In case someone else has the same trouble.

It turns out that for some reason I do not have a caRenewalMaster...

By adding the attribute per following:
-----
dn: cn=CA,cn=rprshipav01.camhres.ca
,cn=masters,cn=ipa,cn=etc,dc=camhres,dc=ca
changetype:modify
add:ipaConfigString
ipaConfigString: caRenewalMaster
-----

And restart pki-tomcatd as well as certmonger, certs are renewed.

Regards,
Qing

On Sat, Dec 30, 2017 at 6:18 PM, Qing Chang <tmp...@gmail.com> wrote:

> Greetings,
>
> we have some certs expired on Dec 27, ipaCert among them, IPA (VERSION:
> 4.4.0, API_VERSION: 2.213) stopped working.
>
> I have spent many hours to renew the certs to no avail.
>
> I have followed a collection of tips on this list:
>  rolled back the clock to before the expiry (Dec 23),
>  enabled debug logs for certmonger renewal log (getcert modify-ca -c
> dogtag-ipa-ca-renew-agent -e 
> '/usr/libexec/certmonger/dogtag-ipa-ca-renew-agent-submit
> -vv')
>  added debug=true to /etc/ipa/default.conf
>
>  ipactl start starts everything successfully
>  systemctl start pki-tomcatd@pki-tomcat
>  systemctl restart certmonger
>
> Before resubmit, "getcert list" has this, note ca-error: Invalid cookie:
> '':
> -----
> getcert list
> Number of certificates and requests being tracked: 8.
> Request ID '20170201190112':
>         status: MONITORING
>         ca-error: Invalid cookie: ''
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=CA Audit,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:44 UTC
>         key usage: digitalSignature,nonRepudiation
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "auditSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190113':
>         status: MONITORING
>         ca-error: Invalid cookie: ''
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=OCSP Subsystem,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:43 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         eku: id-kp-OCSPSigning
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "ocspSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190114':
>         status: MONITORING
>         ca-error: Invalid cookie: ''
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=CA Subsystem,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:43 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "subsystemCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190115':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=Certificate Authority,O=CAMHRES.CA
>         expires: 2036-01-07 14:36:42 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "caSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190116':
>         status: MONITORING
>         ca-error: Invalid cookie: ''
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/http
> d/alias',nickname='ipaCert',token='NSS Certificate
> DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/http
> d/alias',nickname='ipaCert',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=IPA RA,O=CAMHRES.CA
>         expires: 2017-12-27 14:37:02 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>         track: yes
>         auto-renew: yes
> Request ID '20170201190117':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-11-19 19:38:26 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "Server-Cert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190118':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/dirs
> rv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate
> DB',pinfile='/etc/dirsrv/slapd-CAMHRES-CA/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/dirs
> rv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-12-11 19:38:29 UTC
>         principal name: ldap/rprshipav01.camhres...@camhres.ca
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
> CAMHRES-CA
>         track: yes
>         auto-renew: yes
> Request ID '20170201190119':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/http
> d/alias',nickname='Server-Cert',token='NSS Certificate
> DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/http
> d/alias',nickname='Server-Cert',token='NSS Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-12-11 19:38:38 UTC
>         principal name: HTTP/rprshipav01.camhres...@camhres.ca
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>         track: yes
>         auto-renew: yes
> -----
>
> After resubmitting:
> ipa-getcert resubmit -i 20170201190112
> ipa-getcert resubmit -i 20170201190113
> ipa-getcert resubmit -i 20170201190114
> ipa-getcert resubmit -i 20170201190116
>
> getcert list shows this, note status: CA_WORKING:
> -----
> Number of certificates and requests being tracked: 8.
> Request ID '20170201190112':
>         status: CA_WORKING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=CA Audit,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:44 UTC
>         key usage: digitalSignature,nonRepudiation
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "auditSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190113':
>         status: CA_WORKING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=OCSP Subsystem,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:43 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         eku: id-kp-OCSPSigning
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "ocspSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190114':
>         status: CA_WORKING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=CA Subsystem,O=CAMHRES.CA
>         expires: 2017-12-27 14:36:43 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "subsystemCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190115':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=Certificate Authority,O=CAMHRES.CA
>         expires: 2036-01-07 14:36:42 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "caSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190116':
>         status: CA_WORKING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/http
> d/alias',nickname='ipaCert',token='NSS Certificate
> DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/http
> d/alias',nickname='ipaCert',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=IPA RA,O=CAMHRES.CA
>         expires: 2017-12-27 14:37:02 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>         track: yes
>         auto-renew: yes
> Request ID '20170201190117':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS
> Certificate DB',pin set
>         certificate: type=NSSDB,location='/etc/pki/
> pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS
> Certificate DB'
>         CA: dogtag-ipa-renew-agent
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-11-19 19:38:26 UTC
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "Server-Cert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20170201190118':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/dirs
> rv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate
> DB',pinfile='/etc/dirsrv/slapd-CAMHRES-CA/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/dirs
> rv/slapd-CAMHRES-CA',nickname='Server-Cert',token='NSS Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-12-11 19:38:29 UTC
>         principal name: ldap/rprshipav01.camhres...@camhres.ca
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
> CAMHRES-CA
>         track: yes
>         auto-renew: yes
> Request ID '20170201190119':
>         status: MONITORING
>         stuck: no
>         key pair storage: type=NSSDB,location='/etc/http
> d/alias',nickname='Server-Cert',token='NSS Certificate
> DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate: type=NSSDB,location='/etc/http
> d/alias',nickname='Server-Cert',token='NSS Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=CAMHRES.CA
>         subject: CN=rprshipav01.camhres.ca,O=CAMHRES.CA
>         expires: 2019-12-11 19:38:38 UTC
>         principal name: HTTP/rprshipav01.camhres...@camhres.ca
>         key usage: digitalSignature,nonRepudiatio
> n,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>         track: yes
>         auto-renew: yes
> -----
>
> Nothing happens from now on and /var/log/ipa/renew.log does not log new
> message after these:
> -----
> 2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG
>  Initializing principal host/rprshipav01.camhres...@camhres.ca using
> keytab /etc/krb5.keytab
> 2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   using
> ccache /var/run/certmonger/tmp-1aYw7c/ccache
> 2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   Attempt
> 1/1: success
> 2017-12-23T05:55:52Z    5538    MainThread      ipa     DEBUG   Loading
> StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
> 2017-12-23T05:55:52Z    5538    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Created connection
> context.ldap2_80840016
> 2017-12-23T05:55:52Z    5538    MainThread
> ipa.ipapython.ipaldap.SchemaCache       DEBUG   retrieving schema for
> SchemaCache url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
> conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x41b2170>
> 2017-12-23T05:55:52Z    5538    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Destroyed connection
> context.ldap2_80840016
> 2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG
>  Initializing principal host/rprshipav01.camhres...@camhres.ca using
> keytab /etc/krb5.keytab
> 2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   using
> ccache /var/run/certmonger/tmp-VDJjQv/ccache
> 2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   Attempt
> 1/1: success
> 2017-12-23T05:56:02Z    5543    MainThread      ipa     DEBUG   Loading
> StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
> 2017-12-23T05:56:03Z    5543    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Created connection
> context.ldap2_77880784
> 2017-12-23T05:56:03Z    5543    MainThread
> ipa.ipapython.ipaldap.SchemaCache       DEBUG   retrieving schema for
> SchemaCache url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
> conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4a46e60>
> 2017-12-23T05:56:03Z    5543    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Destroyed connection
> context.ldap2_77880784
> 2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG
>  Initializing principal host/rprshipav01.camhres...@camhres.ca using
> keytab /etc/krb5.keytab
> 2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   using
> ccache /var/run/certmonger/tmp-BQMLXO/ccache
> 2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   Attempt
> 1/1: success
> 2017-12-23T05:56:12Z    5548    MainThread      ipa     DEBUG   Loading
> StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
> 2017-12-23T05:56:12Z    5548    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Created connection
> context.ldap2_82537872
> 2017-12-23T05:56:12Z    5548    MainThread
> ipa.ipapython.ipaldap.SchemaCache       DEBUG   retrieving schema for
> SchemaCache url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
> conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4eba710>
> 2017-12-23T05:56:13Z    5548    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Destroyed connection
> context.ldap2_82537872
> 2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG
>  Initializing principal host/rprshipav01.camhres...@camhres.ca using
> keytab /etc/krb5.keytab
> 2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   using
> ccache /var/run/certmonger/tmp-zvyYAy/ccache
> 2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   Attempt
> 1/1: success
> 2017-12-23T05:56:22Z    5549    MainThread      ipa     DEBUG   Loading
> StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
> 2017-12-23T05:56:22Z    5549    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Created connection
> context.ldap2_104689040
> 2017-12-23T05:56:22Z    5549    MainThread
> ipa.ipapython.ipaldap.SchemaCache       DEBUG   retrieving schema for
> SchemaCache url=ldapi://%2fvar%2frun%2fslapd-CAMHRES-CA.socket
> conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x63dbea8>
> 2017-12-23T05:56:23Z    5549    MainThread
> ipa.ipaserver.plugins.ldap2.ldap2       DEBUG   Destroyed connection
> context.ldap2_104689040
> -----
>
> /var/log/pki/pki-tomcat/ca/ selftests.log does nt log any errores:
> -----
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem: Initializing self test plugins:
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin logger parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instances
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instance parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in on-demand order
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in startup order
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem: Self test plugins have been successfully loaded!
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem: Running self test plugins specified to be executed at
> startup:
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1] CAPresence:
> CA is present
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SystemCertsVerification: system certs verification success
> 0.localhost-startStop-1 - [23/Dec/2017:00:02:48 EST] [20] [1]
> SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
> startup!
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem: Initializing self test plugins:
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin logger parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instances
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instance parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in on-demand order
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in startup order
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:25 EST] [20] [1]
> SelfTestSubsystem: Self test plugins have been successfully loaded!
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
> SelfTestSubsystem: Running self test plugins specified to be executed at
> startup:
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1] CAPresence:
> CA is present
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
> SystemCertsVerification: system certs verification success
> 0.localhost-startStop-1 - [23/Dec/2017:00:47:26 EST] [20] [1]
> SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
> startup!
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem: Initializing self test plugins:
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin logger parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instances
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem:  loading all self test plugin instance parameters
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in on-demand order
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem:  loading self test plugins in startup order
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem: Self test plugins have been successfully loaded!
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem: Running self test plugins specified to be executed at
> startup:
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1] CAPresence:
> CA is present
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SystemCertsVerification: system certs verification success
> 0.localhost-startStop-1 - [23/Dec/2017:00:48:20 EST] [20] [1]
> SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
> startup!
> -----
>
> Can someone shed some light on this? I may have missed some logs but can
> provide them if required.
>
> Many thanks,
> Qing
>
>
>
>
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org

Reply via email to