Troubleshooting Common Agent Container Problems in the Solaris OS
This section addresses problems that you might encounter with the common agent container
shared component. In this Solaris release, he common agent container Java program is
included in the Solaris OS. The program implements a container for Java management
applications. Typically, the container is not visible.
The following are potential problems:
Port Number Conflicts
The common agent container occupies the following port numbers by default:
JMX port (TCP) = 11162
SNMPAdaptor port (UDP) = 11161
SNMPAdaptor port for traps (UDP) = 11162
Commandstream Adaptor port (TCP) = 11163
RMI connector port (TCP) = 11164
Note - If you are troubleshooting an installation of Sun Cluster, the port assignments are
different.
If your installation already reserves any of these port numbers, change the port
numbers that are occupied by the common agent container, as described in the
following procedure.
How to Check Port Numbers
This procedure shows you how to verify the Solaris port.
- Become superuser or assume an equivalent role.
Roles contain authorizations and privileged commands. For more information about roles, see Configuring RBAC (Task Map) in System Administration Guide: Security Services.
- Stop the common agent container management daemon.
# /usr/sbin/cacaoadm stop
- Change the port numbs by using the following syntax:
# /usr/sbin/cacaoadm set-param param=value
For example, to change the port occupied by the SNMPAdaptor from the default
of 11161 to 11165, type:
# /usr/sbin/cacaoadm set-param snmp-adaptor-port=11165
- Restart the common agent container management daemon.
# /usr/sbin/cacaoadm start
Compromised Security for Superuser Password
It might be necessary to regenerate security keys on a host that
is running the Java ES. For example, if there is a risk that
a superuser password has been exposed or compromised, you should regenerate the security
keys. The keys that are used by the common agent container services are
stored in /etc/cacao/instances/instance-name/security directory. The following task shows you how to generate security
keys for the Solaris OS.
How to Generate Security Keys for the Solaris OS
- Become superuser or assume an equivalent role.
Roles contain authorizations and privileged commands. For more information about roles, see Configuring RBAC (Task Map) in System Administration Guide: Security Services.
- Stop the common agent container management daemon.
# /usr/sbin/cacaoadm stop
- Regenerate the security keys.
# /usr/sbin/cacaoadm create-keys --force
- Restart the common agent container management daemon.
# /usr/sbin/cacaoadm start
Note - For the Sun Cluster software, you must propagate this change across all nodes
in the cluster.