Virtual Control
VMware Cloud Foundation Solutions
VCF Operations
Configuration Handbook
Comprehensive guide covering deployment, dashboard design, alerting, and integration configuration for VCF Operations 9.0.
DashboardsAlertingIntegrationsConfiguration
VCF 9.0
VMware Cloud Foundation
© 2026 Virtual Control LLC — All Rights Reserved
Proprietary & Confidential
VMware Cloud Foundation 9.0.1 - VCF Operations Configuration Handbook
Overview
In VCF 9.0, VCF Operations (formerly VMware Aria Operations) is the central management console for the entire VCF platform. The SDDC Manager UI is deprecated and will be removed in a future release. VCF Operations is now the primary interface for fleet management, lifecycle management, licensing, monitoring, certificate management, password management, and Day 2 operations.
This handbook covers every post-deployment configuration step for VCF Operations after a successful VCF 9.0.1 bringup, organized into sequential phases.
Environment Reference
| Component | Address |
| VCF Operations | 192.168.1.77 |
| SDDC Manager | 192.168.1.125 |
| vCenter Server | 192.168.1.69 (vcenter.lab.local) |
| Offline Depot Server | 192.168.1.52:8443 |
| ESXi Hosts | esxi01 (192.168.1.74), esxi02 (192.168.1.75), esxi03 (192.168.1.76), esxi04 (192.168.1.82) |
| NSX Manager | Deployed during bringup |
| Storage | vSAN across 4 hosts |
| Mode | Air-gapped / Disconnected |
Phase 1: First Login and Initial Setup
1.1 Access VCF Operations
- Open a browser and navigate to
https://192.168.1.77
- You will see the VCF Operations login page
- Log in with the credentials configured during bringup:
- Username:
admin
- Password: The password set during VCF Installer deployment
- Upon first login, you land on the Fleet Management dashboard
1.2 What You See After Login
The left navigation pane displays the main sections:
- Fleet Management - Lifecycle management, depot configuration, component health
- Infrastructure Operations - Monitoring, dashboards, alerts, diagnostics
- Security & Compliance - Compliance benchmarks, drift detection
- License Management - Registration and license file management
- Administration - Integrations, accounts, access control, system settings
Note: If licensing has not been completed, some menu items may be grayed out. VCF Operations runs in evaluation mode for up to 90 days after deployment.
1.3 Initial Setup Wizard (Manual OVA Deployment Only)
If VCF Operations was deployed manually via OVA rather than through the VCF Installer, the initial setup wizard appears automatically on first access:
- Click NEXT on the welcome page
- Set Admin Password: Enter a new password for the
admin user (minimum 8 characters, upper, lower, number, special character)
- Select EXPRESS INSTALLATION to deploy a single-node configuration
- Accept the EULA/license agreement
- The wizard completes and brings you to the main VCF Operations interface
Phase 2: License Registration (Disconnected / Air-Gapped Mode)
VCF 9.0 uses a new unified subscription-based license file model. The old 25-character license keys are replaced by license files. There are only two license types: VMware Cloud Foundation (cores) and VMware vSAN (TiBs). All other components (NSX, vCenter, VCF Automation, etc.) are automatically licensed when a primary license is assigned.
2.1 Download the Registration File
Navigation: VCF Operations > License Management > Registration
- In the left navigation, click License Management
- Click Registration
- In the Download Registration File card, click Download
- Save the
.jws (JSON Web Signed) file to a local machine or USB drive
2.2 Upload Registration to VCF Business Services Console
This step is performed on a machine with internet access:
- Transfer the
.jws file to a computer with internet access via USB drive or secure transfer
- Open a browser and navigate to
https://vcf.broadcom.com
- Log in with your Broadcom Support Portal credentials
- Select the Site ID you want to register this VCF Operations instance against
- Upload the registration file when prompted
- Add licenses to your license server - you must add licenses to each license server to complete registration
- The Business Services Console generates a license file in exchange
- Click Download to save the license file
- Click Finish
2.3 Import the License File into VCF Operations
Navigation: VCF Operations > License Management > Registration
- Return to VCF Operations at
https://192.168.1.77
- Navigate to License Management > Registration
- Click Import License File
- Click Browse and select the downloaded license file
- Click Import
- Upon completion, click Complete
2.4 Verify Licensing
- The license status should change from "Evaluation" to showing your valid license
- All previously grayed-out menu items become fully active
- Navigate to License Management and confirm license details show correct core counts and expiration
2.5 Ongoing License Usage Reporting (Every 180 Days)
Since the environment is air-gapped, you must manually report usage at least every 180 days:
- Navigate to License Management > Registration
- Click Generate Usage File and save it
- Transfer the usage file to an internet-connected machine
- Log in to
https://vcf.broadcom.com
- Navigate to License Management > VCF Operations Registrations
- Find your VCF Operations instance, click the vertical ellipsis menu, select Upload Usage File
- Upload the usage file, click Save and Next
- The system generates an updated license file - click Download
- Click Finish
- Transfer the new license file back and import it via License Management > Registration > Import License File
WARNING: If license usage data is not submitted within 180 days, licenses are treated as expired. Hosts are disconnected from vCenter and workload operations are blocked. In a lab environment, set a calendar reminder.
Phase 3: Fleet Management Appliance Registration
The Fleet Management appliance handles lifecycle management functions formerly in SDDC Manager. If deployed via the VCF Installer, this may already be connected. If not:
3.1 Register Fleet Management Appliance
Navigation: https://192.168.1.77/admin/ (the Admin UI, not the main UI)
- Open a browser and navigate to
https://192.168.1.77/admin/
- Log in as
admin with your VCF Operations admin password
- Navigate to System Status > Fleet Management section
- Click the Connect button
- Node Address: Enter the FQDN of the VCF Operations Fleet Management appliance
- Admin Password: Enter the Fleet Management appliance admin password
- Click Test Connection to verify connectivity
- Review the security certificate presented by the appliance
- Accept the certificate and click Next
- Enter the VCF Operations admin password when prompted
- Click Finish
3.2 Verify Registration
- The Fleet Management status should show as Connected in the Admin UI
- Return to the main VCF Operations UI (
https://192.168.1.77)
- Navigate to Fleet Management - all fleet management capabilities should be accessible
Phase 4: Offline Depot Configuration
In VCF 9, depot functionality has moved from SDDC Manager to VCF Operations. You must configure the depot before you can download binaries for additional components. There are TWO depot configurations needed for an air-gapped environment.
Important: Only one depot connection (online OR offline) can be ACTIVE at a time. If an online depot is already configured, you must disconnect it first.
Navigation: VCF Operations > Fleet Management > Lifecycle > VCF Management > Depot Configuration
- Navigate to Fleet Management > Lifecycle > VCF Management > Depot Configuration
- Click Configure under the Offline Depot widget
- Offline Depot Type: Keep as "Webserver"
- Repository URL: Enter
https://192.168.1.52:8443
- Username:
admin
- Password:
admin
- Check "I accept the imported certificate" after reviewing the certificate details
- Click OK
4.2 Verify Depot Connection
- Navigate to Binary Management > Install Binaries tab
- You should see available binaries listed for download (Operations for Logs, Operations for Networks, etc.)
- Download status should show the binaries available for installation
Navigation: VCF Operations > Fleet Management > Lifecycle > VCF Instances > (select your instance) > Depot Settings
- Navigate to Fleet Management > Lifecycle > VCF Instances
- Select your VCF Instance from the list
- Click Depot Settings
- Under Offline Depot, select Set Up
- Enter the hostname of your depot server:
192.168.1.52:8443
- Click Save
Note: Before configuring the SDDC Manager depot, you may need to trust the SSL certificate of your offline depot server. This was already done during the initial bringup (certificate imported into SDDC Manager's Java trust store).
Phase 5: Connect Data Sources - VCF Cloud Account
This is the critical step that connects VCF Operations to your SDDC Manager, enabling automatic monitoring of all VCF domains including vCenter, NSX, and vSAN.
5.1 Add the VMware Cloud Foundation Account
Navigation: VCF Operations > Administration > Integrations > Accounts tab > Add
- In the left navigation, click Administration
- Click Integrations
- Click the Accounts tab
- Click Add
- On the Account Types page, select VMware Cloud Foundation
- Fill in the following fields:
- Name:
Lab VCF Instance (or any descriptive name)
- Description:
Management Domain - Lab Environment
- Physical Data Center: Select existing or create new by clicking the option
- Connection Details:
- SDDC Manager FQDN:
sddc-manager.lab.local or 192.168.1.125
- Use the FQDN rather than IP if you want VCF SSO to work properly
- Credentials:
- Click the Add (+) icon to create new credentials
- Credential Name:
SDDC Manager Admin
- Username:
administrator@vsphere.local (supported formats: username@domain or domain\username)
- Password: Enter the corresponding password
- Click OK to save the credential
- Collector:
- Select which VCF Operations collector or collector group manages this account
- Ensure the SDDC Manager FQDN is reachable from the selected collector
- Click Validate Connection
- A certificate dialog appears - review the certificate and click OK to accept
- Advanced Settings:
- Enable Domain Monitoring on Creation: Toggle to True for automatic data collection on newly discovered domains
- Configuration Limits: Optionally enter the name of a file containing VCF configuration max soft and hard limits
- Management Options:
- Select the option for monitoring plus license/plugin management
- Click Add to create the account
5.2 Start Data Collection
- On the Accounts tab, locate your new VMware Cloud Foundation account
- Click the vertical ellipsis (three dots) menu next to the account
- Select Start Collecting All
5.3 What Happens Automatically
After configuration, VCF Operations automatically:
- Discovers all VCF domains
- Creates vCenter adapter instances for each domain's vCenter
- Creates NSX adapter instances for each domain's NSX Manager
- Creates vSAN adapter instances for vSAN-enabled clusters
- Configures system-managed credentials for NSX 9.0 endpoints
- Begins collecting metrics, properties, and alerts from all discovered components
Note: Initial collection takes multiple cycles (standard cycle = 5 minutes). Allow 15-30 minutes for full data population.
Phase 6: Add Individual vCenter Account (If Not Auto-Discovered)
When you add a VCF account in Phase 5, vCenter accounts are normally auto-discovered. Skip this phase if auto-discovery worked. If you need to add a vCenter account manually:
6.1 Add a Standalone vCenter Account
Navigation: VCF Operations > Administration > Integrations > Accounts tab > Add
- Click Add on the Accounts tab
- Select vCenter from the Account Types page
- Display Name:
vcenter.lab.local - 192.168.1.69
- Description:
Management Domain vCenter
- Physical Data Center: Select or create
- vCenter Field:
vcenter.lab.local or 192.168.1.69
- Credentials: Click Add (+)
- Enter
administrator@vsphere.local
- Enter the password
- Action User (optional): Alternate credentials for operational actions (power on/off VMs)
- Primary credential needs Performance > Modify intervals permission for VM guest metrics
- Collector: Select the VCF Operations collector
- Click Validate Connection and accept the certificate
- Optional Features:
- Activate for Operational Actions: Check to enable remediation actions
- Activate Log Collection: Check to enable log forwarding (requires VCF Operations for Logs)
- Activate Network and Flow: Check to enable network monitoring
- Click Add
- On the Accounts tab, click the vertical ellipsis menu > Start Collecting
Important: vCenter accounts do NOT start monitoring automatically. You must manually initiate data collection.
Phase 7: Verify Data Collection
7.1 Check Adapter Status
Navigation: VCF Operations > Administration > Integrations > Accounts
- Navigate to the Accounts tab
- For each configured account (VCF, vCenter, NSX, vSAN), verify:
- Collection Status: Green "Collecting" (not "Stopped" or "No data receiving")
- Collection State: "Collecting Data"
- If any adapter shows issues, click on it to see detailed error messages
7.2 Verify Object Discovery
Navigation: VCF Operations > Infrastructure Operations > Inventory
- Navigate to Infrastructure Operations
- Verify the following objects have been discovered:
- vCenter instances (vcenter.lab.local)
- ESXi hosts (esxi01, esxi02, esxi03, esxi04)
- Clusters (management cluster)
- Datastores (vSAN datastore)
- Virtual Machines (all management VMs)
- NSX objects (NSX Manager, transport nodes)
7.3 Check VCF Health
Navigation: VCF Operations > Infrastructure Operations > VCF Health
- Navigate to the VCF Health page
- Verify all components show healthy status
- VCF Health monitors: certificates, NTP synchronization, DNS reverse lookup, vCenter performance, and other critical infrastructure parameters
- Diagnostics findings appear automatically - the Management Pack for VCF Diagnostics is auto-installed
7.4 Key Timing Notes
- Standard collection cycle: every 5 minutes
- Initial collection may take multiple cycles: 15-30 minutes
- Property-based diagnostic scans run every 4 hours
- Telegraf agent data collection interval: 4 minutes
- Cloud proxy registration can take up to 20 minutes on first boot
Phase 8: Certificate Management
VCF 9.0 introduces unified, non-disruptive TLS certificate management across all VCF components.
8.1 View All Certificates
Navigation: VCF Operations > Fleet Management > Certificates
- Navigate to Fleet Management > Certificates
- Select either VCF Management or VCF Instances tab
- View the certificate inventory showing all TLS certificates across your environment
- Certificates are displayed for: vCenter, ESX hosts, VCF Operations, VCF Automation, Fleet Management, SDDC Manager, NSX local manager
- Review certificate expiration dates and status alerts
Navigation: VCF Operations > Fleet Management > Certificates > Configure CA
- Navigate to Fleet Management > Certificates
- Select VCF Management or VCF Instances (and choose a specific instance)
- Click Configure CA
- Select Microsoft Certificate Authority
- Fill in:
- CA Server URL: Must begin with
https:// and end with certsrv (e.g., https://ca.lab.local/certsrv)
- User Name: Least-privileged service account (e.g.,
svc-vcf-ca)
- Password: Service account password
- Template Name: The issuing certificate template created in Microsoft CA
- Click Save
- Click Configure CA
- Select OpenSSL
- Fill in:
- Common Name: FQDN of SDDC Manager appliance
- Country: Country of registration
- Locality Name: City
- Organization Name: Legal company name
- Organization Unit Name: Department
- State: Full state/province name (unabbreviated)
- Click Save
Important: VCF management components only support Microsoft CA. VCF Instance components support both Microsoft CA and OpenSSL. You configure the CA separately for management components and instance components.
8.4 Replace Default Certificates
After configuring a CA, replace default self-signed certificates with enterprise CA-signed certificates. Certificates eligible for non-disruptive auto-renewal include: ESX SSL, vCenter machine SSL, NSX LM/VIP, SDDC Manager SSL, and VCF Operations certificates.
8.5 Enable Automatic Renewal
On the Certificates page, enable auto-renewal for supported certificates. This prevents unexpected certificate expiration.
Lab Note: In a lab with no Microsoft CA, you can continue using self-signed certificates. The certificate management UI will show certificate expiration warnings, which is normal.
Phase 9: Password Management and Rotation
VCF 9.0 provides unified password management centralized in VCF Operations, replacing the password management previously found in SDDC Manager.
9.1 View Password Status
Navigation: VCF Operations > Fleet Management > Passwords
- Navigate to Fleet Management > Passwords
- Select either VCF Management or VCF Instances tab
- Select your domain to view all managed account passwords
- The dashboard shows:
- Account names and types (root, admin, backup, consoleuser, support, admin@local, vmware-system-user)
- Password status (valid, expiring soon, expired)
- Last modified dates
- Expiration dates
9.2 Managed Components and Accounts
VCF Management Components:
- Fleet Management
- VCF Automation
- VCF Identity Broker
- VCF Operations
- VCF Operations for Logs
- VCF Operations for Networks
VCF Instance/Domain Components:
- ESX hosts
- NSX Manager
- vCenter Server
- SDDC Manager
9.3 Update a Password
- Navigate to Fleet Management > Passwords
- Select the component and account you want to update
- Click Update Password
- Enter the new desired password (this lets you specify the exact password, unlike rotation)
- Confirm the new password
- Click Update
This changes the password on both the server side (where the account resides) and the client side (where the account is used).
9.4 Rotate Passwords
Password rotation generates a randomized password:
- Navigate to Fleet Management > Passwords
- Select accounts to rotate
- Click Rotate
- The system generates random passwords meeting complexity requirements
- Set the rotation interval: 30 days, 60 days, or 90 days
- You can also deactivate the schedule
- Only a user with the ADMIN role can perform this task
Note: Auto-rotate is automatically enabled for vCenter Server. It may take up to 24 hours to configure the auto-rotate policy for a newly deployed vCenter.
WARNING — Nested/Lab Environments: If a credential update, rotation, or remediation fails mid-operation (commonly because NSX was temporarily unreachable during a boot storm), a cascading failure occurs: the component resource gets stuck in ACTIVATING or ERROR state, stale locks accumulate in the database, and unresolved task metadata piles up — blocking all future password operations. The error messages are "Resources [host] are not available/ready", "not in ACTIVE state", or "Unable to acquire resource level lock(s)". The API cannot cancel stuck tasks. This requires a database-level fix on SDDC Manager — cleaning three tables: nsxt (status), lock, and task_metadata (resolved). See Known Issue #19 and the Troubleshooting Handbook Section 10 for the full repair procedure.
If a password gets out of sync between SDDC Manager and the actual component:
Prerequisites:
- No workflows running or scheduled
- Required permissions: Fleet Management > Passwords > Manage and Fleet Management > Passwords > View
- One account remediated at a time
Steps:
- Navigate to Fleet Management > Passwords
- Select either VCF Management or VCF Instances and choose your domain
- Select the component showing a password issue
- Click Remediate Password
- Enter and confirm the manually-set password (the password currently on the component)
- Click Remediate Password to complete
VCF 9.0 introduces the VCF Identity Broker (VIDB), which provides federated SSO across all VCF components.
Navigation: VCF Operations > Fleet Management > Identity & Access > VCF Management > Operations Appliance
- Navigate to Fleet Management > Identity & Access > VCF Management
- Select Operations Appliance
- Click Configure
- Select the Identity Broker instance from the dropdown
- Accept the role assignment requirements
- The system validates and displays the Identity Broker on the configuration list after processing
10.2 Verify Authentication Source
Navigation: VCF Operations > Administration > Control Panel > Authentication Sources
- Navigate to Administration > Control Panel > Authentication Sources
- Confirm that "VCF SSO" now appears in the list of available authentication sources
10.3 Import Directory Users and Groups
Navigation: VCF Operations > Administration > Control Panel > Access Control
- Navigate to Administration > Control Panel > Access Control
- Click the three-dot menu and select Import from Source (do NOT use the standard "Add" button - that creates local groups only)
- Select VCF SSO as the source
- Search for your Active Directory groups (e.g.,
vcf-admins, vcf-readonly)
- Select the groups to import
10.4 Assign Permissions
- Select the imported groups
- Click the menu and choose Edit
- Assign:
- Role: The actions users can perform (e.g., Administrator, ReadOnly, ContentAdmin)
- Scope: The objects those actions apply to (e.g., all objects, specific data centers)
- Click Save
- Test by logging out and logging back in using VCF SSO authentication
10.5 Add Active Directory Identity Source in vCenter
To add AD authentication to vCenter separately:
- Log in to vCenter at
https://192.168.1.69
- Navigate to Administration > Single Sign-On > Configuration
- Click Identity Sources > Add
- Select Active Directory over LDAP or Active Directory (Integrated Windows Authentication)
- Enter your AD domain details:
- Domain name
- Base distinguished name for users and groups
- Primary server URL (e.g.,
ldap://dc01.lab.local:389)
- Bind user distinguished name
- Bind password
- Click Test Connection to verify
- Click Add to save
Phase 11: Compliance and Configuration Drift Monitoring
11.1 Access Compliance
Navigation: VCF Operations > Security & Compliance > Compliance
- Navigate to Security & Compliance > Compliance
- Ensure your data sources (vCenter, VCF account) are configured and collecting before proceeding
11.2 Activate VMware SDDC Benchmarks
- On the Compliance page, locate the VMware SDDC Benchmarks section
- Click Activate for the benchmark you want to enable
- Available score cards:
- vSphere Security Configuration Guide
- vSAN Security Configuration Guide
- NSX Security Configuration Guide
- Select an applicable policy when prompted
- The system activates relevant alert definitions automatically
11.3 Activate Regulatory Compliance Benchmarks
Available compliance standards built in:
- DISA Security Standards
- FISMA Security Standards
- HIPAA
Standards requiring marketplace download (.PAK file):
- PCI DSS Compliance Standards
- CIS Security Standards
- NIST SP 800-171
- NIST SP 800-53 R5
For air-gapped environments, install marketplace packs manually:
Navigation: VCF Operations > Administration > Repository
- Navigate to Administration > Repository
- The Add Solution wizard opens
- Page 1: Locate and upload the
.PAK file
- Page 2: Accept the EULA and install
- Page 3: Review the installation
- Click Add Account to configure the newly installed integration
Navigation: VCF Operations > Fleet Management > Configuration Drifts > Schedule Drift Detection
- Navigate to Fleet Management > Configuration Drifts
- Click Schedule Drift Detection
- Step 1 - Configuration Details: Enter a name and description for the drift check
- You can schedule drifts only for vCenter object types
- Step 2 - Define Scope: Select vCenter instances from the right panel and move them to the left Scope window
- You can select a VCF folder as scope to automatically include all VCF instances in that folder
- Step 3 - Preview Scope: Click Preview Scope to validate which vCenter instances will be included
- Step 4 - Filtering Criteria: Apply filters and add criteria specific to the vCenter object type
- Step 5 - Schedule: Set the desired schedule interval and click Create
- The system creates a new job visible in the automation central page
Phase 12: Alerts and Notifications
Navigation: VCF Operations > Infrastructure Operations > Configurations > Outbound Settings
- Navigate to Infrastructure Operations > Configurations
- Click the Outbound Settings tile
- Click Add
12.2 Standard Email Plug-In
- Select Standard Email Plugin from the Plug-In Type dropdown
- Instance Name:
Lab Email Notifications
- Configure SMTP settings:
- Use Secure Connection: Enable for SSL/TLS
- Secure Connection Type: SSL or TLS
- Requires Authentication: Check if your SMTP requires auth
- SMTP Host: URL or IP of email server
- SMTP Port: 25, 465, or 587
- Sender Email Address:
vcf-ops@lab.local
- Sender Name:
VCF Operations
- Credential Type: Basic Authentication or No Credential
- Receiver Email Address: Default recipient
- Click Save
- Select the instance and click Activate
12.3 SNMP Trap Plug-In
- Select SNMP Trap Plugin
- Instance Name: Name for the plug-in instance
- Destination Host: IP or FQDN of SNMP trap receiver
- Port: Default 162
- Community: SNMP community string (for v1/v2c)
- For SNMPv3: provide Username, Auth Protocol (SHA-224/256/384/512), Auth Password, Privacy Protocol (AES192/256), Privacy Password
- Engine ID: Auto-generated if omitted
- Click Test then Save
12.4 Webhook Notification Plugin
- Select Webhook Notification Plugin
- Enter Instance Name and Webhook URL
- Credential Type options: Basic Authentication, Bearer Token, OAuth, Certificate (X.509), API Key
- Click Test and Save
12.5 Other Available Plug-Ins
- Log File
- ServiceNow
- Slack
- Network Share
- REST (deprecated)
12.6 Create Notification Rules
Navigation: VCF Operations > Infrastructure Operations > Configurations > Notifications
- Navigate to Infrastructure Operations > Configurations
- Click the Notifications tile
- Click Add on the toolbar
Step 1 - Basic Details:
- Name: Rule identifier (e.g.,
Critical Host Alerts)
- Description: Rule purpose
- Notification Status: Toggle active/inactive
- Notification Type: Select "Alert"
- Click Next
Step 2 - Define Filtering Criteria:
- Object Scope: Object Type, specific Objects, Tags, Applications, Tiers (option to include child objects)
- Alert Scope: Alert Types/Subtypes, Alert Impact, or Alert Definition
- Criticality: Filter by severity (Critical, Immediate, Warning, Information)
- Control State: Filter by status (opened, assigned, suspended)
- Notify On: Trigger conditions (new, updated, canceled)
- Notification Heartbeat: Enable repeat notifications for active alerts
- Click Next
Step 3 - Select Outbound Method:
- Choose from configured plug-in instances
- Click Next
Step 4 - Payload Template:
- Select default or custom template
- For Email: configure Recipients, Cc/Bcc, Notify Again interval, Max Notifications, Delay to Notify
- Click Next
Step 5 - Test:
- Click Initiate Process to test
- Select an alert definition and object
- Click Validate Configuration
- Review Response and Body tabs
Step 6 - Create:
Phase 13: Dashboards and Reporting
13.1 Access Predefined Dashboards
Navigation: VCF Operations > Infrastructure Operations > Dashboards & Reports
- Navigate to Infrastructure Operations > Dashboards & Reports
- Click Manage to see all available dashboards
- VCF Operations ships with many predefined dashboards
13.2 Key Predefined Dashboards
Overview:
- Geo-map view of globally deployed VCF instances
- Inventory sections: VCF domains, datacenters, clusters, ESX hosts, VMs
- Diagnostic Findings correlating issues across infrastructure
- Security risk highlights based on CVE and VMSA advisories
Configuration Dashboards:
- Cluster Configuration - vSphere cluster configuration requiring attention
- ESXi Configuration - ESXi host configurations needing review
- Network Configuration - vSphere distributed switch configurations
- VM Configuration - Virtual machine configurations
- vSAN Configuration - vSAN configuration details
- Workload Management - Supervisor Clusters and Namespaces
Performance Dashboards:
- vSAN OSA Performance - read/write latency, contention, utilization
- vSAN ESA Performance - for Express Storage Architecture
- Out-of-the-box infrastructure health monitoring
Capacity Dashboards:
- Time remaining before resources are projected to run out
- VM-level capacity analysis with drill-down
Storage Operations:
- Active storage alerts (critical and warning)
- vSAN cluster capacity usage and health scores
- Performance KPIs
Security Operations Dashboard:
- User authentication and permissions overview
- Host and VM encryption status
- vSAN cluster encryption
- CVE violation advisories
- Certificate health monitoring
Skyline Operational Overview:
- Proactive monitoring and recommendation dashboard
Energy Efficiency Dashboards:
- Energy Efficiency with Virtualization
- Energy Efficient Clusters and Infrastructure
- Environmental Impact of Idle VMs
13.3 Create a New Dashboard
- From the left menu, click Dashboards & Reports
- Click New Dashboard
- Dashboard Name: Enter a name
- Using a forward slash (
/) in the name creates a folder hierarchy (e.g., Lab/Overview)
- The dashboard canvas opens for widget placement
- On the dashboard canvas, click Add Widget or drag from the widget panel
- Available widget types:
- Metric Chart - visualize specific metrics over time
- View - display tabular data
- Health Chart - show health status
- Sparkline - compact trend visualization
- Mashup Chart - combine multiple data sources
- Rolling View - auto-scrolling data display
- For each widget, click the pencil icon to configure:
- Select the data source (object type, specific object)
- Choose metrics to display
- Set time range
- Configure visual options
- Widget Interactions: Set data from one widget as a filter to display related information on another widget
13.5 Share and Manage Dashboards
- Share: Click the share icon to share with specific user groups
- Favorites: Mark frequently used dashboards as favorites
- Dashboard Home: Set a dashboard as your home page (up to 5 dashboards can be added to Product Home)
- Time Range: Default is 6 hours; options include 1h, 6h, 24h, 7d, or custom
Phase 14: Deploy VCF Operations for Logs
VCF Operations for Logs is not deployed automatically during initial bringup. It must be deployed as a Day 2 operation.
Known Issue — Self-Signed Certificate SAN Mismatch: The Fleet Management deployment wizard's "Generate self-signed certificate" option may produce a certificate whose SAN entries do not match the node FQDN/IP, causing a precheck error: "Certificate validation for component vrli:vrli-master — The hosts in the certificate doesn't match with the provided/product hosts." The workaround is to generate a custom certificate with OpenSSL and import it. See Phase 14.1a.
14.1 Deploy via Fleet Management
Navigation: VCF Operations > Fleet Management > Lifecycle > VCF Management > Components
Prerequisites: Depot must be configured (Phase 4) and the operations-logs binary must be downloaded via Binary Management > INSTALL BINARIES tab.
Note: The operations-logs OVA (Operations-Logs-Appliance-9.0.1.0.24960345.ova) and PAK must be present in the offline depot under PROD\COMP\VRLI\. If the download fails with 404, verify the files exist in the depot directory and the HTTPS depot server is running.
- Navigate to Fleet Management > Lifecycle > VCF Management
- Under the Components section, click Add next to
operations-logs
- Select New Installation
- Select deployment type: Simple for lab environments
- Certificate Configuration:
- Recommended: Import a custom certificate generated with proper SANs (see Phase 14.1a)
- Alternative: Generate self-signed certificate (may fail precheck — see warning above)
- VM Location & OS Configuration:
- Select vCenter, cluster, VM network, and datastore
- Click Edit Server Selection to choose DNS and NTP servers
- Component Configuration:
- Click Add Password to set default password (15+ characters, must include special characters
!@#$%^&*)
- Node Size: Small (for lab)
- FIPS Mode: Disable for lab
- VM Compatibility: Update to latest hardware version
- Time Sync: Select NTP servers
- Enter VM Name, FQDN, and IP Address for the node
- Run Precheck validation
- Click Deploy
- Monitor deployment until completion
14.1a Certificate Workaround: Generate Custom Certificate
If the wizard's self-signed certificate fails precheck validation, generate a proper certificate with OpenSSL on SDDC Manager (SSH as vcf, then su - to root):
Step 1 — Verify DNS resolution:
nslookup logs.lab.local 192.168.1.230
nslookup 192.168.1.242 192.168.1.230
ping -c 2 logs.lab.local
Step 2 — Create OpenSSL config and generate certificate:
cat > /tmp/vrli-cert.cnf << 'EOF'
[req]
default_bits = 4096
prompt = no
default_md = sha256
distinguished_name = dn
req_extensions = v3_req
x509_extensions = v3_req
[dn]
C = US
ST = California
L = Lab
O = Lab
OU = VCF
CN = logs.lab.local
[v3_req]
basicConstraints = CA:FALSE
keyUsage = digitalSignature, keyEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = @alt_names
[alt_names]
DNS.1 = logs.lab.local
DNS.2 = logs
IP.1 = 192.168.1.242
EOF
openssl req -x509 -nodes -days 730 -newkey rsa:4096 \
-keyout /tmp/vrli.key -out /tmp/vrli.crt \
-config /tmp/vrli-cert.cnf
Step 3 — Verify SANs are correct:
openssl x509 -in /tmp/vrli.crt -noout -text | grep -A5 "Subject Alternative Name"
Step 4 — Transfer cert to workstation:
Display the certificate and key, then copy-paste into local files (vrli.crt and vrli.key):
cat /tmp/vrli.crt
cat /tmp/vrli.key
Step 5 — Import in Fleet Management wizard:
- In the deployment wizard's Certificate step, select Import
- Upload
vrli.crt (certificate) and vrli.key (private key) — must be PEM format
- Continue to Component Configuration and complete the deployment as described in Phase 14.1
- Run Precheck — should pass with the custom certificate
14.2 Initial Configuration (Manual OVA Deployment)
If deployed manually via OVA rather than Fleet Management:
- Open browser to
https://<logs-appliance-FQDN>
- Select START NEW DEPLOYMENT
- Set Admin Password: Enter password for the admin account (linked to Super Admin role)
- Optionally provide an email address
- Time Configuration: Set NTP synchronization settings
- Click TEST to verify NTP connectivity
- Click SAVE AND CONTINUE
- SMTP Configuration: (Optional) Configure email server for alerts
- Skip if not needed in lab - click SAVE AND CONTINUE
- SSL Certificate: (Optional) Upload custom SSL certificate in PEM format
- Skip to use default self-signed certificate - click SAVE AND CONTINUE
- Configuration is complete
14.3 Integrate with VCF Operations
This step registers the VCF Operations for Logs appliance with VCF Operations so that logs appear in the Infrastructure Operations > Analyze dashboards.
Navigation: VCF Operations UI (https://vcf-ops.lab.local) > Administration > Control Panel > Operations-Logs Appliance Integration
Prerequisites:
- VCF Operations for Logs is deployed and accessible at
https://logs.lab.local
- Port 9543 (SSL) is open from VCF Operations to the logs appliance
- Admin credentials for VCF Operations for Logs
Steps:
- Log in to VCF Operations at
https://vcf-ops.lab.local
- Navigate to Administration > Control Panel
- Locate the Operations-Logs Appliance Integration tile (may also appear as Log Management)
- Click Edit or Configure on the tile
- Enter the connection details:
- Host:
logs.lab.local (or 192.168.1.242)
- Port:
9543 (default SSL port for log ingestion API)
- Username:
admin
- Password: The admin password set during VCF Operations for Logs deployment
- Click Validate Connection — wait for the green checkmark confirming connectivity
- Click Save
Verification:
- The tile should show Connected status
- Navigate to Infrastructure Operations > Analyze — the log analysis page should now be accessible (it may show "No data" until log collection is enabled in Phase 14.4)
Troubleshooting: If validation fails, verify: (1) DNS resolution of logs.lab.local from the VCF Operations appliance, (2) port 9543 is reachable (curl -k https://logs.lab.local:9543), (3) the admin password is correct. If the logs appliance was deployed via Fleet Management, the admin account may use the password set during the Fleet Management deployment wizard.
14.4 Enable Log Collection
After integrating the logs appliance (Phase 14.3), enable centralized log collection for vCenter, ESXi hosts, and NSX. This configures the VCF components to forward syslog/event data to VCF Operations for Logs.
Method A — Centralized Log Collection Page (Recommended)
Navigation: VCF Operations > Infrastructure Operations > Configurations > Log Collection
- Navigate to Infrastructure Operations > Configurations
- Click the Log Collection card
- You will see cards for each component type:
- vCenter — collects events, tasks, and alarms
- ESX — configures ESXi host syslog forwarding
- VCF Operations — platform self-logging
- VCF Operations for Networks — network component logging (if deployed)
- For each component, click Edit log sources
- Toggle log collection On for the desired instances (e.g.,
vcenter.lab.local)
- Click Save
Note: ESXi host syslog forwarding is configured automatically when you enable vCenter log collection — the setting propagates to all hosts managed by that vCenter.
Method B — Via VCF Account (vcf-lab)
Navigation: VCF Operations > Administration > Integrations > Accounts
- Navigate to Administration > Integrations > Accounts
- Locate the vcf-lab account (VMware Cloud Foundation Adapter — status: Collecting)
- Click the ellipsis (three dots) > Edit
- Select the Domains tab
- Expand the mgmt domain — you should see:
vcenter.lab.local — VMware vCenter
vcenter.lab.local - vSAN — vSAN Adapter
nsx-vip.lab.local — NSX-T Adapter
- Click Activate Log Collection (checkbox or toggle for the mgmt domain)
- Click Save
- Verify: the Accounts page should show the log collection status updating
Verification:
- Wait 5–10 minutes for initial log ingestion
- Navigate to Infrastructure Operations > Analyze — search for recent logs
- Check VCF Operations for Logs UI at
https://logs.lab.local > Explore Logs — you should see incoming log entries from vCenter and ESXi hosts
- On the Accounts page, the vcf-lab account should show log collection as active
Note: The log collection configuration for vCenter adapter instances is NOT included in configuration export/import operations. If you ever restore a VCF Operations backup, you must re-enable log collection manually.
14.4a Fix Stopped Adapters (If Present)
If the Accounts page shows stopped adapters, investigate before enabling log collection:
| Adapter |
Possible Cause |
Fix |
vcenter.lab.local - vSAN — Stopped |
Credentials expired or vSAN health service not responding |
Edit account > re-enter vCenter credentials > Save |
nsx-vip.lab.local — Stopped |
NSX certificate was replaced (Phase 42-43) but adapter still trusts old cert |
Edit account > Accept Certificate > re-enter NSX admin credentials > Save |
| NSX "Aria Admin" — Warning |
Service account password mismatch |
Check NSX UI > System > User Management > verify the audit or admin user credentials match what VCF Operations has |
Steps to re-activate a stopped adapter:
- On the Accounts page, click the ellipsis next to the stopped adapter > Edit
- Re-enter the credentials (username/password)
- If prompted about certificate trust, click Accept Certificate to trust the new cert
- Click Validate Connection
- Click Save
- The adapter should transition from Stopped to Collecting within a few minutes
As of VCF 9.0, SDDC Manager log forwarding is not configured automatically through the centralized log collection feature. It must be set up manually via syslog configuration.
Option A — Configure Syslog via SDDC Manager CLI
SSH to SDDC Manager as vcf, then su - to root:
curl -k https://logs.lab.local:9543
cat /etc/rsyslog.d/*.conf | grep -i logs.lab.local
cat > /etc/rsyslog.d/90-vrli.conf << 'EOF'
*.* @@logs.lab.local:514
EOF
systemctl restart rsyslog
systemctl status rsyslog
Option B — Deploy VCF Operations for Logs Agent
- Download the
liagent (Log Insight Agent) package from the VCF Operations for Logs UI:
- Log in to
https://logs.lab.local
- Navigate to Administration > Agents
- Download the Linux RPM agent package
- Transfer to SDDC Manager:
ssh vcf@sddc-manager.lab.local "cat > /tmp/VMware-Log-Insight-Agent.rpm" < VMware-Log-Insight-Agent.rpm
- SSH to SDDC Manager, switch to root, and install:
rpm -ivh /tmp/VMware-Log-Insight-Agent.rpm
- Configure the agent to point to VCF Operations for Logs:
cat > /var/lib/loginsight-agent/liagent.ini << 'EOF'
[server]
hostname=logs.lab.local
port=9543
ssl=yes
ssl_accept_any=yes
[filelog|sddc-manager-syslog]
directory=/var/log
include=*.log;messages;syslog
EOF
- Start the agent:
systemctl enable liagentd
systemctl start liagentd
systemctl status liagentd
Verification:
- On VCF Operations for Logs (
https://logs.lab.local), navigate to Explore Logs
- Filter by source:
sddc-manager.lab.local or 192.168.1.241
- You should see log entries appearing within a few minutes
Note: Ensure port 9543 (SSL) from SDDC Manager (192.168.1.241) to VCF Operations for Logs (192.168.1.242) is open. In this nested lab environment, both VMs are on the same flat 192.168.1.0/24 network, so no firewall rules should be needed.
Phase 15: NSX Monitoring Integration
15.1 Automatic Discovery via VCF Account
When you configure a VCF Cloud Account (Phase 5), NSX adapters are automatically discovered and configured for all domains that have NSX deployed. No manual configuration is needed.
15.2 Verify NSX Adapter Status
Navigation: VCF Operations > Administration > Integrations > Accounts
- Navigate to the Accounts tab
- Expand the VMware Cloud Foundation account
- Find the NSX adapter listed under the management domain
- Verify the collection status shows green "Collecting"
15.3 NSX Monitoring Features
The NSX adapter retrieves alerts and findings from NSX into VCF Operations. Supported NSX versions: 3.0 and above.
VCF 9.0 includes enhanced NSX monitoring:
- Enhanced NSX-T Edge node monitoring with new edge node metrics sub-groups
- Network operations overview with vSphere networking and NSX inventory summary
- Visibility into network alerts and trends
For deeper network monitoring capabilities:
Navigation: VCF Operations > Administration > Integrations > Repository
- Navigate to Administration > Integrations > Repository tab
- Find the VCF Operations for Networks management pack in Available Integrations
- Click Activate on the management pack card
- After activation, click Add Account to configure the adapter instance
- Enter the connection details for your VCF Operations for Networks instance
Important: Starting from VCF 9.0, only ONE VCF Operations for Networks instance integration is supported. During deployment, VCF Operations Fleet Management integrates VCF Operations and VCF Operations for Networks automatically.
Phase 16: vSAN Monitoring
16.1 Automatic vSAN Discovery
When you configure a VCF account or vCenter account with a vSAN-enabled cluster, vSAN monitoring data is automatically collected. No separate configuration is required.
16.2 Access vSAN Storage Operations Dashboard
Navigation: VCF Operations > Infrastructure Operations > Storage Operations
- Navigate to Infrastructure Operations > Storage Operations
- The centralized storage dashboard shows both vSAN and non-vSAN storage types
- View:
- vSAN Cluster Health Score
- Cluster type classification
- Performance metrics: Hover on any cluster pin to see IOPS, Latency, and Throughput
- vSAN Clusters table with detailed cluster information
- On the Storage Operations page, click View Diagnostics or Run New Diagnostics
- Select a cluster
- Choose diagnostic mode:
- Troubleshooting: For clusters with active workloads - identifies performance issues
- Benchmarking and Optimizing: For new clusters before deploying workloads
- Review results: cluster information, diagnostic results, remediation steps, and suggestions
Note: Diagnostic reports are available for the past 7 days only. Diagnostics run on both vSAN OSA and ESA HCI architectures.
16.4 Predefined vSAN Dashboards
Navigate to Infrastructure Operations > Dashboards & Reports and find:
- vSAN OSA Performance Dashboard - read/write latency, contention, utilization across VMs
- vSAN ESA Performance Dashboard - same metrics for Express Storage Architecture
Phase 17: Backup Configuration
17.1 Fleet-Level Backups
Navigation: VCF Operations > Fleet Management > Lifecycle > Settings > SFTP Settings
- Navigate to Fleet Management > Lifecycle > Settings
- Click SFTP Settings
- Configure the SFTP server details:
- SFTP Host: IP or FQDN of your SFTP server
- Port: Default 22
- Username: SFTP account username
- Password: SFTP account password
- Path: Directory path for backup storage
- Click Test Connection to verify
- Click Save
- Navigate to Backup Settings and configure the backup schedule:
- Backup frequency: Daily, Weekly, or Custom
- Retention: Number of backups to keep
17.2 Instance-Level Backups
Navigation: VCF Operations > Inventory > VCF Instance > Actions > Manage VCF Instance Settings
- Navigate to Inventory > Select your VCF Instance
- Click Actions > Manage VCF Instance Settings
- Click Backup Settings
- Configure instance-specific backup parameters
- Click Save
SDDC Manager to VCF Operations Task Migration Reference
The following tasks have moved from SDDC Manager to VCF Operations in VCF 9.0:
| Task | VCF 9.0 Location |
| DNS/NTP Configuration | Inventory > VCF Instance > Actions > Manage VCF Instance Settings > Network Settings |
| Workload Domain Creation | Inventory > VCF Instance > Add Workload Domain |
| Backup Configuration | Fleet Management > Lifecycle > Settings |
| Certificate Authority | Fleet Management > Certificates > Configure CA |
| Certificate Management | Fleet Management > Certificates |
| Password Management | Fleet Management > Passwords |
| Network Pools | vCenter: Global Inventory > Hosts > Network Pools |
| Host Commissioning | vCenter: Global Inventory > Unassigned Hosts |
| Cluster Creation | vCenter: New SDDC Cluster |
| Licensing | License Management (single file) |
Critical Note: While the SDDC Manager UI is still present in VCF 9.0, performing tasks there does not immediately sync to VCF Operations. Changes depend on scheduled synchronization intervals. Use VCF Operations as the primary interface.
Post-Configuration Verification Checklist
License Verification
- Navigate to License Management - confirm license is valid and not in evaluation mode
- Verify core count matches your subscription
- Set a calendar reminder for usage file submission (within 180 days)
Data Collection Verification
- Administration > Integrations > Accounts - all adapters showing green "Collecting" status
- VCF account, vCenter adapter, NSX adapter, and vSAN adapter all collecting
- Wait at least 30 minutes after initial configuration for full data population
Fleet Management Verification
- Fleet Management dashboard shows all components as healthy
- Fleet Management appliance shows "Connected" status
- Depot configuration shows connected to offline depot
- Binary Management shows available binaries
Infrastructure Operations Verification
- Infrastructure Operations > VCF Instances - shows your VCF instance with all domains
- All ESXi hosts (esxi01-04) visible in inventory
- All VMs discovered and monitored
- vSAN datastore visible and metrics collecting
- NSX components visible
VCF Health Verification
- Infrastructure Operations > VCF Health - review all health checks
- Check for certificate expiration warnings
- Check NTP synchronization status
- Check DNS reverse lookup status
Security and Compliance Verification
- Security & Compliance > Compliance - SDDC benchmarks activated
- Compliance scores generating for hosts, VMs, and network objects
Alerts Verification
- Infrastructure Operations > Alerts - review any initial alerts
- Notification plug-ins configured and activated (if applicable)
- Test at least one notification rule
Password Management Verification
- Fleet Management > Passwords - all accounts showing valid status
- No expired or soon-to-expire passwords
Certificate Management Verification
- Fleet Management > Certificates - all certificates visible
- Review expiration dates and plan for renewal
Known Issues and Gotchas (VCF Operations 9.0.1)
- Relationships not updated after 2nd collection cycle in management packs built with the Management Pack Builder
- Custom network adapters do not start after VCF Operations and VCF Operations for Networks are updated to VCF 9.0 - workaround required
- VCF Operations for Networks stops collecting metrics when NSX is being upgraded from 4.2.1 to 9.0
- Manually stopped adapter instances start collecting after a management pack upgrade
- Binary downloads from depot may intermittently fail - retry the download if it disappears
- Fleet Management appliance root password must be 15+ characters or precheck will fail
- Only one VCF Operations for Networks instance is supported starting in VCF 9.0
- Log collection configuration for vCenter adapters is NOT included in configuration export/import operations
- In disconnected mode, if license usage data is not submitted within 180 days, licenses expire, hosts disconnect from vCenter, and workload operations are blocked
- Do not configure NTP during OVF deployment (KB 374792) - configure it in the setup wizard instead, as it can cause first-boot failures
- Password rotation options from VCF 5.x are not fully available in VCF Operations yet - use SDDC Manager API as workaround for some rotation tasks
- After workload domain redeployment, the vCenter/vSAN adapter may enter a Warning state
- Infrastructure Health Adapter "no data receiving" — If the System Managed Credential for SDDC Manager is empty or stale, the health adapter silently fails to collect. Fix: Administration → Integrations → SDDC Manager → ROTATE credential (or uncheck System Managed and set manually) → VALIDATE CONNECTION → SAVE → reboot appliance. The adapter's UI stop/start alone is insufficient; a full appliance reboot is required for the adapter to pick up the new credential
- Adapter log paths changed in VCF Ops 9.x — Logs are at
/storage/log/vcops/log/adapters/<AdapterName>/, NOT the legacy /var/log/vmware/vcops/adapters/ path from older Aria Operations versions
- NSX adapter warnings when NSX is powered off — The health adapter logs PKIX and connectivity errors every collection cycle if NSX Manager is unreachable. These are expected and clear automatically once NSX is powered back on
- NSX adapter PKIX cert trust failure — VCF Operations doesn't trust NSX's self-signed cert. Fix: export NSX cert with
openssl s_client, import into /usr/java/jre-vmware-17/lib/security/cacerts (password changeit) with keytool -importcert, reboot appliance. The legacy JRE path /usr/java/jre-vmware/ does not exist on VCF Ops 9.x
- NSX System Managed Credential ROTATE fails — Unlike SDDC Manager, the NSX System Managed Credential often doesn't work. Workaround: uncheck System Managed, manually create an NSX credential (admin / password), VALIDATE, SAVE
- Two separate NSX adapters exist — VCF section has
nsx-vip.lab.local (uses VIP), NSX section has Aria Admin (uses node FQDN nsx-manager.lab.local). Both need credentials configured. The Aria Admin adapter can collect via node FQDN even when the VIP is offline during NSX boot
- Credential Update/Rotate/Remediate fails — cascading failure — A failed credential operation (e.g., NSX unreachable during boot storm) triggers a cascade: NSX cluster stuck in
ACTIVATING or ERROR state in platform.nsxt table → stale exclusive locks in platform.lock → unresolved tasks accumulate in platform.task_metadata (resolved=false) → each retry from the UI adds more stuck tasks and locks. Even after NSX fully recovers, the stuck state persists. The SDDC Manager API cannot cancel stuck tasks (returns TA_TASK_CAN_NOT_BE_RETRIED). Fix: SSH to SDDC Manager, access PostgreSQL (platform database), fix nsxt status to ACTIVE, delete from lock table, mark task_metadata as resolved, clear task_lock, then restart operationsmanager. Always set PAGER=cat before running psql to prevent pager traps in remote sessions. Full procedure in the Troubleshooting Handbook Section 10
Best Practices
Sizing
- VCF Operations comes in 5 sizes: Extra Small, Small, Medium, Large, and Extra Large
- If you have more than 1 node, all nodes must be scaled equally - no mixing of different sizes
- Network features (Network Verification, Assurance, Flow-Based Application Discovery) are only available for Extra Large brick size
Operational Best Practices
- Use VCF Operations as the primary interface - Do not rely on the deprecated SDDC Manager UI
- Automate wherever possible - Manual tweaks undermine VCF's infrastructure-as-code approach
- Standardize - Embrace VCF conventions and resist customizing outside supported parameters
- Monitor NTP carefully - Maximum time skew between platform nodes must be less than 30 seconds
- Plan certificate automation - Leverage VCF Operations auto-renewal for certificate management
- Configure compliance monitoring - Enable pre-defined benchmarks (PCI, ISO, HIPAA, FISMA, DISA, CIS)
- Use configuration drift detection - Leverage fleet management template-based drift capabilities
- Plan CMDB integration - Ensure VCF components and workloads are accurately populated in your Configuration Management Database
- Integrate with ITSM - Connect VCF monitoring and alerts with your IT Service Management platform
- Feed into enterprise monitoring - Push VCF operational data into overarching enterprise dashboards
Alphabetical Index
| Topic |
Section |
| Active Directory |
Phase 10, 10.3, 10.5 |
| Alerts |
Phase 12, 12.6, Checklist |
| Authentication |
Phase 10, 10.1, 10.2 |
| Backup |
Phase 17, 17.1, 17.2 |
| Benchmarks |
Phase 11, 11.2, 11.3 |
| Binary Management |
Phase 4, 4.2, Checklist |
| CA (Certificate Authority) |
Phase 8, 8.2, 8.3 |
| CEIP |
Phase 1, 1.3 |
| Certificate Management |
Phase 8, 8.1, 8.4, 8.5, Checklist |
| Compliance |
Phase 11, 11.1, 11.2, 11.3, Checklist |
| Configuration Drift |
Phase 11, 11.4, Best Practices |
| Custom Dashboards |
Phase 13, 13.3, 13.4 |
| Data Collection |
Phase 5, 5.2, Phase 7, 7.1, Checklist |
| Depot Configuration |
Phase 4, 4.1, 4.3, Checklist |
| DISA |
Phase 11, 11.3 |
| Drift Detection |
Phase 11, 11.4 |
| Email Notifications |
Phase 12, 12.2, 12.6 |
| Fleet Management |
Phase 3, 3.1, 3.2, Checklist |
| HIPAA |
Phase 11, 11.3 |
| Identity Broker |
Phase 10, 10.1 |
| Known Issues |
Known Issues |
| License Registration |
Phase 2, 2.1, 2.2, 2.3 |
| License Usage Reporting |
Phase 2, 2.5, Checklist |
| Log Collection |
Phase 14, 14.4, 14.5 |
| Log Forwarding |
Phase 14, 14.5 |
| Microsoft CA |
Phase 8, 8.2 |
| Monitoring |
Phase 7, Phase 15, Phase 16, Best Practices |
| Network Pools |
Migration Reference |
| Notifications |
Phase 12, 12.1, 12.6, Checklist |
| NSX Adapter |
Phase 15, 15.2, 15.3 |
| NSX Monitoring |
Phase 15, 15.1, 15.3, Checklist |
| Offline Depot |
Phase 4, 4.1, 4.3 |
| OpenSSL CA |
Phase 8, 8.3 |
| PAK Files |
Phase 11, 11.3 |
| Password Management |
Phase 9, 9.1, 9.3, Checklist |
| Password Remediation |
Phase 9, 9.5 |
| Password Rotation |
Phase 9, 9.4 |
| PCI DSS |
Phase 11, 11.3 |
| Performance Diagnostics |
Phase 16, 16.3 |
| Predefined Dashboards |
Phase 13, 13.1, 13.2, 16.4 |
| SDDC Manager |
Phase 4, 4.3, 14.5, Migration Reference |
| SFTP |
Phase 17, 17.1 |
| SNMP |
Phase 12, 12.3 |
| SSO |
Phase 10, 10.1, 10.2 |
| Storage Operations |
Phase 16, 16.2, 13.2 |
| Task Migration |
Migration Reference |
| vCenter Account |
Phase 6, 6.1 |
| VCF Cloud Account |
Phase 5, 5.1, 5.3 |
| VCF Health |
Phase 7, 7.3, Checklist |
| VCF Operations for Logs |
Phase 14, 14.1, 14.2, 14.3 |
| VCF Operations for Networks |
Phase 15, 15.4, Known Issues |
| vSAN Monitoring |
Phase 16, 16.1, 16.2 |
| vSAN Performance |
Phase 16, 16.3, 16.4 |
| Webhooks |
Phase 12, 12.4 |
| Widgets |
Phase 13, 13.4 |
| Workload Domains |
Migration Reference, Checklist |
References
- VMware Cloud Foundation 9.0 Documentation:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0.html
- VCF Operations 9.0.1 Release Notes:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/release-notes/vmware-cloud-foundation-9-0-1-release-notes/vcf-operations-9-0-1-0000.html
- VCF Operations Detailed Design:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/design/design-library/vcf-operations-design.html
- VCF Operations Sizing Guidelines (KB 397782):
https://knowledge.broadcom.com/external/article/397782
- Fleet Management Overview:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/overview-of-vmware-cloud-foundation-9/what-is-vmware-cloud-foundation-and-vmware-vsphere-foundation/vcf-operations-overview/fleet-management.html
- Configuring a VCF Account:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/infrastructure-operations/connect-to-data-sources/vmware-cloud-foundation.html
- Managing Certificates:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/fleet-management/certificate-management-9-0.html
- Managing Passwords:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/fleet-management/manage-passwords.html
- Licensing Overview:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/licensing/licensing-overview.html
- Notifications:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/infrastructure-operations/configuring-alerts-and-actions/notifications.html
- Dashboards:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/infrastructure-operations/dashboards-and-widgets/using-dashboards.html
- Storage Operations:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/infrastructure-operations/monitoring-storage-operations(1).html
- VCF Operations for Logs Deployment:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/deployment/deploying-a-new-vmware-cloud-foundation-or-vmware-vsphere-foundation-private-cloud-/manual-deployment-of-components-to-complete-your-vcf-platform/vcf-operations-for-logs-for-vvf-clients/start-a-new-vcf-operations-for-logs-deployment.html
- Compliance Benchmarks:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/security-and-compliance/viewing-and-configuring-compliance/measuring-compliance-of-objects.html
- Drift Detection:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-9-0-and-later/9-0/fleet-management/what-is-configuration-management/using-the-configuration-management-dashboard/scheduling-drift-detection.html
(c) 2026 Virtual Control LLC. All rights reserved.