NEUDORFER.TECH
“Any sufficiently advanced technology is indistinguishable from magic.” – – Arthur C. Clarke
I’ve made a lot of progress but after successfully adding 200+ hosts to the domain using the steps in this article here, I started to run into errors. A ton of trial and error later, I’ve included most of the common problems to what I found below. These are not necessarily all the issues you will run into. They are also presented without liability if you try running the fixes. It’s worked in my environment and applied after testing in non-prod along with implementing normal change controls used by my organization.
– add image of error here –
One of the first errors I ran into was that my account had a set number of Joins. Reaching out to VMware pointed me to check with my Server (active directory{?}) team. They updated the service account being used to have a max number of joins. This cleared up the first issue but I was still running into errors.
https://docs.microsoft.com/en-US/troubleshoot/windows-server/identity/default-workstation-numbers-join-domain
https://kb.vmware.com/s/article/52929
Some businesses may leverage a security concept of “least permissions”,”least privileged user” or “least privilege model”. In that case, the use of Domain Administrator accounts may not be desirable.
This article defines the least amount of Active Directory (AD) domain permissions an AD user needs on an Organizational Unit (OU) or Computers container to successfully join a vCenter Server appliance in to an AD domain.
Microsoft has documented minimally required permissions.
Reset Password
Read and write Account Restrictions
Validated write to DNS host name
Validated write to service principal name
Create and Delete Computer objects
The additional permission required is Read/Write public information and Description.
I want to make note of this last line. It’s not very obvious in the KB or any other article. Read/Write Description is the second permission that the account needs. We’re doing testing now to see if this is one of the fixes.
This issue may occur when the network firewall is blocking the required ports.
Firewall access: Make sure that there is no firewall blocking the following ports both UDP and TCP: https://kb.vmware.com/s/article/1026538
88 – Kerberos authentication
123 – NTP
135 – RPC
137 – NetBIOS Name Service
139 – NetBIOS Session Service (SMB)
389 – LDAP
445 – Microsoft-DS Active Directory, Windows shares (SMB over TCP)
464 – Kerberos – change/password changes
3268- Global Catalog search
This is the current error I’m dealing with. Googling it leads to articles talking about permissions. You should definitly double check permissions but working with our server team we’ve proven that they are not an issue. Vmware has been going back and fourth working on getting more logs.
These are the steps VMware requested we go through to get better logging. The commands in red to set logging levels DID NOT work. I’ve included the one that did below in green.
/usr/lib/vmware/likewise/bin/lwio set-log-info trace