This article describes the remote console traffic and procedures when establishing connections to Aria Automation managed machines.
Symptoms:
Cannot establish a remote console connection. Verify that the machine is powered on. If the server has a self-signed certificate, you might need to accept the certificate, then close and retry the connection.
or
Http failure response : 500 OK
VMware Aria Automation 8.x
VMRC connectivity utilized in Aria Automation may stop working following vCenter upgrade to 8.x or using specific Aria Automation 8.10.2 or 8.11.0 versions which support only WebMKS.
There are two methods to connect to VMRC. Older MKS and a newer WebMKS.
In addition to establish secure VMRC connectivity you can leverage either:
Aria Automation on-prem versions 8.10.2 and 8.11.0 support only WebMKS, all other versions support both methods of VMRC connectivity.
Table of supported methods
The Table below outlines the required Aria Automation and vCenter console proxy configurations based on the product versions to allow successful VMRC connectivity.
Necessary steps to configure console proxies to allow secure VMRC connectivity:
You may encounter a similar issue with VMware Aria Automation version 8.18 when using VMware vCenter Server 7.0u3 versions. As shown in the attached screenshot, after clicking "Accept the certificate," a new browser tab opens and navigates to the VMware Aria Automation URL. Refreshing the remote console page will prompt the "Accept the certificate" option again. This issue occurs because the cloud account state does not contain the certificate details.
To resolve this, follow the steps outlined in the KB to update the cloud account with vCenter's certificate.
https://knowledge.broadcom.com/external/article?legacyId=88531
On-premise Aria Automation installs:
1.1 Review existing on-prem Aria Automation console proxy configuration following the steps in workaround section 2.1.
1.2 Using the table above chose the required console proxy status based on your Aria Automation and vCenter versions.
1.3 Steps to disable or enable Aria Automation console proxy are covered in workaround sections 2.2 or 2.3.
1.4 vCenter console proxy is not configured and disabled by default. To enable it you can follow workaround section 2.4.
1.5 Retry the VMRC connection
Aria Automation Cloud:
Only follow sections 1.4 and 1.5
Note: Utilization of WebMKS requires end-users to accept for the first time a self-signed or intermediate vCenter certificates in order to establish VMRC connections.
Alternative Flow chart to augment the information in the table above
Workaround:
2.1 Steps to validate existing on-prem Aria Automation console proxy configuration:
kubectl -n prelude describe deployment provisioning-service-app | grep -i "Denable.remote-console-proxy"
2.2 Steps to disable on-prem Aria Automation console proxy:
Prerequisites
Procedure
watch "kubectl get pods -n prelude|grep -i 'provisioning-service-app'"
2.3 Steps to enable on-prem Aria Automation console proxy:
Prerequisites
Procedure
kubectl -n prelude edit deployment provisioning-service-app
-Denable.remote-console-proxy=true
Note: To edit, move the cursor to the line where you want to make the change, and press the i key on the keyboard to enter insert mode. Change the value.
Note: Be careful with spacing, do not use TABs.
watch "kubectl get pods -n prelude|grep -i 'provisioning-service-app'"
2.4 Steps to enable vCenter console proxy.
Alternative option to allow remote console access requires the use of vCenter proxy as long as the following prerequisites are met:
Prerequisites
Procedure
config.mksdevproxy.connLimit
config.mksdevproxy.enable
config.mksdevproxy.readthrottler
config.mksdevproxy.writethrottler
Architectural Flow Diagram of Aria Automation Cloud
3.1 End-user is connected to Aria Automation Cloud using their credentials and is entitled to use the remote console day action. They request the remote console access.
3.2 Aria Automation Cloud requests for a ticket to the vCenter service. It goes through Aria Automation Cloud Proxy and uses the existing vCenter account. On vCenter, the request for a ticket is checked for the “Virtual machine.Interaction.Console” privilege.
3.3 vCenter answers with the webMKS ticket URL which looks like:
mks://vCENTER/remote-console/vm-kkkkkk?ticket=nnnnnnnnnnnnnn/mmmmmmmmmmmmmmmm
This is one time ticket with 2 minutes expiration
3.4 Aria Automation Cloud send this ticket to End-user browser which launches a new browser windows for the remote console UI.
3.5 The End-user browser establishes a proxied connection to the ESXi host using WebMKS ticket through VMware Remote Console Proxy for vSphere service. This service is disabled by default and must be enabled and configured as per the steps above.