Avamar - Dell Cloud Director Data Protection Extension (DPE) vcpsrv status shutdown due to invalid Cloud certificate
Summary: DPE: vcpsrv status shows shutdown due to invalid vcloud certificate in DPE truststore The Dell EMC Data Protection Extension is the first certificated data protection solution for VMware vCloud Director, which is also a native data protection solution. It extends the vCloud Director HTML 5 UI and REST API providing tenants a single management end-point for their virtual datacenters. Tenants can manage image level backups of VMs and vApps, restore to a new VM or in-place, by policy or adhoc, even file level restore. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
VCP Manager Service shutdown
BG Service down
DPE unable to connect to vCloud
VCP manager log shows cert errors:
BG Service down
DPE unable to connect to vCloud
VCP manager log shows cert errors:
/var/log/vcp/vcp-manager.log
2022-04-15 15:31:50,524 [main] ERROR (RestUtil.java:389) - null javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: java.security.cert.CertPathBuilderException: Could not build a validated path. at sun.security.ssl.Alert.createSSLException(Unknown Source) ~[?:1.8.0_301] at sun.security.ssl.TransportContext.fatal(Unknown Source) ~[?:1.8.0_301]
Cause
systemctl restart vcp-manager.service sleep 30 vcp-cli srv update <srv-service-name from step 8> vcp-cli bg update <bg service name from step 8>
The certificate was expired or replaced on the Cloud and the DPE needs to get the new Cloud certificate imported.
Resolution
Prerequisites: Obtain credentials for keystore file. DPE always generate random password keystore so we have to use the command below with customer master password to get keystore
Step 1
Check current certificates in the truststore for the Cloud certificate, looking at the dates to see if expired, or looking at the SHA1 fingerprint to see if it matches the current certificate applied to the vcloud
Example output showing that the old vCloud certificate is currently loaded in the truststore using alias cloud
In this example in fingerprint is: C4:0A:BE:56:D5:25:A1:49:00:94:9E:9D:46:FD:6F:64:1D:59:A7:E8
In this example the certificate is valid until: Sat Apr 23 09:32:45 EDT 2022
Step 2
Use new keytool command to make a TLS connection to the Cloud and get the SHA1 fingerprint
Step 3
Make a copy of the truststore
Step 4
In order to replace the certificate in the trust store on DPE, first delete the old cert
Download the current vCloud cert to a new file: new_cloud_cert.crt
Import the certificate file to the truststore
Step 7
Repeat the command from step1 again to confirm new cert is installed
Example output
This creation date should be today date, and SHA1 fingerprint and certificate dates should be updated.
Step 8
Get the node status to grab the service names for BG and srv
Restart the services
Step 10
Check the statuses
vcp-cli credential list -p <master_password>example output
# vcp-cli credential list -p Changeme_1 getting credentials... Success credential: component: truststore url: /etc/vcp/truststore username: password: ZM1VnGwRZCLFrrNS
Step 1
Check current certificates in the truststore for the Cloud certificate, looking at the dates to see if expired, or looking at the SHA1 fingerprint to see if it matches the current certificate applied to the vcloud
# vcp-cli certificate show-trust -a cloud
Example output showing that the old vCloud certificate is currently loaded in the truststore using alias cloud
Alias name: cloud Creation date: Sep 8, 2021 Entry type: trustedCertEntry [..] Valid from: Wed Mar 24 09:32:46 EDT 2021 until: Sat Apr 23 09:32:45 EDT 2022 Certificate fingerprints: MD5: B0:E2:12:5D:46:4D:DC:09:FB:2C:EF:94:7D:29:EB:DF SHA1: C4:0A:BE:56:D5:25:A1:49:00:94:9E:9D:46:FD:6F:64:1D:59:A7:E8 SHA256:40:67:86:D2:EE:58:72:24:E0:52:88:33:4E:C8:9E:44:9E:B0:24:EE:65:2E:AD:5C:D3:40:97:44:AD:04:48:3BTake note of the SHA1 fingerprint and dates:
In this example in fingerprint is: C4:0A:BE:56:D5:25:A1:49:00:94:9E:9D:46:FD:6F:64:1D:59:A7:E8
In this example the certificate is valid until: Sat Apr 23 09:32:45 EDT 2022
Step 2
Use new keytool command to make a TLS connection to the Cloud and get the SHA1 fingerprint
# keytool -printcert -sslserver <cloud director hostname or ip>:443 -rfc | openssl x509 -noout -fingerprint -datesExample output
SHA1 Fingerprint=94:2F:74:56:9C:19:61:2D:7E:24:60:4A:8A:2F:89:D7:31:34:19:A4 notBefore=Dec 29 18:59:49 2021 GMT notAfter=Dec 29 18:59:49 2022 GMTIf the fingerprints don't match or the dates do not make. you need to update the cloud certificate on the DPE.
Step 3
Make a copy of the truststore
cp -p /etc/vcp/truststore /etc/vcp/truststore-`date -I`.bkp
Step 4
In order to replace the certificate in the trust store on DPE, first delete the old cert
keytool -delete -alias cloud -keystore /etc/vcp/truststore -storepass <keystore_passphrase>Step 5
Download the current vCloud cert to a new file: new_cloud_cert.crt
keytool -printcert -rfc -sslserver <Cloud_hostname>:443 > new_cloud_cert.crtStep 6
Import the certificate file to the truststore
keytool -import -file new_cloud_cert.crt -alias cloud -keystore /etc/vcp/truststore -storepass <keystore_passphrase>
Step 7
Repeat the command from step1 again to confirm new cert is installed
# vcp-cli certificate show-trust -a cloud
Example output
Alias name: cloud
Creation date: Jul 27, 2022
Entry type: trustedCertEntry
Owner: CN=vcd.example.lab
Issuer: CN=vcd.example.lab
Serial number: 7e29bef2a5652b7a
Valid from: Wed Dec 29 13:59:49 EST 2021 until: Thu Dec 29 13:59:49 EST 2022
Certificate fingerprints:
MD5: 8A:5A:D1:09:AE:C8:D9:94:B6:B9:D3:A5:E9:BD:AA:07
SHA1: 94:2F:74:56:9C:19:61:2D:7E:24:60:4A:8A:2F:89:D7:31:34:19:A4
SHA256: 38:88:0F:5F:C1:8C:BB:F0:D9:64:40:72:D9:59:35:5E:2B:72:BB:50:2F:88:3B:B0:8D:4C:D5:16:56:35:19:E2
Note:
This creation date should be today date, and SHA1 fingerprint and certificate dates should be updated.
Step 8
Get the node status to grab the service names for BG and srv
vcp-cli node statusStep 9
Restart the services
systemctl restart vcp-manager.service sleep 30 vcp-cli srv stop <srv-service-name> -p <master password> vcp-cli srv start <srv-service-name> -p <master password> vcp-cli bg stop <bg service name> -p <master password> vcp-cli bg start <bg service name> -p <master password>
Step 10
Check the statuses
vcp-cli srv status vcp-cli bg status
Affected Products
AvamarArticle Properties
Article Number: 000198597
Article Type: Solution
Last Modified: 08 Jan 2026
Version: 8
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.