I just installed a few VIBs to ESXi. But how can I see what actually was installed? I mean which files were added/modified and where are they?
esxcli software vib list | grep -i <vender or vib> to narrow you list..
I might not describe my problem correctly, so once again:
I do not want to have list of VIBs installed (I know how to get it).
What I DO want is to see list of files one particular VIB installed.
Example: "esxcli software vib list" shows me, that "vmware-esx-storcli-1.09.13" VIB is already installed. And now I want to know which files did it bring with itself. Where do I have to look for that "storcli" content. Which files on esxi-filesystem are part of that VIB. Something like:
How can I get this?
maybe you can check inside the vib and see what files are included
i think VIB autor can do that
The XML files in this directory:
Have a list of files the packages contain.
/var/db/esximg/vibs # cat vmware-esx-MegaCli-8.07.07--1938763172.xml
<vib version="5.0"><type>bootbank</type><name>vmware-esx-MegaCli-8.07.07</name><version>8.07.07-01</version><vendor>LSI</vendor><summary>MegaRAID Command Line Tool for ESX Server</summary><description>MegaRAID Command Line Tool for ESX Server</description><release-date>2012-12-19T15:56:09.224245+00:00</release-date><urls><url key="General info">http://www.lsi.com</url></urls><relationships><depends/><conflicts/><replaces/><provides/><compatibleWith/></relationships><software-tags/><installdate>2015-05-19T10:05:19.933253+00:00</installdate><system-requires><maintenance-mode>false</maintenance-mode></system-requires><file-list><file>opt/lsi/MegaCLI/MegaCli</file><file>opt/lsi/MegaCLI/libstorelib.so</file></file-list><acceptance-level>partner</acceptance-level><live-install-allowed>true</live-install-allowed><live-remove-allowed>true</live-remove-allowed><cimom-restart>false</cimom-restart><stateless-ready>true</stateless-ready><overlay>false</overlay><payloads><payload name="vmware-esx-Mega" type="vgz" size="750181"><checksum checksum-type="sha-256">124e47800bbede149019547cf791f7e902702775be21c2e0211dde00d50b6d45</checksum><checksum checksum-type="sha-1" verify-process="gunzip">385b7360134241da9f1ac9b88361fd72452dcb40</checksum></payload></payloads></vib>
Then you can go to this site:
And convert xml to json which is a bit easier to read when scanning for files.
This could be done with various python utilities but this is a quick and dirty way to do it one the host itself.