DEBU[0064] Got response: <html>
<head><title>504 Gateway Time-out</title></head>
<body>
<center><h1>504 Gateway Time-out</h1></center>
<hr><center>nginx/1.25.2</center>
</body>
/html>DEBU[0064] Error while getting list of workloads: invalid character '<' looking for beginning of value
FATA[0064] Failed to get available workloads, response from the server was invalid.
INFO:vclib.sso:[] Got bearer token for <user@domain>.
INFO:vclib.sso:[] Got hok token for /etc/vmware/wcp/tls/wcpusr.cert.
DEBUG:auth.authentication_sso:isExpired, notBefore: None, notOnOrAfter: None, now: <date> <time>, tolerance: 600
DEBUG:auth.authentication_sso:isExpired, notBefore: <date>:<time>, notOnOrAfter: <date>:<time>, now: <date> <time>, tolerance: 600
INFO:auth.filters:[] User authenticated using basic token.
DEBUG:telemetry.telemetry_object:Adding 1 successful auth request.
ERROR sts[77:tomcat-http--31] [CorId=bd4a1bc3-955f-4b6a-a628-d378b1ce44e7] [com.vmware.identity.idm.server.ServerUtils] cannot establish ldap connection with URI: [ldaps://<ldap-server.domain>:636] because [com.vmware.identity.interop.ldap.ServerDownLdapException] with reason [Can't contact LDAP server] therefore will try to attempt to use secondary URIs, if applicable
vSphere with Tanzu
VMware vCenter Server
It could be due to following reasons:
- vCenter to Identitiy provider communication: The vCenter server is unable to establish communication with your identity provider. To check and confirm the same run curl -v -k <Identity-provider-url.domain.com>:636 (for ldaps)
andcurl -v -k <Identity-provider-url.domain.com>:389 (for ldap).
Also check and confirm the certificate if using LDAPS with:echo | openssl s_client -showcerts -servername <Identity-provider-url.domain.com> -connectL <Identity-provider-url.domain.com>:443 | openssl x509 -inform pem -noout -text
- The login requires to define the domainname, this issue also can occur when not defining the domainname. For example:
username - fails, [email protected] - works
Fix the connectivity issue between the vCenter Server and your Identity provider or use the full domainname when logging in.