Good morning!

Sorry for the late answer. I indeed still have this error - for each of my 3 
backends, 3 times. And, what was further surprising to me - as far as I 
remember, the error still persisted and also persists after running the 
suggested fix

dsconf <instance> backend index set <be_name> --attr parentId --add-mr 
integerOrderingMatch

as well as the recommended reindex

dsconf <instance> backend index reindex <be_name> --attr parentId

The only difference was, that after applying the fix the recommended 
healthcheck actions disappeared - but not the error reports. I'm a little 
hesitant about potential troubleshooting after an update from my current 
version 389-ds-base-2.6.1-12.el9_6.x86_64 to 389-ds-base-2.7.0-7.el9_7.x86_64 
as I’m not really experienced in LDAP installations. This is the reason, why I 
wanted to wait and see how these potential bug and workarounds develop.

What might be further interesting or helpful: our multi-master LDAP cluster has 
been build from scratch on RHEL 9 using dscreate and - at least in my opinion - 
a quite ordinary setup file

;
; This is a version 2 ds setup inf file.
;
; The special value {instance_name} is substituted at installation time.
;

[general]

; latest version number taken from 
/usr/lib/python3.9/site-packages/lib389/configurations/__init__.py
defaults = 002003000
full_machine_name = {{ inventory_hostname }}
strict_host_checking = True

[slapd]

; Having replication problems with mdb and 389-ds-base-2.4.5-8.el9_4
; https://www.spinics.net/linux/fedora/389-users/msg22932.html
;db_lib = mdb
instance_name = {{ ds_instance_name }}
port = {{ ds_ldap_port }}
root_password = {{ ds_root_passwd }}
; Even if the SSL certificate is changed later on, it's recommended to install
; the Server with a self signed certificate. Doing so, the installer
; automatically creates two files:
; - /etc/dirsrv/slapd-instance_name/pwdfile.txt
; - /etc/dirsrv/slapd-instance_name/pin.txt
; which are needed by dirsrv to access the NSS database and its certificates.
; References:
; - 
https://access.redhat.com/documentation/en-us/red_hat_directory_server/12/html/securing_red_hat_directory_server/assembly_enabling-tls-encrypted-connections-to-directory-server_securing-rhds#con_how-directory-server-unlocks-the-nss-database_assembly_enabling-tls-encrypted-connections-to-directory-server
; - 
https://access.redhat.com/documentation/en-us/red_hat_directory_server/12/html/installing_red_hat_directory_server/assembly_setting-up-a-new-instance-on-the-command-line-using-a-inf-file_installing-rhds#proc_creating-a-inf-file-for-a-directory-server-instance-installation_assembly_setting-up-a-new-instance-on-the-command-line-using-a-inf-file
self_sign_cert = True
self_sign_cert_valid_months = 12

[backend-{{ be_name }}]

create_suffix_entry = True
enable_replication = True
replica_binddn = {{ ds_replica_dn }}
; This will create the manager entry if a value is set
; and fails therefore if the binddn already exists!
replica_bindpw = {{ ds_replica_passwd }}
replica_id = {{ ds_be_name_replica_id }}
replica_role = supplier
suffix = {{ ds_suffixes.be_name }}

Please let me know if there is any further info you might need to assist.

Best regards
Christopher

On 09.01.2026, at 20:24, Viktor Ashirov <[email protected]> wrote:

Hi,

On Fri, Jan 9, 2026 at 5:53 PM Zechmeister Christopher via 389-users 
<[email protected]<mailto:[email protected]>> 
wrote:
Happy new year everyone!

May I ask about the status of this presumable bug? Is there already some ticket 
I simply cannot find or is it currently not possible to reproduce the described 
behaviour?
I’m in a similar situation and have currently locked the pkg version on our 
hosts, with the consequence that I cannot update other packages as well due to 
broken dependencies. I would be very interested in any news I missed.

Do you also have the issue with the same versions of 389-ds-base? I.e. after 
upgrading 389-ds-base-2.6.1-12.el9_6.x86_64 to 389-ds-base-2.7.0-7.el9_7.x86_64?
There is a known issue when some searches may return incomplete or empty 
results, but it affects 389-ds-base-2.6.1-12 too.
Could you please check if dsctl <instance> healthcheck returns DSBLE0007 errors?

Thanks.

Thanks for your answer in advance!

Best regards
Christopher Zechmeister


Dipl.-Ing. Christopher Zechmeister
Senior Software Developer
Online Systeme

APA-Tech
Laimgrubengasse 10
1060 Wien

www.apa.at<https://www.apa.at/>

On 20.11.2025, at 16:11, Mark Reynolds via 389-users 
<[email protected]<mailto:[email protected]>> 
wrote:



On 11/20/25 8:57 AM, Trenc, Mike via 389-users wrote:
Hi everyone,

We recently performed OS patching within our Test LDAP environment consisting 
of six RHEL 9 servers (2 primaries and 4 replicas) such that it upgraded from 
Red Hat Enterprise Linux release 9.6 to Red Hat Enterprise Linux release 9.7.  
During the patching process, the 389-DS packages below were also updated.

389-ds-base-2.6.1-12.el9_6.x86_64 ===> 389-ds-base-2.7.0-7.el9_7.x86_64
389-ds-base-libs-2.6.1-12.el9_6.x86_64 ===> 
389-ds-base-libs-2.7.0-7.el9_7.x86_64

Shortly after patching and rebooting, we noticed an issue whereby the service 
accounts associated with applications in our Test environment were no longer 
able to search the OU that they were previously able to search successfully 
prior to patching.  To correct the issue, we ended up moving the ACIs 
associated with application service accounts one level higher in the OU.

As an example, below represents the change that we made to an ACI before and 
after the OS patching event to resolve the issue:

Original pre-patching ACI when service account searches were successful:

DN: ou=people,dc=university,dc=edu
(targetattr = "*") (version 3.0;acl "app-user";allow 
(read,search,compare)(userdn = 
"ldap:///uid=app-user,ou=ldap-apps,dc=university,dc=edu";);)

Post-Patching change made when service account searches no longer worked with 
the above original ACI configuration:

DN: dc=university,dc=edu
(targetattr = "*") (version 3.0;acl "app-user";allow 
(read,search,compare)(userdn = 
"ldap:///uid=app-user,ou=ldap-apps,dc=university,dc=edu";);)

Has anyone else experienced any changes in ACI behavior when upgrading to the 
latest 389-ds-base-2.7.0-7 and 389-ds-base-libs-2.7.0-7 packages?

This is a regression :-(  I'm going to try and reproduce it and then file a 
bug.  I'll let you know what the ticket is once it's created.

Thanks,

Mark

Thanks,
Mike



—

Michael Trenc

Senior DevOps Engineer | Technology Partner Services
Harvard University Information Technology
P:(617) 496-6544 | W:huit.harvard.edu<https://huit.harvard.edu/>


--
Identity Management Development Team

--
_______________________________________________
389-users mailing list -- 
[email protected]<mailto:[email protected]>
To unsubscribe send an email to 
[email protected]<mailto:[email protected]>
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

--
_______________________________________________
389-users mailing list -- 
[email protected]<mailto:[email protected]>
To unsubscribe send an email to 
[email protected]<mailto:[email protected]>
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


--
Viktor

-- 
_______________________________________________
389-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to