<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Services not restarting after OS patching in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Services-not-restarting-after-OS-patching/m-p/933556#M28666</link>
    <description>I think you've correctly identified the issue and solution. The SAS Secrets Manager (Vault) process has a CA with a certificate that expires earlier than the TTL for the new certificate it's trying to generate. The "renew-security-artifacts.yml" playbook should re-issue that CA certificate.&lt;BR /&gt;&lt;BR /&gt;Renew Security Objects Using Ansible Plays (Linux Deployment)&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/calcdc/3.5/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#p0vvrppsrlw0qmn1dkgvtksncr5c" target="_blank"&gt;https://go.documentation.sas.com/doc/en/calcdc/3.5/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#p0vvrppsrlw0qmn1dkgvtksncr5c&lt;/A&gt;</description>
    <pubDate>Mon, 24 Jun 2024 13:26:50 GMT</pubDate>
    <dc:creator>gwootton</dc:creator>
    <dc:date>2024-06-24T13:26:50Z</dc:date>
    <item>
      <title>Services not restarting after OS patching</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Services-not-restarting-after-OS-patching/m-p/932668#M28639</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi, over the weekend we did some OS security updates where our Viya install resides (linux environment).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;After patching was complete, the services did not fully restart. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Basic troubleshooting of bringing the services down and back up led to a majority of them being "down" or "not ready", so we rolled back to a VSphere snapshot taken about 16~ hours before (prior to any changes taking place).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Reviewing logs, found some certificate errors. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2024-06-16 20:48:49.144 ERROR 16999 --- [ main] c.s.c.rest.boot.vault.CertificateUtil : service [VAULT_CERTIFICATE_REQUEST_ERROR] Vault PKI back end failed to issue certificate. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2024-06-16 20:47:29.064 INFO 16999 --- [ main] c.s.c.rest.boot.vault.CertificateUtil : service [VAULT_CERTIFICATE_REQUEST] Requesting SSL certificate from Vault PKI back end for: cawina06.cyphersystems.com &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2024-06-16 20:47:29.079 WARN 16999 --- [ main] c.s.c.rest.boot.vault.CertificateUtil : service Encountered exception issuing certificate from Vault.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;org.springframework.vault.VaultException: Status 400: cannot satisfy request, as TTL is beyond the expiration of the CA certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are considering running the playbook renew-security-artifacts.yml but we are unsure of what the side effects of this would be and if we could make matters worse doing so.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Eric&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 15:23:39 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Services-not-restarting-after-OS-patching/m-p/932668#M28639</guid>
      <dc:creator>Erict</dc:creator>
      <dc:date>2024-06-17T15:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Services not restarting after OS patching</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Services-not-restarting-after-OS-patching/m-p/933556#M28666</link>
      <description>I think you've correctly identified the issue and solution. The SAS Secrets Manager (Vault) process has a CA with a certificate that expires earlier than the TTL for the new certificate it's trying to generate. The "renew-security-artifacts.yml" playbook should re-issue that CA certificate.&lt;BR /&gt;&lt;BR /&gt;Renew Security Objects Using Ansible Plays (Linux Deployment)&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/calcdc/3.5/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#p0vvrppsrlw0qmn1dkgvtksncr5c" target="_blank"&gt;https://go.documentation.sas.com/doc/en/calcdc/3.5/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#p0vvrppsrlw0qmn1dkgvtksncr5c&lt;/A&gt;</description>
      <pubDate>Mon, 24 Jun 2024 13:26:50 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Services-not-restarting-after-OS-patching/m-p/933556#M28666</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-06-24T13:26:50Z</dc:date>
    </item>
  </channel>
</rss>

