First, verify the Connector Protocols, Permissions, and Users.
If there is still an issue, then please verify which error message you are seeing when deploying the connector:
- Go to platform configuration
- Navigate to the servers tab
- Search for the endpoint with issues and click on it
- Navigate to the logs tab and see details.
| Error message | When the issue appears | Solution |
| N/A | Status stays as pending for a very long-time (no error message generated) | If Linux, verify the account is able to run passwordless sudo commands |
| Invalid credentials | Check this article Invalid Credentials Errors | |
| No IP Found | Windows endpoints behind a NAT | Verify the WSUS endpoint configuration is pointing to the private IP of the WSUS server |
| Insufficient permissions (!requiretty) | when trying to deploy the connector on your Linux endpoints |
See this article.
|
|
Intigua currently disconnected
|
Deploying the connector |
|
| SMB Operation Failed |
Deploying the connector on windows
|
|
| Intigua deployment failed, ip: | Deploying the connector | Likely /usr/share/intigua/certs permission issue. You can verify by looking at worker.log via manager logs |
| Task progress could not be tracked | On a connector restart | Increase throttling CPU & Memory values |
Note: You cannot deploy connectors behind JetProxy, because JetProxy is a web proxy (thus, cannot use SSH or SMB). Thus, deploy the connector from the endpoint itself
If you are unable to deploy the connector from itself:
- Compare traceroute output from the machine experiencing issues and another machine from the same VLAN/network.
Linux Connectivity Tests
On Linux, use
traceroute(with TCP flags),nc(Netcat), ornmapto verify that specific ports are open and reachable.Method Command Description TCP Traceroute (Port 22) traceroute -T -p 22 <Endpoint_IP>Traces the path using TCP SYN packets on port 22. TCP Traceroute (Port 443) traceroute -T -p 443 <JetPatch_IP>Traces the path to the Manager/Repo on HTTPS port. Alternative Traceroute tcptraceroute<JetPatch_IP>443A specialized tool for bypassing firewalls that block ICMP. Netcat (Simple Scan) nc -zv<JetPatch_IP>443Quickly checks if port 443 is listening (zero-I/O, verbose). Netcat (Source Port) nc -zv -p 1234<JetPatch_IP>443Checks connectivity while specifying a local source port (1234). Nmap Scan nmap -p 443<JetPatch_IP>Checks the status of port 443 and identifies the service.
Windows Connectivity Tests
Windows uses
tracertfor path analysis, but requires specific arguments or alternative commands for port-specific testing.Standard Path Trace:
tracert <JetPatch_IP>Use this to identify where a packet is being dropped in the network hops.TCP Specific Trace:
traceroute -T -p 445<Endpoint_IP>(Note: Requires specific environment tools or PowerShell equivalents likeTest-NetConnection).Check Local Listening Ports:
netstat -ano | findstr :443Verifies if the local machine is currently using or listening on port 443.- Also, look at curl:
curl -v -L 192.168.1.1
- Check ssl handshake from client
openssl s_client -connect 192.168.1.1:443 (Windows app, usually built-in in Linux)
Linux Only:
- Check the post_install_log file in /tmp
- Verify the account has appropriate permissions (likely to be an issue if the activity is not timing out after a few minutes)
- Check SElinux configuration (it may limit the connection). More information can be found here.
- Deploy the connector from the endpoint itself
- If connector is failing to deploy from windows itself, look at tcping -t <Core-Server-IP/Name> 443
- Look at manager logs, specifically the worker.log file in the logs folder
For any other issue, please contact the JetPatch support team with the logs attached.
Comments
0 comments
Please sign in to leave a comment.