Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell VxRail: How to Manually Import vCenter SSL Certificate on VxRail Manager

Summary: Step-by-step instructions to manually import the vCenter SSL certificate on VxRail

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

In some situations, it is necessary to manually import the SSL certificates in vCenter after VxRail initial deployment.

Cause

Replacing vCenter SSL self-signed certificate with a previously owned certificate.

Resolution

A Python script is attached to this article in a .zip file (check the bottom of the article) to provide the importing process. Run this script AS ROOT on VxRail Manager, and use --help to obtain usage. Remove the script after use.
 
Note: The script works on VxRail 4.5.x, 4.7.x, 7.x, and 8.x. Script in this article was updated on February 26, 2024. Starting from 7.0.480, the script has been added into VxRail Manager at /mystic/ssl/cert_util.py. You can run this script directly.

Follow these steps to replace certificates on VxRail Manager:
  1. Download the python script cert_util_pkb.zip and upload it to VxRail Manager.
  2. You must now use SSH log in to VxRail Manager and switch to ROOT user.
  3. Extract script cert_util_pkb.zip:
# unzip cert_util_pkb.zip
  1. Run the script:
# python cert_util.py
  1. Wait for the VxRail plug-in UI to load. It may take up to 10 minutes for the UI to be read.
Example script output:
vxm:/home/mystic # python cert_util.py
Verify certificate against vCenter vcluster101-vcsa.vv003.local
Downloaded root CA certificate zip to /tmp/tmpw2w8j7_r
Downloaded root CA certificate zip from vcluster101-vcsa.vv003.local
Found certificates ['certs/lin/53f38aa6.0', 'certs/lin/53f38aa6.r0'] that can verify server certificate
Clean up existing certificates in /var/lib/vmware-marvin/trust/
 - Removing /var/lib/vmware-marvin/trust/lin/53f38aa6.r0
 - Removing /var/lib/vmware-marvin/trust/lin/53f38aa6.0
Clean up existing crl files in /var/lib/vmware-marvin/trust/crl/
Root CA certificate /tmp/certs/lin is saved at /var/lib/vmware-marvin/trust/.
Remove /tmp/certs directory.
Delete saved CRL info in cacheservice...
1
1
Restarting vmware-marvin service...
Restarting runjars service...

Additional Information

Related Resources:
Here are some recommended resources related to this topic that might be of interest to you: Sometimes it may be necessary to import all certificates, not only the ones with the higher numbers.

See this published video:

Attachments


cert_util_pkb_en_US_1.zip

Article Properties


Affected Product

VxRail, VxRail Software

Last Published Date

14 May 2024

Version

48

Article Type

Solution