Also worth checking your /etc/krb5.conf to make sure that the domain
controllers you are pointing at are aware of management.company.corp domain
?
On Friday, March 10, 2017 at 7:10:33 PM UTC, cupcake wrote:
>
> Is the second domain "setup" either in AD as an alternate UPN suffix or
> via a trust relationship with the forest? If it was, it would likely work.
>
> Also, what auth are you using; local acct, domain acct; ntlm, kerberos,
> etc.
>
> -cupcake
>
> On Thursday, March 9, 2017 at 3:01:10 AM UTC-5, MKPhil wrote:
>>
>> Hi,
>> I posted a similar question over on Stack Overflow but without any
>> helpful replies so I thought I'd try this group too... I don't think it is
>> an Ansible question per se but has arisen from our use of Ansible
>>
>> We have Windows servers with two NICs, two separate IPs and two FQDNs in
>> DNS, e.g.
>>
>>> SERVER01.ADdomain.company.corp [10.0.0.1]
>>
>> SERVER01.management.company.corp [192.168.0.1]
>>
>>
>> Both are configured in Windows and I can RDP, Telnet, HTTP or whatever to
>> both names and both IPs (assuming firewalls & routing are configured
>> correctly and there is something listening on the relevant ports). This
>> set-up is primarily to enable our management traffic (e.g. Backups) to
>> communicate over an alternative NIC to the primary traffic.
>>
>> WinRM has been configured (using the ConfigureRemotingForAnsible.ps1
>> script) and I can prove that it works if I use Ansible or PowerShell on the
>> AD name:
>>
>>> $ ansible -m win_ping SERVER01.ADdomain.company.corp
>>> SERVER01.ADdomain.company.corp | SUCCESS => {
>>> "changed": false,
>>> "ping": "pong"
>>> }
>>
>>
>> PS> Invoke-Command -scriptblock{hostname} -ComputerName
>>> SERVER01.ADdomain.company.corp
>>
>> SERVER01
>>
>>
>>
>> My problems come when I try to use the other FQDN. Ansible returns:
>>
>>> SERVER01.management.company.corp | UNREACHABLE! => {
>>> "changed": false,
>>> "msg": "kerberos: authGSSClientStep() failed: (('Unspecified GSS
>>> failure. Minor code may provide more information', 851968), ('Server not
>>> found in Kerberos database', -1765328377)), ssl: the specified credentials
>>> were rejected by the server",
>>> "unreachable": true
>>> }
>>
>>
>> And PowerShell sayeth:
>>
>>> [SERVER01.management.company.corp] Connecting to remote server
>>> SERVER01.management.company.corp failed with the following error message :
>>> WinRM cannot process the request. The following error occurred while using
>>> Kerberos authentication: Cannot find the computer
>>> SERVER01.management.company.corp. Verify that the computer exists on the
>>> network and that the name provided is spelled correctly. For more
>>> information, see the about_Remote_Troubleshooting
>>> Help topic.
>>> + CategoryInfo : OpenError:
>>> (SERVER01.management.company.corp:String) [], PSRemotingTransportException
>>> + FullyQualifiedErrorId : NetworkPathNotFound,PSSessionStateBroken
>>
>>
>>
>> From reading about this I think it is because the Kerberos Authentication
>> that WinRM uses only works on the AD name but my question is this: Is there
>> any way to get the Ansible/WinRM/PowerShell working using the second FQDN?
>> If not, why not? Any documents (particularly from Ansible and/or Microsoft)
>> to back this up would be appreciated.
>>
>> Cheers
>> Phil
>>
>>
>>
>>
>>
>>
>
--
You received this message because you are subscribed to the Google Groups
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/ansible-project/f2856a8c-0532-454b-9d6c-bf479bfe0b6d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.