Troubleshoot Common Issues with BeyondInsight for Unix & Linux
Application logs are available. The location differs based on the operating system:
- For systemd machines, use systemd run journalctl -u pbsmc.
- For SysV or Upstart machines, the log is located in /var/log/pbsmc.log.
- For Windows machines, the log is located in ProgramFiles (x86)\PBSMC\pbsmc.log.
Common Error Messages
Hosts section displays credential error when selecting actions
If there are no credentials stored and an action is chosen requiring authentication, an error is displayed.
Oops, No Products Found displayed on Management page
BeyondInsight for Unix & Linux cannot locate either the Privilege Management for Unix and Linux or BeyondInsight for Unix & Linux software to deploy.
For more information, please see Copy ISO Files to the Console Server.
Unable to install PMUL, and AD Bridge
For more information, please see the Tasks page.
Discover does not locate a host
Verify the host is available, reachable from the network, and from an SSH-enabled port.
Unable to connect to PMUL using REST
For more information, please see the Tasks page. In most cases, the port is not available. Check the REST port on the Host Details page, and verify your firewall is accepting connections.
Troubleshoot Password Safe Issues
Password Safe is installed with a self-signed certificate. If this is not changed to a trusted issuer, the certificate should be added to the BeyondInsight for Unix & Linux systems certificate store to be trusted. The following provides high-level steps on importing certificates.
- Copy the public certificate from the Password Safe server to the BeyondInsight for Unix & Linux server. This should be a .crt file.
- Install the .crt file to the system key store. The process is different depending on the operating system.
- Open Keychain Access, and drag the .crt file into the System node.
- Double-click to open and expand the Trust leaf.
- Select Always Trust.
- Click Start and type MMC.
- From the File menu, select Add/Remove Snap-In > Certificates > Add.
- Select Computer Account, and click Next.
- Select Local Computer.
- After the snap-in is added, expand Certificates and right-click Trusted Root Certification Authorities.
- Select All Tasks > Import and add the .crt file.
If not available, install ca-certificates
yum install ca-certificates
Enable dynamic configuration
Copy the .crt
cp <cert.crt> /etc/pki/ca-trust/source/anchors/
Update the trusted list
Copy the .crt file
cp <cert.crt> /usr/local/share/ca-certificates
Update the cert list
Refresh the cert list
sudo update-ca-certificates --fresh
For more in-depth system information, please see the appropriate operating system documentation.