Today, I am starting my day patching a few LINUX guests with Satellite server. The first host is patched in a few minutes. The second one follows the first but the third one makes me think.
Issues, problems, catastrophes – they are the best opportunities to learn ( I cheer myself up).
VMWare tools refuse to work after patching – they will not start. But their version is appropriate for the version of the employed kernel.
What is going on?
Following advice from a previous post, all VMWare packages are removed and re-installed, a reboot follows. These steps are repeated several times (I am a persistent administrator) with no luck – the tools still refuse to start.
yum/rpm cache/database is/are corrupted? To clean, you execute
# rm -f /var/lib/rpm/__db* # rpm --rebuilddb # yum clean all # rm –rvf /var/cache/yum/*
Still no go. There is always a component of vmware tools that refuses installation. A VMWare tools installation manual says that a guest should have no “trace” of previous “installs” (of vmware tools). I find
/etc/vmware-tools which promptly gets removed.
# cd /etc # rm –rf ./vmware-tools # yum install vmware-tools-esx-kmods vmware-tools-esx
Another installation attempt ends in success!
But this is not the happy ending. Trying to login via
putty fails. This guest is configured to authenticate with Active Directory using Kerberos. The command
getent executed from the console delivers all the expected info – the proof that the guest communicates with Active Directory. Another thought – to work as designed, Kerberos requires good timekeeping.
date command show the guest seventy minutes behind the time servers. This is good, we know why we cannot login remotely. It is time to verify the automatic start of
# service ntpd status ntpd not running. # chkconfig --list ntpd ntpd 0:off 1:off 2:on 3:on 4:on 5:on 6:off # service ntpd start
Instead of waiting (for a long time) for
ntpd to bring the host to the correct time we can do it immediately:
# date –s 11:27:00
The last command set the host clock to 11:27am. Now, the remote logins work again!
Let’s bounce this host for a good measure before we call it a day.