Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Halaman ini menjelaskan cara memperbarui referensi ke sertifikat CA vCenter jika telah berubah, karena cluster admin dan cluster pengguna yang sedang berjalan harus diberi tahu tentang perubahan tersebut. Hal ini memengaruhi kolom vCenter.caCertPath dalam file konfigurasi cluster admin dan file konfigurasi cluster pengguna untuk Google Distributed Cloud.
Anda dapat memperbarui referensi sertifikat dengan perintah gkectl update seperti yang dijelaskan di sini.
Perbarui sertifikat CA vCenter yang dirujuk dalam file konfigurasi cluster
Untuk mengupdate cluster admin dan pengguna yang sedang berjalan agar menggunakan sertifikat baru:
Anda dapat menggunakan flag -k jika ingin mengizinkan sertifikat yang tidak dikenal. Hal ini dilakukan untuk menghindari masalah sertifikat yang mungkin Anda alami saat mengakses vCenter.
Tentukan sertifikat vCenter mana yang valid. Hanya salah satu file sertifikat Linux di folder ..../certs/lin yang diekstrak yang merupakan sertifikat vCenter yang valid. Untuk menentukan file mana yang merupakan sertifikat vCenter yang valid, lakukan langkah-langkah berikut:
Tetapkan variabel lingkungan berikut dari Workstation Admin tempat govc sudah diinstal. Jika belum dilakukan, download dan instal alat govc:
VCENTER_IP_ADDRESS_OR_FQDN: alamat IP atau FQDN vCenter Server.
VCENTER_USERNAME: nama pengguna vCenter Server.
VCENTER_PASSWORD: sandi untuk nama pengguna yang ditentukan.
FULL_PATH_OF_EXTRACTED_LIN_FILE: jalur lengkap ke file sertifikat Linux yang validitasnya akan Anda uji.
Untuk memverifikasi bahwa sertifikat vCenter valid, jalankan perintah govc about:
govc about
Jika sertifikat vCenter valid, perintah govc about akan mencetak detail tentang Server vCenter yang mirip dengan berikut ini:
FullName: VMware Center Server 7.0.3 build-24322018
Name: VMware Center Server
Vendor: VMware, Inc.
Version: 7.0.3
Build: 24322018
OS type: linux-x64
API type: VirtualCenter
API version: 7.0.3.0
Product ID: vpx
UUID: 475fa366-faa9-43f0-9417-e6dadc55514c
Jika sertifikat tidak valid, Anda akan melihat error x509. Jika Anda melihat error x509, perbarui variabel lingkungan FULL_PATH_OF_EXTRACTED_LIN_FILE agar mengarah ke file sertifikat Linux yang berbeda di folder ..../certs/lin yang diekstrak, lalu jalankan perintah govc about lagi. Ulangi langkah a. dan b. hingga Anda menemukan sertifikat yang valid, atau hingga Anda selesai menguji setiap file sertifikat Linux di folder ..../certs/lin yang diekstrak.
Untuk mencadangkan file sertifikat CA vCenter lama (yang berada di jalur yang ditentukan dalam kolom vCenter.caCertPath file konfigurasi cluster admin Anda), ganti namanya menjadi vcenter-ca-cert.pem.old.
Ganti nama file sertifikat valid baru di folder ..../certs/lin menjadi vcenter-ca-cert.pem, lalu pindahkan ke jalur yang ditentukan di kolom vCenter.caCertPath pada file konfigurasi cluster admin Anda.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-07-14 UTC."],[],[],null,["This page describes how to update the reference to the vCenter CA certificate if it has changed, as your running admin cluster and user clusters must be informed of the change. This affects the `vCenter.caCertPath` field in the admin cluster configuration file and the user cluster configuration files for Google Distributed Cloud.\n\nYou can update the certificate references with the `gkectl update` command as described here.\n\nUpdate the referenced vCenter CA certificate in the cluster configuration files\n\nTo update the running admin and user clusters to use the new certificate:\n\n1. Retrieve the new vCenter CA certificate and extract it:\n\n ```\n curl -o certs.zip https://VCENTER_IP_ADDRESS_OR_FQDN/certs/download.zip\n unzip certs.zip\n ```\n\n You can use the `-k` flag if you want to allow unknown certificates. This is to avoid any certificate issues you may have accessing vCenter.\n2. Determine which of the vCenter certificates is valid. Only one of the Linux certificate files in the extracted `..../certs/lin` folder is the valid vCenter certificate. To determine which file is the valid vCenter certificate, do the following:\n\n 1. Set the following environment variables from the Admin Workstation where `govc` is already installed. If not already done, [download and install govc tool](https://github.com/vmware/govmomi/tree/main/govc#binaries):\n\n ```\n export GOVC_URL=https://VCENTER_IP_ADDRESS_OR_FQDN\n export GOVC_USERNAME=VCENTER_USERNAME\n export GOVC_PASSWORD=VCENTER_PASSWORD\n export GOVC_TLS_CA_CERTS=FULL_PATH_OF_EXTRACTED_LIN_FILE\n export GOVC_INSECURE=false\n ```\n\n \u003cbr /\u003e\n\n Replace the following:\n - \u003cvar translate=\"no\"\u003eVCENTER_IP_ADDRESS_OR_FQDN\u003c/var\u003e: the IP address or FQDN of the vCenter Server.\n\n - \u003cvar translate=\"no\"\u003eVCENTER_USERNAME\u003c/var\u003e: the username of the vCenter Server.\n\n - \u003cvar translate=\"no\"\u003eVCENTER_PASSWORD\u003c/var\u003e: the password for the specified username.\n\n - \u003cvar translate=\"no\"\u003eFULL_PATH_OF_EXTRACTED_LIN_FILE\u003c/var\u003e: the full path to the Linux certificate file for which you are conducting a validity test.\n\n 2. To verify that the vCenter certificate is valid, run the `govc about` command:\n\n ```\n govc about\n ```\n\n If the vCenter certificate is valid, the `govc about` command prints details about the vCenter Server similar to the following: \n\n FullName: VMware Center Server 7.0.3 build-24322018\n Name: VMware Center Server\n Vendor: VMware, Inc.\n Version: 7.0.3\n Build: 24322018\n OS type: linux-x64\n API type: VirtualCenter\n API version: 7.0.3.0\n Product ID: vpx\n UUID: 475fa366-faa9-43f0-9417-e6dadc55514c\n\n If the certificate is invalid, you should see an `x509` error. If you see an `x509` error, update the `FULL_PATH_OF_EXTRACTED_LIN_FILE` environment variable to point at a different Linux certificate file in the extracted `..../certs/lin` folder, and then run the `govc about` command again. Repeat steps a. and b. until you locate the valid certificate, or until you are done testing each of the Linux certificate files in the extracted `..../certs/lin` folder.\n3. To backup the old vCenter CA certificate file (which is at the path specified in the [`vCenter.caCertPath`](/kubernetes-engine/distributed-cloud/vmware/docs/how-to/admin-cluster-configuration-file-latest#vcenter-cacertpath-field) field of your admin cluster configuration file), rename it to `vcenter-ca-cert.pem.old`.\n\n4. Rename the new valid certificate file in the `..../certs/lin` folder to `vcenter-ca-cert.pem` and then move it to the path specified in the [`vCenter.caCertPath`](/kubernetes-engine/distributed-cloud/vmware/docs/how-to/admin-cluster-configuration-file-latest#vcenter-cacertpath-field) field of your admin cluster configuration file.\n\n5. Update your admin cluster:\n\n ```\n gkectl update admin --config ADMIN_CLUSTER_CONFIG --kubeconfig ADMIN_CLUSTER_KUBECONFIG\n ```\n\n Replace the following:\n - \u003cvar translate=\"no\"\u003eADMIN_CLUSTER_CONFIG\u003c/var\u003e: the path of your admin cluster configuration file.\n\n After the update command completes, the admin cluster will use the new\n certificate.\n6. Verify that the admin cluster is healthy:\n\n ```\n gkectl diagnose cluster --kubeconfig ADMIN_CLUSTER_KUBECONFIG\n ```\n\n For more information, see\n [Diagnose an admin cluster](/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/diagnose#diagnose_admin_cluster).\n7. In each of your user cluster configuration files, set [`vCenter.caCertPath`](/kubernetes-engine/distributed-cloud/vmware/docs/how-to/user-cluster-configuration-file-latest#vcenter-cacertpath-field) to the path of your new `vcenter-ca-cert.pem` file.\n\n8. For each of your user clusters, run the `gkectl update` command:\n\n ```\n gkectl update cluster --config USER_CLUSTER_CONFIG --kubeconfig ADMIN_CLUSTER_KUBECONFIG\n ```\n\n \u003cbr /\u003e\n\n Replace the following:\n - \u003cvar translate=\"no\"\u003eUSER_CLUSTER_CONFIG\u003c/var\u003e: the path of your user cluster configuration file.\n\n After the update command completes for a particular user cluster, the cluster\n will use the new certificate.\n9. Verify that the user cluster is healthy:\n\n ```\n gkectl diagnose cluster --kubeconfig ADMIN_CLUSTER_KUBECONFIG \\\n --cluster-name USER_CLUSTER_NAME\n ```\n\n For more information, see\n [Diagnose a user cluster](/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/diagnose#diagnose_user_cluster).\n\n| **Note:** The `vCenter.caCertPath` field also appears in the admin workstation configuration file. If you want to create a new admin workstation, make sure that you edit the `vCenter.caCertPath` field to reference the current certificate."]]