TACTIC Service Troubleshooting
I get a proxy error in my browser that looks like the following:
Proxy Error The proxy server received an invalid response from an upstream server. The proxy server could not handle the request /POST /tactic/admin/ <http://192.168.14.113/tactic/admin/>/ Reason: *Error reading from remote server
This message tells you the TACTIC service has stopped. If you are running other processes on port 80 (for example, Skype), this can cause a problem with the TACTIC service. Stop the conflicting service. Then restart TACTIC in the TSI by logging in as root and running the command:
service tactic start
What if the TACTIC host memory is full?
If the memory is full, restarting the TACTIC service will remove this memory. If the problem persists or occurs again, contact Southpaw. A memory leak can occasionally occur when a user is repeatedly viewing a very large table with a huge number of entries (>5000). Restarting the service will clear this memory.
What if the TACTIC host CPU is at 100%?
Use the Windows Task Manager to kill the process that is taking 100% of the CPU. The TACTIC service will automatically recreate the process. Normally, this will clear the problem.
What if the user sees a Proxy Error?
This means that the IIS service cannot contact the TACTIC application server. Look in the Windows services and restart the TACTIC service. If the problem persists, contact Southpaw.
This command line tool reveals active ports on the local machine.
leowiz:~ root# netstat -a Active Internet connections (including servers) Proto Recv-Q Send-Q Local Address Foreign Address (state) tcp4 0 0 192.168.80.128.ssh 192.168.80.1.46575 ESTABLISHED tcp4 0 0 *.* *.* CLOSED tcp46 0 0 *.http *.* LISTEN tcp4 0 0 192.168.80.128.ssh 192.168.80.1.50126 ESTABLISHED tcp46 0 0 *.vnc-server *.* LISTEN tcp4 0 0 *.ssh *.* LISTEN tcp6 0 0 *.ssh *.* LISTEN tcp4 0 0 localhost.ipp *.* LISTEN tcp6 0 0 localhost.ipp *.* LISTEN udp4 0 0 *.net-assistant *.* udp4 0 0 192.168.80.128.ntp *.* udp6 0 0 localhost.ntp *.* udp4 0 0 localhost.ntp *.* udp6 0 0 localhost.ntp *.* udp6 0 0 *.ntp *.* udp4 0 0 *.ntp *.* udp6 0 0 *.mdns *.* udp4 0 0 *.mdns *.* Active LOCAL (UNIX) domain sockets Address Type Recv-Q Send-Q Inode Conn Refs Nextref Addr 41ad880 stream 0 0 46ad830 0 0 0 /private/tmp/ARD_ABJMMRT 41ce770 stream 0 0 0 3e22e58 0 0 /var/run/mDNSResponder 3e22e58 stream 0 0 0 41ce770 0 0 41ce5d8 stream 0 0 0 41ceb28 0 0 /var/tmp/SCDynamicStoreNotifyFileDescriptor-20739 41ceb28 stream 0 0 0 41ce5d8 0 0 41cef68 stream 0 0 0 3e22dd0 0 0 3e22dd0 stream 0 0 0 41cef68 0 0 3e22088 stream 0 0 0 41ad330 0 0 41ad330 stream 0 0 0 3e22088 0 0 41ce6e8 stream 0 0 0 41ce908 0 0 leowiz:~ root#
This command line tool allows port-scanning of an IP address. It can be used to remotely determine if a host is running HTTP.
[root@espresso ~]# nmap 192.168.80.128 Starting Nmap 4.76 ( http://nmap.org ) at 2010-03-23 15:58 EDT Interesting ports on 192.168.80.128: Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 5900/tcp open vnc MAC Address: 00:0C:29:9D:E8:46 (VMware) Nmap done: 1 IP address (1 host up) scanned in 6.66 seconds [root@espresso ~]#
In the above example, an http service seems to be running on the machine with the IP of 192.168.80.128
[root@tactic-tsi ~]# nmap localhost Starting Nmap 4.52 ( http://insecure.org ) at 2010-03-23 16:10 EDT Interesting ports on tactic-tsi.localdomain (127.0.0.1): Not shown: 1705 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 5432/tcp open postgres 8081/tcp open blackice-icecap 8082/tcp open blackice-alerts 10000/tcp open snet-sensor-mgmt Nmap done: 1 IP address (1 host up) scanned in 0.101 seconds [root@tactic-tsi ~]#
In this example, TACTIC and Apache are running on the same local machine, with TACTIC taking up 2 processes, and 2 ports, 8081, and 8082