Polyspace Access ETL and Web Server Services Do Not Start
Issue
You start the Polyspace® Access™ services but after a moment, the ETL and Web Server services stop. You might see a HTTP 403 error message in your web browser when you try to connect to Polyspace Access.
Possible Cause: Hyper-V Network Configuration Cannot Resolve Local Host Names
On Windows®, if you installed Polyspace Access inside a virtual machine (VM), that VM is managed by Hyper-V. Depending on your network configuration, Hyper-V might not resolve local host names. The Polyspace Access ETL and Polyspace Access Web Server services cannot connect to the host that you specify with these host names.
To test whether Hyper-V can resolve host name myHostname on a
                machine that is connected to the Internet, at the command line,
                enter:
docker run --rm -it alpine ping myHostname
Solution
Stop and restart the admin-docker-agent binary without
                    using the --hostname option.
- If you are on a trusted network or you do not want to use the HTTPS protocol: - At the command-line, enter: - docker stop admin admin-docker-agent --restart-gateway 
- In the Cluster Admin web interface, click Restart Apps. 
 
- If you want to use the HTTPS protocol, generate certificates with a subject alternative name (SAN) that includes the IP address of the cluster operator node on which the services are running. - Copy this configuration file to a text editor and save it on your machine as - openssl.cnf.- hostNameis the host name of the server that hosts Polyspace Access.- fullyQualifiedDomainNameis the corresponding fully qualified domain name.- nodeIPAddressis the IP address of the node on which you run the- admin-docker-agentbinary.- You do not need to edit the value of the other fields in the - [ req_distinguished_name ]section of- openssl.cnf. Updating the value of these fields does not affect the configuration.
- In the Cluster Dashboard, click Configure Nodes. The IP address listed in the Hostname field corresponds to - nodeIPAddressin the- openssl.cnffile. If there is more than one node listed, add an additional line in the- [ alt_names ]section of- openssl.cnffor each IP address. For example:- [ alt_names ] DNS.1 = hostName DNS.2 = fullyQualifiedDomainName IP.1 = nodeIPAddress IP.2 = additionalNodeIPAddress 
- Generate a certificate signing request (CSR) by using your - openssl.cnfconfiguration file. At the command line, enter:The command outputs a private key file- openssl req -new -out myReqest.csr -newkey rsa:4096 \ -keyout myKey.key -nodes -config openssl.cnf - myKey.keyand the file- myRequest.csr.
- To generate a signed certificate: - If you use your organization's certificate authority, submit - myRequest.csrto the certificate authority. The certificate authority uses the file to generate a signed server certificate. For instance,- server_cert.cer.
- If you use self-signed certificates, at the command line, enter: The command outputs self-signed certificate- openssl x509 -req -days 365 -in myRequest.csr -signkey myKey.key \ -out self-cert.pem -extensions v3_req -extfile openssl.cnf - self-cert.pem.
 
- Stop and restart the - admin-docker-agentbinary with this command:- Windows PowerShell - ./admin-docker-agent --restart-gateway ` --ssl-cert-file certFile1 ` --ssl-key-file keyFile ` --ssl-ca-file trustedStoreFile - Linux® - ./admin-docker-agent --restart-gateway \ --ssl-cert-file certFile1 \ --ssl-key-file keyFile \ --ssl-ca-file trustedStoreFile - certFile1is the full path of the file you obtained in step 4.- keyFileis the file you generated in step 3.- trustedStoreFileis the file you generated in step 4 if you used self-signed certificates. Otherwise, it is the trust store file you use to configure HTTPS. See Choose Between HTTP and HTTPS Configuration for Polyspace Access Save your changes.
- In the Cluster Admin web interface, click Restart Apps. 
 
