While reviewing vCenter Server logs, you may encounter entries related to the vim.vm.guest.FileManager.initiateFileTransferFromGuest API,
For example:
####### - [Originator@6876 sub="vpxLro" opID="########-##"] [VpxLRO] -- BEGIN lro-###### -- guestOperationsFileManager -- vim.vm.guest.FileManager.initiateFileTransferFromGuest -- 220e52c7-####-####-####-f648bf2d7410
This KB explains the purpose of this API call, common scenarios that trigger these log entries, and how to identify the users who initiated these file transfer operations.
What is the initiateFileTransferFromGuest API Operation?
The initiateFileTransferFromGuest API is part of the vSphere Guest Operations API. It allows vCenter Server (or a client connected to vCenter) to instruct VMware Tools (running inside a powered-on virtual machine) to retrieve a specified file from the guest operating system. The file is then staged for transfer from the ESXi host to the entity that initiated the API call.
When Do These Logs Trigger?
These log entries are generated whenever any authorized entity uses the vSphere API to retrieve a file from a VM's guest OS. This operation requires VMware Tools to be installed and running in the guest OS, and for the VM to be powered on.
Common operational scenarios that trigger these logs include:
Who Initiates These API Calls?
This API call involves two distinct user layers:
1. The Initiating vCenter User/Service Account:
2. The Guest OS User Account:
How to Identify the Initiator?
The opID (e.g., ########-##) in the provided log entry is a key identifier. By searching vCenter Server's vpxd.log around the exact timestamp of the BEGIN lro entry, other log lines associated with the same opID will typically reveal which vCenter-level user account initiated this specific operation.
For best practices related to the StartProgramInGuest API, please refer to the following KB: Best practices for StartProgramInGuest API