#viocli check health
connectivity.sh check_ldap_cert_expire: Check LDAP Certificate expiry status: [ldap_5.crt]:Pass;[ldap_4.crt]:Pass;[ldap_3.crt]:Pass;[ldap_2.crt]:expired:700 day(s) 3 hour(s);[ldap_1.crt]:expired:699 day(s) 23 hour(s);[ldap_0.crt]:Pass.
Remove the stale LDAP certificate by following the steps below :
1. Please SSH to vio-manager and run the following command
#viocli update keystone
2. Refer to the output from "viocli check health"
[ldap_5.crt]:Pass;[ldap_4.crt]:Pass;[ldap_3.crt]:Pass;[ldap_2.crt]:expired:700 day(s) 3 hour(s);[ldap_1.crt]:expired:699 day(s) 23 hour(s);[ldap_0.crt]:Pass.
2. Under conf.ldap_cert, remove 1st, 2nd and 3rd certificate and keep 4th, 5th and 6th
Note :
/etc/keystone/
3. Save the changes and wait until helm job refreshes keystone-etc secret.
4. Once keystone CR is edited as above, the health check output will have a new set of ldap_0, ldap_1, ldap_2 with none expired.