VSP Vum 41 Admin Guide
VSP Vum 41 Admin Guide
This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs.
EN-000236-03
You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected]
Copyright 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
VMware, Inc.
Contents
Security Best Practices 14 Advantages of Compliance 14 Compliance and Security Best Practices 14 Update Manager Client Overview 14 About the Update Manager Process 15 Configuring the Update Manager Patch Download Source 16 Downloading Patches, Extensions, Notifications, and Related Metadata 17 Importing Host Upgrade Release Files 18 Creating Baselines and Baseline Groups 18 Attaching Baselines and Baseline Groups to vSphere Objects 18 Scanning Selected vSphere Objects 18 Reviewing Scan Results 20 Staging Patches and Extensions to Hosts 20 Remediating Selected vSphere Objects 20 Using Baselines and Baseline Groups 21 Baseline Types 22 Update Manager Default Baselines 23 Baseline Groups 23 Baseline Attributes 24 Update Manager Settings 24
2 System Requirements 25
Update Manager Hardware Requirements 25 Supported Operating Systems and Database Formats 26 Update Manager Compatibility with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client 26 Required Database Privileges 27
Create a 32-Bit DSN on a 64-Bit Operating System 29 About the Bundled Microsoft SQL Server 2005 Express Database Package 30 Maintaining Your Update Manager Database 30 Configure a Microsoft SQL Server Database Connection 30 Create a New Data Source (ODBC) 31 Identify the SQL Server Authentication Type 32 Configure an Oracle Database 32 Configure an Oracle Connection to Work Locally 32
VMware, Inc.
Install the Update Manager Server 36 Install the Update Manager Client Plug-In
37
5 Installing the Guest Agent 39 6 Migrating the Update Manager Data and Upgrading Update Manager on a
Different Machine 41
Back Up and Move the Update Manager Database 42 Back Up and Restore a Microsoft SQL Database 43 Detach and Attach a Microsoft SQL Server Database 44 Back Up and Restore an Oracle Database 44 Back Up and Migrate the Existing Configuration and Database Using the Migration Tool 45 Create a 32-Bit DSN on a 64-Bit Operating System 46 Restore the Update Manager Configuration and Install Update Manager on the 64-Bit Machine 46
Upgrade the Update Manager Server 50 Upgrade the Update Manager Client Plug-In
51
Uninstall the Update Manager Server 57 Uninstall the Update Manager Client Plug-In
57
Update Manager Network Connectivity Settings 68 Configure Update Manager Network Connectivity Settings 69 Configuring Update Manager Patch Download Sources 69 Configure Update Manager to Use the Internet as a Patch Download Source 71
VMware, Inc.
Contents
Add a Third-Party Download URL Source for ESX/ESXi Hosts 71 Use a Shared Repository as a Patch Download Source 72 Import Patches Manually 73 Configure Update Manager Proxy Settings 74 Configure Checking for Patches 74 Configuring Notification Checks and Viewing Notifications 75 Configure Notifications Checks 75 View Notifications and Run the Notification Checks Task Manually 76 Take Snapshots Before Remediation 77 Configuring Host and Cluster Settings 77 Configure How Update Manager Responds to Failure to Put Hosts in Maintenance Mode 78 Configure Cluster Settings 79 Configure Smart Rebooting 80 Configure Update Manager Patch Repository Location 80 Configure Mail Sender Settings 81 Restart the Update Manager Service 81 Run the VMware vCenter Update Manager Update Download Task 81 Update Manager Privileges 82
Creating and Managing Baselines 84 Create and Edit Patch or Extension Baselines 84 Create and Edit Host Upgrade Baselines 88 Create and Edit a Virtual Appliance Upgrade Baseline 92 Delete Baselines 94 Creating and Managing Baseline Groups 94 Create a Host Baseline Group 95 Create a Virtual Machine and Virtual Appliance Baseline Group Edit a Baseline Group 96 Add Baselines to a Baseline Group 97 Remove Baselines from a Baseline Group 97 Delete Baseline Groups 98 Attach Baselines and Baseline Groups to Objects 98 Filter the Baselines and Baseline Groups Attached to an Object 99 Detach Baselines and Baseline Groups from Objects 99
96
Manually Initiate a Scan of ESX/ESXi Hosts 101 Manually Initiate a Scan of Virtual Machines and Virtual Appliances 102 Schedule a Scan 102 Viewing Scan Results and Compliance States for vSphere Objects 103 View Compliance Information for vSphere Objects 104 Review Compliance with Individual vSphere Objects 104 Compliance View 105 Compliance States for Updates 107 Baseline and Baseline Group Compliance States 108 Viewing Patch Details 109 Viewing Extension Details 110
VMware, Inc.
110
Orchestrated Upgrades of Hosts and Virtual Machines 113 Remediating Hosts 114 Remediation Specifics of ESX Hosts 115 Remediation Specifics of ESXi Hosts 116 Stage Patches and Extensions to ESX/ESXi Hosts 116 Remediate Hosts Against Patch or Extension Baselines 117 Remediate Hosts Against an Upgrade Baseline 119 Remediate Hosts Against Baseline Groups 121 Cluster Remediation Options Report 123 Remediating Virtual Machines and Virtual Appliances 124 Remediation of Templates 124 Rolling Back to a Previous Version 125 Rebooting Virtual Machines After Patch Remediation 125 Remediate Virtual Machines and Virtual Appliances 125 Scheduling Remediation for Hosts, Virtual Machines, and Virtual Appliances 126
View Tasks and Events for a Selected Object 127 Update Manager Events 128
View Available Patches and Extensions 137 Add and Remove Patches or Extensions from a Baseline 138 Search for Patches or Extensions in the Patch Repository 138
Applying Patches to Hosts 140 Applying Third-Party Patches to Hosts 141 Testing Patches or Extensions and Exporting Baselines to Another Update Manager Server 143 Applying Extensions to Hosts 146 Orchestrated Datacenter Upgrades 147 Orchestrated Upgrade of Hosts 148 Orchestrated Upgrade of Virtual Machines 149 Upgrading and Applying Patches to Hosts Using Baseline Groups 150 Applying Patches to Virtual Machines 152 Upgrading Virtual Appliances 153 Keeping the vSphere Inventory Up to Date 154 Associating the UMDS Patchstore Depot with the Update Manager Server 155 Associate the UMDS Depot with the Update Manager Server Using a Portable Media Drive 155 Associate the UMDS Depot with Update Manager Server Using IIS 156 Associate the UMDS Depot with Update Manager Server Using Apache 158 Generating Common Database Reports 159 Generate Common Reports Using Microsoft Office Excel 2003 159 Generate Common Reports Using Microsoft SQL Server Query 160
VMware, Inc.
Contents
18 Troubleshooting 161
Connection Loss with Update Manager Server or vCenter Server in a Single vCenter Server System 162 Connection Loss with Update Manager Server or vCenter Server in a Connected Group in vCenter Linked Mode 162 Gather Update Manager Log Bundles 163 Gather Update Manager and vCenter Server Log Bundles 163 Log Bundle Is Not Generated 164 Host Extension Remediation or Staging Fails Due to Missing Prerequisites 164 No Baseline Updates Available 165 All Updates in Compliance Reports Are Displayed as Not Applicable 165 All Updates in Compliance Reports Are Unknown 165 Remediated Updates Continue to Be Noncompliant 166 Patch Remediation of Virtual Machines Is Not Completed 166 Patch Remediation of Virtual Machines Fails for Some Patches 167 Patch Remediation of Virtual Machines Succeeds but the Baseline Is Not Compliant 167 VMware Tools Upgrade Fails if VMware Tools Is Not Installed 167 ESX/ESXi Host Scanning Fails 168 ESXi Host Upgrade Fails 168 Incompatible Compliance State 169 Updates Are in Conflict or Conflicting New Module State 169 Updates Are in Missing Package State 170 Updates Are in Not Installable State 170 Updates Are in Unsupported Upgrade State 171
VUMV_VERSION 174 VUMV_UPDATES 174 VUMV_HOST_UPGRADES 174 VUMV_VA_UPGRADES 175 VUMV_PATCHES 175 VUMV_BASELINES 175 VUMV_BASELINE_GROUPS 176 VUMV_BASELINE_GROUP_MEMBERS 176 VUMV_PRODUCTS 176 VUMV_BASELINE_ENTITY 177 VUMV_UPDATE_PATCHES 177 VUMV_UPDATE_PRODUCT 177 VUMV_ENTITY_SCAN_HISTORY 177 VUMV_ENTITY_REMEDIATION_HIST 178 VUMV_UPDATE_PRODUCT_DETAILS 178 VUMV_BASELINE_UPDATE_DETAILS 178 VUMV_ENTITY_SCAN_RESULTS 179 VUMV_VMTOOLS_SCAN_RESULTS 179 VUMV_VMHW_SCAN_RESULTS 179 VUMV_VA_APPLIANCE 180 VUMV_VA_PRODUCTS 180
Index 181
VMware, Inc.
VMware, Inc.
Updated Information
This Update Manager Installation and Administration Guide is updated with each release of the product or when necessary. This table provides the update history of the Update Manager Installation and Administration Guide.
Revision EN-000236-03 EN-000236-02 Description
n
Upgrade the Update Manager Server, on page 50 now contains the prerequisite to stop only the Update Manager service and not the vCenter Service before upgrading the Update Manager server. Upgrade the Update Manager Server, on page 50 now contains the prerequisite to stop the Update Manager and vCenter Server services before upgrading the Update Manager server. Change the UMDS Patch Repository Location, on page 63 now contains the correct command that you must enter to change the UMDS patch repository location. Minor revisions. Upgrade UMDS, on page 61 now contains information about the UMDS configuration and a recommended task you might want to perform before upgrading UMDS. Configuring the Update Manager Patch Download Source, on page 16, Configuring Update Manager Patch Download Sources, on page 69 and Import Patches Manually, on page 73 now contain information that the import of offline bundles is supported only for hosts running ESX/ESXi 4.0 and later. Remediating Hosts, on page 114 now describes the correct Update Manager behavior when you start a host remediation on hosts in a cluster. Minor revisions.
n n n
EN-000236-01
n n
n n
EN-000236-00
Initial release.
VMware, Inc.
10
VMware, Inc.
The VMware vCenter Update Manager Installation and Administration Guide provides information on how to install, configure and use VMware vCenter Update Manager to scan and remediate the objects in your vSphere environment. In addition this book includes information on the most common user goals. For scanning and remediation Update Manager works with the following ESX/ESXi versions.
n
For virtual machine patching operations, Update Manager works with ESX 3.5 and later and ESX 3i version 3.5 and later. For VMware Tools and virtual machine hardware upgrade operations, Update Manager works with ESX/ESXi version 4.0 and later. For ESX/ESXi host patching operations, Update Manager works with ESX 3.0.3 and later, ESX 3i version 3.5 and later. For ESX/ESXi host upgrade operations, Update Manager works with ESX 3.0.0 and later, ESX 3i version 3.5 and later.
Intended Audience
This book is intended for anyone who wants to install, upgrade, or use Update Manager. This book is written for experienced Windows or Linux system administrators who are familiar with virtual machine technology and datacenter operations.
Document Feedback
VMware welcomes your suggestions for improving our documentation. If you have comments, send your feedback to [email protected].
VMware, Inc.
11
12
VMware, Inc.
vCenter Update Manager enables centralized, automated patch and version management for VMware vSphere and offers support for VMware ESX/ESXi hosts, virtual machines, and virtual appliances. Updates that you specify can be applied to operating systems, as well as to applications on ESX/ESXi hosts, virtual machines, and virtual appliances that you scan. With Update Manager, you can perform the following tasks:
n n n
Scan for compliance and apply updates for guests, appliances, and hosts. Directly upgrade hosts, virtual machine hardware, VMware Tools, and virtual appliances. Install and update third-party software on hosts.
Update Manager requires network connectivity with VMware vCenter Server. Each installation of Update Manager must be associated (registered) with a single vCenter Server instance. The Update Manager module consists of a plug-in that runs on the vSphere Client, and of a server component, which you can install on the same computer as the vCenter Server system or on a different computer. If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you want to use Update Manager for each vCenter Server system, you must install and register Update Manager instances with each vCenter Server system. You can use an Update Manager instance only with the vCenter Server system with which it is registered. To install Update Manager, you must have Windows administrator credentials for the computer on which you install Update Manager. With Update Manager, you can scan and remediate (update) ESX/ESXi hosts. You can also scan and remediate virtual machines and templates. Update Manager can scan and remediate virtual appliances that are created with VMware Studio 2.0 and later. If the remediation fails, you can revert virtual machines back to their prior condition without losing data. You can deploy Update Manager in a secured network without Internet access. In such a case, you can use the VMware vCenter Update Manager Download Service (UMDS) to download patch metadata and patch binaries. This chapter includes the following topics:
n n n n n
Security Best Practices, on page 14 Update Manager Client Overview, on page 14 About the Update Manager Process, on page 15 Using Baselines and Baseline Groups, on page 21 Update Manager Settings, on page 24
VMware, Inc.
13
Advantages of Compliance
Many virus attacks take advantage of existing, well-known issues. Update Manager allows you to update virtual machines, appliances, and ESX/ESXi hosts to make your environment more secure. For example, the Nimda computer worm used vulnerabilities that were identified months before the actual spread of the worm. A patch existed at the time of the outbreak, and systems to which the patch was applied were not affected. Update Manager provides a way to help ensure that the required patches are applied to the systems in your environment. To make your environment more secure do the following:
n n
Be aware of where vulnerabilities exist in your environment. Efficiently bring vulnerable machines into compliance with the patching standards.
In a typical large environment, many different machines run various operating systems. Adding virtual machines to an environment increases this diversity. Update Manager automates the process of determining the state of your environment and updates your VMware virtual machines, appliances, and ESX/ESXi hosts.
Operating systems and applications permitted in your environment Patches required for operating systems and applications
It is also important to determine who is responsible for making these evaluations, when these evaluations are to be made, and the tactics that you want to use to implement the plan.
Configure the Update Manager settings Create and manage baselines and baseline groups View Update Manager events Review the patch repository Add or remove patches or extensions from a baseline Review and check notifications Import host upgrade releases
14
VMware, Inc.
To view Compliance view information for a selected inventory object, click the Update Manager tab in the Hosts and Clusters or VMs and Templates inventory view of the vSphere Client. In the Update Manager Client Compliance view, you can do the following tasks:
n n n n n
View compliance and scan results for each selected inventory object Attach and detach baselines and baseline groups from a selected inventory object Scan a selected inventory object Stage patches or extensions to hosts Remediate a selected inventory object
If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you have installed and registered more than one Update Manager instance, you can configure the settings for each Update Manager instance. Configuration properties that you modify are applied only to the Update Manager instance that you specify and are not propagated to the other instances in the group. You can specify an Update Manager instance by selecting the name of the vCenter Server system with which the Update Manager instance is registered from the navigation bar. For a vCenter Server system that is a part of a connected group in vCenter Linked Mode, you can also manage baselines and baseline groups as well as scan and remediate only the inventory objects managed by the vCenter Server system with which Update Manager is registered.
Configuring the Update Manager Patch Download Source on page 16 You can configure the Update Manager server to download patches and extensions either from the Internet or from a shared repository of UMDS data. You can also import patches and extensions manually from a ZIP file.
Downloading Patches, Extensions, Notifications, and Related Metadata on page 17 Downloading patches, extensions, and related metadata is an automatic process that can also be modified. By default, at regular configurable intervals, Update Manager contacts Shavlik, VMware, or third-party sources to gather the latest information (metadata) about available patches or extensions.
Importing Host Upgrade Release Files on page 18 You can upgrade the hosts in your environment by using host upgrade baselines. To create a host upgrade baseline, you must first upload host upgrade files to the Update Manager repository.
VMware, Inc.
15
Creating Baselines and Baseline Groups on page 18 Baselines contain a collection of one or more patches, extensions, service packs, bug fixes, or upgrades, and can be classified as upgrade, extension, or patch baselines. Baseline groups are assembled from existing baselines. Baseline groups might contain a number of patch or extension baselines, and only one upgrade baseline per upgrade type (like VMware Tools, virtual machine hardware, virtual appliance, or host).
Attaching Baselines and Baseline Groups to vSphere Objects on page 18 To use baselines and baseline groups, you must attach them to selected inventory objects such as container objects, virtual machines, virtual appliances, or hosts.
Scanning Selected vSphere Objects on page 18 Scanning is the process in which attributes of a set of hosts, virtual machines, or virtual appliances are evaluated against all patches, extensions, and upgrades in the attached baselines or baseline groups, depending on the type of scan you select.
Reviewing Scan Results on page 20 You can review compliance by examining results for a virtual machine, virtual appliance, template, ESX/ESXi host, or a group of virtual machines and appliances or a group of hosts. Update Manager scans objects to determine how they comply with baselines and baseline groups that you attach.
Staging Patches and Extensions to Hosts on page 20 If you want to apply patches or extensions to the hosts in your environment, you can stage the patches and extensions before remediation to ensure that the patches and extensions are downloaded to the host. Staging patches and extensions is an optional step.
Remediating Selected vSphere Objects on page 20 Remediation is the process in which Update Manager applies patches, extensions, and upgrades to ESX/ESXi hosts, virtual machines, or virtual appliances after a scan is complete. Remediation helps ensure that machines and appliances are secured against known potential attacks and have greater reliability resulting from the latest fixes.
16
VMware, Inc.
Information about all virtual machines patches regardless of whether the application or operating system to which the patch applies is currently in use in your environment. Information about all ESX/ESXi 4.0.x and ESX/ESXi 4.1 patches regardless of whether you have hosts of such versions in your environment. Patches for ESX/ESXi 3.5 and ESX 3.0.3 hosts, which are downloaded after you add an ESX 3.5, ESXi 3.5, or ESX 3.0.3 host to your environment. Information about ESX/ESXi 4.0.x and ESX/ESXi 4.1 patches as well as extensions from third-party vendor URL addresses. Notifications, alerts and patch recalls about ESX/ESXi 4.0.x and ESX/ESXi 4.1 hosts.
Downloading information about all patches or extensions is a relatively low-cost operation in terms of disk space and network bandwidth. Doing so provides the flexibility to add scanning and remediation of those hosts, applications, or operating systems at any time. In addition to downloading patches, extensions, and related metadata, Update Manager 4.1 supports the recall of patches for ESX/ESXi 4.0.x and ESX/ESXi 4.1 hosts. A patch is recalled if the released patch has problems or potential issues. After you scan the hosts in your environment, Update Manager alerts you if the recalled patch has been installed on a certain host. Recalled patches cannot be installed on hosts with Update Manager. Update Manager also deletes all the recalled patches from the Update Manager patch repository. After a patch fixing the problem is released, Update Manager downloads the new patch in its patch repository. If you have already installed the problematic patch, Update Manager notifies you that a fix was released and prompts you to apply the new patch. When you remediate a virtual machine for the first time, Update Manager has the following behavior: 1 2 3 Update Manager downloads the applicable patches to the patch repository. Update Manager applies the patches. The downloaded patches are kept in the patch download repository, so that when other machines are remediated, the patch resource is already present in the Update Manager patch repository.
If Update Manager cannot download patches or extensionsfor example, if it is deployed on an internal network segment that does not have Internet accessyou can use VMware vCenter Update Manager Download Service to download and store patches and extensions on the machine on which it is installed so that the Update Manager server can use the patches and extensions later. You can configure Update Manager to use an Internet proxy to download patches, extensions, and related metadata. You can change the time interval at which Update Manager downloads patches, extensions, and metadata, or downloads binaries and metadata. You can also change the time interval at which Update Manager checks for notifications. For detailed descriptions of the procedures, see Configure Checking for Patches, on page 74 and Configure Notifications Checks, on page 75.
VMware, Inc.
17
18
VMware, Inc.
Scans for patches are operating-system specific. For example, when Update Manager scans Windows virtual machines to ensure that they have a particular set of patches, Update Manager does not scan the same machines to determine whether Linux patches are installed. In the virtual infrastructure, all objects except resource pools can be scanned. Update Manager supports the following types of scan: Patch scan You can perform patch scans on ESX 3.0.3 and later, ESX 3i version 3.5 and later, as well as virtual machines running Windows or Linux. You can perform patch scan on online as well as offline Microsoft Windows virtual machines and templates. Patch scans can be performed only on online Red Hat Linux virtual machines. You can scan ESX 4.0 and later and ESXi 4.0 and later for extensions (additional software). You can scan ESX 3.0.0 and later and ESX 3i version 3.5 and later for upgrading to ESX/ESXi 4.0.x and ESX/ESXi 4.1. You can scan virtual machines running Windows or Linux for the latest VMware Tools version. You can perform VMware Tools scans on online as well as offline virtual machines and templates. You should power on the virtual machine at least once before performing a VMware Tools scan. You can scan virtual machines running Windows or Linux for the latest virtual hardware supported on the host. You can perform hardware-upgrade scans on online as well as offline virtual machines and templates. You can scan powered-on virtual appliances, that are created with VMware Studio 2.0 and later.
You can use VMware Studio 2.0 and later to automate the creation of ready-to-deploy vApps with prepopulated application software and operating systems. VMware Studio adds a network agent to the guest so that vApps bootstrap with minimal effort. Configuration parameters specified for vApps appear as OVF properties in the vCenter Server deployment wizard. For more information about VMware Studio, see the VMware SDK and API documentation for VMware Studio. For more information about vApp, you can also check the VMware blog site. You can download VMware Studio from the VMware Web site. IMPORTANT Update Manager does not scan PXE booted ESXi hosts. A PXE booted installation of ESXi is completely stateless (it does not rely on the presence of a local disk). Therefore, the installation and post-install configuration are not persistent across reboot. You can initiate scans on container objects, such as datacenters, clusters, vApps, or folders, to scan all the ESX/ESXi hosts or virtual machines and appliances contained in the container object. You can configure Update Manager to scan virtual machines, virtual appliances, and ESX/ESXi hosts against baselines and baseline groups by manually initiating or scheduling scans to generate compliance information. You should schedule scan tasks at a datacenter or vCenter Server system level to make sure that scans are up to date. For manual and scheduled scanning procedures, see Chapter 13, Scanning vSphere Objects and Viewing Scan Results, on page 101.
VMware, Inc.
19
Powered on, suspended, or powered off virtual machines and templates for VMware Tools and virtual machine hardware upgrade. Powered on, suspended, or powered off Microsoft Windows virtual machines and templates for patch remediation. Powered on virtual appliances, that are created with VMware Studio 2.0 and later, for virtual appliance upgrade.
20
VMware, Inc.
IMPORTANT Update Manager does not remediate PXE booted ESXi hosts. Update Manager skips PXE booted ESXi hosts when you remediate hosts in a container object, such as a folder. After you upload host upgrade release files, upgrades for ESX/ESXi hosts are managed through baselines and baseline groups. Update Manager lets you upgrade ESX/ESXi 3.x hosts to ESX/ESXi 4.0 and later. In some upgrade scenarios, in case of failure, you can roll back the upgrades for ESX hosts. Update Manager supports rollback of ESX hosts when you upgrade hosts from version 3.x to versions 4.0.x and 4.1. For upgrades of ESX hosts from version 3.x to versions 4.0.x and 4.1, you can also set up custom postupgrade scripts to run after an upgrade. You use postupgrade scripts to automate the configuration of the ESX hosts after the upgrade, for example to assign the ports which the host will use. Update Manager supports postupgrade scripts in the Bash (.sh) and Python (.py) formats. You can upgrade virtual appliances, VMware Tools, and the virtual hardware of virtual machines to a later version. Upgrades for virtual machines are managed through the Update Manager default virtual machine upgrade baselines. Upgrades for virtual appliances can be managed through both the Update Manager default virtual appliance baselines and custom virtual appliance upgrade baselines that you create. With Update Manager 4.0 and later, you can perform orchestrated upgrades of hosts and virtual machines. Orchestrated upgrades allow you to upgrade all hosts in the inventory by using host upgrade baselines. You can use orchestrated upgrades to upgrade the virtual hardware and VMware Tools of virtual machines in the inventory at the same time, using baseline groups containing the following baselines:
n n
Orchestrated upgrades can be performed at a cluster, folder or datacenter level. Typically hosts are put into maintenance mode before remediation if the update requires it. Virtual machines cannot run when a host is in maintenance mode. To ensure a consistent user experience, vCenter Server migrates the virtual machines to other hosts within a cluster before the host is put in maintenance mode. vCenter Server can migrate the virtual machines if the cluster is configured for vMotion and if VMware Distributed Resource Scheduler (DRS) and VMware Enhanced vMotion Compatibility (EVC) are enabled. EVC is not a prerequisite for vMotion. EVC guarantees that the CPUs of the hosts are compatible. For other containers or individual hosts that are not in a cluster, migration with vMotion cannot be performed. You can remediate the objects in your vSphere inventory by using either manual remediation or scheduled remediation. For more information about manual and scheduled remediation, see Chapter 14, Remediating vSphere Objects, on page 113.
Baseline Types on page 22 Update Manager supports different types of baselines that you can use and apply when scanning and remediating objects in your inventory.
VMware, Inc.
21
Update Manager Default Baselines on page 23 Update Manager includes default baselines that you can use to scan any virtual machine, virtual appliance, or host to determine whether they have all patches applied for the different categories or are upgraded to the latest version. The default baselines cannot be modified or deleted.
Baseline Groups on page 23 You can create baseline groups that contain patch, extension, and upgrade baselines. Baseline Attributes on page 24 Baselines have baseline attributes that you can use to identify the baseline type, the patches or upgrades that are included in the baseline, and so on.
Baseline Types
Update Manager supports different types of baselines that you can use and apply when scanning and remediating objects in your inventory. Update Manager provides upgrade, patch, or extension baselines. Upgrade Baseline Defines which version a particular host, virtual hardware, VMware Tools, or virtual appliance should be. With Update Manager, you can upgrade ESX/ESXi hosts from versions 3.x and 4.0.x to version 4.1. Defines a number of patches that must be applied to a given host or virtual machine. Contains extensions (additional software such as third-party device drivers) that must be applied to a given host. Extensions are installed on hosts that do not have such software installed on them, and patched on hosts that already have the software installed. All third-party software for ESX/ESXi hosts is classified as a host extension, although host extensions are not restricted to just third-party software.
At regular intervals, Update Manager queries patch repositories that vendors provide to find available patches. The server for the patch information and the contents of the patches are authenticated by using a full-featured public key infrastructure. To help ensure security, patches are typically cryptographically signed by vendors and are downloaded over a secure connection. A patch baseline can be either dynamic or fixed. Dynamic Patch Baseline The contents of a dynamic baseline are based on available patches that meet the specified criteria. As the set of available patches changes, dynamic baselines are updated as well. You can explicitly include or exclude any patches. The user manually specifies all patches included in the baseline from the total set of patches available in Update Manager. Fixed baselines are typically used to check whether systems are prepared to deal with particular issues. For example, you might use fixed baselines to check for compliance with patches to prevent a known worm.
22
VMware, Inc.
Baseline Groups
You can create baseline groups that contain patch, extension, and upgrade baselines. The set of baselines in a baseline group must be non-conflicting. A baseline group is also limited to a combination of patches, extensions, and upgrades.
n n
Multiple patch and extension baselines. One upgrade baseline and multiple patch as well as extension baselines. For example, one ESX/ESXi upgrade baseline and multiple ESX/ESXi patch or extension baselines.
Multiple upgrade baselines, but only one upgrade baseline per upgrade type (like VMware Tools, virtual machine hardware, virtual appliance, or host). For example, VMware Tools Upgrade to Match Host baseline, VM Hardware Upgrade to Match Host baseline and one VA Upgrade to Latest baseline.
Multiple upgrade baselines, but only one upgrade baseline per upgrade type and multiple patch as well as extension baselines. For example, one VM Hardware Upgrade to Match Host baseline, one VA Upgrade to Latest Critical baseline, as well as one or more patch and extension baselines.
VMware, Inc.
23
Baseline Attributes
Baselines have baseline attributes that you can use to identify the baseline type, the patches or upgrades that are included in the baseline, and so on. Table 1-1. Baseline Attributes
Attribute Baseline Name Content Description Identifies the baseline. The name is established when a baseline is created and can be modified. For patch and extension baselines, specifies the number of updates included in the baseline. Some updates, such as service packs, include many smaller patches that might have been previously distributed individually. The number of updates can indicate how long a scan and remediation might take to complete, but does not indicate the extent of the updates included in the baseline. For upgrade baselines, the content specifies the upgrade baseline details. Displays the type of baseline. Possible values are: Host Patches, Host Extension, VM Patches, VMware Tools, VM Hardware, VA Upgrade, and Host Upgrade. Specifies the last time patches were added to or removed from the baseline. This date reflects the last time updates changed either because of automatic changes resulting from dynamic updates or from manual user changes. Reviewing the last update information can help ascertain whether expected changes were made to baselines. Identifies the type of baseline. Possible values include Dynamic and Fixed.
Baseline Type
When to check for updated patch information. When to scan or remediate virtual machines, virtual appliances, and hosts. How to handle preremediation snapshots of virtual machines. How to handle failures to put hosts in maintenance mode. Whether to disable certain cluster features. Download patch binaries and patch metadata from the Internet or use a shared repository. Download patch binaries and patch metadata using an offline bundle. When to download notifications. Proxy usage and authentication. Enable or disable smart reboot of virtual appliances and virtual machines in a vApp after remediation.
24
VMware, Inc.
System Requirements
To be able to run and use the Update Manager server and the Update Manager Client plug-in you must ensure that your environment satisfies certain conditions. You also must ensure that the vCenter Server, vSphere Client and Update Manager are of compatible versions. Before you install Update Manager, you must set up an Oracle or Microsoft SQL Server database. If your deployment is relatively small and contains up to 5 hosts and 50 virtual machines, you can use the bundled SQL Server 2005 Express database, which you can install during the Update Manager installation. You can install the Update Manager server component on the same computer as vCenter Server or on a different computer. After you install the Update Manager server component, to use Update Manager, you must install the Update Manager Client plug-in and enable it on the vSphere Client. If your vCenter Server system is a part of a connected group in vCenter Linked Mode, you can install and register Update Manager instances with each vCenter Server system. You cannot use Update Manager for the vCenter Server systems in the vCenter Linked Mode without registering Update Manager instances with them. This chapter includes the following topics:
n n n
Update Manager Hardware Requirements, on page 25 Supported Operating Systems and Database Formats, on page 26 Update Manager Compatibility with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client, on page 26 Required Database Privileges, on page 27
VMware, Inc.
25
Update Manager uses a SQL Server or Oracle database. You should use a dedicated database for Update Manager, not a database shared with vCenter Server, and should back up the database periodically. Best practice is to have the database on the same computer as Update Manager or on a computer in the local network. Depending on the size of your deployment, Update Manager requires a minimum amount of free space per month for database usage. For more information about space requirements, see the VMware vCenter Update Manager Sizing Estimator.
Update Manager Compatibility with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client
Update Manager, VirtualCenter Server, and vCenter Server must be of compatible versions. You can install the Update Manager server and register it with VirtualCenter Server or vCenter Server of a compatible version only. The Update Manager plug-in can be installed and enabled only on VI Client or vSphere Client of a compatible version. Generally, Update Manager is compatible with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client of the same version. Update Manager 4.1 is compatible only with vCenter Server 4.1. Although multiple versions of the Update Manager Client plug-in might coexist on the same computer, the Update Manager Client plug-in of version 4.1 can be installed and enabled only on vSphere Client 4.1. For more information about the Update Manager compatibility with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client, see the vSphere Compatibility Matrixes.
26
VMware, Inc.
Table 2-3 lists the minimum database privileges required to run and use Update Manager. Table 2-3. Database Privileges Needed for Using Update Manager
Database Oracle Privileges The minimum required privileges of the Oracle database user are the following: n create session n create any table n drop any table The database user must have either a sysadmin server role or the db_owner fixed database role on the Update Manager database and the MSDB database.
VMware, Inc.
27
28
VMware, Inc.
The Update Manager server and Update Manager Download Service require a database to store and organize server data. Update Manager supports Oracle, Microsoft SQL Server, and Microsoft SQL Server 2005 Express. Before installing the Update Manager server, you must create a database instance and configure it to ensure that all Update Manager database tables can be created in it. If you are using Microsoft SQL Server 2005 Express, you can install and configure the database when you install Update Manager. Microsoft SQL Server 2005 Express is used for small deployments of up to 5 hosts and 50 virtual machines. To use Microsoft SQL Server and Oracle databases, you must configure a 32-bit system DSN and test it with ODBC. IMPORTANT Although you can install the Update Manager server only on 64-bit machines, Update Manager is a 32-bit application and requires a 32-bit DSN. The Update Manager database you use can be the same as the vCenter Server database. You can also use a separate database, or you can use existing database clusters. For best results in a large scale environment, you should use a dedicated Update Manager database that is located on a different computer than the vCenter Server system database. The Update Manager server requires administrative credentials to connect to the database. Before you begin the database setup, review the supported databases. For more information about the supported database patches, see vSphere Compatibility Matrixes. If you do not prepare your database correctly, the Update Manager installer might display error or warning messages. This chapter includes the following topics:
n n n n n
Create a 32-Bit DSN on a 64-Bit Operating System, on page 29 About the Bundled Microsoft SQL Server 2005 Express Database Package, on page 30 Maintaining Your Update Manager Database, on page 30 Configure a Microsoft SQL Server Database Connection, on page 30 Configure an Oracle Database, on page 32
VMware, Inc.
29
For Microsoft SQL Server database servers, install the 64-bit database ODBC drivers on your Microsoft Windows system. When you install the 64-bit drivers, the 32-bit drivers are installed automatically. For Oracle database servers, install the 32-bit database ODBC drivers on your Microsoft Windows system.
2 3
Run the 32-bit ODBC Administrator application, located at [WindowsDir]\SysWOW64\odbcad32.exe. Use the application to create your DSN.
You now have a DSN that is compatible with the Update Manager server. When the Update Manager installer prompts you for a DSN, you should select the 32-bit DSN.
About the Bundled Microsoft SQL Server 2005 Express Database Package
The Microsoft SQL Server 2005 Express database package is installed and configured when you select Microsoft SQL Server 2005 Express as your database during the VMware vCenter Update Manager installation or upgrade. No additional configuration is required.
Monitoring the growth of the log file and compacting the database log file, as needed. See the documentation for the database type that you are using. Scheduling regular backups of the database. Backing up the database before any Update Manager upgrade.
n n
See your database documentation for information about backing up your database.
30
VMware, Inc.
Create a SQL Server database user with database operator (DBO) rights. Make sure that the database user has either a sysadmin server role or the db_owner fixed database role on the Update Manager database and the MSDB database. The db_owner role on the MSDB database is required for installation and upgrade only.
On your Update Manager server system, run the 32-bit ODBC Administrator application, located at
Click the System DSN tab. Create or modify an ODBC system data source.
Option Create an ODBC system data source Action a b Click Add. For SQL Server 2005 or SQL Server 2008, select SQL Native Client, and click Finish.
Double-click the ODBC system data source that you want to modify.
In the Microsoft SQL Server DSN Configuration window, enter the necessary information and click Next. a Type an ODBC DSN in the Name text field. For example, type VUM. b c (Optional) Type an ODBC DSN description in the Description text field. Select the SQL Server name from the Server drop-down menu. Type the SQL Server machine name in the text field if you cannot find it in the drop-down menu.
If you are using a local SQL Server, you can select Integrated Windows NT authentication. If you are using a remote SQL Server, you must use the SQL Server authentication method.
If you use the SQL Server authentication method, in the Update Manager installation wizard supply the same user name, password, and ODBC DSN that you used to configure the ODBC. IMPORTANT Update Manager does not support Windows authentication of the database when the database is located on a different machine because of local system account issues. Make sure that if the Update Manager database is located on a remote machine, the database and the system DSN use SQL Server authentication. 6 7 Select a database from the Change the default database to drop-down menu, specify the ANSI settings, and click Next. Specify the language and translation settings, where to save the log files, and click Finish.
VMware, Inc.
31
What to do next To test the data source, in the ODBC Microsoft SQL Server Setup window, click Test Data Source, and click OK. Ensure that SQL Agent is running on your database server by double-clicking the SQL Server icon in the system tray. This applies to SQL Server 2005 and SQL Server 2008.
In this example, ORACLE_BASE is the root of the Oracle directory tree. 2 Create a user, such as vumAdmin, for accessing this tablespace through ODBC.
CREATE USER vumAdmin IDENTIFIED BY vumadmin DEFAULT TABLESPACE vum;
32
VMware, Inc.
Either grant the dba permission to the user, or grant the following specific permissions to the user.
grant connect to vumAdmin grant resource to vumAdmin grant create any job to vumAdmin grant create view to vumAdmin grant create any sequence to vumAdmin grant create any table to vumAdmin grant lock any table to vumAdmin grant create procedure to vumAdmin grant create type to vumAdmin grant execute on dbms_lock to vumAdmin grant unlimited tablespace to vumAdmin # To ensure space limitation is not an issue
In this example, host_address is the managed host to which the client needs to connect. 3 (Optional) Edit the tnsnames.ora file located in ORACLE_HOME\network\admin\, as appropriate. Here, ORACLE_HOME is located under C:\ORACLE_BASE, and it contains subdirectories for Oracle software executable and network files.
VMware, Inc.
33
34
VMware, Inc.
Update Manager consists of a server part and a plug-in part. You can install the Update Manager server and Update Manager Client plug-in on Windows machines only. You can install the Update Manager server component either on the same computer as vCenter Server or on a different computer. After you install the Update Manager server component, to use Update Manager, you must install the Update Manager Client plug-in and enable it on the vSphere Client. IMPORTANT You can install the Update Manager 4.1 server component only on a 64-bit machine. To improve performance, especially in large-scale environments, you should install the Update Manager server component on a different computer than the vCenter Server system. To install Update Manager, you must be either a local Administrator or a domain user that is part of the Administrators group. During the Update Manager installation, you must register the Update Manager server with the vCenter Server system and set it up to work correctly. To register Update Manager with vCenter Server, you must provide the credentials of the vCenter Server user that has the Register extension privilege. For more information about managing users, groups, roles, and permissions, see vSphere Datacenter Administration. To run and use Update Manager, you must use a local system account for the machine on which Update Manager is installed. The Update Manager server requires SQL Server 2005, SQL Server 2008, Oracle 10g, or Oracle 11g database. Update Manager can handle small-scale environments using the bundled SQL Server 2005 Express. For environments with more than 5 hosts and 50 virtual machines, create either an Oracle or a SQL Server database for Update Manager. For large scale environments, you should set up the Update Manager database on a different computer than the Update Manager server and the vCenter Server database. For more information about setting up the Update Manager database, see Chapter 3, Preparing the Update Manager Database, on page 29. IMPORTANT Update Manager does not support Windows authentication of the database when the database is located on a different machine because of local system account issues. Make sure that if the Update Manager database is located on a remote machine, the database and the system DSN use SQL Server authentication. Before you install Update Manager, gather the following information about the environment in which you are installing Update Manager:
n
Networking information about the vCenter Server system that Update Manager will work with. Defaults are provided in some cases, but ensure that you have the correct information for networking:
n n n
IP address. User name and password for the vCenter Server system. Port numbers. In most cases, the default Web service port 80 is used.
VMware, Inc.
35
User name for an account with sufficient privileges. This is often Administrator. Password for the account used for the installation. System DNS name, user name, and password for the database with which Update Manager will work.
VMware uses designated ports for communication. Additionally, the Update Manager server connects to vCenter Server, ESX/ESXi hosts, and the Update Manager Client plug-in on designated ports. If a firewall exists between any of these elements and Windows firewall service is in use, the installer opens the ports during the installation. For custom firewalls, you must manually open the required ports. You can install vCenter Server and the Update Manager server in a heterogeneous network environment, where one of the machines is configured to use IPv6 and the other is configured to use IPv4. In this case, to install and enable the Update Manager plug-in, the machine on which vSphere Client is installed must be configured to use both IPv6 and IPv4. This chapter includes the following topics:
n n
Install the Update Manager Server, on page 36 Install the Update Manager Client Plug-In, on page 37
Make sure that your system meets the requirements specified in Chapter 2, System Requirements, on page 25. Before installation, you must create and set up an Update Manager database and 32-bit DSN, unless you are using SQL Server 2005 Express. For more information, see Chapter 3, Preparing the Update Manager Database, on page 29. Ensure that the database privileges meet the requirements listed in Required Database Privileges, on page 27. Before installing Update Manager, install vCenter Server. For more information about installing vCenter Server, see the ESX and vCenter Server Installation Guide.
Procedure 1 Insert the installer DVD into the DVD drive of the Windows server that is hosting the Update Manager server and select vCenter Update Manager. If you cannot launch the autorun.exe file, browse to locate the UpdateManager folder on the DVD and run VMware-UpdateManager.exe. 2 3 4 5 6 Select a language for the installer and click OK. Review the Welcome page and click Next. Read the patent agreement and click Next. Accept the terms in the license agreement and click Next. Enter the vCenter Server IP address or name, HTTP port, and the administrative account that the Update Manager server will use to connect to the vCenter Server system, and click Next.
36
VMware, Inc.
If you do not have an existing database, select Install a Microsoft SQL Server 2005 Express instance (for small scale deployments) and click Next. This database is suitable for deployments of up to 5 hosts and 50 virtual machines.
If you have a supported database, select Use an existing supported database and select a DSN from the drop-down menu. If the DSN does not use Windows NT authentication, enter the user name and password for the DSN and click Next. IMPORTANT The DSN must be a 32-bit DSN.
If the system DSN you enter points to an existing Update Manager database with the same schema, select to leave your existing database or replace it with an empty one. If the system DSN you enter points to an older schema, on the Database Upgrade page, select Yes, I want to upgrade my Update Manager database, and I have taken a backup of the existing Update Manager database, and click Next.
Specify how to identify your Update Manager instance on the network by selecting an IP address or host name from the drop-down menu. If the computer on which you install Update Manager has one NIC, the Update Manager installer automatically detects the IP address. If the computer has multiple NICs, select the correct IP address or use a DNS name. The DNS name must be resolved from all hosts that this Update Manager will manage.
10
Enter the Update Manager port settings, select whether you want to configure the proxy settings, and click Next. Configuring the proxy settings is optional.
11 12
(Optional) Provide information about the proxy server and port and whether the proxy should be authenticated and click Next. Select the Update Manager installation and patch download directories and click Next. If you do not want to use the default locations, click Change to browse to a different directory.
13
(Optional) In the warning message about the disk free space, click OK. This message appears when you try to install Update Manager on a computer that has less than 20GB free space.
14 15
The Update Manager server component is installed, and the client appears in the Available Plug-ins list of vSphere Plug-in Manager. What to do next Install the vCenter Update Manager Client plug-in and enable it on a vSphere Client.
VMware, Inc.
37
Prerequisites Before installing the Update Manager Client plug-in, you must install the Update Manager server. Procedure 1 2 3 4 5 Connect the vSphere Client to a vCenter Server system with which Update Manager is registered. Select Plug-ins > Manage Plug-ins. In the Extension Manager window, click Download and install for the VMware vCenter Update Manager extension. Complete the Update Manager Client installation, and click Finish. Click Close to close the Extension Manager window after the status for the Update Manager extension is displayed as Enabled.
The icon for the Update Manager plug-in is displayed on the vSphere Client Home page under Solutions and Applications.
38
VMware, Inc.
The VMware vCenter Update Manager Guest Agent facilitates the Update Manager processes. For Linux and Windows operating systems, the Guest Agent is automatically installed the first time a patch remediation is scheduled or when a patch scan is initiated on a powered on virtual machine. For Linux virtual machines, Update Manager checks for the presence of the Guest Agent whenever a Linux virtual machine in the vSphere inventory is powered on. Update Manager displays the discovery task as a Detect Linux GuestAgent task in the Tasks pane. The task involves sending messages to each guest operating system and waiting for a response from the vCenter Update Manager Guest Agent. A timeout in the response means that no Guest Agent is installed. The process does not install the Guest Agent on the guest operating system. If the Guest Agent installation is not completed successfully, operations such as scanning and remediation for patches fail. In such a case, manually install the Guest Agent. For best results of Update Manager operations, ensure that the latest version of the Guest Agent is installed on a virtual machine. The Guest Agent installation packages for Windows and Linux guests are located in the \docroot\vci\guestAgent\ subfolder of the Update Manager installation directory. For example, if Update Manager is installed in C:\Program Files (x86)\VMware\Infrastructure\Update Manager, the Guest Agent installers are in C:\Program Files (x86)\VMware\Infrastructure\Update Manager\docroot\vci\guestAgent\. The Guest Agent requires no user input, and the installation completes silently. For Windows, start the installer by running the VMware-UMGuestAgent.exe file. For Linux, install the VMware-VCIGuestAgent-Linux.rpm file by running the rpm -ivh VMware-VCIGuestAgent-Linux.rpm command.
VMware, Inc.
39
40
VMware, Inc.
Migrating the Update Manager Data and Upgrading Update Manager on a Different Machine
You can install Update Manager 4.1 only on 64-bit operating system platform. If you are running an earlier version of Update Manager on a 32-bit platform, you can use the data migration tool to back up the existing data on the 32-bit system, and to restore your data on the 64-bit machine on which you are installing Update Manager 4.1. The Update Manager installation media includes a data migration tool that you can use to migrate your existing configuration information and database. The configuration information that you can migrate includes the following parameters:
n n n n
Port settings Proxy settings Patch repository location Patch metadata, patch binaries, and host upgrade binaries
You can use the data migration tool to migrate the Update Manager database if it is a SQL Server Express database installed on the same machine as Update Manager. If you use a different database (for example, Oracle or Microsoft SQL Server database) installed on the Update Manager machine, you can back up and move the database manually or you can detach the database from the source (32-bit) machine and attach it to the destination (64-bit) machine. You can also leave the database on the existing machine and connect to it from the new 64-bit machine by using a DSN. If your database is installed on a different machine from the Update Manager server, you can back up the database manually, and create a DSN to connect to the database remotely. When Update Manager and vCenter Server are installed on the same machine, you can use the data migration tool to migrate configuration data for vCenter Server as well. The data migration tool first backs up the vCenter Server data and then backs up the Update Manager data on the source machine. When you run the tool to restore the data, the data migration tool first restores the vCenter Server data on the destination machine and then restores the Update Manager data on the same destination machine. When Update Manager and vCenter Server are installed on the same machine, Update Manager and vCenter Server must use dedicated databases. If the Update Manager server shares its database with the vCenter Server database, you receive an error message from the data migration tool and you cannot migrate your data. If Update Manager and vCenter Server are installed on different machines, you can use the data migration tool to separately back up and restore the Update Manager and vCenter Server data. First you can back up the vCenter Server data and restore it on the 64-bit machine on which you are installing vCenter Server. Then you can use the data migration tool to back up the Update Manager data and restore it on the 64-bit machine on which you are installing Update Manager. In this case, the machine on which you install Update Manager must be different from the machine on which you install vCenter Server. For more information about backing up and restoring the vCenter Server configuration and database, see the vSphere Upgrade Guide.
VMware, Inc.
41
You use the data migration tool by running two scripts backup.bat and install.bat. The backup.bat script backs up the configuration and database on the source machine, and the install.bat script restores the backed up data on the destination machine. The overall scenario to migrate your Update Manager data includes the following steps: 1 2 (Optional) Back up the database manually. Run the backup.bat script of the data migration tool on the source machine and respond to the script prompts to create a backup of the Update Manager configuration. If Update Manager and vCenter Server are installed on the same machine, the script first takes a backup of the vCenter Server configuration and then backs up the Update Manager configuration. 3 4 Copy the backed up configuration data to the destination machine. Database data in the backup bundle is present only if your database is SQL Server Express. (Optional) If you are using a different database, for example Oracle database, installed on a different machine than Update Manager, back up the database manually and create a DSN on the 64-bit machine to connect to the database remotely. (Optional) If you are using a different database, for example Oracle database, installed on the same machine as Update Manager, move the database from the source (32-bit) machine to the destination (64bit) machine and restore it manually. If your database is not SQL Server Express, create a 32-bit DSN on the 64-bit machine to connect to the database. Run the install.bat script on the destination machine. This script examines the backup bundle and if you have backed up both Update Manager and vCenter Server data, the script installs both Update Manager and vCenter Server. If you have backed up only Update Manager or only vCenter Server data, the script installs only Update Manager or only vCenter Server. When the script prompts you, specify the location of the installation ISO. The script launches the installer, and you can install Update Manager, or both Update Manager and vCenter Server with the configuration settings and the database backed up by the data migration tool.
6 7
In case of failure, you can check the logs folder. The folder contains backup.log file for the backup process and
restore.log for the restore process.
Back Up and Move the Update Manager Database, on page 42 Back Up and Migrate the Existing Configuration and Database Using the Migration Tool, on page 45 Create a 32-Bit DSN on a 64-Bit Operating System, on page 46 Restore the Update Manager Configuration and Install Update Manager on the 64-Bit Machine, on page 46
n n
If your database is remote from the machine on which Update Manager is installed, and you want it to remain remote after the upgrade, leave the database where it is after you back it up.
42
VMware, Inc.
Chapter 6 Migrating the Update Manager Data and Upgrading Update Manager on a Different Machine
If your database is local to the Update Manager server, and you want it to remain local after the upgrade, you have various options depending on the type of database.
Option Microsoft SQL Server Express database Microsoft SQL Server database Other local databases Description Back up the database, and move the database along with other configuration data by using the data migration tool. A separate database migration step is not necessary. Back up the database, detach the database, and attach it to the 64-bit machine on which you are installing Update Manager. Back up the database, and restore it onto the machine on which you are installing Update Manager.
What to do next Back up the Update Manager configuration and database by using the data migration tool.
You must have an Update Manager system running with a local or remote Microsoft SQL Server database. You must have Microsoft SQL Server Management Studio installed on the source machine and the destination machine. The Express versions (SQLServer2005_SSMSEE.msi and SQLServer2005_SSMSEE_x64.msi) are free downloads from Microsoft.
Procedure 1 2 3 4 5 6 7 8 9 In SQL Server Management Studio, make a full backup of the source machine database. Copy the backup file (.bak) to the C:\ drive on the destination machine. On the destination machine, open SQL Server Management Studio and right-click the Databases folder. Select New Database, enter the source machine database name, and click OK. Right-click the new database icon and select Task > Restore > Database. Select From Device and click Browse. Click Add, navigate to the backup file, and click OK. In the Restore Database window, select the checkbox next to your .bak file. On the Options page, select the Overwrite the existing database checkbox and click OK.
The database from the source machine is restored on the destination machine. What to do next See Create a 32-Bit DSN on a 64-Bit Operating System, on page 46.
VMware, Inc.
43
You must have an Update Manager system running with a local or remote Microsoft SQL Server database. You must have Microsoft SQL Server Management Studio installed on the source machine and the destination machine. The Express versions (SQLServer2005_SSMSEE.msi and SQLServer2005_SSMSEE_x64.msi) are free downloads from Microsoft.
Procedure 1 On the source machine, stop the Update Manager service. a b 2 3 4 Click Start > Control Panel > Administrative Tools > Services. Right-click VMware Update Manager Service and select Stop.
In SQL Server Management Studio, open the Databases directory, right-click the Update Manager database, and select Tasks > Detach. Select the database and click OK. When the detach operation is complete, copy the data files (.mdf and .ldf) to the destination machine's database folder. The default location of the database folder in 64-bit Windows is C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Data.
5 6
In SQL Server Management Studio on the destination machine, right-click the Databases directory and select Attach. Select the .mdf file that you copied to the destination machine's database folder and click OK.
The database from the source machine is attached to the destination machine. What to do next See Create a 32-Bit DSN on a 64-Bit Operating System, on page 46.
44
VMware, Inc.
Chapter 6 Migrating the Update Manager Data and Upgrading Update Manager on a Different Machine
Procedure 1 2 3 4 On the source machine, log in to Oracle SQL*Plus as the Update Manager database user and export the database as a .dmp file. Copy the .dmp file to the C:\ drive of the destination machine. Create a new empty database on the destination machine. On the destination machine, in Oracle SQL*Plus, run the following command to create the tablespace.
create tablespace vumtest datafile 'c:\vumtest.dbf' size 100m autoextend on;
On the destination machine, create a user and grant the user either the dba permission, or the set of permissions required for administering an Update Manager database.
create user VUMUSER identified by CENSORED default tablespace vumtest;
Import the .dmp file into the Oracle database on the destination machine.
The database from the source machine is restored on the destination machine. What to do next See Create a 32-Bit DSN on a 64-Bit Operating System, on page 46.
Back Up and Migrate the Existing Configuration and Database Using the Migration Tool
You can use the migration tool to migrate your Update Manager configuration data and database. If your database is a SQL Server Express database that is local to the machine on which Update Manager is installed, the data migration tool backs up the configuration and the database, and restores it to the new machine. Prerequisites
n
The Update Manager database must be a SQL Server Express database installed on the same machine as Update Manager. If Update Manager server and vCenter Server are installed on the same machine, they must use dedicated databases (that means that the servers must not share one database instance). Stop the Update Manager service.
Procedure 1 2 3 4 5 6 Log in as an administrator to the source machine and insert the Update Manager installation media in the DVD drive of the source machine. Explore the media to locate and open the datamigration folder. Extract the datamigration.zip file to a writeable filesystem (for example, datamigration folder) on the source machine. From the Windows command prompt, navigate to the datamigration folder, type backup.bat, and press Enter to run the backup script of the data migration tool. Wait until the script backs up the Update Manager configuration and database, upgrades the database, and restores the original database. Enter y to back up the available host patches, and press Enter. The time to back up the host patches and host upgrade files (if any) depends on the size of the patches, extensions, and upgrade files.
VMware, Inc.
45
Enter y to back up the available virtual machine patches, and press Enter. The time to back up the virtual machine patches depends on the size of downloaded patches.
Respond to the script prompts and wait until the script completes.
The Update Manager configuration data and database are successfully backed up. In case of failure, examine the log file that the script generates. This is the backup.log file located in the datamigration\logs folder. What to do next
n
If your database is a SQL Server Express database local to the Update Manager machine, go to Restore the Update Manager Configuration and Install Update Manager on the 64-Bit Machine, on page 46. If you use another database, go to Create a 32-Bit DSN on a 64-Bit Operating System, on page 46.
For Microsoft SQL Server database servers, install the 64-bit database ODBC drivers on your Microsoft Windows system. When you install the 64-bit drivers, the 32-bit drivers are installed automatically. For Oracle database servers, install the 32-bit database ODBC drivers on your Microsoft Windows system.
2 3
Run the 32-bit ODBC Administrator application, located at [WindowsDir]\SysWOW64\odbcad32.exe. Use the application to create your DSN.
You now have a DSN that is compatible with the Update Manager server. When the Update Manager installer prompts you for a DSN, you should select the 32-bit DSN.
Restore the Update Manager Configuration and Install Update Manager on the 64-Bit Machine
You can use the data migration tool to start the Update Manager installer and restore the Update Manager configuration and database on the 64-bit machine. You can use the same host name for the destination machine that was used for the source machine. If you use the tool to back up a SQL Server Express database that is local to the machine on which Update Manager is installed, the migration tool restores the database to the new 64-bit machine as well. Procedure 1 2 3 Copy the datamigration folder from the source (32-bit) machine to the destination (64-bit) machine. Insert the Update Manager installation media into the DVD-ROM drive on the destination machine, or copy the installation ISO image to the destination machine. From the Windows command prompt, navigate to the datamigration folder copied from the source machine and run install.bat. The script imports the backed up configuration data and the database.
46
VMware, Inc.
Chapter 6 Migrating the Update Manager Data and Upgrading Update Manager on a Different Machine
Enter the path to the Update Manager installer. The install script verifies that migration data is present, and launches the Update Manager installer.
5 6 7 8 9 10
Select a language for the installer and click OK. Review the Welcome page and click Next. Read the patent agreement and click Next. Accept the terms in the license agreement and click Next. Enter the vCenter Server IP address or name, HTTP port, and the administrative account that the Update Manager server will use to connect to the vCenter Server system, and click Next. Select the type of database that you want to use.
n
If you used the bundled SQL Express database on the source machine and you want to install and import the backed up database, click Install SQL Server 2005 Express instance (for small-scale deployments). If you want to use an existing non-bundled database, click Use an existing supported database, select the DSN that was used for the database on the source machine, enter the user name and password for the DSN, and click Next. The database user name and password for the DSN are required only if the DSN uses SQL Server authentication. Update Manager does not support the use of a remote SQL Server database that uses Windows NT authentication.
11
If the system DSN you enter points to an existing Update Manager database with the same schema, select to leave your existing database or replace it with an empty one. If the system DSN you enter points to an older schema, on the Database Upgrade page, select Yes, I want to upgrade my Update Manager database, and I have taken a backup of the existing Update Manager database, and click Next.
12
Specify how to identify your Update Manager instance on the network by selecting an IP address or host name from the drop-down menu. If the computer on which you install Update Manager has one NIC, the Update Manager installer automatically detects the IP address. If the computer has multiple NICs, select the correct IP address or use a DNS name. The DNS name must be resolved from all hosts that this Update Manager will manage.
13
Enter the port numbers to use or accept the port numbers shown, specify whether you want to configure the proxy settings, and click Next. The port numbers displayed are those that were backed up from the source Update Manager installation.
14 15
(Optional) Provide information about the proxy server and port and whether the proxy should be authenticated and click Next. Select the Update Manager installation and patch download locations and click Next. The location for downloading patches is the one, that was backed up from the source Update Manager installation.
16
(Optional) In the warning message about the disk free space, click OK. This message appears when you try to install Update Manager on a computer that has less than 20GB free space.
17 18
Click Install. When the Update Manager installation is completed, click Finish. The data migration tool restores the backed up configuration data.
VMware, Inc.
47
Update Manager is installed, and the settings that you backed up are restored. If you migrated a SQL Server Express database, and selected to install this database during the Update Manager installation, the database is also restored on the new machine. After the installation is complete, Update Manager service is started. In case of failure examine the log file that the script generates. This is the restore.log file located in the datamigration\logs folder.
48
VMware, Inc.
You can upgrade Update Manager 1.0 and later to Update Manager 4.1. You can install Update Manager 4.1 only on 64-bit operating system platform. If you are running an earlier version of Update Manager on a 32-bit platform, you must either back up or database manually, or you can use the data migration tool to back up the existing data on the 32-bit machine, and to restore your data on the 64-bit machine on which you are installing Update Manager 4.1. For more information about how to use the data migration tool to migrate your data and install Update Manager, see Chapter 6, Migrating the Update Manager Data and Upgrading Update Manager on a Different Machine, on page 41. During the Update Manager upgrade process, the vci-integrity.xml is overwritten. Any changes that you might have made to the following parameters in the vci-integrity.xml file are not lost during the upgrade.
n
vCenter Server host and port settings The IP address of the computer on which vCenter Server is installed and the port that Update Manager server uses to connect to vCenter Server. These settings can be configured using the <vpxdLocation> tag. Patch store The patch download location (the directory in which Update Manager stores patch metadata and patch binaries) that can be configured using the <patchStore> tag. Patch depot URL The URL and port that Update Manager Client uses to contact the Update Manager server and to download patch data. The URL contains either the name or the IP address of the computer on which Update Manager server is installed. These settings can be configured using the <PatchDepotUrl> tag. If there is no such a setting, the ESX/ESXi hosts use the Update Manager server and Web server port as a URL to download host patches from the Update Manager server. Patch depot proxy URL The proxy URL that the Update Manager server uses to download ESX host patches. This setting can be configured using the <PatchDepotProxyUrl> tag. If no value is specified, Update Manager uses the proxy server in the proxy settings to download host patches. Proxy settings The Update Manager proxy settings. These settings include the proxy port (<proxyPort>), proxy server (<proxyServer>), and usage of a proxy server (<useProxyServer>). SOAP port The SOAP port on which the Update Manager Client connects to the Update Manager server. This setting can be configured using the <soapPort> tag. Web server port The Web port on which ESX/ESXi hosts connect to the Update Manager server for host patch downloads. This setting can be configured using the <webServerPort> tag. Patch metadata download URL The URL from which Update Manager downloads patch metadata for hosts. This variable can be configured using the <PatchMetadataDownloadUrl> tag. During the upgrade to Update Manager 4.1, the value in the <PatchMetadataDownloadUrl> tag is moved to the <ESX3xUpdateUrl> tag.
VMware, Inc.
49
When you upgrade Update Manager, you cannot change the installation path and patch download location. To change these parameters, you must install a new version of Update Manager rather than upgrade. You must upgrade the Update Manager database during the Update Manager upgrade. You can select whether to keep your existing data in the database or to replace it during the upgrade. This chapter includes the following topics:
n n
Upgrade the Update Manager Server, on page 50 Upgrade the Update Manager Client Plug-In, on page 51
Before upgrading Update Manager, ensure that you grant the database user the required list of privileges. For more information, see Required Database Privileges, on page 27. Before upgrading, make sure that you created a 32-bit DSN on the 64-bit operating system. For more information about creating a 32-bit DSN on a 64-bit operating system, see Create a 32-Bit DSN on a 64Bit Operating System, on page 29. Before upgrading Update Manager, stop the Update Manager service and back up the Update Manager database. The installer upgrades the database schema, making the database irreversibly incompatible with previous Update Manager versions.
Procedure 1 Upgrade VirtualCenter Server or vCenter Server to a compatible version. NOTE The vCenter Server installation wizard warns you that Update Manager is not compatible when vCenter Server is upgraded. 2 3 4 5 6 7 8 Insert the installer DVD in the DVD drive of the server on which Update Manager is installed. Select a language and click OK. In the upgrade warning message, click OK. Review the Welcome page and click Next. Read the patent agreement and click Next. Accept the terms in the license agreement and click Next. Enter the vCenter Server system credentials and click Next. To keep the Update Manager registration with the original vCenter Server system valid, keep the vCenter Server system IP address and enter the credentials from the original installation. 9 Enter the database password for the Update Manager database and click Next. The database password is required only if the DSN does not use Windows NT authentication. 10 On the Database Upgrade page, select Yes, I want to upgrade my Update Manager database and I have taken a backup of the existing Update Manager database, and click Next. You should create a backup copy of the existing database before proceeding with the upgrade.
50
VMware, Inc.
11
(Optional) If you upgrade the database to the latest schema before upgrading Update Manager, on the Database re-initialization warning page select to keep your existing database. If you choose to replace your existing database with an empty one, you lose all of your existing data.
12
Enter the Update Manager port settings, select whether you want to configure the proxy settings, and click Next. Configure the proxy settings if the computer on which Update Manager is installed has access to the Internet.
13 14 15
(Optional) Provide information about the proxy server and port, specify whether the proxy should be authenticated, and click Next. Click Install to begin the upgrade. Click Finish.
You upgraded the Update Manager server. What to do next Upgrade the Update Manager Client plug-in.
The icon for the Update Manager Client plug-in is displayed on the vSphere Client Home page.
VMware, Inc.
51
52
VMware, Inc.
You can install Update Manager on the same computer as the vCenter Server system or on a different computer. The Update Manager server and plug-in must be the same version. Update Manager, vCenter Server, and vSphere Client must be of a compatible version. For more information about compatibility, see Update Manager Compatibility with VirtualCenter Server, vCenter Server, VI Client, and vSphere Client, on page 26. Update Manager has two deployment models:
n
Internet-connected model - The Update Manager server has connectivity to the VMware patch repository, Shavlik, and third-party patch repositories (for ESX/ESXi 4.0.x and ESX/ESXi 4.1 hosts). Update Manager works with vCenter Server to scan and remediate the virtual machines, appliances, hosts, and templates. Air-gap or semi-air-gap model - Update Manager has no direct connection to the Internet and cannot download patch metadata. In this model, you can use UMDS to download patch metadata and patch binaries and store them in a shared repository. You can configure the Update Manager server to use a shared repository of UMDS data as a patch datastore to scan and remediate the objects that you select from the inventory. For more information about using UMDS, see Chapter 10, Installing, Setting Up, and Using Update Manager Download Service, on page 59.
You should not install Update Manager or vCenter Server on a virtual machine that is managed by the same vCenter Server system, if the host that is running the virtual machine is not in a DRS cluster. In such a case, if you try to remediate the host, Update Manager does not remediate the host, to make sure that the virtual machine running Update Manager or vCenter Server is not suspended or shut down during the remediation. If the host on which the virtual machine is running is in a DRS cluster, and you start a remediation task on the host, DRS attempts to migrate the virtual machine to another host, so that the remediation succeeds. If DRS cannot migrate the virtual machine running Update Manager or vCenter Server, the remediation fails. Remediation failure occurs even if you have selected to power off or suspend the virtual machines on the host, in case the host fails to enter maintenance mode. This chapter includes the following topics:
n n
Update Manager Deployment Configurations, on page 53 Update Manager Deployment Models and Their Usage, on page 54
VMware, Inc.
53
vCenter Server and Update Manager server are installed on one host and their database instances are on the same host. This is the so called all-in-one system. It is most reliable when your system is relatively small.
54
VMware, Inc.
vCenter Server and Update Manager server are installed on one host and their database instances are on two separate hosts. This model is recommended for medium deployments, with more than 300 virtual machines or 30 hosts.
vCenter Server and Update Manager server run on different hosts, each with its own database instance residing on a separate machine. This model is recommended for large deployments when the datacenters contain more than 1,000 virtual machines or 100 hosts.
For more information about the Update Manager best practices and recommendations, see VMware vCenter Update Manager Performance and Best Practices.
VMware, Inc.
55
56
VMware, Inc.
Update Manager has a relatively small impact on computing resources such as disk space. Unless you are certain that you want to remove Update Manager, leave an existing installation in place for later use and disable the Update Manager Client plug-in. The Update Manager server and Update Manager Client plug-in can be uninstalled separately. This chapter includes the following topics:
n n
Uninstall the Update Manager Server, on page 57 Uninstall the Update Manager Client Plug-In, on page 57
The Update Manager server component is uninstalled from your system. All downloaded metadata and binaries, as well as log data remain on the machine where Update Manager was installed.
After you uninstall the Update Manager plug-in, the Update Manager icon is no longer available in the vSphere Client.
VMware, Inc.
57
58
VMware, Inc.
10
VMware vCenter Update Manager Download Service (UMDS) is an optional module of Update Manager. UMDS downloads patch metadata, patch binaries, and notifications that would not otherwise be available to the Update Manager server. For security reasons and deployment restrictions, vSphere, including Update Manager, might be installed in an air-gap network. An air-gap network is a secured network that is disconnected from other local networks and the Internet. Update Manager requires access to patch information to function properly. Install UMDS on a computer that has Internet access to download patch binaries and patch metadata, and then export the downloads to a portable media drive so that they become accessible to the Update Manager server. In a semi-air-gap deployment (where the machine on which Update Manager is installed has no Internet access, but is connected to a server that has Internet access), you can automate the export process and transfer files from UMDS to the Update Manager server by using a Web server on the machine on which UMDS is installed. UMDS 4.1 supports patch recalls and notifications. A patch is recalled if the released patch has problems or potential issues. After you download patch data and notifications with UMDS, and export the downloads so that they become available to the Update Manager server, Update Manager deletes the recalled patches and displays the notifications on the Update Manager Notifications tab. For more information about patch recalls and notifications, see Configuring Notification Checks and Viewing Notifications, on page 75. This chapter includes the following topics:
n n
Installing and Upgrading UMDS, on page 59 Setting Up and Using UMDS, on page 62
VMware, Inc.
59
Install UMDS
Install UMDS if the machine on which Update Manager is installed does not have access to the Internet. Prerequisites
n
Ensure that the machine on which you install UMDS has Internet access, so that UMDS can download patch metadata and patch binaries. Uninstall UMDS 1.0.x, if it is installed on the machine. If such a version of UMDS is already installed, the installation wizard displays an error message and the installation cannot proceed. Before you install UMDS create a database instance and configure it. If you install UMDS on 64-bit machine, you must configure a 32-bit DSN and test it from ODBC. The database privileges and preparation steps are the same as the ones used for Update Manager. For more information, see Chapter 3, Preparing the Update Manager Database, on page 29. UMDS and Update Manager must be installed on different machines.
Procedure 1 Insert the VMware vCenter Update Manager installation DVD into the DVD drive of the Windows server that will host UMDS.
60
VMware, Inc.
Chapter 10 Installing, Setting Up, and Using Update Manager Download Service
2 3 4 5 6 7
Browse to the umds folder on the DVD and run VMware-UMDS.exe. Select the language for the installation and click OK. Review the Welcome page and click Next. Read the patent agreement and click Next. Accept the terms in the license agreement and click Next. Select the database options and click Next.
n
If you do not have an existing database, select Install a Microsoft SQL Server 2005 Express instance (for small scale deployments). If you want to use an existing database, select Use an existing supported database and select your database from the list of DSNs. If the DSN does not use Windows NT authentication, enter the user name and password for the DSN and click Next.
8 9
Enter the Update Manager Download Service proxy settings and click Next. Select the Update Manager Download Service installation and patch download directories and click Next. If you do not want to use the default locations, you can click Change to browse to a different directory.
10 11 12
In the warning message about the disk free space, click OK. Click Install to begin the installation. Click Finish.
UMDS is installed.
Upgrade UMDS
You can upgrade UMDS 4.0 to UMDS 4.1. You cannot upgrade from UMDS 1.0.x versions to UMDS 4.1. The patches you download with UMDS 1.0.x cannot be reused by UMDS 4.1. To avoid losing the UMDS configuration settings during the upgrade, the best practice is to upgrade UMDS from version 4.0 to version 4.1 and then re-configure the UMDS settings. To preserve your UMDS configuration settings, you can also back up the downloadConfig.xml file before the upgrade, upgrade UMDS, and then restore the backed up downloadConfig.xml file. To use UMDS 4.1, you must first uninstall UMDS 1.0.x, if it is present on the machine. Before you uninstall UMDS 1.0.x, import the downloaded patch data into Update Manager 1.0.x by using vmwareupdateDownloadCli.exe. You can then uninstall UMDS 1.0.x, install UMDS 4.1, and upgrade Update Manager. Prerequisites You should create a backup copy of the existing UMDS database before proceeding with the upgrade. The upgrade makes the database incompatible with older UMDS and Update Manager versions. Procedure 1 2 3 4 5 Insert the VMware vCenter Update Manager installation DVD into the DVD drive of the Windows server that will host UMDS. Browse to the umds folder on the DVD and run VMware-UMDS.exe. Click OK in the message warning you that an upgrade will be performed. Review the Welcome page and click Next. Accept the terms in the license agreement and click Next.
VMware, Inc.
61
Enter your database information and click Next. The database user name and password are required, if your DSN does not use Windows NT authentication.
7 8 9
On the Database Upgrade page, select Yes, I want to upgrade my Update Manager database and I have taken a backup of the existing Update Manager database, and click Next. Click Install to begin the upgrade. Click Finish.
ESX 3i or later, and ESX 3.5 or later All Update Manager supported versions of Windows virtual machines All Update Manager supported versions of Linux virtual machines (only patch metadata, but not patch binaries)
You can also set up UMDS to download ESX/ESXi 4.0.x and ESX/ESXi 4.1 patches and notifications from thirdparty portals. To use UMDS, the machine on which you install it must have Internet access. After you download the patch binaries, patch metadata, and notifications, you can copy them to a local Web server or a portable storage device, such as a CD or USB flash drive. The best practice is to create a script to download the patches manually and set it up as a Windows Scheduled Task that downloads the patches automatically.
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager. The default location in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
62
VMware, Inc.
Chapter 10 Installing, Setting Up, and Using Update Manager Download Service
To set up a download of all ESX/ESXi host updates, run the following command:
vmware-umds --set-config --enable-host 1 --enable-win 0 --enable-lin 0
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager. The default location in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
In this example, your_new_patchstore_folder is the path to the new folder to which you want to download the patch binaries and patch metadata. You successfully changed the directory in which UMDS stores patch data. What to do next Download patch binaries, patch metadata, and notifications using UMDS.
VMware, Inc.
63
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager. The default path in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
Add the third-party URL address between the <HostConfig> and </HostConfig> tags. For example, add the following URL address:
<HostConfig> <ESXThirdPartyUpdateUrl id=url2>http://third_party_URL/index.xml</ESXThirdPartyUpdateUrl> </HostConfig>
NOTE You can add a third-party URL address only for ESX/ESXi 4.0.x and ESX/ESXi 4.1 hosts. You can add multiple third-party URL addresses by adding multiple third-party elements of the type <ESXThirdPartyUpdateUrl id=url2> with different id attribute values. For example,
<HostConfig> <ESXThirdPartyUpdateUrl id=url1>http://third_party_URL1/index.xml</ESXThirdPartyUpdateUrl> <ESXThirdPartyUpdateUrl id="url2">http://third_party_URL2/index.xml</ESXThirdPartyUpdateUrl> <ESXThirdPartyUpdateUrl id="url3">http://third_party_URL3/index.xml</ESXThirdPartyUpdateUrl> </HostConfig>
UMDS is configured to download ESX/ESXi patches and notifications from third-party URL addresses. What to do next Download the patches and notifications using UMDS.
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager. The default location in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
64
VMware, Inc.
Chapter 10 Installing, Setting Up, and Using Update Manager Download Service
This command downloads all the patches and notifications from the configured sources for the first time. Subsequently, it downloads all new patches and notifications released after the previous UMDS download. 4 (Optional) If you have already downloaded patches and notifications and want to download them again, include the start and end times to restrict the patches and notifications to download. The command to re-download patches and notifications deletes the existing data from the patch store (if present) and re-downloads it. To re-download the patches and notifications that were downloaded in May 2009, for example, run the following command:
vmware-umds --re-download --start-time 2009-05-01T00:00:00 --end-time 2009-05-31T23:59:59
The data previously downloaded for the specified period is deleted and downloaded again. What to do next Export the downloaded patches and notifications.
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager. The default location in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
In the command, you must specify the full path of the export directory. If you are working in a semi-air-gap deployment, repository_path can be the path to the folder on the Web server that serves as a shared repository. If Update Manager is installed in an air-gap deployment, repository_path can be the path to a portable media drive. Export the downloads to the portable media drive to physically transfer the patches to the machine on which Update Manager is installed. The data you downloaded by using UMDS is exported to the path you specify. Make sure that all files are exported. You can periodically perform export from UMDS and populate the shared repository so that Update Manager can use the new patch binaries and patch metadata. 4 (Optional) You can export the patches that you downloaded during a specified time window. For example, to export the patches downloaded in May 2009, run the following command:
vmware-umds -E --export-store repository-path --start-time 2009-05-01T00:00:00 --end-time 2009-05-31T23:59:59
VMware, Inc.
65
What to do next Configure Update Manager to use a shared repository as a patch download source. For more information, see Use a Shared Repository as a Patch Download Source, on page 72.
66
VMware, Inc.
11
Update Manager runs with the default configuration properties if you have not modified them during the installation. You can modify the Update Manager settings later from the Update Manager Administration view. You can modify the Update Manager settings only if you have the privileges to configure the Update Manager settings and service. These permissions must be assigned on the vCenter Server system with which Update Manager is registered. For more information about managing users, groups, roles and permissions, see the vSphere Datacenter Administration Guide. For a list of Update Manager privileges and their descriptions, see Update Manager Privileges, on page 82. If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you have installed and registered more than one Update Manager instance, you can configure the settings for each Update Manager instance. Configuration properties you modify are applied only to the Update Manager instance you specify and are not propagated to the other instances in the group. You can specify an Update Manager instance by selecting the name of the vCenter Server system with which the Update Manager instance is registered from the navigation bar. This chapter includes the following topics:
n n n n n n n n n n n n n n
Update Manager Network Connectivity Settings, on page 68 Configure Update Manager Network Connectivity Settings, on page 69 Configuring Update Manager Patch Download Sources, on page 69 Configure Update Manager Proxy Settings, on page 74 Configure Checking for Patches, on page 74 Configuring Notification Checks and Viewing Notifications, on page 75 Take Snapshots Before Remediation, on page 77 Configuring Host and Cluster Settings, on page 77 Configure Smart Rebooting, on page 80 Configure Update Manager Patch Repository Location, on page 80 Configure Mail Sender Settings, on page 81 Restart the Update Manager Service, on page 81 Run the VMware vCenter Update Manager Update Download Task, on page 81 Update Manager Privileges, on page 82
VMware, Inc.
67
Update Manager connects to vCenter Server on port 80. ESX/ESXi hosts connect to the Update Manager Web server listening on HTTP port 9084 for host patch downloads. Update Manager connects to ESX/ESXi hosts on port 902 for pushing the virtual machine patches and host upgrade files. The Update Manager Client plug-in connects to the Update Manager SOAP server listening on port 8084. It also connects to the Update Manager Web server on HTTP (SSL) port 9087 for uploading the host upgrade files.
The Update Manager network settings include the IP address or DNS name that the update utility on hosts uses to retrieve the patch metadata and binaries from the Update Manager server (through HTTP). The IP is configured during installation, but you can change it later from the IP address or host name for the patch store drop-down menu on the Network Connectivity page of the Configuration tab. IMPORTANT Use an IP address whenever possible to avoid any potential DNS resolution problems. If you must use a DNS name instead of an IP address, ensure that the DNS name you specify can be resolved from all hosts managed by Update Manager. Update Manager 4.0 and later supports Internet Protocol version 6 (IPv6) environment for scanning and remediating ESX/ESXi 4.0.x hosts. For virtual machine scanning and remediation, IPv6 is not supported. If you have ESX 3.x hosts in your inventory and Update Manager is installed on a computer with IPv6, the scan and remediation operations on the hosts fail, because the hosts cannot connect to the Update Manager server. You should install Update Manager on a computer with IPv4 enabled to scan and remediate ESX 3.x hosts. vCenter Server, Update Manager, and your ESX/ESXi hosts might exist in a heterogeneous IPv6 and IPv4 network environment. In such an environment, if there is no dual stack IPv4 and IPv6 DNS server, and if you use IP addresses, the ESX/ESXi hosts configured to use only IPv4 address cannot access the IPv6 network resources. The hosts configured to use only IPv6 cannot access the IPv4 network resources either. You can install Update Manager on a machine on which both IPv4 and IPv6 are enabled. During host operations such as scanning, staging, and remediation, Update Manager provides the address of its patch store location to the ESX/ESXi hosts. If Update Manager is configured to use an IP address, it provides an IP address of either IPv4 or IPv6 type, and can be accessed by only some of the hosts. For example, if Update Manager provides an IPv4 address, the hosts that use only an IPv6 address cannot access the Update Manager patch store. In such a case consider the following configuration:
n
For hosts that use only IPv4, configure Update Manager to use either an IPv4 address or host name. Using a host name lets all hosts rely on the DNS server to resolve to an IPv4 address. For hosts that use only IPv6, configure Update Manager to use either an IPv6 address or host name. Using a host name lets hosts rely on the DNS server to resolve to an IPv6 address. For hosts that use both IPv4 and IPv6 addresses, configure Update Manager to use either IPv4 or IPv6.
68
VMware, Inc.
Before changing the network connectivity settings, check for conflicts with other port settings. If any remediation or scan tasks are running, cancel them or wait until they complete. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, specify the Update Manager instance to configure, by selecting the name of the corresponding vCenter Server system in the navigation bar.
To obtain metadata for the patches, Update Manager must be able to connect to https://www.vmware.com and https://xml.shavlik.com, and requires outbound ports 80 and 443.
Procedure 1 2 On the Configuration tab, under Settings, click Network Connectivity. Edit the network port settings.
Option SOAP port Description Update Manager Client uses this port to communicate with the Update Manager server. There are no limitations to the range of ports used, as long as there are no conflicts. Listening port for the Web server that provides access to the plug-in client installer, and provides access to the patch depot for ESX/ESXi hosts. Update Manager automatically opens ESX/ESXi firewall ports in this range to allow outbound HTTP traffic to the patch store. The IP address or name of the host in which patches are downloaded and stored.
Click Apply.
What to do next Restart the Update Manager service for network changes to take effect.
Patches are cryptographically signed with the VMware private keys. Before you try to install a patch on a host, the host verifies the signature. This signature enforces the end-to-end protection of the patch itself, and can also address any concerns about patch download.
VMware, Inc.
69
Update Manager downloads patch metadata and patch binaries over SSL connections. Update Manager downloads patch metadata and patch binaries only after verification of both the validity of the SSL certificates and the common name in the certificates. The common name in the certificates must match the names of the servers from which Update Manager downloads patches.
If your deployment system is not connected to the Internet, you can use a shared repository after downloading the patches and extensions by using the UMDS. For more information, see Chapter 10, Installing, Setting Up, and Using Update Manager Download Service, on page 59. Changing the patch download source from a shared repository to Internet, and the reverse, is a change in the Update Manager configuration. Both options are mutually exclusive. You cannot download patches and extensions from the Internet and a shared repository at the same time. To download new data, you must run the VMware vCenter Update Manager Download task. You can start the task by clicking the Download Now button at the bottom of the Patch Download Sources pane. If the VMware vCenter Update Manager Update Download task is running when you apply the new configuration settings, the task continues to use the old settings until it completes. The next time the task to download updates starts, it uses the new settings. With Update Manager 4.1, you can import both VMware and third-party patches or extensions manually from a ZIP file, also called an offline bundle. You download these patches or extensions from the Internet or copy them from a media drive, and save them as offline bundle ZIP files on a local or a shared network drive. You can import the patches or extensions to the Update Manager patch repository later. IMPORTANT You can import offline bundles only for hosts that are running ESX/ESXi 4.0 or later. Offline bundles contain one metadata.zip file and one or more vSphere Installation Bundle (VIB) files. When you import an offline bundle to the Update Manager patch repository, Update Manager extracts it and checks whether the metadata.zip file has already been imported. If the metadata.zip file has never been imported, Update Manager performs sanity testing, and imports the files successfully. After you confirm the import, Update Manager saves the files into the Update Manager database and copies the metadata.zip and VIB files into the Update Manager patch repository.
n
Configure Update Manager to Use the Internet as a Patch Download Source on page 71 If your deployment system is connected to the Internet, you can directly download Windows, Linux, and VMware ESX/ESXi patches.
Add a Third-Party Download URL Source for ESX/ESXi Hosts on page 71 If you use the Internet as a download source for patches, you can add a third-party URL address to download ESX/ESXi 4.0.x and ESX/ESXi 4.1 host patches and extensions.
Use a Shared Repository as a Patch Download Source on page 72 You can configure Update Manager to use a shared repository as a source for downloading patches and notifications.
Import Patches Manually on page 73 Instead of using a shared repository or the Internet as a patch download source, you can import patches and extensions manually by using an offline bundle. You can import offline bundles only for hosts that are running ESX/ESXi 4.0 or later.
70
VMware, Inc.
Update Manager supports both HTTP and HTTPS URL addresses. You should enter HTTPS URL addresses, so that the patch metadata is downloaded securely. Patch URL addresses must be complete and contain the index.xml file which lists the vendor and the vendor index. NOTE The proxy settings for Update Manager are applicable to third-party patch URL addresses too. You can configure the proxy settings from the Proxy Settings pane. 5 (Optional) Enter a URL description.
VMware, Inc.
71
6 7 8 9
Click Validate URL to verify that the URL is accessible. Click OK. Click Apply. Click Download Now to run the VMware vCenter Update Manager Update Download task and to download the patches and extensions immediately.
72
VMware, Inc.
5 6
Click Apply. Click Download Now to run the VMware vCenter Update Manager Update Download task and to download the patches and notifications immediately.
The shared repository is used as a source for downloading patches and notifications.
When you use a folder as a shared repository, repository_path is the top-level directory where patches and notifications exported from UMDS are stored. For example, export the patches and notifications using UMDS to F:\, which is a drive mapped to a plugged-in USB device on the machine on which UMDS is installed. Then, plug in the USB device to the machine on which Update Manager is installed. On this machine the device is mapped as E:\. The folder to configure as a shared repository in the Update Manager is E:\.
When you use a Web server as a shared repository, repository_path is the top-level directory on the Web server where patches exported from UMDS are stored. For example, export the patches and notifications from UMDS to C:\docroot\exportdata. If the folder is configured in a Web server and is accessible from other machines at the URL https://umds_host_name/exportdata, the URL to configure as a shared repository in Update Manager is https://umds_host_name/exportdata.
VMware, Inc.
73
Click Finish.
You imported the patches into the Update Manager patch repository. You can view the imported patches on the Update Manager Patch Repository tab.
74
VMware, Inc.
Click Edit Patch Downloads on the upper-right. The Schedule Update Download wizard appears.
4 5 6
Specify a task name and, optionally, a description, or keep the defaults. Specify the Frequency, Start Time , Interval of the patch download, and click Next. (Optional) Specify one or more email addresses to be notified when the new patches are downloaded, and click Next. You must configure mail settings for the vCenter Server system to enable this option.
VMware, Inc.
75
Prerequisites To configure notification checks, make sure that the machine on which Update Manager is installed has Internet access. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, you must specify the Update Manager instance to use, by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure 1 2 On the Configuration tab under Settings click Notification Check Schedule. Make sure that the State check box is selected. NOTE If you deselect the check box, the scheduled task that checks for notifications is disabled. 3 Click Edit Notifications on the upper right. The Schedule Notification wizard appears. 4 5 6 Specify a task name and, optionally, a description, or keep the defaults. Specify the Frequency, Start Time, and Interval of the task, and click Next. (Optional) Specify one or more email addresses where notifications about patch recalls or email alerts are sent, and click Next. You must configure mail settings for the vCenter Server system to enable this option. 7 Review the Ready to Complete page and click Finish.
76
VMware, Inc.
Keeping snapshots indefinitely might consume a large amount of disk space and degrade virtual machine performance. Keeping no snapshots saves space, ensures best virtual machine performance, and might reduce the amount of time it takes to complete remediation, but limits the availability of a rollback. Keeping snapshots for a set period of time uses less disk space and offers a backup for a short time.
Prerequisites Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, you must specify the Update Manager instance to use, by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure 1 2 3 4 On the Configuration tab, under Settings, select Virtual Machine Settings. To take snapshots of the virtual machines before remediating them, leave Snapshot the virtual machines before remediation to enable rollback selected. Configure snapshots to be kept indefinitely or for a fixed period of time. Click Apply.
These settings become the default rollback option settings for virtual machines. You can specify different settings when you configure individual remediation tasks.
VMware, Inc.
77
If VMware DPM has already put hosts in standby mode, Update Manager powers on the hosts before scanning, staging, and remediation. After the scanning, staging, or remediation is complete, Update Manager turns on VMware DPM and HA admission control and lets DPM put hosts into standby mode, if needed. Update Manager does not remediate powered off hosts. If hosts are put into standby mode and VMware DPM is manually disabled for a reason, Update Manager does not remediate the hosts. Within a cluster, you should disable HA admission control to allow vMotion to proceed, so that there is no downtime of the machines on the hosts you remediate. After the remediation of the entire cluster, Update Manager restores HA admission control settings. If FT is turned on for any of the virtual machines on hosts within a cluster, you should temporarily turn off FT before performing any Update Manager operations on the cluster. If FT is turned on for any of the virtual machines on a host, Update Manager does not remediate that host. You should remediate all hosts in a cluster with the same updates, so that FT can be re-enabled after the remediation, because a primary virtual machine and a secondary virtual machine cannot reside on hosts of different ESX/ESXi version and patch level.
Configure How Update Manager Responds to Failure to Put Hosts in Maintenance Mode
ESX/ESXi host patches might require that the host enters maintenance mode before they can be applied. Update Manager puts the ESX/ESXi hosts in maintenance mode before applying these patches. You can configure how Update Manager responds if the host fails to enter into maintenance mode. For hosts in a container different from a cluster or for individual hosts, migration of the virtual machines with vMotion cannot be performed. If vCenter Server cannot migrate the virtual machines to another host, you can configure how Update Manager responds. Prerequisites Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, you must specify the Update Manager instance to use, by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure 1 2 On the Configuration tab, under Settings, click ESX Host/Cluster Settings. Under Maintenance Mode Settings, select an option from the Failure response drop-down menu to determine how Update Manager responds if a host cannot be put in maintenance mode.
Option Fail Task Retry Description Log this failure in the Update Manager logs and take no further action. Wait for the retry delay period and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. If Update Manager cannot put a host into maintenance mode, you can take an action to make sure that the operation succeeds next time when Update Manager tries to put the host into maintenance mode. For example, you can manually power off the virtual machines or migrate them to another host using vMotion to ensure that entering maintenance mode is successful next time. Power off all virtual machines and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. Virtual machines are shut down as though their power off button is used. Suspend all running virtual machines and retry putting the host into maintenance mode as many times as indicated in Number of retries field.
Power Off virtual machines and Retry Suspend virtual machines and Retry
78
VMware, Inc.
(Optional) Select Temporarily disable any removable media devices that might prevent a host from entering maintenance mode. Update Manager does not remediate hosts on which virtual machines are with connected CD/DVD or floppy drives. All removable media drives that are connected to the virtual machines on a host, might prevent the host from entering maintenance mode and interrupt remediation.
Click Apply.
These settings become the default failure response settings. You can specify different settings when you configure individual remediation tasks.
Click Apply.
These settings become the default failure response settings. You can specify different settings when you configure individual remediation tasks.
VMware, Inc.
79
Navigate to the Update Manager installation directory and locate the vci-integrity.xml file. The default location is C:\Program Files (x86)\VMware\Infrastructure\Update Manager.
4 5
Create a backup copy of this file in case you need to revert to the previous configuration. Edit the file by changing the following fields:
<patchStore>your_new_location</patchStore>
The default patch download location is The directory path must end with \. 6 7 8
Save the file in UTF-8 format, replacing the existing file. Copy the contents from the old patchstore directory to the new folder. Start the Update Manager service by right-clicking VMware Update Manager Service in the Computer Management window and selecting Start.
80
VMware, Inc.
You can see the running task listed in the Recent Tasks pane.
VMware, Inc.
81
Scan for Applicable Patches, Extensions, and Upgrades Stage Patches and Extensions
For more information about managing users, groups, roles, and permissions, see the vSphere Datacenter Administration Guide.
82
VMware, Inc.
12
Baselines might be upgrade, extension, or patch baselines. Baselines contain a collection of one or more patches, service packs, bug fixes, extensions, or upgrades. Baseline groups are assembled from existing baselines and might contain one upgrade baseline per type and one or more patch and extension baselines, or a combination of multiple patch and extension baselines. When you scan hosts, virtual machines, and virtual appliances, you evaluate them against baselines and baseline groups to determine their level of compliance. To create, edit, or delete baselines and baseline groups, you must have the Manage Baseline privilege. To attach baselines and baseline groups, you must have the Attach Baseline privilege. Privileges must be assigned on the vCenter Server system with which Update Manager is registered. For more information about managing users, groups, roles, and permissions, see vSphere Datacenter Administration Guide. For a list of Update Manager privileges and their descriptions, see Update Manager Privileges, on page 82. Update Manager includes four default dynamic patch baselines and four upgrade baselines. You cannot edit or delete default baselines. Critical VM Patches Non-Critical VM Patches Critical Host Patches Non-Critical Host Patches VMware Tools Upgrade to Match Host VM Hardware Upgrade to Match Host VA Upgrade to Latest VA Upgrade to Latest Critical Checks virtual machines for compliance with all important Linux patches and all critical Windows patches. Checks virtual machines for compliance with all optional Linux patches and Windows patches. Checks ESX/ESXi hosts for compliance with all critical patches. Checks ESX/ESXi hosts for compliance with all optional patches. Checks virtual machines for compliance with the latest VMware Tools version on the host. Update Manager supports upgrading of VMware Tools for virtual machines on hosts that are running ESX/ESXi 4.0 and later. Checks the virtual hardware of a virtual machine for compliance with the latest version supported by the host. Update Manager supports upgrading to virtual hardware version 7.0 on hosts that are running ESX/ESXi 4.0 and later. Checks virtual appliance compliance with the latest released virtual appliance version. Checks virtual appliance compliance with the latest critical virtual appliance version.
In the vSphere Client, default baselines are displayed on the Baselines and Groups tab of the Update Manager Client Administration view.
VMware, Inc.
83
If your vCenter Server system is part of a connected group in vCenter Linked Mode and you have an Update Manager instance for each vCenter Server system in the group, the baselines and baseline groups you create and manage are applicable only to the inventory object managed by the vCenter Server system with which the selected Update Manager instance is registered. You can use an Update Manager instance only with a vCenter Server system on which the instance is registered. This chapter includes the following topics:
n n n n n
Creating and Managing Baselines, on page 84 Creating and Managing Baseline Groups, on page 94 Attach Baselines and Baseline Groups to Objects, on page 98 Filter the Baselines and Baseline Groups Attached to an Object, on page 99 Detach Baselines and Baseline Groups from Objects, on page 99
84
VMware, Inc.
3 4 5 6 7
Select Fixed for the type of baseline and click Next. Select individual patches to include, and click the down arrow to add them to the Fixed Patches to Add list. (Optional) Click Advanced to find specific patches to include in the baseline. Click Next. Review the Ready to Complete page and click Finish.
The fixed patch baseline is displayed in the Baselines pane of the Baselines and Groups tab.
The relationship between these fields is defined by the Boolean operator AND. For example, when you select a product and severity option, the patches are restricted to the patches for the selected product and are of the specified severity level. 5 6 7 8 (Optional) On the Patches to Exclude page, select one or more patches in the list and click the down arrow to permanently exclude them from the baseline. (Optional) Click Advanced to select specific patches to exclude from the baseline. Click Next. (Optional) On the Other Patches to Add page, select individual patches to include in the baseline and click the down arrow to move them into the Fixed Patches to Add list. The patches you add to the dynamic baseline stay in the baseline regardless of the new downloaded patches.
VMware, Inc.
85
9 10 11
(Optional) Click Advanced to select specific patches to include in the baseline. Click Next. Review the Ready to Complete page and click Finish.
The dynamic patch baseline is displayed in the Baselines pane of the Baselines and Groups tab.
The extension baseline is displayed in the Baselines pane of the Baselines and Groups tab.
86
VMware, Inc.
If you are creating a fixed patch baseline, on the Patches page of the New Baseline wizard, click Advanced. If you are creating a dynamic patch baseline, on the Patches to Exclude or Additional patches page of the New Baseline wizard, click Advanced. If you are creating a host extension baseline, on Extensions page of the New Baseline wizard, click Advanced.
On the Filter Patches or Filter Extensions page, enter the criteria to define the patches or extensions to include or exclude.
Option Patch Vendor Product Description Specifies which patch or extension vendor to use. Restricts the set of patches or extensions to the selected products or operating systems. The asterisk at the end of a product name is a wildcard character for any version number. Specifies the severity of patches or extensions to include. Specifies the range for the release dates of the patches or extensions. Restricts the patches or extensions to those containing the text that you enter.
The relationship between these fields is defined by the Boolean operator AND. 3 Click Find.
The patches or extensions in the New Baseline wizard are filtered with the criteria that you entered.
VMware, Inc.
87
4 5
Go through the Edit Baseline wizard to change the criteria, patches to include or exclude. Click Finish on the Ready to Complete page, to save your changes.
88
VMware, Inc.
A host upgrade release is a combination of host upgrade files that allow you to upgrade hosts to a particular release version. Depending on the files that you upload, host upgrade releases can be partial or complete. Partial upgrade release Partial upgrade releases are host upgrade releases that do not contain all of the upgrade files required for an upgrade of both the ESX and ESXi hosts in your environment to a specific version. For example, a partial release is when you upload only an ISO file to upgrade the ESX 3.x hosts in your environment to version 4.1, but you do not upload the ZIP files required for upgrading the hosts of versions ESXi 3.x and ESX/ESXi 4.0.x to version 4.1. Complete upgrade release Complete upgrade releases are host upgrade releases that contain all of the upgrade files required for an upgrade of both the ESX and ESXi host in your environment to a specific version. For example, to upgrade all the ESX/ESXi hosts in your vSphere environment to version 4.1, you must upload all of the files required for this upgrade (three ZIP files and one ISO file):
n n esx-DVD-4.1.0-build_number.iso for ESX 3.x hosts upgrade-from-ESXi3.5-to-4.1.0-0.0.build_number-release.zip for
4.0.x hosts
n upgrade-from-ESXi4.0-to-4.1.0-0.0.build_number-release.zip for
ESXi 4.0.x hosts Here build_number is the build number of the upgrade release. If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you have more than one Update Manager instance, host upgrade files that you upload and baselines that you create are not applicable to the hosts managed by other vCenter Server systems in the group. Upgrade files and baselines are specific for the Update Manager instance you select.
VMware, Inc.
89
Procedure 1 On the Host Upgrade Releases tab click Import Upgrade Release on the upper-right. The Import Upgrade Release wizard appears. 2 On the Select Upgrade Files page of the Import Upgrade Release wizard, browse to and locate the upgrade release files that you want to upload. NOTE You can select to upload multiple files at the same time, but some files are large and might take significant time to upload. 3 Click Next. The upload process starts. CAUTION Do not close the Import wizard. Closing the Import wizard stops the upload process. 4 (Optional) In the Security Warning window select the method you want the system to use to ignore the warning. A trusted certificate authority does not sign the certificates that are generated for vCenter Server and ESX/ESXi hosts during installation. Because of this, each time an SSL connection is made to one of these systems, the client displays a warning.
Option Ignore Cancel Install this certificate and do not display any security warnings Description Click Ignore to continue using the current SSL certificate. Click Cancel to close the window. Clicking Cancel might cause a failure in the upload because the connection with the vCenter Server is untrusted. Select this check box and click Ignore to install the certificate and stop receiving security warnings.
The uploaded host upgrade release files appear in the Imported Upgrade Releases pane as an upgrade release. What to do next Create host upgrade baselines with the upgrade files that you uploaded.
90
VMware, Inc.
Procedure 1 On the Baselines and Groups tab, click Create above the Baselines pane. The New Baseline wizard opens. 2 3 Under Baseline Type, select Host Upgrade and click Next. On the Upgrade Version page, select a host upgrade release and click Next. The Upgrade Release Details pane of the page displays additional information about the selected upgrade release. 4 On the ESX Upgrade - COS VMDK Location page, specify the location of the VMDK (virtual disk) to which to migrate the COS (console operating system) of the ESX host and then click Next.
Option (Recommended) Automatically select a datastore on the local host. The operation fails if there is no local datastore with sufficient free space. Select a datastore that is accessible to this host only and is not shared with other hosts. The operation fails if the datastore is not connected to the host or does not have sufficient free space. Description Selects a datastore attached directly to the host. Because the host requires the COS to boot, it must reside in a location that does not depend on the network so that you can reboot if the network goes down. Allows you to select the local or network datastore and to browse for the folder in which to place the COS VMDK. If Update Manager cannot access the datastore, the upgrade fails.
Supported datastore types are SCSI, SAS, SAN, hardware iSCSI, drivers fronted by a RAID controller, IDE, and SATA. 5 6 To not roll back the host, on the ESX Upgrade - Post-Upgrade Options page, deselect Try to reboot the host and roll back the upgrade in case of failure. (Optional) On the ESX Upgrade - Post-Upgrade Options page, specify whether to use a post-upgrade script to run after the upgrade completes, and when the post-upgrade script times out. You can browse to locate a Bash (.sh) or Python (.py) post-upgrade script on your system. You can use post-upgrade scripts to automate the configuration of ESX hosts after the upgrade. 7 8 Click Next. Review the Ready to Complete page and click Finish.
The host upgrade baseline is displayed in the Baselines pane of the Baselines and Groups tab.
VMware, Inc.
91
2 3 4
Select an existing host upgrade baseline and click Edit above the Baselines pane. Edit the name and description of the baseline, and click Next. Make your changes by going through the Edit Baseline wizard.
Option Upgrade Version COS VMDK Location Description Change the upgrade version and click Next. Edit the specified location of the VMDK to which to migrate the COS of the ESX host. This is applicable only when you upgrade ESX hosts from version 3.x to versions 4.0.x and 4.1. Click to edit the settings to reboot the host in case of failure and the postupgrade usage settings. This is applicable only when you upgrade ESX hosts from version 3.x to versions 4.0.x and 4.1.
Post-Upgrade Options
The upgrade release is deleted and no longer available under Imported Upgrade Releases.
92
VMware, Inc.
5 6
Click Add Rule. (Optional) Add multiple rules. a b c d On the Upgrade Options page of the New Baseline wizard, click Add Multiple Rules. Select one or more vendors. Select one or more appliances. Select one Upgrade To option to apply to the selected appliances, and click OK.
If you create multiple rules to apply to the same virtual appliance, only the first applicable rule in the list is applied. 7 (Optional) Resolve any conflicts within the rules you apply. a b 8 9 In the Upgrade Rule Conflict window select whether to keep the existing rules, to use the newly created rules, or to manually resolve the conflict. Click OK.
Click Next. Review the Ready to Complete page and click Finish.
The virtual appliance upgrade baseline is displayed in the Baselines pane of the Baselines and Groups tab.
VMware, Inc.
93
Delete Baselines
You can delete baselines that you no longer need from Update Manager. Deleting a baseline detaches it from all the objects to which the baseline is attached. You can delete baselines from the Update Manager Client Administration view. Prerequisites Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, you must specify the Update Manager instance to use, by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure 1 2 In the Baselines pane of the Baselines and Groups tab, select the baselines to remove, and click Delete. In the confirmation dialog box, click Yes.
You can create baseline groups by using the New Baseline Group wizard. When creating a baseline group, use the following guidelines:
n
You can include all patch and extension baselines in one baseline group.
94
VMware, Inc.
You can have only one upgrade baseline per upgrade type (VMware Tools, virtual machine hardware, virtual appliance, or host) in a baseline group.
For example, you cannot have two different ESX host upgrade baselines or two different virtual appliance upgrade baselines. You can create two types of baseline groups depending on the object type to which you want to apply them:
n n
Baseline groups for hosts Baseline groups for virtual machines and virtual appliances
Baseline groups that you create are displayed on the Baselines and Groups tab of the Update Manager Client Administration view. If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you have more than one Update Manager instance, baseline groups you create are not applicable to all inventory objects managed by other vCenter Server systems in the group. Baseline groups are specific for the Update Manager instance that you select.
VMware, Inc.
95
96
VMware, Inc.
Procedure 1 2 3 4 5 6 7 On the Baselines and Groups tab select the type of baseline group to edit by clicking either Hosts or VMs/VAs. Select a baseline group from the Baseline Groups pane and click Edit above the pane. Edit the name of the baseline group. Change the included upgrade baselines (if any). Change the included patch baselines (if any). Change the included extension baselines (if any). Review the Ready to Complete page and click OK.
VMware, Inc.
97
Select a baseline from the Baseline Groups pane on the right and click the left arrow.
98
VMware, Inc.
In the Attach Baseline or Group window, select one or more baselines or baseline groups to attach to the object. If you select one or more baseline groups, all baselines in the groups are selected. You cannot deselect individual baselines in a group.
6 7
(Optional) Click the Create Baseline Group or Create Baseline links to create a baseline group or a baseline and finish the respective wizard. Click Attach.
The baselines and baseline groups that you selected to attach are displayed in the Attached Baseline Groups and Attached Baselines panes of the Update Manager tab.
The baselines and baseline groups containing the text that you entered are listed in the respective panes. If the inventory object you select is a container object, the virtual machines, appliances, or hosts in the bottom pane of the Update Manager tab are also filtered.
VMware, Inc.
99
Select the type of object that you want to detach the baseline or group from. For example, Hosts and Clusters or VMs and Templates.
Select the object in the inventory, and click the Update Manager tab. If your vCenter Server system is part of a connected group in vCenter Linked Mode, the Update Manager tab is available only for the vCenter Server systems with which an Update Manager instance is registered.
4 5
Right-click the baseline or baseline group to remove and select Detach Baseline or Detach Baseline Group. Select the inventory objects from which you want to detach the baseline or baseline group and click Detach. The baseline or baseline group you detach remains in the Compliance view until you detach it from all objects.
The baseline or baseline group that you detach is no longer listed in the Attached Baselines or Attached Baseline Groups pane.
100
VMware, Inc.
13
Scanning is the process in which attributes of a set of hosts, virtual machines, or virtual appliances are evaluated against all patches, extensions, and upgrades in the attached baselines and baseline groups depending on the type of scan. To generate compliance information and view scan results, you must attach baselines and baseline groups to the objects you scan. You can configure Update Manager to scan virtual machines, virtual appliances, and ESX/ESXi hosts by manually initiating or scheduling scans to generate compliance information. To initiate or schedule scans, you need the Scan for Applicable Patches, Extensions, and Upgrades privilege. For more information about managing users, groups, roles, and permissions, see vSphere Datacenter Administration Guide. For a list of Update Manager privileges and their descriptions, see Update Manager Privileges, on page 82. You can scan vSphere objects from the Update Manager Client Compliance view. Update Manager 4.1 does not support scanning of offline Linux virtual machines for patches. IMPORTANT Update Manager does not scan PXE booted ESXi hosts. A PXE booted installation of ESXi is completely stateless (it does not rely on the presence of a local disk). Therefore, the installation and post-install configuration are not persistent across reboot. This chapter includes the following topics:
n n n n
Manually Initiate a Scan of ESX/ESXi Hosts, on page 101 Manually Initiate a Scan of Virtual Machines and Virtual Appliances, on page 102 Schedule a Scan, on page 102 Viewing Scan Results and Compliance States for vSphere Objects, on page 103
VMware, Inc.
101
Select the types of updates to scan for. You can scan for either Patches and Extensions or Upgrades.
Click Scan.
The selected inventory object is scanned against all patches and extensions in the Update Manager repository and available upgrades, depending on the option that you selected.
The virtual machines and appliances that you select are scanned against all patches in the Update Manager patch repository and available upgrades, depending on the options that you select.
Schedule a Scan
You can configure the vSphere Client to run scans of objects in the inventory at specific times or at intervals that are convenient for you. Procedure 1 Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Management > Scheduled Tasks in the navigation bar. If your vCenter Server system is part of a connected group in vCenter Linked Mode, specify the Update Manager instance that you want to use to schedule a scan task by selecting the name of the corresponding vCenter Server system in the navigation bar. 2 3 4 Click New in the toolbar to open the Schedule Task dialog box. Select Scan for Updates and click OK. Select the type of vSphere infrastructure object to scan, and click Next. You can select to scan virtual machines and virtual appliances, or ESX/ESXi hosts.
102
VMware, Inc.
In the inventory tree, select the inventory object to be scanned and click Next. All child objects of the object that you select are also scanned.
6 7 8 9
Select the types of updates to scan for and click Next. Enter a unique name, and optionally, a description for the scan. Set the frequency and the start time for the task and click Next. (Optional) Specify one or more email addresses to send the results to and click Next. You must configure mail settings for the vCenter Server system to enable this option.
10
The scan task is listed in the Scheduled Tasks view of the vSphere Client.
Compliance with baselines and baseline groups is assessed at the time of viewing, so a brief pause might occur while information is gathered to make sure that all information is current. Objects must have an attached baseline or baseline group to be examined for compliance information. Only relevant compliance information is provided. For example, if a container has Windows XP and Windows Vista virtual machines, and patch baselines for Windows XP and Windows Vista patches are attached to this container, the relevant baselines are applied to each type of machine. Windows Vista virtual machines are assessed for compliance with Windows Vista baselines and the results are displayed. The same Windows Vista virtual machines are not assessed for compliance with Windows XP patches, and as a result, the status of their compliance is displayed as not applicable. Compliance status is displayed based on privileges. Users with the privilege to view a container, but not all the contents of the container are shown the aggregate compliance of all objects in the container. If a user does not have permission to view an object, its contents, or a particular virtual machine, the results of those scans are not displayed. To view the compliance status, the user must also have the privilege to view compliance status for an object in the inventory. Users that have privileges to remediate against patches, extensions, and upgrades and to stage patches and extensions on a particular inventory object, can view the compliance status of the same object even if they do not have the view compliance privilege. For more information about the Update Manager privileges, see Update Manager Privileges, on page 82. For more information about managing users, groups, roles and permissions, see vSphere Datacenter Administration Guide. When you scan a host against a fixed baseline that contains only patches that are made obsolete by newer ones, and the newer patches are already installed on the host, the compliance status of the old patches is not applicable. If the newer patches are not installed, the compliance status of the new patches is not compliant. You can install the noncompliant patches after you start a remediation process. When you scan a host against a fixed baseline that contains both obsolete and newer patches, the old patches are displayed as not applicable. Only the newer patches are installed after starting a remediation process.
n n
VMware, Inc.
103
In the hierarchical inventory structure of the objects in the vSphere Client, the baseline and baseline groups you attach to container objects are also attached to the child objects. Consequently, the computed compliance state is also inherited. For example, a baseline or baseline group attached to a folder is inherited by all objects in the folder (including sub-folders), but the status of inherited baselines or baseline groups propagates upwards - from the contained objects to the folder. Consider a folder that contains two objects A and B. If you attach a baseline (baseline 1) to the folder, both A and B inherit baseline 1. If the baseline state is non-compliant for A and compliant for B, the overall state of baseline 1 against the folder is non-compliant. If you attach another baseline (baseline 2) to B, and baseline 2 is in incompatible compliance state with B, the overall status of the folder is incompatible.
When the last scan was completed at this level. The total number of compliant and noncompliant patches. For each baseline or baseline group, the number of virtual machines, appliances, or hosts that are applicable, noncompliant, incompatible, unknown, or compliant. For each baseline or baseline group, the number of patches that are applicable to particular virtual machines or hosts.
Procedure 1 2 Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Inventory in the navigation bar. Select the type of object for which you want to view scan results. For example, Hosts and Clusters or VMs and Templates.
104
VMware, Inc.
3 4 5
Select an individual object from the inventory, such as a virtual machine, virtual appliance, or host. Click the Update Manager tab. Select a baseline group or baseline. Select All Groups and Independent Baselines in the Attached Baseline Groups pane and All in the Attached Baselines pane to view the overall compliance of all attached baselines and baseline groups.
In the Compliance pane, select the All Applicable compliance status to view the overall compliance status of the selected object. The selected object together with the number of patches, upgrades, and extensions (if the selected object is a host) appear in the bottom pane of the Update Manager tab.
Click the link in the Patches column in the bottom pane of the Update Manager tab. The Patch Details window appears.
Click the link in the Upgrades column in the bottom pane of the Update Manager tab. The link indicates the number of upgrades in the selected compliance state. The Upgrade Details window appears.
Click the link in the Extensions column in the bottom pane of the Update Manager tab. The link indicates the number of Extensions in the selected compliance state. The Extension Details window appears.
Compliance View
Information about the compliance states of selected vSphere inventory objects is displayed in the Update Manager Client Compliance view. The information is displayed in four panes. Table 13-1. Update Manager Tab Panes
Pane Attached Baseline Groups Description Displays the baseline groups attached to the selected object. If you select All Groups and Independent Baselines, all attached baselines in the Attached Baselines pane are displayed. If you select an individual baseline group, only the baselines in that group are displayed in the Attached Baselines pane. Displays the baselines attached to the selected object and included in the selected baseline group.
Attached Baselines
VMware, Inc.
105
Incompatible
Unknown
Compliant
Bottom pane
The information in this pane depends on whether you select an individual object or a container object. If you select a container object, the bottom pane of the Update Manager tab displays the following information: n A list of virtual machines, appliances, or hosts that meet the selections from the Attached Baseline Groups, Attached Baselines and Compliance panes. n The overall compliance of the objects against the patches, extensions, or upgrades included in the selected baselines and baseline groups. If you select an individual object (such as virtual machine, appliance, or host), the bottom pane of the Update Manager tab displays the following information: n The number of patches, extensions, or upgrades included in the baseline or baseline group that you select. n The number of staged patches or extensions to a host. n The overall compliance of the objects against the patches, extensions, or upgrades included in the selected baselines and baseline groups.
106
VMware, Inc.
Missing
Not Applicable
There are other patches in the Update Manager patch repository that obsolete this patch. The update does not apply to the target object. For example, if you attach and scan a Linux virtual machine against a baseline containing Windows patches.
Conflict
The update conflicts with either an existing update on the host or another update in the Update Manager patch repository. Update Manager reports the type of conflict. A conflict does not indicate any problem on the target object. It just means that the current baseline selection is in conflict. You can perform scan, remediation, and staging operations. In most cases, you can take action to resolve the conflict. This compliance state applies mainly to patches. The target object has a newer version of the patch. For example, if a patch has multiple versions, after you apply the latest version to the host, the earlier versions of the patch are in Obsoleted By Host compliance state. This state occurs when metadata for the update is in the depot but the corresponding binary payload is missing. The reasons can be that the product might not have an update for a given locale; the Update Manager patch repository is deleted or corrupt, and Update Manager no longer has Internet access to download updates; or you have manually deleted an upgrade package from the Update Manager repository. Installed compliance state indicates that the update is installed on the target object, and no further user action is required. This compliance state applies to host patches and host extensions. It indicates that the update is copied from the Update Manager repository to the host, but is not yet installed. Staged compliance state might occur only when you scan hosts running ESX/ESXi 4.0 and later. The update cannot be installed. The scan operation might succeed on the target object, but remediation cannot be performed. For example, missing updates on a Linux virtual machine are reported as Not Installable, because Update Manager does not support remediation of Linux virtual machines.
Obsoleted By Host
Missing Package
Installed Staged
Not Installable
VMware, Inc.
107
New Module
New module compliance state indicates that the update is a new module. An update in this compliance state cannot be installed when it is part of a host patch baseline. When it is part of a host extension baseline, the new module state signifies that the module is missing on the host and can be provisioned by remediation. The compliance state of the baseline depends on the type of baseline containing the update in new module state. If the baseline is a host patch baseline, the overall status of the baseline is compliant. If the baseline is a host extension baseline, the overall status of the baseline is not compliant. The hardware of the selected object is incompatible or has insufficient resources to support the update. For example, when you perform a host upgrade scan against a 32-bit host or if a host has insufficient RAM. The upgrade path is not possible. For example, the current hardware version of the virtual machine is greater than the highest version supported on the host. The host update is a new module that provides software for the first time, but is in conflict with either an existing update on the host or another update in the Update Manager repository. Update Manager reports the type of conflict. A conflict does not indicate any problem on the target object. It just means that the current baseline selection is in conflict. You can perform scan, remediation, and staging operations. In most cases, you must take action to resolve the conflict.
Incompatible Hardware
Compliant
Compliant state indicates that all baselines in the attached baseline group and all patches, extensions, and upgrades in the baseline are compliant. Compliant state requires no further action. If a baseline contains patches or upgrades that are not relevant to the target object, the individual updates, and baselines or baseline groups that contain them, are treated as not applicable, and represented as compliant. For example, if you attach a virtual machine patch baseline to a virtual appliance, the baseline is displayed as compliant. Compliant are also host patch baselines containing extensions or patches in Obsoleted By Host state. Compliant state of baselines, baseline groups, or the updates included in the baselines occurs under the following conditions:
n
Baselines and baseline groups are compliant when all updates in the baseline or baseline group are either installed on the target object, obsoleted by host, or are not applicable to the target object. The updates in a baseline are compliant when they are installed on the target object, or are not applicable to the object.
A baseline or baseline group can be compliant if all of the updates or baselines in the group are compliant.
Non-Compliant
Non-compliant state indicates implies that one or more baselines in a baseline group, or one or more patches, extensions, or upgrades in a baseline are applicable to the target object, but are not installed (missing) on the target. You must remediate the target object to make it compliant. When a baseline contains a non-compliant update, the overall status of the baseline is non-compliant. When a baseline group contains a non-compliant baseline, the overall status of the baseline group is non-compliant. The non-compliant state takes precedence over incompatible, unknown, and compliant states.
108
VMware, Inc.
Unknown
When you attach a baseline or a baseline group to a vSphere object, and you do not scan the object, the state of the baseline or baseline group is Unknown. This state indicates that a scan operation is required, that the scan has failed, or that you initiated a scan on an unsupported platform (for example, you performed a VMware Tools scan on a virtual machine running on an ESX 3.5 host). When a baseline contains updates in compliant and unknown states, the overall status of the baseline is unknown. When a baseline group contains unknown baselines as well as compliant baselines, the overall status of the baseline group is unknown. The unknown compliance state takes precedence over compliant state.
Incompatible
Incompatible state requires attention and further action. You must determine the reason for incompatibility by probing further. You can remediate the objects in this state, but there is no guarantee that the operation will succeed. In most cases Update Manager provides sufficient details for incompatibility. For more information about incompatible compliance state, see Incompatible Compliance State, on page 169. When a baseline contains updates in incompatible, compliant, and unknown states, the overall status of the baseline is incompatible. When a baseline group contains incompatible, unknown, and compliant baselines, the overall status of the baseline group is incompatible. The incompatible compliance state takes precedence over compliant and unknown compliance states.
VMware, Inc.
109
110
VMware, Inc.
The information represented in the Upgrade Details window for VMware Tools and virtual hardware upgrades is listed in Table 13-5. Table 13-5. VMware Tools and Virtual Machine Hardware Upgrade Details Window
Option Baseline Name Baseline Type Baseline Description Compliance State VM Tools Status Current Hardware Version Target Hardware Version Description Name of the upgrade baseline. Type of the baseline. The values can be VMware Tools upgrade or virtual machine hardware upgrade. Description of the baseline. The compliance status for the upgrade. It represents the compliance state of the selected object against the upgrade baseline. Status of VMware Tools on the machine. Hardware version of the virtual machine. Target hardware version of the virtual machine.
The information represented in the Upgrade Details window for virtual appliance upgrades is listed in Table 13-6 Table 13-6. Virtual Appliance Upgrade Details Window
Option Vendor Product Version Compliance Severity Release Date Description Vendor of the upgrade. Product installed on the virtual appliance, for example guest operating system. Target version of the product. Compliance status of the virtual appliance upgrade. Severity of the upgrade. Release date of the upgrade.
VMware, Inc.
111
112
VMware, Inc.
14
You can remediate virtual machines, virtual appliances, and hosts using either user-initiated remediation or scheduled remediation at a time that is convenient for you. You can remediate virtual machines and appliances together. If your vCenter Server is part of a connected group in vCenter Linked Mode, you can remediate only the inventory objects managed by the vCenter Server system with which Update Manager is registered. To remediate vSphere objects, you need the Remediate to Apply Patches, Extensions, and Upgrades privilege. For more information about managing users, groups, roles, and permissions, see the vSphere Datacenter Administration Guide. For a list of Update Manager privileges and their descriptions, see Update Manager Privileges, on page 82. This chapter includes the following topics:
n n n n
Orchestrated Upgrades of Hosts and Virtual Machines, on page 113 Remediating Hosts, on page 114 Remediating Virtual Machines and Virtual Appliances, on page 124 Scheduling Remediation for Hosts, Virtual Machines, and Virtual Appliances, on page 126
You can perform an orchestrated upgrade at the cluster, folder, datacenter, or individual object level. Upgrading the virtual hardware of the virtual machines exposes new devices and capabilities to the guest operating systems. You must upgrade VMware Tools before upgrading the virtual hardware version so that all required drivers are updated in the guest. Upgrading the virtual hardware of the virtual machines is impossible if VMware Tools is not installed, is out of date, or is managed by third-party vendors. When you upgrade virtual machines against a baseline group containing the VM Hardware Upgrade to Match Host baseline and the VMware Tools Upgrade to Match Host baseline, Update Manager sequences the upgrade operations in the correct order, and VMware Tools is upgraded first.
VMware, Inc.
113
During the upgrade of VMware Tools, the virtual machines must be powered on. If a virtual machine is in the powered off or suspended state before remediation, Update Manager powers it on. After the upgrade completes, Update Manager restarts the machine and restores the original power state of the virtual machine. During the virtual hardware upgrade, the virtual machines must be shut down. If a virtual machine is powered on, Update Manager powers the machine off, upgrades the virtual hardware, and then powers the virtual machine on.
Remediating Hosts
Host remediation runs in different ways depending on the types of baselines you attach and on whether the host is in a cluster or not.
114
VMware, Inc.
If a patch in a patch baseline requires the installation of another patch, Update Manager detects the prerequisite in the patch repository and installs it together with the selected patch. If a patch is in conflict with other patches that are installed on the host, the conflicting patch might not be installed or staged. However, if another patch in the baseline resolves the conflicts, the conflicting patch is installed. For example, consider a baseline that contains patch A and patch C, and patch A conflicts with patch B, which is already installed on the host. If patch C obsoletes patch B, and patch C is not in conflict with patch A, the remediation process installs patches A and C. If a patch is in conflict with the patches in the Update Manager patch repository and is not in conflict with the host, after a scan, Update Manager reports this patch as a conflicting one. You can stage and apply the patch to the host. When multiple versions of the same patch are selected, Update Manager installs the latest version and skips the earlier versions.
During patch remediation, Update Manager automatically installs the prerequisites of patches. With Update Manager 4.1, you can remediate hosts against offline bundles that you have imported manually.
VMware, Inc.
115
to install the packages into the console VMDK. The host is rebooted, upgraded to ESX 4.0.x or ESX 4.1, and reconnected to the vCenter Server system. During the upgrade, the ESX 3.x installation is moved from its own partition to a VMDK (its own virtual disk) located in the datastore. If the upgrade fails, you can roll back to the previous version. Update Manager 4.1 supports upgrades from ESX 3.0.0 and later as well as from ESX 3i version 3.5 and later to ESX/ESXi 4.0.x and 4.1. The remediation from version 4.0 to version 4.0.x is a patching operation, while the remediation from version 4.0.x to 4.1 is considered an upgrade. NOTE You cannot upgrade ESX 3.0.x hosts directly to ESX 4.1. To upgrade ESX hosts of version 3.0.x to version 4.1 you must first upgrade them to version 4.0 or 4.0.x and then upgrade to 4.1.
116
VMware, Inc.
If a patch is in conflict with the patches in the Update Manager patch repository and is not in conflict with the host, after a scan, Update Manager reports this patch as a conflicting one. You can stage the patch to the host and after the stage operation, Update Manager reports this patch as staged. During the stage operation, Update Manager performs prescan and postscan operations, and updates the compliance state of the baseline. After you stage patches or extensions to hosts, you should remediate the hosts against all staged patches or extensions. After a successful remediation of hosts, the host deletes all staged patches or extensions from its cache regardless of whether they were applied during the remediation. The compliance state of patches or extensions that were staged but not applied to the to the hosts reverts from Staged to its previous value. IMPORTANT Staging patches and extensions is supported for hosts that are running ESX/ESXi 4.0 and later. You cannot stage patches to PXE booted ESXi hosts. Prerequisites To stage patches or extensions to hosts, first attach a patch or extension baseline or a baseline group containing patches and extensions to the host. To stage patches or extensions to ESX/ESXi hosts, you need the Stage Patches and Extensions privilege. For more information about managing users, groups, roles, and permissions, see vSphere Datacenter Administration Guide. For a list of Update Manager privileges and their descriptions, see Update Manager Privileges, on page 82. Procedure 1 2 3 4 Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Inventory > Hosts and Clusters in the navigation bar. Right click a datacenter, cluster, or host, and select Stage Patches. On the Baseline Selection page of the Stage wizard, select the patch and extension baselines to stage. Select the hosts where patches and extensions will be applied and click Next. If you select to stage patches and extensions to a single host, it is selected by default. 5 6 7 8 (Optional) Deselect the patches and extensions to exclude from the stage operation. (Optional) To search within the list of patches and extensions, enter text in the text box in the upper-right corner. Click Next. Review the Ready to Complete page and click Finish.
The number of the staged patches and extensions for the specific host is displayed in the Patches and Extensions columns in the bottom pane of the Update Manager tab. After a remediation is successfully completed, all staged patches and extensions, whether installed or not during the remediation, are deleted from the host.
VMware, Inc.
117
To upgrade hosts from version 4.0 to version 4.0.x, you must use a patch baseline. Prerequisites Before remediating a host against patch or extension baselines, ensure that a baseline is attached to the host. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered. If your vCenter Server system is a part of a connected group in vCenter Linked Mode, specify the Update Manager to use by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure 1 2 On the Home page, select Hosts and Clusters, and click the Update Manager tab. Right-click the inventory object you want to remediate and select Remediate. All hosts under the selected object are also remediated. By selecting to upgrade a container object against an upgrade baseline or a baseline group containing an upgrade baseline, you perform an orchestrated upgrade of the hosts in the container object. 3 4 On the Remediation Selection page of the Remediate wizard, select the baseline group and baselines to apply. (Optional) Select the hosts that you do want to remediate and click Next. If you have chosen to remediate a single host and not a container object, the host is selected by default. 5 6 7 8 9 (Optional) On the Patches and Extensions page, deselect specific patches or extensions to exclude them from the remediation process and click Next. (Optional) On the Dynamic Patches and Extensions to Exclude page, review the list of patches or extensions to be excluded and click Next. On the Host Remediation Options page, enter a unique name, and optionally a description, for the task. Select Immediately to begin the process right after you complete the wizard, or specify a time for the remediation process to begin. Specify the failure response for the remediation process from the Failure response drop-down menu, the delay in the retry, the number of retries, if applicable, and click Next.
Option Fail Task Retry Description Log this failure in the Update Manager logs and take no further action. Wait for the retry delay period and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. If Update Manager cannot put a host into maintenance mode, you can take an action to make sure that the operation succeeds next time when Update Manager tries to put the host into maintenance mode. For example, you can manually power off the virtual machines or migrate them to another host using vMotion to ensure that entering maintenance mode is successful next time. Power off all virtual machines and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. Virtual machines are shut down as though their power off button is used. Suspend all running virtual machines and retry putting the host into maintenance mode as many times as indicated in Number of retries field.
Power Off virtual machines and Retry Suspend virtual machines and Retry
118
VMware, Inc.
10
(Optional) Configure the cluster remediation options. The Cluster Remediation Options page is available only when you remediate hosts in a cluster.
Option Disable Distributed Power Management (DPM) if it is enabled for any of the selected clusters. Details Update Manager does not remediate clusters with active DPM. DPM monitors the resource use of the running virtual machines in the cluster. If sufficient excess capacity exists, DPM recommends moving virtual machines to other hosts in the cluster and placing the original host into standby mode to conserve power. Putting hosts into standby mode might interrupt remediation. Update Manager does not remediate clusters with active HA admission control. Admission control is a policy used by VMware HA to ensure failover capacity within a cluster. If HA admission control is enabled during remediation, the virtual machines within a cluster might not migrate with vMotion. If FT is turned on for any of the virtual machines on a host, Update Manager does not remediate that host. FT requires that the hosts, on which the Primary and Secondary virtual machines run, are of the same version and have the same patches installed. If you apply different patches to these hosts, FT cannot be re-enabled.
Disable High Availability admission control if it is enabled for any of the selected clusters.
Disable Fault Tolerance (FT) if it is enabled for the VMs on the selected hosts.
11 12
(Optional) Generate a pre-remediation check report by clicking Generate Report on the Cluster Remediation Options page and click Next. Review the Ready to Complete page and click Finish.
VMware, Inc.
119
(Optional) Select the hosts that you do want to remediate and click Next. If you have chosen to remediate a single host and not a container object, the host is selected by default.
On the End User License Agreement page, accept the terms and click Next. The End User License Agreement page is applicable only when you upgrade ESX hosts from version 3.x to version 4.0.x and 4.1.
(Optional) On the ESX 4.x Upgrade page, click the links of the settings that you want to edit.
Option COS VMDK location (ESX only) Rollback on failure (ESX only) Post-Upgrade script (ESX only) Description In the ESX 4.x COS VMDK Location window, specify the datastore location for the VMDK to migrate the COS of the ESX host. In the ESX 4.x Post Upgrade Options window, specify whether to disable rollback in case of failure. In the ESX 4.x Post Upgrade Options window, specify a post-upgrade script usage after the upgrade completes and when the post-upgrade script times out.
The ESX 4.x Upgrade page options in the Remediate wizard are applicable only when you upgrade ESX hosts from version 3.x to version 4.0.x and 4.1. 7 8 9 On the Host Remediation Options page, enter a unique name, and optionally a description, for the task. Select Immediately to begin the process right after you complete the wizard, or specify a time for the remediation process to begin. Specify the failure response for the remediation process from the Failure response drop-down menu, the delay in the retry, and the number of retries, if applicable.
Option Fail Task Retry Description Log this failure in the Update Manager logs and take no further action. Wait for the retry delay period and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. If Update Manager cannot put a host into maintenance mode, you can take an action to make sure that the operation succeeds next time when Update Manager tries to put the host into maintenance mode. For example, you can manually power off the virtual machines or migrate them to another host using vMotion to ensure that entering maintenance mode is successful next time. Power off all virtual machines and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. Virtual machines are shut down as though their power off button is used. Suspend all running virtual machines and retry putting the host into maintenance mode as many times as indicated in Number of retries field.
Power Off virtual machines and Retry Suspend virtual machines and Retry
10
Disable any removable media devices connected to the virtual machines on the host, and click Next.
120
VMware, Inc.
11
(Optional) Edit the cluster remediation options. The Cluster Remediation Options page is available only when you remediate hosts in a cluster.
Option Disable Distributed Power Management (DPM) if it is enabled for any of the selected clusters. Details Update Manager does not remediate clusters with active DPM. DPM monitors the resource use of the running virtual machines in the cluster. If sufficient excess capacity exists, DPM recommends moving virtual machines to other hosts in the cluster and placing the original host into standby mode to conserve power. Putting hosts into standby mode might interrupt remediation. Update Manager does not remediate clusters with active HA admission control. Admission control is a policy used by VMware HA to ensure failover capacity within a cluster. If HA admission control is enabled during remediation, the virtual machines within a cluster might not migrate with vMotion. If FT is turned on for any of the virtual machines on a host, Update Manager does not remediate that host. FT requires that the hosts, on which the Primary and Secondary virtual machines run, are of the same version and have the same patches installed. If you apply different patches to these hosts, FT cannot be re-enabled.
Disable High Availability admission control if it is enabled for any of the selected clusters.
Disable Fault Tolerance (FT) if it is enabled for the VMs on the selected hosts.
12 13
(Optional) Generate a cluster remediation options report by clicking Generate Report on the Cluster Remediation Options page and click Next. Review the Ready to Complete page and click Finish.
VMware, Inc.
121
On the End User License Agreement page, accept the terms and click Next. The End User License Agreement page is applicable only when you upgrade ESX hosts from version 3.x to version 4.0.x and 4.1.
(Optional) On the ESX 4.x Upgrade page, click the links of the settings that you want to edit.
Option COS VMDK location (ESX only) Rollback on failure (ESX only) Post-Upgrade script (ESX only) Description In the ESX 4.x COS VMDK Location window, specify the datastore location for the VMDK to migrate the COS of the ESX host. In the ESX 4.x Post Upgrade Options window, specify whether to disable rollback in case of failure. In the ESX 4.x Post Upgrade Options window, specify a post-upgrade script usage after the upgrade completes and when the post-upgrade script times out.
The ESX 4.x Upgrade page options in the Remediate wizard are applicable only when you upgrade ESX hosts from version 3.x to version 4.0.x and 4.1. 7 8 9 10 11 12 Click Next. (Optional) On the Patches and Extensions page, deselect specific patches or extensions to exclude them from the remediation process and click Next. (Optional) On the Dynamic Patches and Extensions to Exclude page, review the list of patches or extensions to be excluded and click Next. On the Host Remediation Options page, enter a unique name, and optionally a description, for the task. Select Immediately to begin the process right after you complete the wizard, or specify a time for the remediation process to begin. Specify the failure response for the remediation process from the Failure response drop-down menu, the delay in the retry, and the number of retries, if applicable.
Option Fail Task Retry Description Log this failure in the Update Manager logs and take no further action. Wait for the retry delay period and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. If Update Manager cannot put a host into maintenance mode, you can take an action to make sure that the operation succeeds next time when Update Manager tries to put the host into maintenance mode. For example, you can manually power off the virtual machines or migrate them to another host using vMotion to ensure that entering maintenance mode is successful next time. Power off all virtual machines and retry putting the host into maintenance mode as many times as you indicate in Number of retries field. Virtual machines are shut down as though their power off button is used. Suspend all running virtual machines and retry putting the host into maintenance mode as many times as indicated in Number of retries field.
Power Off virtual machines and Retry Suspend virtual machines and Retry
13
Disable any removable media devices connected to the virtual machines on the host, and click Next.
122
VMware, Inc.
14
(Optional) Edit the cluster remediation options. The Cluster Remediation Options page is available only when you remediate hosts in a cluster.
Option Disable Distributed Power Management (DPM) if it is enabled for any of the selected clusters. Details Update Manager does not remediate clusters with active DPM. DPM monitors the resource use of the running virtual machines in the cluster. If sufficient excess capacity exists, DPM recommends moving virtual machines to other hosts in the cluster and placing the original host into standby mode to conserve power. Putting hosts into standby mode might interrupt remediation. Update Manager does not remediate clusters with active HA admission control. Admission control is a policy used by VMware HA to ensure failover capacity within a cluster. If HA admission control is enabled during remediation, the virtual machines within a cluster might not migrate with vMotion. If FT is turned on for any of the virtual machines on a host, Update Manager does not remediate that host. FT requires that the hosts, on which the Primary and Secondary virtual machines run, are of the same version and have the same patches installed. If you apply different patches to these hosts, FT cannot be re-enabled.
Disable High Availability admission control if it is enabled for any of the selected clusters.
Disable Fault Tolerance (FT) if it is enabled for the VMs on the selected hosts.
15 16
(Optional) Generate a cluster remediation options report by clicking Generate Report on the Cluster Remediation Options page and click Next. Review the Ready to Complete page and click Finish.
VMware, Inc.
123
DRS is disabled on the cluster. This prevents migration of the virtual machines. FT is enabled for a VM on a host in the cluster. FT prevents successful remediation.
Remediation of Templates
A template is a master copy of a virtual machine that can be used to create and provision new virtual machines. You can remediate templates by using Update Manager.. Take snapshots of templates before remediation, especially if the templates are sealed. A template that is sealed is stopped before the operating system installation is completed, and special registry keys are used so that virtual machines created from this template start in setup mode. When such a virtual machine starts, the user completes the final steps in the setup process to allow final customization. To complete remediation of a sealed template, you must start the template as a virtual machine. For this to happen, the special registry keys that start the virtual machine in setup mode are noted and removed. After a template is started and remediated, the registry keys are restored, and the machine is shut down, returning the template to its sealed state. If an error occurs during remediation, a template might not be returned to its sealed state. For example, if Update Manager loses its connection with the vCenter Server system during remediation, the template cannot be returned to its sealed state. Creating a snapshot before remediation provides an easy recovery from such issues.
124
VMware, Inc.
VMware, Inc.
125
c d 10
Enter a name and optionally a description for the snapshot. (Optional) Select the Snapshot the memory for the virtual machine check box.
126
VMware, Inc.
15
Update Manager stores data about events. You can review this event data to gather information about operations that are in progress or are completed. You can view events in the Update Manager Administration view. Prerequisites Connect the vSphere Client to a vCenter Server system with which Update Manager is registered, and click Update Manager under Solutions and Applications on the Home page. If your vCenter Server system is part of a connected group in vCenter Linked Mode, you must specify the Update Manager instance to use, by selecting the name of the corresponding vCenter Server system in the navigation bar. Procedure
u
View Tasks and Events for a Selected Object, on page 127 Update Manager Events, on page 128
VMware, Inc.
127
Info Error
Successfully downloaded guest patch definitions for UNIX. New patches: number_of_patches. Could not download guest patch definitions for UNIX. Check your network connection to make sure that your metadata source is reachable.
Info Error
Successfully downloaded host patch definitions. New patches: number_of_patches. Could not download host patch definitions. Check your network connection to make sure that your metadata source is reachable.
Info Error Info Error Info Error Info Error Info Error Error
Successfully downloaded guest patch packages. New packages: number_of_packages. Could not download guest patch packages. Successfully downloaded guest patch packages for UNIX. New packages: number_of_packages. Could not download guest patch packages for UNIX. Successfully downloaded host patch packages. New packages: number_of_packages. Could not download host patch packages. Successfully downloaded notifications. New notifications: number_of_notifications. Could not download notifications. Successfully scanned vSphere_object_name for patches. Scanning of vSphere_object_name is canceled by user. Could not scan vSphere_object_name for patches. Check the Update Manager log (vmware-vum-server-log4cpp.log) for scan errors. Check your network connection. Check your network connection to make sure that your patch source is reachable. Check your network connection to make sure that your patch source is reachable. Check your network connection to make sure that your patch source is reachable.
Warning
Found a missing patch: patch_name when scanning vSphere_object_name. Re-downloading patch definitions might resolve this problem. Successfully scanned virtual_appliance_name for VA upgrades. Could not scan virtual_appliance_name for VA upgrades. Successfully scanned vSphere_object_name for VMware Tools upgrades.
128
VMware, Inc.
Warning
Error
VMware, Inc.
129
Error
Error
Error
Error
Info Error
VMware vCenter Update Manager Guest Agent successfully installed on virtual_machine_name. Could not install VMware vCenter Update Manager Guest Agent on virtual_machine_name. Make sure that the VM is powered on. Could not install VMware vCenter Update Manager Guest Agent on virtual_machine_name because VMware Tools is not installed or is of an incompatible version. The required version is required_version_number and the installed version is installed_version_number. There is no VMware vCenter Update Manager license for vSphere_object_name for the required operation. VMware vCenter Update Manager is running out of storage space. Location: path_location. Available space: free_space. VMware vCenter Update Manager is critically low on storage space! Location: path_location. Available space: free_space. VMware vCenter Update Manager Guest Agent could not respond in time on virtual_machine_name. Verify that the VM is powered on and that the Guest Agent is running. An internal error occurred in communication with VMware vCenter Update Manager Guest Agent on virtual_machine_name. Verify that the VM is powered on and retry the operation. VMware vCenter Update Manager Guest Agent could not access the DVD drive on virtual_machine_name. Verify that a DVD drive is available and retry the operation. An unknown internal error occurred during the required operation on virtual_machine_name. Check the logs for more details and retry the operation. Could not install patches on vSphere_object_name. Obtain the required licenses to complete the desired task. Add more storage. Add more storage. Update Manager Guest Agent is required for remediating virtual machines.
Error
Error
Error
Error
Error
Error
130
VMware, Inc.
Info Info Info Info Info Error Error Error Info Error Error Info Info Info Info Info Error
Warning
Warning
Info Info
Successfully discovered virtual appliance virtual_appliance_name. Could not discover virtual appliance virtual_appliance_name. An error occurred during the discovery of the virtual appliance.
VMware, Inc.
131
Error
Info Info Info Info Info Info Info Info Info Info Info Info Info Info Info Error Info Error Error Warning Error Error Error Error Error Warning
132
VMware, Inc.
Error
Error
Error
Warning
Error
Error Error
Info
VMware, Inc.
133
Warning
Warning
Warning
Warning
Cannot remediate host host_name because it contains one or more Primary or Secondary VMs on which FT is enabled.
Warning
Cannot remediate host host_name because it is a part of a VMware DPM enabled cluster and contains one or more Primary or Secondary VMs on which FT is enabled.
Warning
Host host_name has FT enabled VMs. If you apply different patches to hosts in a cluster, FT cannot be re-enabled.
Warning
Host host_name has FT enabled VMs. The host on which the Secondary VMs reside is not selected for remediation. As a result FT cannot be re-enabled. Cannot remediate host host_name because it has VMs with a connected removable device. Disconnect all removable devices before remediation.
Warning
Error
Error Error
Cannot enable FT for VM virtual_machine_name on host host_name. Cannot disable FT for VM virtual_machine_name on host host_name. Cannot check compatibility of the VM virtual_machine_name for migration with vMotion to host host_name. VMware vCenter Update Manager could not restore HA admission control/DPM settings for cluster cluster_name to their original values. These settings have been changed for patch installation. Check the cluster settings and restore them manually. Update Manager does not scan, stage, or remediate hosts on which virtual machines are with enabled FT.
Error
Error
134
VMware, Inc.
Error
Error
Remove one of the conflicting patches from the baseline and retry the remediation. Remove the conflicting patch from the baseline and retry the remediation.
Error
Warning
Include the prerequisites in a Patch or Extension baseline and retry the stage operation.
VMware, Inc.
135
Error
136
VMware, Inc.
Patch Repository
16
Patch and extension metadata is kept in the Update Manager Patch Repository. You can use the repository to manage patches and extensions, check on new patches and extensions, view patch and extension details, view which baseline a patch or an extension is included in, view recalled patches, import patches, and so on. If your vCenter Server system is part of a connected group in vCenter Linked Mode, and you have at least one Update Manager instance, you can select the Update Manager patch repository that you want to view. The Patch Repository is displayed in the Update Manager Administration view. This chapter includes the following topics:
n n n
View Available Patches and Extensions, on page 137 Add and Remove Patches or Extensions from a Baseline, on page 138 Search for Patches or Extensions in the Patch Repository, on page 138
Click the Patch Repository tab to view all the available patches and extensions.
The most recent patches and extensions are displayed in bold. The recalled patches are marked with a flag icon.
VMware, Inc.
137
Click Find.
The contents of the Patch Repository are filtered according to the criteria you entered.
138
VMware, Inc.
17
With Update Manager, you can scan and remediate the objects in your vSphere inventory to keep them up to date with the latest patches, rollups, upgrades, and so on. The common user goals provide task flows that you can perform with Update Manager to upgrade and patch your vSphere inventory objects and make them compliant against attached baselines and baseline groups.
n
Applying Patches to Hosts on page 140 Host patching is the process in which Update Manager applies VMware ESX/ESXi host patches or thirdparty patches, such as Cisco Distributed Virtual Switch, to the ESX/ESXi hosts in your vSphere inventory.
Applying Third-Party Patches to Hosts on page 141 You can use Update Manager to apply third-party software patches to the ESX/ESXi hosts in your vSphere inventory.
Testing Patches or Extensions and Exporting Baselines to Another Update Manager Server on page 143 Before you apply patches or extensions to ESX/ESXi hosts, you might want to test the patches and extensions by applying them to hosts in a test environment. You can then use Update Manager PowerCLI to export the tested baselines to another Update Manager server instance and apply the patches and extensions to the other hosts.
Applying Extensions to Hosts on page 146 With Update Manager you can apply extensions to ESX/ESXi hosts. An extension is any additional software that can be installed on the host or patched if the additional software already exists on the host.
Orchestrated Datacenter Upgrades on page 147 Orchestrated upgrades allow you to upgrade the objects in your vSphere inventory in a two-step process: host upgrades followed by virtual machine upgrades. You can configure the process at the cluster level for higher automation, or at the individual host or virtual machine level for granular control.
Upgrading and Applying Patches to Hosts Using Baseline Groups on page 150 You can use baseline groups to apply upgrade and patch baselines together for upgrading and updating hosts in a single remediation operation.
Applying Patches to Virtual Machines on page 152 You can use Update Manager to keep the virtual machines in your vSphere inventory up to date. You can include patches for updating the virtual machines in your vSphere inventory in dynamic or fixed baselines, which can later be combined in baseline groups.
VMware, Inc.
139
Upgrading Virtual Appliances on page 153 An upgrade remediation of a virtual appliance upgrades the entire software stack in the virtual appliance, including the operating system and applications. To upgrade the virtual appliance to the latest released or latest critical version, you can use one of the Update Manager predefined upgrade baselines or create your own.
Keeping the vSphere Inventory Up to Date on page 154 You can use Update Manager to keep your vSphere inventory updated with the most recent patches. Associating the UMDS Patchstore Depot with the Update Manager Server on page 155 UMDS is an optional module of Update Manager. UMDS downloads patch metadata and patch binaries when Update Manager is installed in an air-gap or semi-air-gap deployment system and has no access to the Internet. The patch metadata and patch binaries that you download using UMDS must be associated with the Update Manager server so that Update Manager can patch the hosts and virtual machines in your vSphere environment.
Generating Common Database Reports on page 159 Update Manager uses Microsoft SQL Server and Oracle databases to store information. Update Manager does not provide a reporting capability, but you can use a third-party reporting tool to query the database views to generate reports.
140
VMware, Inc.
The container object can be a folder, cluster, or datacenter. You can attach baselines and baseline groups to objects from the Update Manager Compliance view. For more information about attaching baselines and baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98. 4 Scan the container object. After you attach baselines to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 5 Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 6 (Optional) Stage the patches in the attached baselines to the hosts that you want to update. You can stage the patches and copy them from the Update Manager server to the hosts before applying them. Staging patches speeds up the remediation process and helps minimize host downtime during remediation. For a detailed procedure about staging patches and extensions to hosts, see Stage Patches and Extensions to ESX/ESXi Hosts, on page 116. 7 Remediate the container object. Remediate the hosts that are in Non-Compliant state to make them compliant with the attached baselines. For more information about remediating hosts against patch or extension baselines, see Remediate Hosts Against Patch or Extension Baselines, on page 117. During patch staging and remediation, Update Manager performs prescan and postscan operations. After remediation is completed, the compliance state of the hosts against the attached baseline is updated to Compliant.
Download the third-party patches from the Internet to make them available to the Update Manager server. If the machine on which the Update Manager server is installed has access to the Internet, you must either configure Update Manager to download patch binaries and patch metadata from third-party Web sites, or you must manually download the third-party patches and import them into the Update Manager patch repository as an offline bundle.
VMware, Inc.
141
By default, Update Manager contacts VMware at regular configurable intervals to gather information about the latest available patches. You can add third-party URLs to download third-party patches that are applicable to the ESX/ESXi 4.0.x and ESX/ESXi 4.1 hosts in your inventory. You can configure the Update Manager download source from the Configuration tab of the Update Manager Administration view. For a detailed procedure about configuring Update Manager to use third-party download URL addresses as patch download sources, see Add a Third-Party Download URL Source for ESX/ESXi Hosts, on page 71. You can import offline bundles in the Update Manager repository from the Configuration tab of the Update Manager Administration view. For a detailed procedure about importing offline bundles, see Import Patches Manually, on page 73.
n
Use UMDS to download third-party patches and make the patches available to the Update Manager server. If the machine on which the Update Manager server is installed is not connected to the Internet, you can use UMDS to download the third-party patches. For more information about configuring UMDS to download third-party patches, see Configure UMDS to Download Third-Party Patches for ESX/ESXi Hosts, on page 64. The patch metadata and patch binaries that you download using UMDS must be associated with the Update Manager server so that Update Manager can patch the hosts in your vSphere environment. For more information about associating the UMDS depot with the Update Manager server, see Associating the UMDS Patchstore Depot with the Update Manager Server, on page 155.
Configure the Update Manager host and cluster settings. You can configure the Update Manager settings from the Configuration tab of the Update Manager Administration view. For more information and the detailed procedure about configuring host and cluster settings by using Update Manager, see Configuring Host and Cluster Settings, on page 77.
Create fixed or dynamic patch baselines containing the third-party software patches that you downloaded to the Update Manager repository. You can create patch baselines from the Baselines and Groups tab of the Update Manager Administration view. For more information about creating fixed patch baselines, see Create a Fixed Patch Baseline, on page 84. For detailed instructions about creating a dynamic patch baseline, see Create a Dynamic Patch Baseline, on page 85.
Attach the patch baselines to a container object containing the hosts that you want to scan or remediate. The container object can be a folder, cluster, or datacenter. You can attach baselines and baseline groups to objects from the Update Manager Compliance view. For more information about attaching baselines and baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98.
Scan the container object. After you attach baselines to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102.
Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103.
142
VMware, Inc.
Remediate the hosts that are in Non-Compliant state to make them compliant with the attached baselines. For more information about remediating hosts against patch or extension baselines, see Remediate Hosts Against Patch or Extension Baselines, on page 117. After remediation is completed, the compliance state of the hosts against the attached baseline is updated to Compliant.
Testing Patches or Extensions and Exporting Baselines to Another Update Manager Server
Before you apply patches or extensions to ESX/ESXi hosts, you might want to test the patches and extensions by applying them to hosts in a test environment. You can then use Update Manager PowerCLI to export the tested baselines to another Update Manager server instance and apply the patches and extensions to the other hosts. Update Manager PowerCLI is a command-line and scripting tool built on Windows PowerShell, and provides a set of cmdlets for managing and automating Update Manager. For more information about installing and using Update Manager PowerCLI, see vCenter Update Manager PowerCLI Installation and Administration Guide. This workflow describes how to test patches by using one Update Manager instance and how to export the patch baseline containing the tested patches to another Update Manager instance. 1 Create fixed host patch baselines. Create fixed patch baselines containing the patches that you want to test. Fixed patch baselines do not change their content when new patches are downloaded into the Update Manager patch repository. You can create a fixed patch baseline from the Baselines and Groups tab of the Update Manager Administration view. For more information and a detailed procedure, see Create a Fixed Patch Baseline, on page 84. 2 Attach the patch baselines to a container object containing the hosts that you want to scan or remediate. The container object can be a folder, cluster, or datacenter. You can attach baselines and baseline groups to objects from the Update Manager Compliance view. For more information about attaching baselines and baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98. 3 Scan the container object. After you attach baselines to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 4 Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 5 (Optional) Stage the patches in the attached baselines to the hosts that you want to update. You can stage the patches and copy them from the Update Manager server to the hosts before applying them. Staging patches speeds up the remediation process and helps minimize host downtime during remediation. For a detailed procedure about staging patches and extensions to hosts, see Stage Patches and Extensions to ESX/ESXi Hosts, on page 116. 6 Remediate the container object.
VMware, Inc.
143
Remediate the hosts that are in Non-Compliant state to make them compliant with the attached baselines. For more information about remediating hosts against patch or extension baselines, see Remediate Hosts Against Patch or Extension Baselines, on page 117. 7 Export the patch baselines from the Update Manager server that you used to test the patches, and import them to another Update Manager server. You can export and import patch baselines from one Update Manager server to another by using an Update Manager PowerCLI script. The following example script creates a duplicate of the baseline MyBaseline on the $destinationServer. NOTE The script works for fixed and dynamic patch baselines as well as for extension baselines.
# $destinationServer = Connect-VIServer <ip_address_of_the_destination_server> # $sourceServer = Connect-VIServer <ip_address_of_the_source_server> # $baselines = Get-PatchBaseline MyBaseline -Server $sourceServer # ExportImportBaselines.ps1 $baselines $destinationServer Param([VMware.VumAutomation.Types.Baseline[]] $baselines, [VMware.VimAutomation.Types.VIServer[]]$destinationServers) $ConfirmPreference = 'None' $includePatches = @() $excludePatches = @() function ExtractPatchesFromServer([VMware.VumAutomation.Types.Patch[]]$patches, [VMware.VimAutomation.Types.VIServer]$destinationServer){ $result = @() if ($patches -ne $null){ foreach($patch in $patches){ $extractedPatches = Get-Patch -Server $destinationServer -SearchPhrase $patch.Name if ($extractedPatches -eq $null){ Write-Warning -Message "Patch '$($patch.Name)' is not available on the server $destinationServer" } else { $isFound = $false foreach ($newPatch in $extractedPatches){ if ($newPatch.IdByVendor -eq $patch.IdByVendor){ $result += $newPatch $isFound = $true } } if ($isFound -eq $false) { Write-Warning -Message "Patch '$($patch.Name)' with VendorId '$($patch.IdByVendor)' is not available on the server $destinationServer" } } } } return .$result; } function CreateStaticBaseline([VMware.VumAutomation.Types.Baseline]$baseline, [VMware.VimAutomation.Types.VIServer]$destinationServer){ $includePatches = ExtractPatchesFromServer $baseline.CurrentPatches $destinationServer
144
VMware, Inc.
if ($includePatches.Count -lt 1){ write-error "Static baseline '$($baseline.Name)' can't be imported. No one of the patches it contains are available on the server $destinationServer" } else { $command = 'New-PatchBaseline -Server $destinationServer -Name $baseline.Name -Description $baseline.Description -Static -TargetType $baseline.TargetType -IncludePatch $includePatches' if ($baseline.IsExtension) { $command += ' -Extension' } Invoke-Expression $command } } function CreateDynamicBaseline([VMware.VumAutomation.Types.Baseline]$baseline, [VMware.VimAutomation.Types.VIServer]$destinationServer) { if ($baseline.BaselineContentType -eq 'Dynamic'){ $command = 'New-PatchBaseline -Server $destinationServer -Name $baseline.Name -Description $baseline.Description -TargetType $baseline.TargetType -Dynamic -SearchPatchStartDate $baseline.SearchPatchStartDate - SearchPatchEndDate $baseline.SearchPatchEndDate SearchPatchProduct $baseline.SearchPatchProduct -SearchPatchSeverity $baseline.SearchPatchSeverity -SearchPatchVendor $baseline.SearchPatchVendor' } elseif ($baseline.BaselineContentType -eq 'Both'){ $includePatches = ExtractPatchesFromServer $baseline.InclPatches $destinationServer $excludePatches = ExtractPatchesFromServer $baseline.ExclPatches $destinationServer $command = 'New-PatchBaseline -Server $destinationServer -Name $baseline.Name -Description $baseline.Description -TargetType $baseline.TargetType -Dynamic -SearchPatchStartDate $baseline.SearchPatchStartDate -SearchPatchEndDate $baseline.SearchPatchEndDate SearchPatchProduct $baseline.SearchPatchProduct -SearchPatchSeverity $baseline.SearchPatchSeverity -SearchPatchVendor $baseline.SearchPatchVendor' if ($includePatches.Count -gt 0){ $command += ' -IncludePatch $includePatches' } if ($excludePatches.Count -gt 0){ $command += ' -ExcludePatch $excludePatches' } } #check for null because there is known issue for creating baseline with null SearchPatchPhrase if ($baseline.SearchPatchPhrase -ne $null){ $command += ' -SearchPatchPhrase $baseline.SearchPatchPhrase' } Invoke-Expression $command } foreach ($destinationServer in $destinationServers) { if ($baselines -eq $null) { Write-Error "The baselines parameter is null" } else {
VMware, Inc.
145
foreach($baseline in $baselines){ if ($baseline.GetType().FullName -eq 'VMware.VumAutomation.Types.PatchBaselineImpl'){ Write-Host "Import '" $baseline.Name "' to the server $destinationServer" if($baseline.BaselineContentType -eq 'Static'){ CreateStaticBaseline $baseline $destinationServer } else { CreateDynamicBaseline $baseline $destinationServer } } else { Write-Warning -Message "Baseline '$($baseline.Name)' is not patch baseline and will be skipped." } } } }
You have now exported the tested baseline to another Update Manager server. 8 Apply the patches to your ESX/ESXi hosts by using the Update Manager server instance to which you exported the tested patch baseline.
146
VMware, Inc.
You can create host extension baselines from the Baselines and Groups tab in the Update Manager Administration view. For a detailed procedure about creating extension baselines, see Create a Host Extension Baseline, on page 86. 4 Attach the extension baselines to a container object containing the hosts that you want to remediate. To scan and remediate hosts, attach the extensions baselines to a container object containing the hosts to which you want to apply the extensions. The container object can be a folder, cluster, or datacenter. You can attach baselines and baseline groups to objects from the Update Manager Compliance view. For more information about attaching baselines and baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98. 5 Scan the container object. After you attach baselines to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 6 Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 7 (Optional) Stage the extensions from the attached baselines to the ESX/ESXi hosts. You can stage the extensions and copy them from the Update Manager server to selected hosts before applying them. Staging extensions speeds up the remediation process and helps minimize host downtime during remediation. For a detailed procedure about staging patches and extensions to hosts, see Stage Patches and Extensions to ESX/ESXi Hosts, on page 116. 8 Remediate the hosts in the container object against extension baselines. You can remediate the container object of the hosts against the attached baselines. If hosts are in a NonCompliant state, remediate the container object to make the hosts compliant with the attached baselines. You can start the remediation process manually or schedule a remediation task. See Remediate Hosts Against Patch or Extension Baselines, on page 117 for a detailed procedure. During staging extensions and extension remediation, Update Manager performs prescan and postscan operations. After remediation is completed, the compliance state of the hosts against the attached baselines is updated to Compliant.
Orchestrated Upgrade of Hosts on page 148 You can use Update Manager to perform orchestrated upgrades of the ESX/ESXi hosts in your vSphere inventory by using a single upgrade baseline.
VMware, Inc.
147
Orchestrated Upgrade of Virtual Machines on page 149 An orchestrated upgrade allows you to upgrade VMware Tools and the virtual hardware for the virtual machines in your vSphere inventory at the same time. You can perform an orchestrated upgrade of virtual machines at the folder or datacenter level.
Here build_number is the build number of the upgrade release. For the complete procedure about importing host upgrade releases, see Import Host Upgrade Releases, on page 89. 3 Create a host upgrade baseline with the upgrade release bundle that you imported. You create host upgrade baselines from the Baselines and Groups tab of the Update Manager Administration view. For a detailed procedure about creating host upgrade baselines, see Create a Host Upgrade Baseline, on page 90. 4 Attach the host upgrade baseline to a container object containing the hosts that you want to upgrade.
148
VMware, Inc.
You can attach baselines and baseline groups to objects from the Update Manager Compliance view. For more information about attaching baselines and baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98. 5 Scan the container object. After you attach baselines to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 6 Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 7 Remediate the container object. If hosts are in Non-Compliant state, remediate the container object of the hosts to make it compliant with the attached baseline. You can start the remediation process manually or schedule a remediation task. For more information about remediating hosts against an upgrade baseline and for a detailed procedure, see Remediate Hosts Against an Upgrade Baseline, on page 119. Hosts that are upgraded reboot and disconnect for some time during the remediation.
VMware, Inc.
149
You must scan it to view the compliance state of the virtual machines in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your virtual machines manually, see Manually Initiate a Scan of Virtual Machines and Virtual Appliances, on page 102. You can also scan the virtual machines in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 4 Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 5 Remediate the non-compliant virtual machines in the container object to make them compliant with the attached baseline group. If virtual machines are in a Non-Compliant state, you can remediate the container object to make the virtual machines compliant with the baselines in the attached baseline group. You can start the remediation manually or schedule a remediation task. For more information about remediating virtual machines and for detailed instructions, see Remediate Virtual Machines and Virtual Appliances, on page 125. During an upgrade of VMware Tools, the virtual machines must be powered on. If a virtual machine is in a powered off or suspended state before remediation, Update Manager powers on the machine. After the upgrade is completed, Update Manager restarts the machine and restores the original power state of the virtual machine. During a virtual machine hardware upgrade, the virtual machines must be shut down. After the remediation is completed, Update Manager restores the original power state of the virtual machines. If a virtual machine is powered on, Update Manager powers the machine off, upgrades the virtual hardware, and then powers the virtual machine on. The virtual machines in the container object become compliant with the attached baseline group.
150
VMware, Inc.
Import a complete upgrade release bundle, so that you can upgrade all the hosts in your vSphere inventory. You can import upgrade release bundles from the Host Upgrade Releases tab of the Update Manager Administration view. For example, to upgrade all the ESX/ESXi hosts in your vSphere environment to version 4.1, you must upload all of the files required for this upgrade (three ZIP files and one ISO file):
n n n n esx-DVD-4.1.0-build_number.iso for ESX 3.x hosts upgrade-from-ESXi3.5-to-4.1.0-0.0.build_number-release.zip for ESXi 3.x hosts upgrade-from-ESX4.0-to-4.1.0-0.0.build_number-release.zip for ESX 4.0.x hosts upgrade-from-ESXi4.0-to-4.1.0-0.0.build_number-release.zip for ESXi 4.0.x hosts
Here build_number is the build number of the upgrade release. For a complete procedure about importing host upgrade releases, see Import Host Upgrade Releases, on page 89. 3 Create a host upgrade baseline with the upgrade release bundle that you imported. You create host upgrade baselines from the Baselines and Groups tab of the Update Manager Administration view. For a detailed procedure about creating host upgrade baselines, see Create a Host Upgrade Baseline, on page 90. 4 Create fixed or dynamic host patch baselines. Patch data in dynamic baselines change depending on the criteria you specify each time Update Manager downloads new patches. Fixed baselines contain only patches you select, regardless of new patch downloads. You can create patch baselines from the Baselines and Groups tab of the Update Manager Administration view. For more information about creating fixed patch baselines see Create a Fixed Patch Baseline, on page 84. The detailed instructions about creating a dynamic patch baseline are described in Create a Dynamic Patch Baseline, on page 85. 5 Create a baseline group containing the patch baselines as well as the host upgrade baseline that you created. You can create baseline groups from the Baselines and Groups tab of the Update Manager Administration view. For more information about creating baseline groups for hosts, see Create a Host Baseline Group, on page 95. 6 Attach the baseline group to a container object. To scan and remediate the hosts in your environment, you must first attach the host baseline group to a container object containing the hosts that you want to remediate. You can attach baseline groups to objects from the Update Manager Compliance view. For more information about attaching baseline groups to vSphere objects, see Attach Baselines and Baseline Groups to Objects, on page 98. 7 Scan the container object. After you attach the baseline group to the selected container object, you must scan it to view the compliance state of the hosts in the container. You can scan selected objects manually to start the scanning immediately. For detailed instructions on how to scan your hosts manually, see Manually Initiate a Scan of ESX/ESXi Hosts, on page 101. You can also scan the hosts in the container object at a time convenient for you by scheduling a scan task. For more information and detailed instructions about scheduling a scan, see Schedule a Scan, on page 102. 8 Review the scan results displayed in the Update Manager Client Compliance view.
VMware, Inc.
151
For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103. 9 Remediate the container object. Remediate the hosts that are in Non-Compliant state to make them compliant with the attached baseline group. For more information about remediating hosts against baseline groups containing patch, extension, and upgrade baselines, see Remediate Hosts Against Baseline Groups, on page 121. During the remediation, the upgrade is performed first. Hosts that need to be both upgraded and updated with patches are first upgraded and then patched. Hosts that are upgraded might reboot and disconnect for a period of time during remediation. Hosts that do not need to be upgraded are only patched. The hosts in the container object become compliant with the attached baseline group.
152
VMware, Inc.
Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103.
Remediate the container object. If virtual machines are in a noncompliant state, remediate the container object to make them compliant with the attached baseline or baseline groups. You can start the remediation process manually or schedule a remediation task. For a detailed description of the procedure, see Remediate Virtual Machines and Virtual Appliances, on page 125. One or more patches might require the guest operating system to restart. If no users are logged in to the guest operating system, the virtual machine restarts immediately. Otherwise, a dialog box informs loggedin users of the upcoming shutdown.
The remediated virtual machines become compliant with the attached patch baselines or baseline groups.
VMware, Inc.
153
Review the scan results displayed in the Update Manager Client Compliance view. For a detailed procedure about viewing scan results and for more information about compliance states, see Viewing Scan Results and Compliance States for vSphere Objects, on page 103.
Remediate the virtual appliances in the container object against the attached virtual appliance upgrade baselines. If virtual appliances are in a Non-Compliant state, remediate the container object of the virtual appliances to make it compliant with the attached baselines. You can start the remediation process manually or schedule a remediation task. For a detailed description of the procedure, see Remediate Virtual Machines and Virtual Appliances, on page 125. Update Manager directs the virtual appliances to download the missing updates and controls the remediation process of when and how to remediate, but the virtual appliance downloads and installs the updates itself.
The remediated virtual appliances become compliant with the attached baselines.
154
VMware, Inc.
Associating the UMDS Patchstore Depot with the Update Manager Server
UMDS is an optional module of Update Manager. UMDS downloads patch metadata and patch binaries when Update Manager is installed in an air-gap or semi-air-gap deployment system and has no access to the Internet. The patch metadata and patch binaries that you download using UMDS must be associated with the Update Manager server so that Update Manager can patch the hosts and virtual machines in your vSphere environment. Before you associate the UMDS patchstore depot with the Update Manager server, set up UMDS and download patches. For more information about installing, setting up UMDS, and downloading patches, see Chapter 10, Installing, Setting Up, and Using Update Manager Download Service, on page 59. You can either use a portable media drive to transfer the downloads to the machine on which Update Manager is installed, or you can copy them to a Web server. You must then set up Update Manager to use a shared repository as a patch download source. IMPORTANT You cannot use folders located on a network drive as a shared repository. Update Manager does not download patch binaries and patch metadata from folders on a network share either in the Microsoft Windows Uniform Naming Convention form (such as \\Computer_Name_or_Computer_IP\Shared), or on a mapped network drive (for example, Z:\).
n
Associate the UMDS Depot with the Update Manager Server Using a Portable Media Drive on page 155 In an air-gap deployment system where the Update Manager server is installed on a computer with no access to the Internet or other networks, the patch metadata and patch binaries you download using UMDS must be transferred to the machine on which Update Manager is installed.
Associate the UMDS Depot with Update Manager Server Using IIS on page 156 In a semi-air-gap environment, you can set up Internet Information Services (IIS) on the machine on which UMDS is installed and configure Update Manager to use the downloaded patch binaries and patch metadata from the IIS Web server.
Associate the UMDS Depot with Update Manager Server Using Apache on page 158 In a semi-air-gap environment, you can set up an Apache Web server on the machine on which UMDS is installed and configure Update Manager to use the downloaded patch binaries and patch metadata from the Apache Web server.
Associate the UMDS Depot with the Update Manager Server Using a Portable Media Drive
In an air-gap deployment system where the Update Manager server is installed on a computer with no access to the Internet or other networks, the patch metadata and patch binaries you download using UMDS must be transferred to the machine on which Update Manager is installed. Procedure 1 2 Connect a portable media drive to the computer on which you have installed UMDS and have downloaded the patch binaries and patch metadata. Open a Command Prompt window and navigate to the folder in which UMDS is installed.
n n
The default location in 32-bit Windows is C:\Program Files\VMware\Infrastructure\Update Manager The default location in 64-bit Windows is C:\Program Files (x86)\VMware\Infrastructure\Update
Manager
VMware, Inc.
155
Here F:\ is the path to the media drive, for example a USB flash drive. 4 5 Verify that all files are exported to the portable media drive, and then safely remove it and connect it to the machine on which the Update Manager server is installed. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Solutions and Applications > Update Manager in the navigation bar. If your vCenter Server system is part of a connected group in vCenter Linked Mode, specify the Update Manager instance to configure by selecting the name of the corresponding vCenter Server system in the navigation bar. 6 7 8 9 Click the Configuration tab in the Update Manager Administration view. Under Settings, click Patch Download Settings. Select the Use a shared repository radio button. Enter the path to the portable media drive.
F:\
Here F:\ is the path to the media drive, for example a USB flash drive. 10 Click Validate URL to validate the path. Make sure that the validation is successful. If the validation fails, Update Manager reports the reason for the failure. You can use the path to the shared repository only if the validation succeeds. 11 12 Click Apply to apply the changes. Click Download Now to download the patch metadata immediately. Update Manager downloads patch binaries during staging and remediation. The patch binaries and patch metadata downloaded using the UMDS are imported to the machine on which the Update Manager server is installed.
Associate the UMDS Depot with Update Manager Server Using IIS
In a semi-air-gap environment, you can set up Internet Information Services (IIS) on the machine on which UMDS is installed and configure Update Manager to use the downloaded patch binaries and patch metadata from the IIS Web server. Use this approach when the Update Manager server is installed on a machine that is connected to the UMDS machine, but does not have direct Internet access. NOTE The procedure uses IIS 6. Other versions of IIS can be configured similarly. Prerequisites Install and set up IIS on the machine on which UMDS is running. For information about setting up an IIS Web server, see the Internet Information Services documentation on the Microsoft Web site. Procedure 1 2 Log in to the computer on which you have installed UMDS and download the patch binaries and patch metadata. Create a directory for the patch data under the document root of the Web server. For example, C:\inetpub\wwwroot\UMDS.
156
VMware, Inc.
Export the downloaded metadata and binaries to the UMDS directory under the Web server root.
vmware-umds -E --export-store C:\inetpub\wwwroot\UMDS
Add .vib, .sig, and .xml as allowed MIME types for the Web server. a b Click Start > Programs > Administrative Tools > Internet Information Services (IIS) Manager. In the Internet Information Services (IIS) Manager window, select IIS Manager Information > Computer Name(local computer) > Web Sites > Default Web Site. Here Computer Name is the name of your machine. c d e Right click the UMDS folder where you exported the patch data and select Properties. Click HTTP Headers > MIME Types. Click New and add the new MIME types. In the Extension text field, enter .vib, .sig, and .xml. Enter one file extension for each MIME type entry. In the MIME Type field, enter application/octet-stream for .vib and .sig. For .xml, enter text/xml in the MIME Type field.
Set appropriate permissions for the UMDS folder in the Web server root. a b Right-click the UMDS folder under Default Web Site in the Internet Information Services (IIS) Manager window, and select Permissions. In the Advanced Security Settings dialog box, select the Allow inheritable permissions from the parent to propagate to this object and all child objects. Include these with entries explicitly defined here and Replace permission entries on all child objects with entries shown here that apply to child objects check boxes. Click Apply.
c 6 7 8
Restart the IIS Admin Service in the Services Control Manager. (Optional) Verify that you can view the UMDS directory under the Web server root in a browser and download files. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Solutions and Applications > Update Manager in the navigation bar. If your vCenter Server system is part of a connected group in vCenter Linked Mode, specify the Update Manager instance to configure by selecting the name of the corresponding vCenter Server system in the navigation bar.
9 10 11
Click the Configuration tab in the Update Manager Administration view. Select the Use a shared repository radio button. Enter the URL of the folder on the Web server where you exported the patch binaries and patch metadata. For example, http://ip_address_or_hostname/UMDS
12
Click Validate URL to validate the path. Make sure that the validation is successful. If the validation fails, Update Manager reports the reason for the failure. You can use the path to the shared repository only if the validation succeeds.
13 14
Click Apply to apply the changes. Click Download Now to download the patch metadata immediately. Update Manager downloads patch binaries during staging and remediation.
Update Manager is now configured to use the patch metadata and patch binaries downloaded through UMDS and hosted on the IIS Web server.
VMware, Inc.
157
Associate the UMDS Depot with Update Manager Server Using Apache
In a semi-air-gap environment, you can set up an Apache Web server on the machine on which UMDS is installed and configure Update Manager to use the downloaded patch binaries and patch metadata from the Apache Web server. Use this approach when the Update Manager server is installed on a machine that is connected to the UMDS machine, but does not have direct Internet access. NOTE The procedure uses Apache 2.2.14. Other versions of Apache can be configured similarly. Prerequisites Set up Apache on the machine on which UMDS is running. For information about setting up an Apache Web server, see the documentation on the Apache HTTP Server Project Web site. Procedure 1 2 Log in to the computer on which you have installed UMDS and download the patch binaries and patch metadata. Create a directory for the patch data under the document root of the Web server. For example, C:\Program Files\Apache Software Foundation\Apache2.2\htdocs\UMDS. 3 Export the downloaded patch metadata and patch binaries to the UMDS directory in the Web server root.
vmware-umds -E --export-store C:\Program Files\Apache Software Foundation\Apache2.2\htdocs\UMDS
4 5
(Optional) Verify that you can view the UMDS directory under the Web server root in a browser and download files. Connect the vSphere Client to a vCenter Server system with which Update Manager is registered and select Home > Solutions and Applications > Update Manager in the navigation bar. If your vCenter Server system is part of a connected group in vCenter Linked Mode, specify the Update Manager instance to configure by selecting the name of the corresponding vCenter Server system in the navigation bar.
6 7 8
Click the Configuration tab in the Update Manager Administration view. Select the Use a shared repository radio button. Enter the URL of the folder on the Web server where you exported the patch binaries and patch metadata. For example, http://ip_address_or_hostname/UMDS
Click Validate URL to validate the path. Make sure that the validation is successful. If the validation fails, Update Manager reports the reason for the failure. You can use the path to the shared repository only if the validation succeeds.
10 11
Click Apply to apply the changes. Click Download Now to download the patch metadata immediately. Update Manager downloads patch binaries during staging and remediation.
Update Manager is now configured to use the patch metadata and patch binaries downloaded through UMDS and hosted on the Apache Web server.
158
VMware, Inc.
Generate Common Reports Using Microsoft Office Excel 2003 on page 159 Using Microsoft Excel, you can connect to the Update Manager database and query the database views to generate a common report.
Generate Common Reports Using Microsoft SQL Server Query on page 160 Using a Microsoft SQL Server query, you can generate a common report from the Update Manager database.
For example, if you want to get the latest scan results for all objects in the inventory and all patches for an inventory object, select the following database views and their corresponding columns from the Available tables and columns pane:
n
VUMV_UPDATES
VMware, Inc.
159
VUMV_ENTITY_SCAN_RESULTS
6 7
Click OK in the warning message that the query wizard cannot join the tables in your query. In the Microsoft Query window, drag a column name from the first view to the other column to join the columns in the tables manually. For example, join the META_UID column from the VUMV_UPDATES database view with the UPDATE_METAUID column from the VUMV_ENTITY_SCAN_RESULTS database view. A line between the columns selected indicates that these columns are joined.
The data is automatically queried for all inventory objects in the Microsoft Query window.
To generate a report containing the latest scan results for all objects in the inventory and for all patches for an inventory object, run the query in Microsoft SQL Client.
SELECT r.entity_uid,r.ENTITY_STATUS, u.meta_uid, u.title, u.description, u.type, u.severity, (case when u.SPECIAL_ATTRIBUTE is null then 'false' else 'true' end) as IS_SERVICE_PACK, r.scanh_id, r.scan_start_time, r.scan_end_time FROM VUMV_UPDATES u JOIN VUMV_ENTITY_SCAN_RESULTS r ON (u.meta_uid = r.update_metauid) ORDER BY r.entity_uid, u.meta_uid
The query displays all patches that are applicable to the scanned objects in the inventory.
160
VMware, Inc.
Troubleshooting
18
If you encounter problems when running or using Update Manager, you can use a troubleshooting topic to understand and solve the problem, if there is a workaround. This chapter includes the following topics:
n
Connection Loss with Update Manager Server or vCenter Server in a Single vCenter Server System, on page 162 Connection Loss with Update Manager Server or vCenter Server in a Connected Group in vCenter Linked Mode, on page 162 Gather Update Manager Log Bundles, on page 163 Gather Update Manager and vCenter Server Log Bundles, on page 163 Log Bundle Is Not Generated, on page 164 Host Extension Remediation or Staging Fails Due to Missing Prerequisites, on page 164 No Baseline Updates Available, on page 165 All Updates in Compliance Reports Are Displayed as Not Applicable, on page 165 All Updates in Compliance Reports Are Unknown, on page 165 Remediated Updates Continue to Be Noncompliant, on page 166 Patch Remediation of Virtual Machines Is Not Completed, on page 166 Patch Remediation of Virtual Machines Fails for Some Patches, on page 167 Patch Remediation of Virtual Machines Succeeds but the Baseline Is Not Compliant, on page 167 VMware Tools Upgrade Fails if VMware Tools Is Not Installed, on page 167 ESX/ESXi Host Scanning Fails, on page 168 ESXi Host Upgrade Fails, on page 168 Incompatible Compliance State, on page 169
n n n n n n n n n n n n n n n
VMware, Inc.
161
Connection Loss with Update Manager Server or vCenter Server in a Single vCenter Server System
Because of loss of network connectivity or the restart of the servers, the connection between the Update Manager plug-in and the Update Manager server or vCenter Server system might get interrupted. Problem The connection between the Update Manager plug-in and the Update Manager server or vCenter Server system is interrupted, when the servers are restarting or are stopped. In such a case various symptoms are observed.
n
Update Manager plug-in displays a reconnection dialog, and after 15-20 seconds, a failure message appears. The plug-in is disabled. Update Manager plug-in displays a reconnection dialog. Within 15-20 seconds, the dialog disappears, and the plug-in can be used. vSphere Client displays a reconnection dialog. After an interval, it displays the login form. To use Update Manager, you must re-enable the Update Manager plug-in.
Cause
n n n
The Update Manager server stops and is not available for more than 15-20 seconds. The Update Manager server restarts, and the service becomes available within 15-20 seconds. vCenter Server stops.
Solution
n
If the Update Manager server has stopped, start the Update Manager service and re-enable the Update Manager Client plug-in. If the Update Manager server has restarted, wait for it to become available. If the vCenter Server service has stopped, start the vCenter Server service and enable the Update Manager plug-in.
n n
Connection Loss with Update Manager Server or vCenter Server in a Connected Group in vCenter Linked Mode
Because of loss of network connectivity or a server restart, the connection between the Update Manager plugin and the Update Manager server or vCenter Server system might get interrupted. Problem The connection between the Update Manager plug-in and the Update Manager server or vCenter Server system is interrupted, when the servers are restarting or are stopped. In such a case various symptoms are observed.
n
Update Manager plug-in displays a modal reconnection dialog, and after 15-20 seconds, a failure message appears. The plug-in for the Update Manager server in use disappears from the vSphere Client. Update Manager plug-in displays a modal reconnection dialog. Within 15-20 seconds, the dialog disappears, and the plug-in can be used. If you select to use a vCenter Server system with which a stopped Update Manager server is registered, the Update Manager plug-in shows a modal reconnection dialog and tries to reconnect to the newly selected Update Manager server for 15-20 seconds. vSphere Client disables all tabs for the vCenter Server system. The Update Manager plug-in is disabled. When the vCenter Server system is available again, the Update Manager plug-in is automatically enabled for it.
162
VMware, Inc.
Chapter 18 Troubleshooting
Cause
n n n n
The Update Manager server in use stops and is not available for more than 15-20 seconds. The Update Manager server in use restarts, and the service becomes available within 15-20 seconds. An Update Manager server that is not currently in use stops. vCenter Server stops.
Solution
n
If the Update Manager server has stopped, start the Update Manager service. NOTE Although the Update Manager plug-in is shown as enabled, you have to disable and enable the plug-in after the connection is restored. If you select to use another vCenter Server system from the connected group, and the Update Manager registered with this vCenter Server system is running, the Update Manager plug-in is available for the running Update Manager server.
n n n
If the Update Manager server has restarted, wait for the Update Manager service to become available. If the Update Manager server has stopped, start the Update Manager service. If the vCenter Server service has stopped, start the vCenter Server service.
Log files are generated as a ZIP package, which is stored on the current users desktop.
Log files for vCenter Server and the Update Manager server are generated as a ZIP package, which is stored on the current users desktop.
VMware, Inc.
163
The /n option lets the script skip the vCenter Server support bundle and collect only the Update Manager log bundle. 4 Press Enter. The Update Manager log bundle is generated as a ZIP package successfully.
164
VMware, Inc.
Chapter 18 Troubleshooting
Misconfigured Web server proxy. Shavlik servers are unavailable. VMware update service is unavailable. Poor network connectivity.
Solution
n
Check the connectivity settings. For more information, see Configure Update Manager Network Connectivity Settings, on page 69. Check the Shavlik Web site (http://www.shavlik.com) to determine whether it is available. Check the VMware Web site (http://www.vmware.com) to determine whether it is available. Check whether other applications that use networking are functioning as expected. Consult your network administrator to best assess whether the network is working as expected.
n n n
VMware, Inc.
165
Cause Such a condition typically indicates an error at the start of the scanning process. This might also indicate that no scan occurred. Solution Schedule a scan or manually start a scan.
Insufficient disk space for Service Pack installation. Conflicts with running applications.
Solution
n n
Retry remediation after freeing up disk space. Reboot the virtual machine and then retry the remediation operation.
166
VMware, Inc.
Chapter 18 Troubleshooting
Patch Remediation of Virtual Machines Succeeds but the Baseline Is Not Compliant
In some cases, remediation of virtual machines with the default Critical VM Patches and Non-Critical VM Patches baselines succeeds but the baseline is still marked Not Compliant. Problem Remediation is completed but the baseline is still noncompliant. Cause The baseline might be still noncompliant when you apply patches that subsequently make other patches applicable. For example, a patch might be applicable only after a service pack is applied, so applying that service pack might address all known issues from when the remediation started, but the act of applying the service pack made other patches applicable. Solution Repeat the remediation process.
VMware, Inc.
167
Solution Install VMware Tools manually, or right-click the virtual machine in the vSphere Client Inventory and select Guest > Install/Upgrade VMware Tools.
168
VMware, Inc.
Chapter 18 Troubleshooting
Missing Package
Not Installable
Incompatible Hardware
Unsupported Upgrade
The baseline contains a host update that conflicts with another update already installed on the host. The baseline contains a host update that conflicts with other updates in the Update Manager repository. The dynamic baseline criteria results in a conflicting set.
VMware, Inc.
169
The baseline is attached to a container object and conflicts with one or more inventory objects in the folder. This is an indirect conflict.
Solution
n
Detach or remove the baseline containing the update that conflicts with another update already installed on the host. If Update Manager suggests a resolution for the conflicting update, add the resolution update into the baseline and retry the scan operation.
Open the Patch Details or the Extension Details window to see details about the conflict and the other updates with which the selected update is in conflict.
n
If the conflicting updates are in the same baseline, remove the conflicting updates from the baseline and perform the scan again. If the conflicting updates are not in the same baseline, ignore the conflict and proceed to install the updates by starting a remediation.
Edit the dynamic baseline criteria or exclude the conflicting patches and scan again. If Update Manager suggests a resolution for the conflicting patch, add the resolution patches into the baseline and retry the scan operation.
If the conflict is indirect, you can remediate the container object, but only the objects that are not in conflict are remediated. You should resolve the conflicts or move the inventory objects that are in conflict, and then remediate.
A baseline containing Linux patches is attached to a Red Hat Linux virtual machine. If one or more updates are missing during the scan, they appear as Not Installable. A VMware Tools Upgrade to Match Host baseline is attached to a virtual machine on which VMware Tools is not installed. The Upgrade Details window shows the actual reason for the Incompatible state.
170
VMware, Inc.
Chapter 18 Troubleshooting
A VMware Tools Upgrade to Match Host baseline is attached to a virtual machine with VMware Tools not managed by the VMware vSphere platform. The Upgrade Details window shows the actual reason for the Incompatible state.
Solution
n
No action is required. Update Manager does not support remediation of Linux virtual machines. You can detach the patch baseline. If VMware Tools is not installed on the virtual machine, install a version of VMware Tools and retry the scan operation. If VMware Tools on the virtual machine is not managed by the VMware vSphere platform, you should detach the baseline and perform the upgrade manually. For more information about upgrading VMware Tools when it is packaged and distributed as OSPs, see VMware Tools Installation Guide Operating System Specific Packages.
VMware, Inc.
171
172
VMware, Inc.
Database Views
19
Update Manager uses Microsoft SQL Server and Oracle databases to store information. The database views for Microsoft SQL Server and Oracle databases are the same. This chapter includes the following topics:
n n n n n n n n n n n n n n n n n n n n n
VUMV_VERSION, on page 174 VUMV_UPDATES, on page 174 VUMV_HOST_UPGRADES, on page 174 VUMV_VA_UPGRADES, on page 175 VUMV_PATCHES, on page 175 VUMV_BASELINES, on page 175 VUMV_BASELINE_GROUPS, on page 176 VUMV_BASELINE_GROUP_MEMBERS, on page 176 VUMV_PRODUCTS, on page 176 VUMV_BASELINE_ENTITY, on page 177 VUMV_UPDATE_PATCHES, on page 177 VUMV_UPDATE_PRODUCT, on page 177 VUMV_ENTITY_SCAN_HISTORY, on page 177 VUMV_ENTITY_REMEDIATION_HIST, on page 178 VUMV_UPDATE_PRODUCT_DETAILS, on page 178 VUMV_BASELINE_UPDATE_DETAILS, on page 178 VUMV_ENTITY_SCAN_RESULTS, on page 179 VUMV_VMTOOLS_SCAN_RESULTS, on page 179 VUMV_VMHW_SCAN_RESULTS, on page 179 VUMV_VA_APPLIANCE, on page 180 VUMV_VA_PRODUCTS, on page 180
VMware, Inc.
173
VUMV_VERSION
This database view contains Update Manager version information. Table 19-1. VUMV_VERSION
Field VERSION DATABASE_SCHEMA_VERSION Notes Update Manager version in x.y.z format, for example 1.0.0 Update Manager database schema version (an increasing integer value), for example 1
VUMV_UPDATES
This database view contains software update metadata. Table 19-2. VUMV_UPDATES
Field UPDATE_ID TYPE TITLE DESCRIPTION META_UID SEVERITY RELEASE_DATE DOWNLOAD_TIME SPECIAL_ATTRIBUTE COMPONENT UPDATECATEGORY Notes Unique ID generated by Update Manager Entity type: virtual machine, virtual appliance, or host Title Description Unique ID provided by the vendor for this update (for example, MS12444 for Microsoft updates) Update severity information: Not Applicable, Low, Moderate, Important, Critical, HostGeneral, and HostSecurity Date on which this update was released by the vendor Date and time this update was downloaded by the Update Manager server into the Update Manager database Any special attribute associated with this update (for example, all Microsoft Service packs are marked as Service Pack) Target component, such as HOST_GENERAL, VM_GENERAL, VM_TOOLS, VM_HARDWAREVERSION or VA_GENERAL Specifies whether the update is a patch or an upgrade.
VUMV_HOST_UPGRADES
This database view provides detailed information about the host upgrade packages. Table 19-3. VUMV_HOST_UPGRADES
Field RELEASE_ID PRODUCT VERSION BUILD_NUMBER DISPLAY_NAME FILE_NAME Notes Database-generated ID, which refers to VUMV_UPDATES and UPDATE_ID ESX or ESXi host Version number represented in x.y.z format Build number of the ESX/ESXi host version Name displayed to the user Name of the upgrade file
174
VMware, Inc.
VUMV_VA_UPGRADES
This database view represents detailed information about the virtual appliance upgrade packages. Table 19-4. VUMV_VA_UPGRADES
Field UPGRADE_ID TITLE VENDOR_NAME VENDOR_UID PRODUCT_NAME PRODUCT_RID SEVERITY LOCALE RELEASEDATE Notes Upgrade ID used as a primary key Short description used in the user interface Vendor name Unique ID of the vendor Product name Unique ID of the product Security impact Locale information, if any Release date of the upgrade
VUMV_PATCHES
This database view contains patch binary metadata. Table 19-5. VUMV_PATCHES
Field DOWNLOAD_URL PATCH_ID TYPE NAME DOWNLOAD_TIME PATCH_SIZE Notes URL for the patch binary Unique ID for the current patch, generated by the Update Manager server Patch type: virtual machine or host Name of the patch Date and time the patch was downloaded by the Update Manager server into the Update Manager database Size of the patch in KB
VUMV_BASELINES
This database view contains the details for a particular Update Manager baseline. Table 19-6. VUMV_BASELINES
Field BASELINE_ID NAME BASELINE_VERSION TYPE BASELINE_UPDATE_TYPE Notes Unique ID generated for this baseline by the Update Manager server Name of the baseline History of when the baseline has been changed (old version remains in the database) Baseline type: virtual machine, virtual appliance, or host Baseline type: fixed or dynamic
VMware, Inc.
175
VUMV_BASELINE_GROUPS
This database view contains the details for a particular Update Manager baseline group. Table 19-7. VUMV_BASELINE_GROUPS
Field BASELINE_GROUP_ID VERSION NAME TYPE DESCRIPTION DELETED LASTUPDATED Notes Unique ID generated for this baseline group by the Update Manager server Version of the baseline group Name of the baseline group Type of targets that this baseline applies to: virtual machine, virtual appliance, or ESX/ESXi host Description of the baseline group Information about the baseline group deletion, if it is deleted Information about the last time that the baseline group was updated
VUMV_BASELINE_GROUP_MEMBERS
This database view contains information about the relationship between the baseline and the baseline group in which it is included. Table 19-8. VUMV_BASELINE_GROUP_MEMBERS
Field BASELINE_GROUP_ID BASELINE_GROUP_VERSION BASELINE_ID Notes Unique ID generated for this baseline group by the Update Manager server Version of the baseline group Name of the baseline included in the baseline group
VUMV_PRODUCTS
This database view contains product metadata, including that for operating systems and applications. Table 19-9. VUMV_PRODUCTS
Field PRODUCT_ID NAME VERSION FAMILY Notes Unique ID for the product, generated by the Update Manager server Name of the product Product version Windows, Linux, ESX host, or Embedded ESXi host, Installable ESXi host
176
VMware, Inc.
VUMV_BASELINE_ENTITY
This database view contains the objects to which a particular baseline is attached. Table 19-10. VUMV_BASELINE_ENTITY
Field BASELINE_ID ENTITY_UID Notes Baseline ID (foreign key, VUMV_BASELINES) Unique ID of the entity (managed object ID generated by vCenter Server)
VUMV_UPDATE_PATCHES
This database view contains patch binaries that correspond to a software update. Table 19-11. VUMV_UPDATE_PATCHES
Field UPDATE_ID PATCH_ID Notes Software update ID (foreign key, VUMV_UPDATES) Patch ID (foreign key, VUMV_PATCHES)
VUMV_UPDATE_PRODUCT
This database view contains products (operating systems and applications) to which a particular software update is applicable. Table 19-12. VUMV_UPDATE_PRODUCT
Field UPDATE_ID PRODUCT_ID Notes Software update ID (foreign key, VUMV_UPDATES) Product ID (foreign key, VUMV_PRODUCTS)
VUMV_ENTITY_SCAN_HISTORY
This database view contains the history of scan operations. Table 19-13. VUMV_ENTITY_SCAN_HISTORY
Field SCAN_ID ENTITY_UID START_TIME END_TIME SCAN_STATUS FAILURE_REASON SCAN_TYPE TARGET_COMPONENT Notes Unique ID generated by the Update Manager server Unique ID of the entity the scan was initiated on Start time of the scan operation End time of the scan operation Result of the scan operation (for example, Success, Failure, or Canceled) Error message describing the reason for failure Type of scan: patch or upgrade Target component, such as HOST_GENERAL, VM_GENERAL, VM_TOOLS, VM_HARDWAREVERSION or VA_GENERAL
VMware, Inc.
177
VUMV_ENTITY_REMEDIATION_HIST
This database view contains the history of remediation operations. Table 19-14. VUMV_ENTITY_REMEDIATION_HIST
Field REMEDIATION_ID ENTITY_UID START_TIME END_TIME REMEDIATION_STATUS IS_SNAPSHOT_TAKEN Notes Unique ID generated by the Update Manager server Unique ID of the entity that the remediation was initiated on Start time of the remediation End time of the remediation Result of the remediation operation (for example, Success, Failure, or Canceled) Indicates whether a snapshot was created prior to the remediation
VUMV_UPDATE_PRODUCT_DETAILS
This database view contains information about the products (operating systems and applications) to which a particular software update is applicable. Table 19-15. VUMV_UPDATE_PRODUCT_DETAILS
Field UPDATE_METAUID UPDATE_TITLE UPDATE_SEVERITY PRODUCT_NAME PRODUCT_VERSION Notes Software update ID (foreign key, VUMV_UPDATES) Update title Update impact information: Not Applicable, Low, Moderate, Important, Critical, HostGeneral, and HostSecurity Product name Product version
VUMV_BASELINE_UPDATE_DETAILS
This database view contains information about the software updates that are part of a baseline. Table 19-16. VUMV_BASELINE_UPDATE_DETAILS
Field BASELINE_NAME BASELINE_ID BASELINE_VERSION TYPE TARGET_COMPONENT BASELINE_UPDATE_TYPE UPDATE_METAUID TITLE Notes Baseline name Unique ID generated for this baseline by the Update Manager server History about when the baseline was changed (old version remains in the database) Baseline type: virtual machine, virtual appliance, or host Type of targets this baseline applies to: virtual machine, virtual appliance, or host Baseline type: fixed or dynamic Update meta ID Update title
178
VMware, Inc.
VUMV_ENTITY_SCAN_RESULTS
This database view contains status history of a particular entity for an update. Table 19-17. VUMV_ENTITY_SCAN_RESULTS
Field SCANH_ID ENTITY_UID SCAN_START_TIME SCAN_END_TIME UPDATE_METAUID UPDATE_TITLE UPDATE_SEVERITY ENTITY_STATUS Notes Unique ID of the scan, generated by the database Entity unique ID (a managed object ID assigned by vCenter Server) Start time of the scan process End time of the scan process Update meta unique ID Update title Update severity: Not Applicable, Low, Moderate, Important, Critical, HostGeneral, and HostSecurity Status of the entity with regard to the update: Missing, Installed, Not Applicable, Unknown, Staged, Conflict, ObsoletedByHost, MissingPackage, NotInstallable, NewModule, UnsupportedUpgrade, and IncompatibleHardware
VUMV_VMTOOLS_SCAN_RESULTS
This database view contains information about a particular virtual machine regarding VMware Tools installation. Table 19-18. VUMV_VMTOOLS_SCAN_RESULTS
Field SCANH_ID ENTITY_UID SCAN_START_TIME SCAN_END_TIME ENTITY_STATUS Notes Unique ID of the scan, generated by the database Entity unique ID (a managed object ID assigned by vCenter Server) Start time of the scan process End time of the scan process Status of the entity against the latest VMware Tools version
VUMV_VMHW_SCAN_RESULTS
This database view contains status information for the hardware version of a particular virtual machine. Table 19-19. VUMV_VMHW_SCAN_RESULTS
Field SCANH_ID ENTITY_UID Notes Unique ID of the scan, generated by the database Entity unique ID (a managed object ID assigned by vCenter Server)
VMware, Inc.
179
VUMV_VA_APPLIANCE
This database view contains information about virtual appliances. Table 19-20. VUMV_VA_APPLIANCE
Field VAID MGMTPORT MGMTPROTOCOL SUPPORTEDFEATURES LASTGOODIP VADKVERSION PRODUCTID UPDATEVERSION DISPLAYVERSION SERIALNUMBER UPDATEURL ORIGUPDATEURL Notes Managed object ID of the virtual appliance, used as the primary key Port through which the virtual appliance is contacted or managed Management protocol Free-form string for API feature compatibility Last known IP address that the virtual appliance had (can be IPv6 or IPv4) VMware Studio version ID in VUMV_VA_PRODUCTS Current patch version of the virtual appliance Current patch display version of the virtual appliance Serial number of the virtual appliance Current software update URL of the virtual appliance Default software update URL of the virtual appliance
VUMV_VA_PRODUCTS
This database view contains information about the virtual appliance vendor. Table 19-21. VUM_VA_PRODUCTS
Field ID VENDORNAME VENDORUUID PRODUCTNAME PRODUCTRID VENDORURL PRODUCTURL SUPPORTURL Notes Unique ID, a generated sequence number Vendor name Unique ID of the vendor Product name (without the release, for example, Database) Product release ID (for example, 10gr2) Vendor URL (this field is optional) Product URL (this field is optional) Support URL (this field is optional)
180
VMware, Inc.
Index
A
accessing, patch repository 137 add third-party URL, Update Manager 71 adding baseline to baseline group 97 patch to a baseline 138 third-party patch source in UMDS 64 third-party URL in Update Manager 71 advantages of compliance 14 alert notifications 75 apply extensions to hosts 146 apply patches to hosts 140 apply patches to virtual machines 152 apply third-party patches 141 associate UMDS depot with Update Manager Apache 158 IIS 156 portable media drive 155 attached baselines and groups, filtering 99 attaching baseline 98 baseline group 98 overview 18 audience 11
baseline group compliance with vSphere objects 104 baseline groups, overview 21, 23 baselines attributes 24 default baselines 23 no updates available 165 overview 21 types 22
C
checking for notifications 75 cluster, configure settings 79 cluster settings 77 common user goals 139 compatibility Database Formats for Update Manager 26 Operating Systems for Update Manager 26 Update Manager and vCenter Server 26 Update Manager and VI Client 26 Update Manager and VirtualCenter Server 26 Update Manager and vSphere Client 26 complete upgrade release 88 compliance and security best practices 14 compliance information, viewing 104 compliance state compliant 108 incompatible 108 non-compliant 108 of baselines 108 of updates 107 compliance view, overview 105 compliance, unknown 165 configuration options, overview 24 configuring cluster settings 79 host settings 78 local Oracle connection 32 mail sender settings 81 Microsoft SQL Server 2005 Express 30 Microsoft SQL Server database 30 network connectivity settings 69 notification checks 75 Oracle database 32 patch download schedule 74
B
back up, Update Manager database 42 baseline attaching 98 creating 84 deleting 94 detaching 99 overview 18 working with 83 baseline compliance with vSphere objects 104 baseline group add baselines 97 attaching 98 creating 94 deleting 98 detaching 99 editing 96 overview 18 remove baselines 97 working with 83
VMware, Inc.
181
patch download sources 69 proxy settings 74 remote Oracle connection 33 smart rebooting 80 taking snapshots 77 UMDS 62 UMDS patch download location 63 Update Manager 67 Update Manager patch download location 80 Update Manager patch download source 16 conflict updates 169 connection loss with Update Manager 162 connection loss with vCenter Server 162 creating 32-bit DSN on 64-bit operating system 29, 46 baseline 84 baseline group 94 dynamic patch baseline 85 extension baseline 84 extension baselines 86 fixed patch baseline 84 host baseline group 95 host upgrade baseline 88, 90 new data source (ODBC) 31 patch baseline 84 virtual appliance upgrade baseline 92, 93 virtual machine and virtual appliance baseline group 96
VUMV_UPDATE_PRODUCT_DETAILS 178 VUMV_UPDATES 174 VUMV_VA_APPLIANCE 180 VUMV_VA_PRODUCTS 180 VUMV_VA_UPGRADES 175 VUMV_VERSION 174 VUMV_VMHW_SCAN_RESULTS 179 VUMV_VMTOOLS_SCAN_RESULTS 179 deleting baseline 94 baseline group 98 upgrade release file 92 detaching baseline 99 baseline group 99 download patches, UMDS 64 downloading patches 17 DPM 77 DRS 77 DSN 46
E
editing baseline group 96 host extension baseline 88 host upgrade baseline 91 patch baseline 87 virtual appliance upgrade baseline 94 enable, Update Manager Client 37 events, list of 128 events, viewing 127 export and import baselines 143 extension baseline, creating 84 extension details, overview 110 extensions, filtering 87
D
data migration tool, restoring 46 database back up and restore (Oracle) 44 back up and restore (SQL) 43 backup 42 detach and attach (SQL) 44 privileges 27 setup 29 database views VUMV_BASELINE_ENTITY 177 VUMV_BASELINE_GROUP_MEMBERS 176 VUMV_BASELINE_GROUPS 176 VUMV_BASELINE_UPDATE_DETAILS 178 VUMV_BASELINES 175 VUMV_ENTITY_REMEDIATION_HIST 178 VUMV_ENTITY_SCAN_HISTORY 177 VUMV_ENTITY_SCAN_RESULTS 179 VUMV_HOST_UPGRADES 174 VUMV_PATCHES 175 VUMV_PRODUCTS 176 VUMV_UPDATE_PATCHES 177 VUMV_UPDATE_PRODUCT 177
F
feedback 11 filtering attached baselines and groups 99 extensions 87 objects in Compliance view 99 patch repository 138 patches 87, 138 fixed patch baseline, creating 84 FT 77
G
generate database reports overview 159
182
VMware, Inc.
Index
using Microsoft Office Excel 2003 159 using Microsoft SQL Server query 160 generating Update Manager and vCenter Server log files 163 Update Manager log bundles 163 Update Manager log files 163 Guest Agent, installing 39
Update Manager 35 Update Manager Client 37 Update Manager server 36 inventory objects, update 154
L
log bundles, generating for Update Manager 163 log bundles, generating for Update Manager and vCenter Server 163 log files, generating for Update Manager 163 log files, generating for Update Manager and vCenter Server 163
H
HA 77 host, scanning failure 165 host baseline group, creating 95 host extension baseline, editing 88 host extension baseline, creating 86 host extension remediation or staging fails 164 host settings 77 host upgrade baseline creating 88, 90 editing 91 host upgrade files 88 host upgrade releases importing 89 overview 18 hosts apply extensions 146 apply patches 140 apply third-party patches 141 download third-party patches 71 download third-party patches using UMDS 64 manually scanning 101 remediation 117 remediation against baseline groups 121 remediation against upgrade baseline 119 remediation failure response 78 scanning failure 168 schedule scan 102 upgrade 148 upgrade and update 150 upgrade failure 168
M
mail sender settings, configuring 81 maintaining Update Manager database 30 migrate data to another machine 41 migration tool, move the configuration and database 45 missing package 170
N
network connectivity settings, configuring 69 not installable status 170 notifications, view 76 notifications, overview 75
O
offline bundles import 73 overview 69 Oracle database, configuring 32 orchestrated upgrade of hosts 148 of virtual machines 149 overview 147 overview of attaching 18 baseline groups 21, 23 baselines 21 compliance view 105 configuration options 24 configuring Update Manager 67 ESX host remediation 115 ESXi host remediation 116 extension details 110 hosts remediation 114 offline bundles 69 orchestrated upgrades 113 patch details 109 remediation 20, 113 scanning 18, 101
I
identify the SQL Server authentication type 32 import host upgrade releases 18 patches 73 upgrade release file 89 incompatible compliance state resolution 169 install.bat 46 installation, database privileges 27 installing Guest Agent 39 UMDS 59, 60
VMware, Inc.
183
staging patches 20 templates remediation 124 UMDS 59 Update Manager Client 14 Update Manager process 15 upgrade details 110
S
scanning hosts 101 overview 18, 101 schedule 102 viewing results 103 virtual appliance 102 virtual machine 102 schedule, scanning 102 scheduled remediation for hosts 126 for virtual machines and virtual appliances 126 security best practices 14 set up and use UMDS 155 setting up and using UMDS 62 shared repository, using 72 shutdown warning 125 smart rebooting, configuring 80 staging patches 116 support 11 supported database formats 26 supported host versions 11 system requirements for Update Manager 25
P
partial upgrade release 88 patch, virtual machines 152 patch baseline creating 84 editing 87 patch details, overview 109 patch download location configuring for UMDS 63 configuring for Update Manager 80 patch download schedule, modify 74 patch download sources, configuring 69 patch download task, running 81 patch download, overview 17 patch fixes notifications 75 patch recall notifications 75 patches configure UMDS 62 conflicting 169 download using UMDS 64 filtering 87, 138 import 73 include in a baseline 138 staging 116 viewing 137 pre-remediation check report 123 prerequisites, for the database 27 privileges 82 proxy settings, configuring 74
T
taking snapshots, configuring 77 tasks and events, viewing 127 testing patches 143 third-party URL, adding in UMDS 64 troubleshooting baselines 165 compliance 165 conflicting updates 169 connection loss 162 ESX host applicable 165 ESX/ESXi host scanning failure 168 ESXi host upgrade failure 168 extension remediation or staging failure 164 generating Update Manager and vCenter Server log bundles 163 generating Update Manager log bundles 163 incompatible compliance state 169 log files are not generated 164 missing package 170 noncompliant patch baseline 167 not installable status 170 patch remediation failure 167 scanning 165 unsupported upgrade 171 virtual machine remediation failure 166
R
remediation of hosts 117, 119, 121 of virtual appliances 125 of virtual machines 125 overview 20 remediation, overview 113 removing baselines from baseline groups 97 Update Manager 57 restart Update Manager 81 restoring Update Manager configuration 46 Update Manager database 46 roll back 125
184
VMware, Inc.
Index
U
UMDS add third-party URL 64 compatibility matrix 60 configuring 62 download patches 64 export downloaded patches 65 installing 59, 60 overview 59 setting up and using 62 upgrading 59, 61 understanding, Update Manager 13 uninstalling Update Manager Client 57 Update Manager server 57 uninstalling Update Manager 57 unsupported upgrade 171 update inventory objects 154 virtual machines 152 Update Manager add third-party URL 71 best practices 53 common user goals 139 database 29, 42 database views 173 deployment configurations 53 deployment models usage 54 hardware requirements 25 installing 35 network connectivity settings 68 patch repository 137 process 15 recommendations 53 restart the service 81 supported Operating Systems 26 system requirements 25 understanding 13 uninstalling 57 upgrading 49 Update Manager PowerCLI script 143 upgrade of hosts 148 virtual machines 149 upgrade and update, hosts 150 upgrade details, overview 110 upgrade hosts 119 upgrade release file delete 92 import 89
upgrading UMDS 59, 61 Update Manager 49 Update Manager Client 51 Update Manager server 50 virtual appliances 153 using Internet as a patch download source 71 shared repository as a patch download source 72
V
viewing compliance information 104 events 127 notifications 76 patches 137 scan results 20, 103 tasks and events 127 virtual appliance manually scan 102 scanning 102 schedule scan 102 virtual appliance remediation, overview 124 virtual appliance upgrade baseline creating 92, 93 editing 94 virtual appliances, upgrade 153 virtual machine manually scan 102 remediation failure 77 scanning 102 schedule scan 102 shutdown warning 125 virtual machine and virtual appliance baseline group, creating 96 virtual machine remediation, overview 124 virtual machines update 152 upgrade 149 VMware Tools upgrade fails, troubleshooting 167
VMware, Inc.
185
186
VMware, Inc.