Article Content
Article Number | 000033389 |
Applies To | RSA Product Set: Security Analytics RSA Product/Service Type: Security Analytics Core Appliance, Security Analytics Log Collector RSA Version/Condition: 10.4.X, 10.5.X, 10.6.X Platform: CentOS O/S Version: 6 |
Issue | During the File collection event source integration, Cache key to connect the event source with the STIG Collector results in the following errors:![]() |
Cause | This error is the result of the expired "sftp" user password in the STIG Collector. This can be verified using the following. /var/log/secure:
To see the password status for the "sftp" user, run the following command in the STIG collector:
Example: ![]() |
Resolution | As per STIG compliance, all user passwords need to be renewed every 60 days. During the File collection integration, make sure that the "sftp" user password is not expired. If the "sftp" user passwords need to be changed, use the following steps:
|