YYYYY-MM-DDThh:mm:ss ERROR [AsyncExecutor-2] com.vmware.vrops.vcenterlinking.manager.StateManager - TRUST_ESTABLISHMENT failed for the Vcenter Id: 84#####-####-####-####-#########69a with reason: ERROR_UNKNOWNYYYYY-MM-DDThh:mm:ss INFO [AsyncExecutor-2] com.vmware.vrops.vcenterlinking.manager.StateManager - Starting TRUST_ESTABLISHMENT state processing for vCenter c6#####-####-####-####-#########e9cYYYYY-MM-DDThh:mm:ss INFO [AsyncExecutor-2] com.vmware.vrops.vcenterlinking.manager.StateManager - Initiating FetchIdentityParam task for vCenter c6#####-####-####-####-#########e9cYYYYY-MM-DDThh:mm:ss INFO [AsyncExecutor-2] com.vmware.vrops.vcenterlinking.manager.StateManager - Updating vCenter c6#####-####-####-####-#########e9c with Domain Id ca#####-####-####-####-#########e8eYYYYY-MM-DDThh:mm:ss ERROR [AsyncExecutor-2] com.vmware.vrops.vcenterlinking.manager.StateManager - TRUST_ESTABLISHMENT failed for the Vcenter Id: c68#####-####-####-####-#########e9c with reason: NO_AVAILABLE_PEERSYYYYY-MM-DDThh:mm:ss ERROR ManagementAdapter 3477974 [ops@4413 threadId="46406" threadName="TasksManager-TaskHandler-545" instanceId="512"] [(512) com.vmware.adapter.management.components.vclinking.task.C.N] - Exception while establishTrustcom.vmware.vapi.std.errors.AlreadyExists: AlreadyExists (com.vmware.vapi.std.errors.already_exists) => { messages = [LocalizableMessage (com.vmware.vapi.std.localizable_message) => { id = com.vmware.vcenter.trustmanagement.alreadyexists, defaultMessage = Trust object already exists for given domain ID (ca#####-####-####-####-#########e8e), args = [ca#####-####-####-####-#########e8e], params = <null>, localized = <null>}], data = <null>, errorType = ALREADY_EXISTS/opt/likewise/bin/lwregshell list_values '[HKEY_THIS_MACHINE\Services\vmafd\Parameters]' | grep -i DomainGUIDVCF 9.0.x
vCenter 9.0.x
This issue occurs when the vCenter instances have had Enhanced Linked Mode (ELM) broken prior to upgrading to 9.0, but the domainGUID was not updated.
python -c "import uuid; print(str(uuid.uuid4()))" <GUID HERE> with the ID generated in the previous step. Note: You will need the SSO administrator user [email protected] account password to complete this step. If the vCenter is using a custom SSO domain, replace vsphere.local with the custom domain name for the admin account and all CN entries below./opt/likewise/bin/ldapmodify -x -D cn=Administrator,cn=Users,dc=vsphere,dc=local -W <<EOFdn: dc=vsphere,dc=localchangetype: modifyreplace: objectGUIDobjectGUID: <GUID HERE>EOF/opt/likewise/bin/ldapsearch -b "dc=vsphere,dc=local" -D "cn=Administrator,cn=Users,dc=vsphere,dc=local" -s sub "(|(objectclass=dcObject))" objectGUID -Wroot@<vCenter> [ ~ ]# /opt/likewise/bin/ldapsearch -b "dc=vsphere,dc=local" -D "cn=Administrator,cn=Users,dc=vsphere,dc=local" -s sub "(|(objectclass=dcObject))" objectGUID -W
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <dc=vsphere,dc=local> with scope subtree
# filter: (|(objectclass=dcObject))
# requesting: objectGUID
#
# vsphere.local
dn: dc=vsphere,dc=local
objectGUID: #######-####-####-####-############
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
/opt/likewise/bin/lwregshell set_value "[HKEY_THIS_MACHINE\\Services\\vmafd\\Parameters]" "DomainGUID" "<GUID HERE>"/opt/likewise/bin/lwregshell list_values '[HKEY_THIS_MACHINE\Services\vmafd\Parameters]' | grep -i DomainGUID
service-control --stop --all && service-control --start --all