0) and warmStart (OID 1.3.6.1.4.1.6876.4.1.1.1) traps, type vicfg-snmp.pl --server hostname --username username --password password -n 1.3.6.1.4.1.6876.4.1.1.0,1.3.6.1.4.1.6876.4.1.1.1
To clear all trap filters, typevicfg-snmp.pl --server hostname --username username --password password -n reset

Thursday, 23 May 2013

vmware tools install upgrade error how to force uninstall

force uninstall of vmtools / vmware tools

mount the vmtools cdrom in the vm using VM -> Guest -> Install / Upgrade VMware Tools - choose interactive install

from the VM command prompt cd to the cdrom drive and run the command
setup64 /c
this does the uninstall - no reboot needed

then run setup64 (from gui) to reinstall
error when trying to upgrade = isolation.tools.guestInitiatedUpgrade.disable = "FALSE"

Wednesday, 22 May 2013

service mgmt-vmware stop start restart -ash: service: not found - Usage: /etc/init.d/hostd {start|stop|restart}

KB: 2030663

~ # service mgmt-vmware restart
-ash: service: not found

~ # /etc/init.d/hostd status
Usage: /etc/init.d/hostd {start|stop|restart}
~ # ps -s | grep hostd
16978 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
16979 16978 hostd-poll           WAIT   UPOL   0-31 hostd
16980 16978 hostd-worker         WAIT   USLP   0-31 hostd17006 16978 vix-high-p           WAIT   UPOL   0-31 hostd
17007 17007 nssquery             WAIT   UPIPER 0-31 /usr/libexec/hostd/nssquery
17008 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
17010 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
17011 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
17087 16978 vix-poll             WAIT   UPOL   0-31 hostd
17275 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
17390 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd
17506 16978 hostd-worker         WAIT   UFUTEX 0-31 hostd


~ # /etc/init.d/vpxa status
-ash: /etc/init.d/vpxa: not found

~ # ps -s | grep vpxa
16987 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
16997 16987 vpxa                 WAIT   UPOL   0-31 /opt/vmware/vpxa/vpx/vpxa
16998 16987 vpxa                 WAIT   USLP   0-31 /opt/vmware/vpxa/vpx/vpxa
16999 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17001 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17002 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17003 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17004 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17005 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17271 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17278 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17279 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17282 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17293 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17294 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17295 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17296 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa
17297 16987 vpxa                 WAIT   UFUTEX 0-31 /opt/vmware/vpxa/vpx/vpxa