NOTE: Do not execute on version 8.12 or later. Refer to the Additional Information section.
8.6.X
8.8.X
8.10.X
Set up a new internode communication certificate.
Prerequisites:
# echo | openssl s_client -connect localhost:443 2>/dev/null | openssl x509 -noout -purpose | grep 'SSL client :'
2.2. If the command above shows "SSL client: Yes
", you can proceed to the Install certification section.
2.3. If it shows "SSL client: No
", you need to regenerate the custom certificate with Client Auth enabled.
.pem
file with Client Auth enabled to the /tmp
directory on all cluster nodes.
Create a self-signed certificate:
root
.# openssl req -newkey rsa:2048 -keyout domain.key -x509 -days 3650 -out domain.crt -nodes
Note:
1. This command generates a self-signed certificate valid for 3650 days (10 years). You can adjust the -days
value according to your organization's security policies.
2. When prompted by OpenSSL, enter the values required for your company. The default certificate options are as follows:
Prompt | Value |
---|---|
Country | US |
State Or Province | California |
Locality | Palo Alto |
Organization | VMware, Inc. |
Organization Unit | vCenter Log Insight |
Common Name | VMware vCenter Log Insight |
.pem
file.# cat domain.key domain.crt > /tmp/cert.pem
/tmp/cert.pem
file from the Primary node to the /tmp
directory on the other Worker nodes in the cluster.
Install Certificate:
Note: The following steps need to be performed on every node in the vRealize Log Insight cluster. This can be done either sequentially or in parallel.
Download the attached fix_expired_cert_v2.tar
file.
Note: The file may download with an alphanumeric prefix, such as 0685G00001AQoFaQal_fix_expired_cert_v2.tar
. You can either rename it to fix_expired_cert_v2.tar
before uploading or use the full filename with the prefix in the commands below.
Transfer the fix_expired_cert_v2.tar
file to the /tmp
directory on the Primary node.
SSH or access the Primary node via console as root, then navigate to the /tmp
directory using cd /tmp
.
fix_expired_cert_v2.tar
and update its permissions.
# tar xvf fix_expired_cert_v2.tar
# chmod 744 fix_expired_cert.sh
fix_expired_cert.sh
script:# ./fix_expired_cert.sh <pemLocation/pemName>
Note: Replace <pemLocation/pemName>
with the full path of the certificate file from the Prerequisites section that you intend to use.
Example: ./fix_expired_cert.sh /tmp/cert.pem
Verify that the script has completed successfully:
# ./fix_expired_cert.sh --verify
Example:
Cluster certificate fingerprint is: <ID_1>
Inter-node certificate fingerprint is: <ID_1>
Root certificate fingerprint is: <ID_2>
Cluster and inter-node certificates are same
Found alias with matching root fingerprint
loginsight2:##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##.##
Optional: Verify the expiration date of the newly applied certificate to ensure it is set in the future:
# echo "" | keytool -list -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -rfc 2> /dev/null | openssl x509 -noout -enddate
Example:
Restart the Log Insight service:
# systemctl restart loginsight
Perform steps 1–10 on all other nodes in the cluster.