Caused by: java.security.cert.CertPathValidatorException: Could not validate certificate: certificate expired on 20250402133449GMT+00:00 at org.bouncycastle.jcajce.provider.RFC3280CertPathUtilities.processCertA(Unknown Source) ~[bc-fips-1.0.2.3.jar:1.0.2.3] at org.bouncycastle.jcajce.provider.PKIXCertPathValidatorSpi.engineValidate(Unknown Source) ~[bc-fips-1.0.2.3.jar:1.0.2.3] at org.bouncycastle.jcajce.provider.PKIXCertPathBuilderSpi.build(Unknown Source) ~[bc-fips-1.0.2.3.jar:1.0.2.3] at org.bouncycastle.jcajce.provider.PKIXCertPathBuilderSpi.build(Unknown Source) ~[bc-fips-1.0.2.3.jar:1.0.2.3] at org.bouncycastle.jcajce.provider.PKIXCertPathBuilderSpi.engineBuild(Unknown Source) ~[bc-fips-1.0.2.3.jar:1.0.2.3] at java.security.cert.CertPathBuilder.build(Unknown Source) ~[?:?]
echo "" | keytool -list -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -rfc 2> /dev/null | openssl x509 -noout -enddate
Aria Operations for Logs 8.18.x
The underlying issue is that thrift does not use the bcfks keystore when FIPS is enabled (but cassandra and tomcat both do), and the jks keystore does not get updated with new certs when FIPS is enabled, leading to thrift still using an expired certificate from the jks keystore
To resolve this issue please perform the steps below:
NOTE - Retrieve the keystore password by running following command to successfully delete keystore.
grep keystore-password /storage/core/loginsight/config/loginsight-config.xml*
NOTE- The keystore file may just be called keystore or may be called keystore.XXXXXX. Where XXXXXX equals a string of numbers.
For keystore.XXXXXX
keytool -list -v -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore.XXXXXX
keytool -delete -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore.XXXXXX -alias loginsight
And, for keystore
keytool -list -v -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore
keytool -delete -keystore /usr/lib/loginsight/application/etc/3rd_config/keystore -alias loginsight
pw=$(grep 'syslog-ssl-keystore-password' $(ls -1 /storage/core/loginsight/config/loginsight-config* | tail -n 1) | cut -d\" -f2)
keytool -importkeystore -srckeystore /usr/lib/loginsight/application/etc/3rd_config/keystore.bcfks -srcstoretype bcfks -providerpath /usr/lib/loginsight/application/lib/lib/bc-fips-*.jar -provider org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -srcstorepass $pw -deststoretype jks -deststorepass $pw -destkeystore keystore.XXXXXX
And for keystore
pw=$(grep 'syslog-ssl-keystore-password' $(ls -1 /storage/core/loginsight/config/loginsight-config* | tail -n 1) | cut -d\" -f2)
keytool -importkeystore -srckeystore /usr/lib/loginsight/application/etc/3rd_config/keystore.bcfks -srcstoretype bcfks -providerpath /usr/lib/loginsight/application/lib/lib/bc-fips-*.jar -provider org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -srcstorepass $pw -deststoretype jks -deststorepass $pw -destkeystore keystore
NOTE - You will need to run the commands above under the directory /usr/lib/loginsight/application/etc/3rd_config on all nodes of Aria Operations for Logs cluster.
5. Restart the loginsight service on all nodes, one at a time
systemctl restart loginsight