VxRail: How to Resolve VxVerify Failures For Test 'vc_trust'

Summary: The test 'vc_trust' tests if the VxRail Manager can successfully establish an SSL connection to the vCenter.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

The health-check 'vc_trust' checks if a trusted SSL connection can be established between VxRail Manager and the vCenter. The test uses local files and the download.zip from the vCenter which contains the CA Root certificate bundle.
 

Test Result Result code     Result Interpretation
Pass 0 No issues found, VxRail Manager can establish a trusted SSL connection to vCenter with both local files and files in download.zip.
Warning 1 Issues found, VxRail Manager is not able to establish a trusted SSL connection to vCenter, the issue might be with local files, the download.zip or both.
Failure 2 This test has no failure result.
Critical 3 This test has no critical result.



An example of the health-check output, when the test finds an issue, is shown below:

#========================#======#=========#====================================================================#==============# 
|  Hostname / Category   |Status  Dell_KB |  Warnings or Failures, unless tests Passed                         ; Product S.N. | 
#========================#======#=========#====================================================================#==============# 
| VxRM                   | Warning 196953 | vc_trust: Trusted root on VXM but not on VC                                      .|
| VxRM                   | Warning 196953 | vc_trust: Trusted root NOT found on VXM but available on VC                      .|
| VxRM                   | Warning 196953 | vc_trust: Trusted root NOT found on VXM nor VC                                   .|

 

The test run is 'vc_trust', which has two checks:

  • Local check:
    • Pre 7.0.240
      • Can any root certificate in /var/lib/vmware-marvin/trust be used to create a trusted SSL connection to vCenter
    • 7.0.240 and later
      • Can any root certificate in /var/lib/vmware-marvin/trust/lin be used to create a trusted SSL connection to vCenter
  • Remote check:
    • Can any root certificate in certs/lin from download.zip (acquired from vCenter during the test) be used to create a trusted SSL connection to vCenter

Cause

The VxRail Manager connects to the vCenter using SSL.
For a successful connection, the VxRail Manager loads trusted root certificates form the file system.
VxRail Management functionality is impacted in case the SSL connection cannot be established (Note: this has no impact on virtual machines nor vSphere)

The test can have four possible outcomes:

  1. Not shown in the output table
    1. Local test OK and remote test OK
  2. "Trusted root NOT found on VXM but available on VC"
    1. Local test NOT OK and remote test OK
  3. "Trusted root on VXM but not on VC"
    1. Local test is OK, and remote test is NOT OK
  4. "Trusted root NOT found on VXM nor VC"
    1. Local test NOT OK and remote test NOT OK

Resolution

  1. This is the wanted outcome and is not shown in the screen output (vxverify.txt)
    • No actions necessary
  2. VxRail Manager has a missing root certificate locally, but the certificate is available on the vCenter
  3. VxRail Manager can communicate with vCenter using SSL
    • Contact support to investigate why vCenter has no usable root certificate in download.zip
    • The import certificate KB does NOT fix the issue (do not run it)
  4. VxRail Manager not able to communicate with vCenter and vCenter provides no usable certificate
    • Contact support to investigate why vCenter has no usable root certificate in download.zip
    • The import certificate KB does NOT fix the issue

Affected Products

VxRail, VxRail Software
Article Properties
Article Number: 000196953
Article Type: Solution
Last Modified: 05 Sept 2025
Version:  6
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.