Vmware Vcert Tool May 2026
kubectl create secret tls myapp-tls --cert=myapp.crt --key=myapp.key kubectl create configmap ca-bundle --from-file=ca.crt Mount in your deployment:
Whether you’re running stateful VMs on vSphere or a fleet of containers in Tanzu, vCert gives you a reliable, repeatable way to issue machine identities. Start using it today to eliminate manual certificate management and reduce the risk of expiry outages. vmware vcert tool
# Script: renew.sh vcert renew --cert myapp.crt --key myapp.key --out-dir ./certs kubectl create secret tls myapp-tls --cert=./certs/myapp.crt --key=./certs/myapp.key --dry-run=client -o yaml | kubectl apply -f - Deploy as a Kubernetes CronJob (e.g., run every 5 days for a 7-day cert). In enterprise setups, the VMware CA can forward requests to a Venafi TPP server. vCert transparently supports this. Just set the appropriate policy name: kubectl create secret tls myapp-tls --cert=myapp
# Linux example wget https://your-vcenter-or-pks-domain/api/cli/vcert-linux-amd64 chmod +x vcert-linux-amd64 sudo mv vcert-linux-amd64 /usr/local/bin/vcert Verify installation: In enterprise setups, the VMware CA can forward
volumes: - name: tls secret: secretName: myapp-tls - name: ca configMap: name: ca-bundle Because vCert supports short-lived certs, automate renewal before expiry:
"common_name": "myapp.default.svc.cluster.local", "sans": [ "myapp.default.svc", "myapp.default.pod", "myapp-namespace.svc.cluster.local" ], "key_type": "rsa", "key_bits": 2048, "ttl": "168h"
vcert health | Command | Purpose | |---------|---------| | vcert health | Verify CA server reachability | | vcert gen | Generate key and request certificate | | vcert renew | Renew an existing certificate | | vcert revoke | Revoke a certificate by serial/ID | | vcert list | List issued certificates (RBAC dependent) | | vcert download | Fetch a previously issued certificate | Detailed Example: Generating a TLS Certificate for a Web App Let's walk through generating a server certificate for a web application called myapp.default.svc.cluster.local . Step 1: Create a certificate request configuration Create request.json :