applianceLifecycle job failed | interconnectConfigMA failed |error Adding Mobility Agent Host failed | SSL Exception
/var/log/vmware/vpxd/vpxd.log
) will show the following error message: ERROR c.v.v.h.s.i.InterconnectConfigureMA- Task task-####error out, error : A general system error occurred: SSL Exception: Verification parameters:
PeerThumbprint: ##:##:##:##:##:##
ExpectedThumbprint:
ExpectedPeerName: #.#.#.#
The remote host certificate has these problems:
* Host name does not match the subject name(s) in certificate.
* unable to get local issuer certificate
com.vmware.vim.binding.vmodl.fault.SystemError: A general system error occurred: SSL Exception: Verification parameters:
PeerThumbprint: ##:##:##:##:##:##
ExpectedThumbprint:
ExpectedPeerName: #.#.#.#
The remote host certificate has these problems:
* Host name does not match the subject name(s) in certificate.
VMware HCX
vCenter Server
custom
" mode under advanced parameter "vpxd.certmgmt.mode
" custom
" mode is NOT supported.The following procedure will replace the IX appliance certificate and key.
It will have to be performed for each Interconnect appliance that is deployed in a vCenter with 'custom' certificate management.
admin
'ccli
modelist
the appliances and go <appliance_ID>
into the IX appliancessh
to drop into the linux promptadmin@hcx [ ~ ]$ ccli
Welcome to HCX Central CLI
[admin@hcx] list
|-------------------------------------------------------------------------------------------------------------------------------------------------------|
| Node | Id | Address | State | HcxManagerCert | HcxManagerKey | Selected |
|-------------------------------------------------------------------------------------------------------------------------------------------------------|
| SM-IX-I1 | 0 | <IX-IP>:9443 | Connected | /common/cs/hm_to_gw_1730796807.pem | /common/ks/hm_to_gw_1730796807.pk8 | |
[admin@hcx] go 0
Switched to node 0.
[admin@hcx:SM-IX-I1] ssh
/etc/vmware/ssl
mv rui.crt rui.crt.bak
mv rui.key rui.key.bak
stc restart mobilityagent
stc restart authdlauncher
IMPORTANT: This workaround will not be persistent if the Service Mesh is re-synced or after service updates. The same procedure will have to be performed to re-deploy the MA again.
The following considerations should be taken into account:
cert.pem
file, make sure the certificate chain (including target, intermediate, and root certificates) and private key aspects are separated into the rui.cert
and rui.key
files.Refer to the following KB articles for more information on how to request and configure CA signed certificates for ESXi hosts