Following an installation or upgrade to ESXi 8.0 or higher, the following symptoms are observed:
A "Host TPM attestation" alarm is triggered in the vSphere UI.
The alarm appears even if a Trusted Platform Module (TPM) is not actively utilized in the environment.
This condition is typically observed when Secure Boot is disabled on the ESXi host hardware.
/var/log/vmware/vpxd/vpxd.log file in vCenter server reveals the following warning message YYYY-MM-DDTHH:MM:SS info vpxd[3424929] [Originator@6876 sub=Attestation opID=#####@148-4337f1da-WorkQueue-#####] VIB TAR Decompress: decompression of /tmp/vmware-vpxd/3424929.host-#####.boot_imgdb.tgz to /tmp/vmware-vpxd/#####.host-#####.boot_imgdb.tar took 1 ms
YYYY-MM-DDThh:mm:SS warning vpxd[3424929] [Originator@6876 sub=Default opID=#####@148-4337f1da-WorkQueue-#####] TPM2VLIB: Secure Boot Disabled
YYYY-MM-DDTHH:MM:SS warning vpxd[3424929] [Originator@6876 sub=Attestation opID=#####@148-4337f1da-WorkQueue-#####] Failed to update integrity report; [vim.HostSystem:host-#####,<host fqdn>], 24TpmVerificationException(error: 0x7, internal error: 0)
The Host TPM attestation alarm can be triggered due to several reasons. The causes listed below explain why permanent solutions (such as enabling Secure Boot or turning off the alarm) and temporary fixes (such as disconnecting and reconnecting the host) work in different situations.
Follow these steps to verify and resolve TPM attestation alarms in vSphere.
/usr/lib/vmware/secureboot/bin/secureBoot.py -s /usr/lib/vmware/secureboot/bin/secureBoot.py -cIf the host is compatible, follow the below steps to enable Secure Boot:
If the alarm is active despite Secure Boot being enabled, refresh the connection to vCenter:
If the hardware does not support Secure Boot, suppress the alarm at the vCenter level:
Note: After applying any of these solutions, monitor the vSphere UI for 24 hours to confirm that the alarm is no longer triggered.