RecoverPoint for VMs: Splitter installation failure causing cluster installation to fail
Summary: Splitter installation failure causing RecoverPoint for Virtual Machines (VMs) installation to fail.
Symptoms
UEFI Secure Boot is configured on the ESX host.
RecoverPoint for Virtual Machines (VMs) installation using Wavelength Division Multiplexing (WDM) fails at the step to deploy the splitter on the ESX host.
Error on the ESX host upon deploying the splitter:
Error on the ESX host in "/var/log/esxupdate":
From /files/home/kos/installationLogs/server.log:
com.emc.recoverpoint.connectors.actions.infra.ActionFailedException: Failed to install vib on 4 Failures: {EsxUuid(super=Uuid(uuid=host-44))=ActionFailedException(super=com.emc.recoverpoint.connectors.actions.infra.ActionFailedException: Vib didn't appear on ESX after installation., faultCause=GENERAL_ERROR), EsxUuid(super=Uuid(uuid=host-35))=ActionFailedException(super=com.emc.recoverpoint.connectors.actions.infra.ActionFailedException: Vib didn't appear on ESX after installation., faultCause=GENERAL_ERROR), EsxUuid(super=Uuid(uuid=host-28))=ActionFailedException(super=com.emc.recoverpoint.connectors.actions.infra.ActionFailedException: Vib didn't appear on ESX after installation., faultCause=GENERAL_ERROR), EsxUuid(super=Uuid(uuid=host-71))=ActionFailedException(super=com.emc.recoverpoint.connectors.actions.infra.ActionFailedException: Vib didn't appear on ESX after installation., faultCause=GENERAL_ERROR)}
at com.emc.recoverpoint.connectors.actions.infra.ActionFailedException.createException(ActionFailedException.java:35) ~[vsphere_actions.jar:?]
at com.emc.recoverpoint.connectors.actions.deploy.DeploySplitterUsingDatastoreAction.perform(DeploySplitterUsingDatastoreAction.java:75) ~[vsphere_actions.jar:?]
Cause
For the RecoverPoint splitter to install, it must allow the signature check. If UEFI Secure Boot is configured, signature check is not allowed, and the installation fails. This is detailed in the vSphere security documents:
"Secure boot is part of the UEFI firmware standard. With secure boot enabled, a machine refuses to load any UEFI driver or app unless the operating system bootloader is cryptographically signed. Starting with vSphere 6.5, ESXi supports secure boot if it is enabled in the hardware."
https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.security.doc/GUID-5D5EE0D1-2596-43D7-95C8-0B29733191D9.html
Resolution
Workaround:
Disable UEFI Secure Boot.
The detailed process may change depending on the BIOS in use by the host, but the macro steps are:
-
Reboot the host and enter the BIOS.
-
Select the boot menu.
-
Disable Secure boot.
-
Save BIOS changes and restart the host.
For VxRail hosts, follow the guidance in the KB article: VxRail: How do enable and disable UEFI Secure Boot