VMware VCD 103 Installation Guide
VMware VCD 103 Installation Guide
15 JUL 2021
VMware Cloud Director 10.3
VMware Cloud Director Installation, Configuration, and Upgrade Guide
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2010-2022 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
VMware, Inc. 3
VMware Cloud Director Installation, Configuration, and Upgrade Guide
VMware, Inc. 4
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Using the Log Files to Troubleshoot VMware Cloud Director Updates and Patches 135
Checking for VMware Cloud Director Updates Fails 135
Installing the Latest Update of VMware Cloud Director Fails 136
VMware, Inc. 5
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Replacing Certificates for the HTTPS and Console Proxy Endpoints 204
Importing SSL Certificates from External Services 205
Import Endpoints Certificates from vSphere Resources 206
Configure a Test Connection Denylist 207
Managing the List of Allowed SSL Ciphers 208
Manage the List of Allowed SSL Protocols 211
Configure Metrics Collection and Publishing 213
Configuring a Cassandra Metrics Database 216
Recovering the System Administrator Password 218
Update the Failure Status of a Task 218
Configure Audit Message Handling 219
Configuring Email Templates 221
Finding Orphaned VMs 224
Join or Leave the VMware Customer Experience Improvement Program 226
Updating Application Configuration Settings 227
Configuring Catalog Synchronization Throttling 227
Debugging vCenter VM Discovery 229
Regenerating MAC Addresses for Multisite Stretched Networks 230
Update the Database IP Addresses on VMware Cloud Director Cells 232
View the Health Status of a VMware Cloud Director Cell 233
Enable and Configure Transfer Server Storage Monitoring 235
VMware, Inc. 6
VMware Cloud Director™ Installation,
Configuration, and Upgrade Guide
The VMware Cloud Director Installation, Configuration, and Upgrade Guide provides information
about installing and upgrading VMware Cloud Director™ software and configuring it to work with
® ® ®
VMware vSphere , VMware NSX for vSphere , and VMware NSX-T™ Data Center.
Intended Audience
The VMware Cloud Director Installation, Configuration, and Upgrade Guide is intended for anyone
who wants to install or upgrade VMware Cloud Director software. The information in this book is
written for experienced system administrators who are familiar with Linux, Windows, IP networks,
and vSphere.
VMware, Inc. 7
VMware Cloud Director
Architecture 1
A VMware Cloud Director server group consists of one or more VMware Cloud Director servers
installed on Linux or deployments of the VMware Cloud Director appliance. Each server in the
group runs a collection of services called a VMware Cloud Director cell. All cells share a single
VMware Cloud Director database and a transfer server storage, and connect to the vSphere and
network resources.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
To ensure VMware Cloud Director high availability, you must install at least two VMware Cloud
Director cells in a server group. When you use a third-party load balancer, you can ensure an
automatic failover without downtime.
®
You can connect a VMware Cloud Director installation to multiple VMware vCenter Server
systems and the VMware ESXi™ hosts that they manage. For network services, VMware Cloud
Director can use NSX Data Center for vSphere associated with vCenter Server or you can register
NSX-T Data Center with VMware Cloud Director. Mixed NSX Data Center for vSphere and NSX-T
Data Center are also supported.
VMware, Inc. 8
VMware Cloud Director Installation, Configuration, and Upgrade Guide
VMware Cloud
Director Server Transfer
Server
Cell Storage
VMware, Inc. 9
VMware Cloud Director Installation, Configuration, and Upgrade Guide
A VMware Cloud Director server group installed on Linux uses an external database.
A VMware Cloud Director server group that consists of appliance deployments uses the
embedded database in the first member of the server group. You can configure a VMware Cloud
Director database high availability by deploying two instances of the appliance as standby cells in
the same server group. See Appliance Deployments and Database High Availability Configuration.
Figure 1-3. VMware Cloud Director Appliances Comprising an Embedded Database High
Availability Cluster
The VMware Cloud Director installation and configuration process creates the cells, connects
them to the shared database and transfer server storage, and creates the system administrator
account. Then the system administrator establishes connections to the vCenter Server system, the
ESXi hosts, and the NSX Manager or NSX-T Manager instances.
For information about adding vSphere and network resources, see the VMware Cloud Director
Service Provider Admin Portal Guide.
VMware, Inc. 10
VMware Cloud Director Hardware
and Software Requirements 2
Each server in a VMware Cloud Director server group must meet certain hardware and software
requirements. In addition, a supported database must be accessible to all members of the group.
Each server group requires access to a vCenter Server system, an NSX Manager instance, and one
or more ESXi hosts.
n vCenter Server networks intended for use as VMware Cloud Director external networks or
network pools must be available to all hosts in any cluster intended for VMware Cloud Director
to use. Making these networks available to all hosts in a data center simplifies the task of
adding new vCenter Server instances to VMware Cloud Director.
n vSphere Distributed Switches are required for isolated networks and network pools backed by
NSX Data Center for vSphere.
n vCenter Server clusters used with VMware Cloud Director must specify a vSphere DRS
automation level of Fully Automated. Storage DRS, if enabled, can be configured with any
automation level.
VMware, Inc. 11
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n vCenter Server instances must trust their hosts. All hosts in all clusters managed by VMware
Cloud Director must be configured to require verified host certificates. In particular, you
must determine, compare, and select matching thumbprints for all hosts. See Configure SSL
Settings in the vCenter Server and Host Management documentation.
Note VMware recommends that VMware Cloud Director manages a vCenter Server instance
exclusively. When you use a vCenter Server instance for VMware Cloud Director and other
purposes, a vCenter Server administrator might accidentally move VMware Cloud Director
resources. This can cause VMware Cloud Director to operate incorrectly, including losing virtual
machines that VMware Cloud Director manages.
Shared Storage
NFS or other shared storage volume for the VMware Cloud Director transfer service. The storage
volume must be expandable and accessible to all servers in the server group.
The network that connects the VMware Cloud Director servers, the database server, the vCenter
Server systems, and the NSX components, must meet several requirements:
IP addresses
VMware, Inc. 12
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Each VMware Cloud Director server must support two different SSL endpoints. One endpoint
is for the HTTPS service. The other endpoint is for the console proxy service. These endpoints
can be separate IP addresses, or a single IP address with two different ports. You can use IP
aliases or multiple network interfaces to create these addresses. Do not use the Linux ip addr
add command to create the second address.
The VMware Cloud Director appliance uses its eth0 IP address with custom port 8443 for the
console proxy service.
The IP address configured as the console proxy endpoint must not be located behind an
SSL-terminating load balancer or reverse proxy. All console proxy requests must be relayed
directly to the console proxy IP address.
For an installation with a single IP address, you can customize the console proxy address from
the Service Provider Admin Portal. For example, for the VMware Cloud Director appliance,
you must customize the console proxy address to vcloud.example.com:8443.
You must use a network time service such as NTP to synchronize the clocks of all VMware
Cloud Director servers, including the database server. The maximum allowable drift between
the clocks of synchronized servers is 2 seconds.
For the VMware Cloud Director appliance deployments, the NFS server used for the transfer
share must use a network time service such as NTP to synchronize its clock with that of
the VMware Cloud Director appliances. The maximum allowable drift between the clocks of
synchronized servers is 2 seconds.
All VMware Cloud Director servers, including the NFS server used for the transfer share and
the database server, must be configured to be in the same time zone.
All host names that you specify during installation and configuration must be resolvable by
DNS using forward and reverse lookup of the fully qualified domain name or the unqualified
hostname. For example, for a host named vcloud.example.com, both of the following
commands must succeed on a VMware Cloud Director host:
nslookup vcloud
nslookup vcloud.example.com
In addition, if the host vcloud.example.com has the IP address 192.168.1.1, the following
command must return vcloud.example.com:
nslookup 192.168.1.1
VMware, Inc. 13
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Reverse DNS lookup of the eth0 IP address is required for the appliance. The following
command must succeed in your environment:
host -W 15 -R 1 -T <eth0-IP-address>
Connect all VMware Cloud Director servers to a network that is secured and monitored.
For information on the network ports and protocols used by VMware Cloud Director, see VMware
Ports and Protocols.
n Do not connect VMware Cloud Director directly to the public Internet. Always protect VMware
Cloud Director network connections with a firewall. Only port 443 (HTTPS) must be open
to incoming connections. Ports 22 (SSH) and 80 (HTTP) can also be opened for incoming
connections if needed. In addition, the cell-management-tool requires access to the cell's
loopback address. All other incoming traffic from a public network, including requests to JMX
(port 8999) must be rejected by the firewall.
For information on the ports that must allow incoming packets from VMware Cloud Director
hosts, see VMware Ports and Protocols.
n Do not connect the ports used for outgoing connections to the public network.
For information on the ports that must allow outgoing packets from VMware Cloud Director
hosts, see VMware Ports and Protocols.
n Starting with version 10.1, service providers and tenants can use the VMware Cloud Director
API to test connections to remote servers, and to verify server identity as part of an SSL
handshake. To protect VMware Cloud Director network connections, configure a denylist of
internal hosts that are unreachable to tenants who are using the VMware Cloud Director
API for connection testing. Configure the denylist after VMware Cloud Director installation or
upgrade and before granting tenants access to VMware Cloud Director. See Configure a Test
Connection Deny List.
n Route traffic between VMware Cloud Director servers and the following servers over a
dedicated private network.
n RabbitMQ
n Cassandra
n If possible, route traffic between VMware Cloud Director servers, vSphere, and NSX over a
dedicated private network.
VMware, Inc. 14
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n Virtual switches and distributed virtual switches that support provider networks must be
isolated from each other. They cannot share the same layer 2 physical network segment.
n Use NFSv4 for transfer service storage. The most common NFS version, NFSv3, does not
offer on transit encryption which in some configurations might enable in-flight sniffing or
tampering with data being transferred. Threats inherent in NFSv3 are described in the SANS
white paper NFS Security in Both Trusted and Untrusted Environments. Additional information
about configuring and securing the VMware Cloud Director transfer service is available lin
VMware Knowledge Base article 2086127.
VMware, Inc. 15
Deployment, Upgrade, and
Administration of the VMware
Cloud Director Appliance
3
Starting with version 9.7, the VMware Cloud Director appliance includes an embedded
PostgreSQL database with a high availability function. When you deploy, upgrade, or migrate
the VMware Cloud Director appliance, you can perform administration, monitoring, remediation,
or troubleshooting operations.
You can deploy the VMware Cloud Director appliance as a primary cell, standby cell, or VMware
Cloud Director application cell. See Deploy the VMware Cloud Director Appliance by Using the
vSphere Client, Deploying the VMware Cloud Director Appliance by Using VMware OVF Tool, or
Deploy the VMware Cloud Director Appliance with Signed Wildcard Certificates for HTTPS and
Console Proxy Communication.
VMware, Inc. 16
VMware Cloud Director Installation, Configuration, and Upgrade Guide
To configure HA for your VMware Cloud Director database, when you create your server group,
you can configure a database HA cluster by deploying one primary and two standby instances of
the VMware Cloud Director appliance. You can horizontally scale your server group by additionally
deploying application cells. See the Figure 3-1. VMware Cloud Director Appliance Database HA
Cluster figure.
Primary
PostgreSQL (Primary)
Database Database
Replication Replication
VMware Cloud
Director DB traffic
Standby 1 Standby 2
repmgrd repmgrd
The primary cell is the first member in the VMware Cloud Director server group. The
embedded database is configured as the VMware Cloud Director database. The database
name is vcloud, and the database user is vcloud.
a To verify the VMware Cloud Director service health, log in with the system administrator
credentials to the VMware Cloud Director Service Provider Admin Portal at https://
primary_eth0_ip_address/provider.
b To verify the PostgreSQL database health, log in as root to the appliance management
user interface at https://primary_eth1_ip_address:5480.
VMware, Inc. 17
VMware Cloud Director Installation, Configuration, and Upgrade Guide
3 Deploy two instances of the VMware Cloud Director appliance as standby cells.
The embedded databases are configured in a replication mode with the primary database.
Note After the initial standby appliance deployment, the replication manager begins
synchronizing its database with the primary appliance database. During this time, the VMware
Cloud Director database and therefore the VMware Cloud Director UI are unavailable.
See View the VMware Cloud Director Appliance Cluster Health and Failover Mode.
5 (Optional) Deploy one or more instances of the VMware Cloud Director appliance as VMware
Cloud Director Application cells.
The embedded databases are not used. The VMware Cloud Director Application cell connects
to the primary database.
VMware Cloud Director (API/UI) VMware Cloud Director (API/UI) VMware Cloud Director (API/UI)
VMware Cloud
Director DB traffic
Standby 1 Standby 2
repmgrd repmgrd
Note If your cluster is configured for automatic failover, after you deploy one or more additional
cells, you must use the Appliance API to reset the cluster failover mode to Automatic. See the
VMware Cloud Director Appliance API. The default failover mode for new cells is Manual. If
the failover mode is inconsistent across the nodes of the cluster, the cluster failover mode is
Indeterminate. The Indeterminate mode can lead to inconsistent cluster states between the
nodes and nodes following an old primary cell. To view the cluster failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
VMware, Inc. 18
VMware Cloud Director Installation, Configuration, and Upgrade Guide
To create a VMware Cloud Director server without a database HA configuration, follow this
workflow:
The primary cell is the first member in the VMware Cloud Director server group. The
embedded database is configured as the VMware Cloud Director database. The database
name is vcloud, and the database user is vcloud.
a To verify the VMware Cloud Director service health, log in with the system administrator
credentials to the VMware Cloud Director Service Provider Admin Portal at https://
primary_eth0_ip_address/provider.
b To verify the PostgreSQL database health, log in as root to the appliance management
user interface at https://primary_eth1_ip_address:5480.
3 (Optional) Deploy one or more instances of the VMware Cloud Director appliance as VMware
Cloud Director Application cells.
The embedded database is not used. The VMware Cloud Director Application cell connects to
the primary database.
VMware, Inc. 19
VMware Cloud Director Installation, Configuration, and Upgrade Guide
The automatic failover eliminates the need for an administrator to initiate the failover action if the
primary database service fails to perform its functions for any reason. By default, the failover mode
is set to manual. You can set the failover mode to automatic or manual by using the VMware Cloud
Director appliance API. See the VMware Cloud Director Appliance API Schema Reference.
Note If your cluster is configured for automatic failover, after you deploy one or more additional
cells, you must use the Appliance API to reset the cluster failover mode to Automatic. See the
VMware Cloud Director Appliance API. The default failover mode for new cells is Manual. If
the failover mode is inconsistent across the nodes of the cluster, the cluster failover mode is
Indeterminate. The Indeterminate mode can lead to inconsistent cluster states between the
nodes and nodes following an old primary cell. To view the cluster failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
If your environment has at least two active standby cells, in case of a primary database failure, a
database failover is automatically initiated. After the failover, there must be at least one active
standby for the new primary database to be updatable. Under normal circumstances, your
VMware Cloud Director appliance deployment must have at least two active standbys at all times.
If there is only one active standby for a short period, for example, due to the failure of the primary
and the promotion of one of the standbys, then the old failed primary must be replaced with a new
standby as soon as possible.
When there is an active primary and at least two active standby cells, the cluster is considered to
be in a Healthy state. If there is an active primary and only one active standby, the cluster is in
a Degraded state. If there is another database failure while the cluster is in a Degraded state, the
primary is not updatable until another standby comes online. When the primary database is not
updatable, VMware Cloud Director is not available because the VMware Cloud Director cells are
unable to update the database until there is at least one active standby to process a streaming
replication from the primary database. The concept of a Healthy and Degraded cluster is the same
whether you enable manual or automatic failover.
VMware, Inc. 20
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Figure 3-2. Manual and Automatic VMware Cloud Director Appliance Failover
Manual VMware Cloud Director Appliance Failover Automatic VMware Cloud Director Appliance Failover
cell A: nodeRole: PRIMARY, nodeHealth: HEALTHY cell A: nodeRole: PRIMARY, nodeHealth: HEALTHY
cell B: nodeRole: STANDBY, nodeHealth: HEALTHY cell B: nodeRole: STANDBY, nodeHealth: HEALTHY
cell C: nodeRole: STANDBY, nodeHealth: HEALTHY cell C: nodeRole: STANDBY, nodeHealth: HEALTHY
Primary Failure
! Primary Failure
!
cell A: nodeRole: PRIMARY, nodeHealth: UNHEALTHY cell A: nodeRole: PRIMARY, nodeHealth: UNHEALTHY
cell B: nodeRole: STANDBY, nodeHealth: HEALTHY cell B: nodeRole: STANDBY, nodeHealth: HEALTHY
cell C: nodeRole: STANDBY, nodeHealth: HEALTHY cell C: nodeRole: STANDBY, nodeHealth: HEALTHY
cell A: nodeRole: OLD_PRIMARY, nodeHealth: UNHEALTHY cell A: nodeRole: OLD_PRIMARY, nodeHealth: UNHEALTHY
cell B: nodeRole: PRIMARY, nodeHealth: HEALTHY cell B: nodeRole: PRIMARY, nodeHealth: HEALTHY
cell C: nodeRole: STANDBY, nodeHealth: HEALTHY cell C: nodeRole: STANDBY, nodeHealth: HEALTHY
cell A: nodeRole: STANDBY, nodeHealth: Healthy cell A: nodeRole: STANDBY, nodeHealth: Healthy
cell B: nodeRole: PRIMARY, nodeHealth: Healthy cell B: nodeRole: PRIMARY, nodeHealth: Healthy
cell C: nodeRole: STANDBY, nodeHealth: Healthy cell C: nodeRole: STANDBY, nodeHealth: Healthy
In case of a failover, if a failed primary database restarts after a new primary cell is promoted,
VMware Cloud Director automatically fences out the old primary. This automation prevents the
split-brain syndrome where two active databases can diverge from each other. The fencing
automation stops and disables the vpostgres service on the old primary node. After that, you
can redeploy the failed primary as a standby cell to restore the cluster health to Healthy.
For more information about viewing the cluster health status and failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
VMware, Inc. 21
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Important The VMware Cloud Director appliance supports only NFS type of shared storage.
The appliance deployment process involves mounting the NFS shared transfer server storage. The
VMware Cloud Director appliance also validates most details of the NFS share during deployment,
including directory permissions and ownership. You must verify that a valid NFS mount point
exists and is accessible to the VMware Cloud Director appliance instances.
Each member of the server group mounts this volume at the same mountpoint: /opt/vmware/
vcloud-director/data/transfer. Space on this volume is consumed in many ways, including:
n During transfers, uploads and downloads occupy this storage. When the transfer finishes, the
uploads and downloads are removed from the storage. Transfers that make no progress for 60
minutes are marked as expired and cleaned up by the system. Because transferred images can
be large, it is a good practice to allocate at least several hundred gigabytes for this use.
n Catalog items in catalogs that are published externally and for which caching of the published
content is enabled, occupy this storage. Items from catalogs that are published externally,
but do not enable caching, do not occupy this storage. If you enable organizations in your
cloud to create catalogs that are published externally, you can assume that hundreds or even
thousands of catalog items require space on this volume. The size of each catalog item is about
the size of a virtual machine in a compressed OVF form.
n VMware Cloud Director stores the appliance database backups in the pgdb-backup directory
in the transfer share. These backup bundles might consume significant space.
n Appliance nodes data and the response.properties file occupy this space.
Note The volume of the transfer server storage must have the capacity for future expansion.
Note NFS downtime can cause VMware Cloud Director appliance cluster functionalities to
malfunction. The appliance management UI is unresponsive while the NFS is down or cannot be
reached. Other functionalities that might be affected are the fencing out of a failed primary cell,
switchover, promoting a standby cell, and so on.
Note When you use Ubuntu or Debian based Linux distributions for the NFS, the creation of
database backups might fail.
VMware, Inc. 22
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n The export list for the NFS server must allow for each server member in your VMware Cloud
Director server group to have read-write access to the shared location that is identified in the
export list. This capability allows the vcloud user to write files to and read files from the shared
location.
n The NFS server must allow read-write access to the shared location by the root system
account on each server in your VMware Cloud Director server group. This capability allows
for collecting the logs from all cells at once in a single bundle using the vmware-vcd-support
script with its multi-cell options. You can meet this requirement by using no_root_squash in the
NFS export configuration for this shared location.
/nfs/vCDspace vCD_Cell1_IP_Address(rw,sync,no_subtree_check,no_root_squash)
/nfs/vCDspace vCD_Cell2_IP_Address(rw,sync,no_subtree_check,no_root_squash)
/nfs/vCDspace vCD_Cell3_IP_Address(rw,sync,no_subtree_check,no_root_squash)
There must be no space between each cell IP address and its immediate following left parenthesis
in the export line. If the NFS server reboots while the cells are writing data to the shared location,
the use of the sync option in the export configuration prevents data corruption in the shared
location. The use of the no_subtree_check option in the export configuration improves reliability
when a subdirectory of a file system is exported.
For each server in the VMware Cloud Director server group, you must have a corresponding entry
in the NFS server's /etc/exports file so that they can all mount this NFS share. After changing
the /etc/exports file on the NFS server, run exportfs -a to re-export all NFS shares.
VMware, Inc. 23
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Install and Configure NSX Data Center for vSphere for VMware Cloud
Director
If you plan your VMware Cloud Director installation to use network resources from NSX Data
Center for vSphere, you must install and configure NSX Data Center for vSphere and associate a
unique NSX Manager instance with each vCenter Server instance that you plan to include in your
VMware Cloud Director installation.
NSX Manager is included in the NSX Data Center for vSphere download. For the most
recent information about compatibility between VMware Cloud Director and other VMware
products, see the VMware Product Interoperability Matrices at http://partnerweb.vmware.com/
comp_guide/sim/interop_matrix.php. For information about the network requirements, see
Network Configuration Requirements for VMware Cloud Director.
Important This procedure applies only when you are performing a new installation of VMware
Cloud Director. If you are upgrading an existing installation of VMware Cloud Director, see
Upgrading VMware Cloud Director on Linux.
Prerequisites
Verify that each of your vCenter Server systems meets the prerequisites for installing NSX
Manager.
Procedure
1 Perform the installation task for the NSX Manager virtual appliance.
2 Log in to the NSX Manager virtual appliance that you installed and confirm the settings that
you specified during installation.
3 Associate the NSX Manager virtual appliance that you installed with the vCenter Server system
that you plan to add to VMware Cloud Director in your planned VMware Cloud Director
installation.
VMware Cloud Director creates VXLAN network pools to provide network resources to
Provider VDCs. If VXLAN support is not configured in the associated NSX Manager, Provider
VDCs show a network pool error, and you must create a different type of network pool and
associate it with the Provider VDC. For details about configuring VXLAN support, see the NSX
Administration Guide.
5 (Optional) If you want Edge Gateways in the system to provide distributed routing, set up an
NSX Controller cluster.
VMware, Inc. 24
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Install and Configure NSX-T Data Center for VMware Cloud Director
If you plan your VMware Cloud Director installation to use network resources from NSX-T Data
Center, you must install and configure NSX-T Data Center.
Important To configure the NSX-T Data Center objects and tools, use the simplified policy UI and
the policy APIs that correspond to the simplified UI. For more information, see the overview of
NSX-T Manager in the NSX-T Data Center Administration Guide.
For the most recent information about compatibility between VMware Cloud Director and other
VMware products, see VMware Product Interoperability Matrices.
For information about the network requirements, see Network Configuration Requirements for
VMware Cloud Director.
This procedure applies only when you are performing a new installation of VMware Cloud
Director. If you are upgrading an existing installation of VMware Cloud Director, see Upgrading
VMware Cloud Director on Linux.
Prerequisites
Procedure
For more information on NSX-T Manager deployment, see the NSX-T Data Center Installation
Guide.
2 Create transport zones based on your networking requirements.
For more information on transport zones creation, see the NSX-T Data Center Installation
Guide.
Note
For more information on NSX Edge creation, see the NSX-T Data Center Installation Guide.
For more information on configuring a managed host transportation node, see the NSX-T Data
Center Installation Guide.
5 Create a tier-0 gateway.
For more information on tier-0 creation, see the NSX-T Data Center Administration Guide.
What to do next
VMware, Inc. 25
VMware Cloud Director Installation, Configuration, and Upgrade Guide
For information about registering an NSX-T Manager instance, see the VMware Cloud Director
Service Provider Admin Portal Guide.
2 Create a network pool backed by an NSX-T Data Center transport zone.
For more information on creating a network pool that is backed by an NSX-T Data Center
transport zone, see the VMware Cloud Director Service Provider Admin Portal Guide.
For more information on adding an external network that is backed by an NSX-T Data Center
tier-0 logical router, see the VMware Cloud Director Service Provider Admin Portal Guide.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
The VMware Cloud Director appliance is a preconfigured virtual machine that is optimized for
running the VMware Cloud Director services.
The appliance is distributed with a name of the form VMware Cloud Director-v.v.v.v-
nnnnnn_OVF10.ova, where v.v.v.v represents the product version and nnnnnn the build number.
For example: VMware Cloud Director-10.2.0.0-9229800_OVA10.ova.
The VMware Cloud Director appliance package contains the following software:
n VMware Photon™ OS
n PostgreSQL 10
The primary-small and standby-small VMware Cloud Director appliance sizes are suitable for lab
or test systems. The other sizes meet the minimum sizing requirements for production systems.
Depending on the workload, you might need to add additional resources.
Important Installing any third-party component on the VMware Cloud Director appliance is
unsupported. You can install only supported VMware components according to VMware Product
®
Interoperability Matrices. For example, you can install a supported version of a VMware vRealize
®
Operations Manager™ or VMware vRealize Log Insight™ monitoring agent.
VMware, Inc. 26
VMware Cloud Director Installation, Configuration, and Upgrade Guide
By default, the VMware Cloud Director appliance uses TLS, in place of the deprecated SSL, for
database connections, including replication. This feature is active immediately after deployment,
using a self-signed PostgreSQL certificate. To use a signed certificate from a certificate authority
(CA), see Replace a Self-Signed Embedded PostgreSQL and VMware Cloud Director Appliance
Management UI Certificate.
Note The VMware Cloud Director appliance does not support external databases.
Note The eth0 and eth1 networks must be placed on separate subnets.
SSH 22 22
HTTP 80 n/a
After the creation of the VMware Cloud Director appliance, you can use the vSphere networking
features to add a new network interface card (NIC). See the Add a Network Adapter to a Virtual
Machine information in the vSphere Virtual Machine Administration guide.
The VMware Cloud Director appliance supports user customization of firewall rules by using
iptables. To add custom iptables rules, you can add your own configuration data to the end
of the /etc/systemd/scripts/iptables file.
VMware, Inc. 27
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Overview
To ensure that the cluster can support an automated failover if a primary cell failure occurs, the
minimal VMware Cloud Director deployment must consist of one primary and two standby cells.
The environment remains available under any failure scenario where one of the cells goes offline
for any reason. If a standby failure occurs, until you redeploy the failed cell, the cluster operates
in a fully functional state with some performance degradation. See Appliance Deployments and
Database High Availability Configuration.
The VMware Cloud Director appliance has four sizes that you can select during the deployment:
Small, Medium, Large, and Extra Large (VVD). The Small appliance size is suitable for lab
evaluation and this document does not provide guidance on the Small appliance configuration.
The sizing options table provides the specifications for the remaining options and the most suitable
use cases for a production environment. The Extra Large configuration matches the VMware
Validated Designs (VVD) for Cloud Providers scale profile.
To create larger custom sizes, system administrators can adjust the size of the deployed cells.
Important VMware does not provide support for VMware Cloud Director appliance deployments
without database HA.
Recommended use cases Lab or small production Production environment Production with API
environments integrations and monitoring
VMware, Inc. 28
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Configuration Definitions
Note Based on the default database connection configuration, all configurations are limited to a
maximum of 6 cells of primary, standby and application type.
VMware, Inc. 29
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Note The vpostgres-reconfigure service does not modify any previous manual
postgresql.auto.conf customizations.
If you want to make a manual customization, you can edit the postgresql.auto.conf file. The
manual customization takes precedence over the vpostgres-reconfigure service customization.
To customize manually the appliance sizing, follow this procedure on all cells.
1 Log in directly or by using an SSH client to the OS of the primary appliance as root.
2 To view and take note of the vCPU information, run the following command.
3 To view and take note of the RAM information, run the following command.
The RAM reported below is in KB and you must convert it to GB by dividing by 1024000.
cat /proc/meminfo | grep MemTotal | cut -dk -f1 | awk '{print int($2/1024000)}'
4 Calculate the shared_buffers value to be one-fourth of the total RAM minus 4 GB.
5 Calculate the effective_cache_size value to be three-fourths of the total RAM minus 4 GB.
sudo -i -u postgres
VMware, Inc. 30
VMware Cloud Director Installation, Configuration, and Upgrade Guide
sudo -i -u postgres
12 For each standby node copy the postgresql.auto.conf file to the node and restart the
vpostgres process.
To remove any manual customizations and continue using the vpostgres-reconfigure service,
change the user to postgres and run the following commands.
n Verify that you have access to the VMware Cloud Director .ova file.
n Before you deploy the primary appliance, prepare an NFS shared transfer service storage. See
Preparing the Transfer Server Storage for VMware Cloud Director on Linux.
Note The shared transfer service storage must contain neither a responses.properties file
nor an appliance-nodes directory.
n Deploying the VMware Cloud Director Appliance by Using VMware OVF Tool
n Deploy the VMware Cloud Director Appliance with Signed Wildcard Certificates for HTTPS and
Console Proxy Communication
VMware, Inc. 31
VMware Cloud Director Installation, Configuration, and Upgrade Guide
You must deploy the first member of a VMware Cloud Director server group as a primary cell.
You can deploy a subsequent member of a VMware Cloud Director server group as a standby
or VMware Cloud Director application cell. See Appliance Deployments and Database High
Availability Configuration.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
When adding additional or replacement appliances to a database cluster, the vCPU and RAM must
match those of the existing primary and standby cells in the cluster.
The OVA version of the newly deployed standby must be the same as the existing
appliances in the cluster. To view the version of the running appliances, see the
About information in the appliance management UI. The appliance is distributed with a
name of the form VMware Cloud Director-v.v.v.v-nnnnnn_OVF10.ova, where v.v.v.v
represents the product version and nnnnnn the build number. For example: VMware Cloud
Director-10.2.0.0-9229800_OVA10.ova.
For information about deploying OVF templates in vSphere, see vSphere Virtual Machine
Administration.
As an alternative, you can deploy the appliance by using VMware OVF Tool. See Deploying the
VMware Cloud Director Appliance by Using VMware OVF Tool.
Note Deploying the VMware Cloud Director appliance in VMware Cloud Director is unsupported.
Prerequisites
Procedure
VMware, Inc. 32
VMware Cloud Director Installation, Configuration, and Upgrade Guide
What to do next
n Configure the public console proxy address, because the VMware Cloud Director appliance
uses its eth0 NIC with custom port 8443 for the console proxy service. See Customize Public
Addresses for VMware Cloud Director on Linux.
n To add members to the VMware Cloud Director server group, repeat the procedure.
n To enter the license key, log in to the VMware Cloud Director Service Provider Admin Portal.
n To replace the self-signed certificate that is created during the appliance first boot, you can
Create and Import CA-Signed SSL Certificates for VMware Cloud Director on Linux.
For more information about the VMware Cloud Director appliance sizing options or possible
configurations, see VMware Cloud Director Appliance Sizing Guidelines.
Procedure
1 In the vSphere Web Client or the vSphere Client, right-click any inventory object and click
Deploy OVF Template.
2 Enter the path to the VMware Cloud Director .ova file and click Next.
3 Enter a name for the virtual machine and browse the vCenter Server repository to select a data
center or folder on which to deploy the appliance, and click Next.
4 Select an ESXi host or cluster on which to deploy the appliance and click Next.
VMware, Inc. 33
VMware Cloud Director Installation, Configuration, and Upgrade Guide
The primary-small and standby-small VMware Cloud Director appliance sizes are suitable for
lab or test systems. The other sizes meet the minimum sizing requirements for production
systems. Depending on the workload, you might need to add additional resources.
Option Description
Primary-small Deploys the appliance with 12 GB of RAM and 2 vCPUs as the first member in
a VMware Cloud Director server group.
The embedded database in the primary cell is configured as the VMware
Cloud Director database. The database name is vcloud, and the database
user is vcloud.
Primary-medium Deploys the appliance with 16 GB of RAM and 8 vCPUs as the first member in
a VMware Cloud Director server group.
The embedded database in the primary cell is configured as the VMware
Cloud Director database. The database name is vcloud, and the database
user is vcloud.
Primary-large Deploys the appliance with 24 GB of RAM and 16 vCPUs as the first member
in a VMware Cloud Director server group.
The embedded database in the primary cell is configured as the VMware
Cloud Director database. The database name is vcloud, and the database
user is vcloud.
Primary-extralarge Deploys the appliance with 32 GB of RAM and 24 vCPUs as the first member
in a VMware Cloud Director server group.
The embedded database in the primary cell is configured as the VMware
Cloud Director database. The database name is vcloud, and the database
user is vcloud.
VMware, Inc. 34
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Option Description
Cloud Director Cell Application Deploys the appliance with 8 GB of RAM and 8 vCPUs as a subsequent
member in a VMware Cloud Director server group.
The embedded database in a vCD application cell is not used. The vCD
application cell connects to the primary database.
Important The primary and the standby cells in a VMware Cloud Director server group
must be of the same size. A database HA cluster can consist of one primary-small and two
standby-small cells, one primary-medium and two standby-medium cells, and so on.
After the deployment, you can reconfigure the size of the appliance.
8 Select the disk format and the datastore for the virtual machine configuration files and virtual
disks, and click Next.
Thick formats improve performance, and thin formats save storage space.
9 From the drop-down menus in the Destination Network cells, select the target networks for
the eth1 and eth0 NICs of the appliance.
The source network list might be in reverse order. Verify that you are selecting the correct
destination network for each source network.
10 From the IP allocation settings drop-down menus, select a Static-Manual IP allocation and an
IPv4 protocol.
11 Click Next.
You are redirected to the Customize template page of the wizard to configure the VMware
Cloud Director details.
VMware, Inc. 35
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Setting Description
NTP Server The host name or IP address of the NTP server to use.
To specify multiple NTP servers, enter a space-separated list.
Initial root password The initial root password for the appliance. Must contain at least eight
characters, one uppercase character, one lowercase character, one numeric
digit, and one special character.
Important The initial root password becomes the private key password.
The cluster deployment requires all the cells to have the same root password
during the initial deployment. After the boot process finishes, you can change
the root password on any desired cell.
Note The OVF deployment wizard does not validate the initial root password
against password criteria.
Expire Root Password Upon First If you want to continue using the initial password after the first login, you
Login must verify that the initial password meets root password criteria. To continue
using the initial root password after the first login, deselect this option.
Note For information about changing the date, time, or time zone of the appliance, see
https://kb.vmware.com/kb/59674.
13 (Optional) In section Additional Networking Properties, if your network topology requires it,
enter the static routes for the eth0 and eth1 network interfaces, and click Next.
If you want to reach hosts over a non-default gateway route, you might need to provide static
routes. For example, management infrastructure is accessible only through the eth1 interface,
while the default gateway is on eth0. In most cases, this setting can remain empty.
14 In section Networking Properties, enter the network details for the eth0 and eth1 NICs, and
click Next.
Setting Description
Default Gateway The IP address of the default gateway for the appliance.
Domain Search Path A comma- or space-separated list of domain names for the appliance
hostname lookup, for example, subdomain.example.com.
Note The domain name that you entered in the Domain Name text box is the
first element in the domain search path list.
Domain Name Servers The IP address of the domain name server for the appliance.
VMware, Inc. 36
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Setting Description
eth0 Network Netmask The netmask or prefix for the eth0 interface.
eth1 Network Netmask The netmask or prefix for the eth1 interface.
15 On the Ready to Complete page, review the configuration settings for the VMware Cloud
Director appliance, and click Finish to start the deployment.
What to do next
2 Configure the VMware Cloud Director Primary Appliance or Configure the VMware Cloud
Director Standby and Application Cells.
Prerequisites
3 Familiarize yourself with the Preparing the Transfer Server Storage for the VMware Cloud
Director Appliance topic.
Procedure
2 Log in to the appliance management user interface of the primary appliance instance.
3 In section Appliance Settings, configure the appliance details and click Next.
Setting Description
NFS mount for transfer file location The location of the NFS shared transfer server storage. VMware Cloud
Director validates the location and displays a green check mark if the NFS
mount is validated.
DB password for the 'vcloud' user The password for the vcloud PostgreSQL database user.
Confirm DB password Confirmation of the password for the vcloud PostgreSQL database user.
Participate in the Customer Enables or disables the participation in the VMware Customer Experience
Experience Improvement Program Improvement Program.
VMware, Inc. 37
VMware Cloud Director Installation, Configuration, and Upgrade Guide
4 In the Administrator Account section, configure the system administrator details and click
Next.
Setting Description
User name The user name for the system administrator account. Defaults to
administrator.
Password The password for the system administrator account. The password must be
between 6 and 128 characters long.
Confirm Password Confirm the password for the system administrator account.
Full name The full name of the system administrator. Defaults to vCD Admin.
5 In the VMware Cloud Director Settings section, configure the installation of this instance.
Setting Description
System name The name for the vCenter Server folder to create for this VMware Cloud
Director installation.
Installation ID The ID for this VMware Cloud Director installation to use when you create
MAC addresses for virtual NICs. Defaults to 1.
If you plan to create stretched networks across VMware Cloud Director
installations in multisite deployments, consider setting a unique installation
ID for each VMware Cloud Director installation.
6 Click Submit and when the system setup finishes, click OK.
Results
If the deployment is successful, the Embedded Database Availability and Services tabs appear.
What to do next
n Deploy a standby or application cell. See Start the VMware Cloud Director Appliance
Deployment.
Prerequisites
1 Deploy a standby or application cell. See Start the VMware Cloud Director Appliance
Deployment.
2 See Preparing the Transfer Server Storage for the VMware Cloud Director Appliance.
VMware, Inc. 38
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Procedure
2 Log in to the appliance management user interface of the standby or application cell.
4 Click Submit and when the system setup finishes, click OK.
What to do next
You must deploy the first member of a VMware Cloud Director server group as a primary cell.
You can deploy a subsequent member of a VMware Cloud Director server group as a standby
or VMware Cloud Director application cell. See Appliance Deployments and Database High
Availability Configuration.
For information about installing OVF Tool, see the VMware OVF Tool Release Notes document.
For information about using OVF Tool, see the OVF Tool User's Guide.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
When adding additional or replacement appliances to a database cluster, the vCPU and RAM must
match those of the existing primary and standby cells in the cluster.
The OVA version of the newly deployed standby must be the same as the existing
appliances in the cluster. To view the version of the running appliances, see the
About information in the appliance management UI. The appliance is distributed with a
name of the form VMware Cloud Director-v.v.v.v-nnnnnn_OVF10.ova, where v.v.v.v
represents the product version and nnnnnn the build number. For example: VMware Cloud
Director-10.2.0.0-9229800_OVA10.ova.
For information about deploying OVF templates in vSphere, see vSphere Virtual Machine
Administration.
As an alternative, you can deploy the appliance using the vSphere Client. See Deploy the VMware
Cloud Director Appliance by Using the vSphere Client.
VMware, Inc. 39
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Before running the deployment command, see Prerequisites for Deploying the VMware Cloud
Director Appliance.
Starting with VMware Cloud Director 10.2, you must include the --X:enableHiddenProperties
parameter to deploy the VMware Cloud Director appliance.
Note You can choose whether to specify the optional OVF configuration options during the
primary appliance deployment, or to run the appliance management user interface to finish the
configuration after the deployment.
ovftool Command Options and Properties for Deploying the VMware Cloud
Director Appliance
--diskMode thin or thick The disk format for the virtual machine
configuration files and virtual disks.
--prop:"vami.ip0.VMware_vCloud_Director"
eth0_ip_address IP address of eth0. Used for the UI and
API access. On this address, the DNS
reverse lookup determines and sets the
hostname of the appliance.
--prop:"vami.ip1.VMware_vCloud_Director"
eth1_ip_address IP address of eth1. Used for
accessing internal services including
the embedded PostreSQL database
service.
VMware, Inc. 40
VMware Cloud Director Installation, Configuration, and Upgrade Guide
--prop:"vami.DNS.VMware_vCloud_Director"
dns_ip_address The IP address of the domain name
server for the appliance.
--prop:"vami.domain.VMware_vCloud_Director"
domain_name The DNS search domain. Appears as
the first element in the search path.
--prop:"vami.gateway.VMware_vCloud_Director"
gateway_ip_address The IP address of the default gateway
for the appliance.
--prop:"vami.netmask0.VMware_vCloud_Director"
netmask The netmask or prefix for the eth0
interface.
--prop:"vami.netmask1.VMware_vCloud_Director"
netmask The netmask or prefix for the eth1
interface.
--prop:"vami.searchpath.VMware_vCloud_Director"
a_list_of_domain_names The domain search path of the
appliance.
A comma or space-separated list of
domain names.
true or false
--prop:"vcloudconf.ceip_enabled.VMware_vCloud_Director Enables or disables the participation
in the VMware Customer Experience
Improvement Program. The default is
true.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
true or false
--prop:"vcloudapp.enable_ssh.VMware_vCloud_Director" Enables or disables the SSH root
access to the appliance.
true or false
--prop:"vcloudapp.expire_root_password.VMware_vCloud_Director" Determines whether to continue or not
using the initial password after the first
login.
--prop:"vcloudapp.nfs_mount.VMware_vCloud_Director"
nfs_ip_address:nfs_mount_path The IP address and export path of the
external NFS server.
Used only for a primary cell.
--prop:"vcloudapp.ntp-server.VMware_vCloud_Director"
ntp_server_ip_address The IP address of the time server.
--prop:"vcloudapp.varoot-password.VMware_vCloud_Director"
ova_root_password The initial root password for the
appliance. Must contain at least eight
characters, one uppercase character,
one lowercase character, one numeric
digit, and one special character.
VMware, Inc. 41
VMware Cloud Director Installation, Configuration, and Upgrade Guide
--prop:"vcloudconf.db_pwd.VMware_vCloud_Director"
db_password The database password of the vcloud
user.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudconf.admin_email.VMware_vCloud_Director"
vcd_admin_email_address The email address of the system
administrator account.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudconf.admin_fname.VMware_vCloud_Director"
Admin_vcd_name The name for the system administrator
account.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudconf.admin_pwd.VMware_vCloud_Director"
vcd_admin_password The password for the system
administrator account.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudconf.admin_uname.VMware_vCloud_Director"
vcd_admin_username The user name for the system
administrator account.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudconf.inst_id.VMware_vCloud_Director"
vcd_install_ID The VMware Cloud Director installation
ID.
Used only for a primary cell.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
VMware, Inc. 42
VMware Cloud Director Installation, Configuration, and Upgrade Guide
--prop:"vcloudconf.sys_name.VMware_vCloud_Director"
ova_system_name The name for the vCenter Server
folder to create for this VMware Cloud
Director installation.
Optional if you plan to run the
appliance management user interface
to finish the primary appliance
configuration after the deployment.
--prop:"vcloudnet.routes0.VMware_vCloud_Director"
ip_address1 cidr, Optional. Static routes for the eth0
ip_address2, ... interface. Must be a comma-separated
list of route specifications. A route
specification must consist of a gateway
IP address and, optionally, Classless
Inter-Domain Routing (CIDR) network
specification (prefix/bits). For example,
172.16.100.253 172.16.100/19,
172.16.200.253.
--prop:"vcloudnet.routes1.VMware_vCloud_Director"
ip_address1 cidr, Optional. Static routes for the eth1
ip_address2, ... interface. Must be a comma-separated
list of route specifications. A route
specification must consist of a gateway
IP address and, optionally, Classless
Inter-Domain Routing (CIDR) network
specification (prefix/bits). For example,
172.16.100.253 172.16.100/19,
172.16.200.253.
VMware, Inc. 43
VMware Cloud Director Installation, Configuration, and Upgrade Guide
--deploymentOption primary-small, primary-medium, The appliance type and size that you
primary-large, primary-extralarge, want to deploy.
standby-small, standby-medium, The primary-small and standby-small
standby-large, standby-extralarge, VMware Cloud Director appliance sizes
or cell are suitable for lab or test systems. The
primary-large and standby-large sizes
meet the minimum sizing requirements
for production systems. Depending on
the workload, you might need to add
additional resources.
n primary-small deploys the
appliance with 12 GB of RAM and
2 vCPUs as the first member in
a VMware Cloud Director server
group. The embedded database in
the primary cell is configured as the
VMware Cloud Director database.
The database name is vcloud, and
the database user is vcloud.
n primary-medium deploys the
appliance with 16 GB of RAM and
8 vCPUs as the first member in
a VMware Cloud Director server
group. The embedded database in
the primary cell is configured as the
VMware Cloud Director database.
The database name is vcloud, and
the database user is vcloud.
n primary-large deploys the
appliance with 24 GB of RAM and
16 vCPUs as the first member in
a VMware Cloud Director server
group. The embedded database in
the primary cell is configured as the
VMware Cloud Director database.
The database name is vcloud, and
the database user is vcloud.
n primary-extralarge deploys the
appliance with 32 GB of RAM and
24 vCPUs as the first member in
a VMware Cloud Director server
group. The embedded database in
the primary cell is configured as the
VMware Cloud Director database.
The database name is vcloud, and
the database user is vcloud.
n standby-small deploys the
appliance with 12 GB of RAM
and 2 vCPUs as the second or
the third member in a VMware
Cloud Director server group
VMware, Inc. 44
VMware Cloud Director Installation, Configuration, and Upgrade Guide
VMware, Inc. 45
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Important Before running the VMware OVF Tool command, replace the vcloudapp.varoot-
passwordVMware_vCloud_Director, vcloudconf.db_pwdVMware_vCloud_Director, and
vcloudconf.admin_pwd.VMware_vCloud_Director passwords with your own secure passwords.
ovftool\
--noSSLVerify \
--acceptAllEulas \
--X:enableHiddenProperties \
--datastore='datastore6' \
--allowAllExtraConfig \
--net:"eth0 Network"="My_UI_API_Network" \
--net:"eth1 Network"="My_Internal_DB_Services_Network" \
--name=MyAppliance \
--diskMode=thick \
--prop:"vami.ip0.VMware_vCloud_Director"="10.0.0.142" \
--prop:"vami.ip1.VMware_vCloud_Director"="172.18.41.24" \
--prop:"vami.DNS.VMware_vCloud_Director"="10.0.0.2" \
--prop:"vami.domain.VMware_vCloud_Director"="mycompany.com" \
--prop:"vami.gateway.VMware_vCloud_Director"="10.0.0.1" \
--prop:"vami.netmask0.VMware_vCloud_Director"="255.255.0.0" \
--prop:"vami.netmask1.VMware_vCloud_Director"="255.255.224.0" \
--prop:"vami.searchpath.VMware_vCloud_Director"="eng.mycompany.com" \
--prop:"vcloudapp.enable_ssh.VMware_vCloud_Director"="False" \
--prop:"vcloudapp.expire_root_password.VMware_vCloud_Director"="True" \
--prop:"vcloudapp.nfs_mount.VMware_vCloud_Director"="10.0.0.96:/data/transfer" \
--prop:"vcloudapp.ntp-server.VMware_vCloud_Director"="time.mycompany.com" \
--prop:"vcloudapp.varoot-password.VMware_vCloud_Director"="place-secure-password-here" \
--prop:"vcloudconf.db_pwd.VMware_vCloud_Director"="place-secure-password-here" \
--prop:"vcloudconf.admin_email.VMware_vCloud_Director"="[email protected]" \
VMware, Inc. 46
VMware Cloud Director Installation, Configuration, and Upgrade Guide
--prop:"vcloudconf.admin_fname.VMware_vCloud_Director"="vcdadmin" \
--prop:"vcloudconf.admin_pwd.VMware_vCloud_Director"="place-secure-password-here" \
--prop:"vcloudconf.admin_uname.VMware_vCloud_Director"="administrator" \
--prop:"vcloudconf.inst_id.VMware_vCloud_Director"="59" \
--prop:"vcloudconf.sys_name.VMware_vCloud_Director"="MyAppliance" \
--deploymentOption="primary-large" \
--powerOn "/MyPath/VMware_vCloud_Director-version_number_OVF10.ova" \
vi://vc_user_name:vc_password@vc_hostname_or_ip_address/vc_dataceter_name/host/vc_cluster_name
Important Before running the VMware OVF Tool command, replace the vcloudapp.varoot-
password.VMware_vCloud_Director password with your own secure password.
ovftool \
--noSSLVerify \
--acceptAllEulas \
--X:enableHiddenProperties \
--datastore='datastore6' \
--allowAllExtraConfig \
--net:"eth0 Network"="My_UI_API_Network" \
--net:"eth1 Network"="My_Internal_DB_Services_Network" \
--name=MySecondAppliance \
--diskMode=thick \
--prop:"vami.ip0.VMware_vCloud_Director"="10.0.0.143" \
--prop:"vami.ip1.VMware_vCloud_Director"="172.18.41.25" \
--prop:"vami.DNS.VMware_vCloud_Director"="10.0.0.2" \
--prop:"vami.domain.VMware_vCloud_Director"="mycompany.com" \
--prop:"vami.gateway.VMware_vCloud_Director"="10.0.0.1" \
--prop:"vami.netmask0.VMware_vCloud_Director"="255.255.0.0" \
--prop:"vami.netmask1.VMware_vCloud_Director"="255.255.224.0" \
--prop:"vami.searchpath.VMware_vCloud_Director"="eng.mycompany.com" \
--prop:"vcloudapp.enable_ssh.VMware_vCloud_Director"="False" \
--prop:"vcloudapp.expire_root_password.VMware_vCloud_Director"="True" \
--prop:"vcloudapp.nfs_mount.VMware_vCloud_Director"="10.0.0.96:/data/transfer" \
--prop:"vcloudapp.ntp-server.VMware_vCloud_Director"="time.mycompany.com" \
--prop:"vcloudapp.varoot-password.VMware_vCloud_Director"="place-secure-password-here" \
--prop:"vcloudconf.sys_name.VMware_vCloud_Director"="MySecondAppliance" \
--deploymentOption="standby-large" \
--powerOn "/MyPath/VMware_vCloud_Director-version_number_OVF10.ova" \
vi://vc_user_name:vc_password@vc_hostname_or_ip_address/vc_dataceter_name/host/vc_cluster_name
Use the appliance management user interface to configure the primary appliance. See Configure
the VMware Cloud Director Primary Appliance.
Use the appliance management user interface to configure the standby and application cells. See
Configure the VMware Cloud Director Standby and Application Cells.
VMware, Inc. 47
VMware Cloud Director Installation, Configuration, and Upgrade Guide
By default, when deploying VMware Cloud Director appliances, VMware Cloud Director generates
self-signed certificates and uses them to configure the VMware Cloud Director cell for the HTTPS
and console proxy communication.
When you successfully deploy a primary appliance, the appliance configuration logic copies
the responses.properties file from the primary appliance to the common NFS shared
transfer service storage at /opt/vmware/vcloud-director/data/transfer. Other appliances
deployed for this VMware Cloud Director server group use this file to configure themselves
automatically. The responses.properties file includes a path to the SSL certificate and private
key, which includes the auto-generated self-signed certificates user.certificate.path, private
key user.key.path, console proxy certificates user.consoleproxy.certificate.path, and
console proxy private key user.consoleproxy.key.path. By default, these paths are to PEM
files which are local to each appliance.
After you deploy the primary appliance, you can reconfigure it to use signed certificates. For more
information on creating the signed certificates, see Create and Import CA-Signed SSL Certificates
to the VMware Cloud Director Appliance.
If the signed certificates you use on the primary VMware Cloud Director appliance are wildcard
signed certificates, these certificates can apply to all other appliances in the VMware Cloud
Director server group, that is, standby cells and VMware Cloud Director application cells. You
can use the deployment of the appliance with signed wildcard certificates for HTTPS and console
proxy communication to configure the additional cells with the signed wildcard SSL certificates.
Procedure
2 Change the owner and the group permissions on the certificate files to vcloud.
VMware, Inc. 48
VMware Cloud Director Installation, Configuration, and Upgrade Guide
3 Verify that the owner of the certificate files has read and write permissions.
4 On the primary appliance, run the command to import the new signed certificates into the
VMware Cloud Director instance.
These commands also update the responses.properties file in the transfer share,
modifying the user.certificate.path, user.key.path, user.consoleproxy.certificate.path, and
user.consoleproxy.key.path variables to point to the certificate files in the transfer share.
5 For the new signed certificates to take effect, restart the vmware-vcd service on the primary
appliance.
6 Deploy the standby cell and application cell appliances, using the initial root password that
matches the key password.
Results
All newly deployed appliances that use the same NFS shared transfer service storage are
configured with the same signed wildcard SSL certificates used by the primary appliance.
Each VMware Cloud Director server must support two different SSL endpoints, one for HTTPS and
one for console proxy communications.
VMware, Inc. 49
VMware Cloud Director Installation, Configuration, and Upgrade Guide
In the VMware Cloud Director appliance, these two endpoints share the same IP address or
hostname, but use two distinct ports - 443 for HTTPS and 8443 for console proxy communications.
You can use the same certificate for both endpoints, for example, by using a wildcard certificate.
Certificates for both endpoints must include an X.500 distinguished name and X.509 Subject
Alternative Name extension.
If you already have your own private key and CA-signed certificate files, follow the procedure
described in Import Private Keys and CA-Signed SSL Certificates to the VMware Cloud Director
Appliance.
Important Upon deployment, the VMware Cloud Director appliance generates self-signed
certificates with a 2048-bit key size. You must evaluate your installation's security requirements
before choosing an appropriate key size. Key sizes less than 1024 bits are no longer supported per
NIST Special Publication 800-131A.
The private key password used in this procedure is the root user password, and it is represented
as root_password.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
When you deploy the VMware Cloud Director appliance, VMware Cloud Director automatically
generates self-signed certificates with a 2048-bit key size for the HTTPS service and the
console proxy service.
n If you want your Certificate Authority to sign the certificates that are generated upon
deployment, skip to Step 5.
n If you want to generate new certificates with custom options, such as a greater key size,
continue to Step 3.
cp /opt/vmware/vcloud-director/etc/user.http.pem /opt/vmware/vcloud-director/etc/
user.http.pem.original
cp /opt/vmware/vcloud-director/etc/user.http.key /opt/vmware/vcloud-director/etc/
user.http.key.original
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.pem /opt/vmware/vcloud-director/etc/
user.consoleproxy.pem.original
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.key /opt/vmware/vcloud-director/etc/
user.consoleproxy.key.original
4 Run the following commands to create public and private key pairs for the HTTPS service and
for the console proxy service.
VMware, Inc. 50
VMware Cloud Director Installation, Configuration, and Upgrade Guide
key-password root-password
/opt/vmware/vcloud-director/bin/cell-management-tool generate-certs --cert /opt/
vmware/vcloud-director/etc/user.consoleproxy.pem --key /opt/vmware/vcloud-director/etc/
user.consoleproxy.key --key-password root-password
The commands create or overwrite the certificate file by using the default values, and create
or overwrite the private key file with the specified passwords. Depending on the DNS
configuration of your environment, the Issuer Common Name (CN) is set to either the IP
address or the FQDN for each service. The certificate uses the default 2048-bit key length and
expires one year after creation.
Note You use the appliance root password as the key passwords.
5 Create certificate signing requests (CSR) for the HTTPS service and for the console proxy
service.
Important The VMware Cloud Director appliance shares the same IP address and hostname
for both the HTTPS service and the console proxy service. Because of that, the CSR creation
commands must have the same DNS and IPs for the Subject Alternative Name (SAN) extension
argument.
If your certification authority requires you to specify a Web server type, use Jakarta Tomcat.
7 Copy the CA-signed certificates, the CA root certificate, and any intermediate certificates to
the VMware Cloud Director appliance.
VMware, Inc. 51
VMware Cloud Director Installation, Configuration, and Upgrade Guide
8 Run the command to append the root CA-signed certificate and any intermediate certificates
to the HTTP and console proxy certificate.
9 Run the command to import the certificates into the VMware Cloud Director instance.
10 For the new signed certificates to take effect, restart the vmware-vcd service on the VMware
Cloud Director appliance.
What to do next
n If you are using wildcard certificates, see Deploy the VMware Cloud Director Appliance with
Signed Wildcard Certificates for HTTPS and Console Proxy Communication .
n If you are not using wildcard certificates, repeat this procedure on all VMware Cloud Director
servers in the server group.
n For more information on replacing the certificates for the embedded PostgreSQL database
and for the VMware Cloud Director appliance management user interface, see Replace a
Self-Signed Embedded PostgreSQL and VMware Cloud Director Appliance Management UI
Certificate.
VMware, Inc. 52
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Prerequisites
Copy your intermediate certificates, root CA certificate, CA-signed HTTPS service, and Console
Proxy service private keys and certificates to the appliance.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
cp /opt/vmware/vcloud-director/etc/user.http.pem /opt/vmware/vcloud-director/etc/
user.http.pem.original
cp /opt/vmware/vcloud-director/etc/user.http.key /opt/vmware/vcloud-director/etc/
user.http.key.original
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.pem /opt/vmware/vcloud-director/etc/
user.consoleproxy.pem.original
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.key /opt/vmware/vcloud-director/etc/
user.consoleproxy.key.original
3 Copy and replace the key and certificate files that you must import at /opt/
vmware/vcloud-director/etc/user.http.pem, /opt/vmware/vcloud-director/etc/
user.http.key, /opt/vmware/vcloud-director/etc/user.consoleproxy.pem,
and /opt/vmware/vcloud-director/etc/user.consoleproxy.key.
4 If you have intermediate certificates, to append the root CA-signed certificate and any
intermediate certificates to the HTTP and console proxy certificates, run the following
command.
5 Run the command to import the signed certificates into the VMware Cloud Director instance.
VMware, Inc. 53
VMware Cloud Director Installation, Configuration, and Upgrade Guide
6 For the CA-signed certificates to take effect, restart the vmware-vcd service on the VMware
Cloud Director appliance.
What to do next
n If you are using wildcard certificates, see Deploy the VMware Cloud Director Appliance with
Signed Wildcard Certificates for HTTPS and Console Proxy Communication.
n If you are not using wildcard certificates, repeat this procedure on all VMware Cloud Director
appliance cells in the server group.
n For more information on replacing the certificates for the embedded PostgreSQL database
and for the VMware Cloud Director appliance management user interface, see Replace a
Self-Signed Embedded PostgreSQL and VMware Cloud Director Appliance Management UI
Certificate.
After the creation of the VMware Cloud Director appliance, you can use the vSphere networking
features to add a new network interface card (NIC). See the Add a Network Adapter to a Virtual
Machine information in the vSphere Virtual Machine Administration guide.
Note If your cluster is configured for automatic failover, after you deploy one or more additional
cells, you must use the Appliance API to reset the cluster failover mode to Automatic. See the
VMware Cloud Director Appliance API. The default failover mode for new cells is Manual. If
the failover mode is inconsistent across the nodes of the cluster, the cluster failover mode is
Indeterminate. The Indeterminate mode can lead to inconsistent cluster states between the
nodes and nodes following an old primary cell. To view the cluster failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
VMware, Inc. 54
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Prerequisites
n Deploy the VMware Cloud Director appliance. See Deployment and Initial Configuration of the
VMware Cloud Director Appliance.
n Change the transfer server storage timezone to the new timezone of the VMware Cloud
Director primary appliance.
Procedure
1 By using a Web Console or a Remote Console for the primary node, on the bottom left of the
console window, select Set Timezone.
The newly selected time zone appears on the bottom left of the console window.
4 To ensure that the VMware Cloud Director appliance uses the new time zone, restart the
vmware-vcd service.
5 Repeat Step 1 to Step 4 for any standby and application cells in your VMware Cloud Director
deployment.
You must configure the VMware Cloud Director public console proxy address, because the
appliance uses a single IP address with custom port 8443 for the console proxy service. See 6.
Prerequisites
Verify that you are logged in as a system administrator. Only a system administrator can
customize the public endpoints.
Procedure
1 From the top navigation bar of the Service Provider Admin Portal, select Administration.
VMware, Inc. 55
VMware Cloud Director Installation, Configuration, and Upgrade Guide
4 To customize the VMware Cloud Director URLs, edit the Web Portal endpoints.
a Enter a custom VMware Cloud Director public URL for HTTPS (secure) connections and
click Upload to upload the certificates that establish the trust chain for that endpoint.
The certificate chain must match the certificate used by the service endpoint, which is
the proxycertificates.pem certificate uploaded to each VMware Cloud Director cell.
SSL termination of console proxy connections at a load balancer is not supported. The
certificate chain must include an endpoint certificate, intermediate certificates, and a root
certificate in the PEM format without a private key.
5 (Optional) To customize the Cloud Director REST API and OpenAPI URLs, turn off the Use
Web Portal Settings toggle.
For example, if you set the HTTP base URL to http://vcloud.example.com, you
can access the VMware Cloud Director API at http://vcloud.example.com/api, and
you can access the VMware Cloud Director OpenAPI at http://vcloud.example.com/
cloudapi.
b Enter a custom HTTPS REST API base URL and click Upload to upload the certificates that
establish the trust chain for that endpoint.
For example, if you set the HTTPS REST API base URL to https://
vcloud.example.com, you can access the VMware Cloud Director API at https://
vcloud.example.com/api, and you can access the VMware Cloud Director OpenAPI at
https://vcloud.example.com/cloudapi.
The certificate chain must match the certificate used by the service endpoint, which is
either the certificates.pem certificate uploaded to each VMware Cloud Director cell or
the load balancer VIP certificate if an SSL termination is used. The certificate chain must
include an endpoint certificate, intermediate certificates, and a root certificate in the PEM
format without a private key.
This address is the fully qualified domain name (FQDN) of the VMware Cloud Director
appliance eth0 NIC, specified either by FQDN or IP address, with custom port 8443 for the
console proxy service.
For example, for a VMware Cloud Director appliance instance with FQDN
vcloud.example.com, enter vcloud.example.com:8443.
VMware Cloud Director uses the console proxy address when opening a remote console
window on a VM.
VMware, Inc. 56
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Install and Configure a Cassandra Database for Storing Historic Metric Data
VMware Cloud Director can collect metrics that provide current and historic information about
virtual machine performance and resource consumption for the virtual machines that are in your
cloud. Data for historic metrics is stored in a Cassandra cluster.
Cassandra is an open-source database that you can use to provide the backing store for a
scalable, high-performance solution for collecting time series data like virtual machine metrics. If
you want VMware Cloud Director to support retrieval of historic metrics from virtual machines, you
must install and configure a Cassandra cluster, and use the cell-management-tool to connect
the cluster to VMware Cloud Director. Retrieval of current metrics does not require optional
database software.
Prerequisites
n Verify that VMware Cloud Director is installed and running before you configure the optional
database software.
n If you are not already familiar with Cassandra, review the material at http://
cassandra.apache.org/.
n See the VMware Cloud Director Release Notes for a list of Cassandra releases supported for
use as a metrics database. You can download Cassandra from http://cassandra.apache.org/
download/.
n The Cassandra cluster must include least four virtual machines deployed on two or more
hosts.
n Enable Java Native Access (JNA) version 3.2.7 or later on each Cassandra cluster.
n Use of SSL with Cassandra is optional. If you decide not to enable SSL for Cassandra, you
must set the configuration parameter cassandra.use.ssl to 0 in the global.properties
file on each cell ($VCLOUD_HOME/etc/global.properties)
VMware, Inc. 57
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Procedure
In the following example command, node1-ip, node2-ip, node3-ip, and node4-ip are the IP
address of the members of the Cassandra cluster. The default port (9042) is used. Metrics data
is retained for 15 days.
For information about using the cell management tool, see Chapter 5 Cell Management Tool
Reference.
2 (Optional) If you are upgrading VMware Cloud Director from version 9.1, use the cell-
management-tool to configure the metrics database to store rolled-up metrics.
The Advanced Message Queuing Protocol (AMQP), is an open standard for message queuing that
supports flexible messaging for enterprise systems. VMware Cloud Director uses the RabbitMQ
AMQP broker to provide the message bus used by extension services, object extensions, and
notifications.
For VMware Cloud Director, using an MQTT client can be an alternative to the RabbitMQ AMQP
Broker when configuring notifications. See Subscribe to Events, Tasks, and Metrics by Using an
MQTT Client.
Procedure
See the VMware Cloud Director Release Notes for the list of supported RabbitMQ releases.
2 Follow the RabbitMQ installation instructions and install RabbitMQ on a supported host.
The RabbitMQ server host must be reachable on the network by each VMware Cloud Director
cell.
VMware, Inc. 58
VMware Cloud Director Installation, Configuration, and Upgrade Guide
3 During the RabbitMQ installation, make a note of the values that are required for configuring
VMware Cloud Director to work with this RabbitMQ installation.
n The fully qualified domain name of the RabbitMQ server host, for example,
amqp.example.com.
n A user name and password that are valid for authenticating with RabbitMQ.
n The port at which the broker listens for messages. The default is 5672 for non-SSL. The
default port for SSL/TLS is 5671.
What to do next
By default, the VMware Cloud Director AMQP service sends unencrypted messages. You can
configure the AMQP service to encrypt these messages by using SSL. You can also configure the
service to verify the broker certificate by using the default JCEKS trust store of the Java runtime
environment on the VMware Cloud Director cell, typically at $VCLOUD_HOME/jre/lib/security/
cacerts.
To enable SSL with the VMware Cloud Director AMQP service, see the Configure an AMQP Broker
information in the VMware Cloud Director Service Provider Admin Portal Guide.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
2 Run the passwd command and change the password for the root user.
passwd root
Note If the root password is already expired, VMware Cloud Director prompts you to set it
the first time when you log in to the VMware Cloud Director appliance console as root.
cp /opt/vmware/vcloud-director/etc/user.http.pem /tmp/user.http.pem
cp /opt/vmware/vcloud-director/etc/user.http.key /tmp/user.http.key
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.pem /tmp/user.consoleproxy.pem
cp /opt/vmware/vcloud-director/etc/user.consoleproxy.key /tmp/user.consoleproxy.key
VMware, Inc. 59
VMware Cloud Director Installation, Configuration, and Upgrade Guide
5 Run the following commands to replace the old private key file with the new one.
mv /opt/vmware/vcloud-director/etc/new.user.http.key /opt/vmware/vcloud-director/etc/
user.http.key
mv /opt/vmware/vcloud-director/etc/new.user.consoleproxy.key /opt/vmware/vcloud-
director/etc/user.consoleproxy.key
6 To verify the user and group ownership of the private key files, run the chown command.
7 To use the private key's new password, update the VMware Cloud Director server
configuration.
What to do next
Important All appliances must share the same root password. Any newly deployed appliance
must use the new root password.
VMware, Inc. 60
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Starting with VMware Cloud Director 10.0, Microsoft SQL Server databases are unsupported.
When you are upgrading VMware Cloud Director, the new version must be compatible with the
following components of your existing installation:
n The database software you are currently using for the VMware Cloud Director database. For
more information, see the Upgrade and Migration Paths table.
n Any third-party components that directly interact with VMware Cloud Director.
For information about the compatibility of VMware Cloud Director with other VMware products
and with third-party databases, refer to the VMware Product Interoperability Matrices at http://
partnerweb.vmware.com/comp_guide/sim/interop_matrix.php. If you plan to upgrade your
vSphere or NSX components as part of the VMware Cloud Director upgrade, you must upgrade
them after the upgrade of VMware Cloud Director. See After You Upgrade VMware Cloud
Director.
After you upgrade at least one VMware Cloud Director server, you can upgrade the VMware
Cloud Director database. The database stores information about the runtime state of the server,
including the state of all VMware Cloud Director tasks it is running. To ensure that no invalid task
information remains in the database after an upgrade, you must verify that no tasks are active on
any server before you begin the upgrade.
The upgrade also preserves the following artifacts, which are not stored in the VMware Cloud
Director database:
n Local and global properties files are copied to the new installation.
n Microsoft Sysprep files used for the guest customization support are copied to the new
installation.
The upgrade requires sufficient VMware Cloud Director downtime to upgrade all servers in the
server group and the database. If you are using a load balancer, you can configure it to a return a
message, for example, The system is offline for upgrade.
VMware, Inc. 61
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Important After upgrading to version 10.1 and later, VMware Cloud Director always verifies
certificates for any infrastructure endpoints connected to it. This is due to a change in the way
VMware Cloud Director manages SSL certificates. If you do not import your certificates into
VMware Cloud Director before the upgrade, the vCenter Server and NSX connections might show
failed connection errors due to SSL verification issues. In this case, after upgrading, you have two
options:
1 Run the cell management tool trust-infra-certs command to import automatically all
certificates into the centralized certificate store. See Import Endpoints Certificates from
vSphere Resources.
2 In the Service Provider Admin Portal UI, select each vCenter Server and NSX instance, and
reenter the credentials while accepting the certificate.
If your VMware Cloud Director environment uses an external Oracle database or an external
Microsoft SQL database, you must migrate to a PostgreSQL database before upgrading to
VMware Cloud Director 10.3. For upgrade paths, see Upgrading VMware Cloud Director on Linux.
VMware, Inc. 62
VMware Cloud Director Installation, Configuration, and Upgrade Guide
VMware Cloud Director 9.0 and 9.1 with an external Oracle 1 For VMware Cloud Director 9.0 on Linux, upgrade
database VMware Cloud Director to version 9.1. See Upgrading
vCloud Director.
2 Migrate the Oracle database to a PostgreSQL
database. See Migrate to a PostgreSQL Database.
3 Upgrade your environment to VMware Cloud Director
10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
4 Migrate to VMware Cloud Director appliance 10.3. See
Migrating VMware Cloud Director with an External
PostgreSQL Database to VMware Cloud Director
Appliance.
VMware Cloud Director appliance 9.5 with an external 1 Upgrade your environment to VMware Cloud Director
PostgreSQL database 10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
2 Migrate to VMware Cloud Director appliance 10.3. See
Migrating VMware Cloud Director with an External
PostgreSQL Database to VMware Cloud Director
Appliance.
VMware Cloud Director 9.0, 9.1, and 9.5 on Linux with an 1 Upgrade your environment to VMware Cloud Director
external PostgreSQL database 10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
2 Migrate to VMware Cloud Director appliance 10.3. See
Migrating VMware Cloud Director with an External
PostgreSQL Database to VMware Cloud Director
Appliance.
VMware Cloud Director 9.0, 9.1, and 9.5 on Linux with an 1 Upgrade your environment to VMware Cloud Director
external Microsoft SQL Server database 9.7 on Linux. See Upgrading vCloud Director.
2 Migrate to VMware Cloud Director appliance 9.7. See
Migrating vCloud Director with an External Microsoft
SQL Database to vCloud Director Appliance.
3 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware Cloud Director 9.7 on Linux with an external 1 Migrate to VMware Cloud Director appliance 9.7. See
Microsoft SQL Server database Migrating vCloud Director with an External Microsoft
SQL Database to vCloud Director Appliance.
2 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware, Inc. 63
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Target environment
VMware Cloud Director 9.7 on Linux with an external 1 Migrate to VMware Cloud Director appliance 9.7.
PostgreSQL database See Migrating vCloud Director with an External
PostgreSQL Database to vCloud Director Appliance.
2 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware Cloud Director 10.0 on Linux with an external 1 Migrate to VMware Cloud Director appliance 10.0.
PostgreSQL database See Migrating vCloud Director with an External
PostgreSQL Database to vCloud Director Appliance.
2 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware Cloud Director 10.1 on Linux with an external 1 Migrate to VMware Cloud Director appliance 10.1. See
PostgreSQL database Migrating VMware Cloud Director with an External
PostgreSQL Database to VMware Cloud Director
Appliance.
2 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware Cloud Director 10.2 on Linux with an external 1 Migrate to VMware Cloud Director appliance 10.2. See
PostgreSQL database Migrating VMware Cloud Director with an External
PostgreSQL Database to VMware Cloud Director
Appliance.
2 Upgrade your environment to VMware Cloud Director
appliance 10.3. See Upgrade the VMware Cloud
Director Appliance by Using an Update Package.
VMware Cloud Director appliance 9.7, 10.0, 10.1, or 10.2 Upgrade your environment to VMware Cloud Director
with an embedded PostgreSQL database appliance 10.3. See Upgrade the VMware Cloud Director
Appliance by Using an Update Package.
During the upgrade of the VMware Cloud Director appliance deployment, the VMware Cloud
Director service stops working and some downtime can be expected. The downtime depends on
the time you need to upgrade each VMware Cloud Director appliance and to run the VMware
Cloud Director database upgrade script. The number of working cells in the VMware Cloud
Director server group reduces until you stop the VMware Cloud Director service on the last
VMware Cloud Director appliance. A properly configured load balancer in front of the VMware
Cloud Director HTTP endpoints should stop routing traffic to the cells that are stopped.
VMware, Inc. 64
VMware Cloud Director Installation, Configuration, and Upgrade Guide
After you apply the upgrade to every VMware Cloud Director appliance and the database upgrade
is complete, you must reboot each VMware Cloud Director appliance.
Prerequisites
1 When upgrading from version 10.1 or later or when patching, if the automatic failover in case
of a primary database service failure is enabled, change the failover mode to Manual during
the upgrade. After the upgrade, you can set the failover mode to Automatic. See Automatic
Failover of the VMware Cloud Director Appliance.
2 Log in to the vCenter Server instance on which resides the primary VMware Cloud Director
appliance of your database high availability cluster.
3 Navigate to the primary VMware Cloud Director appliance, right-click it, and click Power >
Shut Down Guest OS.
4 Right-click the appliance and click Snapshots > Take Snapshot. Enter a name and, optionally,
a description for the snapshot, and click OK.
5 Right-click the VMware Cloud Director appliance and click Power > Power On.
6 Verify that all nodes in your database high availability configuration are in a good state. See
View the VMware Cloud Director Appliance Cluster Health and Failover Mode.
7 Familiarize yourself with the VMware Cloud Director 10.3.1 and later backup procedure. See
Back Up the Primary VMware Cloud Director Appliance Version 10.3.1 and Later.
Procedure
Make a note of the primary appliance name. You must upgrade the primary appliance before
the standby and application cells. You must use the primary appliance when backing up the
database.
mkdir /tmp/local-update-package
VMware, Inc. 65
VMware Cloud Director Installation, Configuration, and Upgrade Guide
6 Check for updates to verify that you established correctly the repository.
8 Depending on your VMware Cloud Director version, back up the primary appliance or the
VMware Cloud Director appliance embedded database.
n For VMware Cloud Director 10.3.1 and later, create a backup using the primary or standby
appliance management UI. You cannot use the application cell to perform a backup.
n For VMware Cloud Director 10.3, continuing from the primary appliance, back up the
VMware Cloud Director appliance embedded database.
/opt/vmware/appliance/bin/create-db-backup
Note You must backup the appliance only once. Do not back up the appliance after
applying the available upgrade.
10 Repeat steps 2-7 and step 9 on the remaining standby and application cells.
11 From any appliance, run the VMware Cloud Director database upgrade utility.
/opt/vmware/vcloud-director/bin/upgrade
shutdown -r now
What to do next
n If the upgrade is successful, you can delete the snapshot of the VMware Cloud Director
appliance.
VMware, Inc. 66
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n If the upgrade is not successful, you can roll back the VMware Cloud Director appliance to the
snapshot that you took before the upgrade. See Roll Back a VMware Cloud Director Appliance
When an Upgrade Fails.
Note You can use the VMware Update Repository only to upgrade VMware Cloud Director to
the most recent VMware Cloud Director version. Only the most recent version is available in the
VMware Update Repository. If you want to upgrade VMware Cloud Director to a different version,
see Upgrade the VMware Cloud Director Appliance by Using an Update Package.
During the upgrade of the VMware Cloud Director appliance deployment, the VMware Cloud
Director service stops working and some downtime can be expected. The downtime depends on
the time you need to upgrade each VMware Cloud Director appliance and to run the VMware
Cloud Director database upgrade script. The number of working cells in the VMware Cloud
Director server group reduces until you stop the VMware Cloud Director service on the last
VMware Cloud Director appliance. A properly configured load balancer in front of the VMware
Cloud Director HTTP endpoints should stop routing traffic to the cells that are stopped.
After you apply the upgrade to every VMware Cloud Director appliance and the database upgrade
is complete, you must reboot each VMware Cloud Director appliance.
Prerequisites
a When upgrading from version 10.1 or later or when patching, if the automatic failover in
case of a primary database service failure is enabled, change the failover mode to Manual
for the duration of the upgrade. After the upgrade, you can set the failover mode to
Automatic. See Automatic Failover of the VMware Cloud Director Appliance.
b Log in to the vCenter Server instance on which resides the primary VMware Cloud Director
appliance of your database high availability cluster.
c Navigate to the primary VMware Cloud Director appliance, right-click it, and click Power >
Shut Down Guest OS.
d Right-click the appliance and click Snapshots > Take Snapshot. Enter a name and,
optionally, a description for the snapshot, and click OK.
e Right-click the VMware Cloud Director appliance and click Power > Power On.
f Verify that all nodes in your database high availability configuration are in a good state.
See View the VMware Cloud Director Appliance Cluster Health and Failover Mode.
n Verify that the VMware Cloud Director appliance has access to https://vapp-
updates.vmware.com.
VMware, Inc. 67
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n Familiarize yourself with the VMware Cloud Director 10.3.1 and later backup procedure. See
Back Up the Primary VMware Cloud Director Appliance Version 10.3.1 and Later.
Procedure
Make a note of the primary appliance name. You must use the primary appliance when
backing up the database.
2 Log in directly or by using an SSH client to the primary appliance console as root.
4 Check for updates to verify that the VMware Update Repository has the desired upgrade.
6 Depending on your VMware Cloud Director version, backup the primary appliance or the
embedded database.
n For VMware Cloud Director 10.3.1 and later, create a backup using the primary or standby
appliance management UI. You cannot use the application cell to perform a backup.
n For VMware Cloud Director 10.3, continuing from the primary appliance, back up the
VMware Cloud Director appliance embedded database.
/opt/vmware/appliance/bin/create-db-backup
Note You must backup the appliance only once. Do not back up the appliance after applying
the available upgrade.
8 Log in to the remaining standby and application cells and repeat steps 3, 4, 5, and 7 on each
appliance.
VMware, Inc. 68
VMware Cloud Director Installation, Configuration, and Upgrade Guide
9 From any appliance, run the VMware Cloud Director database upgrade utility.
/opt/vmware/vcloud-director/bin/upgrade
shutdown -r now
What to do next
n If there is a vamicli update --install latest command failure, see Installing the Latest
Update of VMware Cloud Director Fails.
n If the upgrade is successful, you can delete the snapshot of the VMware Cloud Director
appliance.
n If the upgrade is not successful, you can roll back the VMware Cloud Director appliance to the
snapshot that you took before the upgrade. See Roll Back a VMware Cloud Director Appliance
When an Upgrade Fails.
Before you begin the rollback, use the VMware Cloud Director appliance API to make a note of
the node IDs of the standby nodes in the cluster. See the VMware Cloud Director Appliance API
Schema Reference on http://code.vmware.com.
1 Revert the primary VMware Cloud Director appliance to the snapshot that you took before you
started the upgrade.
Read how to restore virtual machine snapshots by using the revert options. See Restore VM
Snapshots Using Revert in the vSphere Virtual Machine Administration Guide.
3 Log in directly or by using an SSH client to the OS of each VMware Cloud Director appliance
cell. You must log in as a root user.
5 Use the primary VMware Cloud Director cell to unregister the secondary nodes in the cluster.
a Log in directly or by using an SSH client to the OS of the primary cell as root.
sudo -i -u postgres
VMware, Inc. 69
VMware Cloud Director Installation, Configuration, and Upgrade Guide
To unregister a standby node that is not running, you must provide the node ID.
6 In the vSphere Client, shut down and delete all standby appliances.
b Right-click a standby appliance and click Power > Shut Down Guest OS.
d Repeat 6.a through 6.c for the other standby appliance cell.
7 Verify that the repmgr tool suite and the embedded PostgreSQL database of the primary
VMware Cloud Director appliance cell are working properly.
sudo -i -u postgres
The console output shows information about the only node in the cluster.
8 Redeploy the secondary appliances. See Deploy the VMware Cloud Director Appliance by
Using the vSphere Client.
9 Log in directly or by using an SSH client to the OS of each VMware Cloud Director appliance
cell. You must log in as a root user.
VMware, Inc. 70
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n Creating the new VMware Cloud Director server group by deploying one or more instances of
the VMware Cloud Director appliance
n Copying the shared transfer service data and the certificates data
Procedure
1 If your current external PostgreSQL database is of version 9.x, upgrade the external
PostgreSQL database to version 10 or later.
3 Verify that the migration source VMware Cloud Director restart is successful.
4 On each cell of the upgraded VMware Cloud Director environment, run the command to stop
the VMware Cloud Director service.
If there is not enough free space on the /tmp folder, use another location to store the dump
file.
6 If the database owner and database name are different from vcloud, make a note of the user
name and database name.
You must create this user in the new environment and rename the database at Step 13.
VMware, Inc. 71
VMware Cloud Director Installation, Configuration, and Upgrade Guide
7 If you want the new VMware Cloud Director environment to use the IP addresses of the
existing environment, you must copy the properties and the certificates files to a location on
the external PostgreSQL database, and power off the cells.
8 If you want the new VMware Cloud Director environment to use the NFS server of the existing
environment, create and export a new directory on this NFS server as the new shared NFS
mountpoint.
You cannot reuse the existing mountpoint because the user and group IDs (UID/GID) of the
users in the old NFS might not match the user and group IDs in the new NFS.
9 Create the new server group by deploying one or more instances of the VMware Cloud
Director appliance.
n If you want to use the database high availability function, deploy one primary and two
standby cells, and, optionally, one or more vCD application cells.
n If you powered off the cells in the existing environment, you can use the original IP
addresses for the new cells.
n If you exported a new path on the existing NFS server, you can use this new shared
mountpoint for the new environment.
See Deployment and Initial Configuration of the VMware Cloud Director Appliance.
10 On each newly deployed cell, run the cell management tool command to stop the VMware
Cloud Director service.
11 Copy the dump file from the /tmp folder on the external PostgreSQL database to the /tmp
folder on the primary cell of the new environment.
See Step 5.
VMware, Inc. 72
VMware Cloud Director Installation, Configuration, and Upgrade Guide
13 Log in as root to the console of the newly deployed primary cell, and transfer the VMware
Cloud Director database from the external to the embedded database.
a Switch the user to postgres, connect to the psql database terminal, and run the statement
to drop the vcloud database.
d If the database owner of the existing VMware Cloud Director environment is different from
vcloud, change the database owner to vcloud, and reassign the tables to vcloud.
14 On each newly deployed cell, back up and replace the configuration data, and reconfigure and
start the VMware Cloud Director service.
a Back up the properties, truststore, and certificates files, and copy and replace these files
from the location on the external PostgreSQL database of the migration source, to which
you copied the files in Step 7 a.
Do not copy and replace with the certificate and key files from the migration source.
VMware, Inc. 73
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Where:
n The --key-password value matches the initial root password of this appliance.
n The --database-password value matches the database password that you set during
the appliance deployment.
n The --database-host value matches the eth1 network IP address of the primary
appliance.
n The --primary-ip value matches the eth0 network IP address of the appliance.
n The --console-proxy-ip value matches the eth0 network IP address of the appliance.
n The --console-proxy-port value matches the appliance console proxy port 8443.
For troubleshooting information, see Reconfiguring the VMware Cloud Director Service
Fails When Migrating or Restoring to VMware Cloud Director Appliance.
15 Modify your load balancer configuration to include all new appliance eth0 IPs in the load
balancer pools for HTTP, HTTPS, and TCP traffic, and remove the old Linux VMware Cloud
Director cell IPs from those pools.
16 After all cells of the new server group finish the startup process, verify that the migration of
your VMware Cloud Director environment is successful.
a Open the Service Provider Admin Portal by using the eth0 network IP address of any cell
from the new server group, https://eth0_IP_new_cell/provider.
b Log in to the Service Provider Admin Portal with your existing system administrator
credentials from the migration source.
c Validate that your vSphere and cloud resources are available in the new environment.
17 After the successful verification of the VMware Cloud Director migration, use the Service
Provider Admin Portal to delete the disconnected cells that belong to the old VMware Cloud
Director environment.
a From the top navigation bar, under Resources, select Cloud Resources.
VMware, Inc. 74
VMware Cloud Director Installation, Configuration, and Upgrade Guide
You can deploy the VMware Cloud Director appliance to add members to the server group of the
migrated environment.
What to do next
The new migrated VMware Cloud Director appliance environment uses self-signed certificates. To
use the well-signed certificates from the old environment, on each cell of the new environment,
follow these steps:
1 Copy and replace the certificate and key files from the old cell to /opt/vmware/
vcloud-director/data/transfer/cert.pem and /opt/vmware/vcloud-director/data/
transfer/cert.key.
If you add new members to this server group, the new appliance cells are deployed with these
well-signed certificates.
Important VMware Cloud Director supports only advanced edge gateways. You must
convert any legacy non-advanced edge gateway to an advanced gateway. See https://
kb.vmware.com/kb/66767.
VMware, Inc. 75
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Important After upgrading to version 10.1 and later, VMware Cloud Director always verifies
certificates for any infrastructure endpoints connected to it. This is due to a change in the way
VMware Cloud Director manages SSL certificates. If you do not import your certificates into
VMware Cloud Director before the upgrade, the vCenter Server and NSX connections might show
failed connection errors due to SSL verification issues. In this case, after upgrading, you have two
options:
1 Run the cell management tool trust-infra-certs command to import automatically all
certificates into the centralized certificate store. See Import Endpoints Certificates from
vSphere Resources.
2 In the Service Provider Admin Portal UI, select each vCenter Server and NSX instance, and
reenter the credentials while accepting the certificate.
Upgrading NSX Manager interrupts access to NSX administrative functions but does not interrupt
network services. You can upgrade NSX Manager before or after you upgrade VMware Cloud
Director, whether or not any VMware Cloud Director cells are running.
For information about upgrading NSX, see the NSX for vSphere documentation at https://
docs.vmware.com.
Procedure
1 Upgrade the NSX Manager associated with each vCenter Server registered to your VMware
Cloud Director installation.
2 After you have upgraded all your NSX Managers, you can upgrade your registered vCenter
Server systems and ESXi hosts.
VMware, Inc. 76
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Prerequisites
Verify that you have already upgraded each NSX Manager that is associated with the vCenter
Server systems that are attached to your cloud. See Upgrade Each NSX Manager That Is
Associated with an Attached vCenter Server System.
Procedure
a From the top navigation bar of the VMware Cloud Director Service Provider Admin Portal,
under Resources, select vSphere Resources.
c Select the radio button next to the vCenter Server instance you want to disable and click
Disable.
d Click OK.
3 Verify all VMware Cloud Director public URLs and certificate chains.
a From the top navigation bar of the VMware Cloud Director Service Provider Admin Portal,
under Resources, select vSphere Resources.
c Select the radio button next to the target vCenter Server and click Reconnect.
d Click OK.
5 Upgrade each ESXi host that the upgraded vCenter Server system supports.
Important To ensure that you have enough upgraded host capacity to support the virtual
machines in your cloud, upgrade hosts in small batches. When you do this, host agent
upgrades can complete in time to allow virtual machines to migrate back to the upgraded
host.
a Use the vCenter Server system to put the host into maintenance mode and allow all the
virtual machines on that host to migrate to another host.
VMware, Inc. 77
VMware Cloud Director Installation, Configuration, and Upgrade Guide
d Use the vCenter Server system to take the host out of maintenance mode.
6 (Optional) Upgrade NSX Edges managed by the NSX Manager associated with the upgraded
vCenter Server system.
Upgraded NSX Edges deliver improvements in performance and integration. You can use
either NSX Manager or VMware Cloud Director upgrade NSX Edges.
n For information about using NSX Manager to upgrade NSX Edges, see the NSX for
vSphere documentation at https://docs.vmware.com.
n To use VMware Cloud Director to upgrade an NSX Edge Gateway, you must operate on
the VMware Cloud Director network object that the Edge supports:
n An appropriate upgrade of an Edge Gateway occurs automatically when you use either
the VMware Cloud Director or VMware Cloud Director API to reset a network that the
Edge Gateway serves.
Note Redeploying is supported only for NSX Data Center for vSphere Edge
Gateways.
n Resetting a vApp network from within the context of the vApp upgrades the NSX
Edge appliance associated with that network. To reset a vApp network from within the
context of a vApp, navigate to the Networks tab for the vApp, display its networking
details, click the radio button next to the name of the vApp network, and click Reset.
For more information on how to redeploy Edge Gateways and reset vApp networks, see
the VMware Cloud Director API Programming Guide.
What to do next
Repeat this procedure for the other vCenter Server systems registered to your VMware Cloud
Director installation.
After you deploy the VMware Cloud Director appliance, you cannot change the eth0 and eth1
network IP addresses or the hostname of the appliance. If you want the VMware Cloud Director
appliance to have different addresses or hostname, you must deploy a new appliance.
VMware, Inc. 78
VMware Cloud Director Installation, Configuration, and Upgrade Guide
If you must perform maintenance of an appliance that requires shutting down the database
high availability cluster, to avoid synchronization problems, you must first shut down the primary
appliance and then the standby appliances.
Note If your cluster is configured for automatic failover, after you deploy one or more additional
cells, you must use the Appliance API to reset the cluster failover mode to Automatic. See the
VMware Cloud Director Appliance API. The default failover mode for new cells is Manual. If
the failover mode is inconsistent across the nodes of the cluster, the cluster failover mode is
Indeterminate. The Indeterminate mode can lead to inconsistent cluster states between the
nodes and nodes following an old primary cell. To view the cluster failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
Back Up the Primary VMware Cloud Director Appliance Version 10.3.1 and Later
Starting with VMware Cloud Director 10.3.1 and later, you can use the VMware Cloud Director
appliance management user interface to back up the primary appliance.
Procedure
1 Log in as root to the appliance management UI of the primary, standby, or application cell at
https://cell_eth0_ip_address:5480.
VMware Cloud Director appliance creates the backup files in the /opt/vmware/vcloud-
director/data/transfer/backups directory. The backups for the earlier VMware Cloud
Director versions are located in the /opt/vmware/vcloud-director/data/transfer/
pgdb-backup directory. However, earlier version backups are incompatible with VMware
Cloud Director 10.3.1 and later.
Results
The newly created file appears in the list of backups. The backup name is in the format backup-
date-time-format.tgz. For VMware Cloud Director appliance 10.3.2 and later, the backup
name is in the format backup-date-time-format.zip.
VMware, Inc. 79
VMware Cloud Director Installation, Configuration, and Upgrade Guide
What to do next
n If you do not expect to restore the system to version 10.3 or earlier, you can delete the
backups in the /opt/vmware/vcloud-director/data/transfer/pgdb-backup directory.
n If you do not expect to restore the system to version 10.3.1, you can delete the backups in
the /opt/vmware/vcloud-director/data/transfer/backups directory.
n Starting with VMware Cloud Director 10.3.2, you can delete any unnecessary 10.3.2 and later
backups by using the VMware Cloud Director appliance management user interface or the
VMware Cloud Director appliance API. For information on how to use the VMware Cloud
Director appliance API, see the VMware Cloud Director Appliance API Reference.
Note This procedure is for VMware Cloud Director version 10.3. For VMware Cloud Director
10.3.1 and later, see Back Up the Primary VMware Cloud Director Appliance Version 10.3.1 and
Later.
Procedure
2 Navigate to /opt/vmware/appliance/bin.
Results
Restore the Primary VMware Cloud Director Appliance Version 10.3.1 and Later
Starting with version 10.3.1, to restore the primary appliance, you can use the VMware Cloud
Director appliance management UI. If an HA cluster fails, for example, during a failed upgrade,
you can use a backup to restore the primary, instead of using a VM snapshot.
Prerequisites
n Verify that you have a backup file of the primary appliance. See Back Up the Primary VMware
Cloud Director Appliance Version 10.3.1 and Later.
VMware, Inc. 80
VMware Cloud Director Installation, Configuration, and Upgrade Guide
n Deploy one primary database cell. The newly deployed primary appliance version must match
the backup appliance version. If you reuse the IP of the primary appliance, you do not need to
replace the application cells later on. See Deployment and Initial Configuration of the VMware
Cloud Director Appliance.
Procedure
1 Log in as root to the appliance management UI of the newly deployed primary cell at
https://primary_eth0_ip_address:5480.
3 Enter the path that contains the backups directory, for example, remote_target:/data/
transfer.
The NFS mount and the share containing the backups directory must have 750 permission and
vcloud.vcloud ownership.
5 Select the backup that you want to use to restore the primary appliance, and click Next.
By default, only the backups with a compatible version appear. You can sort the backups by
date, or filter the backups by the appliance version.
6 (Optional) If your VMware Cloud Director appliance is version 10.3.3 or later, select which
certificates you want to restore from the backup.
For the restored appliance, you can reuse the HTTP certificate, the console proxy certificate,
or both.
7 Enter the path to the transfer share for the restored primary appliance.
You can use the same NFS share, or enter a new share for the restored appliance.
What to do next
n To deploy additional cells, see Deployment and Initial Configuration of the VMware Cloud
Director Appliance.
n Starting with VMware Cloud Director 10.3.3, similarly to restoring the primary appliance,
you can restore additional cells by using the VMware Cloud Director appliance
management UI. When restoring additional cells, if the HTTP and console proxy
certificates are referencing to the transfer share path, VMware Cloud Director configures
the cells to use the same certificates as the primary appliance. If the HTTP and console
proxy certificates are referencing a local path and have the same key-password as root,
VMware Cloud Director configures the additional cells to use self-signed certificates.
VMware, Inc. 81
VMware Cloud Director Installation, Configuration, and Upgrade Guide
2 If the failover mode before the restore was Automatic, you must set it again to Automatic by
using the VMware Cloud Director appliance API.
3 If the VMware Cloud Director appliance FIPS mode was on before the restore, you must set it
again by using the VMware Cloud Director appliance API.
n Copying the embedded database backup .tar file from the transfer service NFS shared
storage.
n Restoring the database to the embedded database primary and standby cells.
Prerequisites
n Verify that you have a backup .tar file of the embedded PostgreSQL database. See Back Up
the Embedded Database of VMware Cloud Director 10.3 Appliance.
n Deploy one primary database cell and two standby database cells. See Deployment and Initial
Configuration of the VMware Cloud Director Appliance.
n If you want the new appliance cluster to use the NFS server of the previous environment,
create and export a new directory on the NFS server as the new share. The existing
mountpoint cannot be reused.
Procedure
1 On the primary and standby cells, log in as root, and run the command to stop the VMware
Cloud Director service.
2 On the primary and standby cells, copy the backup .tar file to the /tmp folder.
If there is not enough free space on the /tmp folder, use another location to store the .tar
file.
3 On the primary and standby cells, untar the backup file at /tmp.
VMware, Inc. 82
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Note The truststore.pem file is only available for VMware Cloud Director 10.2.2 and later.
4 On the primary cell only, log in as root to the console and run the following commands.
5 On the primary and standby cells, save a copy of the configuration data files, replace them,
and reconfigure and start the VMware Cloud Director service.
cd /opt/vmware/vcloud-director/etc
mkdir -p backup
cp global.properties responses.properties certificates.* proxycertificates.*
truststore.* user.* backup
b Copy and replace the properties, certificates, private keys, and truststore files from the
backup files that you extracted at Step 3.
cd /tmp
cp global.properties responses.properties certificates.* proxycertificates.*
truststore.* user.* /opt/vmware/vcloud-director/etc/
c Run the following commands to reconfigure the VMware Cloud Director service.
VMware, Inc. 83
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Where:
n The --database-password option matches the database password that you set during
the appliance setup in the VMware Cloud Director appliance management UI at
https://appliance_eth0_ip:5480.
n The --database-host option matches the eth1 network IP address of the primary
database appliance.
n The --primary-ip value matches the eth0 network IP address of the appliance cell that
you are restoring. This is not the primary database cell IP address.
n The --console-proxy-ip option matches the eth0 network IP address of the appliance
that you are restoring.
For troubleshooting information, see Reconfiguring the VMware Cloud Director Service
Fails When Migrating or Restoring to VMware Cloud Director Appliance.
6 (Optional) Deploy any additional application cells. See Deployment and Initial Configuration of
the VMware Cloud Director Appliance.
7 If the new appliances use different IPs than the original appliances that you are replacing, you
must update the configuration of the load balancer which fronts the VMware Cloud Director
server group to include the IPs of the new appliances.
8 After all cells of the server group finish the startup process, verify that the restore of your
VMware Cloud Director environment is successful.
a Open the VMware Cloud Director Service Provider Admin Portal by using the eth0
network IP address of any cell from the new server group, https://et0_IP_new_cell/
provider.
VMware, Inc. 84
VMware Cloud Director Installation, Configuration, and Upgrade Guide
If you updated the load balancer configuration as per step 7, you must use the public
address of the server group to access the Service Provider Admin Portal.
b Log in to the Service Provider Admin Portal with your existing system administrator
credentials.
c Validate that your vSphere and cloud resources are available in the new environment.
9 After the successful verification of the database restore, use the Service Provider Admin Portal
to delete the disconnected cells that belong to the old VMware Cloud Director environment.
a From the top navigation bar, under Resources, select Cloud Resources.
10 If the failover mode before the restore was Automatic, you must set it again to Automatic by
using the VMware Cloud Director appliance API.
11 If the VMware Cloud Director appliance FIPS mode was on before the restore, you must set it
again by using the VMware Cloud Director appliance API.
Starting with VMware Cloud Director 10.1, if the primary database service fails, you can enable
VMware Cloud Director to perform an automatic failover to a new primary. See Automatic Failover
of the VMware Cloud Director Appliance.
The failover mode is set to automatic or manual by using the VMware Cloud Director appliance
API. See the Failovermode section of the VMware Cloud Director Appliance API Schema
Reference.
For clusters configured with automatic failover, after you deploy one or more additional cells, you
must use the appliance API to reset the failover mode of the cluster to automatic. If you do not
reset the failover mode of the cluster, the failover mode across the nodes becomes inconsistent.
During a migration to the VMware Cloud Director appliance, or if you plan to use a third party
database backup solution, you might want to enable external access to the embedded VMware
Cloud Director database.
VMware, Inc. 85
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Procedure
3 Create a text file containing entries for the target external IP addresses similar to:
For example:
Your entries are appended to the dynamically updated pg_hba.conf file, which controls the
access to the primary database in the HA cluster.
The SSH daemon runs in the appliance for use by the database HA function and for remote root
logins. You can disable the SSH access for the root user. The SSH access for the database HA
function remains unchanged.
Prerequisites
To make the changes to the OVF properties permanent, you must use the vSphere UI to change
the OVF property values. See the Configure vApp Properties topic in the vSphere Virtual Machine
Administration guide.
Procedure
1 If you want to make temporary changes to the OVF property, for example, for testing
purposes, change the property in VMware Cloud Director.
a Log in directly or by using an SSH client to the VMware Cloud Director appliance console
as root.
b Run the script for enabling or disabling the SSH root access.
VMware, Inc. 86
VMware Cloud Director Installation, Configuration, and Upgrade Guide
2 If you want to make permanent changes to the OVF property, use the vSphere user interface
to set the value of the vcloudapp.enable_ssh.VMware_vCloud_Director property.
Note You must power off the VM to change the value of the property in vSphere.
The Federal Information Processing Standard (FIPS) 140-2 is a U.S. and Canadian government
standard that specifies security requirements for cryptographic modules. The NIST Cryptographic
Module Validation Program (CMVP) validates the cryptographic modules compliant with the FIPS
140-2 standards.
The goal of VMware Cloud Director FIPS support is to ease the compliance and security activities
in various regulated environments. To learn more about support for FIPS 140-2 in VMware
products, see https://www.vmware.com/security/certifications/fips.html.
Important When you enable FIPS mode, the integration with vRealize Orchestrator does not
work.
VMware Cloud Director uses the following FIPS 140-2 validated cryptographic modules:
n VMware’s BC-FJA (Bouncy Castle FIPS Java API), version 1.0.2.1: Certificate #3673
When using the VMware Cloud Director appliance, to configure the appliance to run in FIPS-
compliant mode, you must manage both the appliance FIPS mode and the cell FIPS mode.
n Appliance FIPS mode is the mode of the underlying appliance OS, embedded database, and
various system libraries.
n Cell FIPS mode is the mode of the VMware Cloud Director cell running on each appliance.
For enabling and disabling FIPS mode on VMware Cloud Director on Linux, see Enable FIPS Mode
on the Cells in the Server Group.
VMware, Inc. 87
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Prerequisites
n If metrics collection is enabled, verify that the Cassandra certificates follow the X.509 v3
certificate standard and include all the necessary extensions. You must configure Cassandra
with the same cipher suites that VMware Cloud Director uses. For information about the
allowed SSL ciphers, see Managing the List of Allowed SSL Ciphers.
n If you want to use SAML encryption, you must regenerate one of the key pairs for the existing
organizations and re-exchange the SAML metadata. Organizations created with VMware Cloud
Director 10.2.x and earlier, have two identical key pairs and you must regenerate one of the
key pairs. Organizations created with VMware Cloud Director 10.3 and later have two distinct
key pairs and you do not need to regenerate any of them.
Procedure
1 From the top navigation bar of the Service Provider Admin Portal, select Administration.
3 Click Enable.
When the configuration finishes, VMware Cloud Director displays an Enable in Progress
(Awaiting cells restart) message, and you can continue to step 5. When you enable or
disable FIPS mode from the appliance management UI, the VMware Cloud Director appliance
automatically restarts the cells.
7 To turn on or turn off the appliance FIPS mode, click the Enable or Disable button for the node
you are logged into.
You can turn on or turn off the appliance FIPS mode only on the node you are logged into.
8 Confirm the action and verify that FIPS mode is enabled or disabled successfully.
9 Repeat step 5 to step 8 for each appliance, for example, primary, standby, and application
types.
What to do next
To confirm the state of the cells, see View the VMware Cloud Director Appliance FIPS Mode.
VMware, Inc. 88
VMware Cloud Director Installation, Configuration, and Upgrade Guide
When using the VMware Cloud Director appliance, to configure the VMware Cloud Director
appliance to run in FIPS-compliant mode, you must manage both the appliance FIPS mode and
the cell FIPS mode.
n The appliance FIPS mode is the mode of the underlying appliance OS, embedded database,
and various system libraries.
n The cell FIPS mode is the mode of the VMware Cloud Director cell running on each appliance.
Health Description
The appliance and cell FIPS modes match. Both modes are
either on or off.
Prerequisites
Procedure
3 View the status of the appliance and cell FIPS mode on each node.
Simple Network Management Protocol (SNMP) is an application layer protocol for management
and monitoring of network elements. Starting with version 10.2.2, the VMware Cloud Director
appliance includes an SNMP agent that can receive and respond to GET, GETBULK, and GETNEXT
requests. The VMware Cloud Director appliance SNMP agent is compatible with all SNMP
management services that are compliant with the SNMP standards. You can configure the
agent for SNMP v1, v2c, or v3. However, only SNMP v3 offers enhanced security, including
cryptographic authentication and encryption.
VMware, Inc. 89
VMware Cloud Director Installation, Configuration, and Upgrade Guide
If there is an existing Net-SNMP agent, before you begin the configuration, consider the following:
n During the upgrade to version 10.2.2, VMware Cloud Director deletes and replaces Net-SNMP
with VMware-SNMP.
n You must remove any existing firewall rules that work with Net-SNMP because VMware-SNMP
enables and disables the polling port when starting and stopping the snmpd service.
VMware-SNMP for the VMware Cloud Director appliance supports standard Linux OS
management information bases (MIBs) available through the following standard industry MIBs.
n SNMPv2-MIB
n RFC 3418IF-MIB
n RFC 2863IP-MIB
n RFC 4293IP-FORWARD-MIB
n RFC 4292UDP-MIB
n RFC 4113TCP-MIB
n RFC 4022ENTITY-MIB
n RFC 4133HOST-RESOURCES-MIB
By default, the embedded SNMP agent listens on UDP port 161 for polling requests from
management systems. You can use the vicfg-snmp --port command to configure an alternative
port. To avoid conflicts between the port for the SNMP agent and the ports of other services,
reference https://ports.vmware.com/home/VMware-Cloud-Director.
Prerequisites
You must remove any existing firewall rules that work with Net-SNMP because VMware-SNMP
enables and disables the polling port when starting and stopping the snmpd service.
Procedure
vicfg-snmp --disable
VMware, Inc. 90
VMware Cloud Director Installation, Configuration, and Upgrade Guide
3 To change the port that the SNMP agent uses for listening for polling requests, run the
following command.
Configure the VMware Cloud Director Appliance for SNMP v1 and v2c
Starting with VMware Cloud Director 10.2.2, you can configure VMware Cloud Director appliance
for SNMP, by configuring at least one community for the SNMP agent. When you configure the
VMware Cloud Director SNMP agent for SNMP v1 and v2c, the agent supports polling.
In SNMP v1 and v2c, community strings are namespaces that contain one or more managed
objects. Namespaces can act as a form for authentication but this does not secure the
communication. To secure the communication, use SNMP v3.
To enable the VMware Cloud Director appliance SNMP agent to send and receive SNMP v1 and
v2c messages, you must configure at least one community for the agent. An SNMP community
defines a group of devices and management systems. Only devices and management systems that
are members of the same community can exchange SNMP messages. A device or management
system can be a member of multiple communities.
Procedure
For example, to configure public, east, and west network operation center communities, run
the following command:
Every time you specify a community with this command, the settings you specify overwrite the
previous configuration. To enter multiple communities, use a comma as a separator.
vicfg-snmp --enable
Configuring the VMware Cloud Director appliance for SNMP v3 consists of three parts.
VMware, Inc. 91
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Every SNMP v3 agent has an engine ID, which serves as a unique identifier for the agent. The
engine ID is used with a hashing function to generate localized keys for authentication and
encryption of SNMP v3 messages. If you do not specify an engine ID before you enable the SNMP
agent, when you enable the standalone SNMP agent, VMware Cloud Director generates an engine
ID.
To ensure the identity of users, you can use authentication. Privacy allows for encryption of SNMP
v3 messages to ensure the confidentiality of the data. The privacy protocols provide a higher level
of security than is available in SNMP v1 and v2c, which use community strings for security. Both
authentication and privacy are optional. However, if you plan to enable privacy, you must enable
authentication.
The default value for the authentication and privacy protocols is none.
You can configure up to five users who can access SNMP v3 information. User names must be
no more than 32 characters long. While configuring a user, you generate the authentication and
privacy hash values based on the authentication and privacy passwords of the user and the engine
ID of the SNMP agent. After configuring the users, if you change the engine ID, authentication
protocol, or privacy protocol, invalidates the users and you must reconfigure them.
Prerequisites
If you want to configure SNMP authentication and privacy protocols, verify that you know the
authentication and privacy passwords for each user that you plan to configure. The passwords
must be at least eight characters long.
Procedure
Where protocol must be either none, for no authentication, SHA1, SHA256, SHA384, or SHA512.
For example, if you want to set the authentication protocol to SHA512, you must run the
following command.
VMware, Inc. 92
VMware Cloud Director Installation, Configuration, and Upgrade Guide
4 (Optional) To configure the privacy protocol, run the vicfg-snmp --privacy command .
Where protocol must be either none, for no privacy, or AES128, AES192, or AES256. For
example, if you want to set the privacy protocol to AES128, you must run the following
command.
5 If you are using authentication, privacy, or both, to generate the authentication and privacy
hash values for a user, run the following command.
You can specify multiple users by adding them as a comma-separated list. You can configure
up to five users.
Parameter Description
model Replace with the level of security enabled for that user, which can be auth, for authentication only, priv,
for authentication and privacy, or none, for no authentication or privacy.
For example, if you want to configure a user without security, you can run:
If you want to configure a user with authorization hash, you can run:
VMware, Inc. 93
VMware Cloud Director Installation, Configuration, and Upgrade Guide
If you want to configure a user with authorization hash and privacy hash, you can run:
7 (Optional) If you want to delete one or more users, repeat step 6 with the new user details.
vicfg-snmp --enable
Prerequisites
n Configure the VMware Cloud Director appliance for Configure the VMware Cloud Director
Appliance for SNMP v1 and v2c or Configure the VMware Cloud Director Appliance for SNMP
v3.
Procedure
1 On a local machine, verify that you have the snmpwalk command installed and install it if
necessary.
Where -l is the security level that you can set to noAuthNoPriv, authNoPriv, or authPriv. For
help with the snmpwalk command, you can run -h.
VMware, Inc. 94
VMware Cloud Director Installation, Configuration, and Upgrade Guide
Prerequisites
Configure the VMware Cloud Director appliance for Configure the VMware Cloud Director
Appliance for SNMP v1 and v2c or Configure the VMware Cloud Director Appliance for SNMP
v3.
Procedure
2 To return all SNMP settings to their default values and disable the SNMP agent, run the
following command.
vicfg-snmp --reset
Prerequisites
Configure the VMware Cloud Director appliance for Configure the VMware Cloud Director
Appliance for SNMP v1 and v2c or Configure the VMware Cloud Director Appliance for SNMP
v3.
Procedure
vicfg-snmp --show
The sample output shows that the SNMP agent is enabled for a V3 user with an authorization hash
and a privacy hash.
VMware, Inc. 95
VMware Cloud Director Installation, Configuration, and Upgrade Guide
da1057af05f67a25a09265a9a2bedb53 authPriv
Contact :
Location :
Engine ID : 80001f8880efbab0540a653e6000000000
Auth Protocol : usmHMACSHAAuthProtocol
Priv Protocol : usmAESCfb128PrivProtocol
Log level : warning
Process ID : 15828
Large Storage Support : False
Simple Application Names: False
INFO: listing complete.
Important You cannot edit the hostname of the appliance. You must deploy a new appliance with
the desired hostname.
Prerequisites
To make the changes to the OVF properties permanent, you must use the vSphere UI to change
the OVF property values. See the Configure vApp Properties topic in the vSphere Virtual Machine
Administration guide.
Procedure
1 If you want to change the DNS settings temporarily, for example, for testing purposes, edit the
DNS settings in VMware Cloud Director.
a Log in directly or by using an SSH client to the VMware Cloud Director appliance console
as root.
b (Optional) Verify the current DNS configuration by running the following command:
VMware, Inc. 96
VMware Cloud Director Installation, Configuration, and Upgrade Guide
2 If you want to change the DNS settings permanently, use the vSphere UI to set the value of the
vami.DNS.VMware_vCloud_Director property to the new DNS server IP address.
Note You must power off the VM to change the value of the property in vSphere.
Edit the Static Routes for the VMware Cloud Director Appliance
Network Interfaces
You can change the static routes for the eth0 and eth1 network interfaces after the initial VMware
Cloud Director deployment.
Prerequisites
To make the changes to the OVF properties permanent, you must use the vSphere UI to change
the OVF property values. See the Configure vApp Properties topic in the vSphere Virtual Machine
Administration guide.
Procedure
1 If you want to change the static route value temporarily, for example, for testing purposes, edit
the static routes in VMware Cloud Director.
a Log in directly or by using an SSH client to the VMware Cloud Director appliance console
as root.
VMware, Inc. 97
VMware Cloud Director Installation, Configuration, and Upgrade Guide
The static routes must be in a comma-separated list of route specifications. For example,
for eth0 you must run:
2 If you want to change the static route value permanently, change the OVF property by using
the vSphere UI.
Note You must power off the VM to change the value of the property in vSphere.
Directory Description
/opt/vmware/appliance/etc/pg_hba.d/ The directory where you can add custom entries to the pg_hba.conf file.
See Configure External Access to the VMware Cloud Director Database.
VMware, Inc. 98
VMware Cloud Director Installation, Configuration, and Upgrade Guide
can generate new self-signed certificates. You must renew the certificates for each VMware Cloud
Director cell individually.
The VMware Cloud Director appliance uses two sets of SSL certificates. The VMware Cloud
Director service uses one set of certificates for HTTPS and console proxy communications. The
embedded PostgreSQL database and the VMware Cloud Director appliance management user
interface share the other set of SSL certificates.
You can change both sets of self-signed certificates. Alternatively, if you use CA-signed certificates
for the HTTPS and console proxy communications of VMware Cloud Director, you can change
only the embedded PostgreSQL database and appliance management UI certificate. CA-signed
certificates include a complete trust chain rooted in a well-known public certificate authority.
Prerequisites
If you are renewing the certificate for the primary node in a database high availability cluster, place
all other nodes in maintenance mode to prevent data loss. See Managing a Cell.
Procedure
1 Log in directly or SSH to the OS of the VMware Cloud Director appliance as root.
2 To stop the VMware Cloud Director services, run the following command.
3 Generate new self-signed certificates for the database and appliance management UI or for
the HTTPS and console proxy communication, the database, and appliance management UI.
n Generate self-signed certificates only for the embedded PostgreSQL database and the
VMware Cloud Director appliance management UI, run:
This command automatically puts into use the newly generated certificates for the
embedded PostgreSQL database and the appliance management UI. The PostgreSQL and
the Nginx servers restart.
n Generate new self-signed certificates for HTTPS and console proxy communication of
VMware Cloud Director in addition to certificates for the embedded PostgreSQL database
and the appliance management UI.
/opt/vmware/appliance/bin/generate-certificates.sh <root-password>
b If you are not using CA-signed certificates, run the commands to import the newly
generated self-signed certificates to VMware Cloud Director.
VMware, Inc. 99
VMware Cloud Director Installation, Configuration, and Upgrade Guide
These commands automatically put into use the newly generated certificates for the
embedded PostgreSQL database and the appliance management UI. The PostgreSQL
and the Nginx servers restart. The commands generate new, self-signed SSL
certificates /opt/vmware/vcloud-director/etc/user.http.pem and /opt/vmware/
vcloud-director/etc/user.consoleproxy.pem with private keys /opt/vmware/
vcloud-director/etc/user.http.key and /opt/vmware/vcloud-director/etc/
user.consoleproxy.key, which are used in Step 1.
Results
The renewed self-signed certificates are visible in the VMware Cloud Director user interface.
The new PostgreSQL certificate is imported to the VMware Cloud Director truststore on other
VMware Cloud Director cells the next time the appliance-sync function runs. The operation can
take up to 60 seconds.
What to do next
When you deploy the VMware Cloud Director appliance, it generates self-signed certificates
with a validity period of 365 days. The VMware Cloud Director appliance uses two sets of SSL
certificates. The VMware Cloud Director service uses one set of certificates for HTTPS and the
console proxy communications. The embedded PostgreSQL database and the VMware Cloud
Director appliance management user interface share the other set of SSL certificates.
Note The process of replacing the database and appliance management UI certificates does not
affect the certificates for HTTPS and console proxy communications. Replacing one of the sets of
certificates does not mean you must replace the other set.
Procedure
2 If you are replacing the certificate for the primary database, place all other nodes into
maintenance mode to prevent the possibility of data loss.
4 To pick up the new certificate, restart the vpostgres, nginx, and vcd_ova_ui services.
5 If you are replacing the certificate for the primary database, take all other nodes out of
maintenance mode.
Results
The new certificate is imported to the VMware Cloud Director truststore on other VMware Cloud
Director cells the next time the appliance-sync function runs. The operation might take up to 60
seconds.
Replace the Transfer Server Storage for the VMware Cloud Director
Appliance
You can change the NFS share for the VMware Cloud Director appliance after deployment.
Procedure
1 Quiesce and stop the vmware-vcd service on all appliances in the VMware Cloud Director
server group.
3 On the primary appliance, copy the data from the old NFS share to the new one.
mkdir /opt/vmware/vcloud-director/data/transfer-new/
b Mount the new NFS server share on the new mount point.
c Copy the files from the old transfer share to the new transfer share.
Note The time it takes to copy the files depends on the number of catalog items cached in
the transfer folder share.
cp -R /opt/vmware/vcloud-director/data/transfer/* /opt/vmware/vcloud-director/data/
transfer-new/
d When you copy the files successfully, confirm that the contents of the old NFS share are
in new NFS share by verifying the contents of /opt/vmware/vcloud-director/data/
transfer-new or running the following command.
e Unmount the new NFS share from the temporary mount point.
umount /opt/vmware/vcloud-director/data/transfer-new/
rmdir /opt/vmware/vcloud-director/data/transfer-new/
4 Update the /etc/fstab file, replacing the NFS line with the path to the new NFS server.
Primary_appliance_IP_address:/data/transfer_appliance /opt/vmware/vcloud-director/data/
transfer/ nfs defaults 0 0
umount /opt/vmware/vcloud-director/data/transfer/
mount -a
7 Confirm that you mounted the NFS share successfully by verifying that the output of the mount
command lists the mounted NFS share.
8 Change the ownership of the transfer directory from root to vcloud using the following
command.
12 Verify that vmware-vcd works correctly on all nodes in the server group.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
[Time]
#FallbackNTP=time1.sample-time-server.com time2.sample-time-server.com time3.sample-time-
server.com time4.sample-time-server.com
NTP=time.sample-time-server.com
timedatectl timesync-status
ntpdate time_server
The PostgreSQL database resides on Hard disk 3. It has a default size of 80 GB. The procedure
can be done while the appliances are operational.
Important You must increase the capacity of any existing standby appliances before increasing
the capacity of the primary appliance.
The PostgreSQL Database disk size on each standby appliance must be the same as the
PostgreSQL database disk on the primary appliance.
Prerequisites
n If your VMware Cloud Director environment has standby nodes, identify the standby nodes
and the primary node, and begin the procedure from a standby node. For more information
on identifying the roles of the nodes, see View the VMware Cloud Director Appliance Cluster
Health and Failover Mode.
n If your VMware Cloud Director environment consists of only a primary node, run the
procedure on the primary node.
Procedure
1 Log in to the vSphere Client to increase the capacity of Hard Disk 3 to the size that you want.
The PostgreSQL database disk size on each standby appliance must be as large as the
PostgreSQL database disk on the primary appliance.
a Select the appliance virtual machine that you want to change.
The progress of the reconfiguration task appears in the Recent tasks pane.
a Log in directly or by using an SSH client to the VMware Cloud Director appliance console
as root.
b To apply the hard disk resizing change to the OS, run the following script.
/opt/vmware/appliance/bin/db_diskresize.sh
3 If your environment does not consist of only one primary appliance, repeat the procedure for
each of the nodes that has a database.
The ALTER SYSTEM command writes the changes of the parameter settings to the
postgresql.auto.conf file which takes precedence over the postgresql.conf file during the
PostgreSQL initialization. Some settings require a restart of the PostgreSQL service while others
are dynamically configured and do not require a restart. Do not change the postgresql.conf
file, because the operation of the cluster requires periodic overwriting of the file and the changes
are not persistent.
Procedure
1 Log in directly or by using an SSH client to the OS of the primary appliance as root.
sudo -i -u postgres
5 If some of the parameters you want to change require a restart of the PostgreSQL service,
restart the vpostgres process.
6 If your environment has standby nodes, copy the postgresql.auto.conf file to the standby
appliances, and restart the PostgreSQL service if necessary.
For more information about the VMware Cloud Director Appliance API, see the VMware Cloud
Director Appliance API documentation.
You can unregister the cell during the normal system operation.
Note For the primary node to function normally, at least one standby node must always be
running.
Procedure
1 To find the name of the standby node that you want to unregister, run the VMware Cloud
Director Appliance API method NODES.
2 From one of the other nodes, run the VMware Cloud Director Appliance API method
UNREGISTER.
Where node-name is the name of the standby appliance that you want to remove.
3 To verify that the unregistered standby node no longer appears in the database high
availability cluster, run the API method NODES.
You can switch the roles of the primary and standby cell by using the VMware Cloud Director
appliance management user interface or the VMware Cloud Director appliance API. This
procedure describes the steps to do the switchover by using the management UI.
localClusterHealth: HEALTHY
localClusterFailover: MANUAL OR AUTOMATIC
localClusterHealth: HEALTHY
localClusterFailover: MANUAL OR AUTOMATIC
Prerequisites
n Verify that all the nodes in the cluster are healthy and online. See View the VMware Cloud
Director Appliance Cluster Health and Failover Mode.
Procedure
1 Quiesce the activities on all VMware Cloud Director cells that are part of the server group or
put the cells into maintenance mode.
The switchover causes the VMware Cloud Director database to be unavailable for 30–60
seconds. To avoid unexpected task failures, you must quiesce the activity on all cells in the
cluster.
You can view the names of the cells, their roles, their status, the name of the cell that the
standby cells are following.
5 Click the Switchover button for the cell that you want to promote as primary and confirm the
switchover.
6 When the switchover task completes, restart the scheduler or disable maintenance mode for
the cells in the cluster.
MQTT is a lightweight, binary, messaging transport protocol. VMware Cloud Director uses MQTT
to publish information about events and tasks to which you can subscribe by using an MQTT client.
MQTT messages pass through an MQTT broker which can also store messages in case the clients
are not online.
Starting with VMware Cloud Director 10.2.2, you can use an MQTT client to subscribe to metrics.
Prerequisites
n If you want to subscribe to metrics, configure the metrics collection and enable metrics
publishing. See Configure Metrics Collection and Publishing.
Procedure
You receive the JWT token from the standard login request to VMware Cloud Director. You
can leave the user name and password empty.
Sec-WebSocket-Protocol: mqtt
3 Once the connection is established successfully, subscribe to topics through the MQTT client.
publish/{user_org_id}/{user_id}
publish/debd63a0-6eae-11ea-8c7b-0050561776be/d19fd8ff-6eae-11ea-bb42-0050561776c8
publish/{user_org_id}/+
publish/#
metrics/{org_id}/{vApp_id}
Depending on predefined criteria for the CPU and memory use, tenants can use VMware Cloud
Director to automatically scale up or down the number of VMs in a selected scale group. To allow
tenants to auto scale applications, you must configure, publish, and grant access to the auto scale
solution.
To balance the load of the servers that you configure to run the same application, you can use
VMware NSX Advanced Load Balancer (Avi Networks).
For multi-cell environments, you can run the commands on a single cell. VMware Cloud Director
stores the configuration in the database which all other cells can use.
1 Log in directly or by using an SSH client to the OS of any of the cells in the cluster as root.
2 To enable metric data collection, choose between collecting data with or without metrics data
persistence.
n To collect metrics with metrics data persistence, set up the metrics collection in a
Cassandra database. See Install and Configure a Cassandra Database for Storing Historic
Metric Data.
n To collect metrics data without data persistence, run the following commands:
$VCLOUD_HOME/bin/cell-management-tool manage-config -n
statsFeeder.metrics.collect.only -v true
$VCLOUD_HOME/bin/cell-management-tool manage-config -n
statsFeeder.metrics.publishing.enabled -v true
4 Create a metrics.groovy file in the /tmp folder with the following contents.
configuration {
metric("cpu.ready.summation") {
currentInterval=20
historicInterval=20
entity="VM"
instance=""
minReportingInterval=300
aggregator="AVERAGE"
}
}
6 If you configured Cassandra in step 2, update the Cassandra schema by providing the correct
nodes addresses, database authentication details, port and metrics time to live in days.
b To configure the auto scale function, use the user name from step 7a.
When running the command from the terminal, escape any special characters using the
backslash (\) sign.
8 If your environment is for development or testing purposes and you run the cell with self-
signed certificates, run the following command.
Prerequisites
Procedure
2 In the left panel, under Tenant Access Control, select Rights Bundles.
3 Verify that there are no Legacy Rights Bundles for the tenant organizations to which you want
to grant access to auto scaling.
n If you want to publish the bundle to all existing and newly created organizations in your
system, select Publish to All Tenants.
n If you want to publish the bundle to particular organizations in your system, select the
organizations individually.
6 Click Save.
What to do next
Add the necessary VMWARE:SCALEGROUP rights to the tenant roles that you want to use scale
groups. See View and Edit a Global Tenant Role in the VMware Cloud Director Service Provider
Admin Portal Guide.
You can use the VMware Cloud Director appliance management UI also to view the appliance
failover mode. The failover mode indicates whether VMware Cloud Director automatically triggers
a database failover if the primary database fails, or the system administrator must initiate the
failover manually.
If the failover mode is inconsistent across the nodes, the failover mode is Indeterminate. The
Indeterminate mode can lead to inconsistent cluster states between the nodes and nodes
following an old primary cell. You must diagnose the problem and remedy the situation manually.
You can view the names of the cells in a cluster, the roles of the cells, the cell status, the name
of the cell that the standby cells are following, and the cluster failover mode by using the VMware
Cloud Director appliance management UI or the VMware Cloud Director appliance API. This
procedure describes the steps to monitor the appliance cluster health in the management UI.
Procedure
You can view the short DNS names of the nodes, their roles, their status, the name of their
upstream node, that is, the current primary, and the available actions on the nodes.
In the Following column, a question mark (?) in front of the host name indicates that the
current primary is unreachable. An exclamation mark (!) in front of the host name indicates
that the metadata of the current primary is not updated and might be wrong, or that the node
is not attached to the current primary. The problem might occur if you restart the node after
a prolonged downtime. If the node cannot attach to the primary, you must unregister it and
replace it with a new standby.
On the services tab, you can monitor the vmware-vcd, vpostgres, and appliance-sync.timer
services for primary and standby appliances and the vmware-vcd and appliance-sync.timer
services for application cells.
Procedure
Procedure
1 Log in or SSH as root to the OS of any of the running cells in the cluster.
sudo -i -u postgres
n The repmgr cluster matrix command runs the repmgr cluster show command on each
node of the cluster and presents the result as a matrix.
/opt/vmware/vpostgres/current/bin/repmgr -f /opt/vmware/vpostgres/current/etc/
repmgr.conf cluster matrix
In the following example, node 1 and node 2 are up, and node 3 is down. Each row
corresponds to one server and represents the result of testing an outbound connection
from that server.
The three entries in the third row are marked with a ? symbol because node 3 is down and
there is no information on its outbound connections.
Name| Id | 1 | 2 | 3
---------+----+----+----+----
node 1 | 1 | * | * | x
node 2 | 2 | * | * | x
node 3 | 3 | ? | ? | ?
n The repmgr cluster crosscheck command crosschecks the connections between each
combination of nodes and might provide a better overview of the cluster connectivity.
/opt/vmware/vpostgres/current/bin/repmgr -f /opt/vmware/vpostgres/current/etc/
repmgr.conf cluster crosscheck
In the following example, the node from which you run the repmgr cluster crosscheck
command merges its cluster matrix system output with the output from the other nodes
and does a crosscheck between the nodes. In this case, all nodes are up, but the firewall
drops packets originating from node 1 and directed at node 3. This is an example of an
asymmetric network partition, where node1 cannot send packets to node3.
Name| Id | 1 | 2 | 3
---------+----+----+----+----
node 1 | 1 | * | * | x
node 2 | 2 | * | * | *
node 3 | 3 | * | * | *
What to do next
To determine the overall connectivity status in your database high availability cluster, run these
commands on each node and compare the results.
Procedure
1 Log in or SSH as root to the OS of any of the running nodes in the cluster.
sudo -i -u postgres
/opt/vmware/vpostgres/current/bin/repmgr -f /opt/vmware/vpostgres/current/etc/repmgr.conf
node status
The system output for the primary provides information on the node, PostgreSQL version, and
replication details. For example:
Node "bos1-vcloud-static-161-5":
PostgreSQL version: 10.9
Total data size: 81 MB
Conninfo: host=172.18.36.193 user=repmgr dbname=repmgr connect_timeout=2
Role: primary
WAL archiving: off
Archive command: (none)
Replication connections: 2 (of maximal 10)
Replication slots: 0 physical (of maximal 10; 0 missing)
Replication lag: n/a
The system output for a standby node provides information on the node, PostgreSQL version,
replication details and an upstream node. For example:
Node "bos1-vcloud-static-161-49":
PostgreSQL version: 10.9
Total data size: 83 MB
Conninfo: host=172.18.36.191 user=repmgr dbname=repmgr connect_timeout=2
Role: standby
WAL archiving: off
Archive command: (none)
Replication connections: 0 (of maximal 10)
Replication slots: 0 physical (of maximal 10; 0 missing)
Upstream node: bos1-vcloud-static-161-48 (ID: 683)
Replication lag: 0 seconds
Last received LSN: 2/D863B4E0
Last replayed LSN: 2/D863B4E0
4 (Optional) For more detailed information, use the PostgreSQL interactive terminal to check the
replication status of the nodes.
The PostgreSQL interactive terminal can provide information regarding whether any of the
received log records of the standby nodes are lagging behind the logs sent by the primary.
a Connect to the psql terminal
/opt/vmware/vpostgres/current/bin/psql
b To expand the display and make query results easier to read, run the set \x command.
Option Action
Procedure
2 To view the status of the services, from the left panel, select Services.
If the VMware Cloud Director appliance is working properly, the vmware-vcd and vpostgres
services are running.
What to do next
If you need to check the status of the repmgrd service for debugging purposes, you must use the
VMware Cloud Director Appliance API.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
2 To check the status of the VMware Cloud Director appliance, run the following command on
each appliance in the cluster.
LinkNTPServers=
SystemNTPServers= example-time-server.com
FallbackNTPServers=example1-time-server.com example2-time-server.com example3-time-
server.com example4-time-server.com
ServerName=example-time-server.com
ServerAddress=server_IP_address
RootDistanceMaxUSec=5s
PollIntervalMinUSec=32s
PollIntervalMaxUSec=34min 8s
PollIntervalUSec=34min 8s
NTPMessage={ Leap=0, Version=4, Mode=4, Stratum=3, Precision=-23, RootDelay=74.066ms,
RootDispersion=33.081ms, Reference=ABC1A16, OriginateTimestamp=Wed 2022-02-16 13:37:57
UTC, ReceiveTimestamp=Wed 2022-02-16 13:37:57 UTC, TransmitTimestamp=Wed 2022-02-16
13:37:57 UTC, DestinationTimestamp=Wed 2022-02-16 13:37:57 UTC, Ignored=yes
PacketCount=32, Jitter=338us }
Frequency=2030845
What to do next
If a cell in the database high availability cluster fails, the cluster health status indicates what the
failure is and how you can resolve the issue. For example, the Degraded cluster health indicates a
failure with a standby cell. A system administrator must redeploy the failed cell.
localClusterHealth: HEALTHY
localClusterFailover: MANUAL
Standby Failure
!
localClusterHealth: DEGRADED
localClusterFailover: MANUAL
localClusterHealth: HEALTHY
localClusterFailover: MANUAL
If a primary cell in the database high availability cluster fails, the cluster health can change to
No_Active_Primary, which indicates that a system administrator must repair the failed primary cell.
Depending on the failover mode of the VMware Cloud Director appliance, there are two different
workflows for recovering from a primary cell failure. You can use these workflows to reuse the IP
addresses and hostname of the failed primary when you deploy the new standby.
To view the state of the cells in the cluster, see View the VMware Cloud Director Appliance Cluster
Health and Failover Mode.
1 If possible, by using the cell management tool, shut down the VMware Cloud Director process.
From the failed primary cell, run the following command
b In the Role column for the standby cell that you want to become the new primary cell, click
Promote.
The management UI shows two cells with the primary role. The original primary has a failed
status and the new primary has a running status. The cluster health is Degraded.
4 From any cell other than the failed primary, using the appliance API Unregister method,
remove the failed primary appliance from the repmgr high availability cluster. See the VMware
Cloud Director Appliance API documentation.
5 Remove the failed primary appliance from the VMware Cloud Director server group.
b From the top navigation bar, under Resources, select Cloud Resources.
6 If you want to reuse the IP address and hostname of the failed primary, ensure that the failed
primary appliance remains powered off or use the vSphere Client to delete it.
7 Deploy a new standby appliance. You can Start the VMware Cloud Director Appliance
Deployment or Deploying the VMware Cloud Director Appliance by Using VMware OVF Tool.
After deploying the new standby, the cluster health must be Healthy.
8 If the VMware Cloud Director appliance FIPS mode was on before the restore, you must set it
again by using the VMware Cloud Director appliance API.
To view the state of the cells in the cluster, see View the VMware Cloud Director Appliance Cluster
Health and Failover Mode.
1 If possible, by using the cell management tool, shut down the VMware Cloud Director process.
From the failed primary cell, run the following command
The management UI shows two cells with the primary role. The original primary has a failed
status and the new primary has a running status. The cluster health is Degraded.
3 From any cell other than the failed primary, by using the appliance API Unregister method,
remove the failed primary appliance from the repmgr high availability cluster. See the VMware
Cloud Director Appliance API documentation.
4 Remove the failed primary appliance from the VMware Cloud Director server group.
b From the top navigation bar, under Resources, select Cloud Resources.
5 If you want to reuse the IP address and hostname of the failed primary, ensure that the failed
primary appliance is powered off or use the vSphere Client to delete it.
6 Deploy a new standby appliance. You can Start the VMware Cloud Director Appliance
Deployment or Deploying the VMware Cloud Director Appliance by Using VMware OVF Tool.
After deploying the new standby, the cluster health must be Healthy.
7 From any cell other than the failed primary cell, use the appliance API Failover method to
reset the cluster failover mode to Automatic. See the VMware Cloud Director Appliance API
documentation.
8 If the VMware Cloud Director appliance FIPS mode was on before the restore, you must set it
again by using the VMware Cloud Director appliance API.
If one of the standby cells is in the Not reachable or Failed state, you can deploy a new cell. To
view the state of the cells in the cluster, see View the VMware Cloud Director Appliance Cluster
Health and Failover Mode.
You can use this workflow to reuse the IP addresses and hostname of the failed standby when you
deploy a new standby.
1 If possible, use the cell management tool to shut down the VMware Cloud Director process.
From the failed standby cell, run the following command.
3 From any cell other than the failed standby cell, by using the appliance API Unregister
method, remove the failed standby cell from the repmgr high availability cluster. See the
VMware Cloud Director Appliance API documentation.
4 Use the Service Provider Admin Portal to remove the failed standby appliance from the
VMware Cloud Director server group.
a From the top navigation bar, under Resources, select Cloud Resources.
5 If you want to reuse the IP address and DNS name of the failed standby cell, you must ensure
that the failed standby remains powered off or delete it.
6 Deploy a new standby appliance. You can Start the VMware Cloud Director Appliance
Deployment or Deploying the VMware Cloud Director Appliance by Using VMware OVF Tool.
After deploying the new standby, the cluster health must be Healthy.
7 To reset the cluster failover mode to Automatic, from any cell other than the failed standby
cell, use the appliance API Failover method. See the VMware Cloud Director Appliance API
documentation.
For more information about the automatic failover mode, see Automatic Failover of the
VMware Cloud Director Appliance.
8 If the VMware Cloud Director appliance FIPS mode was on before the restore, you must set it
again by using the VMware Cloud Director appliance API.
For more information about using the VMware Cloud Director API, see the UNREGISTER API
method in the VMware Cloud Director Appliance API documentation at http://code.vmware.com.
Prerequisites
n Verify that the node you want to unregister is inactive and make a note of its name. For
information about the status of the cells and the name of the cell the standby cells are
following, see View the VMware Cloud Director Appliance Cluster Health and Failover Mode.
n If you want to unregister a primary node, verify that the failed primary is inactive and without
any following standby nodes, and promote a new primary.
Procedure
u To remove the inactive node, make a DELETE request on an active node on which to run the
command.
VMware Technical Support routinely requests diagnostic information handling support requests.
You can use the vmware-vcd-support script to collect host log information, and VMware Cloud
Director logs. For more information about collecting diagnostic information for VMware Cloud
Director, see https://kb.vmware.com/s/article/1026312. When running the vmware-vcd-support
script, the logs might include information about decommissioned or replaced cells with status
FAIL. See, https://kb.vmware.com/s/article/71349.
Procedure
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
2 Navigate to /opt/vmware/var/log.
n The firstboot file contains logging information related to the first boot of the appliance.
The VMware Cloud Director Cell Fails to Start After the Appliance
Deployment
You deployed the VMware Cloud Director appliance successfully, but the VMware Cloud Director
services might fail to start.
Problem
Cause
If you deployed a primary cell, the VMware Cloud Director services might fail to start due to a
pre-populated NFS shared transfer service storage. Before you deploy the primary appliance, the
shared transfer service storage must not contain a responses.properties file or an appliance-
nodes directory.
If you deployed a standby or vCD application cell, the VMware Cloud Director services might fail to
start due to a missing responses.properties file in the NFS shared transfer storage. Before you
deploy a standby or vCD application appliance, the shared transfer service storage must contain
the responses.properties file.
Note If your cluster is configured for automatic failover, after you deploy one or more additional
cells, you must use the Appliance API to reset the cluster failover mode to Automatic. See the
VMware Cloud Director Appliance API. The default failover mode for new cells is Manual. If
the failover mode is inconsistent across the nodes of the cluster, the cluster failover mode is
Indeterminate. The Indeterminate mode can lead to inconsistent cluster states between the
nodes and nodes following an old primary cell. To view the cluster failover mode, see View the
VMware Cloud Director Appliance Cluster Health and Failover Mode.
Solution
1 Log in directly or by using an SSH client to the VMware Cloud Director appliance console as
root.
Problem
During the VMware Cloud Director appliance deployment, the deployer displays an error message
referring to the NFS share.
Cause
If you do not prepare the transfer server storage for the VMware Cloud Director, the NFS
validation during deployment fails.
Solution
Error Action
Invalid or missing command arguments. usage: The JSON request body cannot be parsed. Provide a valid
nfsValidate nfs_mount_string JSON request body.
Empty nfs_mount string The NFS mount string is not in the request body. Provide
an NFS mount string argument.
Invalid nfs_mount string: Change the NFS mount string to the valid format
nfs_mount_string_argument IP_address:path
Invalid cell type: cell_type_string The cell type must be primary, standby, or cell. If the
OVF parameter is not equal to any of these values, verify
the appliance configuration.
The 10.150.170.3:/data/transfer/cells This directory must not exist on the primary appliance. The
directory already exists. The primary directory exists on the NFS server and you must remove it.
appliance requires that this be removed.
The 10.150.170.3:/data/transfer/appliance- This directory must not exist on the primary appliance. The
nodes directory already exists. The primary directory exists on the NFS server and you must remove it.
appliance requires that this be removed.
Error Action
nfsValidate can not be run while system setup Wait for the system setup to complete before attempting
is in progress. to run nfsValidate.
Unable to create tmp directory for use by Verify file system permissions to determine why this
this script: /opt/vmware/vcloud-director/data/ directory cannot be created.
nfs-test
Problem
During the procedure for migrating or restoring VMware Cloud Director to a new VMware
Cloud Director appliance environment, you run the configure command to reconfigure the
VMware Cloud Director service in each new cell. The configure command might fail with
the error message sun.security.validator.ValidatorException: PKIX path validation
failed: java.security.cert.CertPathValidatorException: signature check failed.
Solution
Problem
The VMware Cloud Director appliance management UI shows the cluster health as DEGRADED and
the status of one of the standby nodes is ? unreachable.
The /nodes API returns information that the localClusterHealth is DEGRADED, the node status
is ? unreachable, and the nodeHealth is UNHEALTHY.
For example, the /nodes API might return the following information for the node.
{
"localClusterFailover": "MANUAL",
"localClusterHealth": "DEGRADED",
"localClusterState": [
{
"connectionString": "host=primary_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node primary_node_ID (primary_host_name): repmgrd = not
applicable",
"status": "NOT APPLICABLE"
}
},
"id": primary_node_ID,
"location": "default",
"name": "primary_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "PRIMARY",
"role": "primary",
"status": "* running",
"upstream": ""
},
{
"connectionString": "host=unreachable_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover state unknown - unable to ssh to failed or unreachable
node",
"mode": "UNKNOWN",
"repmgrd": {
"details": "On node unreachable_standby_node_ID
(unreachable_standby_host_name): repmgrd = n/a",
"status": "UNKNOWN"
}
},
"id": unreachable_standby_node_ID,
"location": "default",
"name": "unreachable_standby_host_name",
"nodeHealth": "UNHEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "? unreachable",
"upstream": "primary_host_name"
},
{
"connectionString": "host=running_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node running_standby_node_ID (running_standby_host_IP):
repmgrd = not applicable",
"status": "NOT APPLICABLE"
}
},
"id": running_standby_node_ID,
"location": "default",
"name": "running_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "primary_host_name"
}
],
"warnings": [
"unable to connect to node \"unreachable_standby_host_name\" (ID:
unreachable_standby_node_ID)",
"node \"unreachable_standby_host_name\" (ID: unreachable_standby_node_ID) is
registered as an active standby but is unreachable"
]
}
Cause
To ensure data integrity, the PostgreSQL database uses Write-Ahead Logging (WAL). The
primary node streams the WAL constantly to the active standby nodes for replication and recovery
purposes. The standby nodes process the WAL when they receive it. If a standby node is
unreachable, it stops receiving the WAL and cannot be a candidate for promotion to become
a new primary.
Solution
u Verify that the virtual machine of the unreachable standby node is running.
u Verify that there is no SSH problem that might prevent the standby node from communicating
with the other nodes.
What to do next
To verify that there are no network or SSH problems, see Check the Connectivity Status of a
Database High Availability Cluster.
Problem
The VMware Cloud Director appliance management UI shows the cluster health as DEGRADED, the
status of one of the unattached standby nodes is running, and there is an exclamation point (!)
before the name of the upstream node for the standby.
The PostgreSQL log shows that the primary deleted a WAL segment.
2020-10-08 04:10:50.064 UTC [13390] LOG: started streaming WAL from primary at 21/80000000
on timeline 17
2020-10-08 04:10:50.064 UTC [13390] FATAL: could not receive data from WAL stream: ERROR:
requested WAL segment 000000110000002100000080 has already been removed
2020-10-08 04:10:55.047 UTC [13432] LOG: started streaming WAL from primary at 21/80000000
on timeline 17
2020-10-08 04:10:55.047 UTC [13432] FATAL: could not receive data from WAL stream: ERROR:
requested WAL segment 000000110000002100000080 has already been removed
The /nodes API returns information that the localClusterHealth is DEGRADED, the node status
is running, the nodeHealth is HEALTHY. There is an exclamation point (!) before the name of the
upstream node for the standby and the /nodes API returns a warning that the standby is not
attached to its upstream node.
For example, the /nodes API might return the following information for the node.
{
"localClusterFailover": "MANUAL",
"localClusterHealth": "DEGRADED",
"localClusterState": [
{
"connectionString": "host=primary_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node primary_node_ID (primary_host_name): repmgrd = not
applicable",
"status": "NOT APPLICABLE"
}
},
"id": primary_node_ID,
"location": "default",
"name": "primary_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "PRIMARY",
"role": "primary",
"status": "* running",
"upstream": ""
},
{
"connectionString": "host=unattached_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node unattached_standby_node_ID
(unattached_standby_host_name): repmgrd = not applicable",
"status": "NOT APPLICABLE"
}
},
"id": unattached_standby_node_ID,
"location": "default",
"name": "unattached_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "! upstream_host_name"
},
{
"connectionString": "host=running_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node running_standby_node_ID (running_standby_host_name):
repmgrd = not applicable",
"status": "NOT APPLICABLE"
}
},
"id": running_standby_node_ID,
"location": "default",
"name": "running_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "upstream_host_name"
}
],
"warnings": [
"node \"unattached_standby_host_name\" (ID: unattached_standby_node_ID) is not
attached to its upstream node \"upstream_host_name\" (ID: upstream_node_id)"
]
}
If a standby node becomes unattached, you must reattach it as soon as possible. If the node
stays unattached for too long, it might fall behind in processing the continuously streaming
WAL records from the primary to such an extent that it might not be possible for it to resume
replication.
Cause
To ensure data integrity, the PostgreSQL database uses Write-Ahead Logging (WAL). The
primary node streams the WAL constantly to the active standby nodes for replication and recovery
purposes. The standby nodes process the WAL when they receive it. If a standby node becomes
unattached, it stops receiving the WAL and cannot be a candidate for promotion to become a new
primary.
Solution
What to do next
Problem
When there is an SSH problem between the database nodes, VMware Cloud Director shows the
localClusterHealth as SSH_PROBLEM. You must fix this critical problem as soon as possible.
You can view the localClusterHealth by using the VMware Cloud Director appliance
management user interface or run the /nodes VMware Cloud Director appliance API. See the
VMware Cloud Director Appliance API documentation.
When you run the /nodes API on a peer node of the one with the SSH problem, the /nodes API
returns information that the localClusterHealth is SSH_PROBLEM, the localClusterFailover is
INDETERMINATE. The failover mode is INDETERMINATE because the node on which you run the /
nodes API cannot connect to one of its peer nodes over SSH. The "details" in the "failover"
output part of the response body for the node with SSH problem displays: ssh failed.
command: ssh unreachable_standby_host_IP /usr/bin/grep failover=manual /opt/
vmware/vpostgres/10/etc/repmgr.conf.
For example, if a standby node has an SSH problem and you run GET https://
primary_host_IP:5480/api/1.0.0/nodes, the /nodes API might return the following information.
{
"localClusterFailover": "INDETERMINATE",
"localClusterHealth": "SSH_PROBLEM",
"localClusterState": [
{
"connectionString": "host=primary_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node primary_node_ID (primary_host_name): repmgrd = not
applicable",
"status": "NOT APPLICABLE"
}
},
"id": primary_node_ID,
"location": "default",
"name": "primary_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "PRIMARY",
"role": "primary",
"status": "* running",
"upstream": ""
},
{
"connectionString": "host=running_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node running_standby_node_ID (running_standby_host_name):
repmgrd = not applicable",
"status": "NOT APPLICABLE"
}
},
"id": running_standby_node_ID,
"location": "default",
"name": "running_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "primary_host_name"
},
{
"connectionString": "host=unreachable_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "ssh failed. command: ssh unreachable_standby_host_IP /usr/bin/
grep failover=manual /opt/vmware/vpostgres/10/etc/repmgr.conf",
"mode": "UNKNOWN",
"repmgrd": {
"details": "On node unreachable_standby_node_ID
(unreachable_standby_host_name): repmgrd = not running",
"status": "NOT RUNNING"
}
},
"id": unreachable_standby_node_ID,
"location": "default",
"name": "unreachable_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "primary_host_name"
}
],
"warnings": []
}
For example, the /nodes API might return the following information.
{
"localClusterFailover": "MANUAL",
"localClusterHealth": "SSH_PROBLEM",
"localClusterState": [
{
"connectionString": "host=primary_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "ssh failed. command: ssh primary_host_IP /usr/bin/grep
failover=manual /opt/vmware/vpostgres/10/etc/repmgr.conf",
"mode": "UNKNOWN",
"repmgrd": {
"details": "On node primary_node_ID (primary_host_name): repmgrd = n/a",
"status": "UNKNOWN"
}
},
"id": primary_node_ID,
"location": "default",
"name": "primary_host_name",
"nodeHealth": "UNHEALTHY",
"nodeRole": "PRIMARY",
"role": "primary",
"status": "? running",
"upstream": ""
},
{
"connectionString": "host=running_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "ssh failed. command: ssh running_standby_host_IP /usr/bin/grep
failover=manual /opt/vmware/vpostgres/10/etc/repmgr.conf",
"mode": "UNKNOWN",
"repmgrd": {
"details": "On node running_standby_node_ID (running_standby_host_name):
repmgrd = n/a",
"status": "UNKNOWN"
}
},
"id": running_standby_node_ID,
"location": "default",
"name": "running_standby_host_name",
"nodeHealth": "UNHEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "? running",
"upstream": "primary_host_name"
},
{
"connectionString": "host=unreachable_standby_host_IP user=repmgr dbname=repmgr
connect_timeout=2",
"failover": {
"details": "failover = manual",
"mode": "MANUAL",
"repmgrd": {
"details": "On node unreachable_standby_node_ID
(unreachable_standby_host_name): repmgrd = not applicable",
"status": "NOT APPLICABLE"
}
},
"id": unreachable_standby_node_ID,
"location": "default",
"name": "unreachable_standby_host_name",
"nodeHealth": "HEALTHY",
"nodeRole": "STANDBY",
"role": "standby",
"status": "running",
"upstream": "? primary_host_name"
}
],
"warnings": [
"unable to connect to node \"primary_host_name\" (ID: primary_node_ID)",
"unable to connect to node \"running_standby_host_name\" (ID:
running_standby_node_ID)",
"unable to connect to node \"unreachable_standby_host_name\" (ID:
unreachable_standby_node_ID)'s upstream node \"primary_host_name\" (ID: primary_node_ID)",
"unable to determine if node \"unreachable_standby_host_name\" (ID:
unreachable_standby_node_ID) is attached to its upstream node \"primary_host_name\" (ID:
primary_node_ID)"
]
}
Cause
VMware Cloud Director stores the SSH certificates of the postgres user on the NFS shared
transfer server storage. All database nodes must have access to the shared transfer server
storage. If a database node becomes untrusted, that is, the SSH certificates of the postgres user
are either no longer valid or accessible, that node is unable to run commands on its peer nodes
by using an SSH client. The VMware Cloud Director appliance must have this capability to perform
properly when in HA mode.
Solution
1 Determine whether there is a connectivity problem between the nodes and correct the
problem. See Check the Connectivity Status of a Database High Availability Cluster.
2 Verify that the appliance-sync.timer service is running on the nodes that have the SSH
problem by running the following command.
* appliance-sync.timer - Periodic check and sync of needed files for Cloud Appliance
functionality
Loaded: loaded (/lib/systemd/system/appliance-sync.timer; enabled; vendor preset:
enabled)
Active: active (waiting) since Sat 2020-09-05 23:22:49 UTC; 1 months 9 days ago
Warning: Journal has been rotated since unit was started. Log output is incomplete or
unavailable.
3 If the status of the appliance-sync.timer service is not Active, restart the service by running
the following command.
4 Wait for approximately 90 seconds and verify that the cluster health is HEALTHY by using the
VMware Cloud Director management UI or call the /nodes API.
Problem
If the vamicli command returns an error, you can use the log files to troubleshoot.
Solution
1 Log in directly or SSH to the VMware Cloud Director appliance console as root.
Problem
During the procedure of applying a patch to the VMware Cloud Director appliance, you run the
vamicli update --check command to check for available updates. The vamicli update --
check command might fail with Failure: Error downloading manifest. Please contact
your vendor.
Cause
Solution
Problem
During the procedure of applying a patch to the VMware Cloud Director appliance, you run the
vamicli update --install latest command to apply the latest available patch. The vamicli
update --install latest command might fail with Failure: Error while running
package installation
Cause
Solution
The VMware Cloud Director software for Linux requires an external database, whereas the
VMware Cloud Director appliance uses an embedded PostgreSQL database.
After you create the VMware Cloud Director server group, you integrate the VMware Cloud
Director installation with your vSphere resources. For network resources, VMware Cloud Director
can use NSX Data Center for vSphere, NSX-T Data Center, or both.
When you upgrade an existing VMware Cloud Director installation, you update the VMware Cloud
Director software and the database schema, leaving the existing relationships between servers,
the database, and vSphere in place.
When you migrate an existing VMware Cloud Director installation on Linux to the VMware Cloud
Director appliance, you update the VMware Cloud Director software and migrate the database to
the embedded database in the appliance.
n Configuration Planning
Configuration Planning
vSphere provides storage, compute, and networking capacity to VMware Cloud Director. Before
you begin the installation, consider how much vSphere and VMware Cloud Director capacity your
cloud requires, and plan a configuration that can support it.
Configuration requirements depend on many factors, including the number of organizations in the
cloud, the number of users in each organization, and the activity level of those users. The following
guidelines can serve as a starting point for most configurations:
n Allocate one VMware Cloud Director cell for each vCenter Server system that you want to
make accessible in your cloud.
n Be sure that all target VMware Cloud Director Linux servers meet at least the minimum
requirements for memory and storage detailed in VMware Cloud Director Release Notes.
n If you plan to install VMware Cloud Director on Linux, configure the VMware Cloud Director
database as described in Configure an External PostgreSQL Database for VMware Cloud
Director on Linux.
PostgreSQL databases have specific configuration requirements when you use them with VMware
Cloud Director.
You must create a separate, dedicated database schema for VMware Cloud Director to use.
VMware Cloud Director cannot share a database schema with any other VMware product.
VMware Cloud Director supports SSL connections to the PostgreSQL database. You can enable
SSL on the PostgreSQL database during an unattended network and database connections
configuration or after creating the VMware Cloud Director server group. See Unattended
Configuration Reference and Perform Additional Configurations on the External PostgreSQL
Database.
Note Only VMware Cloud Director on Linux uses an external database. The VMware Cloud
Director appliance uses the embedded PostgreSQL database.
Prerequisites
For information about the supported VMware Cloud Director databases, see the VMware Product
Interoperability Matrixes.
Procedure
A database server with 16 GB of memory, 100 GB storage, and 4 CPUs is appropriate for
typical VMware Cloud Director server groups.
n The SERVER_ENCODING value of the database must be UTF-8. This value is established when
you install the database and always matches the encoding used by the database server
operating system.
n Use the PostgreSQL initdb command to set the value of LC_COLLATE and LC_CTYPE to
en_US.UTF-8. For example:
initdb --locale=en_US.UTF-8
Use a command like this one to specify a database user named vcloud as the database owner.
The following command assigns the password vcloudpass to database owner vcloud.
The following command assigns the login option to database owner vcloud.
What to do next
After creating your VMware Cloud Director server group, you can configure the PostgreSQL
database to require SSL connections from the VMware Cloud Director cells and adjust some
database parameters for optimal performance. See Perform Additional Configurations on the
External PostgreSQL Database.
Each member of the server group mounts this volume at the same mountpoint: /opt/vmware/
vcloud-director/data/transfer. Space on this volume is consumed in many ways, including:
n During transfers, uploads and downloads occupy this storage. When the transfer finishes, the
uploads and downloads are removed from the storage. Transfers that make no progress for 60
minutes are marked as expired and cleaned up by the system. Because transferred images can
be large, it is a good practice to allocate at least several hundred gigabytes for this use.
n Catalog items in catalogs that are published externally and for which caching of the published
content is enabled, occupy this storage. Items from catalogs that are published externally
but do not enable caching do not occupy this storage. If you enable organizations in your
cloud to create catalogs that are published externally, you can assume that hundreds or even
thousands of catalog items require space on this volume. The size of each catalog item is about
the size of a virtual machine in a compressed OVF form.
Note The volume of the transfer server storage must have capacity for future expansion.
n The export list for the NFS server must allow for each server member in your VMware Cloud
Director server group to have read-write access to the shared location that is identified in the
export list. This capability allows the vcloud user to write files to and read files from the shared
location.
n The NFS server must allow read-write access to the shared location by the root system
account on each server in your VMware Cloud Director server group. This capability allows
for collecting the logs from all cells at once in a single bundle using the vmware-vcd-support
script with its multi-cell options. You can meet this requirement by using no_root_squash in the
NFS export configuration for this shared location.
/nfs/vCDspace vCD_Cell1_IP_Address(rw,sync,no_subtree_check,no_root_squash)
/nfs/vCDspace vCD_Cell2_IP_Address(rw,sync,no_subtree_check,no_root_squash)
/nfs/vCDspace vCD_Cell3_IP_Address(rw,sync,no_subtree_check,no_root_squash)
There must be no space between each cell IP address and its immediate following left parenthesis
in the export line. If the NFS server reboots while the cells are writing data to the shared location,
the use of the sync option in the export configuration prevents data corruption in the shared
location. The use of the no_subtree_check option in the export configuration improves reliability
when a subdirectory of a file system is exported.
For each server in the VMware Cloud Director server group, you must have a corresponding entry
in the NFS server's /etc/exports file so that they can all mount this NFS share. After making
changes to the /etc/exports file on the NFS server, run exportfs -a to re-export all NFS shares.
You can use the Linux rpm tool and the VMware public key to verify the digital signature of the
VMware Cloud Director installation file, or any other signed downloaded file from vmware.com.
If you install the public key on the computer where you plan to install VMware Cloud Director,
the verification happens as part of the installation or upgrade. You can also manually verify the
signature before you begin the installation or upgrade procedure, then use the verified file for all
installations or upgrades.
Note The download site also publishes a checksum value for the download. The checksum is
published in two common forms. Verifying the checksum verifies that the file contents that you
downloaded are the same as the contents that were posted. It does not verify the digital signature.
Procedure
2 Use a Web browser to download all of the VMware Public Packaging Public Keys from the
http://packages.vmware.com/tools/keys directory.
4 For each key that you download, run the following command to import the key.
Install and Configure NSX Data Center for vSphere for VMware Cloud
Director
If you plan your VMware Cloud Director installation to use network resources from NSX Data
Center for vSphere, you must install and configure NSX Data Center for vSphere and associate a
unique NSX Manager instance with each vCenter Server instance that you plan to include in your
VMware Cloud Director installation.
NSX Manager is included in the NSX Data Center for vSphere download. For the most
recent information about compatibility between VMware Cloud Director and other VMware
products, see the VMware Product Interoperability Matrices at http://partnerweb.vmware.com/
comp_guide/sim/interop_matrix.php. For information about the network requirements, see
Network Configuration Requirements for VMware Cloud Director.
Important This procedure applies only when you are performing a new installation of VMware
Cloud Director. If you are upgrading an existing installation of VMware Cloud Director, see
Upgrading VMware Cloud Director on Linux.
Prerequisites
Verify that each of your vCenter Server systems meets the prerequisites for installing NSX
Manager.
Procedure
1 Perform the installation task for the NSX Manager virtual appliance.
2 Log in to the NSX Manager virtual appliance that you installed and confirm the settings that
you specified during installation.
3 Associate the NSX Manager virtual appliance that you installed with the vCenter Server system
that you plan to add to VMware Cloud Director in your planned VMware Cloud Director
installation.
VMware Cloud Director creates VXLAN network pools to provide network resources to
Provider VDCs. If VXLAN support is not configured in the associated NSX Manager, Provider
VDCs show a network pool error, and you must create a different type of network pool and
associate it with the Provider VDC. For details about configuring VXLAN support, see the NSX
Administration Guide.
5 (Optional) If you want Edge Gateways in the system to provide distributed routing, set up an
NSX Controller cluster.
Install and Configure NSX-T Data Center for VMware Cloud Director
If you plan your VMware Cloud Director installation to use network resources from NSX-T Data
Center, you must install and configure NSX-T Data Center.
Important To configure the NSX-T Data Center objects and tools, use the simplified policy UI and
the policy APIs that correspond to the simplified UI. For more information, see the overview of
NSX-T Manager in the NSX-T Data Center Administration Guide.
For the most recent information about compatibility between VMware Cloud Director and other
VMware products, see VMware Product Interoperability Matrices.
For information about the network requirements, see Network Configuration Requirements for
VMware Cloud Director.
This procedure applies only when you are performing a new installation of VMware Cloud
Director. If you are upgrading an existing installation of VMware Cloud Director, see Upgrading
VMware Cloud Director on Linux.
Prerequisites
Procedure
For more information on NSX-T Manager deployment, see the NSX-T Data Center Installation
Guide.
2 Create transport zones based on your networking requirements.
For more information on transport zones creation, see the NSX-T Data Center Installation
Guide.
Note
For more information on NSX Edge creation, see the NSX-T Data Center Installation Guide.
For more information on configuring a managed host transportation node, see the NSX-T Data
Center Installation Guide.
5 Create a tier-0 gateway.
For more information on tier-0 creation, see the NSX-T Data Center Administration Guide.
What to do next
For information about registering an NSX-T Manager instance, see the VMware Cloud Director
Service Provider Admin Portal Guide.
2 Create a network pool backed by an NSX-T Data Center transport zone.
For more information on creating a network pool that is backed by an NSX-T Data Center
transport zone, see the VMware Cloud Director Service Provider Admin Portal Guide.
For more information on adding an external network that is backed by an NSX-T Data Center
tier-0 logical router, see the VMware Cloud Director Service Provider Admin Portal Guide.
This procedure applies to new installations only. If you are upgrading an existing VMware Cloud
Director installation, see Upgrading VMware Cloud Director on Linux.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Prerequisites
n Verify that the target servers for your server group meet the Chapter 2 VMware Cloud Director
Hardware and Software Requirements.
n Verify that you created an SSL certificate for each endpoint of the target servers for your
server group. All directories in the pathname to the SSL certificates must be readable by any
user. Using the same certificate and key paths on all members of a server group simplifies
the installation process, for example /tmp/cert.pem and /tmp/cert.key. See Before You
Create SSL Certificates for VMware Cloud Director on Linux.
n Verify that you prepared an NFS or other shared storage volume that is accessible to all target
servers for your VMware Cloud Director server group. See Preparing the Transfer Server
Storage for VMware Cloud Director on Linux.
n Verify that you created a VMware Cloud Director database that is accessible to all servers in
the group. See Configure an External PostgreSQL Database for VMware Cloud Director on
Linux. Verify that the database service starts when you reboot the database server.
n Verify that all VMware Cloud Director servers, the database server, all vCenter Server systems,
and the associated NSX Manager instances can resolve each host name in the environment as
described in Network Configuration Requirements for VMware Cloud Director.
n Verify that all VMware Cloud Director servers and the database server are synchronized to
a network time server with the tolerances noted in Network Configuration Requirements for
VMware Cloud Director.
n If you plan to import users or groups from an LDAP service, verify that the service is accessible
to each VMware Cloud Director server.
n Open firewall ports as shown in Network Security Requirements. Port 443 must be open
between VMware Cloud Director and vCenter Server systems.
Procedure
2 SSL Certificate Creation and Management for VMware Cloud Director on Linux
VMware Cloud Director uses SSL to secure communications between clients and servers.
Each VMware Cloud Director server must support two different SSL endpoints, one for
HTTPS and one for console proxy communications.
What to do next
Use the system-setup command of the cell management tool to initialize the server group's
database with a system administrator account and related information. See Configure a VMware
Cloud Director Installation .
VMware Cloud Director for Linux is distributed as a digitally signed executable file with a
name of the form vmware-vcloud-director-distribution-v.v.v-nnnnnn.bin, where v.v.v
represents the product version and nnnnnn the build number. For example: vmware-vcloud-
director-distribution-8.10.0-3698331.bin. Running this executable installs or upgrades
VMware Cloud Director.
The VMware Cloud Director installer verifies that the target server meets all platform prerequisites
and installs VMware Cloud Director software on it.
Prerequisites
n Verify that you have superuser credentials for the target server.
n If you want the installer to verify the digital signature of the installation file, download and
install the VMware public key on the target server. If you already verified the digital signature
of the installation file, you do not need to verify it again during installation. See Download and
Install the VMware Public Key.
Procedure
If you purchased the software on media, copy the installation file to a location that is accessible
to the target server.
3 Verify that the checksum of the download matches the checksum posted on the download
page.
Values for MD5 and SHA1 checksums are posted on the download page. Use the appropriate
tool to verify that the checksum of the downloaded installation file matches the checksum
shown on the download page. A Linux command of the following form displays the checksum
for installation-file.
The command returns the installation file checksum that must match the MD5 checksum from
the download page.
The installation file requires execute permission. To be sure that it has this permission, open
a console, shell, or terminal window and run the following Linux command, where installation-
file is the full pathname to the VMware Cloud Director installation file.
To run the installation file, enter the full pathname, for example:
Note You cannot run the installation file from a directory whose pathname includes any
embedded space characters.
If you did not install the VMware public key on the target server, the installer prints a warning
of the following form:
When the installation finishes, the installer prompts you to run the configuration script, which
configures the network and database connections.
a To run the configuration script in an interactive mode, enter y and press Enter.
b To run the configuration script later in an interactive or unattended mode, enter n and
press Enter.
The endpoints can be separate IP addresses or a single IP address with two different ports. Each
endpoint requires its own SSL certificate. You can use the same certificate for both endpoints, for
example, by using a wildcard certificate.
Before You Create SSL Certificates for VMware Cloud Director on Linux
When you install VMware Cloud Director for Linux, you must create certificates for each member
of the server group and import the certificates into host truststores.
Note You must create the certificates for the server group members only after installing VMware
Cloud Director on Linux. The VMware Cloud Director appliance creates self-signed SSL certificates
during its first boot.
Procedure
3 For each IP address, run the following command to retrieve the fully qualified domain name
(FQDN) to which the IP address is bound.
nslookup ip-address
4 Make a note of each IP address and the FQDN associated with it. If you are not using a single
IP address for both services, decide which IP address is for the HTTPS service and which is for
the console proxy service.
You must provide the FQDNs when you create the certificates and the IP addresses when you
configure the network and database connections. Make a note of any other FQDNs that can
reach the IP address, because you must provide them if you want the certificate to include a
Subject Alternative Name.
What to do next
Create the certificates for the two endpoints. You can use certificates signed by a trusted
certification authority (CA) or self-signed certificates.
n For information on creating and importing CA-signed SSL certificates, see Create and Import
CA-Signed SSL Certificates for VMware Cloud Director on Linux.
n For information on creating self-signed SSL certificates, see Create Self-Signed SSL
Certificates for VMware Cloud Director on Linux.
n For information on importing your own private key and CA-signed certificate files, see Import
Private Keys and CA-Signed SSL Certificates.
Each VMware Cloud Director server requires SSL certificates for the HTTPS service and for the
console proxy service.
You use the cell-management-tool to create the self-signed SSL certificates. The cell-
management-tool utility is installed on the cell before the configuration agent runs and after you
run the installation file. See Install VMware Cloud Director on the First Member of a Server Group.
Important These examples specify a 2048-bit key size, but you should evaluate your installation's
security requirements before choosing an appropriate key size. Key sizes less than 1024 bits are no
longer supported per NIST Special Publication 800-131A.
Procedure
1 Log in directly or by using an SSH client to the OS of the VMware Cloud Director server as
root.
The command creates the certificate cert.pem that has the private key cert.key and the
password passwd. The cell-management-tool creates the certificates by using the default
values of the command. Depending on the DNS configuration of your environment, the Issuer
CN is set to either the IP address or the FQDN for each service. The certificate uses the default
2048-bit key length and expires one year after creation.
Important The certificate file, private key file, and the directory in which they are stored must
be readable by the user vcloud.vcloud. The VMware Cloud Director installer creates this user
and group.
What to do next
Make note of the certificate and private key path names. You need these path names when you
run the configuration script to create the network and database connections for the VMware Cloud
Director cell. See Configure the Network and Database Connections.
Create and Import CA-Signed SSL Certificates for VMware Cloud Director on
Linux
Creating and importing CA-signed certificates provides the highest level of trust for SSL
communications and helps you secure the connections within your cloud infrastructure.
Each VMware Cloud Director server must support two different SSL endpoints, one for HTTPS and
one for console proxy communications.
Important If you are using separate IP addresses for the HTTPS service and for the console proxy
service, you must complete this procedure once for the IP address for the HTTPS service and
again for the IP address for the console proxy service.
The two endpoints can be separate IP addresses or a single IP address with two different ports.
You can use the same certificate for both endpoints, for example, by using a wildcard certificate.
Certificates for both endpoints must include an X.500 distinguished name and X.509 Subject
Alternative Name extension.
You can use certificates signed by a trusted certificate authority(CA) or self-signed certificates.
You use the cell-management-tool to create the self-signed SSL certificates. The cell-
management-tool utility is installed on the cell before the configuration agent runs and after you
run the installation file. See Install VMware Cloud Director on the First Member of a Server Group.
Important These examples specify a 2048-bit key size, but you should evaluate your installation's
security requirements before choosing an appropriate key size. Key sizes less than 1024 bits are no
longer supported per NIST Special Publication 800-131A.
Prerequisites
n For more details on the available options for the generate-certs command, see Generating
Self-Signed Certificates for the HTTPS and Console Proxy Endpoints.
n For more details on the available options for the certificates command, see Replacing
Certificates for the HTTPS and Console Proxy Endpoints.
Procedure
1 Log in directly or by using an SSH client to the OS of the VMware Cloud Director server cell as
root.
n If you have your own private key and CA-signed certificate files, skip to Step 6.
n If you want to generate new certificates with custom options, such as a greater key size,
continue to Step 3.
3 Run the command to create a public and private key pair for the HTTPS service and for the
console proxy service.
The command creates or overwrites a certificate file at cert.pem and the private key file at
cert.key with the specified password. Certificates are created using the command's default
values. Depending on the DNS configuration of your environment, the Issuer CN is set to
either the IP address or the FQDN for each service. The certificate uses the default 2048-bit
key length and expires one year after creation.
Important The certificate file, private key file, and the directory in which they are stored must
be readable by the user vcloud.vcloud. The VMware Cloud Director and the directory in which
it is stored must be readable by the user vcloud.vcloud. The VMware Cloud Director installer
creates this user and group.
openssl req -new -key cert.key -reqexts SAN -config <(cat /etc/ssl/openssl.cnf <(printf
"\n[SAN]\nsubjectAltName=DNS:vcd2.example.com,DNS:vcd2,IP:10.100.101.10\n")) -out cert.csr
If your certification authority requires you to specify a Web server type, use Jakarta Tomcat.
6 Run the command to append the root CA-signed certificate and any intermediate certificates
to the certificate you generated in Step 2.
7 Repeat this procedure on all VMware Cloud Director servers in the server group.
What to do next
n If you have not yet configured your VMware Cloud Director instance, run the configure script
to import the certificates to VMware Cloud Director. See Configure the Network and Database
Connections.
Note If you created the cert.pem or cert.key certificate files on a computer other than the
server on which you generated the list of fully qualified domain names and their associated IP
addresses, copy the cert.pem and cert.key files to that server now. You need the certificate
and private key path names when you run the configuration script.
n If you have already installed and configured your VMware Cloud Director instance, use the
certificates command of the cell management tool to import the certificates. See Replacing
Certificates for the HTTPS and Console Proxy Endpoints.
All members of the VMware Cloud Director server group share database connection and
other configuration details. When you run the configuration script on the first member of the
VMware Cloud Director server group, the script creates a response file that preserves database
connections information for use in subsequent server installations.
You can run the configuration script in either an interactive mode or an unattended mode. For an
interactive configuration, you run the command without options and the script prompts you for the
required setup information. For an unattended configuration, you provide the setup information
by using the command options.
If you want to use a single IP address with two different ports for the HTTPS service and the
console proxy service, you must run the configuration script in an unattended mode.
Note The cell management tool includes subcommands that you can use to change the network
and database connection details that you initially configured. Changes you make using these
subcommands are written to the global configuration file and the response file. For information
about using the cell management tool, see Chapter 5 Cell Management Tool Reference.
Prerequisites
n For an unattended configuration, verify that the value of the environment variable VCLOUD_HOME
is set to the full pathname of the directory in which VMware Cloud Director is installed. This
value is typically /opt/vmware/vcloud-director.
Procedure
n For an interactive mode, run the command and, on the prompts, provide the required
information.
/opt/vmware/vcloud-director/bin/configure
n For an unattended mode, run the command with appropriate options and arguments.
b Displays a URL at which you can connect to the VMware Cloud Director Setup wizard after
the VMware Cloud Director service starts.
3 (Optional) Take a note of the VMware Cloud Director Setup wizard URL and enter y to start
the VMware Cloud Director service.
You can decide to start the service later by running the service vmware-vcd start
command.
Results
Database connection information and other reusable information that you supplied during
the configuration are preserved in the response file at /opt/vmware/vcloud-director/etc/
responses.properties on this server. This file contains sensitive information that you must
reuse when you add servers to a server group.
What to do next
Save a copy of the response file at a secure location. Restrict access to it, and make sure it is
backed up to a secure location. When you back up the file, avoid sending clear texts across a
public network.
If you plan to add servers to the server group, mount the shared transfer storage at /opt/
vmware/vcloud-director/data/transfer.
Table 4-1. Required Information During an Interactive Network and Database Configuration
IP address for the HTTPS service Defaults to the first available IP address.
IP address for the console proxy service Defaults to the first available IP address.
Full path to the HTTPS SSL certificate file For example, /tmp/http.pem..
Full path to the HTTPS SSL private key file For example, /tmp/http.key.
Password for the HTTPS SSL private key See Before You Create SSL Certificates for
VMware Cloud Director on Linux.
Full path to the console proxy SSL certificate file For example, /tmp/consoleproxy.pem.
Full path to the console proxy SSL private key file For example, /tmp/consoleproxy.key.
Password for the console proxy SSL private key See Before You Create SSL Certificates for
VMware Cloud Director on Linux.
Enable remote audit logging to a syslog host Services in each VMware Cloud Director cell log
audit messages to the VMware Cloud Director
database, where they are preserved for 90 days.
To preserve audit messages longer, you can
configure VMware Cloud Director services to
send audit messages to the syslog utility in
addition to the VMware Cloud Director database.
n To skip, press Enter.
n To enable, enter the syslog host name or IP
address.
If you enabled remote audit logging, UDP port of the syslog host Defaults to 514.
Host name or IP address of the database server The server running the database.
Table 4-1. Required Information During an Interactive Network and Database Configuration
(continued)
Join or do not participate in the VMware Customer Experience This product participates in VMware’s Customer
Improvement Program (CEIP) Experience Improvement Program (“CEIP”).
Details regarding the data collected through CEIP
and the purposes for which it is used by VMware
are set forth in the Trust & Assurance Center at
http://www.vmware.com/trustvmware/ceip.html.
You can use the cell management tool to join or
leave VMware's CEIP for this product at any time.
See Chapter 5 Cell Management Tool Reference.
To join the program, enter y.
If you prefer not to join the VMware's CEIP
program, enter n.
--console-proxy-ip (-cons) IPv4 address, with The system uses this address
optional port number for the VMware Cloud Director
console proxy service. For
example, 10.17.118.159.
--primary-ip (-ip) IPv4 address, with The system uses this address for
optional port number the VMware Cloud Director Web
interface service. For example,
10.17.118.159.
--syslog-port (-logport) Integer in the range 0 The port on which the syslog
- 65535 process monitors the specified
server. Defaults to 514 if not
specified.
--key-password SSL private key SSL private key password for the
password for the HTTP certificate
HTTP certificate
Important The cell management tool includes subcommands that you can use to make
changes in the network and database connection details that you initially specified. Changes
you make using these tools are written to the global configuration file and the response file, so
you must be sure to have the response file in place (in /opt/vmware/vcloud-director/etc/
responses.properties) and writable before you use any of the commands that can modify it.
Procedure
Save a copy of the file at a secure location. Restrict access to it, and make sure it is backed
up to a secure location. When you back up the file, avoid sending clear text across a public
network.
a Copy the file to a location accessible to the server you are ready to configure.
Note You must install VMware Cloud Director software on a server before you can reuse
the response file to configure it. All directories in the pathname to the response file must
be readable by the user vcloud.vcloud, as shown in this example.
b Run the configuration script, using the -r option and specifying the response file
pathname.
What to do next
After you configure the additional servers, delete the copy of the response file you used to
configure them.
Important Mixed VMware Cloud Director installations on Linux and VMware Cloud Director
appliance deployments in one server group are unsupported.
Prerequisites
n Verify that you can access the response file that was created when you configured the first
member of this server group. See Configure the Network and Database Connections.
n Verify that you mounted the shared transfer storage on the first member of the VMware Cloud
Director server group at /opt/vmware/vcloud-director/data/transfer.
Procedure
If you purchased the software on media, copy the installation file to a location that is accessible
to the target server.
The installation file requires execute permission. To be sure that it has this permission, open
a console, shell, or terminal window and run the following Linux command, where installation-
file is the full pathname to the VMware Cloud Director installation file.
To run the installation file, enter the full pathname, for example:
Note You cannot run the installation file from a directory whose pathname includes any
embedded space characters.
If you did not install the VMware public key on the target server, the installer prints a warning
of the following form:
When the installation finishes, the installer prompts you to run the configuration script, which
configures the network and database connections.
You run the configuration script later by providing the response file as input.
All VMware Cloud Director servers in the server group must mount this volume at the same
mountpoint.
All directories in the pathname to the response file must be readable by root.
/opt/vmware/vcloud-director/bin/configure -r /responses.properties
The script copies the response file to a location readable by vcloud.vcloud and runs the
configuration script using the response file as input.
b On the prompts, provide the IP addresses for the HTTP and the console proxy services.
c If the configuration script does not find valid certificates in the pathname saved in
the response file, when prompted, provide the pathname to the certificates and the
passwords.
The script validates the information, connects the server to the database, and offers to start
the VMware Cloud Director cell.
You can decide to start the service later by running the service vmware-vcd start
command.
What to do next
When the VMware Cloud Director services are running on all servers, you must initialize the
VMware Cloud Director database with a license key, system administrator account, and related
information. You can initialize the database by using the cell management tool with the system-
setup subcommand. See Configure a VMware Cloud Director Installation .
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Prerequisites
Verify that you are logged in as a system administrator. Only a system administrator can
customize the public endpoints.
Procedure
1 From the top navigation bar of the Service Provider Admin Portal, select Administration.
4 To customize the VMware Cloud Director URLs, edit the Web Portal endpoints.
a Enter a custom VMware Cloud Director public URL for HTTP (non-secure) connections.
b Enter a custom VMware Cloud Director public URL for HTTPS (secure) connections and
click Upload to upload the certificates that establish the trust chain for that endpoint.
The certificate chain must match the certificate used by the service endpoint, which is the
console proxy certificate uploaded to each VMware Cloud Director cell. SSL termination of
console proxy connections at a load balancer is not supported. The certificate chain must
include an endpoint certificate, intermediate certificates, and a root certificate in the PEM
format without a private key.
5 (Optional) To customize the Cloud Director REST API and OpenAPI URLs, turn off the Use
Web Portal Settings toggle.
For example, if you set the HTTP base URL to http://vcloud.example.com, you
can access the VMware Cloud Director API at http://vcloud.example.com/api, and
you can access the VMware Cloud Director OpenAPI at http://vcloud.example.com/
cloudapi.
b Enter a custom HTTPS REST API base URL and click Upload to upload the certificates that
establish the trust chain for that endpoint.
For example, if you set the HTTPS REST API base URL to https://
vcloud.example.com, you can access the VMware Cloud Director API at https://
vcloud.example.com/api, and you can access the VMware Cloud Director OpenAPI at
https://vcloud.example.com/cloudapi.
The certificate chain must match the certificate used by the service endpoint, which is
either the HTTP certificate uploaded to each VMware Cloud Director cell or the load
balancer VIP certificate if an SSL termination is used. The certificate chain must include
an endpoint certificate, intermediate certificates, and a root certificate in the PEM format
without a private key.
This address is the fully qualified domain name (FQDN) of the VMware Cloud Director server
or load-balancer with the port number. The default port is 443.
Important The VMware Cloud Director appliance uses its eth0 NIC with custom port 8443 for
the console proxy service.
For example, for a VMware Cloud Director appliance instance with FQDN
vcloud.example.com, enter vcloud.example.com:8443.
VMware Cloud Director uses the console proxy address when opening a remote console
window on a VM.
Cassandra is an open-source database that you can use to provide the backing store for a
scalable, high-performance solution for collecting time series data like virtual machine metrics. If
you want VMware Cloud Director to support retrieval of historic metrics from virtual machines, you
must install and configure a Cassandra cluster, and use the cell-management-tool to connect
the cluster to VMware Cloud Director. Retrieval of current metrics does not require optional
database software.
Prerequisites
n Verify that VMware Cloud Director is installed and running before you configure the optional
database software.
n If you are not already familiar with Cassandra, review the material at http://
cassandra.apache.org/.
n See the VMware Cloud Director Release Notes for a list of Cassandra releases supported for
use as a metrics database. You can download Cassandra from http://cassandra.apache.org/
download/.
n The Cassandra cluster must include least four virtual machines deployed on two or more
hosts.
n Enable Java Native Access (JNA) version 3.2.7 or later on each Cassandra cluster.
n Use of SSL with Cassandra is optional. If you decide not to enable SSL for Cassandra, you
must set the configuration parameter cassandra.use.ssl to 0 in the global.properties
file on each cell ($VCLOUD_HOME/etc/global.properties)
Procedure
In the following example command, node1-ip, node2-ip, node3-ip, and node4-ip are the IP
address of the members of the Cassandra cluster. The default port (9042) is used. Metrics data
is retained for 15 days.
For information about using the cell management tool, see Chapter 5 Cell Management Tool
Reference.
2 (Optional) If you are upgrading VMware Cloud Director from version 9.1, use the cell-
management-tool to configure the metrics database to store rolled-up metrics.
The most secure connections require a well-signed SSL certificate, which includes a complete trust
chain rooted in a well-known public certificate authority. Alternatively, you can use a self-signed
SSL certificate or an SSL certificate that is signed by a private certificate authority, but you must
import that certificate to the VMware Cloud Director truststore.
To obtain optimal performance for your system specification and requirements, you can adjust the
database configurations and autovacuum parameters in the database configuration file.
Procedure
1 Configure SSL connections between VMware Cloud Director and the PostgreSQL database.
a If you used a self-signed or private certificate for the external PostgreSQL database, from
each VMware Cloud Director cell, run the command to import the database certificate to
the VMware Cloud Director truststore.
b Run the command to enable SSL connections between VMware Cloud Director and
PostgreSQL.
You can run the command against all cells in the server group by using the --private-key-
path option.
For more information about using the cell management tool, see Chapter 5 Cell Management
Tool Reference.
2 Edit the database configurations in the postgresql.conf file for your system specification.
For example, for a system with 16 GB of memory, you can use the following fragment.
max_connections = 500
# Set effective cache size to 50% of total memory.
effective_cache_size = 8GB
# Set shared buffers to 25% of total memory
shared_buffers = 4GB
3 Edit the autovacuum parameters in the postgresql.conf file for your requirements.
For typical VMware Cloud Director workloads, you can use the following fragment.
autovacuum = on
track_counts = on
autovacuum_max_workers = 3
autovacuum_naptime = 1min
autovacuum_vacuum_cost_limit = 2400
The system sets a custom autovacuum_vacuum_scale_factor value for the activity and the
activity_parameters tables.
What to do next
If you edited the postgresql.conf file, you must restart the database.
The Advanced Message Queuing Protocol (AMQP), is an open standard for message queuing that
supports flexible messaging for enterprise systems. VMware Cloud Director uses the RabbitMQ
AMQP broker to provide the message bus used by extension services, object extensions, and
notifications.
For VMware Cloud Director, using an MQTT client can be an alternative to the RabbitMQ AMQP
Broker when configuring notifications. See Subscribe to Events, Tasks, and Metrics by Using an
MQTT Client.
Procedure
See the VMware Cloud Director Release Notes for the list of supported RabbitMQ releases.
2 Follow the RabbitMQ installation instructions and install RabbitMQ on a supported host.
The RabbitMQ server host must be reachable on the network by each VMware Cloud Director
cell.
3 During the RabbitMQ installation, make a note of the values that are required for configuring
VMware Cloud Director to work with this RabbitMQ installation.
n The fully qualified domain name of the RabbitMQ server host, for example,
amqp.example.com.
n A user name and password that are valid for authenticating with RabbitMQ.
n The port at which the broker listens for messages. The default is 5672 for non-SSL. The
default port for SSL/TLS is 5671.
What to do next
By default, the VMware Cloud Director AMQP service sends unencrypted messages. You can
configure the AMQP service to encrypt these messages by using SSL. You can also configure the
service to verify the broker certificate by using the default JCEKS trust store of the Java runtime
environment on the VMware Cloud Director cell, typically at $VCLOUD_HOME/jre/lib/security/
cacerts.
To enable SSL with the VMware Cloud Director AMQP service, see the Configure an AMQP Broker
information in the VMware Cloud Director Service Provider Admin Portal Guide.
MQTT is a lightweight, binary, messaging transport protocol. VMware Cloud Director uses MQTT
to publish information about events and tasks to which you can subscribe by using an MQTT client.
MQTT messages pass through an MQTT broker which can also store messages in case the clients
are not online.
Starting with VMware Cloud Director 10.2.2, you can use an MQTT client to subscribe to metrics.
Prerequisites
n If you want to subscribe to metrics, configure the metrics collection and enable metrics
publishing. See Configure Metrics Collection and Publishing.
Procedure
You receive the JWT token from the standard login request to VMware Cloud Director. You
can leave the user name and password empty.
Sec-WebSocket-Protocol: mqtt
3 Once the connection is established successfully, subscribe to topics through the MQTT client.
publish/{user_org_id}/{user_id}
publish/debd63a0-6eae-11ea-8c7b-0050561776be/d19fd8ff-6eae-11ea-bb42-0050561776c8
publish/{user_org_id}/+
publish/#
metrics/{org_id}/{vApp_id}
Depending on predefined criteria for the CPU and memory use, tenants can use VMware Cloud
Director to automatically scale up or down the number of VMs in a selected scale group. To allow
tenants to auto scale applications, you must configure, publish, and grant access to the auto scale
solution.
To balance the load of the servers that you configure to run the same application, you can use
VMware NSX Advanced Load Balancer (Avi Networks).
For multi-cell environments, you can run the commands on a single cell. VMware Cloud Director
stores the configuration in the database which all other cells can use.
1 Log in directly or by using an SSH client to the OS of any of the cells in the cluster as root.
2 To enable metric data collection, choose between collecting data with or without metrics data
persistence.
n To collect metrics with metrics data persistence, set up the metrics collection in a
Cassandra database. See Install and Configure a Cassandra Database for Storing Historic
Metric Data.
n To collect metrics data without data persistence, run the following commands:
$VCLOUD_HOME/bin/cell-management-tool manage-config -n
statsFeeder.metrics.collect.only -v true
$VCLOUD_HOME/bin/cell-management-tool manage-config -n
statsFeeder.metrics.publishing.enabled -v true
4 Create a metrics.groovy file in the /tmp folder with the following contents.
configuration {
metric("cpu.ready.summation") {
currentInterval=20
historicInterval=20
entity="VM"
instance=""
minReportingInterval=300
aggregator="AVERAGE"
}
}
6 If you configured Cassandra in step 2, update the Cassandra schema by providing the correct
nodes addresses, database authentication details, port and metrics time to live in days.
b To configure the auto scale function, use the user name from step 7a.
When running the command from the terminal, escape any special characters using the
backslash (\) sign.
8 If your environment is for development or testing purposes and you run the cell with self-
signed certificates, run the following command.
Prerequisites
Procedure
2 In the left panel, under Tenant Access Control, select Rights Bundles.
3 Verify that there are no Legacy Rights Bundles for the tenant organizations to which you want
to grant access to auto scaling.
n If you want to publish the bundle to all existing and newly created organizations in your
system, select Publish to All Tenants.
n If you want to publish the bundle to particular organizations in your system, select the
organizations individually.
6 Click Save.
What to do next
Add the necessary VMWARE:SCALEGROUP rights to the tenant roles that you want to use scale
groups. See View and Edit a Global Tenant Role in the VMware Cloud Director Service Provider
Admin Portal Guide.
If your existing VMware Cloud Director server group consists of VMware Cloud Director
installations on Linux, you can use the VMware Cloud Director installer for Linux to upgrade your
environment.
For VMware Cloud Director installations on Linux, you can either perform an orchestrated
upgrade, or manually upgrade VMware Cloud Director. See Perform an Orchestrated Upgrade of
a VMware Cloud Director Installation or Manually Upgrade a VMware Cloud Director Installation.
With the orchestrated upgrade, you run a single command which upgrades all cells in the server
group and the database. With the manual upgrade, you upgrade each cell and the database in a
sequence.
Starting with version 10.3, VMware Cloud Director no longer allows administrator and tenant
LDAP servers to bypass SSL certificate validation. Before you upgrade VMware Cloud Director,
you must test your connection. If any of the organizations have these invalid configurations, for
each one, you must turn off the Accept all certificates setting for the LDAP server and import
the certificates in the LDAP settings UI.
In recent releases, when you update the LDAP settings to turn off the Accept all certificates
setting, a trust on first use dialog box automates the import of the certificate for the LDAP
server of an organization. However, in earlier releases, it is a two-step process of turning the
Accept all certificates setting off, and then, using the UI to upload the certificate of the LDAP
server.
n Oracle databases are unsupported. If your existing VMware Cloud Director installation uses an
Oracle database, see the Upgrade Paths and Workflows table.
n Enabling and disabling ESXi hosts is unsupported. Before starting the upgrade, you must
enable all ESXi hosts. You can place the ESXi hosts in maintenance mode by using the vSphere
Client.
n VMware Cloud Director uses Java with an improved LDAP support. If you are using an LDAPS
server, to avoid LDAP login failures, you must verify that you have a properly constructed
certificate. For information, see the Java 8 Release Changes at https://www.java.com.
Starting with VMware Cloud Director 10.0, Microsoft SQL Server databases are unsupported.
When you are upgrading VMware Cloud Director, the new version must be compatible with the
following components of your existing installation:
n The database software you are currently using for the VMware Cloud Director database. For
more information, see the Upgrade and Migration Paths table.
n Any third-party components that directly interact with VMware Cloud Director.
For information about the compatibility of VMware Cloud Director with other VMware products
and with third-party databases, refer to the VMware Product Interoperability Matrices at http://
partnerweb.vmware.com/comp_guide/sim/interop_matrix.php. If you plan to upgrade your
vSphere or NSX components as part of the VMware Cloud Director upgrade, you must upgrade
them after the upgrade of VMware Cloud Director. See After You Upgrade VMware Cloud
Director.
After you upgrade at least one VMware Cloud Director server, you can upgrade the VMware
Cloud Director database. The database stores information about the runtime state of the server,
including the state of all VMware Cloud Director tasks it is running. To ensure that no invalid task
information remains in the database after an upgrade, you must verify that no tasks are active on
any server before you begin the upgrade.
The upgrade also preserves the following artifacts, which are not stored in the VMware Cloud
Director database:
n Local and global properties files are copied to the new installation.
n Microsoft Sysprep files used for the guest customization support are copied to the new
installation.
The upgrade requires sufficient VMware Cloud Director downtime to upgrade all servers in the
server group and the database. If you are using a load balancer, you can configure it to a return a
message, for example, The system is offline for upgrade.
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Important After upgrading to version 10.1 and later, VMware Cloud Director always verifies
certificates for any infrastructure endpoints connected to it. This is due to a change in the way
VMware Cloud Director manages SSL certificates. If you do not import your certificates into
VMware Cloud Director before the upgrade, the vCenter Server and NSX connections might show
failed connection errors due to SSL verification issues. In this case, after upgrading, you have two
options:
1 Run the cell management tool trust-infra-certs command to import automatically all
certificates into the centralized certificate store. See Import Endpoints Certificates from
vSphere Resources.
2 In the Service Provider Admin Portal UI, select each vCenter Server and NSX instance, and
reenter the credentials while accepting the certificate.
VMware Cloud Director 9.0 and 9.1 with an external Oracle 1 For VMware Cloud Director 9.0 on Linux, upgrade
database VMware Cloud Director to version 9.1. See Upgrading
vCloud Director.
2 Migrate the Oracle database to a PostgreSQL
database. See Migrate to a PostgreSQL Database.
3 Upgrade your environment to VMware Cloud Director
10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
Target environment
VMware Cloud Director 9.0, 9.1, and 9.5 on Linux with an Upgrade your environment to VMware Cloud Director 10.3
external PostgreSQL database on Linux. See Perform an Orchestrated Upgrade of a
VMware Cloud Director Installation or Manually Upgrade
a VMware Cloud Director Installation.
VMware Cloud Director 9.0, 9.1, and 9.5 on Linux with an 1 Upgrade your environment to VMware Cloud Director
external Microsoft SQL Server database 9.7 on Linux. See Upgrading vCloud Director.
2 Migrate the Microsoft SQL Server database to a
PostgreSQL database. See Migrate to PostgreSQL
database.
3 Upgrade your environment to VMware Cloud Director
10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
VMware Cloud Director 9.7 on Linux with an external 1 Migrate the Microsoft SQL Server database to a
Microsoft SQL Server database PostgreSQL database. See Migrate to PostgreSQL
database.
2 Upgrade your environment to VMware Cloud Director
10.3 on Linux. See Perform an Orchestrated Upgrade
of a VMware Cloud Director Installation or Manually
Upgrade a VMware Cloud Director Installation.
VMware Cloud Director 9.7, 10.0, 10.1, or 10.2 on Linux Upgrade your environment to VMware Cloud Director 10.3
with an external PostgreSQL database on Linux. See Perform an Orchestrated Upgrade of a
VMware Cloud Director Installation or Manually Upgrade
a VMware Cloud Director Installation.
VMware Cloud Director appliance 9.7, 10.0, 10.1, or 10.2 Not supported
with an embedded PostgreSQL database
You can use the VMware Cloud Director installer for Linux to upgrade a VMware Cloud Director
server group that consists of VMware Cloud Director installations on a supported Linux OS. If
your VMware Cloud Director server group consists of VMware Cloud Director 9.5 appliances
deployments, you use the VMware Cloud Director installer for Linux to upgrade your existing
environment only as part of the migration workflow. See Upgrading and Migrating the VMware
Cloud Director Appliance.
VMware Cloud Director for Linux is distributed as a digitally signed executable file with a
name of the form vmware-vcloud-director-distribution-v.v.v-nnnnnn.bin, where v.v.v
represents the product version and nnnnnn the build number. For example: vmware-vcloud-
director-distribution-8.10.0-3698331.bin. Running this executable installs or upgrades
VMware Cloud Director.
When you run the VMware Cloud Director installer with the --private-key-path option, you
can add other command options of the upgrade utility, for example, --maintenance-cell. For
information about the database upgrade utility options, see Database Upgrade Utility Reference.
Prerequisites
n Verify that your VMware Cloud Director database, the vSphere components, and the NSX
components are compatible with the new version of VMware Cloud Director.
Important If your existing VMware Cloud Director installation uses an Oracle database or a
Microsoft SQL Server database, verify that you migrated to a PostgreSQL database before the
upgrade. For the possible upgrade paths, see Upgrading VMware Cloud Director on Linux.
n Verify that you have superuser credentials for the target server.
n If you want the installer to verify the digital signature of the installation file, download and
install the VMware public key on the target server. If you already verified the digital signature
of the installation file, you do not need to verify it again during installation. See Download and
Install the VMware Public Key.
n Verify that you have a valid license key to use the version of the VMware Cloud Director
software to which you are upgrading.
n Verify that all cells permit SSH connections from the superuser without a password. To
perform a verification, you can run the following Linux command:
This example sets your identity to vcloud, then makes an SSH connection to the cell at cell-ip
as root but does not supply the root password. If the private key in private-key-path on the
local cell is readable by user vcloud.vcloud and the corresponding public key is present in the
authorized-keys file for the root user at cell-ip the command succeeds.
Note The vcloud user, vcloud group, and vcloud.vcloud account are created by the VMware
Cloud Director installer for use as an identity with which VMware Cloud Director processes
run. The vcloud user has no password.
n Verify that you all ESXi hosts are enabled. Starting with VMware Cloud Director 9.5, disabled
ESXi hosts are unsupported.
n Verify that all servers in the server group can access the shared transfer server storage. See
Preparing the Transfer Server Storage for VMware Cloud Director on Linux.
n Starting with version 10.3, VMware Cloud Director no longer allows administrator and tenant
LDAP servers to bypass SSL certificate validation. Before you upgrade VMware Cloud
Director, you must test your connection. If any of the organizations have these invalid
configurations, for each one, you must turn off the Accept all certificates setting for the
LDAP server and import the certificates in the LDAP settings UI.
In recent releases, when you update the LDAP settings to turn off the
Accept all certificates setting, a trust on first use dialog box automates the import of the
certificate for the LDAP server of an organization. However, in earlier releases, it is a two-step
process of turning the Accept all certificates setting off, and then, using the UI to upload
the certificate of the LDAP server.
n If your VMware Cloud Director installation uses an LDAPS server, to avoid LDAP login failures
after the upgrade, verify that you have a properly constructed certificate for Java 8 Update 181.
For information, see the Java 8 Release Changes at https://www.java.com.
Procedure
If you purchased the software on media, copy the installation file to a location that is accessible
to the target server.
3 Verify that the checksum of the download matches the checksum posted on the download
page.
Values for MD5 and SHA1 checksums are posted on the download page. Use the appropriate
tool to verify that the checksum of the downloaded installation file matches the checksum
shown on the download page. A Linux command of the following form displays the checksum
for installation-file.
The command returns the installation file checksum that must match the MD5 checksum from
the download page.
The installation file requires execute permission. To be sure that it has this permission, open
a console, shell, or terminal window and run the following Linux command, where installation-
file is the full pathname to the VMware Cloud Director installation file.
5 In a console, shell, or terminal window, run the installation file with the --private-key-path
option and the pathname to the private key of the target cell.
You can add other command options of the database upgrade utility.
Note You cannot run the installation file from a directory whose pathname includes any
embedded space characters.
The installer detects an earlier version of VMware Cloud Director and prompts you to confirm
the upgrade.
If the installer detects a version of VMware Cloud Director that is equal to or later than the
version in the installation file, it displays an error message and exits.
Results
5 Upgrades VMware Cloud Director software on each of the remaining cells, then restarts
VMware Cloud Director services on the cell.
What to do next
1 Start the VMware Cloud Director services on all cells in the server group.
3 Upgrade Each NSX Manager That Is Associated with an Attached vCenter Server System
You can use the VMware Cloud Director installer for Linux to upgrade a VMware Cloud Director
server group that consists of VMware Cloud Director installations on a supported Linux OS. If
your VMware Cloud Director server group consists of VMware Cloud Director 9.5 appliances
deployments, you use the VMware Cloud Director installer for Linux to upgrade your existing
environment only as part of the migration workflow. See Upgrading and Migrating the VMware
Cloud Director Appliance.
For a multi-cell VMware Cloud Director installation, instead of manually upgrading each cell
and the database in a sequence, you can perform an orchestrated upgrade of the VMware
Cloud Director installation. See Perform an Orchestrated Upgrade of a VMware Cloud Director
Installation.
Prerequisites
n Verify that your VMware Cloud Director database, the vSphere components, and the NSX
components are compatible with the new version of VMware Cloud Director.
Important If your existing VMware Cloud Director installation uses an Oracle database or a
Microsoft SQL Server database, verify that you migrated to a PostgreSQL database before the
upgrade. For the possible upgrade paths, see Upgrading VMware Cloud Director on Linux.
n Verify that you have superuser credentials for the servers in your VMware Cloud Director
server group.
n If you want the installer to verify the digital signature of the installation file, download and
install the VMware public key on the target server. If you already verified the digital signature
of the installation file, you do not need to verify it again during installation. See Download and
Install the VMware Public Key.
n Verify that you have a valid license key to use the version of the VMware Cloud Director
software to which you are upgrading.
n Verify that you all ESXi hosts are enabled. Starting with VMware Cloud Director 9.5, disabled
ESXi hosts are unsupported.
n Starting with version 10.3, VMware Cloud Director no longer allows administrator and tenant
LDAP servers to bypass SSL certificate validation. Before you upgrade VMware Cloud
Director, you must test your connection. If any of the organizations have these invalid
configurations, for each one, you must turn off the Accept all certificates setting for the
LDAP server and import the certificates in the LDAP settings UI.
In recent releases, when you update the LDAP settings to turn off the
Accept all certificates setting, a trust on first use dialog box automates the import of the
certificate for the LDAP server of an organization. However, in earlier releases, it is a two-step
process of turning the Accept all certificates setting off, and then, using the UI to upload
the certificate of the LDAP server.
Procedure
What to do next
n After you upgraded all VMware Cloud Director servers in the server group and the database,
you can start the VMware Cloud Director services on all cells.
n Upgrade Each NSX Manager That Is Associated with an Attached vCenter Server System
n After upgrading each NSX Manager, you can upgrade the vCenter Server systems, hosts, and
NSX edges. See Upgrade vCenter Server Systems, ESXi Hosts, and NSX Edges .
VMware Cloud Director for Linux is distributed as a digitally signed executable file with a
name of the form vmware-vcloud-director-distribution-v.v.v-nnnnnn.bin, where v.v.v
represents the product version and nnnnnn the build number. For example: vmware-vcloud-
director-distribution-8.10.0-3698331.bin. Running this executable installs or upgrades
VMware Cloud Director.
For a multi-cell VMware Cloud Director installation, you must run the VMware Cloud Director
installer on each member of the VMware Cloud Director server group.
Procedure
If you purchased the software on media, copy the installation file to a location that is accessible
to the target server.
3 Verify that the checksum of the download matches the checksum posted on the download
page.
Values for MD5 and SHA1 checksums are posted on the download page. Use the appropriate
tool to verify that the checksum of the downloaded installation file matches the checksum
shown on the download page. A Linux command of the following form displays the checksum
for installation-file.
The command returns the installation file checksum that must match the MD5 checksum from
the download page.
The installation file requires execute permission. To be sure that it has this permission, open
a console, shell, or terminal window and run the following Linux command, where installation-
file is the full pathname to the VMware Cloud Director installation file.
To run the installation file, enter the full pathname, for example:
Note You cannot run the installation file from a directory whose pathname includes any
embedded space characters.
If the installer detects a version of VMware Cloud Director that is equal to or later than the
version in the installation file, it displays an error message and exits.
If the installer detects an earlier version of VMware Cloud Director, it prompts you to confirm
the upgrade.
c After all active VMware Cloud Director jobs on the cell finish, stops VMware Cloud Director
services on the server and upgrades the installed VMware Cloud Director software.
If you did not install the VMware public key on the target server, the installer displays a
warning of the following form:
When changing the existing global.properties file on the target server, the installer
displays a warning of the following form:
Note If you previously updated the existing global.properties file, you can retrieve the
changes from global.properties.rpmnew.
After an upgrade, new logging properties are written to the file /opt/vmware/vcloud-
director/etc/log4j.properties.rpmnew.
Option Action
Results
When the VMware Cloud Director upgrade finishes, the installer displays a message with
information about the location of the old configuration files. Then the installer prompts you to
run the database upgrade tool.
What to do next
If not upgraded yet, you can upgrade the VMware Cloud Director database.
Repeat this procedure on each VMware Cloud Director cell in the server group.
Important Do not start the VMware Cloud Director services until you upgrade all cells in the
server group and the database.
Information about all running and recently completed tasks is stored in the VMware Cloud Director
database. Because a database upgrade invalidates this task information, the database upgrade
utility verifies that no tasks are running when the upgrade process begins.
All cells in a VMware Cloud Director server group share the same database. Regardless of
how many cells you are upgrading, you upgrade the database only once. After the database is
upgraded, VMware Cloud Director cells that are not upgraded cannot connect to the database.
You must upgrade all cells so that they connect to the upgraded database.
Prerequisites
n Back up your existing database. Use the procedures that your database software vendor
recommends.
n Verify that all VMware Cloud Director cells in the server group are stopped. The upgraded
cells are stopped during the upgrade process. If there are VMware Cloud Director servers that
are not yet upgraded, you can use the cell management tool to quiesce and shut down their
services. For information about how to manage a cell by using the cell management tool, see
Chapter 5 Cell Management Tool Reference.
Procedure
/opt/vmware/vcloud-director/bin/upgrade
If the database upgrade utility detects an incompatible version of NSX Manager, it displays a
warning message and cancels the upgrade.
2 On the prompt, enter y and press Enter to confirm the database upgrade.
3 On the prompt, enter y and press Enter to confirm that you backed up the database.
If you used the --backup-completed option, the utility skips this prompt.
4 If the utility detects an active cell, on the prompt to continue, enter n to exit the shell, then
verify that no cells are running and retry the upgrade from Step 1.
Results
The database upgrade tool runs and displays progress messages. When the upgrade finishes, you
are prompted to start the VMware Cloud Director service on the current server.
What to do next
Enter y and press Enter or start the service at a later time by running the service vmware-vcd
start command.
You can start the services of the upgraded VMware Cloud Director servers.
You can upgrade the rest VMware Cloud Director members of the server group and start their
services. See Upgrade a VMware Cloud Director Cell.
--ceip-user The user name for the CEIP service account. If a user with this user
name already exists in the
System organization, the upgrade
fails. Default: phone-home-system-
account.
--multisite-user The user name for the Multi-Site system This account is used by the
account. VMware Cloud Director Multi-Site
feature. If a user with this
user name already exists in the
System organization, the upgrade
fails. Default: multisite-system-
account.
If you use the --private-key-path option, all cells must be configured to permit ssh connections
from the superuser without a password. You can use a Linux command line like the one shown
here to verify this. This example sets your identity to vcloud, then makes an ssh connection to the
cell at cell-ip as root but does not supply the root password.
If the private key in private-key-path on the local cell is readable by user vcloud.vcloud and the
corresponding public key has been added to the authorized-keys file for the root user at cell-ip
the command succeeds.
Note The vcloud user, vcloud group, and vcloud.vcloud account are created by the VMware
Cloud Director installer for use as an identity with which VMware Cloud Director processes run.
The vcloud user has no password.
Important VMware Cloud Director supports only advanced edge gateways. You must
convert any legacy non-advanced edge gateway to an advanced gateway. See https://
kb.vmware.com/kb/66767.
Starting with version 10.1, service providers and tenants can use the VMware Cloud Director API to
test connections to remote servers, and to verify the server identity as part of an SSL handshake.
To protect VMware Cloud Director network connections, configure a deny list of internal hosts
that are unreachable to tenants who are using the VMware Cloud Director API for connection
testing. Configure the deny list after the VMware Cloud Director installation or upgrade and before
granting tenants access to VMware Cloud Director. See Configure a Test Connection Denylist.
Important After upgrading to version 10.1 and later, VMware Cloud Director always verifies
certificates for any infrastructure endpoints connected to it. This is due to a change in the way
VMware Cloud Director manages SSL certificates. If you do not import your certificates into
VMware Cloud Director before the upgrade, the vCenter Server and NSX connections might show
failed connection errors due to SSL verification issues. In this case, after upgrading, you have two
options:
1 Run the cell management tool trust-infra-certs command to import automatically all
certificates into the centralized certificate store. See Import Endpoints Certificates from
vSphere Resources.
2 In the Service Provider Admin Portal UI, select each vCenter Server and NSX instance, and
reenter the credentials while accepting the certificate.
Upgrading NSX Manager interrupts access to NSX administrative functions but does not interrupt
network services. You can upgrade NSX Manager before or after you upgrade VMware Cloud
Director, whether or not any VMware Cloud Director cells are running.
For information about upgrading NSX, see the NSX for vSphere documentation at https://
docs.vmware.com.
Procedure
1 Upgrade the NSX Manager associated with each vCenter Server registered to your VMware
Cloud Director installation.
2 After you have upgraded all your NSX Managers, you can upgrade your registered vCenter
Server systems and ESXi hosts.
Prerequisites
Verify that you have already upgraded each NSX Manager that is associated with the vCenter
Server systems that are attached to your cloud. See Upgrade Each NSX Manager That Is
Associated with an Attached vCenter Server System.
Procedure
a From the top navigation bar of the VMware Cloud Director Service Provider Admin Portal,
under Resources, select vSphere Resources.
c Select the radio button next to the vCenter Server instance you want to disable and click
Disable.
d Click OK.
3 Verify all VMware Cloud Director public URLs and certificate chains.
a From the top navigation bar of the VMware Cloud Director Service Provider Admin Portal,
under Resources, select vSphere Resources.
c Select the radio button next to the target vCenter Server and click Reconnect.
d Click OK.
5 Upgrade each ESXi host that the upgraded vCenter Server system supports.
Important To ensure that you have enough upgraded host capacity to support the virtual
machines in your cloud, upgrade hosts in small batches. When you do this, host agent
upgrades can complete in time to allow virtual machines to migrate back to the upgraded
host.
a Use the vCenter Server system to put the host into maintenance mode and allow all the
virtual machines on that host to migrate to another host.
d Use the vCenter Server system to take the host out of maintenance mode.
6 (Optional) Upgrade NSX Edges managed by the NSX Manager associated with the upgraded
vCenter Server system.
Upgraded NSX Edges deliver improvements in performance and integration. You can use
either NSX Manager or VMware Cloud Director upgrade NSX Edges.
n For information about using NSX Manager to upgrade NSX Edges, see the NSX for
vSphere documentation at https://docs.vmware.com.
n To use VMware Cloud Director to upgrade an NSX Edge Gateway, you must operate on
the VMware Cloud Director network object that the Edge supports:
n An appropriate upgrade of an Edge Gateway occurs automatically when you use either
the VMware Cloud Director or VMware Cloud Director API to reset a network that the
Edge Gateway serves.
Note Redeploying is supported only for NSX Data Center for vSphere Edge
Gateways.
n Resetting a vApp network from within the context of the vApp upgrades the NSX
Edge appliance associated with that network. To reset a vApp network from within the
context of a vApp, navigate to the Networks tab for the vApp, display its networking
details, click the radio button next to the name of the vApp network, and click Reset.
For more information on how to redeploy Edge Gateways and reset vApp networks, see
the VMware Cloud Director API Programming Guide.
What to do next
Repeat this procedure for the other vCenter Server systems registered to your VMware Cloud
Director installation.
./cell-management-tool -h
[root@cell1 /opt/vmware/vcloud-director/bin]#./cell-management-tool
Cell Management Tool v8.14.0.4146350
Type "help" for available subcommands.
cmt>
While in shell mode, you can type any cell management tool command at the cmt> prompt, as
shown in this example.
cmt>cell -h
usage: cell [options]
-a,--application-states display the state of each application
on the cell [DEPRECATED - use the
cell-application command instead]
-h,--help print this message
-i,--pid <arg> the process id of the cell [REQUIRED
if username is not specified]
-m,--maintenance <arg> gracefully enter maintenance mode on
the cell
-p,--password <arg> administrator password [OPTIONAL]
-q,--quiesce <arg> quiesce activity on the cell
-s,--shutdown gracefully shutdown the cell
The command returns to the cmt> prompt when it finishes running. To exit the shell mode, type
exit at the cmt> prompt.
usage: cell-management-tool
-h,--help print this message
Available commands:
cell - Manipulates the Cell and core components
certificates - Reconfigures the SSL certificates for the cell
.
.
.
Starting with VMware Cloud Director 10.3, to troubleshoot failed access to the VMware Cloud
Director UI, you must use the https://{api_host}/cloudapi/1.0.0/site/settings/cors API
endpoint instead of a CMT command. For more information, see Troubleshoot Failed Access to
the VMware Cloud Director User Interface.
n Managing a Cell
With the cell subcommand of the cell management tool, you can suspend the task
scheduler so that new tasks cannot be started, view the status of active tasks, control cell
maintenance mode, or shut down the cell gracefully.
n Generating Self-Signed Certificates for the HTTPS and Console Proxy Endpoints
Use the generate-certs command of the cell management tool to generate self-signed SSL
certificates for the HTTPS and Console Proxy endpoints.
After you configure all servers in the VMware Cloud Director server group and connect them to
the database, you can create the initial system administrator account and initialize the VMware
Cloud Director database with related information with a command line of the following form:
You cannot run this command on a system that has already been set up. All options except
--unattended and --password must be specified.
Table 5-1. Cell Management Tool Options and Arguments, system-setup Subcommand
Table 5-1. Cell Management Tool Options and Arguments, system-setup Subcommand
(continued)
Username: admin
Full name: VCD System Administrator
Email: [email protected]
System name: VCD
Installation ID: 2
Are you sure you want to use these parameters? [Y/n]:y
Creating admin user.
Setting system details.
Completing system setup.
System setup is complete.
You can use two new OpenAPI endpoints to increase the security by restricting the access to
VMware Cloud Director.
By default, provider administrators and organization users can access VMware Cloud Director by
logging into the /api/sessions API endpoint.
By using the manage-config subcommand of the cell management tool, you can disable the
service provider access to the /api/sessions API endpoint and, as a result, limit the provider
login to the new /cloudapi/1.0.0/sessions/provider OpenAPI endpoint that is accessible only to
service providers.
Note When you disable the service provider access to the /api/sessions API endpoint, service
provider requests that supply only a SAML token in the authorization header will fail for all legacy
API endpoints.
Procedure
1 Log in or SSH as root to the OS of any of the VMware Cloud Director cells.
2 To block the provider access to the /api/sessions API endpoint, use the cell management
tool and run the following command:
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
vcloud.api.legacy.nonprovideronly -v true
Results
The /api/sessions API endpoint is no longer accessible to service providers. Service providers
can use the new OpenAPI endpoint /cloudapi/1.0.0/sessions/provider to access VMware
Cloud Director. Tenants can access VMware Cloud Director by using both the /api/sessions API
endpoint and the new /cloudapi/1.0.0/sessions/ OpenAPI endpoint.
What to do next
To enable the provider access to the /api/sessions API endpoint, run the following command:
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
vcloud.api.legacy.nonprovideronly -v false
Managing a Cell
With the cell subcommand of the cell management tool, you can suspend the task scheduler so
that new tasks cannot be started, view the status of active tasks, control cell maintenance mode, or
shut down the cell gracefully.
where sysadmin-username and sysadmin-password are the user name and password of the
system administrator.
Note For security reasons, you can omit the password. In this case, the command prompts you to
enter the password without displaying it on the screen.
As an alternative to providing the system administrator credentials, you can use the --pid option
and provide the process ID of the cell process. To find the process ID of the cell, use a command
like this one:
cat /var/run/vmware-vcd-cell.pid
Table 5-2. Cell Management Tool Options and Arguments, cell Subcommand
--pid Process ID of the cell process You can use this option instead of
(-i) -username.
--username VMware Cloud Director You can use this option instead of
(-u) system administrator user -pid.
name.
A VMware Cloud Director runs a number of applications that provide services that VMware Cloud
Director clients require. The cell starts a subset of these applications by default. All members of
that subset are typically required to support a VMware Cloud Director installation.
To view or change the list of applications that run when the cell starts, use a command line with the
following form:
sysadmin-username
Username of a VMware Cloud Director system administrator.
sysadmin-password
Password of the VMware Cloud Director system administrator. You must quote the password if
it contains special characters.
Note You can supply the VMware Cloud Director system administrator password on the
cell-management-tool command line, but it is more secure to omit the password. This
causes the cell-management-tool to prompt for the password, which does not display on
the screen as you type.
As an alternative to providing system administrator credentials, you can use the --pid option
and provide the process ID of the cell process. To find the process ID of the cell, use a
command like this one:
cat /var/run/vmware-vcd-cell.pid
command
cell-application subcommand.
Table 5-3. Cell Management Tool Options and Arguments, cell-application Subcommand
--application- None List the cell applications and their current states.
states
--disable Application ID Prevent this cell application from running at cell startup.
--pid (-i) Process ID of the cell process You can use this option instead of -u or -u and -p.
--list None List all cell applications and show whether they are enabled to
run at cell startup.
--password (-p) VMware Cloud Director Optional. The command will prompt for the password if you do
administrator password not supply it on the command line.
Table 5-3. Cell Management Tool Options and Arguments, cell-application Subcommand
(continued)
--set Semicolon-separated list of Specify the set of cell applications that run at cell startup. This
application IDs. command overwrites the existing set of cell applications that
start at cell startup. Use --enable or --disable to change the
startup state of a single application.
name id enabled
description
During the VMware Cloud Director installation or VMware Cloud Director appliance deployment
process, you configure the database type and database connections properties. See Install
VMware Cloud Director on Linux and Deployment and Initial Configuration of the VMware Cloud
Director Appliance.
After configuring the VMware Cloud Director database, you can update the database connections
by using the reconfigure-database subcommand. You can move the existing VMware Cloud
Director database to a new host, change the database user name and password, or enable an SSL
connection for a PostgreSQL database.
If you do not use the --pid option, you must restart the cell to apply the changes.
n postgres
When you use options --database-host and --database-port, the command validates the format
of the arguments but does not test the combination of host and port for network accessibility or
the presence of a running database of the specified type.
If you use the --private-key-path option, all cells must be configured to permit SSH connections
from the superuser without a password. To perform a verification, for example, you can run the
following Linux command:
This example sets your identity to vcloud, then makes an SSH connection to the cell at cell-ip
as root but does not supply the root password. If the private key in private-key-path on the
local cell is readable by user vcloud.vcloud and the corresponding public key is present in the
authorized-keys file for the root user at cell-ip, the command succeeds.
Note The vcloud user, vcloud group, and vcloud.vcloud account are created by the VMware
Cloud Director installer for use as an identity with which VMware Cloud Director processes run.
The vcloud user has no password.
To scan database for corrupt scheduler data, use a command line with the following form:
Table 5-5. Cell Management Tool Options and Arguments, fix-scheduler-data Subcommand
Each VMware Cloud Director server group must support two SSL endpoints: one for the HTTPS
service and another for the console proxy service. The HTTPS service endpoint supports the
VMware Cloud Director Service Provider Admin Portal, the VMware Cloud Director Tenant
Portal, and the VMware Cloud Director API. The remote console proxy endpoint supports VMRC
connections to vApps and VMs.
The generate-certs command of the cell management tool automates the Create Self-Signed SSL
Certificates for VMware Cloud Director on Linux procedure.
To generate new self-signed SSL certificates, use a command line with the following form:
Table 5-6. Cell Management Tool Options and Arguments, generate-certs Subcommand
Table 5-6. Cell Management Tool Options and Arguments, generate-certs Subcommand
(continued)
This example creates the new certificates using the defaults. The issuer name is set to CN=Unknown.
The certificate uses the default 2048-bit key length and expires one year after creation.
This example specifies custom values for key size and issuer name. The issuer name is set to
CN=Test, L=London, C=GB. The new certificate for the HTTPS connection has a 4096-bit key and
expires 90 days after creation.
Important The certificate and private key files, and the directory in which they are stored, must
be readable by the user vcloud.vcloud. The VMware Cloud Director installer creates this user and
group.
The certificates command of the cell management tool automates the process of replacing
existing certificates with new ones stored in PEM format. Use the certificates command to
replace self-signed certificates with signed ones or replace expiring certificates with new ones. To
create signed certificates, see Create Self-Signed SSL Certificates for VMware Cloud Director on
Linux.
To replace SSL certificates for one or both endpoints use a command with the following form:
Table 5-7. Cell Management Tool Options and Arguments, certificates Subcommand
Note You must restart the cell after you replace the certificates.
Before it can make a secure connection to an external service, VMware Cloud Director must
establish a valid chain of trust for that service by importing the service's certificates into its own
truststore. To import trusted certificates to the cell's truststore, use a command with the following
form:
The trust-infra-certs command of the cell management tool automatically gathers the SSL
certificates from the vSphere resources in your environment and imports them to the VMware
Cloud Director database.
Prerequisites
Verify that the vCenter Server and NSX Manager instances for which you want to import endpoints
are up and running.
Procedure
Starting with VMware Cloud Director 10.1, service providers and tenants can use the VMware
Cloud Director API to test connections to remote servers and to verify the server identity as part of
an SSL handshake.
To protect the internal network in which a VMware Cloud Director instance is deployed from
malicious attacks, system providers can configure a denylist of internal hosts that are unreachable
to tenants.
This way, if a malicious attacker with tenant access attempts to use the connection testing VMware
Cloud Director API to map the network in which VMware Cloud Director is installed, they won't be
able to connect to the internal hosts on the denylist.
After installation or upgrade and before providing tenants with access to the VMware
Cloud Director network, use the manage-test-connection-blacklist command of the cell
management tool to block tenant access to internal hosts.
Procedure
/opt/vmware/vcloud-director/bin/cell-management-tool manage-test-connection-blacklist
option
--add-range IPv4 or IPv6 address range in either Adds an IP address range to the
CIDR or hyphenated format denylist.
Note The ciphers command only applies to the set of certificates that VMware Cloud Director
uses for HTTPS and console proxy communications, and not to the certificates that the VMware
Cloud Director appliance uses for its appliance management user interface and API.
When a client makes an SSL connection to a VMware Cloud Director cell, the cell offers to use only
those ciphers that are configured on its default list of allowed ciphers. Several ciphers are not on
this list, either because they are not strong enough to secure the connection, or because they are
known to contribute to SSL connection failures.
When you install or upgrade VMware Cloud Director, the installation or upgrade script examines
the cell's certificates. If any of the certificates are encrypted using a cipher that is not on the list of
allowed ciphers, the installation or the upgrade fails. You can take the following steps to replace
the certificates and reconfigure the list of allowed ciphers:
1 Create certificates that do not use any of the disallowed ciphers. You can use cell-
management-tool ciphers -a as shown in the example below to list all the ciphers that
are allowed in the default configuration.
Important Because the VMRC console requires the use of the AES256-SHA and AES128-
SHA ciphers, you cannot disallow them if your VMware Cloud Director clients use the VMRC
console.
To manage the list of allowed SSL ciphers, use a command line with the following form:
Table 5-11. Cell Management Tool Options and Arguments, ciphers Subcommand
This example shows how to enable additional ciphers from the list of allowed ciphers and how to
disallow ciphers that you don't want to use.
Allowed ciphers:
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
2 Obtain a list of all the ciphers that the cell can offer during an SSL handshake.
# ./cell-management-tool ciphers -a
Product default ciphers:
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
* TLS_RSA_WITH_AES_256_GCM_SHA384
* TLS_RSA_WITH_AES_128_GCM_SHA256
* TLS_RSA_WITH_AES_256_CBC_SHA256
* TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
* TLS_RSA_WITH_AES_256_CBC_SHA
* TLS_RSA_WITH_AES_128_CBC_SHA256
* TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
* TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
* TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
* TLS_RSA_WITH_AES_128_CBC_SHA
If you run the command and you don't explicitly disable a cipher, it becomes enabled.
4 Run the command to check the list of enabled ciphers. Any cipher that is absent from the list is
disabled.
The output returns a list of all the ciphers that are now enabled.
Allowed ciphers:
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
* TLS_RSA_WITH_AES_256_GCM_SHA384
* TLS_RSA_WITH_AES_128_GCM_SHA256
* TLS_RSA_WITH_AES_256_CBC_SHA256
* TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
* TLS_RSA_WITH_AES_256_CBC_SHA
* TLS_RSA_WITH_AES_128_CBC_SHA256
* TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
* TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
When a client makes an SSL connection to a VMware Cloud Director cell, the cell offers to use only
those protocols that are configured on its list of allowed SSL protocols. TLSv1 is not on the default
list because it is known to have serious security vulnerabilities.
Procedure
1 Log in directly or by using an SSH client to the OS of the VMware Cloud Director cell as root.
Table 5-12. Cell Management Tool Options and Arguments, ssl-protocols Subcommand
Table 5-12. Cell Management Tool Options and Arguments, ssl-protocols Subcommand
(continued)
* TLSv1.2
* TLSv1.1
* TLSv1
This list is typically a superset of the SSL protocols that the cell is configured to support. To list
those SSL protocols, use the --list (-l) option.
* TLSv1.2
* TLSv1.1
To reconfigure the list of disallowed SSL protocols, use the --disallow (-d) option. This option
requires a comma-separated list of the subset of allowed protocols produced by ssl-protocols
–a.
This example updates the list of disallowed SSL protocols to include TLSv1. vCenter Server
releases earlier than 5.5 Update 3e require TLSv1.
VMware Cloud Director can collect metrics that provide current and historic information about
the virtual machine performance and resource consumption. Use this subcommand to configure
the metrics that VMware Cloud Director collects. Use the cell-management-tool cassandra
subcommand to configure an Apache Cassandra database for use as a VMware Cloud Director
metrics repository. See Configuring a Cassandra Metrics Database.
Procedure
1 Log in directly or by using an SSH client to the OS of the VMware Cloud Director cell as root.
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
statsFeeder.metrics.publishing.enabled -v true
Starting with VMware Cloud Director 10.2.2, the metrics publishing is disabled by default.
The VMware Cloud Director metrics collection service implements a subset of the metrics collected
by the vSphere Performance Manager. See the vSphere Performance Manager documentation for
more information about metric names and collection parameters. The metrics-config file cites
one or more metric names and provides collection parameters for each cited metric. For example:
configuration {
metric("cpu.usage.average")
metric("cpu.usagemhz.average")
metric("cpu.usage.maximum")
metric("disk.used.latest") {
currentInterval=300
historicInterval=300
entity="VM"
instance=""
minReportingInterval=1800
aggregator="AVERAGE"
}
}
Note When a virtual machine has multiple disks, VMware Cloud Director reports metrics as an
aggregate for all disks. CPU metrics are an aggregate of all cores and sockets.
For each named metric, you can specify the following collection parameters.
currentInterval Integer number of The interval in seconds to use when querying for the latest
seconds available metric values for current metrics queries. The
default value is 20. VMware Cloud Directorsupports values
greater than 20 only for Level 1 metrics, as defined by the
vSphere Performance Manager.
historicInterval Integer number of The interval in seconds to use when querying for historic
seconds metric values. The default value is 20. VMware Cloud
Director supports values greater than 20 only for Level 1
metrics, as defined by the vSphere Performance Manager.
entity One of: HOST, VM The type of VC object that the metric is available for. The
default is VM. Not all metrics are available for all entities.
aggregator One of: AVERAGE, The type of aggregation to perform during the
MINIMUM, MAXIMUM, minReportingInterval. The default is AVERAGE.
SUMMATION
VMware Cloud Director can collect metrics that provide current and historic information about
virtual machine performance and resource consumption. Use this subcommand to configure an
Apache Cassandra database for use as a VMware Cloud Director metrics repository. Use the
cell-management-tool configure-metrics subcommand to tool to configure the set of metrics
to collect. See Configure Metrics Collection and Publishing.
Data for historic metrics is stored in an Apache Cassandra database. See Install and Configure
a Cassandra Database for Storing Historic Metric Data for more information about configuring
optional database software to store and retrieve performance metrics.
To create a connection between VMware Cloud Director and an Apache Cassandra database, use
a command line with the following form:
Table 5-16. Cell Management Tool Options and Arguments, cassandra Subcommand
Table 5-16. Cell Management Tool Options and Arguments, cassandra Subcommand (continued)
With the recover-password command of the cell management tool, a user who knows the VMware
Cloud Director database username and password can recover the VMware Cloud Director system
administrator password.
To recover the system administrator password, use a command line with the following form:
Table 5-17. Cell Management Tool Options and Arguments, recover-password Subcommand
When you quiesce a cell using the cell-management-tool -q command, running tasks should
terminate gracefully within a few minutes. If tasks continue to run on a cell that has been quiesced,
the superuser can shut down the cell, which forces any running tasks to fail. After a shutdown
that forced running tasks to fail, the superuser can run cell-management-tool fail-tasks to
update the completion status of those tasks. Updating a task's completion status in this way is
optional but helps maintain the integrity of system logs by clearly identifying failures caused by an
administrative action.
To generate a list of tasks that are still running on a quiesced cell, use a command line with the
following form:
Table 5-18. Cell Management Tool Options and Arguments, fail-tasks Subcommand
Type y to update the task with a completion status of administrative shutdown. Type n to
allow the task to continue running.
Note If multiple tasks are returned in the response, you must decide to fail all of them or take no
action. You cannot choose a subset of tasks to fail.
Services in each VMware Cloud Director cell log audit messages to the VMware Cloud Director
database, where they are preserved for 90 days. To preserve audit messages longer, you can
configure VMware Cloud Director services to send audit messages to the Linux syslog utility in
addition to the VMware Cloud Director database.
The system configuration script allows you to specify how audit messages are handled. See
"Configure Network and Database Connections" in the VMware Cloud Director Installation,
Configuration, and Upgrade Guide. The logging options you specify during system configuration
are preserved in two files: global.properties and responses.properties. You can change
the audit message logging configuration in both files with a cell management tool command line of
the following form:
Any changes you make with this cell management tool subcommand are preserved in the cell's
global.properties and responses.properties files. Changes do not take effect until you
re-start the cell.
--syslog-port (-logport) integer in the range This option sets the value of the
0-65535 audit.syslog.port property to
the specified integer.
When you specify a value for --syslog-host, --syslog-port, or both, the command validates that
the specified value has the correct form but does not test the combination of host and port for
network accessibility or the presence of a running syslog service.
To change the host to which syslog messages are sent, use a command like this one:
This example assumes that the new host listens for syslog messages on the default port.
By default, the system sends email alerts that notify system administrators of events and
conditions that are likely to require their intervention. The list of email recipients can be updated
using the VMware Cloud Director API or the Web console. You can override the default email
content for each kind of alert by using a cell management tool command line of the following form:
Table 5-20. Cell Management Tool Options and Arguments, manage-email Subcommand
There are different allowed template names that you can use for different email notifications.
DISK_STORAGE_ALERT Disk Storage Alert (Red When there is low disk System administrators
Alert) space on the datastore
and it reaches the red
threshold.
DISK_STORAGE_ALERT_VDCS Disk storage alert to When there is low disk System administrators
provider VDCs. The email space on the datastore
contains the list provider and it reaches the red
VDCs using the datastore threshold.
that has a red alert due to
low hard disk space.
Federation certificate
FEDERATION_CERTIFICATE_SUCCESS_SUBJECT If a federation certificate Organization
expiration notification expires within 7 days from administrators
FEDERATION_CERTIFICATE_SUCCESS_BODY
sent to all organization the current date.
administrators when
a certificate for an
external SSO server is
about to expire. It
prompts the organization
administrators to download
a new certificate from the
SSO server and update
VMware Cloud Director.
IPSEC_VPN_TUNNEL_ERROR VPN tunnel Error (Red When the VPN tunnel is not System administrators
Alert) operational.
IPSEC_VPN_TUNNEL_ERROR_SUMMARY
IPSEC_VPN_TUNNEL_ENABLED VPN tunnel Enabled (Green When the VPN tunnel is System administrators
Alert) working again after not
IPSEC_VPN_TUNNEL_ENABLED _SUMMARY being operational.
AMQP Connection Lost email alert. When the RabbitMQ stops working. System administrators
Alert notifying that VMware Cloud
Director is disconnected from the
AMQP Server.
Broken Database Connection email When VMware Cloud Director is System administrators
alert disconnected from the database.
Restored Database Connection email When VMware Cloud Director is System administrators
alert reconnected to the database.
Host Disconnected from Switch email When a host gets disconnected from System administrators
alert the available switches.
Host Disconnected from Distributed When a host gets disconnected System administrators
Virtual Switch email alert from the available distributed virtual
switches.
LDAP Error email alert During the synchronization with System administrators
LDAP.
LDAP User Sync email alert During the renaming of an LDAP user. System administrators
Site Associations Status Change email The sites recently lost connection, System administrators
alert regained connection, or are still
down.
"This is an alert from $productName The $datastore is used by the following PVDC(s):
$pvdcsList
"
Property "email.template.DISK_STORAGE_ALERT_VDCS.en-US" has value "This is an alert from
$productName The $datastore is used by the followingProvider VDC(s): $pvdcsList
"
Virtual machines that are referenced in the vCenter database but not in the VMware Cloud
Director database are considered orphan VMs because VMware Cloud Director cannot access
them even though they may be consuming compute and storage resources. This kind of reference
mismatch can arise for a number of reasons, including high-volume workloads, database errors,
and administrative actions. The find-orphan-vms command enables an administrator to list these
VMs so that they can be removed or re-imported into VMware Cloud Director. His command has
provisions for specifying an alternate trust store, which might be needed if you are working with
VMware Cloud Director or vCenter installations that use self-signed certificates.
Table 5-23. Cell Management Tool Options and Arguments, find-orphan-vms Subcommand
Table 5-23. Cell Management Tool Options and Arguments, find-orphan-vms Subcommand
(continued)
--trustStore Full path name to a Java trust Specify this only if you do not
store file. want this command to use the
default VMware Cloud Director
trust store file.
[moref: "resgroup-30515"]
The following 22 orphan VMs were discovered:
Orphan VM: "indDisk100-0-95411 (cbc358a0-e199-4024-8fff-2e5cfce20953)" (parent name: "Test
VMs", parent moref : "group-v30533")
...
Orphan VM: "indDisk12-0-51259 (0bbb4115-673e-4c84-ba26-6875159655e0)" (parent name: "Test
VMs", parent moref : "group-v30533")
If you prefer not to participate in VMware's CEIP for this product, run this command with the
--disable option.
Table 5-24. Cell Management Tool Options and Arguments, configure-ceip Subcommand
After you run this command, the system no longer sends any information to the VMware Customer
Experience Improvement Program.
To confirm the current participation status in the VMware Customer Experience Improvement
Program, use a command like this one:
Table 5-25. Cell Management Tool Options and Arguments, manage-config Subcommand
--name (-n) Configuration setting name The name of the target configuration
setting.
Required with options -d, -l, and -v.
--value (-v) Configuration setting value Adds or updates the value for the
target configuration setting.
For example, you can use the manage-config subcommand for Configuring Catalog
Synchronization Throttling.
When a subscribed catalog initiates a catalog synchronization, the published catalog first
downloads the library items from the vCenter Server repository to the VMware Cloud Director
transfer service storage, then creates download links for the subscribed catalog. You can limit the
number of library items that all published catalogs can download at the same time. You can limit
the number of library items that all subscribed catalogs can sync at the same time. You can limit
the number of library items that a single subscribed catalog can sync at the same time.
You can use the manage-config subcommand of the cell management tool to update the
configuration settings for catalog throttling. For information about using the manage-config
subcommand, see Updating Application Configuration Settings.
If a subscribed catalog contains 13 library items, syncing the catalog is performed in three
sequential portions. The first portion contains five items, the second portion contains the next
five items, the last portion contains the remaining three items.
In the default configuration, an organization VDC automatically discovers vCenter VMs that are
created in the resource pools that back the VDC. See the discovering and adopting vApps
information in the VMware Cloud Director Service Provider Admin Portal Guide. If a vCenter
VM does not appear in a discovered vApp, you can run the debug-auto-import subcommand
against this VM or VDC.
The debug-auto-import subcommand returns a list of vCenter VMs and information about the
possible reasons for being skipped by the discovery mechanism. The list also includes vCenter
VMs that are discovered but failed to import to the organization VCD.
Table 5-27. Cell Management Tool Options and Arguments, debug-auto-import Subcommand
In this example, the system output returns information about three vCenter VMs that are skipped
by the discovery mechanism and whose names contain the string test. VM import-test3 is an
example of a VM that is discovered but failed to import to the VDC.
During the initial VMware Cloud Director setup, you set an installation ID. VMware Cloud Director
uses the installation ID to generate MAC addresses for the virtual machine network interfaces.
Two VMware Cloud Director installations that are configured with the same installation ID might
generate identical MAC addresses. Duplicate MAC addresses might cause conflicts in stretched
networks between two associated sites.
Before creating stretched networks between associated sites that are configured with the same
installation ID, you must regenerate the MAC addresses in one of the sites by using the mac-
address-management subcommand of the cell management tool.
To generate new MAC addresses, you set a custom seed that is different from the installation
ID. The seed does not overwrite the installation ID, but the database stores the latest seed as a
second configuration parameter, which overrides the installation ID.
You run the mac-address-management subcommand from an arbitrary VMware Cloud Director
member of the server group. The command runs against the VMware Cloud Director database, so
you run the command once for a server group.
Important The MAC addresses regeneration requires some downtime of VMware Cloud Director.
Before starting the regeneration, you must quiesce the activities on all cells in the server group.
Important The MAC addresses that are in use are retained. To change a MAC address that
is in use to a regenerated MAC address, you must reset the network interface MAC address.
For information about editing virtual machine properties, see the VMware Cloud Director Tenant
Portal Guide.
In this example, the system output shows that the current seed is 9, based on which there are
12 MAC addresses. In addition, there is one MAC address that is based on a previous seed or
installation ID of 1.
Prerequisites
To update the IP addresses of the cells in a database high availability cluster, you must provide
the IP address of the current primary. To find the IP address, you must use the VMware Cloud
Director appliance API to make a note of the node IDs of the standby nodes in the cluster. See the
VMware Cloud Director Appliance API Schema Reference on http://code.vmware.com.
Procedure
1 Log in directly or by using an SSH client to the OS of any of the cells in the cluster as root.
If the cell process ID is not NULL, the VMware Cloud Director cell is running and you can
change the IP address of the database without restarting the VMware Cloud Director cell.
3 To update the IP addresses on all the cells in the server group, run the following command:
4 (Optional) Verify that each VMware Cloud Director cell is pointing to the correct database IP
address.
5 If any of the cells is not updated, run the command to reconfigure it.
6 If you reconfigured a cell that is not running, run the command to restart the vmware-vcd
service.
Procedure
1 Log in directly or by using an SSH client as root to the OS of the VMware Cloud Director cell.
Table 5-29. Cell Management Tool Options and Arguments, env-check Subcommand
Table 5-29. Cell Management Tool Options and Arguments, env-check Subcommand
(continued)
To monitor the transfer folder metrics, you can use the /metrics?
filter=name==disk_free_percent;dirname=transfer OpenAPI endpoint . For more information,
see the VMware Cloud Director API documentation at www.code.vmware.com.
The monitoring is deactivated by default and you can activate it by using the cell management
tool. You can configure notifications to appear when the disk space reaches the orange or red
threshold of available capacity. For more information about advisories, see Create an Advisory
Dashboard in the VMware Cloud Director Service Provider Admin Portal Guide.
Procedure
1 Log in directly or by using an SSH client to the OS of any of the cells in the cluster as root.
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
monitoring_transfer_folder_enabled -v true
3 (Optional) To configure the advisories to appear when the available capacity reaches a
threshold, run the following command.
By default, VMware Cloud Director sets the orange threshold to 20% and the red threshold to
10% free space of the transfer share's total capacity.
4 (Optional) To change the set of users that the advisories appear to, run the following
command.
The messages can appear to system administrators, the users within an organization, or
the users in all organizations. By default, the notifications appear only to the system
administrators. The value can be the organization ID or the site ID.
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
transfer_folder_monitor_target_ID -v urn:vcloud:org:organization_ID
5 (Optional) To configure when the advisories appear and their duration, run the following
commands.
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
transfer_folder_monitor_start_date -v now() +number_of_days_to_delay
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
transfer_folder_monitor_end_date -v now() +number_of_days_to_delay
By default, the notifications appear at the time of the event where the value is now() and
disappear one day later where the value is now()+1.
What to do next
/opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n
monitoring_transfer_folder_enabled -v false
/opt/vmware/vcloud-director/logs/vcloud- Informational log messages from the cell. This log also
container-info.log shows warnings or errors encountered by the cell.
Use any text editor, text viewer, or third-party tool to view the logs.
Procedure
3 Open a console, shell, or terminal window and run the Linux rpm command.