Navigation path: VCD Provider Portal → Resources → Infrastructure Resources → Log Ingestion → Configure → Enter Aria Operations for Logs details → Save → Trust Aria Operations for Logs certificate
{
"targetProbe": {
"result": "Certificate not trusted: java.security.cert.CertificateException: No name matching <Aria_Logs_FQDN> found",
"resolvedIp": "Aria_Logs_IPAddress",
"canConnect": true,
"sslHandshake": false,
"connectionResult": "SUCCESS",
"sslResult": "ERROR_UNTRUSTED_CERTIFICATE",
"certificateChain": "-----BEGIN CERTIFICATE-----##############-----END CERTIFICATE-----",
"additionalCAIssuers": []
},
"proxyProbe": null
}
Certificate is already trusted
VMware Cloud Director 10.6.x
VMware Aria Operations for Logs 8.18.x
Configuring Log Ingestion get stuck when the Aria Operations for Logs certificate does not include the address used during configuration (either IP address or FQDN) in the Subject Alternative Name (SAN) field.
The error “Certificate is already trusted” occurs when a previously trusted Aria Operations for Logs certificate still exists in the VCD Trusted Certificates store. When the same certificate is presented again during configuration, VCD identifies it as an already trusted certificate and blocks the integration to prevent duplicate or stale certificate entries.
To resolve the issue, remove the existing Aria Logs certificate(if any) from VCD Trust Store and reconfigure Log Ingestion in VMware Cloud Director.
Navigate to Trusted Certificates
VCD UI → Administration → Trusted Certificates
Remove the Stored Aria Operations for Logs Certificate
Identify the certificate matching the Aria Operations for Logs and delete it.
Validate and Reconfigure Log Ingestion Using FQDN
Steps to Generate a Self-Signed Certificate with SAN on Aria Operations for Logs
openssl genrsa -out domain.key 2048[ req ]
default_md = sha512
prompt = no
req_extensions = req_ext
distinguished_name = req_distinguished_name
[ req_distinguished_name ]
commonName = your_server_fqdn.com
countryName = US
stateOrProvinceName = State
localityName = City
organizationName = Company
[ req_ext ]
subjectAltName = @alt_names
[ alt_names ]
DNS.1 = Aria_Logs_VIP_fqdn
DNS.2 = Aria_Logs_PrimaryNode_fqdn
DNS.3 = Aria_Logs_WorkerNode_fqdn
DNS.4 = Aria_Logs_VIP_Shortname
DNS.5 = Aria_Logs_PrimaryNode_Shortname
DNS.6 = Aria_Logs_WorkerNode_Shortname
IP.1 = Aria_Logs_VIP_IPAddress
IP.2 = Aria_Logs_PrimaryNode_IPAddress
IP.3 = Aria_Logs_WorkerNode_IPAddress
openssl req -x509 -new -nodes -key domain.key -days 3650 -out domain.crt -config csrconfig.txt -extensions req_ext cat domain.key domain.crt > /tmp/cert.pem/tmp/cert.pem file to the /tmp directory on all other nodes in the cluster.To install custom certificate on Aria Operations for Logs, please refer Install a Custom SSL Certificate.
After replacing the certificate on Aria Operations for Logs with one that includes the required SAN entries, reconfigure Log Ingestion in VMware Cloud Director. The configuration should complete successfully.