While enabling the encryption in vSAN services (Data-at-rest encryption) fails with error RuntimeFault.Summary
From /var/log/vmware/vsan-health/vsanvcmgmtd.log we see that below entries.
info vsanvcmgmtd[3783592] [vSAN@6876 sub=vmomi.soapStub[10] opID=agw-0001334-bd64] SOAP request returned HTTP failure; <<io_obj p:0x00007fe74c03a1c8, h:56, <UNIX ''>, <UNIX '/var/run/envoy-hgw/hgw-pipe'>hgw/host-27/vsan>, method: generateClusterKeys; code: 500(Internal Server Error); fault: (vmodl.RuntimeFault) {--> faultCause = (vmodl.MethodFault) null,--> faultMessage = <unset>--> msg = "Received SOAP response fault from [<<io_obj p:0x00007fe74c03a1c8, h:56, <UNIX ''>, <UNIX '/var/run/envoy-hgw/hgw-pipe'>--> N7HostCtl3Lib4Vsan16VsanCtlExcKMS-server_Name"--> }warning vsanvcmgmtd[3783592] [vSAN@6876 sub=Py2CppStub opID=agw-0001334-bd64] |- EExit host-XX::vim.host.
On ESXi /var/run/log/vsansystem.log
In(166) vsansystem[2101330]: [vSAN@6876 sub=Libs opId=agw-0001334-bd64-5b5f] VsanUtil: Create client context for server 10.XX.XX.XX:5696Er(163) vsansystem[2101330]: [vSAN@6876 sub=Default opId=agw-0001334-bd64-5b5f] {2101330} :0 check_user_trust() - Verified certificateIn(166) vsansystem[2101330]: [vSAN@6876 sub=Libs opId=agw-0001334-bd64-5b5f] VsanUtil: Connect to key server doneEr(163) vsansystem[2101330]: [vSAN@6876 sub=Default opId=agw-0001334-bd64-5b5f] {2101330} :0 qlc_eh_err() - The batch count is emptyEr(163) vsansystem[2101330]: [vSAN@6876 sub=Libs opId=agw-0001334-bd64-5b5f] VsanUtil: Create, Key, Attributes={Algorithm=AES, Usage=Encrypt:Decrypt, Length=256} failed, QLC_ERR_NO_BATCH_COUNTWa(164) vsansystem[2101330]: [vSAN@6876 sub=Libs opId=agw-0001334-bd64-5b5f] VsanInfoEncrypt: Failed to create KEK from KMS 'KMS-server_Name' with reason: QLC_ERR_NO_BATCH_COUNT
When enabling KMS in vCenter using username/password, the setup fails if the user_name field in the KMS configuration is already populated. vCenter expects this field to be empty for a new configuration. If it's not empty, vCenter assumes an inconsistent state or a previous attempt, preventing new settings from being applied and KMS from being enabled.
vpxd and content-library services to ensure safe database access and prevent conflicts.service-control --stop vmware-vpxdservice-control --stop vmware-content-library/opt/vmware/vpostgres/current/bin/psql -d VCDB -U postgresvpx_crypto_server table. You'll likely see the user_name field filled with [email protected] or a similar value that needs to be cleared.select * from vpx_crypto_server;
user_name to Empty:update vpx_crypto_server set user_name = '';
select * from vpx_crypto_server;
\q
service-control --start vmware-vpxdservice-control --start vmware-content-library