kb.vmware.com
Open in
urlscan Pro
2a02:26f0:f500:4a0::2ef
Public Scan
URL:
https://kb.vmware.com/s/article/89583
Submission: On April 27 via api from US — Scanned from NL
Submission: On April 27 via api from US — Scanned from NL
Form analysis
0 forms found in the DOMText Content
Loading ×Sorry to interrupt This page has an error. You might just need to refresh it. [Cannot read properties of undefined (reading 'email')] Failing descriptor: {markup://c:kM_ArticleSubscribe} Refresh Products and Accounts Knowledge Communities Support Success Learning SearchLoading My Subscriptions Loading Knowledge Base CONFIGURE A CERTIFICATE FOR USE WITH VMWARE ARIA OPERATIONS CLOUD PROXY (89583) -------------------------------------------------------------------------------- Last Updated: 4/15/2023Categories: How toTotal Views: 1135Language: English subscribe PURPOSE This article provides instructions for using OpenSSL to configure a certificate for use with VMware Aria Operations Cloud Proxy for VMware Aria Operations (formerly known as vRealize Operations) or VMware Aria Operations (SaaS) (formerly known as vRealize Operations Cloud). IMPACT / RISKS The finished PEM file should look similar to the following example, where the number of CERTIFICATE sections depends on the length of the issuing chain: -----BEGIN CERTIFICATE----- (Your Primary SSL certificate: your_domain_name.crt) -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY----- (Your Private Key: your_domain_name.key) -----END RSA PRIVATE KEY----- -----BEGIN CERTIFICATE----- (Your Intermediate certificate: DigiCertCA.crt) -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- (Your Root certificate: TrustedRoot.crt) -----END CERTIFICATE----- Failure to comply with the above format may result in Cloud Proxy collections being affected. RESOLUTION To configure a certificate PEM file with VMware Aria Operations: 1. Generate a new Certificate PEM for VMware Aria Operations Cloud Proxy. 2. Install the Certificate PEM in the VMware Aria Operations Cloud Proxy. Note: The certificates applied will be used only for inward traffic from endpoints. We do not allow custom updates of the certificates for specific components of VMware Aria Operations such as Java or Gemfire. GENERATE A NEW CERTIFICATE PEM FILE 1. Log into the Cloud Proxy as root via SSH or Console. 2. Run the following command to make the /cert directory, then change to that directory: mkdir /cert && cd /cert 3. In the /cert directory, create a new file called vrops.cnf: vi vrops.cnf 4. The contents of the file should be as follows for a 3 node cluster: [req] prompt = no distinguished_name = dn req_extensions = ext default_bits = 2048 default_md = sha256 encrypt_key = no [dn] CN = Primary_Node_FQDN [ext] subjectAltName = @alt_names [alt_names] DNS.1 = Primary_Node_FQDN DNS.2 = Node_2_FQDN DNS.3 = Node_3_FQDN DNS.4 = Primary_Node_Shortname DNS.5 = Node_2_Shortname DNS.6 = Node_3_Shortname IP.1 = Primary_Node_IP IP.2 = Node_2_IP IP.3 = Node_3_IP Notes: * The CN is required to be listed in the subjectAltName section for web browser compatibility. * If using a load balancer, the CN should be the IP/FQDN of the load balancer. * The certificate will be valid for any FQDN/IP that is added to subjectAltName section. Follow your company's security policy for the SAN field, but it is advised to include the IP addresses or FQDN's for each node in the cluster. * For VMware Aria Operations (SaaS), only include the details for each Cloud Proxy. Example: [req] prompt = no distinguished_name = dn req_extensions = ext default_bits = 2048 default_md = sha256 encrypt_key = no [dn] CN = Cloud_Proxy_1_FQDN [ext] subjectAltName = @alt_names [alt_names] DNS.1 = Cloud_Proxy_1_FQDN DNS.2 = Cloud_Proxy_2_FQDN DNS.3 = Cloud_Proxy_3_FQDN DNS.4 = Cloud_Proxy_1_Shortname DNS.5 = Cloud_Proxy_2_Shortname DNS.6 = Cloud_Proxy_3_Shortname IP.1 = Cloud_Proxy_1_IP IP.2 = Cloud_Proxy_2_IP IP.3 = Cloud_Proxy_3_IP 5. In the examples above, replace the following with values relevant to your environment. Remove or add nodes relevant to your environment: * Primary_Node_FQDN * Node_2_FQDN * Node_3_FQDN * Cloud_Proxy_1_FQDN * Cloud_Proxy_2_FQDN * Cloud_Proxy_3_FQDN * Primary_Node_Shortname * Node_2_Shortname * Node_3_Shortname * Cloud_Proxy_1_Shortname * Cloud_Proxy_2_Shortname * Cloud_Proxy_3_Shortname * Primary_Node_IP * Node_2_IP * Node_3_IP * Cloud_Proxy_1_IP * Cloud_Proxy_1_IP * Cloud_Proxy_1_IP 6. Save and close the file: :wq 7. Using the vrops.cnf file, run the following command to create the CSR to send to your Certificate Authority: openssl req -new -subj "/" -config /cert/vrops.cnf -keyout /cert/vrops.key -out /cert/vrops.csr 8. Run the following to verify the information in the CSR is correct: openssl req -in /cert/vrops.csr -noout -text If all information is correct, send the CSR (vrops.csr) to your Certificate Authority and inform them of the details you have configured in the subjectAltName line of vrops.cnf. Once the Certificate Authority signs your CSR, they will return to you the signed cert based on this CSR and also their own root cert (along with any intermediate certs). Ensure that you download them in Base64 format if given an option. 9. To construct the PEM file to upload to VMware Aria Operations, you need to combine these files in a specific order: * The signed cert returned to you by the CA, based on the CSR you created. * The private key you generated earlier (vrops.key in above example). * Intermediate certs returned by CA (only if applicable) * The CA's root cert 10. Add the files downloaded form your CA to the VMware Aria Operations Primary node's /cert directory using an SCP utility. 11. Log into the Cloud Proxy as root via SSH or Console, pressing ALT+F1 in a Console to log in. 12. To combine these files, run the cat command as follows (Replacing the filenames as necessary): cat /cert/signed_cert.crt /cert/vrops.key /cert/cacerts.crt > /cert/multi_part.pem Note: If your CA also provided you with intermediate certs the command would look similar to the following: cat /cert/signed_cert.crt /cert/vrops.key /cert/intermediate.crt /cert/cacerts.crt > /cert/multi_part.pem INSTALL A NEW CERTIFICATE IN VMWARE ARIA OPERATIONS CLOUD PROXY 1. Log into the Cloud Proxy as root via SSH or Console. 2. Run the following command to import the certificate: cprc-cli -rc /cert/multi_part.pem Note: If the imported certificates already exist, dialog will appear asking to overwrite the existing one. The cprc-cli -rc command workflow will automatically: * Check if the imported certificate has a valid format and contains all necessary components in the chain. * Get the certificate and private key from the full chain and create separate .pem files which are needed by httpd config. * Back up existing httpd.conf and update httpd.conf SSL configuration with new certificates paths. * Restart the httpd-south service. RELATED INFORMATION Disclaimer: VMware Global Support does not assist in creating custom certificates for use in VMware Aria Operations. For additional support in creating a custom certificate for use in VMware Aria Operations, contact VMware Professional Services. For steps on how to configure a certificate for use with VMware Aria Operations on-premises, see Configure a Certificate For Use With VMware Aria Operations (2046591). TROUBLESHOOTING PEM FILE ISSUES: * If issues are encountered applying the new certificate, the VMware Aria Operations Custom Certificate Tool can be utilized to help determine the issue: How to use the VMware Aria Operations Custom Certificate Tool (2135521) * If an invalid certificate has been applied and functionality of VMware Aria Operations has been impacted, you can revert to the default certificate to keep the cluster functional while troubleshooting of the new certificate is ongoing by running the following command on affect Cloud Proxies: cprc-cli -rc reset * To decode each entry of the PEM file, using one of the following links: * https://certlogik.com/decoder/ * https://www.sslshopper.com/certificate-decoder.html * https://redkestrel.co.uk/products/decoder/ Note: Paste each --BEGIN and --END portion of the PEM file into a decoder and then verify that they are in the correct order in the PEM file. Disclaimer: VMware is not responsible for the reliability of any data, opinions, advice, or statements made on third-party websites. Inclusion of such links does not imply that VMware endorses, recommends, or accepts any responsibility for the content of such sites. Detectable by VMware SkylineTM ACTIONS Copy To Clipboard Copy link to clipboard copied! Print Print Language Language: English ATTACHMENTS Additional Resources KB • Downloading and licensing vSphere Hypervisor (ESXi 7.x and 8.x) (2107518) KB • Downloading and Installing the standalone VMware Remote Console (VMRC) in vSphere (2091284) Results 1-2 of 2 Ask The Community Get answers quickly from VMware experts in the community Post Subject CONTINUE IN COMMUNITIES Clear SearchLoading RELATED PRODUCTS: * VMware vRealize Operations Cloud * VMware vRealize Operations * VMware Aria Operations RELATED VERSIONS: * VMware vRealize Operations 8.10.x * VMware Aria Operations 8.12.x * Take Our Survey * * * * * Copyright © 2023 VMware, Inc. All rights reserved. * Terms of Use * Your California Privacy Rights * Privacy * Accessibility * Cookie Settings Loading word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All Support Assistant