“Cannot determine whether NSX-T Data Center is enabled on this cluster. Go to NSX-T Data Center system and enable bidirectional trust.“
/var/log/vmware/vum-server/vmware-vum-server.log we see following log entries:error vmware-vum-server[10700] [Originator@6876 sub=vmomi.soapStub[76]] Initial service state request failed, disabling pings; /sso-adminserver/sdk/vsphere.local, <last binding: <<TCP '127.0.0.1 : 36042'>, <TCP '127.0.0.1 : 443'>>>, HTTP Status:405 'Method Not Allowed'info vmware-vum-server[25537] [Originator@6876 sub=SsoClient] Successfully acquired token: SamlToken [subject={Name: vpxd-extension-########-####-####-####-############; Domain:vSphere.local}, groups=[{Name: Users; Domain:vsphere.local}, {Name: SolutionUsers; Domain:vsphere.local}, {Name: SystemConfiguration.Administrators; Domain:vsphere.local}, {Name: ComponentManager.Administrators; Domain:vsphere.local}, {Name: LicenseService.Administrators; Domain:vsphere.local}, {Name: ActAsUsers; Domain:vsphere.local}, {Name: ServiceProviderUsers; Domain:vsphere.local}, {Name: Everyone; Domain:vSphere.local}], delegationChain=[], startTime=<date/time>, expirationTime=<date/time>, renewable=false, delegable=false, isSolution=true,confirmationType=1]...info vmware-vum-server[25537] [Originator@6876 sub=EHP] Found cached JWTerror vmware-vum-server[25537] [Originator@6876 sub=EHP] Response from ##.##.#.#/api/v1/node/services/install-upgrade: HTTP Status:403 'Forbidden'error vmware-vum-server[25537] [Originator@6876 sub=EHP] Failed to call NSX-T/api/v1/node/services/install-upgradeerror vmware-vum-server[25537] [Originator@6876 sub=EHP] Caught exception while finding Nsxt Upgrade Coordinator: Failed to call NSX-T/api/v1/node/services/install-upgradeGET /api/v1/trust-management/oidc-uris to NSX-T manager shows the lists of OIDC endpoints: "results" : [ { "oidc_uri" : "https://<VC-FQDN>/openidconnect/vsphere.local/.well-known/openid-configuration", "thumbprint" : "<UUID>", "oidc_type" : "vcenter", "issuer" : "https://<VC-FQDN>/openidconnect/vsphere.local", "jwks_uri" : "https://<VC-FQDN>/openidconnect/jwks/vsphere.local", "token_endpoint" : "https://<VC-FQDN>/openidconnect/token/vsphere.local", "claims_supported" : [ ], "override_roles" : [ ], "resource_type" : "OidcEndPoint",Note: The preceding log excerpts are only examples. Date, time and environmental variables may vary depending on your environment.
VMware NSX 4.x
VMware NSX-T Data Center 3.x
This issue has been resolved in vCenter version 8.0U1 and newer versions.
Workaround to be implemented in NSX via API:
Change the issuer of oidc in NSX manually using API, please make sure and do an NSX backup before proceeding.
Note: If the compute manager's thumbprint is updated in NSX, after applying this workaround, it will override the oidc changes here and the workaround will need to be reapplied.
GET https://<nsxmgr>/api/v1/trust-management/oidc-uris
{"results": [{ "oidc_uri": "https://<vcsa>/openidconnect/vsphere.local/.well-known/openid-configuration", "thumbprint": "<thumbprint-uuid>", "oidc_type": "vcenter", "scim_endpoints": [], "claim_map": [], "serviced_domains": [], "restrict_scim_search": false, "end_session_endpoint_uri": "https://<vcsa>/openidconnect/logout/vsphere.local", "issuer": "https://<vcsa>/openidconnect/vsphere.local", "jwks_uri": "https://<vcsa>/openidconnect/jwks/vsphere.local", "token_endpoint": "https://<vcsa>/openidconnect/token/vsphere.local",
"claims_supported": [],
"override_roles": [],
"resource_type": "OidcEndPoint", "id": "<oidc-id>", "display_name": "<oidc-display-name>", "_create_time": 1675162497329, "_create_user": "<user-id>",
"_last_modified_time": 1675162497329, "_last_modified_user": "<user-id>",
"_system_owned": false,
"_protection": "NOT_PROTECTED",
"_revision": 0 }]}
[INFO ] http-nio-5090-exec-591 70052176 101815 ###### com.vmware.identity.websso.client.Message Incoming or outgoing SAML message. Message Type:AUTHN_REQUEST ID:<message_id> SessionIndex:null Message source:https://<vcsa>/ui/saml/websso/metadata Message destination:https://<vcsa>/websso/SAML2/SSO/vSphere.local ← URI will be used in the POST API command below. Only the FQDN and the vSphere.local components are needed. Message validation result (for incoming messages):null
DELETE https://<nsxmgr>/api/v1/trust-management/oidc-uris/<oidc-display-name>
POST https://<nsxmgr>/api/v1/trust-management/oidc-uris/
Payload for this POST:{
"oidc_uri": "https://<vcsa>/openidconnect/vSphere.local/.well-known/openid-configuration", "thumbprint": "<>", "oidc_type": "vcenter", "scim_endpoints": [], "claim_map": [], "serviced_domains": [], "restrict_scim_search": false, "end_session_endpoint_uri": "https://<vcsa>/openidconnect/logout/vsphere.local", "issuer": "https://<vcsa>/openidconnect/vsphere.local", "jwks_uri": "https://<vcsa>/openidconnect/jwks/vsphere.local", "token_endpoint": "https://<vcsa>/openidconnect/token/vsphere.local", "claims_supported": [], "override_roles": [], "resource_type": "OidcEndPoint", }
If this KB did not help resolve your issue, you can review the following KB for further troubleshooting steps Troubleshooting NSX Installation Operations.
If you are contacting Broadcom support about this issue, please provide the following:
Handling Log Bundles for offline review with Broadcom support