-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Transition to Publish-PasswordHealth
from Publish-LocalUserExpiry
#90
Comments
Publish-PasswordHealth
instead of Publish-LocalUserExpiry
for 4.4 and abovePublish-PasswordHealth
instead of Publish-LocalUserExpiry
for VCF 4.4 and above
Publish-PasswordHealth
instead of Publish-LocalUserExpiry
for VCF 4.4 and abovePublish-PasswordHealth
from Publish-LocalUserExpiry
Duplicate of #40 |
Closing this issue in favor of #40. Context from this issue has been copied to the preceding issue. |
Reopening this issue. Taking a look at the information returned:
Component Resource Alert Message
--------- -------- ----- -------
ESXI sfo01-m01-esx01.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx01.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx02.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx02.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx03.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx03.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx04.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-m01-esx04.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx01.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx01.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx02.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx02.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx03.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx03.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx04.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
ESXI sfo01-w01-esx04.sfo.rainpole.io GREEN ESXI password is set to never expired. Verified using command Check password expiry with PyVim
NSX sfo-m01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-nsx01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-nsx01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-m01-nsx01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-en02.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-nsx01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
NSX sfo-w01-nsx01.sfo.rainpole.io GREEN NSX password expiration date is far enough. Verified using Check password expiry with v1/node/users API
SDDC sfo-vcf01.sfo.rainpole.io GREEN SDDC password expiration date is far enough. Verified using shell chage -l root
SDDC sfo-vcf01.sfo.rainpole.io GREEN SDDC password expiration date is far enough. Verified using shell chage -l vcf
SDDC sfo-vcf01.sfo.rainpole.io GREEN SDDC password expiration date is far enough. Verified using shell chage -l backup
vCenter sfo-m01-vc01.sfo.rainpole.io GREEN vCenter password expiration date is far enough. Verified using Check password expiry with api/appliance/local-accounts API
vCenter sfo-w01-vc01.sfo.rainpole.io GREEN vCenter password expiration date is far enough. Verified using Check password expiry with api/appliance/local-accounts API
Component Resource User Alert Message
NSX Edge sfo-m01-en01.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Edge sfo-m01-en01.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
NSX Edge sfo-m01-en01.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
NSX Edge sfo-m01-en02.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Edge sfo-m01-en02.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
NSX Edge sfo-m01-en02.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
NSX Manager sfo-m01-nsx01a.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Manager sfo-m01-nsx01a.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
NSX Manager sfo-m01-nsx01a.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
vCenter sfo-m01-vc01.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
SDDC sfo-vcf01.sfo.rainpole.io vcf GREEN Password will not expire within the next 15 days. Verified using chage -l vcf.
SDDC sfo-vcf01.sfo.rainpole.io backup GREEN Password will not expire within the next 15 days. Verified using chage -l backup.
SDDC sfo-vcf01.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Edge sfo-w01-en01.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Edge sfo-w01-en01.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
NSX Edge sfo-w01-en01.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
NSX Edge sfo-w01-en02.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
NSX Edge sfo-w01-en02.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
NSX Edge sfo-w01-en02.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Manager sfo-w01-nsx01a.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root.
NSX Manager sfo-w01-nsx01a.sfo.rainpole.io audit GREEN Password will not expire within the next 15 days. Verified using chage -l audit.
NSX Manager sfo-w01-nsx01a.sfo.rainpole.io admin GREEN Password will not expire within the next 15 days. Verified using chage -l admin.
vCenter sfo-w01-vc01.sfo.rainpole.io root GREEN Password will not expire within the next 15 days. Verified using chage -l root. The |
- Updates `Publish-PasswordHealth` to return the results from the SoS Health Summary JSON data. #90 - Updates `Invoke-VcfHealthReport` to use the `Publish-PasswordHealth` cmdlet. #90 - Updates `Publish-PasswordHealth` to include an "Expires In (Days)" column. #40 - Removes `Publish-LocalUserExpiry` in favor of the `Publish-PasswordHealth` cmdlet. #90 - Bumps the module version to v2.0.0.1004. - Updates `CHANGELOG.md`. Signed-off-by: Ryan Johnson <johnsonryan@vmware.com>
- Updates `Publish-PasswordHealth` to return the results from the SoS Health Summary JSON data. #90 - Updates `Invoke-VcfHealthReport` to use the `Publish-PasswordHealth` cmdlet. #90 - Updates `Publish-PasswordHealth` to include an "Expires In (Days)" column. #40 - Removes `Publish-LocalUserExpiry` in favor of the `Publish-PasswordHealth` cmdlet. #90 - Bumps the module version to v2.0.0.1004. - Updates `CHANGELOG.md`. Signed-off-by: Ryan Johnson <johnsonryan@vmware.com>
- Updates `Publish-PasswordHealth` to return the results from the SoS Health Summary JSON data. #90 - Updates `Invoke-VcfHealthReport` to use the `Publish-PasswordHealth` cmdlet. #90 - Updates `Publish-PasswordHealth` to include an "Expires In (Days)" column. #40 - Removes `Publish-LocalUserExpiry` in favor of the `Publish-PasswordHealth` cmdlet. #90 - Bumps the module version to v2.0.0.1004. - Updates `CHANGELOG.md`. Signed-off-by: Ryan Johnson <johnsonryan@vmware.com>
I'm going to lock this issue because it has been closed for 30 days. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Code of Conduct
Description
Publish-PasswordHealth
reads data from SOS Utility and adds it to the html report. Before VCF 4.4, it didnt include local user account.Publish-LocalUserExpiry
connects to individual components in SDDC and collects the data from there including local user account.As of 4.4, both cmdlets return the same data.
Use Case(s)
This enhancement will help:
Potential Configuration
NA
References
No response
The text was updated successfully, but these errors were encountered: