WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
    • VMware Cloud Foundation 9
  • VKS
  • Homelab
    • Hardware Options
    • Hardware Reviews
    • Lab Deployment Scripts
    • Nested Virtualization
    • Homelab Podcasts
  • VMware Nostalgia
  • Apple
You are here: Home / vSphere Supervisor / Quick Tip - Configuring vSphere Supervisor Services with self-signed container registry

Quick Tip - Configuring vSphere Supervisor Services with self-signed container registry

08.18.2025 by William Lam // 1 Comment

When deploying additional vSphere Supervisor Services including the new Data Services Operator enabling Database-as-a-Service (DBaaS), the container images that are used are hosted on Broadcom's container registry (projects.packages.broadcom.com).

For air-gapped deployments where you need to use an internal container registry, there is a process to relocate the Broadcom's container images into your own container registry, which has been possible since vSphere 8.0 Update 3.

While attempting to install the DSM Operator Supervisor Service, which had already been relocated into my standalone Harbor registry, I ran into the classic issue where the self-signed TLS certificate could not be trusted as you can see from the screenshot below.


While the validation error message was clear on why the installation will fail, it did not provide any details on how to actually add the trust the self-signed TLS certificate from my container registry.

After checking internally with a few folks, I was able to resolve this, but it took several attempts. I have already made a request to improve the official documentation to make these steps clearer.

Step 1 - Install the imgpkg utility on your local desktop that will have network connectivity to the Broadcom's public container registry, please refer to the Broadcom documentation HERE for more details.

Step 2 - Use the imgpkg utility to download the desired container image and save that locally as a tar file. The example below will download the latest DSM Operator Service:

imgpkg copy -b projects.packages.broadcom.com/dsm-consumption-operator/dsm-consumption-operator-supervisor:9.0.0.0.24665381 --to-tar dsm-consumption-operator-supervisor:9.0.0.0.24665381.tar --cosign-signatures
imgpkg copy -b projects.packages.broadcom.com/dsm-consumption-operator/consumption-operator:9.0.0.0.24665381 --to-tar consumption-operator:9.0.0.0.24665381.tar --cosign-signatures
imgpkg copy -b projects.packages.broadcom.com/dsm-consumption-operator/kube-webhook-certgen:9.0.0.0.24665381 --to-tar kube-webhook-certgen:9.0.0.0.24665381.tar --cosign-signatures

Step 3 - To import the container image tar file into your container registry, you will need credentials from your registry that will allow you to import the container. Since I am using Harbor as my container registry, I needed to also create a new Harbor Project which I have named dsm and I am using the default admin credentials. In addition, we also need a copy of the root CA certificate of your container registry, which you can retrieve as part of your initial setup.

Note: While there are some references to the Harbor Systeminfo API that can return the Root CA (e.g. https://registry.vcf.lab/api/v2.0/systeminfo/getcert), but that did not work for me and I recieved cert not found in path: /etc/core/ca/ca.crt error.

The following command will defined two imgpkg environmental variables that contains your container registry for uploading our DSM Operator service tar and the command to perform the actual copy, which will require the root CA certificate of your container registry:

export IMGPKG_PASSWORD=FILL_ME_IN
imgpkg copy --tar dsm-consumption-operator-supervisor:9.0.0.0.24665381.tar --to-repo registry.vcf.lab/dsm/dsm-consumption-operator-supervisor --cosign-signatures --registry-ca-cert-path harbor-ca.crt
imgpkg copy --tar consumption-operator:9.0.0.0.24665381.tar --to-repo registry.vcf.lab/dsm/consumption-operator--cosign-signatures --registry-ca-cert-path harbor-ca.crt
imgpkg copy --tar kube-webhook-certgen:9.0.0.0.24665381.tar --to-repo registry.vcf.lab/dsm/kube-webhook-certgen --cosign-signatures --registry-ca-cert-path harbor-ca.crt

Step 4 - Finally, for a vSphere Supervisor to trust a container registry that has a self-signed TLS certificate, we need to add the container registry information including the root CA certificate. To do so, navigate to Supervisor Management->Supervisors->(select Supervisor)->Container Registries and click Add Registry and provide all required inputs.

If your container registry requires credentials to download a container, you will need to provide that information as shown in the example below.


Once your container registry has been added, when you go and deploy and configure a vSphere Supervisor Service where the container is hosted in your own container registry that contains a self-signed TLS certificate, it will automatically trust the certificate and proceed with the installation.

Categories // vSphere Supervisor Tags // Harbor, vSphere Supervisor

Comments

  1. *protectedChang WANG says

    08/18/2025 at 5:51 pm

    Thanks for the doc.
    It took me a weekend to install supervisor service from my private harbor after I fetch different information from different official document.
    Yes, I believe that we need to optimize our document.

    Thanks William

    Reply

Thanks for the comment!Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • VCF 9.0 Fleet Latency Diagram 12/11/2025
  • Quick Tip - Downloading VMware Cloud Foundation (VCF) Consumption CLI for Air-Gapped Environments 12/10/2025
  • Automating VCF Operations Objects & Metrics Reporting 12/08/2025
  • Quick Tip - Using VCF CLI to login to vSphere Supervisor when configured with VCF Automation 12/05/2025
  • Automating the Reporting of VCF Workload Domain Import Pre-Check Validations 12/04/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.

To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...