Polyspace Access ETL and Web Server Services Do Not Start
Issue
You start the Polyspace® Access™ services but after a moment, the ETL and Web Server services stop. You might see a HTTP 403 error message in your web browser when you try to connect to Polyspace Access.
Possible Cause: Hyper-V Network Configuration Cannot Resolve Local Host Names
On Windows®, if you installed Polyspace Access inside a virtual machine (VM), that VM is managed by Hyper-V. Depending on your network configuration, Hyper-V might not resolve local host names. The Polyspace Access ETL and Polyspace Access Web Server services cannot connect to the host that you specify with these host names.
To test whether Hyper-V can resolve host name myHostname on a
machine that is connected to the Internet, at the command line,
enter:
docker run --rm -it alpine ping myHostname
Solution
Stop and restart the admin-docker-agent binary without
using the --hostname option.
If you are on a trusted network or you do not want to use the HTTPS protocol:
At the command-line, enter:
docker stop admin admin-docker-agent --restart-gateway
In the Cluster Admin web interface, click Restart Apps.
If you want to use the HTTPS protocol, generate certificates with a subject alternative name (SAN) that includes the IP address of the cluster operator node on which the services are running.
Copy this configuration file to a text editor and save it on your machine as
openssl.cnf.hostNameis the host name of the server that hosts Polyspace Access.fullyQualifiedDomainNameis the corresponding fully qualified domain name.nodeIPAddressis the IP address of the node on which you run theadmin-docker-agentbinary.You do not need to edit the value of the other fields in the
[ req_distinguished_name ]section ofopenssl.cnf. Updating the value of these fields does not affect the configuration.In the Cluster Dashboard, click Configure Nodes. The IP address listed in the Hostname field corresponds to
nodeIPAddressin theopenssl.cnffile. If there is more than one node listed, add an additional line in the[ alt_names ]section ofopenssl.cnffor each IP address. For example:[ alt_names ] DNS.1 = hostName DNS.2 = fullyQualifiedDomainName IP.1 = nodeIPAddress IP.2 = additionalNodeIPAddress
Generate a certificate signing request (CSR) by using your
openssl.cnfconfiguration file. At the command line, enter:The command outputs a private key fileopenssl req -new -out myReqest.csr -newkey rsa:4096 \ -keyout myKey.key -nodes -config openssl.cnf
myKey.keyand the filemyRequest.csr.To generate a signed certificate:
If you use your organization's certificate authority, submit
myRequest.csrto the certificate authority. The certificate authority uses the file to generate a signed server certificate. For instance,server_cert.cer.If you use self-signed certificates, at the command line, enter:
The command outputs self-signed certificateopenssl x509 -req -days 365 -in myRequest.csr -signkey myKey.key \ -out self-cert.pem -extensions v3_req -extfile openssl.cnf
self-cert.pem.
Stop and restart the
admin-docker-agentbinary with this command:Windows PowerShell ./admin-docker-agent --restart-gateway ` --ssl-cert-file certFile1 ` --ssl-key-file keyFile ` --ssl-ca-file trustedStoreFile
Linux® ./admin-docker-agent --restart-gateway \ --ssl-cert-file certFile1 \ --ssl-key-file keyFile \ --ssl-ca-file trustedStoreFile
certFile1is the full path of the file you obtained in step 4.keyFileis the file you generated in step 3.trustedStoreFileis the file you generated in step 4 if you used self-signed certificates. Otherwise, it is the trust store file you use to configure HTTPS. See Choose Between HTTP and HTTPS Configuration for Polyspace Access Save your changes.In the Cluster Admin web interface, click Restart Apps.
