InlineMetadataProxy1
{
"secret": "string",
"metadata_server_ca_ids": [
"string"
],
"edge_cluster_member_indexes": [
0
],
"crypto_protocols": [
"string"
],
"metadata_server_url": "string",
"attached_logical_port_id": "string",
"edge_cluster_id": "string"
}
secret to access metadata server
The CAs referenced here must be uploaded to the truststore using the API POST /api/v1/trust-management/certificates?action=import. User needs to ensure a correct CA for this metedata server is used. The REST API can not detect a wrong CA which was used to verify a different server. If the Metadata Proxy reports an ERROR or NO_BACKUP status, user can check the metadata proxy log at transport node for a possible CA issue.
If none is provided, the NSX will auto-select two edge-nodes from the given edge cluster. If user provides only one edge node, there will be no HA support.
The cryptographic protocols listed here are supported by the metadata proxy. The TLSv1.1 and TLSv1.2 are supported by default.
The URL in format scheme://host:port/path. Please note, the scheme supports only http and https as of now, port supports range 3000 - 9000, inclusive.
id of attached logical port
edge cluster uuid