Redpeaks V6.8
Trouble shooting
Monitors Guide
Trouble shooting
Monitors Guide
This section explains how to manually generate a server certificate using Keytool and OpenSSL:
We will use Keytool to generate a new keypair, make sure to define the correct SAN (hostname and/or IP)
Command:
keytool -genkeypair -keyalg RSA -keysize 4096 \ -keystore server.jks \ -storepass agentilKeyStore \ -alias server \ -dname ''CN=your.hostname.example'' \ -ext SAN=DNS:your.hostname.example,IP:your.server.ip
This creates:
Command:
keytool -certreq \ -keystore server.jks \ -storepass agentilKeyStore \ -alias server \ -ext SAN=DNS:your.hostname.example,IP:your.server.ip \ -file server.csr
Send server.csr to your Certificate Authority (CA)
Your CA will return:
Certificates may be in DER (binary) or PEM (text) format
If DER (binary), convert to PEM with:
openssl x509 -inform DER -in intermediate.cer -out intermediate.crt openssl x509 -inform DER -in root.cer -out root.crt openssl x509 -inform DER -in server.cer -out server.crt
Command:
keytool -import -trustcacerts \ -keystore server.jks \ -storepass agentilKeyStore \ -alias ca_root \ -file root.crt
Then command:
keytool -import -trustcacerts \ -keystore server.jks \ -storepass agentilKeyStore \ -alias ca_intermediate \ -file intermediate.crt
IMPORTANT: These certificates are imported as trustedCertEntry, but Redpeaks does NOT reconstruct the chain automatically
This step replaces the temporary Keytool certificate and attaches the chain
keytool -import \ -keystore server.jks \ -storepass agentilKeyStore \ -alias server \ -file server.crt
Check chain length:
keytool -list -v -keystore server.jks -alias server
You should see:
If chain length = 1, Redpeaks will send an incomplete chain, browsers will reject it → read the PKCS12 section
This section fixes all chain issues by generating a PKCS12 containing:
Redpeaks will then serve a complete certificate chain
Command:
cat intermediate.crt root.crt > chain.pem
Order matters:
Command:
openssl pkcs12 -export \ -inkey server.key \ -in server.crt \ -certfile chain.pem \ -name pro_monitor \ -out server.p12
Command:
keytool -importkeystore \ -srckeystore server.p12 -srcstoretype PKCS12 -srcstorepass agentilKeyStore \ -destkeystore [PRO_MONITOR_HOME]/certificates/.keystore \ -deststoretype JKS -deststorepass agentilKeyStore
Verify:
keytool -list -v -keystore [PRO_MONITOR_HOME]/certificates/.keystore -alias server
Expected: