Risk Manager troubleshooting
If you encounter an issue in IBM® Security Risk Manager, see the following information on problem resolution.
Risk Manager certificate update fails
The IBM Security Risk Manager Dashboard is not displayed after a certificate update fails.
Certificate update fails symptoms
The Risk Manager application is not available through the IBM Security QRadar Suite Software console. Risk Management components are not in a running or complete state.
The Risk Manager application pods go into Error
and
CrashLoopBackOff
states because the app fails to retrieve the new certificate. The
Risk Manager application is unable to call QRadar Suite Software services, for example, Entitlements
service.
Certificate fails causes
- The truststore pod was not restarted for the certificate change to take effect.
- The cp4s-truststore secret might not have the correct certificate.
To diagnose the problem, complete the following steps. You must have cluster admin access.
-
Check the status of the Risk Manager pods by running the following command.
oc get pods | grep idrm
The output from the command might look similar to the following example.
idrmapp-546b4d9749-hk8s8 1/1 Running 0 12h idrmdashboard-7c759cd65c-kmdzg 0/1 CrashLoopBackOff 144 12h idrmdashboard-c579589bd-qq886 0/1 Running 142 12h idrmingestion-66b8cb8c9f-9cf6z 0/1 CrashLoopBackOff 144 12h idrmingestion-6b58c87d6f-84ctm 0/1 CrashLoopBackOff 147 12h idrmintex-747b98cb86-97m2k 0/1 CrashLoopBackOff 147 12h idrmintex-7c68d8756b-2jml7 0/1 CrashLoopBackOff 149 12h idrmrisk-1607426400-4xtfv 0/1 Error 0 8m29s idrmrisk-1607426400-62hwb 0/1 Error 0 14m idrmrisk-1607426400-76lfx 0/1 Error 0 13m
When the pods are in error or crashloopbackoff status, check the log to find out if the certificate is invalid or expired.
-
Check the logs of one of the Risk Manager pods by running the following command.
Tip: You might need to use your own pod name if it differs from the name in the command.oc logs idrmrisk-1607426400-76lfx
The following error message might display.
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
Resolving the certificate fails problem
Before you begin, you must have cluster administrator access with the Kubernetes command-line interface tool to the cluster where QRadar Suite Software is installed.
-
Verify that step 1 generated the following files:
- ca.crt
- ca.serial
- openssl.cfg
- tls.crt.tmp
- tls.key
- ca.key
- tls.crt
- tls.csr
-
Upload ca.crt, tls.crt, and tls.key files to the server by using the following command.
cpctl tools update_cert --key "$(cat tls.key)" --cert "$(cat tls.crt)" --authority "$(cat ca.crt)" --token "$(oc whoami -t)"
-
Delete the old truststore pod by running the following command.
oc delete pod -lname=truststore
-
When the pod is deleted, verify that the new truststore pod is in the running state.
-
Verify that the Risk Manager pods restart and enter
Running
state within 15 minutes.The output might look similar to the following example.
idrmapp-865f5f6779-nz8wn 1/1 Running 0 17m idrmdashboard-675fdc9447-z5nlx 1/1 Running 0 16m idrmingestion-fd584bbf6-75pjk 1/1 Running 0 17m idrmintex-749db4b789-5ghlv 1/1 Running 0 16m idrmrisk-1607429400-55jgm 0/1 Completed 0 13m idrmrisk-1607430000-8zc88 0/1 Completed 0 3m21s
idrmrisk
cron job pods are in an error state
After IBM Security QRadar Suite Software is installed,
idrmrisk
cron job pods are in an error state until you configure the initial
identity provider.
Cron job error symptoms
The pods of idrmrisk
cron job are in an error state. You can see the exception
in the log file.
Cron job error cause and diagnosis
The initial identity provider is not configured.
-
Log in to the
idrmrisk
pod by typing the following command.oc logs <pod_name>
-
Check for the following error in the log file.
{"name":"A3Risk","level":"ERROR","time":"2022-06-16 16:00:54,255", "log":"A3SystemJwtUtils:284 - Exception: java.net.NoRouteToHostException: No route to host (Host unreachable)
Resolving the cron job error problem
Before you begin, you must have cluster administrator access to the cluster where QRadar Suite Software is installed.
Configure your initial identify provider. When the Entitlements service restarts automatically
and is running, the idrmrisk
pods are in the completed state.
If the Entitlements service does not restart automatically after you configure your identify provider, restart the service. For more information, see 500 error when you log in.