Starting in VMware Aria Operations for Logs 8.12 there is a new script (/usr/lib/loginsight/application/sbin/custom-ssl-cerf) shipped with the appliance which can be used to change the UI, API, syslog and internal certificate.
Following common symptoms :
echo "" | keytool -list -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -rfc 2> /dev/null | openssl x509 -noout -enddate
/storage/core/loginsight/var/cassandra.log:Caused by: java.security.cert.CertificateExpiredException: NotAfter: {Date/Time in the past}
VMware Aria Operations for Logs 8.12.x and later.
/tmp directory on all nodes in the VMware Aria Operations for Logs cluster.Note: VMware Aria Operations for Logs 8.12 build 21618456 requires Client Auth usage. Build 21696970 and later drop this requirement. If you are on build 21618456, ensure your custom certificate meets this requirement.
You can runecho | openssl s_client -connect localhost:443 2>/dev/null | openssl x509 -noout -purpose | grep 'SSL client :'on a node with your custom certificate installed to confirm.
SSL client : Yes, then you can proceed to the Install Certificate section.SSL client : No, then you must regenerate your custom certificate with Client Auth enabled. Client Auth should be set in extendedKeyUsage on the Certificate Authority (CA) side. So please contact CA when signing a custom certificate to make sure "Client Auth" is enabled.openssl req -newkey rsa:2048 -keyout domain.key -x509 -days 3650 -out domain.crt -nodesNote: This command will generate a self-signed certificate that is valid for 3650 days (10 years). You may alter the-daysvalue as needed per your organization's security requirements.
Note: When prompted by openssl, provide the required values for your company. If you want to use the default certificate options, enter the following values exactly:
| Prompt | Value |
|---|---|
| Country | US |
| State Or Province | California |
| Locality | Palo Alto |
| Organization | VMware, Inc. |
| Organization Unit | vCenter Log Insight |
| Common Name | VMware vCenter Log Insight |
cat domain.key domain.crt > /tmp/cert.pem/tmp/cert.pem file to the /tmp directory on all other nodes in the cluster.cp /tmp/cert.pem /usr/lib/loginsight/application/etc/certs/custom.pemNote: Replace /tmp/cert.pem with the path and file name of the custom certificate you uploaded in the section.custom-ssl-cerf script:/usr/lib/loginsight/application/sbin/custom-ssl-cerf
Note: In version 8.18.5, you may encounter a 'sed' error stating it cannot read custom.pem. This is a known cosmetic issue; you can proceed to the next step to verify that the certificate change was actually successful. ( sed: can't read /usr/lib/loginsight/application/etc/certs/custom.pem: No such file or directory )echo "" | keytool -list -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -rfc 2> /dev/null | openssl x509 -noout -enddateloginsight service on all nodes, one at a time:systemctl restart loginsightNote: Once the service has restarted, wait a few minutes, check that theloginsightservice is running by running the commandservice loginsight status, then proceed to restart the service on the next node.
Openssl is installed on default VMware virtual appliance, please make sure you generate CSR and key based on your requirement.
Generate a CSR and key