YYYY-mm-dd HH:MM:SS,xxx WARNING main.py:583 Command cannot succeed because this host is in crypto safe mode and the vm-support incident key is missing.
To collect useful coredumps, perform these tasks:
1. Generate a vm-support incident key by running:
crypto-util keys vm-support --password prolog
2. Run vm-support:
vm-support [options]
3. Perform cleanup:
crypto-util keys vm-support epilog
vim-cmd hostsvc/runtimeinfo | grep -i cryptostate
output)
cryptoState = "pendingIncapable",
crypto-util keys getkidbyname HostKey
output)
vmware:key/fqid/<VMWARE-NULL>/a/ASEAAgEAl%2f...
Disabling Host Encryption Mode requires a reboot of the ESXi host.
For instructions on how to deactivate Host Encryption Mode, please refer to the following documentation:
Reboot the ESXi host and verify that the cryptoState transitions from pendingIncapable to incapable.
Workaround:
Even in this state, a vm-support bundle can still be collected through the vSphere Client or ESXi Host Client.
Alternatively, you can follow the on-screen instructions to generate an incident key and collect the logs via CLI:
1. Generate a vm-support incident key by running:
crypto-util keys vm-support --password prolog
2. Run vm-support:
vm-support [options]
3. Perform cleanup:
crypto-util keys vm-support epilog