Use the information in the following tables to learn about all possible certificate alerts in detail that are raised by Fault Management.
31000 | XCO Certificate Expiry Notice |
---|---|
Description | Send an alert when an XCO certificate is about to expire. |
Preconditions | You cannot configure the system default settings in Certificate
Manager component.
The polling service sends the “CertificateExpiryNoticeAlert” notification with an expiry date. |
Requirements |
Alert shows the following data:
The following example shows an alert when an XCO certificate (for example, App Server Certificate) is about to expire: <116>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?type=app_server_certificate” alertId=”31000” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”warning”] [alertData@1916 type=”app_server_certificate” expiry_date=”Sep 12 10:00:45 2022 GMT”] BOMThe App Server Certificate on the application will expire soon on “Sep 12 10:00:45 2022 GMT”. |
Health Response | Response{ Resource: /App/System/Security/Certificate?type=app_server_certificate HQI { Color: Yellow Value: 2 } StatusText: The App Server Certificate on the application will expire soon on “Sep 12 10:00:45 2022 GMT”. } |
31001 | Managed Device Certificate Expiry Notice |
---|---|
Description | Send an alert when a certificate on the SLX device is about to expire. |
Preconditions |
You cannot configure the default system settings in Inventory Service.
The polling service sends the “DeviceCertificateExpiryNoticeAlert” notification with an expiry date. |
Requirements |
Alert shows the following data:
The following example shows an alert when a certificate (for example, HTTPS Server Certificate) is about to expire on SLX device: <116>1 2022-10-11T22:14:15.003Z xco.machine.com FaultManager - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification” alertId=”31001” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”warning”] [alertData@1916 device_ip=”10.10.10.1” type=”https_server_certification” expiry_date=”Sep 12 10:00:45 2022 GMT”] BOMThe HTTPS Server Certificate on device “10.10.10.1” will expire soon on “Sep 12 10:00:45 2022 GMT”. |
Health Response |
Response
{ Resource:/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification HQI { Color: Yellow Value: 2 } StatusText: The HTTPS Server Certificate on device “10.10.10.1” will expire soon on “Sep 12 10:00:45 2022 GMT”. } |
31002 | XCO Certificate Expired |
---|---|
Description | Send an alert when an XCO certificate has expired. You will not get this alert when the system is not functional. |
Preconditions | K3s must be up and running Only supports non-k3s cert expiry.
When the App Server Certificate expires, you cannot communicate with XCO via REST API. Therefore, you cannot query the health status. |
Requirements |
Alert shows the following data:
The following example shows an alert when an XCO certificate (for example, App Server Certificate) is expired: <113>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?type=app_server_certificate” alertId=”31002” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”critical”] [alertData@1916 type=”app_server_certificate” expire_date=”Sep 12 10:00:45 2022 GMT”] BOMThe App Server Certificate on the application has expired on “Sep 12 10:00:45 2022 GMT”. |
Health Response |
Response
{ Resource: /App/System/Security/Certificate?type=app_server_certificate HQI { Color: Black Value: 5 } StatusText: The App Server Certificate on the application has expired on “Sep 12 10:00:45 2022 GMT”. } |
31003 | Managed Device Certificate Expired |
---|---|
Description | Send an alert when an SLX certificate has expired |
Preconditions | To allow the RASLog service to receive events from an SLX device,
ensure the device is registered and the SLX syslog server
configuration points to the XCO IP. When a syslog CA certificate
expires, SLX device does not send the syslog alerts to the RASLog
service.
The polling service sends the “DeviceCertificateExpiredNoticeAlert” notification with an expiry date. |
Requirements |
Alert shows the following data:
The following example shows an alert when an SLX certificate (for example, Syslog CA) is expired: <113>1 2022-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?device_ip=10.10.10.1&type=syslog_ca” alertId=”31003” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”critical”] [alertData@1916 device_ip=”10.10.10.1” type=”syslog_ca” expiry_date=”Sep 12 10:00:45 2022 GMT”] BOMThe Syslog CA on device “10.10.10.1” has expired on “Sep 12 10:00:45 2022 GMT” |
Health Response |
Response { Resource:/App/System/Security/Certificate?device_ip=10.10.10.1&type=syslog_ca HQI { Color: Black Value: 5 } StatusText: The Syslog CA on device “10.10.10.1” has expired on “Sep 12 10:00:45 2022 GMT. } |
31004 | XCO Certificate Upload or Renewal |
---|---|
Description | Send an alert when a certificate is renewed. |
Preconditions |
|
Requirements |
Alert shows the following data:
The following example shows an alert when an XCO certificate is renewed: Syslog RFC-5424 Example: <118>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?type=app_server_certificate” alertId=”31004” cause=”keyGenerated” type=”securityServiceOrMechanismViolation” severity=”warning”] [alertData@1916 type=”app_server_certificate”] BOMThe App Server Certificate on the application has bee renewed. |
Health Response |
Response
{ Resource: /App/System/Security/Certificate?type=app_server_certificate HQI { Color: Green Value: 0 } StatusText: The App Server Certificate on the application has been renewed. } |
31005 | Managed Device Certificate Upload or Renewal |
---|---|
Description | Send an alert when a device certificate is renewed. |
Preconditions |
Sent an alert on renewal of following certificates on devices:
|
Requirements |
Alert shows the following data:
The following example shows an alert when a device certificate is renewed: <118>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification” alertId=”31005” cause=”keyGenerated” type=”securityServiceOrMechanismViolation” severity=”info”] [alertData@1916 device_iP=”10.10.10.1” type=”https_server_certification”] BOMThe HTTPS Server Certificate on the device 10.10.10.1 has been renewed. |
Health Response |
Response
{ Resource:/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification HQI { Color: Green Value: 0 } StatusText: The HTTPS Server Certificate on the device 10.10.10.1 has been renewed. } |
31006 | XCO Certificate Unreadable Alert |
---|---|
Description | Send an alert when XCO is unable to read the certificate. |
Preconditions | Certificate Manager Component (Monitor & Auth Service) has
system default settings that are NOT user-configurable.
The "DeviceCertificateUnreadableAlert" event notification is sent out daily with error message when XCO is unable to read a certificate of a particular type. The fault engine will process this event. |
Requirements |
Alert shows the following data:
The following example shows an alert when XCO is unable to read a certificate: Syslog RFC-5424 Example: <116>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.5.0”] [alert@1916 resource=”/App/System/Security/Certificate?type=app_server_certificate” alertId=”31006” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”warning”] [alertData@1916 type=”app_server_certificate” error=”Unable to read the expiration date of certificate”] BOMUnable to read app_server_certificate on the application due to Unable to read the expiration date of certificate. |
Health Response |
Response
{ Resource: /App/System/Security/Certificate?type=app_server_certificate HQI { Color: Yellow Value: 2 } StatusText: Unable to read app_server_certificate on the application due to Unable to read the expiration date of certificate”. } |
31007 | XCO Device Certificate Unreadable Alert |
---|---|
Description | Send an alert when XCO is unable to read the device certificate. |
Preconditions | Certificate Manager Component (Monitor & Auth Service) has
system default settings that are NOT user-configurable.
The "DeviceCertificateUnreadableAlert" event notification is sent out daily with error message when XCO is unable to read a certificate of a particular type on a particular device. The fault engine will process this event. |
Requirements |
Alert shows the following data:
The following example shows an alert when when XCO is unable to read the device certificate: Syslog RFC-5424 Example: <116>1 2003-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.5.0”] [alert@1916 resource=”/App/System/Security/Certificate?type=https_server_certificate&device_ip=10.20.30.40” alertId=”31007” cause=”keyExpired” type=”securityServiceOrMechanismViolation” severity=”warning”] [alertData@1916 type=”app_server_certificate” device_ip=”10.20.30.40” error=”Unable to read the certificate”] BOMUnable to read https_server_certificate on the device 10.20.40.40 due to Certificate is not available. |
Health Response |
Response
{ Resource: /App/System/Security/Certificate?type=https_server_certificate&device_ip=10.20.30.40 HQI { Color: Yellow Value: 2 } StatusText: Unable to read https_server_certificate on the device 10.20.30.40 due to Certificate is not available”. } |
31008 | Managed Device Certificate Expiration Device Removed |
---|---|
Description | Send an alert when an SLX device is removed from a managed device |
Preconditions |
The SLX device is registered in inventory service.
The removed device sends three alerts to clear any unhealthy state in the health service. |
Requirements |
Alert shows the following data:
The following example shows an alert when an SLX device is removed: <118>1 2022-10-11T22:14:15.003Z xco.machine.com FaultManager - - [meta sequenceId=”47”] [origin ip=”10.20.30.40” enterpriseId=”1916” software=”XCO” swVersion=”3.4.0”] [alert@1916 resource=”/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification” alertId=”31008” cause=”configRemoved” type=”securityServiceOrMechanismViolation” severity=”info”] [alertData@1916 device_ip=”10.10.10.1” type=”https_server_certification”] BOMThe device 10.10.10.1 has been removed so cleaning up HTTPS Server Certificate |
Health Response |
Response
{ Resource:/App/System/Security/Certificate?device_ip=10.10.10.1&type=https_server_certification HQI { Color: Green Value: 0 } StatusText: The device 10.10.10.1 has been removed so cleaning up HTTPS Server Certificate. } |