This upgrade evaluator script will help you identify the presence of a certificate with a weak signature algorithm and identify incompatible spherelet versions.
Steps to Run the Script:
Download the vSphere-upgrade-evaluator.zip attached to this KB article.
Transfer the file to a folder on the vCenter Server Appliance using WinSCP (e.g., /root
or /tmp
). Choose the location on the appliance that has admin rights and permissions for the logged-in user.
Note: It's necessary to enable the bash shell before WinSCP will work. Refer to KB: Connecting to vCenter Server Virtual Appliance using WinSCP fails with the error: Received too large (1433299822 B) SFTP packet. Max supported packet size is 1024000 B
Log in to the vCenter Server using root credentials with an SSH Client (using Putty.exe or any similar SSH Client) and change to the directory where the script was placed. Use the user with the administrator rights and permissions on the Appliance/Machine (In the Case of Windows VC).
Extract the file using the extraction tool, unzip, 7zip, etc.
Update vsphere-upgrade-evaluator/config.json with the correct SSO administrator username and password.
“%VMWARE_PYTHON_BIN%" C:\vsphere-upgrade-evaluator\upgrade_evaluator_script.py --config C:\vsphere-upgrade-evaluator\config.json --resultsDir C:\temp
$VMWARE_PYTHON_BIN /root/vsphere-upgrade-evaluator/upgrade_evaluator_script.py --config /root/vsphere-upgrade-evaluator/config.json --resultsDir /tmp
Output file descriptions
upgrade_evaluator.log - This log file provides the comprehensive logs which display what is happening in the script run.
upgrade_evaluator_result.json - This file is the concatenated output of each individual component in json format.
upgrade_evaluator_result.txt - This file is the concatenated output of each individual component in more human readable format.
upgrade_evaluator_status.json - This file shows the run status of each component phase, this can be used for live tracking the status of UpgradeEvaluator run.