- There is a CA cert that is expired had these 3 API certificates for the 3 NSX managers and 1 for management cluster and you want them to be replaced with new self signed certificates
VMware NSX
Expired API certificates on an NSX Manager can disrupt secure communication and lead to various issues, including authentication failures.
Renew the API certificates of all the NSX managers and the certificate for the management cluster:
Creating a self signed certificates:
1. With admin privileges, log in to NSX Manager.
2. Select System > Certificates. Click the CSRs tab.
3. From your selected CSR, click Available actions and select Self Sign Certificate for CSR.
4. Enter the number of days the self-signed certificate is valid.
The default is 825 days. Even if you change this value for previously generated self-signed certificate, the default value is displayed every time you generate a new certificate.
5. Choose your Service Certificate type.
Toggle the Service Certificate button to Yes to use this certificate for services such as load balancer, VPN, or TLS Inspection. If you are creating a self-signed CA certificate, Yes is the only choice.
Toggle the Service Certificate button to No to use this certificate with NSX Manager appliance nodes.
6. Click Save.
The self-signed certificate appears in the Certificates tab.
Validating and assigning the certificate:
GET /api/v1/trust-management/certificates/<certificate_ID>?action=validate
POST /api/v1/trust-management/certificates/<certificate_ID>?action=apply_certificate&service_type=API&node_id=<manager_node_uuid><certificate_ID> with the certificate ID from Step 3<manager_node_uuid> with the manager node UUID from Step 4b) To replace the certificate of the manager cluster VIP, use the API call:
POST /api/v1/trust-management/certificates/<&service_type=MGMT_CLUSTERcertificate_ID>?action=apply_certificate
8. Confirm on the NSX UI > System > Certificate page that the new certificates has been applied to the NSX manager nodes with service type API and the management cluster