Category Archives: Howto Tutorials (EN)

Knowledge Network for Tutorials, Howto’s, Workaround, DevOps Code for Professionals.

How to Creating ESXi Scratch Partition

Creating ESXi Scratch Partition: Size of scratch partition <UUID> is too small. Recommended scratch partition size is 4096 MB

If this message is found in the Event Viewer of an ESXi host, a scratch partition should be created.

To creating ESXi Scratch Partition, open the vSphere Web Client to create a directory.Loose ESXhost. Go to Storage and open the Browse context menu above the desired datastore, or click Datastore Browser.

Creating ESXi Scratch Partition
Data Storage Browser – Create Scratch Directory

Then in the vSphere Web Client you navigate to:

Management > System > Advanced Settings

and enter the search term on the right side of the search box:
ScratchConfig.ConfiguredScratchLocation . Then click on Option Edit and add the path to the previously created directory.

Creating ESXi Scratch Partition. vSphere Management > System > Advanced Settings
vSphere – ScratchConfig.ConfiguredScratchLocation

By clicking on Create directory, for example, the Vereichnis .locker-ESXHost is created for the scratch partition.

Creating a scratch partition in the ESX shell

A scratch directory can also be created via the ESXi Shell Console, for example by opening an SSH terminal with KiTTY and creating a scratch directory via CLI.

mkdir /vmfs/volumes/5b2fb100-bbe22f82-fe22-ececc8968f68/.locker-ESXHost

  The path to the scratch directory must be specified with the UUID, here as an example /vmfs/volumes/datastore1 is the path /vmfs/volumes/5b2fb100-bbe22f82-fe22-ececc8968f68/.locker-ESXHost. The point at the beginning means that it is a hidden forgiveness, as is usual with unixoid systems.

 

Get User SID in Command Prompt or PowerShell

How to Get Windows User SID

For system administrators, querying information about the environment and configuration is an everyday job. One of these information is the Security Identifier (SID), which is used by Windows to identify users and groups. User names on a network can be duplicated, so that there is no conflict, each user is assigned a unique SID.

When assowing user rights, Windows uses the SID defined for that purpose. A SID is roughly similar to a Globally Unique Identifier (GUID) that each object in Windows owns. However, SIDs receive only security-relevate objects, because the SID is used for authentication of authenticity.

This SID identifies the user across the network. Even if the user’s name is changed, the SID persists, the user on the network is deleted and his SID is unchanged.

Structure of my SID

S-1-5-214147432549-3588766049-1627529166-1001

The SID (Security Identifier) tokens have the following meanings:

SIt is a SID
1Revision
5Identifier Authority
18System profiles
19Localservice
20Networkservice
21User profile
4147432549-3588766049-1627529166Domain ID, Computer ID
1001User ID (RID)

Table with SID of system accounts

Query SID of all user accounts

If you want to get the SID of all user accounts. You can do so with the following command in a Command Prompt Win+Rcmd

wmic useraccount get sid,name

All SIDs and user names are output.

C:\>wmic useraccount get sid,name
Name SID
Administrator
S-1-5-21-4147432549-3588766049-1627529166-500
DefaultAccount
S-1-5-21-4147432549-3588766049-1627529166-503
John
S-1-5-21-4147432549-3588766049-1627529166-1001
Guest
S-1-5-21-4147432549-3588766049-1627529166-501

Here are the SIDs of the local accounts. For a query in a network domain, there may be some more.

Computer and domain SIDs consist of a base SID and a relative ID (RID) appended to the base SID. If the computer belongs to a domain, another SID comes into play. The computer still has its own computer SID and local accounts and groups. But is also a member of a domain and therefore has a SID that represents the computer account in that domain. The SID of a computer account consists of the SID of the administrator account, minus the RID, which is omitted last 3 bit or 4 bit (500).

Query to get my own user SID

If a user’s SID is to be specifically queried, such as his own user SID, this can be done with the following command.

wmic useraccount where name='%username%' get name,sid

If you want to know another user’s SID, you can specify a user instead of %username%, e.g., john.

The following command detects the SID of the user who is currently logged on in an AD domain.

wmic useraccount where (name='%username%' and domain='%userdomain%') get domain,name,sid

In the opposite way, it is also possible to query the user name of a SID.

wmic useraccount where sid='S-1-5-21-4147432549-3588766049-1627529166-1001' get name

Get user SID in the PowerShell

In the PowerShell, the get user SID command looks like this.

[wmi] "win32_userAccount.Domain='$env:UserDomain',Name='$env:UserName'"

The user name and SID of the user logged on to the company domain is output.

PS C:\>[wmi] "win32_userAccount.Domain='$env:UserDomain',Name='$env:UserName'"

AccountType : 512
Caption: company-john
Domain : company
SID : S-1-5-21-4147432549-3588766049-1627529166-1001
FullName : john smith
Name : john

For example, you can use the user SID to find the ProfileImagePath for the user profile in the registry in order to make repairs or adjustments. The user SID is also used as an ObjectID in SQL tables to identify and authorize users from Active Directory in an application, such as Dynamics AX.

Get User SID in Command Prompt or PowerShell. you can use the SID to find the ProfileImagePath for the user profile in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\NT-CurrentVersion\ProfileList