Duncan Mortimer via FreeIPA-users wrote:
> Hi,
>
> We have a three node Centos 8 IPA domain which we upgraded from Centos 8.3 to
> 8.4 (IPA version 4.9.2) yesterday. This appeared to succeed without issue,
> with clients continuing to operate as expected. To give us confidence that
> all was well we ran ipa-healthcheck on each node post upgrade and this found
> no issues on our two client facing servers ipa0 and ipa1 but on the third
> machine, ipa2, which is configured as a hidden replica (and is used to take
> disaster recovery backups) we received the following error:
>
> [
> {
> "source": "ipahealthcheck.ipa.trust",
> "check": "IPATrustControllerServiceCheck",
> "result": "ERROR",
> "uuid": "f5d524a3-43c3-4320-92cb-c984727243d9",
> "when": "20210624085009Z",
> "duration": "0.000512",
> "kw": {
> "key": "ADTRUST",
> "msg": "{key} service is not enabled"
> }
> }
> ]
>
> We have Samba services setup for Centos based SMB file sharing - there is no
> Active Directory install on our network.
>
> Is this error a concern or is it a consequence of being a hidden replica. If
> it is a problem, how might we go about fixing the issue? As a first step I've
> tried re-running ipa-adtrust and this didn't seem to need to make any changes:
>
>
> The log file for this installation can be found in
> /var/log/ipaserver-adtrust-install.log
> ==============================================================================
> This program will setup components needed to establish trust to AD domains for
> the IPA Server.
>
> This includes:
> * Configure Samba
> * Add trust related objects to IPA LDAP server
>
> To accept the default shown in brackets, press the Enter key.
>
> Configuring cross-realm trusts for IPA server requires password for user
> 'admin'.
> This user is a regular system account used for IPA server administration.
>
> admin password:
>
> IPA generated smb.conf detected.
> Overwrite smb.conf? [no]: yes
>
> The following operations may take some minutes to complete.
> Please wait until the prompt is returned.
>
> Configuring CIFS
> [1/24]: validate server hostname
> [2/24]: stopping smbd
> [3/24]: creating samba domain object
> Samba domain object already exists
> [4/24]: retrieve local idmap range
> [5/24]: writing samba config file
> [6/24]: creating samba config registry
> [7/24]: adding cifs Kerberos principal
> [8/24]: adding cifs and host Kerberos principals to the adtrust agents group
> [9/24]: check for cifs services defined on other replicas
> [10/24]: adding cifs principal to S4U2Proxy targets
> cifs principal already targeted, nothing to do.
> [11/24]: adding admin(group) SIDs
> Admin SID already set, nothing to do
> Admin group SID already set, nothing to do
> [12/24]: adding RID bases
> RID bases already set, nothing to do
> [13/24]: updating Kerberos config
> 'dns_lookup_kdc' already set to 'true', nothing to do.
> [14/24]: activating CLDAP plugin
> CLDAP plugin already configured, nothing to do
> [15/24]: activating sidgen task
> Sidgen task plugin already configured, nothing to do
> [16/24]: map BUILTIN\Guests to nobody group
> [17/24]: configuring smbd to start on boot
> [18/24]: enabling trusted domains support for older clients via Schema
> Compatibility plugin
> [19/24]: restarting Directory Server to take MS PAC and LDAP plugins
> changes into account
> [20/24]: adding fallback group
> Fallback group already set, nothing to do
> [21/24]: adding Default Trust View
> Default Trust View already exists.
> [22/24]: setting SELinux booleans
> [23/24]: starting CIFS services
> [24/24]: restarting smbd
> Done configuring CIFS.
>
> =============================================================================
> Setup complete
>
> You must make sure these network ports are open:
> TCP Ports:
> * 135: epmap
> * 138: netbios-dgm
> * 139: netbios-ssn
> * 445: microsoft-ds
> * 1024..1300: epmap listener range
> * 3268: msft-gc
> UDP Ports:
> * 138: netbios-dgm
> * 139: netbios-ssn
> * 389: (C)LDAP
> * 445: microsoft-ds
>
> See the ipa-adtrust-install(1) man page for more details
>
> =============================================================================
>
> But there is no change in ipahealthcheck output.
This particular check is only run on trust controllers, those machines
with the server role of AD trust controller. (ipa server-role-show
<hostname> 'AD trust controller')
It makes sure that the ADTRUST service is marked as enabled, so that the
services will be started by ipactl (smb).
You can see it with:
kinit admin
ldapsearch -Y GSSAPI -b
cn=ADTRUST,cn=`hostname`,cn=masters,cn=ipa,cn=etc,dc=example,dc=test
So since it's a trust server and doesn't have ADTRUST enabled it means
that ipactl won't manage smb.
Now given your use case it's possible this is a false positive.
Alexander, what do you think?
rob
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam on the list, report it:
https://pagure.io/fedora-infrastructure