VMware is currently aware of this issue. See the workaround below to mitigate this issue.
Workaround:
To workaround this issue, the old certificate chain should be deleted from the Identity service database so a valid one is generated on service startup.
- Login to one of vRealize Automation appliance(s)
- Stop the currently running application services by running:
/opt/scripts/svc-stop.sh
- Backup only the identity service database data by dumping it into a file
cd /root
vracli db dump identity-db > identity-db-data.dump
- Log in to the identity service database by running: vracli dev psql identity-db and typing yes for recording this session.
- Delete the data stored in the following two tables
delete from identity_keystore_alias where 1=1;
delete from identity_keystore where 1=1;
Note: Ensure all PSQL statements are ended with a semi-colon.
- Make sure you don't have any data left in the two tables above
select * from identity_keystore_alias;
should return 0 records
select * from identity_keystore;
should return 0 records
Note: Ensure all PSQL statements are ended with a semi-colon.
- Once this is done, quit the psql console by typing
\q
- Run
/opt/scripts/deploy.sh