One important note:

ln -sf /etc/pki/vdsm/libvirt-vnc/server-key.pem
/etc/pki/vdsm/libvirt-migrate/client-key.pem
ln -sf /etc/pki/vdsm/libvirt-vnc/server-cert.pem
/etc/pki/vdsm/libvirt-migrate/client-cert.pem

Enrol will fail if client-*.pem doesn't exist and/or is not a symbolic link.

- Gilboa

On Tue, Dec 27, 2022 at 5:29 AM dhanaraj.ramesh--- via Users <
users@ovirt.org> wrote:

> No worries, we call came across this issue.  As long as the hosted engine
> is running is Gluster, you can shutdown and bring up in any other nodes.
> Now in order for you to bring the node up in the cluster, you will have to
> manually replace the vdsm cert in each nodes, follow by re-enroll the
> certificate
>
> the steps are
>
> # To check CERT expired
> # openssl x509 -in /etc/pki/vdsm/certs/vdsmcert.pem -noout -dates
>
> 1. Backup vdsm folder
>     # cd /etc/pki
>     # mv vdsm vdsm.orig
>     # mkdir vdsm   ; chown vdsm:kvm vdsm
>     # cd vdsm
>     # mkdir libvirt-vnc certs keys libvirt-spice libvirt-migrate
>     # chown vdsm:kvm  libvirt-vnc certs keys libvirt-spice libvirt-migrate
>
> 2. Regenerate cert & keys
>     # vdsm-tool configure --module certificates
>
> 3. Copy the cert to destination location
>     chmod 440 /etc/pki/vdsm/keys/vdsmkey.pem
>     chown root /etc/pki/vdsmcerts/*pem
>     chmod 644 /etc/pki/vdsmcerts/*pem
>
>     cp /etc/pki/vdsm/certs/cacert.pem
> /etc/pki/vdsm/libvirt-spice/ca-cert.pem
>     cp /etc/pki/vdsm/keys/vdsmkey.pem
> /etc/pki/vdsm/libvirt-spice/server-key.pem
>     cp /etc/pki/vdsm/certs/vdsmcert.pem
> /etc/pki/vdsm/libvirt-spice/server-cert.pem
>
>     cp /etc/pki/vdsm/certs/cacert.pem /etc/pki/vdsm/libvirt-vnc/ca-cert.pem
>     cp /etc/pki/vdsm/keys/vdsmkey.pem
> /etc/pki/vdsm/libvirt-vnc/server-key.pem
>     cp /etc/pki/vdsm/certs/vdsmcert.pem
> /etc/pki/vdsm/libvirt-vnc/server-cert.pem
>
>     cp -p /etc/pki/vdsm/certs/cacert.pem
> /etc/pki/vdsm/libvirt-migrate/ca-cert.pem
>     cp -p /etc/pki/vdsm/keys/vdsmkey.pem
> /etc/pki/vdsm/libvirt-migrate/server-key.pem
>     cp -p /etc/pki/vdsm/certs/vdsmcert.pem
> /etc/pki/vdsm/libvirt-migrate/server-cert.pem
>
>     chown root:qemu /etc/pki/vdsm/libvirt-migrate/server-key.pem
>
>     cp -p /etc/pki/vdsm.orig/keys/libvirt_password /etc/pki/vdsm/keys/
>
>     mv /etc/pki/libvirt/clientcert.pem /etc/pki/libvirt/clientcert.pem.orig
>     mv /etc/pki/libvirt/private/clientkey.pem
> /etc/pki/libvirt/private/clientkey.pem.orig
>     mv /etc/pki/CA/cacert.pem /etc/pki/CA/cacert.pem.orig
>
>     cp -p /etc/pki/vdsm/certs/vdsmcert.pem /etc/pki/libvirt/clientcert.pem
>     cp -p /etc/pki/vdsm/keys/vdsmkey.pem
> /etc/pki/libvirt/private/clientkey.pem
>     cp -p /etc/pki/vdsm/certs/cacert.pem /etc/pki/CA/cacert.pem
>
>
> 3. cross check the backup folder /etc/pki/vdsm.orig vs /etc/pki/vdsm
>      # refer to /etc/pki/vdsm.orig/*/ and set the correct owner & group
> permission in /etc/pki/vdsm/*/
>
> 4. restart services # Make sure both services are up
>     systemctl restart vdsmd libvirtd
>
> 5. reboot the node and confirm the host has been rebooted manually, and
> put the host in maintenance mode
>
> 6. enroll certificate. (DO NOT re-install), exit the maintenance mode
>
>
> Cheers from Singapore.
> _______________________________________________
> Users mailing list -- users@ovirt.org
> To unsubscribe send an email to users-le...@ovirt.org
> Privacy Statement: https://www.ovirt.org/privacy-policy.html
> oVirt Code of Conduct:
> https://www.ovirt.org/community/about/community-guidelines/
> List Archives:
> https://lists.ovirt.org/archives/list/users@ovirt.org/message/XWS5LKNFTLH2A4ZJFOJFCW6ZZ6QBMNTS/
>
_______________________________________________
Users mailing list -- users@ovirt.org
To unsubscribe send an email to users-le...@ovirt.org
Privacy Statement: https://www.ovirt.org/privacy-policy.html
oVirt Code of Conduct: 
https://www.ovirt.org/community/about/community-guidelines/
List Archives: 
https://lists.ovirt.org/archives/list/users@ovirt.org/message/RRLJXWDOH4DZJEL4HASU6GI7ETOSXD7N/

Reply via email to