Troubleshooting the RSCD Agent connectivity issues
This topic provides information about how to troubleshoot RSCD Agent connectivity issues. Troubleshooting these issues involves analyzing the error message types and their causes and remediating them.
Overview of the troubleshooting process
The following process flow diagram shows how to troubleshoot an RSCD Agent issue. Troubleshooting involves clarifications for issues related to:
- Connectivity — Establishing communication from a server with NSH (or the Application Server) to a server with an RSCD Agent
- Access control lists (ACLs) — Ensuring that the exports, users, and users.local files are correct on the target
To troubleshoot issues, you can start with the use of agentinfo
command and analyze the rscd.log on the targets.
Log locations and tools useful during troubleshooting
Task | Procedure | Notes |
---|---|---|
Locate log file location and configuration | The RSCD logs are typically located inside the installation directory. The live log file is called the rscd.log. The rolled log files are named as rscd.logN, where N is a number. On Windows, the additional rscdsvc.log file contains logs for the Windows service startup. The log file locations:
/opt/bmc/bladelogic/RSCD/log
C:\Program Files\BMC Software\BladeLogic\RSCD If the log files are not present at this location, inspect the log4crc.txt file that is present in the C:\Windows\rsc or the /etc/rsc directory, and search for the following line:
| |
Enable debug logging during RSCD Agent startup | Do the following:
| Controlling RSCD agent logging |
Enable debug logging during RSCD Agent operation | You can use the agentctl command to change the logging level of the running Agent to debug. A restart of the RSCD reverts to the logging specified in the log4crc.txt file. You can run this command remotely or locally. To run this command remotely:
To run this command locally:
Running the command again reverts to the previous logging level. | |
Determine whether you are using User Principal Mapping (UPM) or an Automation Principal (AP) to connect to the RSCD Agent | Run agentinfo <targetName> from the NSH configured to use an NSH Proxy and inspect the output: UPM: Look for PrivilegeMapped in the User Permissions line:
Look for PasswordLogon in the User Permissions line:
|
Troubleshooting Checklist
Use these steps to troubleshoot connectivity issues that you might be experiencing with RSCD Agents in your environment.
Task | Action | Steps | Reference |
---|---|---|---|
1 | Define the scope of the problem. |
| |
2 | Run agentinfo. | From the system with the connectivity problem, start nsh and run agentinfo <targetName> Do you get a response ? An error message? | |
3 | Compare the returned message to the messages in the next section for the possible resolution. | The table in the "Resolutions for common RSCD Agent error messages" section contains a list of common messages received from agentinfo and how to resolve connectivity problems or acl issues if an error message is returned. | |
4 | If you do not receive one of the specified messages, start investigating the state of the RSCD on the target. | Connect to the target system via other means such as ssh or RDP as an administrative user. | |
5 | Verify that the RSCD Agent is running. | After you have connected to the target system, check the agent processes: UNIX:
Windows:
and check the RSCDsvc.exe and RSCD.exe processes. If the specified processes are not present, start the RSCD service.
If the Agent does not start, enable debug logging, start the Agent, collect the RSCD log files, open a case with BMC Support and include the log files. | |
6 | Verify that the Agent is running on the expected port (typically 4750). | After confirming the agent has started, confirm that it is running on the expected port. The default port is 4750 for TCP. You can configure the port by updating the secure file (/etc/rsc/secure or C:\Windows\rsc\secure). If the agent is listening correctly, the following output is expected:
If the process are not bound to the port defined in the secure file, enable debug logging, start the agent, collect the RSCD log files, open a case with BMC Support and include the gathered log files. | |
7 | Verify whether you can connect to the RSCD Agent port on the target system from the system with the connectivity issue. | Do the following to initiate a connection to the target:
If you do not see such a message, start investigating the network path between the systems. | |
8 | Verify that the firewall is not blocking access. | Ensure that the target system does not have the RSCD Agent port blocked by a firewall, which is installed either locally on the target or on the network between the Application Server and the target. If a firewall is blocking access, configure it to allow connectivity from the Application Server to the target on port 4750 for TCP (default port). | |
9 | Verify whether the AntiVirus or Host Intrusion Protection installed on the target is blocking the Agent. | Review the logs of the security agent and check for indications that it is blocking access to the RSCD process or port. |
Resolutions for common RSCD Agent error messages
The following table lists common errors you may see in NSH, job run logs, or in the GUI while connecting to a remote host running an RSCD Agent, along with the possible cause and solution to the problem. Some error messages have multiple possible causes that are listed in the table.
Symptom | Action | Reference |
---|---|---|
No authorization to access host | Check that a mapping exists for the incoming user in the users.local or users file and the nouser entry is present in the users file. If there is no mapping entry for the incoming user, the nouser entry blocks access to any unmatched requests. In this case, the following message is displayed in the rscd.log such as:
To correct this problem, grant RBAC permissions on the server object to the user and role, and then push acls to the target system, or add an entry to users.local to grant the role and user access. | |
No authorization to access host | Check that the exports file on the RSCD host grants the connecting system access. If access is not granted, the following message is displayed in the rscd.log:
In this case, update the exports file to grant access to the connecting system. | |
No authorization to access host | If the following message is displayed:
Check the mapping entry for the user and verify whether any commands restrictions are applied to the mapping entry. For example,
Alter the command authorizations the role has on the server object. | Setting up system and command authorizations |
No authorization to access host | If the target system is Linux or Unix, check that the mapped user exists on the target system. For example, if you see the following entry, ensure the dba user exists on the target system: BLAdmins:BLAdmin rw,map=dba | |
Login not allowed for user |
| |
Login not allowed for user (UPM) | In the rscd log (Windows), the following entry is displayed:
Check whether the localAdmin account exists on the target system. | |
Login not allowed for user (UPM) | In the rscd log (Windows), the following entry is displayed:
Confirm the LocalSystem, BladeLogicRSCD, and the mapped user have been granted Logon as Batch Job, and they are not listed in the Deny Logon as Batch Job and are not a part of any groups listed in the Deny Logon as Batch Job policy. | Impersonation and privilege mapping |
Login not allowed for user (UPM) | In the rscd log (Windows), the following entry is displayed:
Confirm that the BladeLogicRSCD account is not locked out or disabled. | |
No authorization to access host (Automation Principal) | In the rscd log (Windows), the following entry is displayed:
Confirm that the user specified in the Automation Principal has the Logon as Batch Job right and is not listed in Deny Logon as Batch Job or a member of any group listed in that policy. | |
No authorization to access host (Automation Principal) | In the rscd log (Windows), the following entry is displayed:
This indicates the user account specified in the Automation Principal is locked out. Unlock the account to restore access. | |
No authorization to access host (Automation Principal) | In the rscd log (Windows), the following entry is displayed:
This indicates that the password specified in the Automation Principal is incorrect. | |
No authorization to access host (Automation Principal) | In the rscd log (Windows), the following entry is displayed:
This indicates the account specified in the Automation Principal does not exist or does not have access to the target system. | |
Permission denied | Check the account that is mapped to and whether that role has the required access permission. For example, if you are trying to read the system log of a target and get the following Permission denied message:
Check what user you are mapped to by running agentinfo:
Ensure the mapped account can read the /var/log/messages file. | |
No route to host | If the target agent is running, this may indicate that a host-based firewall is blocking access. | |
Error in TLS protocol/ encryption configuration error | This issue occurs when the secure file is different on the two hosts that are interacting. Ensure that both hosts are communicating using the same protocol and encryption settings. Confirm that the RSCD is listening on 4750 port. This error indicates connectivity issues with the target. Verify the network connectivity to the target. | |
I/O error | This sometimes is shown in place of | |
Remote host is unknown | This error will happen when either the application server can't resolve the host, or your client can't resolve the host. Ensure the client system can resolve the target hostname that is registered in the console. | |
Connection timed out | You might see this error in the following situations:
| |
Connection refused | This error occurs when the remote host is down and/or the Agent is not running. It can also happen when there is a mismatch between the port the Agent communicates over (configured in the secure file) and the port configured on the Agent from the originating connection. | |
Connection Reset or Broken Pipe | The rscd logs show an initial connection from the client, and then no other connections. A simple command like agentinfo may work but successive calls to the agent will fail. One possible cause to this error is a network firewall that only allows traffic that matches defined profiles. This feature may have different names in different firewall vendors. |
Comments