When a custom TLS certificate is applied to the Aria Orchestrator appliance, the vRO user interface (UI) may become inaccessible, even though the underlying services appear to be running.
This often occurs due to a mismatch between the expected private key format (PKCS#8) and the actual format of the provided private key (PKCS#1) if its header was manually modified.
This issue arises from a specific private key format incompatibility:
This key starts with the header -----BEGIN PRIVATE KEY-----.
Diagnostic Clue
The only log indicating this specific problem is found in the contour.log file on the vRO appliance:
/services-logs/prelude/contour/contour/console-logs/contour.log
time="2025-09-02T13:35:55Z" level=error msg="unresolved secret reference" context=IngressProcessor error="invalid TLS private key: x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)" name=dispatch namespace=prelude secret=prelude/contour-ingress-cert-and-key
To resolve this issue, you must ensure that your private key is in the correct PKCS#8 format (with the -----BEGIN PRIVATE KEY----- header) when provided to Aria Orchestrator.
Connect to the Aria Orchestrator Appliance via SSH:
Connect as root to your Aria Orchestrator appliance.
Verify the Converted Private Key:
Open the newly created key file (e.g., vro_pkcs1.key) with a text editor (like vi or nano) and confirm that its header now correctly starts with:
-----BEGIN PRIVATE KEY-----
Re-apply the Custom TLS Certificate:
Follow the official documentation again, ensuring you use the newly converted PKCS#8 private key (vro_pkcs1.key) along with your primary, intermediate, and root certificates.
Verify UI Access:
After successfully re-applying the certificate with the correctly formatted private key, the Aria Orchestrator UI should become accessible.