WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
  • VKS
  • Homelab
    • Resources
    • Nested Virtualization
  • VMware Nostalgia
  • Apple

VMworld Session VCSA INF5975 & INF4528 available to public

09.08.2015 by William Lam // 1 Comment

I just found out this week after reading Eric Siebert blog post here, that a select number of VMworld 2015 US sessions have been made available to the general public on YouTube. I thought this was a very nice and pleasant surprise, especially for those who could not attend VMworld to be able to get a taste of some of the topics covered in last weeks conference. I personally have watched both the Cloud Native Apps and Future of NSX session, both of which I think are worth checking out not to mention the various demos in the NSX session!

For me personally, a hot topic that came up in almost every conversation when talking to our customers, field and partners at VMworld was the vCenter Server Appliance (VCSA). There were also plenty of sessions at the conference that covered the VCSA from basic introduction to performance to availability. Below are the two VCSA sessions that were selected to be made generally available to everyone, one of which I presented on. Hopefully you enjoy both videos and I would also like to thank everyone who attended my session last Monday. It was really great meeting many of my readers as well as customers looking to take advantage of the VCSA and some of the new features in our upcoming release. I also wrote a blog post here on the upcoming release of vSphere 6.0 Update 1 (GA sometime in Q3 2015) with respect to the VCSA in case you missed it.

INF5975 - vCenter Server Appliance as "First Choice" VC

INF4528 - vCenter Server Appliance Best Practices & Tips / Tricks

Categories // VCSA, VMworld Tags // psc, vami, vCenter Server, vcenter server appliance, VCSA, vcva, vSphere 6.0 Update 1

vCenter Server 6.0 Tidbits Part 5: New method of patching the VCSA/PSC

04.17.2015 by William Lam // 9 Comments

In previous releases of the VCSA, patching and updating of the VCSA was performed through what was known as the VAMI interface which provided both a UI as well as a command-line which I have blogged about here. The simplest and easiest method was of course using the UI which just required opening a browser to https://[VCSA]:5480 as seen in the screenshot below.

UPDATE (09/04/15) - In vSphere 6.0 Update 1, URL based patching is now available. You can find more details here.

patching-vcsa-6.0-0
In the VCSA 6.0, the old VAMI UI interface no longer exists and to update/patch the VCSA you will need to use the appliancesh command-line interface. There is a command called "software-packages" which is used to update/patch the software on the VCSA. This information is also documented here.

patching-vcsa-6.0-2
VMware just recently released a patch update to vSphere 6.0 and one of the updates is applicable to VCSA (Embedded) and VC/PSC (External) as noted in this VMware KB 211640. There are two patches (Third Party & Bug/Security Fix) which are available as an ISO which can be downloaded from here.

patching-vcsa-6.0-1
Before you can apply the patch/update, you will need to mount the patch ISO to your VCSA/PSC using either the vSphere C#/Web Client as you would with any other ISO. The second step is to login to the VCSA/PSC and if you have disable the appliancesh, you just need to type "appliancesh" and you will be prompted to login with your root credentials.

Once logged into the applianesh, the software-packages supports two options:

  • Stage patches from ISO and then install
  • Stage patches from ISO and install at a later time

If you wish to perform the update/patch in a single step by staging and installing, you can run the following command:

software-packages install --iso --acceptEulas

patching-vcsa-6.0-3
If you wish to only stage the patches but not install, you can do so by running the following command:

software-packages stage --iso --acceptEulas

Once you are ready to install the staged patches, you will need to run the following command:

software-packages install --staged

  • vCenter Server 6.0 Tidbits Part 1: What install & deployment parameters did I use?
  • vCenter Server 6.0 Tidbits Part 2: What is my SSO Domain Name & Site Name?
  • vCenter Server 6.0 Tidbits Part 3: Finding all deployed Platform Services Controller
  • vCenter Server 6.0 Tidbits Part 4: Finding all deployed vCenter Servers
  • vCenter Server 6.0 Tidbits Part 5: New method of patching the VCSA
  • vCenter Server 6.0 Tidbits Part 6: Customizing VCSA’s DCUI
  • vCenter Server 6.0 Tidbits Part 7: Connecting to SSO/PSC using JExplorer
  • vCenter Server 6.0 Tidbits Part 8: Useful ldapsearch queries for vmdird
  • vCenter Server 6.0 Tidbits Part 9: Creating & managing SSO users using dir-cli
  • vCenter Server 6.0 Tidbits Part 10: Automating SSO Admin configurations
  • vCenter Server 6.0 Tidbits Part 11: Automate SSO Admin password change
  • vCenter Server 6.0 Tidbits Part 12: New methods of downloading Support Bundles for VCSA / PSC

Categories // Automation, VCSA, vSphere 6.0 Tags // appliancesh, platform service controller, psc, software-packages, vami, VCSA, vcva

Quick Tip - Configuring HTTP proxy for VAMI via CLI

04.20.2014 by William Lam // 4 Comments

An HTTP Proxy is commonly used by customers who do not have direct internet access from within their datacenter to either upload logs or download patches from a particular website. I recently had to configure this within our environment to ensure we could patch against the external repository as we also have the same restriction as majority of our customers. To configure a proxy server for a VMware Virtual Appliance, you can do so using the VAMI interface under the Network section as seen in the screenshot below.

vami-proxy-configuration

I was looking to configure this from the command-line and through some quick test, here is how you do it. There is a command called /opt/vmware/share/vami/vami_set_proxy which accepts two parameters: proxy server and the proxy port.

Here is an example of how the command works:

/opt/vmware/share/vami/vami_set_proxy proxy.vghetto.com 3128

You can view the current proxy settings by running the following command:

/opt/vmware/share/vami/vami_proxy

There are two additional commands that show only the proxy server and proxy port respectively:

/opt/vmware/share/vami/vami_proxy_port
/opt/vmware/share/vami/vami_proxy_server

One thing you may have noticed is that these commands do not support configuring a proxy username or password as the VAMI UI does. After looking at the script does, I found that it is just writing it out into /etc/environment configuration file. If you require a proxy username and password, you could just directly edit the file and append the following as an example:

http_proxy=http://username:*protected email*:3128

Categories // VAMI Tags // http proxy, vami, virtual appliance

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 10
  • Next Page »

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • Programmatically accessing the Broadcom Compatibility Guide (BCG) 05/06/2025
  • Quick Tip - Validating Broadcom Download Token  05/01/2025
  • Supported chipsets for the USB Network Native Driver for ESXi Fling 04/23/2025
  • vCenter Identity Federation with Authelia 04/16/2025
  • vCenter Server Identity Federation with Kanidm 04/10/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...