NOTE: Do not execute on version 8.12 or later. Refer to the Additional Information section.
vRealize Log Insight (vRLI) versions 8.6.x, 8.8.x, and 8.10.x
The internal communication (SSL) certificate expired, disrupting secure communication between nodes. This resulted in loss of internode connectivity and led to issues.
Set up a new internode communication certificate.
Prerequisites:
# echo | openssl s_client -connect localhost:443 2>/dev/null | openssl x509 -noout -purpose | grep 'SSL client :'
2.2. If the command above shows "SSL client: Yes", you can proceed to the Install certification section.
2.3. If it shows "SSL client: No", you need to regenerate the custom certificate with Client Auth enabled.
.pem file with Client Auth enabled to the /tmp directory on all cluster nodes.
Create a self-signed certificate:
root.# openssl req -newkey rsa:2048 -keyout domain.key -x509 -days 3650 -out domain.crt -nodes
Note:
1. This command generates a self-signed certificate valid for 3650 days (10 years). You can adjust the -days value according to your organization's security policies.
2. When prompted by OpenSSL, enter the values required for your company. The default certificate options are as follows:
| Prompt | Value |
|---|---|
| Country | US |
| State Or Province | California |
| Locality | Palo Alto |
| Organization | VMware, Inc. |
| Organization Unit | vCenter Log Insight |
| Common Name | VMware vCenter Log Insight |
.pem file.# cat domain.key domain.crt > /tmp/cert.pem
/tmp/cert.pem file from the Primary node to the /tmp directory on the other Worker nodes in the cluster.
Install Certificate:
Note: The following steps need to be performed on every node in the vRealize Log Insight cluster. This can be done either sequentially or in parallel.
Download the attached fix_expired_cert_v2.tar file.
Note: The file may download with an alphanumeric prefix, such as 0685G00001AQoFaQal_fix_expired_cert_v2.tar. You can either rename it to fix_expired_cert_v2.tar before uploading or use the full filename with the prefix in the commands below.
Transfer the fix_expired_cert_v2.tar file to the /tmp directory on the Primary node.
SSH or access the Primary node via console as root, then navigate to the /tmp directory using cd /tmp.
fix_expired_cert_v2.tar and update its permissions.
# tar xvf fix_expired_cert_v2.tar
# chmod 744 fix_expired_cert.sh
fix_expired_cert.sh script:# ./fix_expired_cert.sh <pemLocation/pemName>
Note: Replace <pemLocation/pemName> with the full path of the certificate file from the Prerequisites section that you intend to use.
Example: ./fix_expired_cert.sh /tmp/cert.pem
Verify that the script has completed successfully:
# ./fix_expired_cert.sh --verify
Example:
Cluster certificate fingerprint is: <ID_1>
Inter-node certificate fingerprint is: <ID_1>
Root certificate fingerprint is: <ID_2>
Cluster and inter-node certificates are same
Found alias with matching root fingerprint
loginsight2:##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##
Optional: Verify the expiration date of the newly applied certificate to ensure it is set in the future:
# echo "" | keytool -list -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -rfc 2> /dev/null | openssl x509 -noout -enddate
Example:
Restart the Log Insight service:
# systemctl restart loginsight
Perform steps 1–10 on all other nodes in the cluster.