Azure Marketplace Image SOC Failure - No Auth Screen #12803
-
Version2.4.60 Installation MethodOther (please provide detail below) Descriptionconfiguration Installation TypeStandalone Locationcloud (Azure Marketplace) Hardware SpecsExceeds minimum requirements CPU8 RAM32 GiB Storage for /255G Storage for /nsm255G Network Traffic Collectionother (please provide detail below) Network Traffic SpeedsLess than 1Gbps StatusNo, one or more services are failed (please provide detail below) Salt StatusNo, there are no failures LogsYes, there are additional clues in /opt/so/log/ (please provide detail below) Detail![]() This red box appears when I open up my SOC web portal. I can't find errors anywhere, except after entering the so-soc docker instance and viewing
Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 6 comments 1 reply
-
I've explicitly allowed localhost and my VM's private IP using so-firewall as well, so I believe I can eliminate host firewall issues |
Beta Was this translation helpful? Give feedback.
-
Some other issues presenting in parallel:
|
Beta Was this translation helpful? Give feedback.
-
From 2024/04/16 17:52:32 [error] 31#31: *2 connect() failed (111: Connection refused) while connecting to upstream, client: 10.1.1.1, server: 10.1.1.1, request: "POST /sensoroniagents/api/node HTTP/1.1", upstream: "http://10.1.1.1:9822/api/node", host: "10.1.1.1" |
Beta Was this translation helpful? Give feedback.
-
Looking at more documentation, I'm realizing there's no login page when I connect to server. This would explain 401 unauthorized errors. The remaining question is why is the web server failing to serve auth? Changing title to reflect this |
Beta Was this translation helpful? Give feedback.
-
Confirmed seeing same problem on Import mode |
Beta Was this translation helpful? Give feedback.
-
Hello, and thanks for providing so much detailed information on attempts to troubleshoot this on your own! The typical input on the above screen for cloud images is "other", and you would specify a specific hostname that correctly resolves both externally for analyst browsers to the manager node's public IP, and internally for the SOC, InfluxDB, and other docker images running on the SO nodes to the manager node's internal IP. For single node grids this is simple but for larger grids it involves either manual host entries on each node, or setting up a DNS resolver for your internal network. Since you are choosing to tunnel your analyst browser connection through the SSH connection, this complicates matters because now your analyst browser running on your local machine must correctly resolve the specific hostname/domain name (entered during setup) to the client's workstation host, which is then port forwarded over the SSH tunnel to the manager node. Further, that tunneled connection must be served by the I recommend unwinding some of the added complexity with your SSH tunnel, and first get comfortable with setting up SO in the cloud where the analyst is able to login and access the SOC UI, directly to the manager node public IP, without errors. After that is mastered, move on to further locking down access via either a VPN or SSH tunnel. |
Beta Was this translation helpful? Give feedback.
Hello, and thanks for providing so much detailed information on attempts to troubleshoot this on your own!
The typical input on the above screen for cloud images is "other", and you would specify a specific hostname that correctly resolves both externally for analyst browsers to the manager node's public IP, and internally for the SOC, InfluxDB, and other docker images running on the SO nodes to the manager node's internal IP. For single node grids this is simple but for larger grids it involves either manual host entries on each node, or setting up a DNS resolver for your internal network.
Since you are choosing to tunnel your analyst browser connection through the SSH connection, this …