6.5.1

Table Of Contents
Prerequisites
Inform your support representative that host encryption mode is enabled for the ESXi host. Your support
representative might ask you to decrypt core dumps and extract relevant information.
Note Core dumps can contain sensitive information. Follow your organization's security and privacy
policy to protect sensitive information such as host keys.
Procedure
1 Log in to the vCenter Server system with the vSphere Web Client.
2 Click Hosts and Clusters, and right-click the ESXi host.
3 Select Export System Logs.
4 In the dialog box, select Password for encrypted core dumps, and specify and confirm a password.
5 Leave the defaults for other options or make changes if requested by VMware Technical Support, and
click Finish.
6 Specify a location for the file.
7 If your support representative asked you to decrypt the core dump in the vm-support package, log in
to any ESXi host and follow these steps.
a Log in to the ESXi and connect to the directory where the vm-support package is located.
The filename follows the pattern esx.date_and_time.tgz.
b Make sure that the directory has enough space for the package, the uncompressed package, and
the recompressed package, or move the package.
c Extract the package to the local directory.
vm-support -x *.tgz .
The resulting file hierarchy might contain core dump files for the ESXi host, usually in /var/core,
and might contain multiple core dump files for virtual machines.
d Decrypt each encrypted core dump file separately.
crypto-util envelope extract --offset 4096 --keyfile vm-support-incident-key-file
--password encryptedZdump decryptedZdump
vm-support-incident-key-file is the incident key file that you find at the top level in the directory.
encryptedZdump is the name of the encrypted core dump file.
decryptedZdump is the name for the file that the command generates. Make the name similar to
the encryptedZdump name.
vSphere Security
VMware, Inc. 172