<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>All TMC &amp; VCD Knowledge Base posts</title>
    <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/tkb-p/5418</link>
    <description>All TMC &amp; VCD Knowledge Base posts</description>
    <pubDate>Fri, 10 Nov 2023 20:46:53 GMT</pubDate>
    <dc:creator>5418</dc:creator>
    <dc:date>2023-11-10T20:46:53Z</dc:date>
    <item>
      <title>TMC Self-Managed VCD Sovereign Cloud - Revised 9/5</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-VCD-Sovereign-Cloud-Revised-9-5/ta-p/2985443</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Revised version 9/5.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 05 Sep 2023 19:49:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-VCD-Sovereign-Cloud-Revised-9-5/ta-p/2985443</guid>
      <dc:creator>jaskaranv</dc:creator>
      <dc:date>2023-09-05T19:49:25Z</dc:date>
    </item>
    <item>
      <title>Terminal commands from the Installation Guide</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Terminal-commands-from-the-Installation-Guide/ta-p/2977007</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H4&gt;Introduction&lt;/H4&gt;
&lt;P&gt;The Installation Guide includes console commands to install prerequisites, prepare clusters and install Tanzu Mission Control Self-Managed. Some of these commands are lengthy and are not easy to copy-paste out of the PDF document. This article provides a duplicate form of these commands so it is easier to follow along with the Installation Guide.&lt;/P&gt;
&lt;P&gt;This article does not include every step. Be sure to follow the Installation Guide and refer back to this article for complex commands.&lt;/P&gt;
&lt;H4&gt;Deploy Installer VM&lt;/H4&gt;
&lt;PRE&gt;# tdnf install -y git jq openssl-c_rehash tar unzip&lt;BR /&gt;# curl -L --output /usr/local/bin/kubectl \&lt;BR /&gt;https://dl.k8s.io/release/v1.23.10/bin/linux/amd64/kubectl &amp;amp;&amp;amp; chmod +x /usr/local/bin/kubectl&lt;BR /&gt;# curl -L https://github.com/carvel-dev/kapp-controller/releases/download/v0.46.1/kctrl-linux-amd64 -o /tmp/kctrl &amp;amp;&amp;amp; install /tmp/kctrl /usr/local/bin &amp;amp;&amp;amp; rm /tmp/kctrl&lt;BR /&gt;&lt;BR /&gt;Increase the capacity of /tmp to hold images prior to upload&lt;BR /&gt;# umount /tmp &amp;amp;&amp;amp; mount -t tmpfs -o size=10G tmpfs /tmp&lt;BR /&gt;&lt;BR /&gt;Mount the solution ISO to the Installer VM&lt;BR /&gt;# sed -i '/\/mnt\/cdrom/d' /etc/fstab&lt;BR /&gt;# mount /dev/sr0 /mnt/cdrom -t udf -o ro&lt;/PRE&gt;
&lt;H4&gt;Create a self-signed certificate authority&lt;/H4&gt;
&lt;PRE&gt;# openssl req -x509 -sha256 -days 1825 -newkey rsa:2048 \&lt;BR /&gt;-keyout $HOME/rootCA.key -out $HOME/rootCA.crt \&lt;BR /&gt;-nodes -extensions v3_ca \&lt;BR /&gt;-subj "/C=US/ST=CA/L=Palo Alto/O=CompanyName/OU=OrgName/CN=TMC-SM VCD Tech Preview Issuing CA"&lt;BR /&gt;&lt;BR /&gt;# ls rootCA.*&lt;/PRE&gt;
&lt;H4&gt;Deploy Harbor&lt;/H4&gt;
&lt;H5&gt;Configure certificates&lt;/H5&gt;
&lt;PRE&gt;# export KUBECONFIG=$PWD/kubeconfig-harbor.txt&lt;BR /&gt;&lt;BR /&gt;# kubectl create secret tls -n cert-manager selfsigned-ca-pair \&lt;BR /&gt;--cert=$HOME/rootCA.crt --key=$HOME/rootCA.key&lt;BR /&gt;&lt;BR /&gt;# cat &amp;lt;&amp;lt;EOF | kubectl apply -f -&lt;BR /&gt;&lt;BR /&gt;{&lt;BR /&gt;  "apiVersion": "cert-manager.io/v1",&lt;BR /&gt;  "kind": "ClusterIssuer",&lt;BR /&gt;  "metadata": {&lt;BR /&gt;    "name": "selfsigned-ca-clusterissuer"&lt;BR /&gt;  },&lt;BR /&gt;  "spec": {&lt;BR /&gt;    "ca": {&lt;BR /&gt;      "secretName": "selfsigned-ca-pair"&lt;BR /&gt;    }&lt;BR /&gt;  }&lt;BR /&gt;}&lt;BR /&gt;EOF&lt;/PRE&gt;
&lt;H6&gt;Deploy Contour and Harbor&lt;BR /&gt;1. Set environment variables with configuration values.&lt;/H6&gt;
&lt;PRE&gt;# IP address to associate with the Load Balancer for Harbor&lt;BR /&gt;export HARBOR_LOAD_BALANCER_IP="10.11.12.13"&lt;BR /&gt;&lt;BR /&gt;# Desired hostname for the Harbor service. This must be configured to point to the IP&lt;BR /&gt;# address above.&lt;BR /&gt;export HARBOR_HOSTNAME="harbor.${HARBOR_LOAD_BALANCER_IP}.**bleep**.io"&lt;BR /&gt;&lt;BR /&gt;# This will be used as the initial password for the “admin” user&lt;BR /&gt;export HARBOR_ADMIN_PASSWORD="AdminPassword"&lt;/PRE&gt;
&lt;H6&gt;2. Prepare a values file for the Contour installation&lt;/H6&gt;
&lt;PRE&gt;# cat &amp;lt;&amp;lt;EOF &amp;gt; contour-packageinstall-values.yaml&lt;BR /&gt;envoy:&lt;BR /&gt;  service:&lt;BR /&gt;    type: LoadBalancer&lt;BR /&gt;    loadBalancerIP: ${HARBOR_LOAD_BALANCER_IP}&lt;BR /&gt;EOF&lt;/PRE&gt;
&lt;H6&gt;3. Deploy Contour using the Tanzu package&lt;/H6&gt;
&lt;PRE&gt;# kctrl package install \&lt;BR /&gt;-i contour \&lt;BR /&gt;-n tanzu-system \&lt;BR /&gt;--package contour.tanzu.vmware.com \&lt;BR /&gt;--version 1.20.2+vmware.2-tkg.1 \&lt;BR /&gt;--values-file contour-packageinstall-values.yaml&lt;/PRE&gt;
&lt;H6&gt;4. Create a certificate for the Harbor services using the ClusterIssuer resource&lt;/H6&gt;
&lt;PRE&gt;# kubectl create ns tanzu-system-registry&lt;BR /&gt;&lt;BR /&gt;# cat &amp;lt;&amp;lt;EOF | kubectl apply -f -&lt;BR /&gt;apiVersion: cert-manager.io/v1&lt;BR /&gt;kind: Certificate&lt;BR /&gt;metadata:&lt;BR /&gt;  name: ${HARBOR_HOSTNAME}&lt;BR /&gt;  namespace: tanzu-system-registry&lt;BR /&gt;spec: &lt;BR /&gt;  secretName: ${HARBOR_HOSTNAME}-tls&lt;BR /&gt;&lt;BR /&gt;  duration: 8760h # 365d&lt;BR /&gt;  renewBefore: 720h # 30d&lt;BR /&gt;  subject:&lt;BR /&gt;    organizations:&lt;BR /&gt;      - MyOrgName&lt;BR /&gt;  isCA: false&lt;BR /&gt;  privateKey:&lt;BR /&gt;    algorithm: RSA&lt;BR /&gt;    encoding: PKCS1&lt;BR /&gt;    size: 2048&lt;BR /&gt;  usages:&lt;BR /&gt;    - server auth&lt;BR /&gt;    - client auth&lt;BR /&gt;  dnsNames:&lt;BR /&gt;    - ${HARBOR_HOSTNAME}&lt;BR /&gt;  ipAddresses:&lt;BR /&gt;    - ${HARBOR_LOAD_BALANCER_IP}&lt;BR /&gt;  issuerRef:&lt;BR /&gt;    name: selfsigned-ca-clusterissuer&lt;BR /&gt;    kind: ClusterIssuer&lt;BR /&gt;    group: cert-manager.io&lt;BR /&gt;EOF&lt;/PRE&gt;
&lt;H6&gt;5. Prepare a values file for the Harbor installation&lt;/H6&gt;
&lt;PRE&gt;# cat &amp;lt;&amp;lt;EOF &amp;gt; harbor-packageinstall-values.yaml&lt;BR /&gt;secretKey: $(head -1 /dev/random | base64 | head -c 16)&lt;BR /&gt;core:&lt;BR /&gt;  secret: $(head -1 /dev/random | base64 | head -c 16)&lt;BR /&gt;  xsrfKey: $(head -1 /dev/random | base64 | head -c 32)&lt;BR /&gt;jobservice:&lt;BR /&gt;  secret: $(head -1 /dev/random | base64 | head -c 16)&lt;BR /&gt;registry:&lt;BR /&gt;  secret: $(head -1 /dev/random | base64 | head -c 16)&lt;BR /&gt;database:&lt;BR /&gt;  password: $(head -1 /dev/random | base64 | head -c 16)&lt;BR /&gt;hostname: ${HARBOR_HOSTNAME}&lt;BR /&gt;harborAdminPassword: ${HARBOR_ADMIN_PASSWORD}&lt;BR /&gt;tlsCertificateSecretName: ${HARBOR_HOSTNAME}-tls&lt;BR /&gt;notary:&lt;BR /&gt;  enabled: false&lt;BR /&gt;persistence:&lt;BR /&gt;  persistentVolumeClaim:&lt;BR /&gt;    registry:&lt;BR /&gt;      size: 128Gi&lt;BR /&gt;EOF&lt;/PRE&gt;
&lt;H6&gt;6. Deploy Harbor using the Tanzu package&lt;/H6&gt;
&lt;PRE&gt;# kctrl package install \&lt;BR /&gt;-i harbor \&lt;BR /&gt;-n tanzu-system \&lt;BR /&gt;--package harbor.tanzu.vmware.com \&lt;BR /&gt;--version 2.6.1+vmware.1-tkg.1 \&lt;BR /&gt;--values-file harbor-packageinstall-values.yaml&lt;/PRE&gt;
&lt;H4&gt;Deploy TMC-SM for VCD&lt;/H4&gt;
&lt;H5&gt;Configure certificates&lt;/H5&gt;
&lt;PRE&gt;# export KUBECONFIG=$PWD/kubeconfig-tmc.txt&lt;BR /&gt;&lt;BR /&gt;# kubectl create secret tls -n cert-manager selfsigned-ca-pair \&lt;BR /&gt;--cert=$HOME/rootCA.crt --key=$HOME/rootCA.key&lt;BR /&gt;&lt;BR /&gt;# cat &amp;lt;&amp;lt;EOF | kubectl apply -f -&lt;BR /&gt;&lt;BR /&gt;{&lt;BR /&gt;  "apiVersion": "cert-manager.io/v1",&lt;BR /&gt;  "kind": "ClusterIssuer",&lt;BR /&gt;  "metadata": {&lt;BR /&gt;    "name": "selfsigned-ca-clusterissuer"&lt;BR /&gt;  },&lt;BR /&gt;  "spec": {&lt;BR /&gt;    "ca": {&lt;BR /&gt;      "secretName": "selfsigned-ca-pair"&lt;BR /&gt;    }&lt;BR /&gt;  }&lt;BR /&gt;}&lt;BR /&gt;EOF&lt;/PRE&gt;
&lt;H5&gt;Install the Solution Add-On&lt;/H5&gt;
&lt;H6&gt;1. Set environment variables with the desired configuration settings.&lt;/H6&gt;
&lt;PRE&gt;export VCD_HOSTNAME=vcd.example.com&lt;BR /&gt;export VCD_USERNAME=administrator&lt;BR /&gt;export VCD_EXT_PASSWORD=password&lt;BR /&gt;&lt;BR /&gt;export TMC_SM_INSTANCE_NAME=VALUE_REQUIRED&lt;BR /&gt;export TMC_SM_ENCRYPTION_KEY=MySuperSecretKeyThatIRemember&lt;BR /&gt;&lt;BR /&gt;# Provide the Kubernetes cluster name for TMC deployment, &lt;BR /&gt;# e.g., tkgm-tmc-cluster&lt;BR /&gt;export TMC_SM_KUBE_CLUSTER_NAME=VALUE_REQUIRED&lt;BR /&gt;&lt;BR /&gt;# Provide DNS zone to configure TMC endpoints, i.e., tmc.mydomain.com&lt;BR /&gt;export TMC_SM_DNS_ZONE=VALUE_REQUIRED&lt;BR /&gt;&lt;BR /&gt;# Provide the Load balancer IP of Contour Envoy, i.e., 10.11.12.23. TMC DNS &lt;BR /&gt;# Zone should be mapped to this IP.&lt;BR /&gt;export TMC_SM_LOAD_BALANCER_IP=VALUE_REQUIRED&lt;BR /&gt;&lt;BR /&gt;# Provide Harbor project path for pushing/pulling TMC packages during &lt;BR /&gt;# installation, i.e., harbor.mydomain.com/myproject&lt;BR /&gt;export TMC_SM_HARBOR_URL=harbor.slz.vcd.local/tmc&lt;BR /&gt;&lt;BR /&gt;# Provide Harbor username for Basic authentication&lt;BR /&gt;export TMC_SM_HARBOR_USERNAME=robot\$tmc&lt;BR /&gt;&lt;BR /&gt;# Provide Harbor password for Basic authentication&lt;BR /&gt;export VCD_EXT_INPUT_HARBOR_PASSWORD=VALUE_REQUIRED&lt;BR /&gt;&lt;BR /&gt;# Provide the base64 encoded CA bundle in PEM format of the Harbor server. &lt;BR /&gt;# It is required if the Harbor server certificate is not signed by a &lt;BR /&gt;# well-known certificate authority.&lt;BR /&gt;export VCD_EXT_INPUT_HARBOR_CA_BUNDLE=$(cat $HOME/rootCA.crt | base64 -w0)&lt;BR /&gt;&lt;BR /&gt;############&lt;BR /&gt;# Optional Settings&lt;BR /&gt;############&lt;BR /&gt;&lt;BR /&gt;# Set MinIO root user name. Defaults to minioadmin.&lt;BR /&gt;export VCD_EXT_INPUT_MINIO_ROOT_USERNAME=&lt;BR /&gt;&lt;BR /&gt;# Set MinIO root user password. If left blank, a random password will be &lt;BR /&gt;# generated. Format: no less than 8 chars, at least 1 digit, at least 1 &lt;BR /&gt;# special char(@$!%*#.,-_=*), at least 1 letter, i.e., P@ssw0rd&lt;BR /&gt;export VCD_EXT_INPUT_MINIO_ROOT_PASSWORD=&lt;BR /&gt;&lt;BR /&gt;# Set TMC's PostgreSQL password. If left blank, a random password will be &lt;BR /&gt;# generated. Format: no less than 8 chars, at least 1 digit, at least 1 &lt;BR /&gt;# special char(@$!%*#.,-_=*), at least 1 letter, i.e., P@ssw0rd&lt;BR /&gt;export VCD_EXT_INPUT_POSTGRES_PASSWORD=S3cretPGP@ssw0rd&lt;BR /&gt;&lt;BR /&gt;# Set the default Grafana admin user name. Defaults to admin.&lt;BR /&gt;export VCD_EXT_INPUT_GRAFANA_ADMIN_USERNAME=&lt;BR /&gt;&lt;BR /&gt;# Set the default Grafana admin user password. If left blank, a random &lt;BR /&gt;# password will be generated. Format: no less than 8 chars, at least 1 digit, &lt;BR /&gt;# at least 1 special char(@$!%*#.,-_=*), at least 1 letter, i.e., P@ssw0rd&lt;BR /&gt;export VCD_EXT_INPUT_GRAFANA_ADMIN_PASSWORD=&lt;BR /&gt;&lt;BR /&gt;# Sets the timeout in seconds for TMC installation. Defaults to 3600.&lt;BR /&gt;export VCD_EXT_INPUT_DEPLOY_TIMEOUT=3600&lt;/PRE&gt;
&lt;H6&gt;2. Load Harbor rootCA.crt&lt;/H6&gt;
&lt;PRE&gt;# cp $HOME/rootCA.crt /etc/ssl/certs/harbor.pem &amp;amp;&amp;amp; rehash_ca_certificates.sh&lt;BR /&gt;&lt;BR /&gt;# timeout 1 openssl s_client -quiet -verify_return_error ${HARBOR_HOSTNAME}:443&lt;/PRE&gt;
&lt;H6&gt;3. Download the VCD certificate to a file.&lt;/H6&gt;
&lt;PRE&gt;# /mnt/cdrom/linux.run get certificates --host $VCD_HOSTNAME \&lt;BR /&gt;--output /tmp/vcd.pem \&lt;BR /&gt;--accept&lt;/PRE&gt;
&lt;H6&gt;4. Configure VCD to trust the TMC-SM VCD Integration Solution Add-On.&lt;/H6&gt;
&lt;PRE&gt;# /mnt/cdrom/linux.run trust --host $VCD_HOSTNAME \&lt;BR /&gt;--username $VCD_USERNAME \&lt;BR /&gt;--certificate-file /tmp/vcd.pem \&lt;BR /&gt;--accept&lt;/PRE&gt;
&lt;H6&gt;5. Create the solution add-on instance.&lt;/H6&gt;
&lt;PRE&gt;# /mnt/cdrom/linux.run create instance --name $TMC_SM_INSTANCE_NAME \&lt;BR /&gt;--host $VCD_HOSTNAME \&lt;BR /&gt;--username $VCD_USERNAME \&lt;BR /&gt;--certificate-file /tmp/vcd.pem \&lt;BR /&gt;--encryption-key ${TMC_SM_ENCRYPTION_KEY} \&lt;BR /&gt;--input-kube-cluster-name=${TMC_SM_KUBE_CLUSTER_NAME} \&lt;BR /&gt;--input-cert-provider=cluster-issuer \&lt;BR /&gt;--input-cert-cluster-issuer-name=selfsigned-ca-clusterissuer \&lt;BR /&gt;--input-dns-zone=${TMC_SM_DNS_ZONE} \&lt;BR /&gt;--input-contour-envoy-load-balancer-ip=${TMC_SM_LOAD_BALANCER_IP} \&lt;BR /&gt;--input-harbor-url=${TMC_SM_HARBOR_URL} \&lt;BR /&gt;--input-harbor-username=${TMC_SM_HARBOR_USERNAME} \&lt;BR /&gt;--accept&lt;/PRE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Jul 2023 14:10:15 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Terminal-commands-from-the-Installation-Guide/ta-p/2977007</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-07-21T14:10:15Z</dc:date>
    </item>
    <item>
      <title>Unable to upload the solution ISO through the browser</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Unable-to-upload-the-solution-ISO-through-the-browser/ta-p/2976247</link>
      <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;H2&gt;Symptoms&lt;/H2&gt;
&lt;P&gt;Attempts to upload the&amp;nbsp;&lt;SPAN&gt;Tanzu Mission Control Self-Managed ISO file fail for any reason.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H2&gt;Diagnosis&lt;/H2&gt;
&lt;P&gt;The TMC-SM solution is bundled into a single ISO file. The size of this file may present challenges to upload via the browser in some environments. Alternatively, the ISO may be transferred to the Installer VM and mounted directly from there.&lt;/P&gt;
&lt;P&gt;There are some changes to the "Deploy Installer VM" section of the Installation Guide when following this guide.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Skip the step named "Attach the Solution Add-On ISO to the VM"&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Skip this command when preparing the VM&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;&lt;SPAN&gt;# mount /dev/sr0 /mnt/cdrom -t udf -o ro&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Open the Tenant UI for Cloud Provider of the Solutions Organization.&lt;/LI&gt;
&lt;LI&gt;Browse to the TMC-SM Installer vApp.&lt;/LI&gt;
&lt;LI&gt;Browse to the Photon OS VM in the vApp.&lt;/LI&gt;
&lt;LI&gt;Browse to Hardware -&amp;gt; Hard Disks.&lt;/LI&gt;
&lt;LI&gt;Edit the disks and add a new 64 GB disk.&lt;BR /&gt;&lt;IMG border="0" alt="" /&gt;&lt;/LI&gt;
&lt;LI&gt;SSH into the TMC-SM Installer VM.&lt;/LI&gt;
&lt;LI&gt;Confirm the new disk is mounted as /dev/sdb
&lt;PRE&gt;# fdisk -l /dev/sdb&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Format the new disk and mount it to /solutions. Replace /dev/sdb with the appropriate name if needed.&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;# sfdisk /dev/sdb &amp;lt;&amp;lt;EOF&lt;BR /&gt;2048,67108864&lt;BR /&gt;;&lt;BR /&gt;EOF&lt;BR /&gt;&lt;BR /&gt;# mkfs.ext4 /dev/sdb1&lt;BR /&gt;&lt;BR /&gt;# mkdir /solutions&lt;BR /&gt;&lt;BR /&gt;# echo "/dev/sdb1 /solutions ext4 defaults 1 3" &amp;gt;&amp;gt; /etc/fstab&lt;BR /&gt;&lt;BR /&gt;# mount /solutions&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Confirm that `/solutions` is mounted with 32GB of space&lt;/SPAN&gt;&lt;BR /&gt;
&lt;PRE&gt;# df -h /solutions&lt;BR /&gt;Filesystem Size Used Avail Use% Mounted on&lt;BR /&gt;/dev/sdb1 32G 0 24G 0% /solutions&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Transfer the ISO to the TMC-SM Installer using SCP or other tools
&lt;PRE&gt;scp vmware-vcd-tmc-0.1.0-21897297.iso root@192.168.116.130:/solutions&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Mount the solution ISO to the existing /mnt/cdrom directory
&lt;PRE&gt;mount /solutions/vmware-vcd-tmc-0.1.0-21897297.iso /mnt/cdrom -t udf -o ro&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The solution ISO is now mounted and ready to use. There are no other changes to be made to the Installation Guide. Proceed to the "Create a self-signed certificate authority" section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 12 Jul 2023 16:03:52 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Unable-to-upload-the-solution-ISO-through-the-browser/ta-p/2976247</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-07-12T16:03:52Z</dc:date>
    </item>
    <item>
      <title>Configuring the TMC Self-Managed VCD CLI</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Configuring-the-TMC-Self-Managed-VCD-CLI/ta-p/2976251</link>
      <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;H2&gt;Introduction&lt;/H2&gt;
&lt;P&gt;The TMC Self-Managed VCD solution has a CLI for manual or automated access. The configuration steps may vary from the TMC documentation because they include some VCD specific information. All other CLI commands should be the same.&lt;/P&gt;
&lt;H2&gt;Prerequisites&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;UL&gt;
&lt;LI&gt;CA used for TMC-SM services - Not required if you used an external certificate authority&lt;/LI&gt;
&lt;LI&gt;CA used for VCD - Not required if you used an external certificate authority&lt;/LI&gt;
&lt;LI&gt;TMC DNS zone (e.g.; tmc.slz.vcd.local)&lt;/LI&gt;
&lt;LI&gt;VCD hostname (e.g.; vcd.local)&lt;/LI&gt;
&lt;LI&gt;VCD OIDC Client ID - This can be retrieved from the Cloud Director Provider UI&lt;/LI&gt;
&lt;LI&gt;VCD tenant organization name (e.g.; company)&lt;/LI&gt;
&lt;LI&gt;VCD API Token - This should be created for a user that has the `tmc:admin` or `tmc:member` role&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H2&gt;Installation&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Browse to the TMC-SM UI directly or through the VCD UI link&lt;/LI&gt;
&lt;LI&gt;Browse to "Automation center" in the lower-left corner of the screen&lt;/LI&gt;
&lt;LI&gt;Download the TMC CLI for your platform&lt;/LI&gt;
&lt;LI&gt;Follow the on-screen instructions, or take the appropriate steps, to make the `tmc` CLI available in your PATH&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Configuration&lt;/H2&gt;
&lt;H3&gt;Configure certificates&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;You may skip this step if VCD or TMC-SM does not use self-signed certificates.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Follow the appropriate steps for your OS to install the VCD and/or TMC-SM CA to your system. Alternatively, you can specify an environment variable pointing to these certificates.&lt;/P&gt;
&lt;PRE&gt;# mkdir $HOME/tmc-ssl&lt;BR /&gt;# cp tmcCA.pem $HOME/tmc-ssl&lt;BR /&gt;# cp VCD.pem $HOME/tmc-ssl&lt;BR /&gt;# export SSL_CERT_DIR=$HOME/tmc-ssl&lt;/PRE&gt;
&lt;P&gt;The `tmc` CLI will use the `SSL_CERT_DIR` value to load additional trusted certificates when it is executed.&lt;/P&gt;
&lt;H3&gt;Configure TMC CLI&lt;/H3&gt;
&lt;PRE&gt;tmc login --self-managed --vcd --no-configure \&lt;BR /&gt;--name tmc-admin \&lt;BR /&gt;--vcd-org company \&lt;BR /&gt;--vcd-api-token 24ljsajf2j342j4ljsalfjasflj23j4lkasf \&lt;BR /&gt;--endpoint tmc.slz.vcd.local:443 \&lt;BR /&gt;--vcd-issuer-url https://vcd.local/oidc \&lt;BR /&gt;--vcd-oidc-client-id f14f2242-dc18-4d93-a9a9-07c39570e287&lt;/PRE&gt;
&lt;P&gt;This process can be repeated with different names for multiple users or TMC-SM deployments.&lt;/P&gt;
&lt;PRE&gt;# tmc system context list&lt;BR /&gt;NAME        ORG ID   ENDPOINT&lt;BR /&gt;tmc-admin            tmc.slz.vcd.local:443&lt;BR /&gt;tmc-member           tmc.slz.vcd.local:443&lt;/PRE&gt;
&lt;PRE&gt;# tmc system context use tmc-admin&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 11 Jul 2023 16:48:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/Configuring-the-TMC-Self-Managed-VCD-CLI/ta-p/2976251</guid>
      <dc:creator>jeffmace</dc:creator>
      <dc:date>2023-07-11T16:48:20Z</dc:date>
    </item>
    <item>
      <title>TMC Self-Managed Sovereign Cloud</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-Sovereign-Cloud/ta-p/2973462</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Jun 2023 20:05:32 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-Sovereign-Cloud/ta-p/2973462</guid>
      <dc:creator>jaskaranv</dc:creator>
      <dc:date>2023-06-16T20:05:32Z</dc:date>
    </item>
    <item>
      <title>TMC Self-Managed VCD Tech Preview Document</title>
      <link>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-VCD-Tech-Preview-Document/ta-p/2973461</link>
      <description />
      <pubDate>Mon, 17 Jul 2023 20:16:32 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/TMC-VCD-Knowledge-Base/TMC-Self-Managed-VCD-Tech-Preview-Document/ta-p/2973461</guid>
      <dc:creator>jaskaranv</dc:creator>
      <dc:date>2023-07-17T20:16:32Z</dc:date>
    </item>
  </channel>
</rss>

