applianceLifecycle job failed | interconnectConfigMA failed |error Adding Mobility Agent Host failed | SSL Exception
OR
Service Mesh modification failed. Process Service Mesh failed. Interconnect Service Workflow interconnectConfigureMA failed. Error: Adding Mobility Agent Host failed. A general system error occurred: Failed to verify certificate on <MA IP>. When ESXi Certificate Mode is set to custom it is mandatory to install valid certificate on ESXi host before adding the host to a VC
/var/log/vmware/vpxd/vpxd.log) will show the following error message: ERROR c.v.v.h.s.i.InterconnectConfigureMA- Task task-####error out, error : A general system error occurred: SSL Exception: Verification parameters:
PeerThumbprint: ##:##:##:##:##:##
ExpectedThumbprint:
ExpectedPeerName: #.#.#.#
The remote host certificate has these problems:
* Host name does not match the subject name(s) in certificate.
* unable to get local issuer certificate
com.vmware.vim.binding.vmodl.fault.SystemError: A general system error occurred: SSL Exception: Verification parameters:
PeerThumbprint: ##:##:##:##:##:##
ExpectedThumbprint:
ExpectedPeerName: #.#.#.#
The remote host certificate has these problems:
* Host name does not match the subject name(s) in certificate.
VMware HCX
vCenter Server
custom" mode under advanced parameter "vpxd.certmgmt.mode" HCX MA deployment in a vCenter environment with Certificate Management set to "custom" mode is NOT supported.
Alternatively the recommended workaround can be implemented and that has been thoroughly verified, yet it has some restrictions to be persistent.
Support for the the implementation of the workaround is provided as a best effort.
Workaround:
The following procedure will replace the IX appliance certificate and key.
It will have to be performed for each Interconnect appliance that is deployed in a vCenter with 'custom' certificate management.
admin'ccli modelist the appliances and go <appliance_ID> into the IX appliancessh to drop into the linux promptadmin@hcx [ ~ ]$ ccli
Welcome to HCX Central CLI
[admin@hcx] list
|-------------------------------------------------------------------------------------------------------------------------------------------------------|
| Node | Id | Address | State | HcxManagerCert | HcxManagerKey | Selected |
|-------------------------------------------------------------------------------------------------------------------------------------------------------|
| SM-IX-I1 | 0 | <IX-IP>:9443 | Connected | /common/cs/hm_to_gw_1730796807.pem | /common/ks/hm_to_gw_1730796807.pk8 | |
[admin@hcx] go 0
Switched to node 0.
[admin@hcx:SM-IX-I1] ssh
/etc/vmware/sslmv rui.crt rui.crt.bak
mv rui.key rui.key.bak
systemctl restart mobilityagent
systemctl restart authdlauncher
IMPORTANT: This workaround will not be persistent if the Service Mesh is re-synced or after service updates. The same procedure will have to be performed to re-deploy the MA again.
The following considerations should be taken into account:
cert.pem file, make sure the certificate chain (including target, intermediate, and root certificates) and private key aspects are separated into the rui.cert and rui.key files.IMPORTANT:
castore.pem file.
castore.pem file can be found in /etc/vmware/ssl folder on the IX appliance.
Refer to the following KB articles for more information on how to request and configure CA signed certificates for ESXi hosts