summaryrefslogtreecommitdiffstats
path: root/docs/sections/services/ves-hv/troubleshooting.rst
diff options
context:
space:
mode:
authormharazin <mateusz.harazin@nokia.com>2020-03-25 14:44:00 +0100
committerkjaniak <kornel.janiak@nokia.com>2020-03-26 20:48:22 +0100
commitea4a60cb697f80beb03ac6ad7744541d7851661a (patch)
treebfe069e3e51146ef9d4a71d57579f993653906bc /docs/sections/services/ves-hv/troubleshooting.rst
parent03712a4f1ebfc3ad6467adbac9e47da9bb094d7c (diff)
Add default settings of TLS
Update troubleshooting for consul TLS disable procedure Issue-ID: DCAEGEN2-2143 Signed-off-by: mharazin <mateusz.harazin@nokia.com> Change-Id: I17d14824ba225d02faa1e4771dca42710687655c
Diffstat (limited to 'docs/sections/services/ves-hv/troubleshooting.rst')
-rw-r--r--docs/sections/services/ves-hv/troubleshooting.rst5
1 files changed, 3 insertions, 2 deletions
diff --git a/docs/sections/services/ves-hv/troubleshooting.rst b/docs/sections/services/ves-hv/troubleshooting.rst
index 6b9ec8b6..d6cf9f1e 100644
--- a/docs/sections/services/ves-hv/troubleshooting.rst
+++ b/docs/sections/services/ves-hv/troubleshooting.rst
@@ -198,20 +198,21 @@ For more information, see the :ref:`hv_ves_behaviors` section.
Authorization related errors
----------------------------
-**WARNING: SSL/TLS authorization is a part of an experimental feature for ONAP Dublin release and should be treated as unstable and subject to change in future releases.**
**For more information, see** :ref:`ssl_tls_authorization`.
**Key or trust store missing**
::
- | org.onap.dcae.collectors.veshv.main | ERROR | Failed to start a server | java.io.FileNotFoundException: /etc/ves-hv/server.p12
+ | org.onap.dcae.collectors.veshv.main | ERROR | Failed to start a server | java.nio.file.NoSuchFileException: /etc/ves-hv/server.p12
The above error is logged when key store is not provided. Similarly, when trust store is not provided, **/etc/ves-hv/trust.p12** file missing is logged.
They can be changed by specifying ``security.keys.trustStore`` or ``security.keys.keyStore`` file configuration entries.
+For testing purposes there is possibility to use plain TCP protocol. In order to do this navigate with your browser to consul-ui service and than pick KEY/VALUE tab. Select dcae-hv-ves-collector and change ``security.sslDisable`` to true. Update of configuration should let start TCP server without SSL/TLS configured.
+
====
**Invalid credentials**