Symptoms:
The OVA deployment fails and the vCenter web client vsphere_client_virgo.log may report similar.
===========vsphere_client_virgo.log===========
[yyyy-MM-DDTHH:mm:ss.SSS-04:00] [ERROR] http-bio-9090-exec-10 70014733 103733 203506 c.v.vsphere.client.provisioning.ovf.impl.OvfDeployServiceImpl OVF import session entered ERROR state. com.vmware.vsphere.client.provisioning.ovf.OvfSessionError: Transfer failed: The OVF descriptor is not available.
==========End Log==========
Location of VMware vCenter Server 6.0 log files (2110014)
The OVA deployment succeeds but the container management portal does not work.
The admiral.service reports the following. The admiral.service logs are located on the VIC appliance VM and are accessible with the following command journalctl -u admiral.service from the shell.
===========journal -u admiral.service===========
MMM dd hh:mm:ss FQDN.domain.local start_admiral.sh[735]: [5][I][yyyy-MM-DD HH:mm:ss.SSSZ][1][ServerX509TrustManager][<init>][Adding trust store 'custom-CA' (path: '/tmp/trusted_certificates.jks') to the trust manager...]
MMM dd hh:mm:ss FQDN.domain.local start_admiral.sh[735]: [6][W][yyyy-MM-DD HH:mm:ss.SSSZ][1][Utils][logWarning][Failed to read PKCS#8
PEM file. file=/tmp/server.key]
==========End Log==========
VMware vSphere Integrated Containers 1.x
Certificate format is incorrect or corrupt.
Validate that the private key used for the Management Portal is in PKCS #8 PrivateKeyInfo UNEncrypted Format.
The key file show following header and footer.
-----BEGIN PRIVATE KEY-----
### lines omitted for brevity ###
-----END PRIVATE KEY-----
If the key is not in the correct format, reach out to the security personnel responsible for key generation to have the key converted or re-generated in the needed format.
Note: The registry and file server uses the PKCS #1 SSLeay format. These keys can be identified by the following header and footer.
-----BEGIN RSA PRIVATE KEY-----
### lines omitted for brevity ###
-----END RSA PRIVATE KEY-----
If the key is in PKCS #1 SSLeay format then the key can be converted using tools like openssl and used for the management portal. The following example shows how to do this in openssl.
openssl pkcs8 -in keyfile.pem -topk8 -out convertedkey.pem -nocrypt