<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>All Tanzu Mission Control &amp; VMware Cloud Director Discussion Board posts</title>
    <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/bd-p/5417</link>
    <description>All Tanzu Mission Control &amp; VMware Cloud Director Discussion Board posts</description>
    <pubDate>Fri, 10 Nov 2023 22:12:38 GMT</pubDate>
    <dc:creator>5417</dc:creator>
    <dc:date>2023-11-10T22:12:38Z</dc:date>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2988389#M21</link>
      <description>&lt;P&gt;We've been looking into this and can confirm you will be able to use roles other than 'tmc:admin' or 'tmc:member' to give access to specific resources. I believe this scenario would've worked if you had added the 'Organization Administrator' group to the 'organization.credential.view' role binding or some other 'organization.*' role.&lt;/P&gt;
&lt;P&gt;Please try this after we GA a release with support for CSE 4.1 and let us know if you run into issues.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 17:35:33 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2988389#M21</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-09-26T17:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986532#M20</link>
      <description>&lt;P&gt;Yes, that makes sense. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 12:39:04 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986532#M20</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-09-13T12:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986531#M19</link>
      <description>&lt;P&gt;My TMC Local is not working as I am waiting for a newer version compatible with CSE 4.1. But I was trying to use Acces Roles to manage/limit K8s API access (e.g: limit certain users to certain namespaces)&lt;/P&gt;
&lt;P&gt;What I noticed was that you need&amp;nbsp; either&amp;nbsp;&lt;SPAN&gt;tmc-admin` or `tmc-member`&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;roles to log onto TMC CLI (the command line interface for TMC), which allows you to access the k8s API via kubectl. Having &amp;nbsp;tmc-admin` or `tmc-member` roles automatically gives full (admin) access to TMC managed K8s clusters and I am therefore unable to limit certain users or groups (i.e.: useer `johndoe` should only be able to list namesapces fro k8s cluster xyz).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I hope this makes sense. If not, lets wait for a new version of TMC that supports CSE 4.1. Will reinstall and can get into a meeting.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 12:36:51 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986531#M19</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-09-13T12:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986527#M18</link>
      <description>&lt;P&gt;We are still looking into this but I want to make sure I understand what you would like to achieve.&lt;/P&gt;
&lt;P&gt;Are you trying to use the "Cloud Administrator" role to grant access to the TMC-SM API/GUI so they can define policies/packages/etc in TMC-SM?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 12:25:03 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2986527#M18</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-09-13T12:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2985382#M17</link>
      <description>&lt;P&gt;Is there a newer version of TMC local that is compatible with CSE 4.1?&lt;/P&gt;
&lt;P&gt;I tried to install it but it is complaining that no CSE server is available&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;
&lt;P&gt;root@PhotonOS-001 [ ~ ]# /mnt/cdrom/linux.run create instance --name $TMC_SM_INSTANCE_NAME --host $VCD_HOSTNAME --username $VCD_USERNAME --certificate-file /tmp/vcd.pem --encryption-key ${TMC_SM_ENCRYPTION_KEY} --input-kube-cluster-name=${TMC_SM_KUBE_CLUSTER_NAME} --input-cert-provider=cluster-issuer --input-cert-cluster-issuer-name=selfsigned-ca-clusterissuer --input-dns-zone=${TMC_SM_DNS_ZONE} --input-contour-envoy-load-balancer-ip=${TMC_SM_LOAD_BALANCER_IP} --input-harbor-url=${TMC_SM_HARBOR_URL} --input-harbor-username=${TMC_SM_HARBOR_USERNAME} --accept&lt;BR /&gt;INFO [0019] Creating Solution instance entity instance=vmware.vcd-tmc-0.1.0-21897297-tmc&lt;BR /&gt;INFO [0019] Triggering action action=hook event=PreCreate&lt;BR /&gt;INFO [0020] Run EventPreCreate Hook action=hook event=PreCreate&lt;BR /&gt;INFO [0020] Run EventPreCreate Hook successfully action=hook event=PreCreate&lt;BR /&gt;INFO [0021] Creating element name=rde&lt;BR /&gt;INFO [0021] Creating element name=tmc-admin-global-role&lt;BR /&gt;INFO [0022] Creating element name=tmc-member-global-role&lt;BR /&gt;INFO [0023] Creating element name=rights-bundle&lt;BR /&gt;INFO [0023] Triggering action action=hook event=PostCreate&lt;BR /&gt;INFO [0024] Run EventPostCreate Hook action=hook event=PostCreate&lt;BR /&gt;INFO [0024] Copy the rights from global roles [Kubernetes Cluster Author] to the global role [tmc:member] action=hook event=PostCreate&lt;BR /&gt;INFO [0025] Update rights of global role tmc:member action=hook event=PostCreate&lt;BR /&gt;INFO [0025] Copy the rights from global roles [Organization Administrator Kubernetes Cluster Author] to the global role [tmc:admin] action=hook event=PostCreate&lt;BR /&gt;INFO [0025] Update rights of global role tmc:admin action=hook event=PostCreate&lt;BR /&gt;INFO [0025] Get Solution Org action=hook event=PostCreate&lt;BR /&gt;INFO [0025] Solution Org: CSE action=hook event=PostCreate&lt;BR /&gt;&lt;FONT color="#3366FF"&gt;INFO [0025] Search CSE4 Cluster action=hook event=PostCreate&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#3366FF"&gt;ERROR [0025] Failed to find any cse cluster in org CSE action=hook event=PostCreate&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#3366FF"&gt;ERROR [0026] Failed to create instance 'tmc' name=tmc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#3366FF"&gt;ERROR [0026] Failed to find any cse cluster in org CSE: exit status 6: failed to execute trigger hook errorCode=5012110011142353&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 13:18:14 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2985382#M17</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-09-05T13:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984726#M16</link>
      <description>&lt;P&gt;The TMC-SM for VCD tech preview only has support for CSE 4.0.3. This is the cause of the initial error you had.&lt;/P&gt;
&lt;P&gt;The tech preview utilizes an unreleased build of the UI which allows you to inject trusted certificates into the cluster. CSE 4.1 is the first release which allows you to specify certificates to be trusted by the bootstrap VM or cluster. As you've identified, these certificates are now specified at the provider level. This behavior is closer to what the experience will be like when TMC-SM for VCD is released.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 20:46:10 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984726#M16</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-30T20:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2984458#M15</link>
      <description>&lt;P&gt;I could manage the cluster (i.e.: kubectl get nodes, get pods etc)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 15:54:02 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2984458#M15</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-29T15:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984457#M14</link>
      <description>&lt;P&gt;I think the answer to the root CA issue is to add teh certificate to "&lt;LABEL class="clr-col-4 clr-control-label" for="clr-form-control-60"&gt;Cluster Certificates (Optional)&lt;/LABEL&gt;" in the&amp;nbsp; "CSE Management" window. Will try and see if it works.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 15:52:26 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984457#M14</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-29T15:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2984455#M13</link>
      <description>&lt;P&gt;Sorry for the delay, I am still looking into this with the engineering team.&lt;/P&gt;
&lt;P&gt;Beyond logging in, were you able to view/edit any TMC resources when using the `&lt;SPAN&gt;Cloud Administrator` role?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 15:37:02 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2984455#M13</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-29T15:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to delete TMC-SM add-on instance</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984407#M12</link>
      <description>&lt;P&gt;Thanks a lot! seems it helped. &lt;img class="lia-deferred-image lia-image-emoji" src="https://communities.vmware.com/html/@7651DD0E8772B3B5D93ADA9ABA2E067C/emoticons/1f642.png" alt=":slightly_smiling_face:" title=":slightly_smiling_face:" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 11:18:09 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984407#M12</guid>
      <dc:creator>nazu</dc:creator>
      <dc:date>2023-08-29T11:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984379#M11</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I managed to delete it manually by:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"curl -ks -H "Accept: application/json;version=37.0" -H "Content-Type: application/json" -H "Authorization: Bearer ${VCLOUD_ACCESS_TOKEN}" -X DELETE &lt;A href="https://$VCD_HOSTNAME/cloudapi/1.0.0/entities/urn:vcloud:entity:vmware:solutions_add_on_instance:72f202b9-a8a9-46ac-8ebd-9fa4490d0f0b`" target="_blank" rel="noopener"&gt;https://$VCD_HOSTNAME/cloudapi/1.0.0/entities/urn:vcloud:entity:vmware:solutions_add_on_instance:72f202b9-a8a9-46ac-8ebd-9fa4490d0f0b&lt;/A&gt;"&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The next problem is that the CSI 4.1 Plugin does not have a certificate session during cluster creation. I will need to find a way to add the certificate after cluster creation&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 08:30:33 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984379#M11</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-29T08:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to delete TMC-SM add-on instance</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984308#M10</link>
      <description>&lt;P&gt;Deleting the cluster does not remove entries from the VCD database related to the solution. There are steps on page 32 to delete the solution. Could you try those steps if you haven't already? You may need to follow the steps on page 31 to mark the solution as FAILED.&lt;/P&gt;
&lt;P&gt;I will reach out to the engineering team to get some next steps if that doesn't work.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 17:01:57 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984308#M10</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-28T17:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984307#M9</link>
      <description>&lt;P&gt;I will discuss this with the engineering team and get back to you.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 16:52:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2984307#M9</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-28T16:52:06Z</dc:date>
    </item>
    <item>
      <title>Unable to delete TMC-SM add-on instance</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984291#M8</link>
      <description>&lt;P class="xmsonormal"&gt;I am having issues with the installation of TMC-SM.&lt;/P&gt;
&lt;P class="xmsonormal"&gt;I got till the page 22 of installation – tried to install TMC-SM add-on instance.&lt;/P&gt;
&lt;P class="xmsonormal"&gt;It run for some time, then stopped and remained in ‘In progress’ state.&lt;/P&gt;
&lt;P class="xmsonormal"&gt;So now I am not able to either delete it, or create a new one (as only 1 instance is supported).&lt;/P&gt;
&lt;P class="xmsonormal"&gt;I tried deleting tmc Kubernetes cluster from VCD UI and the project from harbor and recreated those from the scratch but seems something else needs to be cleaned up.&lt;/P&gt;
&lt;P&gt;Attached the log from the tmc instance installation.&lt;/P&gt;
&lt;P&gt;Could you help with deleting it?&lt;/P&gt;
&lt;P class="xmsonormal"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xmsonormal"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 15:08:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-delete-TMC-SM-add-on-instance/m-p/2984291#M8</guid>
      <dc:creator>nazu</dc:creator>
      <dc:date>2023-08-28T15:08:23Z</dc:date>
    </item>
    <item>
      <title>Unable remove instance - CSE not found</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2983968#M7</link>
      <description>&lt;P&gt;I am not sure if "CSE4" is referring to a VM or vApp or if that is just some hardcoded name and of no consequence to the search.&lt;/P&gt;
&lt;P&gt;I am asking cause I have just updated CSE to 4.1 and delete the previous vApp/VM (IIRC both called CSE4).&lt;/P&gt;
&lt;P&gt;Would be great to have some help with this as I need to remove this instance and reinstall it.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;root@PhotonOS-001 [ ~ ]# /mnt/cdrom/linux.run delete instance --name $TMC_SM_INSTANCE_NAME --accept --host $VCD_HOSTNAME --username $VCD_USERNAME --certificate-file /tmp/vcd.pem --encryption-key ${TMC_SM_ENCRYPTION_KEY} --accept --password $VCD_EXT_PASSWORD&lt;BR /&gt;INFO [0019] Triggering action action=hook event=PreDelete&lt;BR /&gt;INFO [0021] All global roles are ready to delete action=hook event=PreDelete&lt;BR /&gt;INFO [0021] cluster:tmc action=hook event=PreDelete&lt;BR /&gt;INFO [0021] Get Solution Org action=hook event=PreDelete&lt;BR /&gt;INFO [0021] Solution Org: CSE action=hook event=PreDelete&lt;BR /&gt;&lt;STRONG&gt;INFO [0021] Search &lt;FONT color="#FF0000"&gt;CSE4&lt;/FONT&gt; Cluster action=hook event=PreDelete&lt;/STRONG&gt;&lt;BR /&gt;ERROR [0021] Failed to find any cse cluster in org CSE action=hook event=PreDelete&lt;BR /&gt;ERROR [0021] Failed to delete instance 'tmc' name=tmc&lt;BR /&gt;ERROR [0021] Failed to find any cse cluster in org CSE: exit status 23: failed to execute trigger hook errorCode=5012120012191213&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 15:14:56 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-remove-instance-CSE-not-found/m-p/2983968#M7</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-25T15:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: API Error: Failed to list cluster's integrations: Not Implemented</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/API-Error-Failed-to-list-cluster-s-integrations-Not-Implemented/m-p/2982779#M6</link>
      <description>&lt;P&gt;This is a known issue and will be fixed in GA.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 00:37:14 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/API-Error-Failed-to-list-cluster-s-integrations-Not-Implemented/m-p/2982779#M6</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-18T00:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to reconcile tanzu-standard repo</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-reconcile-tanzu-standard-repo/m-p/2982778#M5</link>
      <description>&lt;P&gt;I believe this can be solved by adding the root CAs to the kapp-controller pods.&lt;/P&gt;
&lt;P&gt;Generate a ca-certificates.crt file with the contents of all CAs to be trusted.&lt;/P&gt;
&lt;PRE&gt;rm -f ca-certificates.crt&lt;BR /&gt;cat rootCA.crt &amp;gt;&amp;gt; ca-certificates.crt&lt;BR /&gt;# Repeat for all trusted CAs&lt;/PRE&gt;
&lt;P&gt;Load the certificate bundle into Kubernetes and update the kapp-controller deployment to include it in all pods.&lt;/P&gt;
&lt;PRE&gt;kubectl create -n tkg-system configmap kapp-controller-ca-certificates --from-file=ca-certificates.crt&lt;BR /&gt;&lt;BR /&gt;cat &amp;lt;&amp;lt;EOF | kubectl patch -n tkg-system deployment/kapp-controller --patch-file=/dev/stdin&lt;BR /&gt;spec:&lt;BR /&gt;  template:&lt;BR /&gt;    spec:&lt;BR /&gt;      containers:&lt;BR /&gt;      - name: kapp-controller&lt;BR /&gt;        volumeMounts:&lt;BR /&gt;        - mountPath: /etc/ssl/certs/ca-certificates.crt&lt;BR /&gt;          subPath: ca-certificates.crt&lt;BR /&gt;          name: ca-certificates&lt;BR /&gt;          readOnly: true&lt;BR /&gt;       volumes:&lt;BR /&gt;       - configMap:&lt;BR /&gt;           name: kapp-controller-ca-certificates&lt;BR /&gt;         name: ca-certificates&lt;BR /&gt;EOF&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;The kapp-controller pods will restart with the new configuration and should start working. You can follow the kapp-controller logs for more details.&lt;/P&gt;
&lt;PRE&gt;kubectl -n tkg-system logs -f deployment/kapp-controller&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 00:27:47 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-reconcile-tanzu-standard-repo/m-p/2982778#M5</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-08-18T00:27:47Z</dc:date>
    </item>
    <item>
      <title>TMC Managed K8s Cluster - CLI  authentication and Access Roles</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2982488#M4</link>
      <description>&lt;P&gt;Currently, I can login to TMC CLI in the following ways:&lt;/P&gt;
&lt;P&gt;1) Using LDAP accountswith `Cloud Administrator` role&lt;/P&gt;
&lt;P&gt;2) Using LDAP account with role `tmc:admin`&lt;/P&gt;
&lt;P&gt;3) Using local accounts `tmc-amin`, `tmc-member` or any other local accounts with role `tmc:admin` or `tmc:member` assigned to them&lt;/P&gt;
&lt;P&gt;I cannot authenticate to TMC CLI from LDAP/local accounts/groups for which I have authentication configured TMC GUI Access section. See screenshot that shows current access policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="returntrip_0-1692189441843.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/103048iE30BCFFBF6A89CA2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="returntrip_0-1692189441843.png" alt="returntrip_0-1692189441843.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me, it seems like the `tmc-admin` or `tmc-member` roles are necessary to log ont TMC CLI and subsequentially accesst the K8s API via says kubectl However, having those roles gives automatically admin access to TMC managed K8s clusters which defeats the purpose of RBAC.&lt;/P&gt;
&lt;P&gt;Am I missing something?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 13:12:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/TMC-Managed-K8s-Cluster-CLI-authentication-and-Access-Roles/m-p/2982488#M4</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-16T13:12:00Z</dc:date>
    </item>
    <item>
      <title>Unable to reconcile tanzu-standard repo</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-reconcile-tanzu-standard-repo/m-p/2981333#M2</link>
      <description>&lt;P&gt;I am unable to reconcile the tanzau-standard repo due to a certificate error. How can I import or trust the authority for the harbor host to overcome this issue?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="returntrip_0-1691488138825.png" style="width: 825px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/102949i1221F43101F1C454/image-dimensions/825x200/is-moderation-mode/true?v=v2" width="825" height="200" role="button" title="returntrip_0-1691488138825.png" alt="returntrip_0-1691488138825.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2023 11:53:35 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/Unable-to-reconcile-tanzu-standard-repo/m-p/2981333#M2</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-08T11:53:35Z</dc:date>
    </item>
    <item>
      <title>API Error: Failed to list cluster's integrations: Not Implemented</title>
      <link>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/API-Error-Failed-to-list-cluster-s-integrations-Not-Implemented/m-p/2981321#M1</link>
      <description>&lt;P&gt;I am getting this error: "API Error: Failed to list cluster's integrations: Not Implemented: please try again later (unimplemented)" as a red banner. Any hints how to solve this? Thanks.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="returntrip_0-1691485156629.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/102945i18D0167A0E1EA2C4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="returntrip_0-1691485156629.png" alt="returntrip_0-1691485156629.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2023 08:59:36 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Tanzu-Mission-Control-VMware/API-Error-Failed-to-list-cluster-s-integrations-Not-Implemented/m-p/2981321#M1</guid>
      <dc:creator>returntrip</dc:creator>
      <dc:date>2023-08-08T08:59:36Z</dc:date>
    </item>
  </channel>
</rss>

