VMware has become aware of an issue that occurs after 90 days after deployment of a template in vCloud Automation Center (vCAC) 6.0.x, tenants become inaccessible and identity stores disappear due to expiration of the tenant admin password. For more information, see the article below.
For further information and updates, please refer to KB article: vCloud Automation Center 6.0.x tenants become inaccessible and identity stores disappear (2075011) in your problem description.
Note: Any updates to this issue will be reflected in the aforementioned KB article. To be alerted when this article is updated, click Subscribe to Document in the Actions box on the KB article page.
This week, a new vulnerability was discovered affecting SSL, a protocol most of the Internet uses to encrypt and secure communications. The VMware Security Engineering, Communications, and Response group (vSECR) is investigating the OpenSSL issue dubbed “Heartbleed”. For information on which VMware products may be affected and resolution/remediation steps, refer to the two KB articles at the bottom of this post.
For the curious, we would like to quickly explain why this particular vulnerability could be a risk across the Internet. The bug — dubbed “Heartbleed” — allows anybody to read the memory on a system that is supposed to be protected by SSL.
An anonymous attacker could potentially steal any information from an SSL-secured communication when the issue is not addressed. Best practices dictate that websites and web service providers should always use SSL-encrypted communication when dealing with sensitive information like usernames, passwords, and bank info. Heartbleed could breach that information to anybody who knows how to extract it without leaving a trace.
Just hours ago VMware announced the General Availability (GA) of Virtual SAN (VSAN) 5.5. This new product is the cornerstone of our Software-Defined Storage strategy and a key pillar of our Software-Defined Data Center vision.
In typical fashion, our Documentation and KB team have lots of fresh articles you may want to be aware of as you try this new and exciting product.
One of our own, Michael Roy has just published his first book: Getting Started with VMware Fusion, written to help readers to get started running Windows on their Mac the right way.
Michael talks about how to import your physical PC into the virtual world, and provides practical examples of how to keep your new Virtual Machine secure, backed up, and running smoothly.
Going a bit deeper, he teaches you about snapshots explaining their great uses, and also using Linked Clones in VMware Fusion Professional.
Michael Roy started at VMware working on VMware Fusion version 2 in 2009, where he co-led a world-class global support team, giving customers the help they needed to get the most out of VMware Fusion. He currently specializes in Technical Marketing for Hybrid Cloud Services.
VMware has become aware of an issue that occurs after upgrading to vCloud Networking and Security (vCNS) 5.1.3 in an environment with Cisco Nexus 1000V. The vShield Manager user interface becomes unavailable.
A hot patch fix is available. This does not affect customers with VMware standard or VMware vDS switches.
If you encounter this issue, file a support request with VMware Technical Support and note Knowledge Base article: vShield Manager user interface becomes unavailable after upgrading to 5.1.3 when Cisco Nexus 1000V is present (2073502) in your problem description.
Note: Updates on this issue will be reflected in the aforementioned KB article. To be alerted when this article is updated, click Subscribe to Document in the Actions box on the KB article page.