Possible errors seen in logs:
/storage/core/loginsight/var/runtime.log[YYYY-MM-DD HH:MM:SS.293+0000] ["SslCertificateManagerScheduler-thread-1"/###.###.###.### ERROR] [com.vmware.loginsight.database.dao.CACertificateDO] [Unable to close file output stream:]java.io.EOFException: no data in keystore stream [YYYY-MM-DD HH:MM:SS.300+0000] ["SslCertificateManagerScheduler-thread-1"/###.###.###.### ERROR] [com.vmware.loginsight.database.dao.CACertificateDO] [Unable to get alias of certificate. no data in keystore stream][YYYY-MM-DD HH:MM:SS.300+0000] ["SslCertificateManagerScheduler-thread-1"/###.###.###.### ERROR] [com.vmware.loginsight.database.dao.CACertificateDO] [Unable to get custom CA certificates after checkAndRestoreTruststore was called. no data in keystore stream][YYYY-MM-DD HH:MM:SS.302+0000] ["SslCertificateManagerScheduler-thread-1"/###.###.###.### ERROR] [com.vmware.loginsight.commons.security.UrlConnectionManager] [Failed to create trust manager]java.security.KeyStoreException: Failed to load default trust storeFor checking whether the truststore is corrupted or not on a node, the following command can help identify if truststore is corrupted :
keytool-no-provider -list -keystore /usr/java/jre-vmware/lib/security/cacerts -storepass changeitIf there is an error response after running this command, then the truststore is corrupted.
VCF Operations for Logs 9.0.x
Truststore corruption in VCF Operations for Logs often occurs during or after upgrades, abrupt system shutdowns, or disk space exhaustion.
Replace corrupted truststore with backup copy:
keytool-no-provider -list -keystore /usr/java/jre-vmware/lib/security/cacerts -storepass changeitIf you receive an error this means the trustore is corrupted
cp command to replace the corrupted truststore with the backup copy. Use the appropriate command below for non-FIPS or FIPS enabled nodes respectively, see Additional Information section on how to determine if FIPS is enabled/disabled.cp /usr/lib/loginsight/application/etc/default_truststore/cacerts /usr/java/jre-vmware/lib/security cp /usr/lib/loginsight/application/etc/default_truststore/FIPS/cacerts /usr/java/jre-vmware/lib/securitycacerts file from another VCF Operations for Logs node. The FIPS directory, and the cacerts file therein, is automatically created when FIPS is enabled.Using a utility like WinSCP or FileZilla, copy a truststore from a working node in the same cluster, using it to replace the existing one in the following directory:
/usr/java/jre-vmware/lib/security/cacerts
To verify if your cluster is FIPS enabled, and do not have access to the UI to verify:
/usr/lib/loginsight/application/sbin/fips.sh --all --statusExpected output with FIPS disabled:
FIPS mode check for all components.
Photon require restart. Photon FIPS mode: deactivated
BouncyCastleFipsProvider in FIPS mode: off
BouncyCastelJsseProvider in FIPS mode: off
java.security keystore.type FIPS mode: off
java.security KeyManagerFactory.algorithm type FIPS mode: off
loginsight approved_only FIPS mode: deactivated
Apache Tomcat approved_only FIPS mode: deactivated
Apache Tomcat FIPS mode: off
Cassandra FIPS mode: off
Internal config. fips-enabled = false