107 lines
3.4 KiB
Markdown
107 lines
3.4 KiB
Markdown
---
|
|
layout: default
|
|
title: Troubleshoot securityadmin.sh
|
|
nav_order: 10
|
|
---
|
|
|
|
# securityadmin.sh Troubleshooting
|
|
|
|
This page includes troubleshooting steps for `securityadmin.sh`.
|
|
|
|
|
|
---
|
|
|
|
#### Table of contents
|
|
- TOC
|
|
{:toc}
|
|
|
|
|
|
---
|
|
|
|
## Cluster not reachable
|
|
|
|
If `securityadmin.sh` can't reach the cluster, it outputs:
|
|
|
|
```
|
|
OpenSearch Security Admin v6
|
|
Will connect to localhost:9300
|
|
ERR: Seems there is no opensearch running on localhost:9300 - Will exit
|
|
```
|
|
|
|
|
|
### Check hostname
|
|
|
|
By default, `securityadmin.sh` uses `localhost`. If your cluster runs on any other host, specify the hostname using the `-h` option.
|
|
|
|
|
|
### Check the port
|
|
|
|
Check that you are running `securityadmin.sh` against the transport port, **not** the HTTP port.
|
|
|
|
By default, `securityadmin.sh` uses `9300`. If your cluster runs on a different port, use the `-p` option to specify the port number.
|
|
|
|
|
|
## None of the configured nodes are available
|
|
|
|
If `securityadmin.sh` can reach the cluster, but can't update the configuration, it outputs this error:
|
|
|
|
```
|
|
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
|
|
Cannot retrieve cluster state due to: None of the configured nodes are available: [{#transport#-1}{mr2NlX3XQ3WvtVG0Dv5eHw}{localhost}{127.0.0.1:9300}]. This is not an error, will keep on trying ...
|
|
```
|
|
|
|
* Try running `securityadmin.sh` with `-icl` and `-nhnv`.
|
|
|
|
If this works, check your cluster name as well as the hostnames in your SSL certificates. If this does not work, try running `securityadmin.sh` with `--diagnose` and see diagnose trace log file.
|
|
|
|
* Add `--accept-red-cluster` to allow `securityadmin.sh` to operate on a red cluster.
|
|
|
|
|
|
### Check cluster name
|
|
|
|
By default, `securityadmin.sh` uses `opensearch` as the cluster name.
|
|
|
|
If your cluster has a different name, you can either ignore the name completely using the `-icl` option or specify the name using the `-cn` option.
|
|
|
|
|
|
### Check hostname verification
|
|
|
|
By default, `securityadmin.sh` verifies that the hostname in your node's certificate matches the node's actual hostname.
|
|
|
|
If this is not the case (e.g. if you're using the demo certificates), you can disable hostname verification by adding the `-nhnv` option.
|
|
|
|
|
|
### Check cluster state
|
|
|
|
By default, `securityadmin.sh` only executes if the cluster state is at least yellow.
|
|
|
|
If your cluster state is red, you can still execute `securityadmin.sh`, but you need to add the `-arc` option.
|
|
|
|
|
|
### Check the security index name
|
|
|
|
By default, the security plugin uses `opensearch_security` as the name of the configuration index. If you configured a different index name in `opensearch.yml`, specify it using the `-i` option.
|
|
|
|
|
|
## "ERR: DN is not an admin user"
|
|
|
|
If the TLS certificate used to start `securityadmin.sh` isn't an admin certificate, the script outputs:
|
|
|
|
```
|
|
Connected as CN=node-0.example.com,OU=SSL,O=Test,L=Test,C=DE
|
|
ERR: CN=node-0.example.com,OU=SSL,O=Test,L=Test,C=DE is not an admin user
|
|
```
|
|
|
|
You must use an admin certificate when executing the script. To learn more, see [Configure admin certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls#configure-admin-certificates).
|
|
|
|
|
|
## Use the diagnose option
|
|
|
|
For more information on why `securityadmin.sh` is not executing, add the `--diagnose` option:
|
|
|
|
```
|
|
./securityadmin.sh -diagnose -cd {{site.url}}{{site.baseurl}}/securityconfig/ -cacert ... -cert ... -key ... -keypass ...
|
|
```
|
|
|
|
The script prints the location of the generated diagnostic file.
|