During a VMware Site Recovery Manager (SRM) recovery plan test, certain virtual machines (VMs) that utilize VM Encryption (potentially including vTPM) on the protected site generate warnings or fail to complete the recovery process on the recovery site. The warnings indicate an inability to update virtual machine configuration files and an absence of required encryption keys.
This issue manifests with messages such as:
Warning during Recovery Plan test:
"Failed to update embedded paths in virtual machine file '/vmfs/volumes/.../VMname/VMname.vmx'. Invalid virtual machine configuration."
From the recovery SRM appliance, we see these messages for the VMs:
--> vmFile = "/vmfs/volumes/.../VMname/VMname.vmx",
--> fault = (vim.fault.InvalidVmConfig) {
--> faultCause = (vmodl.MethodFault) null,
--> faultMessage = <unset>,
--> property = "snapshot.dict"
--> msg = "Invalid virtual machine configuration."
From the recovery host, we see this in hostd.log:
2025-10-29T14:27:25.778Z In(166) Hostd[2099670]: [Originator@6876 sub=Libs opID=d7c7df28-6dd6-47cf-abd4-############-test:d157:c531:d4f9:06bd:ccee:7dbf:6583-54-01-5e-41c0 sid=52c9db04 user=vpxuser:VSPHERE.LOCAL\SRM-40ca508c-b09d-49fa-a246--############] [msg.dictionary.unlock.noKey] The dictionary is encrypted and the required key is not available."
kmxa.log on the recovery host:
2025-10-29T15:34:32.162Z Er(163) kmxa[2099106]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-56] Failed to resolve key 7fab1d9ead6c4e118720bc505081a33629e9ece2423a4987b1e64b0700bd46bc/prod_2931_skp_gen_01 with Trusted Key Provider.
2025-10-29T15:34:32.485Z Er(163) kmxa[2099102]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-57] Trust Authority Components not configured.
2025-10-29T15:34:32.485Z Er(163) kmxa[2099102]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-57] Failed to decrypt key 03289668c891496fa1d3c26af0d5eba03e480156f65546278a770a0a5a7b27a5/prod_2931_skp_gen_01: Error:
2025-10-29T15:34:32.485Z Er(163) kmxa[2099102]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-57] com.vmware.vapi.std.errors.error
2025-10-29T15:34:32.485Z Er(163) kmxa[2099102]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-57] Messages:
2025-10-29T15:34:32.485Z Er(163) kmxa[2099102]: [Originator@6876 sub=Libs opID=resolveKey-52420e9f-63d5-d04b-12b4-############-57] com.vmware.esx.trusted_infrastructure.trust_authority_services.not_configured<Incomplete or missing Trust Authority Components configuration.
The primary cause of this issue is the inability of the recovery ESXi hosts to access, resolve, or decrypt the necessary encryption keys for the affected VMs' configuration files (specifically the .vmx file and its embedded snapshot.dict property). During an SRM test recovery, SRM performs a simulation that may not fully engage all the key management mechanisms required for encrypted VMs in the same way a full failover does.
The resolution involves thoroughly verifying and, if necessary, reconfiguring the Key Management System (KMS) and Trust Authority components on the recovery site, followed by a controlled test.
Verify KMS and Trust Authority Components Configuration on the Recovery Site:
Understand vTPM vs. VM Encryption:
Perform another SRM Recovery Plan Test:
Consider a Controlled Full Failover (Advanced/Cautionary Step):