To help you understand, isolate, and resolve problems with
your IBM® software, use the troubleshooting
and support information section for instructions and problem-determination
resources that are provided with your IBM products.
Restrict operations for a Member node
The IBM Security Privileged Identity Manager Virtual Appliance cluster
is composed of one Primary node and other nodes that
are called as Member nodes. To configure a virtual
appliance, you must work from a Primary node.
Handling password synchronization issues
You encounter administrator password synchronization
issues when you undo or redo a configuration for the Single Sign-On
data store. The synchronization issues are between the Identity and
Credential Vault Administration console, the Single Sign-On and Session
Recorder Administration console, and the Session Replay Console.
Cluster bootstrap process
Bootstrapping refers to getting a cluster node
up and running. When a cluster node recovers from failure, checks
are made to keep the node state consistent with the rest of the nodes
in the cluster.
Cluster monitor service
Cluster monitor service is a background process
in the IBM Security Privileged Identity Manager Virtual Appliance that
frequently checks for all business functions to be alive and running.
Checking logs
Use the Log Retrieval and Configuration page
to view the log files. You can also use this page configure the server
log settings for the IBM Security Privileged Identity Manager Virtual Appliance.
Common issues
You might encounter common issues during
the deployment and usage of IBM Security Privileged Identity Manager in the IBM Security Privileged Identity Manager Virtual Appliance. For
more information, see the following common issues and workaround sections.
Limitations IBM Security Privileged Identity Manager limitations
can affect how the IBM Security Privileged Identity Manager Virtual Appliance behaves
or processes information that is received from IBM Security Identity Manager and IBM Security Access Manager for Enterprise Single Sign-On. In the
same way, IBM Security Identity Manager and IBM Security Access Manager for Enterprise Single Sign-On limitations
can affect how the IBM Security Privileged Identity Manager Virtual Appliance capabilities
work.
Known issues and workarounds
The Known issues and workarounds section helps you understand,
isolate, and resolve problems with IBM Security Privileged Identity Manager Virtual Appliance. Descriptions
about the events that generate the problems are listed along with
symptoms, environment, possible causes, and suggestions for recovery.
It also contains information about where logs are stored and how to
run traces.
Bulkload command errors
When running the bulkload command, some errors might occur.
The bulkload utility fails if any of the entries in the input LDIF
file exist in LDAP.