Overview
This guide covers platform-level Key Manager issues that require administrator access. For user-facing issues such as 403 errors or expired secrets, see the Key Manager Troubleshooting guide.Diagnostic Checklist
Check Key Manager container status
Verify Key Manager API is responding
Check Key Manager API logs
Platform Issues
Secret retrieval returns 500 Internal Server Error
Secret retrieval returns 500 Internal Server Error
Cause: The secret store backend is unavailable — HSM connectivity lost,
KMIP server unreachable, or master key file inaccessible.Diagnosis:Resolution by backend type:
Check Key Manager worker logs for backend errors
| Backend | Check | Resolution |
|---|---|---|
simple_crypto | Master key file readable | ls -la /etc/xavs/key-manager/kek.conf |
pkcs11 | HSM online and partition accessible | Verify HSM dashboard status |
kmip | Network to KMIP server on port 5696 | nc -zv <kmip-host> 5696 |
Certificate orders remain in PENDING indefinitely
Certificate orders remain in PENDING indefinitely
Cause: The CA plugin is unreachable or misconfigured.Diagnosis:Review the
Check order status and error detail
error_status_code and error_reason fields. Common causes:- CA plugin service is not running — check container status via XDeploy
- Certificate subject DN contains invalid characters or fields rejected by the CA
- CA connectivity timeout — verify network access from Key Manager to the CA endpoint
Check CA plugin container
ACL not taking effect
ACL not taking effect
Cause: ACL changes require a short propagation delay, or the caller is
authenticated under a different user identity than expected.Diagnosis:Confirm the user ID in the ACL matches the authenticated user’s actual ID:Resolution: If the user ID does not match, ensure the correct user identity
is being used in the API call. ACL entries reference user IDs, not usernames —
a renamed user retains the same ID.
Verify ACL on the secret
Get current user ID
Key Manager service fails to start
Key Manager service fails to start
Cause: Database connectivity failure, missing master key file, or configuration
error preventing service initialization.Diagnosis:Common startup failures:
Check startup logs
| Error | Cause | Resolution |
|---|---|---|
database not reachable | DB host unreachable | Check DB container status |
No such file: kek.conf | Master key file missing | Restore from backup or re-generate |
PKCS11 library not found | HSM library missing | Verify library path in config |
KMIP connection refused | KMIP server down | Check KMIP server connectivity |
High secret creation latency
High secret creation latency
Cause: The secret store backend is under load or the encryption operation is
slow (common with PKCS#11 HSM under high request rates).Resolution:
- Check HSM health and current load from the HSM management interface
- Consider scaling Key Manager worker replicas via XDeploy to parallelize requests
- For KMIP backends, verify network latency to the KMIP server
- Review Key Manager worker logs for timeout or retry events
Log Locations
| Component | Log Command |
|---|---|
| Key Manager API | docker logs barbican-api |
| Key Manager Worker | docker logs barbican-worker |
| Key Manager Keystone Listener | docker logs barbican-keystone-listener |
Next Steps
Key Manager Troubleshooting (User)
User-facing Key Manager issues — 403 errors, expired secrets, ACL problems
Backend Configuration
Verify and update secret store backend configuration
Architecture
Understand component roles to narrow down failure scope
Security
Security hardening to prevent recurrence