Security – Part Two: Configure ESXi Host SSH Settings

In order to access an ESXi host system using a SSH client there is a requirement to connect to the remote host. By default, the ESXi host system does not enable SSH connections and therefore there is a requirement to enable access to an ESXi host system to use SSH. This can be performed from … More Security – Part Two: Configure ESXi Host SSH Settings

Security – Part One: Enabling strong passwords and configuring password policies

By default, there are no restrictions set on the local root user account on an ESXi host system. However, the local non-root users must satisfy the requirements of the password compliance policy defined by the Pluggable Authentication Module (PAM). By default, the ESXi host system checks for password compliance using the pas_passwdqc.so PAM module. The … More Security – Part One: Enabling strong passwords and configuring password policies

Logging – Part Six: Installing and Configuring vSphere ESXi Dump Collector

ESXi host systems can be configured to dump the vmkernel memory to a network server rather than local disk, this is useful in situations where the ESXi host system does not have a local disk or is an auto deployed ESXi host system. During the critical failure on an ESXi host system, the panic routine … More Logging – Part Six: Installing and Configuring vSphere ESXi Dump Collector

Logging – Part Five: Analyse and Test Logging Configuration Information

In order to analyse log file and resolve issues we need to view the log files, such as vmkernel.log and vmsummary.log using a program such as tail to  end of the log file. The log file will show related related messages, in this example we will examine the vmkernel.log file which will display messages related to … More Logging – Part Five: Analyse and Test Logging Configuration Information