This issue is resolved :
ESXi 6.7 Patch Release ESXi670-201911001, available at
VMware Downloads.
ESXi 6.5 Patch Release ESXi650-202110001, available at
VMware Downloads.
Workaround:
To work around this issue if you do not want to patch the ESXi host:
- You can avoid this issue by disabling the WBEM services. To disable the WBEM services on the ESXi host, run this command:
esxcli system wbem set --enable false
To re-enable the CIM agent on the ESXi host, run this command:
esxcli system wbem set --enable true
Note: When an ESXi host is rebooted and if a 3rd party providers are present, the WBEM service will become enabled on reboot. In this instance, the step of disabling WBEM services will have to be repeated. However, this can be avoided by turning off the sfcbd-watchdog in chkconfig.
To turn off sfcbd-watchdog from chkconfig, run this command:
chkconfig sfcbd-watchdog off
Note: For more information, see enabling or disabling WBEM services.
If you do not want to disable the WBEM services, you may continue to receive email alerts and events spew. To workaround this issue, reconfigure the hardware sensor alarm to restrict the emails for these specific events:
- Log in to the vCenter Server using the vSphere Web Client.
- Select the vCenter Server and click Configure.
- Click Alarm Definitions.
- Select the Alarm Name Host hardware sensor state.
- Click Edit > Next.
- In the Alarm Rule section, click Add Argument.
- Select argument as sensorNumber and select operator as does not start with and provide sensor number as -1 which is causing alarm to trigger the alert.
- Click Next and Save.
Notes: