"Certificate chain of Compute Manager <VC-FQDN>/<VC-hortname> is invalid. Please check Issuer and Subject in the chain. (Error code: 90204)"
/var/log/cm-inventory/cm-inventory.log
file:2024-06-24T19:45:24.327Z ERROR http-nio-127.0.0.1-7443-exec-2 VcPlugin 4732 SYSTEM [nsx@1234 comp="nsx-manager" errorCode="MP40219" level="ERROR" reqId="########-#######-#########" subcomp="cm-inventory" username="admin"] Certificate of Vc example.com is invalid. it might be caused by issuer not being same as subject of next certificate in certificate chain.
2025-03-12T15:13:37.910Z NSX 5081 FABRIC [nsx@6876 comp="nsx-manager" errorCode="MP40428" level="ERROR" subcomp="manager"] Error connecting EAM com.vmware.vim.vmomi.client.exception.SslException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: java.security.cert.CertPathBuilderException: Unable to find certificate chain. on compute manager ####-####-####-####-####
2025-03-12T15:13:37.910Z NSX 5081 FABRIC [nsx@6876 comp="nsx-manager" errorCode="MP26153" level="ERROR" subcomp="manager"] [HostPinned]: Failed to get EAM status for compute manager ComputeManagerModelMsg/####-####-####-####-####, com.vmware.nsx.management.lcm.vc.soap.exceptions.HostBasedVMException: Error connecting EAM on compute manager ####-####-####-####-####. Error javax.net.ssl.SSLHandshakeException: PKIX path building failed: java.security.cert.CertPathBuilderException: Unable to find certificate chain.
The certificate chain of the custom machine SSL certificate on the vCenter may be incomplete, or there could be an incorrect or missing entry within the new certificate. Extra certificates which are not part of the chain included in the vCenter Server certificate can also cause NSX to reject the certificate. Occasionally, a custom CA-signed certificate that is accepted by the vCenter when using the vCenter UI to apply the new certificate will run into this error when attempting to connect the VC as a compute manager in NSX.
If the vCenter Machine SSL certificate only uses the 'leaf
' certificate and not the 'full certificate chain
' (which includes the intermediate CA(s) and root CA), NSX Manager will reject the vCenter Certificate even though it will be functional in the vCenter Server.
The Subject Alternative Name section of the custom machine SSL certificate should include the FQDN, short name, and IP address of the vCenter Server. In some cases, NSX may not be able to validate the connection to the vCenter Server, which can result in the error message. Accurate and complete SAN data being included when the certificate request is created can help to prevent this.
echo | openssl s_client -connect localhost:443 2>/dev/null | openssl x509 -noout -fingerprint -sha256
openssl s_client -showcerts -debug -connect <VC-IP>:443
If the certificate is being replaced using vSphere's Certificate Management through the UI and the error message comes up when updating the vCenter connection in the NSX Manager, using the vCenter CLI Certificate Manager Utility instead may work. This can happen due to an issue with the Certificate Management in vCenter even when the certificate chain is complete and there are otherwise no issues with the CA certificate.
It may help to save the individual certificates in the chain to separate files and open them one at a time to see the certificate chain for each. If any of the individual certificates do not show the appropriate parents in the chain, or if they show very different parents, they will need to be investigated. Any certificates that show the exact same chain are likely duplicates of each other and one will need to be removed.