If your Checkmk Server is using HTTPS, and you're using the Agent Bakery, you need to be careful when exchanging the HTTPS certificate of your Checkmk server. If the root CA for the new certificate stays the same, this should be no problem for the Agent Bakery. However, if the CA changes, or if you change a standalone self-signed certificate, you must follow some extra steps. |
Background information regarding this subject is available on our:
Add the steps involved:
Deploy the new certificate to the Apache server.
For Checkmk Appliances: Click on Device Settings → Web Access → Upload Certificate
For more information about Appliances and SSL certificates, please refer to our Official Documentation. |
The following can help determine if the certificates of an agent match the certs of the Checkmk server.
Show the Certificate Authority, Issuers, and Subjects of the certificates that were installed with the agent package.
root@mylinuxhost:~# echo "Agent updater certificate store:" openssl crl2pkcs7 -nocrl -certfile <(cat /etc/check_mk/cmk-update-agent.cfg | egrep "\\n'" | cut -f2 -d":" | cut -f2 -d"'" | sed "s/\\\\n//g") | openssl pkcs7 -print_certs -text -noout | grep -e Subject: -e Issuer -e CA |
Show Issuer, Subject and Subject Alternative Names of the certificate of the server where the agent updater is registered to:
root@mylinuxhost:~# s=$(cat /etc/check_mk/cmk-update-agent.cfg | grep "'server'" | cut -f4 -d"'") echo "CMK Server HTTṔS Certificate for $s" openssl s_client -connect $s:443 </dev/null 2>/dev/null | openssl x509 -noout -text | grep -e Issuer: -e Subject: -e DNS: |
Related articles appear here based on the labels you select. Click to edit the macro and add or change labels.
|