All Posts

Hi Miguel, we plan to introduce encryption of named disks and VM templates as part of the official (GA) release of BYOE solution. Both will be encrypted the same way as regular VMs with the exception... See more...
Hi Miguel, we plan to introduce encryption of named disks and VM templates as part of the official (GA) release of BYOE solution. Both will be encrypted the same way as regular VMs with the exception that deep re-encrypt will not be supported in the GA release. Please let us know if this behavior would cover your use cases?
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a p... See more...
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a per VM basis. The operation will have a number of prerequisites which come from vCenter: the VM needs to be powered off and it must not have snapshots. We plan to introduce this feature either with the GA or with one of the first BYOE releases afterwards. Please confirm what is importance of this use case for you? -Radostin
Hello and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a per VM... See more...
Hello and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a per VM basis. The operation will have a number of prerequisites which come from vCenter: the VM needs to be powered off and it must not have snapshots. We plan to introduce this feature either with the GA or with one of the first BYOE releases afterwards. Please confirm what is importance of this use case for you? -Radostin
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a p... See more...
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow re-encrypt is performed. We are planning to introduce Deep Re-encrypt on a per VM basis. The operation will have a number of prerequisites which come from vCenter: the VM needs to be powered off and it must not have snapshots. We plan to introduce this feature either with the GA or with one of the first BYOE releases afterwards. Please confirm what is importance of this use case for you? -Radostin
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow encryption is being performed. We are planning to introduce Deep Encrypt on ... See more...
Hi @m1gu3l and thanks for your question! Yes, you are right with your observation that with the tech preview only shallow encryption is being performed. We are planning to introduce Deep Encrypt on a per-VM basis. It will have a number of requirements which come from vCenter: the VM needs to be powered off and it must not have snapshots in order to be able to perform the action. We are planning to introduce this feature either with the GA or one of the very first releases afterwards. Can you please confirm what is the importance of this feature for you? -Radostin
Although we have configured a Key Provider for an OrgVDC using the BYOE add-on, we observe that the Named Disks created on that OrgVDC and the vApp templates stored in a catalog backed-up by that Org... See more...
Although we have configured a Key Provider for an OrgVDC using the BYOE add-on, we observe that the Named Disks created on that OrgVDC and the vApp templates stored in a catalog backed-up by that OrgVDC are encrypted using the default KMS, not with the KMS associated to the Key Provider assigned to the OrgVDC. Is that the expected behavior? Will Named Disks and vApp Template encryption be supported by the BYOK add-on in the GA version or future versions? Thanks, Miguel
In Bring Your Own Encryption, when going to a key provider, selecting an OrgVDC and performing the "Change Key" operation, we have observed in vSphere that only a shallow recrypt (i.e., at KEK level)... See more...
In Bring Your Own Encryption, when going to a key provider, selecting an OrgVDC and performing the "Change Key" operation, we have observed in vSphere that only a shallow recrypt (i.e., at KEK level) of the VMs is performed. Is there a way to perform a deep recrypt (i.e., KEK + DEK)? If not, will it be included in the GA version or future versions of the add-on? Thanks, Miguel
We've been looking into this and can confirm you will be able to use roles other than 'tmc:admin' or 'tmc:member' to give access to specific resources. I believe this scenario would've worked if you ... See more...
We've been looking into this and can confirm you will be able to use roles other than 'tmc:admin' or 'tmc:member' to give access to specific resources. I believe this scenario would've worked if you had added the 'Organization Administrator' group to the 'organization.credential.view' role binding or some other 'organization.*' role. Please try this after we GA a release with support for CSE 4.1 and let us know if you run into issues.
My TMC Local is not working as I am waiting for a newer version compatible with CSE 4.1. But I was trying to use Acces Roles to manage/limit K8s API access (e.g: limit certain users to certain namesp... See more...
My TMC Local is not working as I am waiting for a newer version compatible with CSE 4.1. But I was trying to use Acces Roles to manage/limit K8s API access (e.g: limit certain users to certain namespaces) What I noticed was that you need  either tmc-admin` or `tmc-member` roles to log onto TMC CLI (the command line interface for TMC), which allows you to access the k8s API via kubectl. Having  tmc-admin` or `tmc-member` roles automatically gives full (admin) access to TMC managed K8s clusters and I am therefore unable to limit certain users or groups (i.e.: useer `johndoe` should only be able to list namesapces fro k8s cluster xyz). I hope this makes sense. If not, lets wait for a new version of TMC that supports CSE 4.1. Will reinstall and can get into a meeting.
We are still looking into this but I want to make sure I understand what you would like to achieve. Are you trying to use the "Cloud Administrator" role to grant access to the TMC-SM API/GUI so the... See more...
We are still looking into this but I want to make sure I understand what you would like to achieve. Are you trying to use the "Cloud Administrator" role to grant access to the TMC-SM API/GUI so they can define policies/packages/etc in TMC-SM?
Dear @nhutphan1987 , I assume you may have encountered a bug in the Solutions Agent related to the Solutions Landing Zone (SLZ) Org VDC network configuration. Currently, if the SLZ network is set up... See more...
Dear @nhutphan1987 , I assume you may have encountered a bug in the Solutions Agent related to the Solutions Landing Zone (SLZ) Org VDC network configuration. Currently, if the SLZ network is set up with a Static IP Pool, and the subnet mask does not match the default mask for the subnet class (e.g., 10.x.x.x/8, 172.16-32.x.x/16), the Solutions Agent is unable to obtain a valid network configuration, resulting in a failure to orchestrate the installation. This issue is fixed in the upcoming releases of Cloud Director. Meanwhile a workaround is to use SLZ network with DHCP or Static IP Pool where the subnet mask matches the default for the IP class. Please take note of the following: 1. The SLZ network must have access to Cloud Director and depending on the add-on, optionally to the internet. 2. The public address configured in Cloud Director must be resolvable from the machines deployed in that network. 3. An outbound firewall rule to Cloud Director from this network must be in place.
@nhutphan1987 Sorry for the inconvenience! Can you please show us the full error message - click on the failed "Create" action in the UI and give us the text of the error message? This will help us t... See more...
@nhutphan1987 Sorry for the inconvenience! Can you please show us the full error message - click on the failed "Create" action in the UI and give us the text of the error message? This will help us troubleshoot and understand why this happened in your case.
@nhutphan1987 Thanks for trying it out and reporting the issue! I have logged a ticket for the engineers in our internal systems and we'll address the issue before GA.
Dear VMware, I'd like to inform you about the issue when registering a KMS server in BYOE. We have the external KMS and configuring the proxy on BYOE when registering a KMS server but after register... See more...
Dear VMware, I'd like to inform you about the issue when registering a KMS server in BYOE. We have the external KMS and configuring the proxy on BYOE when registering a KMS server but after registering, it does not work. We checked on VCD UI and vCenter key Provider, the proxy settings not be saved, and the proxy settings always empty on VCD and vCenter. To fix it, we have to configure vCenter access to the internet directly to finish the Register external KMS server without Proxy settings. We are using VCD 10.5 GA.
Dear VMware team, I'd like to inform you about the issue when I tried to create the instance of BYOE with GUI following your Tech Preview Document. We can not create an instance of BYOE with UI, the... See more...
Dear VMware team, I'd like to inform you about the issue when I tried to create the instance of BYOE with GUI following your Tech Preview Document. We can not create an instance of BYOE with UI, the error shows "can not research Public URL of VCD". We created an instance of BYOE with CLI successfully, we used a Linux host in the same Organization VDC of Solution Landing Zone to do that. We are using VCD 10.5 GA.  
Revised version 9/5.
Is there a newer version of TMC local that is compatible with CSE 4.1? I tried to install it but it is complaining that no CSE server is available ``` root@PhotonOS-001 [ ~ ]# /mnt/cdrom/linux.... See more...
Is there a newer version of TMC local that is compatible with CSE 4.1? I tried to install it but it is complaining that no CSE server is available ``` root@PhotonOS-001 [ ~ ]# /mnt/cdrom/linux.run create instance --name $TMC_SM_INSTANCE_NAME --host $VCD_HOSTNAME --username $VCD_USERNAME --certificate-file /tmp/vcd.pem --encryption-key ${TMC_SM_ENCRYPTION_KEY} --input-kube-cluster-name=${TMC_SM_KUBE_CLUSTER_NAME} --input-cert-provider=cluster-issuer --input-cert-cluster-issuer-name=selfsigned-ca-clusterissuer --input-dns-zone=${TMC_SM_DNS_ZONE} --input-contour-envoy-load-balancer-ip=${TMC_SM_LOAD_BALANCER_IP} --input-harbor-url=${TMC_SM_HARBOR_URL} --input-harbor-username=${TMC_SM_HARBOR_USERNAME} --accept INFO [0019] Creating Solution instance entity instance=vmware.vcd-tmc-0.1.0-21897297-tmc INFO [0019] Triggering action action=hook event=PreCreate INFO [0020] Run EventPreCreate Hook action=hook event=PreCreate INFO [0020] Run EventPreCreate Hook successfully action=hook event=PreCreate INFO [0021] Creating element name=rde INFO [0021] Creating element name=tmc-admin-global-role INFO [0022] Creating element name=tmc-member-global-role INFO [0023] Creating element name=rights-bundle INFO [0023] Triggering action action=hook event=PostCreate INFO [0024] Run EventPostCreate Hook action=hook event=PostCreate INFO [0024] Copy the rights from global roles [Kubernetes Cluster Author] to the global role [tmc:member] action=hook event=PostCreate INFO [0025] Update rights of global role tmc:member action=hook event=PostCreate INFO [0025] Copy the rights from global roles [Organization Administrator Kubernetes Cluster Author] to the global role [tmc:admin] action=hook event=PostCreate INFO [0025] Update rights of global role tmc:admin action=hook event=PostCreate INFO [0025] Get Solution Org action=hook event=PostCreate INFO [0025] Solution Org: CSE action=hook event=PostCreate INFO [0025] Search CSE4 Cluster action=hook event=PostCreate ERROR [0025] Failed to find any cse cluster in org CSE action=hook event=PostCreate ERROR [0026] Failed to create instance 'tmc' name=tmc ERROR [0026] Failed to find any cse cluster in org CSE: exit status 6: failed to execute trigger hook errorCode=5012110011142353 ```
The TMC-SM for VCD tech preview only has support for CSE 4.0.3. This is the cause of the initial error you had. The tech preview utilizes an unreleased build of the UI which allows you to inject tr... See more...
The TMC-SM for VCD tech preview only has support for CSE 4.0.3. This is the cause of the initial error you had. The tech preview utilizes an unreleased build of the UI which allows you to inject trusted certificates into the cluster. CSE 4.1 is the first release which allows you to specify certificates to be trusted by the bootstrap VM or cluster. As you've identified, these certificates are now specified at the provider level. This behavior is closer to what the experience will be like when TMC-SM for VCD is released.
Thanks, Radostin! Some further replies: For VM disks, I am thinking for example of cloning the VM and decrypting the clone in vCenter console. Alternately we could use a backup provider with crypto ... See more...
Thanks, Radostin! Some further replies: For VM disks, I am thinking for example of cloning the VM and decrypting the clone in vCenter console. Alternately we could use a backup provider with crypto admin access to backup decrypted disks and restore them elsewhere. Your understanding of our setup is correct. Keep in mind that I was using vSphere encryption as my mental model, so that each VM would have its own key issued by the KMS, which ideally would be visible to the tenant in the Director portal as an attribute of the VM, and which would also allow for the rekeying of VMs on an individual basis. It seems to me your setup is more similar to vTA in that a single key issued by the KMS will be used to protect the keys in use for all VMs. So I agree with you that with this approach there is not as much apparent value to the tenant as there would have been in the key-per-VM scenario that I envisioned. It seems like there is some dissonance between what your model wants to achieve and what we want to achieve for our customers. I'm happy to get on a call. I work regularly with Jon Schulz as well. I have availability this week but am traveling the following two weeks, then will be back in the office the week of the 18th. Thanks!