Users may see a "Host TPM attestation" alarm in the vSphere UI after installing or upgrading to ESXi 8.0 or later. This alarm typically appears because Secure Boot is disabled on the ESXi host, even if a TPM is not being actively used in the environment.
The message appears as:
In the vCenter UI, navigate to the Monitor tab and select Triggered Alarms; the interface will show the below error:
VMware vCenter Server
The Host TPM attestation alarm can be triggered due to several reasons. The causes listed below explain why permanent solutions (such as enabling Secure Boot or turning off the alarm) and temporary fixes (such as disconnecting and reconnecting the host) work in different situations.
YYYY-MM-DDThh:mm:ss info vpxd[3424929] [Originator@6876 sub=Attestation opID=#####@148-4337f1da-WorkQueue-#####] VIB TAR Decompress: decompression of /tmp/vmware-vpxd/3424929.host-#####.boot_imgdb.tgz to /tmp/vmware-vpxd/#####.host-#####.boot_imgdb.tar took 1 ms
-->
YYYY-MM-DDThh:mm:ss warning vpxd[3424929] [Originator@6876 sub=Default opID=#####@148-4337f1da-WorkQueue-#####] TPM2VLIB: Secure Boot Disabled
YYYY-MM-DDThh:mm:ss warning vpxd[3424929] [Originator@6876 sub=Attestation opID=#####@148-4337f1da-WorkQueue-#####] Failed to update integrity report; [vim.HostSystem:host-#####,<host fqdn>], 24TpmVerificationException(error: 0x7, internal error: 0)
Follow these steps to verify and resolve TPM attestation alarms in vSphere.
/usr/lib/vmware/secureboot/bin/secureBoot.py -s /usr/lib/vmware/secureboot/bin/secureBoot.py -cIf the host is compatible, follow the below steps to enable Secure Boot:
If the alarm is active despite Secure Boot being enabled, refresh the connection to vCenter:
If the hardware does not support Secure Boot, suppress the alarm at the vCenter level:
Note: After applying any of these solutions, monitor the vSphere UI for 24 hours to confirm that the alarm is no longer triggered.