How To Extend Datastore Capacity in the vSphere Client

Use one of the following methods to increase a VMFS datastore:

  • Add a new extent. An extent is a partition on a storage device. You can add up to 32 extents of the same storage type to an existing VMFS datastore. The spanned VMFS datastore can use any or all of its extents at any time. It does not need to fill up a particular extent before using the next one.
  • Grow an extent in an existing VMFS datastore, so that it fills the available adjacent capacity. Only extents with free space immediately after them are expandable.

If a shared datastore has powered on virtual machines and becomes 100% full, you can increase the datastore’s capacity only from the host with which the powered on virtual machines are registered.


Required privilege: Host.Configuration. Storage Partition Configuration


Log in to the vSphere Client and select a host from the Inventory panel.

Click the Configuration tab and click Storage.

From the Datastores view, select the datastore to increase and click Properties.

Extend Datastore ESXi
Extend Datastore ESXi
Click Increase.

Select a device from the list of storage devices and click Next.

Extend Datastore ESXi
Extend Datastore ESXi
Extend Datastore ESXi
Extend Datastore ESXi


To add a new extent – Select the device for which the Expandable column reads NO.

To expand an existing extent – Select the device for which the Expandable column reads YES

Review the Current Disk Layout to see the available configurations and click Next.

Select a configuration option from the bottom panel.

Depending on the current layout of the disk and on your previous selections, the options you see might vary.


Use free space to add new extent – Adds the free space on this disk as a new extent.

Use free space to expand existing extent – Expands an existing extent to a required capacity.

Use free space – Deploys an extent in the remaining free space of the disk. This option is available only when you are adding an extent.

Use all available partitions – Dedicates the entire disk to a single extent. This option is available only when you are adding an extent and when the disk you are formatting is not blank. The disk is reformatted, and the datastores and any data that it contains are erased.

Extend Datastore ESXi
Extend Datastore ESXi

Set the capacity for the extent.

The minimum extent size is 1.3GB. By default, the entire free space on the storage device is available.

Click Next.

Extend Datastore ESXi
Extend Datastore ESXi

Review the proposed layout and the new configuration of your datastore, and click Finish.

Extend Datastore ESXi
Extend Datastore ESXi

What to do next

After you grow an extent in a shared VMFS datastore, refresh the datastore on each host that can access this datastore, so that the vSphere Client can display the correct datastore capacity for all hosts.

Related Article: Increase VMFS Datastore Capacity in the vSphere Client

How to recover GRUB and Root password on VCSA

This article will provide the step by step screenshot to recover the VCSA (5.5 and 6.0 tested) root password and breaking the GRUB password.

VMware vCenter Appliance(VCSA) is a pre-configured Linux VM based on SUSE Linux.
If you forget the root password of the appliance, you need to recover the root password like other Linux Operating systems.
Recovering root password is very simple if there is no grub password has been setup or if you know the GRUB boot loader password. If you don’t know the grub password, then you need to reset the grub password first by using Redhat or SUSE Linux DVD or live cd such Hiren’s Boot CD.


If you deployed a VCSA changing grub password, and you lost it, you can remove it following this steps. Default grub passsword for VCSA is ‘vmware‘:

  1. Power OFF VCSA Server (it culd be a Physical server or VM);
  2. Insert a Live Boot CD linux for recover (Live Linux, Hiren’s Boot etc..);
  3. Power ON the Server, then Boot from CD;
  4. Start Recovery procedure from CD;
  5. Mount VCSA file system on a mount point like ‘/mnt/vcsa‘, in RW mode: ‘mount -o remount,rw /partition/identifier /mount/point‘;
  6. Navigate into /mount/point/boot/grub;
  7. List file into grub and find ‘menu.lst‘;
  8. Ensure to backup menu.lst: ‘cp menu.lst menu.lst.bck‘;
  9. Edit menu.lst with Vim editor or similar, then remove or place # to comment the ‘Password’ row:Recover Grub Password, commented ‘password’
  10. Exit VIM saving;
  11. Reboot Server.


  1. Start the VCSA Server (or VM) and interrupt the GRUB menu by pressing “ESC” key .  Press “e” edit the commands;If you know the GRUB password , you can pass it by press “p” and enter the GRUB password. If you don’t know the GRUB password , you need to follow the above procedure to break the grub password first.

    Recover Root Password Linux
    Recover Root Password Linux
  2. Press “e” to edit the commands again for the kernel;
  3. Append “init=/bin/bash” in this step and press enter;
  4. Press “b” to boot the system;
  5. You will get the bash;
  6. Set the new root password for VCSA ‘passwd root’;
  7. Exit the shell using “exit” command.

Once the system is booted , you should be able to login with new root password.

Related article:

How To Design An Effective Naming Convention

While recording my VMware vSphere 5 Training course this past summer, I made mention that I developed a process for building an effective naming convention for enterprises. Server and desktop virtualization significantly increases the number of named objects within our enterprises, so an effective naming convention that describes what an object is, its location, function and purpose is critical. Doing so allows us to identify objects in a speedy way, but it also provides a structured way of searching for objects using keywords in a logical manner.
Even as I developed these guidelines, I did not think it would interest folks very much. But I started receiving near daily tweets and e-mails requesting a copy of the document. So, I’ve decided to publish it and share it with everyone in today’s blog.
Here are my basic guidelines for the object naming convention:

  • A name should identify the device’s location and its purpose/function/service.
  • A name should be simple yet still be meaningful to system administrators, system support, and operations.
  • The standard needs to be consistent. Once set, the name should not change.
  • Avoid special characters; only use alphanumeric characters.
  • Avoid using numeric digits, except for the ending sequence number.
  • Avoid the use of specific product or vendor names, as those can be subject to change. (There are some generally accepted exceptions: Oracle, SMS, SQL, CTX, VMW)

Here are some basic recommendations:

  • The name should begin with a rigid header portion that identifies the location and optionally a type identifier. These should be followed by a delimiter to signify the end of the header portion. This delimiter shall be a ” – ” (dash) unless the system does not recognize a “-“. In this case, substitute the dash for another suitable agreed-upon character (i.e. $ or #).
  • Allow for a variable section that completes the identification (function, service, purpose, application).
  • End the name with a unique ID, a sequence number, which can be multi-purpose.
  • Allow for flexibility. Since technology is constantly evolving, this standard must also be able to evolve. When necessary, this standard can be modified to account for technological, infrastructure, and or business changes.
  • There must be enforcement, along with accurate and current documentation for all devices.Here is an example of the proposed naming convention standard


Naming Convention
Naming Convention

Header portion

  • GG — Geographical location
  • L — Location should be generic and not vendor- or building-specific to facilitate moves, building name changes due to mergers, acquisitions or dissolution of business, etc.
  • T — Type – — Dash is a required delimiter to signify the end of the header portion

Variable portion:

  • AAA — Function /Service/Purpose
  • BBB — Application(Unique ID)
  • ## — 2 digit sequence #

Values Defined:


  • CH — Chicago
  • NY — New York
  • LN — London
  • SY — Sydney
  • MA — Madrid
  • SI — Singapore
  • MU — Mumbai


  • D — Main Data Center
  • C — COLO Data Center
  • T — Test Area (should be used for test machines that are to permanently stay in the test area)

Type (optional):

  • V — Virtual
  • C — Cluster server
  • P — Physical
  • O — Outsourced or vendor supported system

Delimiter (required):

  • – A “-” (dash) will be used unless the system does not recognize a “-” at which point an agreed upon character can be substituted. This could be a $ or # or other character.

Variable portion – AAA Identify the primary purpose of the device:

  • DC — Domain Controller
  • FS — File Server
  • PS — Print Server
  • ORA — Oracle database
  • SQL — SQL database
  • DB — other database(s)
  • EXH — Microsoft Exchange
  • CTX — Citrix Server
  • ESX — VMware ESX Server

Variable portion BBB Identify the Application on this server.

If the server is for a specific application, then an application identifier should be the second part of this portion of the name, preceded by the service:

  • JDE — JDEdwards
  • DYN — Dyna
  • EPC — Epic

This area of the name offers a lot of flexibility to handle identifiers for specific purposes, functions, and/or applications. There are many challenges to select identifiers that are meaningful and consistent and are not subject to frequent change. Here are some examples based on th guidelines I propose above:

  • CHD-DC01 — Chicago Office, Data Center, Domain Controller, sequence # 1
  • CHD-FS01 — Chicago Office, Data Center, File Server, sequence # 1
  • CHD-EXH01 — Chicago Office, Data Center, Microsoft Exchange, sequence # 1
  • CHD-ESX01 — Chicago Office, Data Center, VMware ESX Server, sequence # 1
  • CHC-CTXJDE01 — Chicago Office, Data Center, Citrix Server,JDEdwards Application, sequence # 1
  • CHC-WEB01 — Chicago Office, Data Center, Web Server, sequence # 1

Unique ID / sequence number

## This is a 2 digit sequence number

I would love to hear your comments on this naming convention and if you have ideas to improve it.

Related Article: Link