Prepare to Deploy Management Clusters

Before you can use the Tanzu CLI or installer interface to deploy a management cluster, you must make sure that your infrastructure provider is correctly set up.

External Identity Management

For production deployments, VMware recommends enabling external identity management on each management cluster, to control access to it and its workload clusters.

FIPS-Capable Version (v1.5.3 and v1.5.4)

You can deploy a FIPS-capable version of Tanzu Kubernetes Grid to your vSphere, AWS, or Azure environment. The Bill of Materials (BoM) for FIPS only lists components that are compiled with and use FIPS-compliant cryptography modules. For vSphere, the FIPs-capable OVA are listed on the Tanzu Kubernetes Grid downloads page. The FIPS-capable AMI and Azure images are available in AWS and Azure respectively.

  1. (vSphere only) Import a FIPS-enabled Kubernetes OVA into vSphere, as described in Import a Base Image Template into vSphere.

    The FIPS-enabled OVAs are listed on the Tanzu Kubernetes Grid downloads page in the section FIPS enabled Kubernetes OVAs for VMware Tanzu Kubernetes Grid 1.5.x.

    • v1.5.4: Download Kubernetes v1.22.9
    • v1.5.3: Download Kubernetes v1.22.8
  2. On your bootstrap machine, set the following environment variable:

    export TKG_CUSTOM_COMPATIBILITY_IMAGE_PATH=fips/tkg-compatibility
  3. If you have a ~/.config/tanzu/tkg directory from installing the Tanzu CLI previously, remove or rename its bom and compatibility directories:

    mv bom bom.old
    mv compatibility compatibility.old
  4. Set tls-cipher-suites flags to FIPS-compliant ciphers for api-server, kube-scheduler, kube-controller-manager, etcd, and kubelet, by using a ytt overlay as described in ytt Overlays.

    • For details, or for STIG compliance, please contact your VMware representative.
    • Depending on your cloud infrastructure, you may also need to define additional ciphers.
  5. (Azure only) When you accept the base image license, use the value k8s-1dot22dot9-fips-ubuntu-2004. For information about how to accept the base image license see Accept Base Image License.

When you deploy a management cluster with the TKG_CUSTOM_COMPATIBILITY_IMAGE_PATH setting with fips/tkg-compatibility, the CLI downloads and deploys FIPS-compliant core components that use cryptographic primitives provided by a FIPS-compliant library based on the BoringCrypto / Boring SSL module. The FIPS-compliant core components include components of Kubernetes, Containerd and CRI, CNI plugins, CoreDNS, and etcd.

The CLI confirms the FIPS-compliant BoM downloads with output that for Tanzu Kubernetes Grid v1.5.4 resembles:

Downloading TKG compatibility file from ''
Downloading the TKG Bill of Materials (BOM) file from ''
Downloading the TKr Bill of Materials (BOM) file from ''

Internet-Restricted Environments

If you need to deploy Tanzu Kubernetes Grid in an environment with no external Internet access, see Prepare an Internet-Restricted Environment.

VMware Cloud on AWS and Azure VMware Solution

To deploy Tanzu Kubernetes Grid to VMware Cloud on AWS or to Azure VMware Solution, see Prepare a vSphere Management as a Service Infrastructure.

check-circle-line exclamation-circle-line close-line
Scroll to top icon