After upgrading/installing vCenter Server 6.7.0d 9451876 unable to login onto VAMI page, but able to login using putty on VCSA using same root password.
This is known issue, if we are having any special characters such as : or . (colon or dot) in the password.
applmgmt.log:
======================
2018-09-28T06:31:21.515 [19733]INFO:vmware.vherd.transport.ssh_access_collector:Feature switch: VCSA_SSH_ACCESS_EVENT disabled.
2018-09-28T06:31:26.515 [19733]INFO:vmware.vherd.transport.ssh_access_collector:Feature switch: VCSA_SSH_ACCESS_EVENT disabled.
2018-09-28T06:31:29.717 [19733]ERROR:vmware.vapi.server.wsgi_server:too many values to unpack (expected 2)
Traceback (most recent call last):
File “/usr/lib/vmware-vapi/lib/python/vapi_runtime-2.100.0-py2.py3-none-any.whl/vmware/vapi/server/wsgi_server.py”, line 111, in _handle_rest_call
output = self._rest_handler.invoke(request, endpoint, args)
File “/usr/lib/vmware-vapi/lib/python/vapi_runtime-2.100.0-py2.py3-none-any.whl/vmware/vapi/rest/handler.py”, line 994, in invoke
security_context = self.security_context_builder.build(request)
File “/usr/lib/vmware-vapi/lib/python/vapi_runtime-2.100.0-py2.py3-none-any.whl/vmware/vapi/rest/handler.py”, line 725, in build
security_context = parser.build(request)
File “/usr/lib/vmware-vapi/lib/python/vapi_runtime-2.100.0-py2.py3-none-any.whl/vmware/vapi/security/user_password.py”, line 65, in build
request)
File “/usr/lib/vmware-vapi/lib/python/vapi_runtime-2.100.0-py2.py3-none-any.whl/vmware/vapi/security/user_password.py”, line 89, in _get_username_password_from_auth_header
username, password = user_password_str.split(‘:’)
ValueError: too many values to unpack (expected 2)
2018-09-28T06:31:29.719 [19733]INFO:twisted:”127.0.0.1″ – – [28/Sep/2018:06:31:29 +0000] “POST /rest/com/vmware/cis/session HTTP/1.0″ 500 187 ”
======================
Workaround is to reset the password which doesn’t contain these characters.
And it has been fixed in 6.7u2 which is expected to be released in Q4 2018.