Replies: 2 comments 2 replies
-
|
@arpanbht Can you set auth strictness global setting 'ca.plugin.root.auth.strictness' to false and restart the KVM agent. Once connected, for secure connections you can
|
Beta Was this translation helpful? Give feedback.
-
|
CloudStack Agent SSL Handshake Failure Across WireGuard VPN The key log line tells the whole story: Failed to load keystore, using trust all manager Fix Look for cloud.jks or similar keystore filesCopy cloud.jks (and any .cer / .crt files) to the .2 host at the same path, then restart the agent: Point it to 192.168.1.102 when promptedOption 3 — Manual certificate import Copy cloud-mgmt.cer to the .2 host, then:sudo keytool -import -alias cloud -file cloud-mgmt.cer sudo systemctl restart cloudstack-agent |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
i have setup a wireguard vpn between two of my networks and it is working 192.168.1.0/24 network can connect to 192.168.2.0/24
and i have setup a mgmt server on 192.168.1.102 and i have added a host from .1 network and it worked but while adding a .2 network host , i created a separate pod with a .2 network config but in the agent logs i am getting this handshake error
but i can easily ping from this host or even connect to the mgmmt server on 8250
Beta Was this translation helpful? Give feedback.
All reactions