Troubleshoot Resource Connectors and Connector Groups

This guide provides information about troubleshooting and managing your deployed Cisco Secure Access Resource Connectors. You can run the diagnostic commands in the Connector Diagnostics command-line interface (CLI) to get the status of a resource connector.

Table of Contents

General Troubleshooting

If you see issues with the resource connectors or resource connector groups that are deployed, try the following:

  • Check the Connectivity section on the Overview in Secure Access.
    The Secure Access Overview provides a high-level view of the status of your organization's configured connectors and connector groups. For more information, see Secure Access Overview Dashboard.
  • Check the Connector Groups page for issues.
    Navigate to Connect > Network Connections > Connector Groups and look at the Status column for the applicable connector group.
  • Check Monitor > Activity Search for logged events related to connectors.
  • Determine whether the issue affects a single connector or all connectors in the group.
    If the issue affects only one connector, you can delete the connector and deploy a new one.
  • Check for a Secure Access service outage. For more information, see View Cloud Security Service Status.
  • Temporarily disable a connector, then enable the connector again as appropriate.
  • Run diagnostics on the resource connector. For more information, see Connector Diagnostics (CLI).

Note: Some troubleshooting guidance outside of this document may refer to connectors as "agents", "app connectors", or "application connectors".

Throughput Capacity is Less Than Expected

  • Ensure that connectors are using DTLS and not TLS.
  • Run diagnostics on the connector and look for Protocol in the output. For more information, see Connector Diagnostics (CLI).
  • If the protocol shows TLS, check the following:
  • If you make changes, reboot the instance.

Users Cannot Connect to Private Resources

  • Ensure that you have assigned the resource to the applicable connector group. For more information, see Assign Private Resources to a Connector Group.
  • Verify that all connectors in the group can reach the resource.
  • Check the status of the connector group that the resource is associated with:
    Navigate to Connect > Network Connections > Connector Groups and look at the Status column for the applicable connector group.
  • For causes of user connectivity issues that are not specifically related to resource connectors, see Troubleshoot Private Access Rules.

Connector Software Auto-Upgrade Fails

For general information about automatic connector updates, see Maintain Resource Connectors.

  • The upgrade problem may be temporary and self-repairing. Secure Access automatically retries the upgrade periodically.
  • If the upgrade fails for a single connector, this will prevent upgrades for all connectors in the group that have not yet been upgraded.
  • To determine the problem connector, look for a yellow icon (Yellow icon: Connector version issue ) in the Version column on the connector group page.
  • Try deleting the connector instance and deploying a new connector. For more information, see Disable, Revoke, or Delete Resource Connectors and Groups.
  • Make sure the connector can connect to the Secure Access destinations. For more information, see Allow Resource Connector Traffic to Secure Access.
  • If the upgrade continues to fail:
    • Check for problems with your network or the connector instances themselves (such as a full disk).
    • Run diagnostics on the connector. For more information, see Connector Diagnostics (CLI).

Connector Operating System (OS) Version has Security Vulnerabilities

Secure Access show connector version issues in a list of connectors with a yellow icon (Yellow icon: Connector version issue ). Hover over the icon to identify the problem.

If you see a yellow icon for a connector version on the connector group's list of connectors, the platform operating system may have vulnerabilities. To determine whether this is the case, hover over the status icon. If OS vulnerabilities have been reported, you should replace the affected connectors.

To replace connectors, see Maintain and Monitor Resource Connectors and Connector Groups: Connector platform operating system (OS) updates.

Connector is Expired

To ensure the integrity of your deployed connectors, Secure Access validates each connector during the connector's renewal period. The renewal period spans several weeks where Secure Access checks the status of a deployed connector. Toward the end of the renewal period if the connector's state is not valid, Secure Access disconnects the resource connector and the connector expires.

Check the Status of Your Connector

We recommend that you log into a deployed resource connector periodically and check the status of the connector.

  1. Log in to the virtual machine for the resource connector.
  2. In the connector's diagnostic output, locate sse_cloud, and then review the resource connector's diagnostic information.

If your resource connectors expire frequently, we recommend that you review the prerequisites for deploying resource connectors in your environment. For more information, see Requirements and Prerequisites for Resource Connectors and Connector Groups.

(VMware Only) View Connector Diagnostic Information

The resource connector console on VMware displays diagnostic information before the resource connector is shutdown.

For example:

systemd-shutdown[1]\: Failed to acquire terminal, using /dev/null stdin/stdout/stderr instead: Input/output error

Check for an Expired Connector in Secure Access

  1. Navigate to Connect > Network Connections > Connector Groups.
  2. Locate the Connector Group table and click on a Connector Group.
  3. Locate the connector and confirm that its Status is Expired.

Clean Up an Expired Connector

  1. Delete the expired connector instance from your virtual environment.
  2. Delete the expired connector from the connector group in Secure Access. For more information, see Disable, Revoke, or Delete Resource Connectors and Groups.
  3. If needed, deploy a new connector. For more information, see Add Connectors to a Connector Group.

Stop a Connector

If you need to stop a Resource Connector for any reason, power it off from within the deployment environment (for example: AWS, VMware, Azure).

Unable to Revoke or Delete a Connector

This includes the inability of Secure Access to automatically delete an inactive resource connector.

This situation is likely to be temporary and self-repairing, and can occur even if the connector is still passing traffic to private resources. If the problem does not resolve itself, run diagnostics on the resource connector. For more information, see Connector Diagnostics (CLI).

Unable to Sync

An unable to sync error condition indicates that the resource connector can not connect to the Secure Access Controller component.

When a resource connector is unable to sync, Secure Access does not:

  • Display the metrics for the resource connector.
  • Update the configuration for the resource connector.
  • Perform over-the-air upgrades on the resource connector.

To troubleshoot the error condition, run the Command-line Interface (CLI) diagnostic tool to check the internet connectivity on the Controller. Also ensure that the firewall rules in the organization's environment allow the resource connector to make outbound connections to the Controller. For more information, see Allow Resource Connector Traffic to Secure Access.

If the error condition persists, contact Cisco Support at https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html.

Connector-Related Status Graphs are not Current

For example, the CPU Load chart does not have current data, or the graphs that you see when you click a connector ID in the list of connectors in a group are not up to date.

This situation is likely to be temporary and self-repairing, and can occur even if the connector is still passing traffic to private resources. If the problem does not resolve itself, we recommend that you get the diagnostic information about the resource connector. For more information, see Connector Diagnostics (CLI).

About Resource Connector Issues

Resource Connectors may be exchanging traffic successfully but not communicating otherwise with the Secure Access.

This can cause problems with automatic software updates, monitoring connector health, gathering metrics, and deleting or revoking a connector, including automatically deleting inactive connectors.

These issues are typically temporary and self-repairing.

  • If they are not, first try restarting the connector instance.
  • If the issues continue, you can run diagnostics on the connector to troubleshoot these issues. For more information, see Connector Diagnostics (CLI).

Connector Diagnostics (CLI)

To troubleshoot connector issues that cannot be resolved by restarting or redeploying the connector instance, run diagnostic commands on the connector instance.

Supported Commands

Secure Access supports commands that you can run on a resource connector instance. For more information, see Supported Standard Linux Troubleshooting Commands.

CommandDescription
diagnosticTry this command first when troubleshooting using the CLI.

Runs a series of ping and DNS tests on the local IP address, gateway, Secure Access APIs, and headend IP addresses. It also checks connectivity on https port to various Secure Access endpoints, along with system artifacts created through the connector instance provisioning process.
helpLists commands available to the acadmin user.
routeaddTo add routes:

Use "routeadd -n IP/MASK -g GW_IP"
where the network is (-n IP/MASK) and the gateway is (-g GW_IP).

Routes added with this command do not persist across reboots.
routedelTo delete routes added using the routeadd command:

Use "routedel -n IP/MASK -g GW_IP"
where network is (-n IP/MASK) and gateway is (-g GW_IP).

This command does not delete system created routes.
routeshowDisplay all routes in the system.
tcpdumpDisplay packet capture information and filter on IP address and port, with limited functionality.

You can run this command as:
tcpdump $IP [$Port] (Port is optional)
techsupportDisplays the following information:

- software version
- VPN tunnel state and related information
- System monitoring metrics, such as disk and memory statistics
- Information snapshot of the connector host, from DNS to Network interface details, iptables, routes, sysctl system settings, and monitoring information
- Recent periodic resource connector software logs
versionShow the connector software version and the platform OS version running on the connector instance.

Run the Diagnostic Command

To run the diagnostic command:

  1. Run the connector diagnostic tool from the connector's command line:
    1. SSH to the connector instance.
      Use the SSH key you configured while deploying the connector instance.
      Sign in with user name acadmin.
    2. At the $ prompt, enter diagnostic or another command of interest.
      To understand the results of the diagnostic command, see Diagnostic Codes.
  2. If the issue persists, contact Support.

Diagnostic Codes

When you run the diagnostic commands, you will see state codes.

If an issue is not listed in the following tables, or an issue persists after you have taken the recommended action, contact Cisco TAC.

Diagnostic Codes for Connector Update Issues

Code for
Upgrade State
DescriptionRecommended ActionIf Issues Persist
1Upgrade started.No action needed.N/A
5Upgrade successful.No action needed.N/A
101Secure Access will automatically attempt the upgrade again.Monitor to ensure successful retry.Contact Support (Cisco TAC)
50, 51, 52Upgrade is in progress.No action needed.N/A
200, 201, 202, 203Secure Access will automatically attempt the upgrade again.Monitor to ensure successful retry.Contact Support (Cisco TAC)
204Issue may be self-repairing.Monitor to ensure successful upgrade.Contact Support (Cisco TAC)
206Upgrade failed.Check for full disk.Contact Support (Cisco TAC)
207Upgrade failed.Run the techsupport diagnostic command to get more information.Contact Support (Cisco TAC)
208Image signature is invalid.Run the techsupport diagnostic command to get more information.Contact Support (Cisco TAC)
210Upgrade failed.

Secure Access will automatically attempt the upgrade again.
Check for disk issue.

Monitor to ensure successful retry.
Contact Support (Cisco TAC)
211Secure Access will automatically attempt the upgrade again.Monitor to ensure successful retry.Contact Support (Cisco TAC)
All othersIssues that are not actionable by customers.Contact Support (Cisco TAC)N/A

Diagnostic Codes for Other Connector Issues

Code for
Daemon Init State
Recommended ActionIf Issues Persist
6None; there are no issues.N/A
101Deploy a new connector instance.--
102Deploy a new connector instance.

Ensure that you have correctly copied the provisioning key.
--
103Deploy a new connector instance.Contact Support (Cisco TAC)
104Deploy a new connector instance.Contact Support (Cisco TAC)
105Deploy a new connector instance.--
106Ensure that you have correctly copied the provisioning key.

Ensure that connector can connec to the Secure Access cloud. See Allow Resource Connector Traffic to Secure Access.
--
108Ensure that the connector disk is writeable.--
109Ensure that the connector disk is writeable.--
110Ensure that the connector disk is writeable.--
111Ensure that connector can connect to the Secure Access cloud. See Allow Resource Connector Traffic to Secure Access.--
112Ensure that the connector instance time is correct.

Ensure that connector can connect to the Secure Access cloud. See Allow Resource Connector Traffic to Secure Access.
--
113Ensure that the connector disk is writeable.--
114Deploy a new connector instance.

Ensure that connector can connect to the Secure Access cloud. See Allow Resource Connector Traffic to Secure Access.
--
115Unable to sync the resource connector with Secure Access. If the error condition persists, contact Cisco Support at https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html.

Ensure that the connector can connect to Secure Access. For more information, see Allow Resource Connector Traffic to Secure Access.
--
116Deploy a new connector instance.Contact Support (Cisco TAC)
117Deploy a new connector instance.Contact Support (Cisco TAC)
118, 119Deploy a new connector instance.--
All othersDeploy a new connector instance.Contact Support (Cisco TAC)

Supported Standard Linux Troubleshooting Commands

You can use the following commands on a resource connector instance:

  • ping
  • nslookup
  • traceroute
  • tcptraceroute
  • netstat
  • free
  • df
  • vmstat
  • iostat
  • mpstat
  • reboot
  • uptime
  • date
  • clear

Maintain and Monitor Resource Connectors and Connector Group < Troubleshoot Resource Connectors and Connector Groups > Secure Access Regions