The /etc/vmware/wcp/tls/vip.crt
certificate marked as expired and not able to connect securely to the Supervisor Cluster API Endpoint.
The self-signed certificate located at /etc/vmware/wcp/tls/vip.crt has expired and the auto-rotation process has not been initiated.
This TLS certificate is served by the nginx proxy and runs in front of each CP VM on the workload network. It has a 1-year lifetime. Ideally, the vip.crt self-signed certificate will automatically rotate when wcpsvc detects it to be more than 50% of its lifetime (i.e., 6 months).
1. Validate vip.crt from the Supervisor node Control plan VM
Check if the TLS endpoint certificate validity
# find / -type f \( -name "*.cert" -o -name "*.crt" \) -print 2>/dev/null | egrep -v 'ca.crt$|ca-bundle.crt$|kubelet\/pods|var\/lib\/containerd|run\/containerd' | xargs -L 1 -t -i bash -c 'openssl x509 -noout -text -in {}|grep After'
bash -c openssl x509 -noout -text -in /etc/vmware/wcp/tls/vip.crt|grep After
Not After : Dec 13 03:59:22 2xxx GMT
# openssl x509 -in /etc/vmware/wcp/tls/vip.crt -text | grep CN
Issuer: CN=CA, DC=vsphere, DC=local, C=US, ST=California, O=vcxxxx.corp.example.org, OU=VMware Engineering
Subject: OU=vcxxxx.corp.example.org, CN=kube-apiserver-domain-c7
2. Generate a new vip.crt from vCenter Server
# vi cert.csr
# /usr/lib/vmware-vmca/bin/certool --gencertfromcsr --csrfile cert.csr --cert vip-renew.crt
3. Replace VIP certificate from vCenter Server GUI
# cat vip-renew.crt
If vip.crt using the custom signed certificate, The Certificate needs to be signed by CA to renew following below document
https://docs.vmware.com/en/VMware-vSphere/7.0/vmware-vsphere-with-tanzu/GUID-CF707AE9-7BD7-47BC-AAD7-BCF17DCB640D.html