Discovery Issues
This provides guidance for diagnosing and resolving problems related to certificate discovery in CERTInext. Discovery issues typically arise when bots are unable to scan target systems, retrieve certificate data, or report results back to the platform.
Timely resolution ensures continuous visibility into certificate inventory and prevents blind spots in lifecycle monitoring.
Common Discovery Symptoms
Discovery-related problems may present as:
Bot status showing Stopped, Inactive, or Pending
Zero certificates discovered after scan
High Error Stats Count on the Discovery Dashboard
Scan logs showing connectivity or permission failures
Certificates missing from inventory despite being deployed
Step 1: Check Bot Status
Navigate to: Certificates → Discovery → Bots
Verify:
Bot Status is Active
Last Bot Update timestamp is recent
Bot Version is up to date
If the bot is inactive:
Restart the bot service on the host system
Verify bot token validity
Confirm outbound connectivity to CERTInext
Step 2: Validate Network Connectivity
Discovery bots require outbound HTTPS connectivity.
Verify:
Port 443 is open for outbound traffic
DNS resolution to CERTInext API endpoint
Proxy configuration (if required)
Firewall rules allowing scan traffic
For internal scans, confirm access to:
Target IP addresses
FQDNs
Required ports (e.g., 443, 8443, 22, 5985, 389)
Step 3: Verify Scan Target Configuration
Review scan configuration:
FQDN / IP address entries
Port ranges
CIDR ranges
Remote directory paths
SSH or RDP credentials
Cloud provider API credentials
Incorrect IP ranges or invalid credentials often result in zero discovery results.
Step 4: Review Scan Logs
Navigate to:
Certificates → Discovery → Bots → View → Scan Logs
Check:
Scan Start and End timestamps
Newly Discovered Certificates count
Error details for failed targets
If errors are present:
Confirm target system availability
Validate authentication credentials
Check certificate store permissions
Step 5: Validate Permissions
Depending on scan type:
SSH – Ensure correct username and password
WinRM – Confirm remote management is enabled
LDAP/AD – Verify bind account permissions
Cloud Providers – Confirm API access keys and region configuration
HSM – Validate slot access and PIN
Insufficient privileges may prevent certificate extraction.
Step 6: Check Endpoint Accessibility
If certificates are not detected:
Confirm TLS is enabled on the specified port
Validate the service is listening
Ensure load balancers expose certificate bindings
Confirm Kubernetes secrets contain TLS objects
Incorrect service bindings can cause discovery gaps.
Step 7: Validate Air-Gapped or Proxy Deployments
For isolated environments:
Ensure correct offline installation bundle was used
Confirm relay connectivity (if applicable)
Validate proxy host and authentication configuration
Step 8: Re-run Discovery
After correcting issues:
Click Run Scan from the Bot Actions menu
Monitor scan logs for updated results
Confirm new certificates appear in the Discovery Inventory
When to Escalate
Collect the following before escalating:
Bot Name and IP Address
Scan log excerpts
Error messages
Target system details
Recent configuration changes
Providing structured information reduces resolution time.
Best Practices
Schedule regular scans (Daily or Weekly)
Use meaningful bot names by environment
Monitor Error Stats Count proactively
Validate new environments after infrastructure changes
Issue Examples
Please find the common Issue Examples related to 'Discovery' to troubleshoot:
ISSUE EXAMPLE-1 – Discovery Bot Shows “No Certificates Found”
Title
Discovery Bot Shows “No Certificates Found” Despite Known Certificates
Issue Description
A discovery Bot runs against known web servers or domains that are actively using certificates, but the result shows zero certificates.
The discovery Bot completes with status “Discovered”, yet the certificate inventory remains empty for those targets.
The UI may show informational text such as “0 certificates discovered” without any explicit error.
Possible Causes
Discovery bot/bot used is offline.
Discovery scope is misconfigured (wrong IP range, hostname typo, wrong port, or protocol not enabled).
Network or firewall rules block connectivity from the discovery bot to the target servers (for example, outbound 443 blocked).
DNS resolution fails for one or more hostnames specified in the discovery target list.
Resolution / Fix
Confirm Discovery Status
Navigate to Discovery → Bots.
Locate the bot associated and verify its Status (Active/Stopped)
If it is Stopped, restart the discovery bot service on the bot host and wait for the status to turn Active.
Validate Bot Targets and Scope
In the Bot- Scan Targets details, review IP ranges, hostnames, and ports.
Correct any typos (for example, example.com vs exampel.com).
Ensure the ports you expect to scan (typically 443) are included.
Test Network Connectivity from the Bot
On the bot host, test connectivity to one of the targets:
ping <target-host>
nslookup <target-host>
telnet <target-host> 443 or equivalent TCP test.
If any of these fails, work with the network team to allow outbound traffic from the bot to the targets on required ports.
Re-run a Small Focused Discovery Bot
Create a new discovery bot targeting just 1–2 known, accessible hosts.
Run the Bot and monitor until completion.
Validation / Confirmation
The new discovery Bot completes successfully and lists the certificates.
The certificate inventory shows the entries.
ISSUE EXAMPLE-2 – Discovery Bot Shows “Stopped” in Portal
Title
Discovery Bot Shows “Stopped” in Portal
Issue Description
In the Discovery Dashboard→ Manage Bots page, one or more bots appear with status “Stopped”
Discovery Bot assigned Stops, does not start.
No new discovery data is generated for networks that rely on that bot.
Possible Causes
Discovery Bot service is stopped.
Authentication/registration token used by the bot has expired, been rotated, or revoked.
Network or firewall changes now block outbound connectivity from the bot host to the CERTInext service endpoints.
OS or infrastructure changes (restarts, patching, migration) left the Bot misconfigured or unable to start.
Resolution / Fix
Review Bot Details in the Portal
Go to Discovery Dashboard→ Manage Bots.
Select the stopped bot and note the bot name, associated host, last check‑in time, and any error messages shown.
Verify Bot/Bot Service on the Bot Host
Log in to the server where the bot is installed.
Check the status of the CERTInext discovery Bot/bot service.
If the service is stopped, start it and configure it for automatic startup.
Validate Connectivity to CERTInext
From the bot/bot host, verify outbound HTTPS to the CERTInext endpoint used by the bot.
If this fails, coordinate with your network/security team to allow outbound traffic on required ports (usually 443).
Restart Bot and Monitor Bot Status
Restart the bot/bot service once configuration and connectivity are corrected.
Return to Discovery → Bots, refresh, and confirm that the bot changes to Active within a few minutes.
Validation / Confirmation
The bot shows Active in the portal.
New discovery assigned to this bot will have updated status from Initiated to Configured to Discovered
ISSUE EXAMPLE-3 – Discovery Bot Stuck in “Initiate or Configured” State
Title
Discovery Bot Stuck in “Initiate or Configured” State for Extended Time
Issue Description
Discovery Bot show status “Initiate or Configured”, or similar for significantly longer than normal.
No new certificates appear in the inventory while the Bot is stuck.
Possible Causes
The Bot discovery scope is too large (for example, very large IP ranges or PORT ranges in a single bot/bot).
The assigned bot host lacks sufficient CPU/RAM for the configured scan size.
High network latency, packet loss, or intermittent firewall/IPS behavior is slowing or blocking many connection attempts.
Misconfigured timeouts or concurrency (where configurable) cause long waits on unreachable targets.
Resolution / Fix
Review Bot Configuration and Scope
Go to Discovery Dashboard → Bot and open the bot details.
Confirm the Bot type is Discovery Dashboard and review:
IP ranges, hostnames, and ports.
Any filters or advanced options that may broaden the scope.
Determine whether the bot is scanning a very large network segment or many targets at once.
Check Resource Utilization on Assigned Bot
Identify which specific bot is executing from the Bot list.
Log in to that bot host and check CPU, memory, and network utilization.
If the host is heavily loaded, consider temporarily reducing other workloads or increasing system resources.
Cancel the Oversized Bot
From the Bot page, cancel the stopped bot if it has been running far longer than typical for similar scopes.
Document its scope so you can split it into smaller bots (as below).
Split Scope into Multiple Smaller Bot
Create multiple discovery Bot that each handle a smaller, clearly defined subset of the original IP range or host list.
Avoid mixing very remote or high-latency segments with local segments in the same bot.
Run a Small Test Bot First
Create a test Bot with 10–20 representative target hosts.
Run the Bot and measure completion time and behavior.
If successful, gradually scale up with additional bots until you reach a stable pattern.
Download and Review Logs
For the original stuck Bot, download logs if available (Audit→ Reports)
Look for repeated timeout messages, connection failures, or internal errors.
Adjust Bot configuration where the logs indicate systematic connectivity issues.
Validation / Confirmation
New, smaller discovery Bot move from “Initiated” to “Configured” to “Discovered”.
Certificates from the relevant target ranges are visible in the inventory and show the accurate discovered certificate details.
ISSUE EXAMPLE-4 – Partial Discovery: Some Hosts Found, Others Missing
Title
Discovery Only Finds Certificates on Some Hosts, Others Missing
Issue Description
Discovery bot shows “Discovered Certificates” but only returns certificates for a subset of the expected hosts.
Some IPs or domains that should have certificates do not appear in results.
Possible Causes
Scan scope does not include all required IP ranges or hostnames.
Some targets listen on non-standard ports (not included in the discovery configuration).
Firewalls or security groups block traffic to a portion of the target range.
DNS or routing differences cause certain hosts to be unreachable from the bot.
Resolution / Fix
Review Scan Target Scope vs Actual Servers
Compare the bot’s IP ranges/host list with the actual list of servers expected to be scanned.
Confirm no ranges or hostnames were accidentally omitted.
Check Port Configuration
Verify which ports are configured for discovery (for example, 443 only vs 443, 8443, etc.).
Add any custom ports known to be used by your applications and re-run.
Test Connectivity to Missing Hosts
From the bot host, run tests specifically against a host that is missing from results:
nslookup <host>
telnet <host> <port> / equivalent.
If connectivity fails, work with network team to adjust routes/firewalls.
Run a Focused Bot on Missing Hosts Only
Create a new discovery bot that targets only the hosts or range that were missing.
Run the bot and inspect whether certificates are discovered.
Validation / Confirmation
Focused discovery bot reports certificates for the previously missing hosts.
Inventory includes all key hosts in the relevant segment.
Last updated
