Problem and Error Messages [MCP, UNIX]

Situation 1

SP-AMS is not automating a connected system.

Explanations

Any of the following are possible explanations:

Solutions

The following are possible solutions:

Situation 2 [MCP]

The message

<<ASPO>> timeout waiting for SP-AMS usercode/password

appears in the console of an MCP system.

Explanations

The Operations Sentinel MCP agent is trying to connect to Operations Sentinel. The connection protocol requires that SP-AMS supply a usercode and password to the agent. The usercode and password come from the active SP-AMS database.

Solutions

Check the following to determine why the agent is not getting the usercode and password:

Situation 3 [UNIX]

The message

Host key does not match recorded value, possible security intrusion!

appears on the SSH-connected replicated console for a UNIX and Linux system or in the log for that system.

Explanation

When Operations Sentinel connects to a managed system using SSH protocol the first time, the managed system provides a key. Operations Sentinel stores this key in the registry on the Operations Sentinel server at the following location:

HKEY_LOCAL_MACHINE\SOFTWARE\Unisys\Single Point Operations\Security

On subsequent connections, Operations Sentinel compares this stored key with the key supplied by the managed system and continues if they match. They should match unless the keys on the managed system have been regenerated. This is typically a manual operation on the managed system. If the preceding message is received, Operations Sentinel cannot complete the connection.

Solution

In this situation you should confirm that the keys on the managed system have been regenerated, to verify that the managed system has not been compromised. If you are convinced your security has not been violated, edit the registry on your Operations Sentinel server to remove the key that Operations Sentinel stored. Start the registry editor and find the above key location. At this location you will see one key for each managed system and for each key type.

The keys are in the following form:

key-type@port-number system-name

where

key-type is

port-number is typically 22

system-name is the network name of the system you configured in Operations Sentinel

Locate the item that corresponds to the system with the mismatched key and delete it. If there is more than one key for the system, delete all occurrences. The next time Operations Sentinel attempts to connect to that managed system, a new key is recorded in the registry for the system.