A known issue impacting NSX 4.x version where self-signed certificates in NSX are expiring or expired.
However, after running the CARR script against a Federated NSX environment, there might still be some self-signed certs not renewed in standby Global Manager cluster.
This issue may not be exclusive to the standby GM site. It could also happen on active GM site or any local sites. This KB is to address the specific issue with standby Global Manager.
The CARR script may show the replacement process completed successful. However, expired certs can still be seen in NSX UI such as the following example:
VMware NSX
The CARR script did not replaced these certs due to not matching criteria for replacement.
You can replace the self-signed certificates for the following service types:
In order to resolve this issue, new self-signed certificates need to be created for each of the expired self-signed certs then importing them and replacing the expired certs.
{
....
"used_by": [
{
"node_id": "<NSX-Manager-node-UUID>",
"service_types": [
"APH"
]
}
],
"resource_type": "certificate_self_signed",
"id": "<Cert-UUID>",
"display_name": "APH-AR certificate for node <NSX-Manager-node-UUID>",
...
}