LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page

Was this helpful?

  1. Troubleshooting
  2. Proxy Troubleshooting

Portal Server

Each article describes a different situation.

PreviousProxy TroubleshootingNextElastic Server

Last updated 9 months ago

Was this helpful?

  • Solution for: "failed to create fs.notify watcher: too many open files" error, execute this command on the master node machine:

    1. sudo sysctl -w fs.inotify.max_user_watches=2099999999

    2. sudo sysctl -w fs.inotify.max_user_instances=2099999999

    3. sudo sysctl -w fs.inotify.max_queued_events=2099999999

    4. sysctl -p

  • Solution for authentication: If sec.yaml keys and values are the same on the UI and yaml, redeploy the sec component. But this time please only use yaml file instead of adding keys & values by hand, Rancher encrypts secrets in his own way. If key & value fields are given by hand, Rancher's encryption is not working and an authentication problem will happen.

  • If portal is not working after assigning the proxy settings you have to reset the rancher. For rancher reset, after these steps you have to deploy rancher and do the deployment step by step again:

    1. docker rm -fv $(docker ps -a -q)

    2. docker volume rm -f $(docker volume ls)

    3. sudo reboot -h now

    4. sudo su

    5. rm -rf /run/secrets/kubernetes.io

    6. rm -rf /var/lib/etcd

    7. rm -rf /var/lib/kubelet

    8. rm -rf /var/lib/rancher

    9. rm -rf /etc/kubernetes

    10. rm -rf /opt/rke/etc/kubernetes/ssl

    11. exit

    12. docker volume rm -f $(docker volume ls)

    13. sudo reboot -h now

  • If the onprem.cloudcyte.com gives "cannot get/" error, please check the auth pod. Sometimes it needs to be restarted.

  • If the servers have issue with connecting to the internet, please check:

    1. certificates -> "Storage -> Secrets" on rancher

    2. configmap -> "Storage -> ConfigMaps" on rancher, there should be no_proxy/NO_PROXY and http(s)_proxy/HTTP(s)_PROXY fields

    3. pods -> check the pods that have config maps proxy variables

    4. /etc/resolv.conf

    5. /etc/resolvconf/resolv.conf.d/head

    6. /etc/dnsmasq.conf

    7. /etc/network/interfaces

  • Check DNS Port:

    1. ss -lptn 'sport = :53'

  • Show docker container logs of the rancher:

    1. docker logs -f <container_id>

  • For applying the proxy settings again or resetting the rancher, please download the settings.sh file from . Move the settings.sh file under the /usr/bin directory and give 755 access. After that run settings.sh anywhere in the server by typing "setting.sh". After execution, please enter the required credentials(proxy user and password are not required by default, use it only if the customer gives one). The script will be asking which option should be taken, if the 8.th option is selected script will do all the required steps for proxy settings. Make sure the root CA certificate is correct. After that please reboot the machine.

https://download.cloudcyte.com/yamls/settings.sh