How to unprotected HA VM

Hello everybody
I have configure a cluster with 2 esxi with the version 5.5u2 and a vcenter server on which I have activate the vSphere HA.
By default, all the virtual machines associated to the cluster are protected (monitored) by the vSphere HA (using the cluster HA default options).
How can i configured an unprotected virtual machine ??
For do it, i used the web client, select the Cluster / Manage / Configuration and VM overrides. I add the VM and the "VM restart priority" and "VM monitoring" to disabled.
After I go on the summary of the VM i can see the logo "Protected by Vmware HA".
Finally, on the cluster / Monitor / vSphere HA Configuration Issues, I see the total number virtual machines associated to protected.
Thanks in advance for your help
Best Regards
Matt

Even though you disable VM restart priority" and "VM monitoring", until VM is in powered ON state, vSphere is going to say "VM" is protected.
1. if VM restart policy is disabled & VM monitoring is enabled: Host is up and VM is up, vSphere HA will keep in protected list.
              >> when host fails, VM can not be restarted on other available host. Even If failed host comes back, still VM will not be restarted, it will be powered OFF and now vSphere HA will remove that VM from protected list.
             >>When Guest OS fails, HA will restart that Guest on the same host and HA continue to keep in protected list.
2. if VM restart policy is disabled & VM monitoring is disabled: Host is up and VM is up, vSphere HA will keep in protected list.
             >> when host fails, VM can not be restarted on other available host. Even If failed host comes back, still VM will not be restarted, it will be powered OFF and now vSphere HA will remove that VM from protected list.
             >>When Guest OS fails, HA can not  restart that Guest on the same host but as VM itself does not have any issue (VM is ON but you can not access Guest), HA continue to keep that VM in protected list.
3.if VM restart policy is Enabled & VM monitoring is disabled: Host is up and VM is up, vSphere HA will keep in protected list.
           >> When host fails, VM will be restarted on other available host. , After restart , it will be powered ON and HA continue to keep that VM in protected list
             >>When Guest OS fails, HA can not  restart that Guest on the same host but as VM itself does not have any issue (VM is ON but you can not access Guest), HA continue to keep that VM in protected list
Note that there is difference between VM failure and GOS failure.
let me know if you have any doubt.

Similar Messages

  • How to access Excel PROTECTED spreadsheet in SharePoint Web Access Web Part in SharePoint2013?

    I have excel file which is protected by password. I need to access Sheet 1 on SharePoint Web Part Page on Dashboard. While I add protected I can not able to Excel Sheet is corrupted as per below image.!
    While I add simple Excel Spreadsheet, it works properly. Is there any alternate solution to display excel spreadsheet on Web Page using Excel Services.

    Hi,
    Please try to remove protection from a worksheet to solve this issue.
    The following articles for your reference:
    Remove protection from a worksheet
    http://office.microsoft.com/en-001/excel-help/password-protect-worksheet-or-workbook-elements-HP010342808.aspx#BMunprotectsheet
    SharePoint 2013: Excel web access web part Errors and Resolutions
    http://amolmeshe.blogspot.kr/2013_06_01_archive.html
    How to Unprotect an excel sheet without password
    https://uknowit.uwgb.edu/page.php?id=28850
    We can also customize a web part to show the excel sheet.
    Best Regards
    Dennis Guo
    TechNet Community Support

  • How to change protected variants created by users that no longer exist

    There are several older variants for which background jobs are scheduled for daily prcessing.  These variants were created and protected by uses that no longer exist in SAP.
    How to  unprotect and change these variants to reflect new requirements.

    Hi Anam
    1. Execute tcode VARCH and enter the program and variant name and make the changes, if the system allows you to do so.
    2. Check with the basis/security team if they can extend the validity and reset the password for the old ids.
    3. If the above doesnt work, you will need to copy the variants manually
    Moving forward, when you create/change jobs, request the basis/security team to create common ids like OTCADM, P2PADM, etc. Ensure that all the variants and jobs are created/changed using this common id. Basis/Security team can controll by opening and closing the ADM account on request from project team and the usage can be recorded for tracking.
    To check the jobs that use a known variant, use tables TBTCP, TBTCO.
    Best Regards
    Sathees Gopalan

  • Toshiba fingerprint utility cannot unprotect file

    Im haveing toshiba qosmio x500 win 7 64-bit. my toshiba fingerprint utility was running fine and i had some files protected by fingerprint password. i have the old settings backup file and (.tofp file) and the fingerprint key file (key file)
    I recently uninstalled the utility and re-installed it, as it use to sometimes act strange. But after this, even if i import settings from the old backup file, i cannot unprotect the files that were previously protected.
    i get the message "You haven't backed up your key yet" (click here to see error http://www.mediafire.com/?qc4t28jv9bjmtm5 )
    I have tried exporting the settings again to a new file, but i dont know how to unprotect the old files.
    Please help.

    i really do not think you need any other fingerprint files to decrypt your files.  If you used your fingerprint (*by swiping*), you most likely will not need anything else except the software itself that was used to encrypt in the first place.  If you used a file (that is, instead of typing in a password or swiping your fingerprint), you will need that exact version of the file again.  If you swiped your finger, the encryption data is embeded within the file.
    Make sure you are swiping the correct finger
    I hope the encryption software asked you to swipe a few times to ensure that future swipes can be reproduced by you
    Try different angles, speed, starting and ending location of your finger when you swipe
    If you are logged on as a different user, the OS (Windows) will do its own encryption on top of your own encryption.  That is unencrypted text file of another user will be encrypted by the OS and will not be accessible by another user.
    I really do not think any software will be so dangerously ignorant enough to save the user's fingerprint data into another file then use that and only that to decrypt the files, defeating the purpose of having the correct user to swipe.
    The software shoud/may have indications of the software company responsible for the program.  Perhaps one of the programmers may be able to divulge what is needed to decrypt a file
    Best of luck.

  • Can't Stick Order Form onto Catalog

    This is a simple problem, but I can't figure out how to do it.
    I have a catalog. I created an interactive Order Form in LiveCycle 7.0.
    I can't put the two together through "create pdf from multiple files." The LiveCycle form is protected.
    How can I
    --unprotect the form to allow assembly?
    --assemble the form to the main pdf file?
    Thanks.

    I only have Professional 7.0
    When I try to assemble two PDF files, one of which is the order form, I get a "protected" message. Been trying to figure out how to unprotect the order form, to no luck. (It was originally a template provided by adobe).
    Any other suggestions?>??

  • Depot Repair Order Flexibility after SO created

    Hi everyone,
    I have a client who's looking into using the Depot Repair functionality to handle all returns.  What we're finding so far is that everything works well so long as you know what you're going to do with the material before you create the service notification.  We need to be able to receive the material back in before we decide if we're going to repair it, replace it, or just credit the customer.  The Notification type creates and drives the SO processing.  W/in the SO, the item categories seem to be driving the returns subline, the repair subline, and the outboud delivery subline.  I thought perhaps we could change the item cateogories in order to control subsequent processing (ie, before the return is actually processed in VL01n, update the item category on the return to reflect an item category for return for replacement vs return for repair, etc. but the item categories are protected in the SO. 
    Does anybody have a better way of being able to provide the flexibility of determining the type of processing after the Service notification has been created?  If not, does anybody know how to "unprotect" the item category fields so we can update them manually?
    thanks for the assistance,
    Christie
    Edited by: Christie Monacos on Aug 4, 2010 3:53 AM

    Hello Christie
    I am not a CS specialist, but my current  role affords me the opportunity to provide some thoughts. Here the repair process has been automated to 2 distinct stages: a) Receipt and b) Inspection and repair,  to  create multiple documents  and even objects ( Equipment if required) from Service, Sales, Logistics, and Inventory Management perspectives.
    1) For one you can divide the service notifications into 2 types: a) Customer facing, and b) Internal (fault) Notification.
    2) When you receive you can have 3 types of dispositions: a) Review receipt, b) Return for Repair and c) Exchange at Receipt. If all information is available, in case of the last  2 dispositions, the following documents are created:
    a) Equipment if serialized
    b) Customer facing notification
    c) repair order
    d Inbound delivery
    e) Material  document for movement into stock
    f)  service order/s
    g) Internal Fault Service notification
    3) The first one, Review receipt is used when there is not enough information to create a Repair order. At that time the documents created are: a) Customer facing notification, b) Equipment u2013 if serialized, c) Goods receipt material document.  A task is added automatically to the notification for administration action and/or follow up with the customer.Once all info is available, the remaining documents are created using the reference of  Customer facing notification.
    4) Thus the repair order created will have requisite sub-lines, e.g. Return, Exchange, Repair etc.
    So I believe you need to follow the business  process as it happens in SAP.
    Hope this helps. Let me know.
    4)
    4) Once information becomes available, all other documents created.

  • Protech Transport Request in SE09.

    Hi Folks,
    I have protected one Transport Request in SE09. I have done that as my objects locked in that request are being unlocked and getting deleted from req. So, I have protected that.
    But, still i want to know exact functionality of that Protecting Request.
    And please let me know how to unprotect that.
    Thanks in advance
    Peter

    Hi Peter,
    If you want only the owner of a request to be able to add more users, then you can protect the request.
    To do this, select the request and choose Request/task ® Request ® Protect.
    Use the Remove protection function to remove this restriction.
    check the below link for more information:
    http://help.sap.com/saphelp_nw70/helpdata/EN/57/38e2044eb711d182bf0000e829fbfe/frameset.htm
    http://help.sap.com/saphelp_nw70/helpdata/EN/b6/b40613a44411d1846d0000e8a57770/frameset.htm
    http://help.sap.com/saphelp_nw70/helpdata/EN/69/c24c824ba111d189750000e8322d00/frameset.htm
    Regards,
    Ravi Kanth

  • Applying Password-protection for Numbers files?

    It looks great -- at first view. I grabbed my standard Excel file with all my misc. stuff in it, and hit the first snag. It was password-protected, so Numbers wasn't going to let me import it. Okay, that makes sense. So I figure out how to unprotect the file and manage to get it into Numbers. But when I went to apply a password requirement to open it, no joy.
    This seems to be a no-brainer to me, a must-have feature. But the Help tool couldn't find anything on it. If it truly isn't supported then what was supposed to be the Red Letter Day of finally getting rid of the last Microsoft applications is going to have to be delayed until Apple releases an update.
    Ideas?

    KOENIG Yvan wrote:
    If someone protecting files send them to an other one, two formulas are available:
    - 1 - remove the protection
    - 2 - give the key
    The two are usable for an encrypted image disk.
    Yes, but that is not the case I am talking about. You talk about a sender who uses a Mac and knows that the receiver may have problems opening his files.
    I am talking about a PC user who sends out encrypted MS Office documents in the belief that all the recipients have MS Office.
    Example: Let's assume that you work for one of the big companies in Sophia Antipolis or for Carrefour in Antibes. Their management asks all the employees if they can read MS Office files. Everyone who says "yes" gets a confidential encrypted Excel file with pension calculations mailed to them. The other ones get the form in paper format. If you have iWork, you will have to wait for the paper version to arrive. You will have to fill it in on paper and you will have to verify the calculations manually. In some cases there may not even be a paper version available.
    And I am talking about the Mac user who wants to send protected data to a PC user. As the PC User cannot open a Mac disk image, the only solution I can see for an iWork user is an encrypted PDF, and that one will not be editable by the receiver.
    I am not saying that Apple has a duty to fulfill those requirements or that Apple should promote MS Office as a format. I am only saying that as long as iWork does not support password protection, some of iWork's users will have this kind of problems.
    But maybe we are not giving the same meaning to "file protection".
    For me it means "keep it from others view" aka "access denied"
    Maybe, for you, it means "don't give the ability to edit it" aka "read only"
    We give exactly the same meaning to the expression "file protection".

  • How to protect URL with OSSO while leaving sub-URL unprotected

    Hi,
    I have deployed an application to OAS while SSO is enabled and I have the following URL to be protected:
    http://host:port/myContext
    In the myContext application, there is a servlet that I want to be unprotected:
    http://host:port/myContext/myPublic
    I tried two ways to achieve this. One is in mod_osso.conf, create a Location entry like:
    <Location /myContext/>
         require valid-user
         AuthType Basic
    Order deny, allow
         Allow from myPublic
         Satisfy any
    </Location>
    The other way is to create a LocationMatch in mod_osso, like:
    <LocationMatch ^/myContext((?!myPublic).)*$>
    require valid-user
    AuthType Basic
    </LocationMatch>
    The problems with both of these two methods are they seem to break the HTTP server or show down the whole server. I would like to get help on this:
    1. What is the legitimate way to do this: protect a URL while unprotect its sub-page.
    2. In order to protect a new URL, besides adding a Location or LocationMatch , is there something else to do? I don't know why the new entries break/slow down the server.
    Thanks for any help.

    Hi,
    Please refer to this message:
    Re: How to deal with SSO secured webservices
    I tested the described approach and it worked fine for me.
    Best regards,
    IG

  • How do i unprotect a document on a Ipad 2

    How do i unprotect a document on a Ipad 2?
    Some documents is unprotected but as soon as I open them up the edit function become not available anymore associated with the "lock" picture in the file name.
    This is SO annoying!!!?.
    Please help

    Would you explain what you mean by the "edit" function?  What are you trying to do?  Are you trying to edit existing annotations (sticky notes, highlight, freehand drawing, handwritten signature, etc.) or fill in a form?
    Would you check the document permissions of your PDF document on the desktop version of Adobe Reader?  (Sorry, you cannot get this information in Adobe Reader for iOS on your iPad.)
    Open your PDF document in the desktop version of Adobe Reader on a Windows or Mac computer.
    Press Command+D for Mac or Control+D for Windows to bring up the Document Properties dialog.
    Click the Security tab near the top of the dialog.
    Take a screenshot of the dialog.
    Add the screenshot to your next forum reply.  How do I insert an image or video and attach a file?
    Please do NOT send the screenshot as an attachment in email.  The Adobe forums do not accept file attachments.
    The Document Properties dialog has two sections.
    In the first section (Document Security), what is the value for "Security Method"?
    In the second section (Document Restrictions Summary), what are the items marked as "Not Allowed"?
    Here's the sample screenshot of the Document Properties dialog in Adobe Reader XI on Mac.
    Based on the document restrictions, we should be able to tell you whether or not you can perform the operation that you want.
    Thank you.

  • I have 4 songs I have purchased that are "protected" but they don't come up in the itunes plus for purchase to unprotect them.  How do I get them "unprotected"?

    I have some songs I want to sync to my EVO but they are protected.  Others I have purchased for the $.30 on Itunes plus to have them "unprotected" but these 4 songs do not show up on the Itunes plus.  How do I get them so they are unprotected?

    Until Apple releases the iTunes Match feature of iCloud, if the tracks don't appear as eligible for iTunes Plus, there's no direct way to convert them. You can, however, burn those tracks to audio CD which will then behave just as would any other standard audio CD.
    Regards.

  • How do I unprotect my audio files so I can upload them to garage band on my iphone4?

    How do I unprotect my audio files so I can upload them to garage band on my iPhone and use them

    Hi Chris,
    Format the flash drive in FAT32, save the file as you would normally and transfer it to the flash drive, then the PC. It should work fine unless one of the Word apps is older.

  • Have situation on a unprotected wireless when accessing I cannot get a router address.  I'm on system 10.6.8 on MacBook Pro summer 2009.  Any thoughts on how to determine what's up?

    Have situation on a unprotected wireless when accessing I cannot get a router address.  I'm on system 10.6.8 on MacBook Pro summer 2009.  Any thoughts on how to determine what's up?

    You have basically verified that the issue is NOT with your MBP, but with this particular Wi-Fi network. Even though it may be unsecured, the provider may have elected to configure it for MAC filtering. In this case I am referring to the MAC (Media Access Control) address and not your Mac laptop itself. If this has been enabled, your Mac would only be able to connect if the Mac's MAC address was added to that filter.

  • TS1398 an unprotected wifi network brings up the log in screen that goes to the apple home page. how do I prevent this?

    an unprotected wifi network brings up the log in screen that goes to the apple home page. how do I prevent this?

    This seems to be the best working option (while not 100% success):
    From Demo:
    Try this.
    Go to Settings>Safari>Clear History, Cookies and Data. Restart the iPad. Restart the iPad by holding down on the sleep button until the red slider appears and then slide to shut off. To power up hold the sleep button until the Apple logo appears and let go of the button.

  • How to make folder unprotected!

    Hi All,
    This is prakhyath.
    I have a web-application running on Jboss.. Inside the context folder i have several directories having some pre-defined configuration files . I am using Josso for authentication purpose. currently my entire war file content is under Josso authentication. I just want to make one folder unprotected inside the war file.
    My web.xml looks like:-
    <security-constraint>
    <!-- Sample Security Constraint -->
    <web-resource-collection>
    <web-resource-name>protected-resources</web-resource-name>
    <url-pattern>/*</url-pattern>
    <http-method>HEAD</http-method>
    <http-method>GET</http-method>
    <http-method>POST</http-method>
    <http-method>PUT</http-method>
    <http-method>DELETE</http-method>
    </web-resource-collection>
    <auth-constraint>
    <role-name>Authenticate</role-name>
    </auth-constraint>
    <user-data-constraint>
    <transport-guarantee>NONE</transport-guarantee>
    </user-data-constraint>
    </security-constraint>
    How can i prevent authentication for specific folder inside war file....
    Thanks in advance.
    Regards
    Prakhyath

    i have same problem. i would like to move automatically saved Word backup copy to another folder, but the folder action doesn't recognize the save as a new file that needs to be acted upon.

Maybe you are looking for

  • I fail to buy apps in itunes store b'cause i don't have master card or visa accounts''

    I fail to buy apps in itunes store b'cause i don't have master card or visa accounts'

  • IBooks for Mac Doesn't Reopen Books

    iBooks isn't reopening windows after I close it. Here's what I do in sequence: 1. Open iBooks. 2. Double-click a book. 3. Click the fullscreen button in the upper-right corner. 4. Quit iBooks with CMD + Q. 5. Open iBooks. No windows pop up, not even

  • Arch does not umount busy disks before shutdown?

    Hello, Been using Arch on my Laptop, Desktop, Firewall and HTPC for a couple years now. I really like the setup. When shutting down the pc, Arch runs the shutdown scripts that umount the mounted volumes. If the volume is busy, it gives me a message:

  • List of new features in PSE11 vs. PSE10

    Does anyone know where I can get a comprehensive list of features that are new in PSE11 relative to PSE10?  I've seen the high level lists and videos.  But I'm looking for a complete technical type list, not a marketing oriented one.  I am interested

  • Memory leaks in my application

    Hi all, My application is running well but the memory used by my application is not properly released. If my application is kept running for a day ..then the total system memory is used and server got struckup. can any body help me how can trace for