Updating esx server
Last but not least Start the Service Once you have installed a virtual client and you have installed the VMware tools, you just have set your timezone …
Click on the General tab and set the startup Policy to Start automatically 8.
If there is add these accounts to the local admin group on v Center. VMWare Support states that v Center is out of sync with Single Sign On (SSO).
Simple reboots of the SSO server while v Center server is powered off should resolve the issue: Here’s the sequence: rebooting our v Center server helped solved this issue for us.
Before I discovered this however to provide myself a workaround I would simply restart vmware server service and then I could log in no problem and access vm consoles.The "cat /var/log/| grep sense | less" hex errors showed numerous LUN level issues (D:0x2), bus busy (H:0x2), HBA busy (D:0x8), abort commands (H:0x5) from timeouts which points to a SAN filer not being properly failed over and still reporting itself as available After the SAN filer restoral for the paths/LUNs we issued the command " /sbin/restart" which completed & we were able to v Client into the Host again, the web & join it back to the existing cluster to clear the "orphane" "unnamed" VMs that were residual leftovers. Only workaround/solution so far: block access to ESX host until all v Center services are started.Now, a shell script/systemd unit on v Center creates iptables firewall/packet filter rules on boot.In this particular case, though, everything was configured correctly both on the Citrix side (2 PVS servers on Windows 2012 R2 and 100 Windows 7 SP1 VDA targets with Citrix best practices in place across the board) and on v Sphere (6 ESXi hosts in a cluster with Standard v Switches and virtual adapters dedicated to the PVS traffic). Cisco UCS has Fabric Interconnects (FIs) that provide connectivity for blade/rack servers within your chassis.We even checked the firmware in UCS which was slightly out-of-date but updating it didn’t help either. Just like regular switches, FIs have Quality-of-Service capability that prioritizes traffic based on system classes as shown in the following picture: So what if the VNIC that carries out the PVS traffic has a drop-eligible, low-priority, or best-effort weight assigned to it? As a result, you will see retries generated in the PVS Console and session latency is likely to occur on the target devices.