Upgrading vCenter 8 to vCenter 9: Fixing a Stage 2 Precheck DNS Resolution Error

I was doing an in-place vCenter upgrade from vCenter 8 to vCenter 9 using the VCSA 9 ISO. Stage 1 (deploying the new appliance) completed fine, but Stage 2 prechecks failed with a generic “internal error” in the installer UI. In this post I’ll show how I troubleshooted and solved it.

Continue Reading

Deploying vCenter Using the CLI Installer on macOS

Deploying vCenter Server (VCSA) using the CLI installer is fast, repeatable, and ideal for lab environments or scripted deployments. In this post, I’ll demonstrate how to deploy a brand new vCenter server using the CLI installer. While this post focuses on CLI deployment from macOS, the process for Linux and Windows is very similar.

Continue Reading

Bypass macOS Security Gatekeeper for vCenter Installer

If you are hitting this error while trying to launch the VCSA Installer, “Installer” is damaged and can’t be opened. You should eject the disk image. This is most likely just macOS Security Gatekeeper getting in the way, don’t worry the fix is simple! Note: This issue also affects the CLI Installer too. To have…

Continue Reading

Export Machine SSL Embedded Private Key From vCenter

This quick post demonstrates how to export the Machine SSL embedded Private key from your vCenter Server Appliance (VCSA). If you replaced the default Machine SSL certificate on your vCenter where the CSR was generated from the vCenter Server, the private key would be embedded in the vCenter Appliance certificate store. If you need to…

Continue Reading

Remove certificates with weak signature algorithms in vCenter Server

During the vCenter Server 8.0 upgrade, I was faced with the following Pre-upgrade check error and wasn’t able to continue the upgrade. As of vCenter Server 8.0, certificates with SHA-1 signature algorithms are no longer supported and must be removed or replaced with a certificate that uses SHA-2 signature algorithm. In this post, I’ll show…

Continue Reading

Setup vCenter Alarm Action Script To Send Push Notifications

I recently came across this useful app, Alertzy.app. It’s a service that allows you to send and receive real-time alerts as push notifications on your iOS and Android device. I was impressed with how simple it was to set up and use, and it’s free for up to 100 notifications per day. I figured this could…

Continue Reading

Launch vCenter VCSA UI/CLI Installer on MacOS

MacOS from Catalina onwards, a security change prevents non notarized apps from running. To get around this, you need to exclude the VCSA Installer from the MacOS Security Gatekeeper by removing the metadata quarantine attribute “com.apple.quarantine” for the VCSA ISO. Before mounting the ISO, open Terminal and run the following command Now you may mount…

Continue Reading

Invalid vCenter Cert using macOS Catalina and Chrome

I had redeployed my home lab vCenter appliance, and upon attempting to access the vCenter UI, I was denied access and encountered the following error “NET::ERR_CERT_INVALID“ Details in the Error vc.virtuallywired.io normally uses encryption to protect your information. When Google Chrome tried to connect to vc.virtuallywired.io this time, the website sent back unusual and incorrect…

Continue Reading

Install Free SSL Certificate for vSphere 7 Home Lab

Last year I wrote the follow guide Install Free Let’s Encrypt SSL Certificate for your vCenter 6.7 Lab. The certificate was issued by Let’s Encrypt via a project called ZeroSSL. Recently ZeroSSL stopped using Let’s Encrypt, and started issuing the certificates themselves, therefore the process to generate the certificate outlined in that guide is no…

Continue Reading

Fix Error, You cannot visit site right now because the website uses HSTS

I faced this error on Chrome. You cannot visit “site” right now because the website uses HSTS. The HTTP Strict-Transport-Security response header (HSTS) lets a web site tell browsers that it should only be accessed using HTTPS, instead of using HTTP, therefore, preventing access. I received this error because I had accessed this URL previously…

Continue Reading