Note: PKS PI Certificate, refers to a certificate used by PKS to securely authenticate and manage NSX-T resources through its API, acting as a superuser.
VMware NSX
These expired PKS PI certificates, have 'Client Auth' Service attached to a NSX manager node, the same NSX manager node has a valid (not expired) PKS certificate with the 'Client Auth' service.
This issue can occur when the certificate was replaced, as it could not detach the Client Auth Service from the expired certificate at the time of replacement and as it is still attached to a manager node, we unable to delete the certificate.
If you encounter this issue, run the CARR script attached to this KB: Using Certificate Analyzer, Results and Recovery (CARR) Script to fix certificate related issues in NSX
If the issue persists after running the CARR script, please open a support request with Broadcom NSX support and reference this KB.
If you are opening a support request, please provide the carr.log after running the script.
A screenshot of the issue.
NSX manager logs.
Results of the following API call: GET https://<nsx-manager-ip>/api/v1/trust-management/certificates