All clusters, nodepools, and Network Function (NF) operations require a secure trust to vCenter via a vSphere certificate thumbprint.
If a vCenter's certificate has been updated, the vCenter certificate and thumbprint must be updated to restore functionality
Resolved in TCA 3.3. See Updating Certificate/user Credentials of vCenter on TCA and Linked CaaS Clusters
tca-m/tca-cp-ip>:9443.2. Update the vCenter thumbprint in the TKG Cluster(s
ssh admin@<tca-cp-ip>curl -kfsSL https://packages.broadcom.com/artifactory/tca-distro/kb/vc-updater/tca3.0/update-vc-tp.sh | bash -s -- -h
NOTE: For airgap environments, users should download the script to another location first, then copy it to the TCA-CP.
curl -kfsSL https://packages.broadcom.com/artifactory/tca-distro/kb/vc-updater/tca3.0/update-vc-tp.sh | bash -s -- -d <vCenter-ip>In some cases the script may report vSphere CSI Secret Thumbprint mismatch for workload clusters. In this case vSphere-csi daemon set pods go into CrashLoopBackOff state after vCenter thumbprint is updated. Or, the vsphere-csi pods could take several minutes to be recreated.Cluster Name : worload-cluster1 Cluster Type : classy TKG VSphere CSI Secret : Thumbprint : <REDACTED> Mismatched. TKG VSphere CPI Secret : Thumbprint : <REDACTED> Mismatched.
Workaround:
For clusters with node pools, recreate the vsphere-csi package installation by running below commands on the workload clusters:
kubectl delete pkgi -n tkg-system <cluster-name>-vsphere-csi
kubectl delete pkgi -n tkg-system vsphere-csiFor clusters without node pools, restart the vsphere-csi-controller pod by running below command on the workload clusters:kubectl rollout restart deploy/vsphere-csi-controller -n vmware-system-csi
Note: This workaround is added to TCA 3.3