Important Update: Cohesity Products Knowledge Base Articles
All Cohesity Knowledge Base Articles are now managed via the Cohesity Support Portal: https://support.cohesity.com/s/searchunify. The Knowledge Base articles available here will not reflect the latest information or may no longer be accessible.
Description
This article describes how to troubleshoot and resolve issues while deploying NetBackup certificates to clients.
Perform the following steps when having issues deploying client certificates:
Step |
Action |
1 |
Verify communication with NBWMC on the Primary server: nbcertcmd -ping If this succeeds, skip to step 10 |
2 |
Check the same command on the Primary Server itself (or if command line access to the Primary is not available, check from any other NetBackup Media Server or Client): nbcertcmd -ping If this fails, NBWMC is not working correctly see: https://www.veritas.com/content/support/en_US/article.100073385 for troubleshooting steps to resolve NBWMC issues. If this step succeeds, the issue is on the client side, proceed with step 3. |
3 |
Test the network connectivity. Ping the primary server by name: ping <nbmaster> If this succeeds, skip to step 7 |
4 |
If ping of primary server by name fails, get the IP address of the Primay Server (or all IP addresses if there are multiple interfaces) and ping by IP: ping 10.11.12.13 If this succeeds, skip to step 6 |
5 |
If ping of Primary Server by IP also fails, test this from another client or media server. Some environments have the ICMP protocol, which the "ping" command uses, disabled for security reasons. If there is a chance that this might be the case, continue to the next steps. Otherwise, if pinging the Primary Server works from other hosts, there are networking issues on the client that need to be resolved. |
6 |
If pinging the Primary Server is successful by IP but failed by hostname: This may indicate a need to update the DNS (Domain Name Service) entries for the Primary server, or validate the DNS server used by the problem client. If DNS is not in use then updating the hosts file on the client can be used to resolve the hostname of the Primary Server. The hosts file can be found at: Linux/Unix: Windows: After updating the hosts file, clear the NetBackup host cache: Linux/Unix: Windows:
|
7 |
After verifying ping or if ICMP is intentionally disabled: OS utilities can be used to test TCP connectivity over port 1556 (PBX), the primary port NetBackup uses. This must be open bi-directionally, and both sides must be listening. Linux: A. curl Example:
B, nc (netcat) Example: C. telnet Example: Note: To exit, hit ctrl+] to escape the telnet session, then type "quit" and press enter, or press the enter key, and the remote NetBackup host will close the connection. Windows: A. Test-NetConnection (powershell cmdlet): Example:
B. telnet: Example: If it connects, the screen goes blank and shows a cursor, meaning you are in a telnet session. If connection succeeds, skip to step 9 |
8 |
If the connection attempt was not successful, then something may be blocking the TCP connection. There are three common ways that TCP connections can be blocked: 1. By the OS firewall of the NetBackup Primary Server. 2. By a network firewall or layer-3 switch acting as a firewall. If it is verified that both sides are listening with netstat, but a telnet/curl/Test-NetConnection to make a TCP connection over port 1556 cannot be made, please raise a request with the network or firewall team to determine why port 1556 is not open between these hosts. 3. By the OS firewall on the problem client. Linux: A. iptables -L Example:
B. systemctl status firewalld Example: Windows: Example:
The above examples were of the firewall being off. If the output differs, ask the appropriate OS admin to confirm that the firewall is either off, or that it is configured to allow traffic through TCP port 1556. Linux: A. netstat: Example: B. ss: Example: Solaris: Example: Windows: Example:
|
9 |
Additional steps to resolve the inability to run nbcertcmd -ping: If it is verified that ping works, TCP over port 1556 works, and nbcertcmd -ping works on the Primary Server, but nbcertcmd -ping does NOT work, then continue with the following tests:
B. Verify the top SERVER entry in the NetBackup configuration on the client is correct: Linux: Example: Windows: Example: Note: Only the top item in the list is important for nbcertcmd -ping to work under normal circumstances. C. Check for tunnel configuration on client, if the websvctunnels.cache file exists Linux: Windows:
E. If status 26/8500 is being returned and previously it has been verified that TCP traffic on port 1556 works, there is still a chance that TLS traffic is being blocked on port 1556. This is possible with application-aware firewall models. This filtering could be happening from:
There are not many good tests for this, as "nbcertcmd -ping" not working when raw TCP works over the same port can be an indicator of many possible issues. |
10 |
After verifying nbcertcmd -ping works, pull a CA certificate: Run on the client: Linux: Example: Windows: Example: If pulling the CA certificate worked, skip to step 12 |
11 |
Common errors that are seen if pulling the CA certificate fails: A. EXIT STATUS 26: client/server handshaking failed: This error can be received when running almost any nbcertcmd command.
If all checks are validated, then the issue is most likely to be a network firewall or network switch acting as a firewall that is selectively-blocking TLS traffic on port 1556. B. EXIT STATUS 41: network connection timed out This error can be received when running almost any nbcertcmd command.
C. EXIT STATUS 8500: Connection with the web service was not established. See troubleshooting for status 26 above (Error A). D. EXIT STATUS 5969 : Response from the NetBackup Web Management Console service could not be parsed. See troubleshooting for status 26 above (Error A). This error almost always indicates that the issue is on the Primary Server.
E. EXIT STATUS 13 / 23 / 25 / 61 / 5949 / 5978 / 5942 / 7624 / 7625 / 7627 / 7640 / 7660 / 9301 Some certificate files may be corrupt. See: https://www.veritas.com/support/en_US/article.100039941 F. EXIT STATUS 14: file write failed This can be caused by a corrupt certmapinfo.json in [install path]/var/vxss/.
G. EXIT STATUS 5954: The host name could not be resolved to the requesting host's IP address. This error is generally because of the following:
In short, the goal is to make the names match by making a hosts file entry on the primary or changing the CLIENT_NAME value as needed. H. EXIT STATUS 8504: The web service certificate is issued by an unknown Certificate Authority. Pull a new CA with "nbcertcmd -getcacertificate" and then retry previous command I. Exit Status 5930: The request could not be authorized.
J. EXIT STATUS 8509: The specified server name was not found in the web service certificate.
Note: Running the nbcertconfig command requires the following:
K. EXIT STATUS 8506: The certificate has expired. This means that the automatic renewal of the internal tomcat certificate on the Primary Server failed 6 months ago, and it has now expired. To manually renew it, see: https://www.veritas.com/content/support/en_US/article.100073668 L. EXIT STATUS 7648: Connection cannot be established because the host validation failed
If this status is intermittent between the Primary Server and some Media servers or other Primary Servers used for AIR, perform the following:
If none of the above resolves the inability to pull a CA certificate, skip to step 13 |
12 |
After CA Certificate is deployed, pull a hostid certificate: Use nbcertcmd -getcerificate -force to pull a hostid certificate. Example: |
13 |
Additional troubleshooting steps if certificate deployment still fails: The following commands help test connectivity between NetBackup hosts. Use any error messages received as a search criteria to determine possible resolutions. From Primary to problem host: Usage: Linux (to media): /usr/openv/netbackup/bin/admincmd/bptestbpcd -host MEDIANAME -verbose -debug Linux (to client): /usr/openv/netbackup/bin/admincmd/bptestbpcd -client CLIENTNAME -verbose -debug Windows (to media): cd [install path]\NetBackup\bin\admincmd\ Windows (to client): cd [install path]\NetBackup\bin\admincmd\ From problem host to primary: Usage: Windows: cd [install path]\NetBackup\bin
|
14 |
Manually create and deploy a Certificate: The instructions below are for a Windows Client, and a Linux Primary Server. If both sides are either Windows or Linux, the copy/paste steps will not be needed, instead, copy the request and certificate txt files between the systems. 1. Create a certificate request file on the client using nbcertcmd: 2. Open C:\request.txt in notepad, and copy the contents. 3. On the master, let's make a new file: 4. Paste the contents from C:\request.txt on the client server into vi, and then esc, :wq to save it. 5. Create a reissue token w/ GUI (token management) or cmd on Master Server Note: If the host has never had a certificate, generate a normal install token. 6. On the master, run the following: 7. Run "cat /tmp/cert.txt" and copy the output 8. Make a new text file called C:\cert.txt and open it in Notepad. 9. Paste the output from /tmp/cert.txt on the master and save the new C:\cert.txt on the client. 10. Run: 11. Run: |