Note: In NSX 4.1.x, there is no functional impact when an internal certificate expires, however alarms will continue to trigger.
VMware have developed a script that will replace the certificates automatically and resolve this issue.
Please read usage of the script:
LEAD_DAYS
customized to consider certificates that have longer than 31 days of validation.Steps:
replace_certs_v1.7.py
.long_wait_time
defaults to a value of 150
but can be increased to 180
(or higher) and then re-run the script.CBM_API
certificates (API-Corfu Client certificate) as these are deprecated in 4.1.1. Please refer to the Resolution of KB#367857SshCommandExecutor: An error occurred: [digital envelope routines] unsupported
Unable to SSH to '192.168.x.x'. Please fix it and rerun the script
Keystore is not updated post replacement
", please refer to the following article: Certificate replacement script throws error while executing: Keystore is not updated post replacement of 'CBM_X' cert on node 'IP"
If the script does not work in your environment, please contact Broadcom Support about this issue, and provide the following:
replace_certs.log
Handling Log Bundles for offline review with Broadcom support:
Changelog:
12th July 2024: replace_certs_v1.1.py script replaced with replace_certs_v1.7.py