The NSX Distributed Firewall (DFW) monitoring script attempts to authenticate as [email protected] every 5 minutes. The script uses pyVmomi API calls to collect CPU and memory statistics. ESXi lockdown mode security restrictions block direct root account authentication. This causes the script's authentication requests to fail with "no permission" errors while the monitoring process continues to retry at regular intervals.
This issue is under review with Broadcom Engineering. Subscribe to the article to receive updates on this issue.
Choose one of the following approaches based on your security requirements:
This option requires security team evaluation:
grep "Cannot login user [email protected]" /var/run/log/hostd.log
This is the recommended approach:
grep "Cannot login user [email protected]" /var/run/log/hostd.log | tail -10
For more information about NSX authentication events that were resolved in NSX 4.2, see VCSA events show UserloginSessionEvent and UserLogoutSessionEvent for user [email protected].
For more information about ESXi lockdown mode configuration and exception users, see Enabling or disabling Lockdown mode on an ESXi host.
For more information about ESXi lockdown mode exception users, see Specifying Accounts with Access Privileges in Lockdown Mode.
To verify NSX component versions, run the following command on the affected ESXi host:
esxcli software vib list | grep nsx-exporter
To monitor authentication patterns in the hostd logs, use:
grep "[email protected]" /var/run/log/hostd.log | tail -20