Connection Issues
This guide helps you troubleshoot connection problems with git providers and cloud accounts.Git Provider Connections
GitHub
GitHub OAuth connection failing
GitHub OAuth connection failing
Symptoms:
- Redirect loop during OAuth
- “Access denied” error
- Authorization page not loading
- Clear browser cookies for github.com and cloudgeni.ai
- Try incognito/private browsing mode
- Verify GitHub account isn’t blocked
- Check GitHub organization allows third-party apps
- If using GitHub Enterprise, verify server URL is correct
- Go to GitHub Organization Settings
- Navigate to Third-party access → OAuth App access
- Find Cloudgeni and click Grant
GitHub repositories not syncing
GitHub repositories not syncing
Symptoms:
- Missing repositories in Cloudgeni
- Stale repository list
- New repos not appearing
- Click Refresh in IaC Repositories settings
- Verify you have access to the repository in GitHub
- Check if repository is private and permissions allow access
- Reconnect GitHub integration if issues persist
GitHub webhooks not triggering
GitHub webhooks not triggering
Symptoms:
- PR reviews not posting
- Scans not running on push
- Manual scans work but automatic don’t
- Check webhook configuration in GitHub repo settings
- Verify webhook URL:
https://api.cloudgeni.ai/webhooks/github - Review Recent Deliveries for errors
- Check webhook secret matches Cloudgeni configuration
- Test with Redeliver button on a recent delivery
GitLab
GitLab OAuth connection failing
GitLab OAuth connection failing
Symptoms:
- OAuth redirect errors
- “Invalid redirect URI” message
- Can’t complete authorization
- Clear browser cookies and retry
- Verify GitLab account has required permissions
- For self-hosted: Check GitLab URL is correct
- Verify SSL certificate is valid (self-hosted)
- Check GitLab application settings allow Cloudgeni
- GitLab version 13.0 or later
- HTTPS with valid certificate
- Outbound access to api.cloudgeni.ai
GitLab groups/projects not showing
GitLab groups/projects not showing
Symptoms:
- Empty project list
- Missing groups
- Partial project visibility
- Verify your GitLab role (need at least Maintainer)
- Check group/project visibility settings
- Refresh the integration connection
- For self-hosted: Verify API access is enabled
GitLab webhooks failing
GitLab webhooks failing
Symptoms:
- MR comments not appearing
- Push events not triggering scans
- Go to Project → Settings → Webhooks
- Verify webhook URL is correct
- Check SSL verification is enabled
- Review webhook logs for delivery status
- Ensure webhook secret token matches
Azure DevOps
Azure DevOps OAuth failing
Azure DevOps OAuth failing
Symptoms:
- Microsoft login loop
- “Consent required” errors
- Organization not accessible
- Verify you have Project Administrator access
- Check organization allows third-party apps
- Clear Microsoft account cookies
- Try different browser or incognito mode
- Go to Azure DevOps Organization Settings
- Navigate to Policies
- Enable Third-party application access via OAuth
Azure DevOps service hooks not working
Azure DevOps service hooks not working
Symptoms:
- PR comments not posting
- No scan triggers on push
- Go to Project Settings → Service hooks
- Verify Cloudgeni subscription exists
- Check subscription is enabled
- Review history for delivery failures
- Test subscription with manual trigger
Cloud Account Connections
AWS
AWS role assumption failing
AWS role assumption failing
Symptoms:
- “Access Denied” error
- “Role cannot be assumed” message
- Connection test failing
- Verify role ARN is correct
- Check trust policy includes Cloudgeni’s AWS account
- Verify external ID matches exactly
- Ensure role has required permissions
AWS resources not discovered
AWS resources not discovered
Symptoms:
- Empty resource inventory
- Missing resource types
- Partial discovery
- Verify IAM role has SecurityAudit policy attached
- Check all required regions are enabled
- Run a new discovery scan
- Review IAM policy for service-specific permissions
SecurityAuditmanaged policy (minimum)- Or custom policy with read-only access to required services
AWS compliance scan errors
AWS compliance scan errors
Symptoms:
- Findings show “access denied”
- Incomplete compliance results
- Missing services in scan
- Add missing service permissions to IAM role
- Check service is enabled in AWS account
- Verify region-specific services are accessible
- Review scan logs for specific permission errors
Azure
Azure service principal connection failing
Azure service principal connection failing
Symptoms:
- “Authentication failed” error
- “Invalid credentials” message
- Subscription not accessible
- Verify Tenant ID, Client ID, and Client Secret
- Check service principal hasn’t expired
- Verify app registration is in correct tenant
- Ensure subscription access is granted
Azure resources not discovered
Azure resources not discovered
Symptoms:
- Missing resources in inventory
- Subscription not scanned
- Partial resource visibility
- Verify service principal has Reader role on subscription
- Check all target subscriptions are configured
- Run new discovery scan
- Review Azure RBAC assignments
Readerrole on subscription (minimum)- Additional roles for specific services if needed
Azure Defender data not syncing
Azure Defender data not syncing
Symptoms:
- No security findings from Defender
- Stale compliance data
- Missing recommendations
- Verify Azure Defender is enabled on subscription
- Check Cloudgeni has access to Security Center API
- Add
Security Readerrole to service principal - Wait for Defender to generate findings (can take 24h initially)
GCP
GCP service account connection failing
GCP service account connection failing
Symptoms:
- “Invalid service account” error
- JSON key not accepted
- Project access denied
- Verify JSON key file is complete and valid
- Check service account exists in the project
- Ensure required APIs are enabled
- Verify service account email is correct
GCP resources not discovered
GCP resources not discovered
Symptoms:
- Empty or partial resource list
- Permission denied errors
- Missing projects
- Grant
Viewerrole to service account - Enable required APIs in each project
- For organization-wide: grant roles at org level
- Check project is not in a different organization
OCI
OCI connection failing
OCI connection failing
Symptoms:
- “Authentication failed” error
- Tenancy not accessible
- API key rejected
- Verify User OCID is correct
- Check Tenancy OCID matches
- Ensure API key fingerprint is accurate
- Verify private key format (PEM)
- Check user has required policies
OCI CIS scan not working
OCI CIS scan not working
Symptoms:
- No compliance findings
- CIS benchmark not available
- Scan errors
- Verify Cloud Guard is enabled
- Check service connector permissions
- Ensure CIS benchmark recipes are active
- Review OCI audit logs for access issues
Network and Firewall Issues
Corporate Firewall
If your organization uses a firewall: Required Outbound Access:| Destination | Port | Purpose |
|---|---|---|
api.cloudgeni.ai | 443 | API communication |
app.cloudgeni.ai | 443 | Dashboard access |
*.cloudgeni.ai | 443 | All Cloudgeni services |
Proxy Configuration
If you’re behind a proxy, webhooks may not work. Contact your network administrator to:- Allow Cloudgeni webhook URLs
- Configure proxy exceptions for Cloudgeni domains
Getting Help
If connection issues persist:- Check Status: status.cloudgeni.ai
- Collect Diagnostics:
- Error messages
- Timestamps
- Account/resource identifiers
- Contact Support: support@cloudgeni.ai