/usr/java/jre-vmware/bin/keytool -list -keystore /usr/java/jre-vmware/lib/security/cacerts -storepass changeit
Note: The above command should return the certificates that exist in the truststore when run on a healthy node. If an error is received, please proceed to replace the truststore with the procedure outlined in this articleThe preferred method to replace a corrupt truststore is by using a copy from a healthy Aria Operations for Logs node from the same cluster that does NOT return an error when listing the contents via the above command. If this is not available, the secondary method is to use the default truststore attached to this article (cacerts-nofips.tar.gz or cacerts-fips.tar.gz depending on whether FIPS is enabled in the cluster).
/usr/java/jre-vmware/lib/security/cacerts
root
tar -xvzf /tmp/cacerts-no-fips.tar.gz
mv /tmp/cacerts /usr/java/jre-vmware/lib/security/cacerts; chown root:root /usr/java/jre-vmware/lib/security/cacerts
/usr/java/jre-vmware/lib/security/cacerts
root
tar -xvzf /tmp/cacerts-fips.tar.gz
mv /tmp/cacerts /usr/java/jre-vmware/lib/security/cacerts; chown root:root /usr/java/jre-vmware/lib/security/cacerts
If you are unsure whether or not your cluster is FIPS enabled, and do not have access to the UI to verify:
/usr/lib/loginsight/application/sbin/fips.sh --all --status
FIPS mode check for all components.
Photon FIPS mode: activated
BouncyCastleFipsProvider in FIPS mode: on
BouncyCastelJsseProvider in FIPS mode: on
java.security keystore.type FIPS mode: on
java.security KeyManagerFactory.algorithm type FIPS mode: on
loginsight approved_only FIPS mode: activated
Apache Tomcat approved_only FIPS mode: activated
Apache Tomcat FIPS mode: on
Cassandra FIPS node: on
Internal config. fips-enabled = true