This is from a VMware support experience. A customer could not change DNS server parameters of the NSX Edge IP Pool. But actually is was a problem due to a bug in VCD 9.5, where a Edge XML config was missing some tags and therefor not being able to validate the XML when VCD post the edited XML config back to NSX manager.
I have attached VMware support answer in the bottom of the post.
Script will get all edges from the NSX manager, then you find the correct one and fill into the next part of the script. Then you get the XML down to a file on your local machine, you then edit the file and put in the missing tags and lastly PUT the XML backup NSX manager. After this operation, it works from the GUI again.
# Import credential module and login information $ReturnObj = import-credentials vmwareSSO $nsxUsername = $ReturnObj.Username $nsxPassword = $ReturnObj.Password # Other variables $tempFile = "C:\temp\edge-747_jvr.xml" # Allow all SSL protocols $AllProtocols = [System.Net.SecurityProtocolType]'Ssl3,Tls,Tls11,Tls12' [System.Net.ServicePointManager]::SecurityProtocol = $AllProtocols Add-Type @" using System; using System.Net; using System.Net.Security; using System.Security.Cryptography.X509Certificates; public class ServerCertificateValidationCallback { public static void Ignore() { ServicePointManager.ServerCertificateValidationCallback += delegate ( Object obj, X509Certificate certificate, X509Chain chain, SslPolicyErrors errors ) { return true; }; } } "@ [ServerCertificateValidationCallback]::Ignore(); # Getting all edges $Type = "Accept: application/xml" $Header = @{"Authorization" = "Basic " + [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($nsxUsername + ":" + $nsxPassword))} $nsxUri = "https://10.1.10.4/api/4.0/edges" [xml]$edges = (Invoke-WebRequest -Uri $nsxUri -Headers $Header -Method GET -ContentType $Type).Content foreach ($edge in $edges.pagedEdgeList.edgePage.edgeSummary) { $edgeInfo = "name: {0} - ID: {1}" -f $edge.name, $edge.objectId $edgeInfo } # Getting specefic edge config $edgeId = "edge-747" $Type = "Accept: application/xml" $Header = @{"Authorization" = "Basic " + [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($nsxUsername + ":" + $nsxPassword))} $nsxUri = "https://10.1.10.4/api/4.0/edges/$edgeId" (Invoke-WebRequest -Uri $nsxUri -Headers $Header -Method GET -ContentType $Type).Content | out-file $tempFile # PUT edge config after edit $Type = 'application/xml' $Header = @{"Authorization" = "Basic " + [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($nsxUsername + ":" + $nsxPassword))} $nsxUri = "https://10.1.10.4/api/4.0/edges/$edgeId" $edgeConfigAltered = Get-Content $tempFile $respons = Invoke-WebRequest -Uri $nsxUri -Headers $Header -Method Put -ContentType 'application/xml' -Body $edgeConfigAltered # Statuscode 204 is accepted $respons.StatusCode
From Support:
– The issue you are seeing is a known issue 9.5.
– Like I mentioned in the previous email, this is due to missing elements from the xml.
– From the xml in the logs, I could see there are 52 NAT rules on that edge.Correct me if I am wrong. The following 2 rules had the
<natRule> <ruleId>196726</ruleId> <ruleType>user</ruleType> <action>dnat</action> <vnic>0</vnic> <originalAddress>IP</originalAddress> <translatedAddress>IP</translatedAddress> <dnatMatchSourceAddress>any</dnatMatchSourceAddress> <loggingEnabled>false</loggingEnabled> <enabled>true</enabled> <description>RULE</description> <protocol>tcp</protocol> <originalPort>3417</originalPort> <translatedPort>3478</translatedPort> <dnatMatchSourcePort>any</dnatMatchSourcePort> </natRule> <natRule> <ruleId>196727</ruleId> <ruleType>user</ruleType> <action>dnat</action> <vnic>0</vnic> <originalAddress>IP</originalAddress> <translatedAddress>IP</translatedAddress> <dnatMatchSourceAddress>any</dnatMatchSourceAddress> <loggingEnabled>false</loggingEnabled> <enabled>true</enabled> <description>RULE</description> <protocol>tcp</protocol> <originalPort>3416</originalPort> <translatedPort>3234</translatedPort> <dnatMatchSourcePort>any</dnatMatchSourcePort> </natRule>
I have attached the file with the list of all the NAT rules seen from the logs if you need to cross-verify.
Plan:
– To fix the issue,please follow https://kb.vmware.com/s/article/67193
If you have any further questions,let me know.
Have a good evening,
Best regards,
Deepthy