/etc/init.d/hostd statusEx. MM DD HH:MM vpxa-zdump.000 MM DD HH:MM vpxa-zdump.001/var/run/log/vpxa.log, where the handshake between the ESXi and vCenter fails due to an invalid ESXi host certificate:YYYY-MM-DDTHH:MM:SSZ In(166) Vpxa[15561258]: [Originator@6876 sub=Default] Vmacore::InitSSL: handshakeTimeoutUs = 20000000YYYY-MM-DDTHH:MM:SSZ In(166) Vpxa[15561258]: [Originator@6876 sub=Default] Service is running in FIPS mode.YYYY-MM-DDTHH:MM:SSZ In(166) Vpxa[15561258]: [Originator@6876 sub=Default] [Vpxd_EarlyInit] Setting malloc mmap threshold to 32KBYYYY-MM-DDTHH:MM:SSZ In(166) Vpxa[15561258]: [Originator@6876 sub=Default] Creating SSL ContextsYYYY-MM-DDTHH:MM:SSZ Er(163) Vpxa[15561258]: [Originator@6876 sub=Default] Failed to initialize the SSL context: N7Vmacore6Crypto15CryptoExceptionE(Crypto Exception: error:80000002:system library::No such file or directory: unable to load BIO)YYYY-MM-DDTHH:MM:SSZ Er(163) Vpxa[15561258]: -->[context]zKq7AVICAgAAANVUewEKdnB4YQAA88lHbGlidm1hY29yZS5zbwAAxSY3AFIzIQBVMzcAMjY3Abq0HnZweGEAAf2JIgFwKBoCPTQCbGliYy5zby42AAGaxxs=[/context]YYYY-MM-DDTHH:MM:SSZ Cr(162) Vpxa[15561258]: [Originator@6876 sub=Default]YYYY-MM-DDTHH:MM:SSZ Cr(162) Vpxa[15561258]: -->YYYY-MM-DDTHH:MM:SSZ Cr(162) Vpxa[15561258]: --> Panic: Failed to initialize the SSL context.YYYY-MM-DDTHH:MM:SSZ Cr(162) Vpxa[15561258]: --> Backtrace:YYYY-MM-DDTHH:MM:SSZ Cr(162) Vpxa[15561258]: --> [backtrace begin] product: VMware ESXi, version: 8.0.X, build: build-XXXXXXXX, tag: vpxa, cpu: x86_64, os: esx, buildType: releaseYYYY-MM-DDTHH:MM:SSZ Al(177) vmkalert: cpu12:15300376)ALERT: SSL certificates are invalidVMware ESXi 8.x
Issue is caused due to an invalid SSL certificate on the ESXi host.
1) Regenerate the ESXi self-signed certificate using the following command:
/sbin/generate-certificates
2) Restart the hostd and vpxa services
/etc/init.d/hostd restart && /etc/init.d/vpxa restart
As the hostd service is up, the ESXi host can now be reconnected back to the vCenter server.
Use vCert - Scripted vCenter expired certificate replacement to replace the ESXi custom cert.
1. Navigate through the following options:
ESXi certificate operations
Replace ESXi certificate
Import CA-signed certificate and key
2. Provide the required details:
Enter FQDN or IP of the ESXi host: Enter the IP or the FQDN of the ESXi.
Enter root password for ESXi host: Enter The Root Password.
Enter path to new ESXi certificate: location and the file name (eg. /tmp/key/rui.crt)
3. After replacing the ESXi certificates:
Run the following command on the ESXi host to save the new certificate and key to the bootbank: /bin/auto-backup.sh
Restart the Management Agents (rhttpproxy, hostd, vpxa).
Disconnect and reconnect the host in vCenter to update the certificate information in the vCenter database.