Agent Connectivity Issues
The Agent Connectivity Issues section addresses problems where CERTInext Bots (Discovery or Provisioning agents) fail to communicate with the CERTInext platform or cannot reach configured target systems. Since bots operate within enterprise networks and initiate outbound communication, connectivity problems directly impact discovery scans, automated issuance, and deployment workflows.
Timely resolution ensures uninterrupted certificate visibility and lifecycle automation.Common Symptoms
Connectivity issues may appear as:
Bot status showing Inactive, Stopped, or Pending
Last Bot Update timestamp not refreshing
Discovery scans not running
Provisioning tasks stuck in queue
Renewal not triggering
Frequent timeout or network errors in logs
Step 1: Verify Bot Status
Navigate to: Certificates → Discovery → Bots or Certificates → Provisioning → Bots
Check:
Bot Status = Active
Last Bot Update shows recent communication
Bot Version is current
Bot token has not expired
If status is inactive:
Restart the bot service on the host
Confirm token validity
Re-register the bot if required
Step 2: Validate Outbound Connectivity
CERTInext bots require outbound HTTPS connectivity.
Verify from the bot host:
Port 443 (HTTPS) is open
DNS resolution to CERTInext API endpoint
Proxy configuration (if applicable)
No firewall blocks for outbound requests
Test using:
curl https://<api-endpoint>/health
If proxy is required, confirm hostname, port, and authentication settings are correctly configured.
Step 3: Check System-Level Requirements
Ensure the bot host meets prerequisites:
Supported operating system
Administrator/root privileges
NTP time synchronization enabled
Minimum disk space available
Bot service running (Windows Service / systemctl)
Time drift may cause authentication failures.
Step 4: Validate Token and Activation Window
Bots authenticate using a time-bound token.
Check:
Activation window has not expired
Bot token matches the one generated in CERTInext
Token was not revoked
If expired, regenerate and reinstall the bot.
Step 5: Review Firewall and Security Controls
Ensure:
No outbound HTTPS inspection blocking traffic
SSL inspection devices allow API traffic
Endpoint protection does not block bot process
Required internal ports (SSH, WinRM, LDAP) are accessible for target systems
Blocked ports commonly cause scan and deployment failures.
Step 6: Check Target Connectivity
If bot is active but tasks fail:
Verify connectivity to:
Target IP addresses
Required ports (443, 8443, 22, 5985, etc.)
Application service endpoints
HSM or KMS endpoints (if configured)
Network segmentation or ACL misconfiguration may prevent internal access.
Step 7: Review Bot Logs
Check local logs on the bot host:
Installation log
Agent log
Error log
Look for:
Authentication errors
Timeout exceptions
Permission denied messages
Proxy misconfiguration
Logs provide detailed diagnostics beyond dashboard indicators.
Step 8: Restart or Reinstall Bot
If persistent issues occur:
Restart bot service
Re-register using valid token
Reinstall using automated or manual installation method
For air-gapped environments, ensure offline bundle was correctly deployed.
When to Escalate
Provide:
Bot Name and IP address
Last Bot Update timestamp
Error log excerpts
Network topology details
Proxy or firewall configuration notes
This helps isolate network vs configuration issues quickly.
Best Practices
Monitor bot health daily
Use descriptive naming by environment
Keep bot version updated
Validate connectivity after firewall or proxy changes
Deploy separate bots per network segment where required
Last updated
