Greetings,

we have some certs expired on Dec 27, ipaCert among them, IPA (VERSION:
4.4.0, API_VERSION: 2.213) stopped working.

I have spent many hours to renew the certs to no avail.

I have followed a collection of tips on this list:
 rolled back the clock to before the expiry (Dec 23),
 enabled debug logs for certmonger renewal log (getcert modify-ca -c
dogtag-ipa-ca-renew-agent -e '/usr/libexec/certmonger/
dogtag-ipa-ca-renew-agent-submit -vv')
 added debug=true to /etc/ipa/default.conf

 ipactl start starts everything successfully
 systemctl start pki-tomcatd@pki-tomcat
 systemctl restart certmonger

Before resubmit, "getcert list" has this, note ca-error: Invalid cookie: '':
-----
getcert list
Number of certificates and requests being tracked: 8.
Request ID '20170201190112':
        status: MONITORING
        ca-error: Invalid cookie: ''
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=CA Audit,O=CAMHRES.CA
        expires: 2017-12-27 14:36:44 UTC
        key usage: digitalSignature,nonRepudiation
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"auditSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190113':
        status: MONITORING
        ca-error: Invalid cookie: ''
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=OCSP Subsystem,O=CAMHRES.CA
        expires: 2017-12-27 14:36:43 UTC
        key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
        eku: id-kp-OCSPSigning
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"ocspSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190114':
        status: MONITORING
        ca-error: Invalid cookie: ''
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=CA Subsystem,O=CAMHRES.CA
        expires: 2017-12-27 14:36:43 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"subsystemCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190115':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=Certificate Authority,O=CAMHRES.CA
        expires: 2036-01-07 14:36:42 UTC
        key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"caSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190116':
        status: MONITORING
        ca-error: Invalid cookie: ''
        stuck: no
        key pair storage:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=IPA RA,O=CAMHRES.CA
        expires: 2017-12-27 14:37:02 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
        post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
        track: yes
        auto-renew: yes
Request ID '20170201190117':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate
DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate
DB'
        CA: dogtag-ipa-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-11-19 19:38:26 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"Server-Cert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190118':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/
dirsrv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate
DB',pinfile='/etc/dirsrv/slapd-CAMHRES-CA/pwdfile.txt'
        certificate: type=NSSDB,location='/etc/dirsrv/slapd-CAMHRES-CA',
nickname='Server-Cert',token='NSS Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-12-11 19:38:29 UTC
        principal name: ldap/rprshipav01.camhres...@camhres.ca
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
CAMHRES-CA
        track: yes
        auto-renew: yes
Request ID '20170201190119':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/
httpd/alias',nickname='Server-Cert',token='NSS Certificate
DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate: type=NSSDB,location='/etc/
httpd/alias',nickname='Server-Cert',token='NSS Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-12-11 19:38:38 UTC
        principal name: HTTP/rprshipav01.camhres...@camhres.ca
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command: /usr/libexec/ipa/certmonger/restart_httpd
        track: yes
        auto-renew: yes
-----

After resubmitting:
ipa-getcert resubmit -i 20170201190112
ipa-getcert resubmit -i 20170201190113
ipa-getcert resubmit -i 20170201190114
ipa-getcert resubmit -i 20170201190116

getcert list shows this, note status: CA_WORKING:
-----
Number of certificates and requests being tracked: 8.
Request ID '20170201190112':
        status: CA_WORKING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=CA Audit,O=CAMHRES.CA
        expires: 2017-12-27 14:36:44 UTC
        key usage: digitalSignature,nonRepudiation
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"auditSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190113':
        status: CA_WORKING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=OCSP Subsystem,O=CAMHRES.CA
        expires: 2017-12-27 14:36:43 UTC
        key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
        eku: id-kp-OCSPSigning
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"ocspSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190114':
        status: CA_WORKING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=CA Subsystem,O=CAMHRES.CA
        expires: 2017-12-27 14:36:43 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"subsystemCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190115':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
Certificate DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=Certificate Authority,O=CAMHRES.CA
        expires: 2036-01-07 14:36:42 UTC
        key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"caSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190116':
        status: CA_WORKING
        stuck: no
        key pair storage:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=IPA RA,O=CAMHRES.CA
        expires: 2017-12-27 14:37:02 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
        post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
        track: yes
        auto-renew: yes
Request ID '20170201190117':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate
DB',pin set
        certificate: type=NSSDB,location='/etc/pki/
pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate
DB'
        CA: dogtag-ipa-renew-agent
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-11-19 19:38:26 UTC
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"Server-Cert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170201190118':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/
dirsrv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate
DB',pinfile='/etc/dirsrv/slapd-CAMHRES-CA/pwdfile.txt'
        certificate: type=NSSDB,location='/etc/dirsrv/slapd-CAMHRES-CA',
nickname='Server-Cert',token='NSS Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-12-11 19:38:29 UTC
        principal name: ldap/rprshipav01.camhres...@camhres.ca
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
CAMHRES-CA
        track: yes
        auto-renew: yes
Request ID '20170201190119':
        status: MONITORING
        stuck: no
        key pair storage: type=NSSDB,location='/etc/
httpd/alias',nickname='Server-Cert',token='NSS Certificate
DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate: type=NSSDB,location='/etc/
httpd/alias',nickname='Server-Cert',token='NSS Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=CAMHRES.CA
        subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
        expires: 2019-12-11 19:38:38 UTC
        principal name: HTTP/rprshipav01.camhres...@camhres.ca
        key usage: digitalSignature,nonRepudiation,keyEncipherment,
dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command: /usr/libexec/ipa/certmonger/restart_httpd
        track: yes
        auto-renew: yes
-----

Nothing happens from now on and /var/log/ipa/renew.log does not log new
message after these:
-----
2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG
 Initializing principal host/rprshipav01.camhres...@camhres.ca using keytab
/etc/krb5.keytab
2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   using
ccache /var/run/certmonger/tmp-1aYw7c/ccache
2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   Attempt
1/1: success
2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   Loading
StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
2017-12-23T05:55:52Z    5538    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Created connection context.ldap2_80840016
2017-12-23T05:55:52Z    5538    MainThread
ipa.ipapython.ipaldap.SchemaCache
     DEBUG   retrieving schema for SchemaCache
url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x41b2170>
2017-12-23T05:55:52Z    5538    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Destroyed connection context.ldap2_80840016
2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG
 Initializing principal host/rprshipav01.camhres...@camhres.ca using keytab
/etc/krb5.keytab
2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   using
ccache /var/run/certmonger/tmp-VDJjQv/ccache
2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   Attempt
1/1: success
2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   Loading
StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
2017-12-23T05:56:03Z    5543    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Created connection context.ldap2_77880784
2017-12-23T05:56:03Z    5543    MainThread
ipa.ipapython.ipaldap.SchemaCache
     DEBUG   retrieving schema for SchemaCache
url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4a46e60>
2017-12-23T05:56:03Z    5543    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Destroyed connection context.ldap2_77880784
2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG
 Initializing principal host/rprshipav01.camhres...@camhres.ca using keytab
/etc/krb5.keytab
2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   using
ccache /var/run/certmonger/tmp-BQMLXO/ccache
2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   Attempt
1/1: success
2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   Loading
StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
2017-12-23T05:56:12Z    5548    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Created connection context.ldap2_82537872
2017-12-23T05:56:12Z    5548    MainThread
ipa.ipapython.ipaldap.SchemaCache
     DEBUG   retrieving schema for SchemaCache
url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4eba710>
2017-12-23T05:56:13Z    5548    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Destroyed connection context.ldap2_82537872
2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG
 Initializing principal host/rprshipav01.camhres...@camhres.ca using keytab
/etc/krb5.keytab
2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   using
ccache /var/run/certmonger/tmp-zvyYAy/ccache
2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   Attempt
1/1: success
2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   Loading
StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
2017-12-23T05:56:22Z    5549    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Created connection context.ldap2_104689040
2017-12-23T05:56:22Z    5549    MainThread
ipa.ipapython.ipaldap.SchemaCache
     DEBUG   retrieving schema for SchemaCache
url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x63dbea8>
2017-12-23T05:56:23Z    5549    MainThread
ipa.ipaserver.plugins.ldap2.ldap2
     DEBUG   Destroyed connection context.ldap2_104689040
-----

/var/log/pki/pki-tomcat/ca/ selftests.log does nt log any errores:
-----
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem: Initializing self test plugins:
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin logger parameters
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instances
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instance parameters
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in on-demand order
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in startup order
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem: Self test plugins have been successfully loaded!
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem: Running self test plugins specified to be executed at
startup:
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1] CAPresence:
CA is present
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SystemCertsVerification: system certs verification success
0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
startup!
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem: Initializing self test plugins:
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin logger parameters
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instances
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instance parameters
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in on-demand order
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in startup order
0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
SelfTestSubsystem: Self test plugins have been successfully loaded!
0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
SelfTestSubsystem: Running self test plugins specified to be executed at
startup:
0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1] CAPresence:
CA is present
0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
SystemCertsVerification: system certs verification success
0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
startup!
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem: Initializing self test plugins:
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin logger parameters
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instances
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem:  loading all self test plugin instance parameters
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in on-demand order
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem:  loading self test plugins in startup order
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem: Self test plugins have been successfully loaded!
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem: Running self test plugins specified to be executed at
startup:
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1] CAPresence:
CA is present
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SystemCertsVerification: system certs verification success
0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
startup!
-----

Can someone shed some light on this? I may have missed some logs but can
provide them if required.

Many thanks,
Qing
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org

Reply via email to