Closed Elvon closed 2 years ago
Hi @Elvon and thanks for the well-described issue. I sincerely wish I could give you a great answer or solution, but I can only refer to #29 . If you have a VMware support contract, you could create a ticket and send a request that they allow read-only users to access the CIM server.
Quick update, which definitely works with ESXi 8 and likely other versions, too: https://www.claudiokuenzler.com/blog/1288/how-to-use-check_esxi_hardware-cim-server-esxi-without-root-user
Before actually creating a new issue I confirm, I have read the FAQ (https://www.claudiokuenzler.com/blog/308/check-esxi-hardware-faq-frequently-asked-questions): Y I confirm, I have restarted the CIM server (
/etc/init.d/sfcbd-watchdog restart
) on the ESXi server and the problem remains: Y I confirm, I have cleared the server's local IPMI cache (localcli hardware ipmi sel clear
) and restarted the services (/sbin/services.sh restart
) on the ESXi server and the problem remains: YDescribe the bug If i'm using this script with an ESXi user which has "read only" Role assigned. The script fails to connect. If i'm using the ESXi root user, it works.
Show the full plugin output, including the command with -V parameter Run the plugin with
-V
parameter and show the full output (including command) here. Obviously obfuscate credentials.Expected behavior A clear and concise description of what you expected to happen.
Versions:
Additional context Add any other context about the problem here.