Hi, thanks for the reply.

This was the process.
1. prep
2. test connectivity - works ok
3. install replica (successfully) - no DNS no CA at this point
4. test connectivity - fails.

If i replace step 4 for the following:

4. install DNS (successfully)
5. install CA (fails - with the "invalid 'cn': must be" error)

If we can ignore the step 4 where the comms check fails and concentrate on
step 5 where the CA fails. I am happy to do so.
But in step 5. it is the comms check that the `ipa-ca-install` command runs
that also fails as far as i can see (no expert here myself, though my
company thinks so LOL)

Successful DNS install logs http://sprunge.us/7WCtpW

Failed CA install logs  http://sprunge.us/hTVLzL

[root@ipa011 ~]# ipa-ca-install
Directory Manager (existing master) password:

Run connection check to master

Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.

Connection check failed!
See /var/log/ipareplica-conncheck.log for more information.
If the check results are not valid it can be skipped with --skip-conncheck
parameter.



thanks,
Nick

On Thu, 25 May 2023 at 08:18, Florence Blanc-Renaud <[email protected]> wrote:

> Hi,
>
> On Wed, May 24, 2023 at 3:29 PM Nicholas Cross <[email protected]>
> wrote:
>
>> Hi Flo (and other helpful people on this list),
>>
>> After fixing the SID/PAC issue, i am back to looking as to why the
>> ipa-replica-conncheck fails when installing the CA to a (working) replica.
>>
>> I ran your suggested commands and they look fine now.
>>
>> [root@ipa011 ~]# kdestroy
>> kdestroy: No credentials cache found while destroying cache
>>
>> [root@ipa011 ~]# kinit -V -kt /etc/krb5.keytab host/
>> [email protected]
>> Using default cache: 0
>> Using principal: host/[email protected]
>> Using keytab: /etc/krb5.keytab
>> Authenticated to Kerberos v5
>>
>> [root@ipa011 ~]# kvno HTTP/[email protected]
>> HTTP/[email protected]: kvno = 1
>>
>> I can run the following BEFORE i install the replica and it works 100%,
>> it is part of our pre-reqs in our docs to make sure comms work.
>>
>> ipa-replica-conncheck --master=ipa008.ad.companyx.fm --auto-master-check
>> --realm=AD.companyx.FM --principal=nicholas.cross
>>
>> After i install the replica with ipa-replica-install. (no DNS, no CA)
>> then running the above ipa-replica-conncheck command fails and we see the
>> errors as described.
>>
>
> ipa-replica-conncheck is intended to be run *before* replica installation,
> as stated in the man page:
>        ipa-replica-conncheck - Check a replica-master network connection
> before installation
>
> The reason is that it opens server sockets listening on the tested ports,
> for the master to try to reach the replica. If the replica is already
> installed, the ports are already in use by the ldap server, the apache web
> server etc...
>
> I understand that you tried to run ipa-replica-conncheck to ensure that
> ipa-dns-install or ipa-ca-install won't hit any issue. Did you actually try
> to install the DNS service and the CA service on the replica? If you see
> errors in those steps we can help troubleshoot, based on the produced logs,
> but ipa-replica-conncheck won't be of any use here.
>
> flo
>
>>
>> Some logs:
>> 1. before ipa-replica-install - conn check works.
>> http://sprunge.us/4yrInD
>> 2. after successful ipa-replica-install - but conn check fails
>> http://sprunge.us/gvqEle
>>
>> new replica versions
>> [root@ipa011 ~]# rpm -qa | grep ipa | sort
>> almalinux-logos-ipa-90.5.1-1.1.el9.noarch
>> ipa-client-4.10.1-6.el9.x86_64
>> ipa-client-common-4.10.1-6.el9.noarch
>> ipa-common-4.10.1-6.el9.noarch
>> ipa-healthcheck-0.12-1.el9.noarch
>> ipa-healthcheck-core-0.12-1.el9.noarch
>> ipa-selinux-4.9.8-7.el9_0.noarch
>> ipa-server-4.10.1-6.el9.x86_64
>> ipa-server-common-4.10.1-6.el9.noarch
>> ipa-server-dns-4.10.1-6.el9.noarch
>> libipa_hbac-2.8.2-2.el9.x86_64
>> python3-ipaclient-4.10.1-6.el9.noarch
>> python3-ipalib-4.10.1-6.el9.noarch
>> python3-ipaserver-4.10.1-6.el9.noarch
>> python3-libipa_hbac-2.8.2-2.el9.x86_64
>> sssd-ipa-2.8.2-2.el9.x86_64
>>
>> current master versions
>> [nicholas.cross@ipa008 ~]$ rpm -qa | grep ipa | sort
>> almalinux-logos-ipa-90.5.1-1.1.el9.noarch
>> ipa-client-4.10.0-8.el9_1.x86_64
>> ipa-client-common-4.10.0-8.el9_1.noarch
>> ipa-common-4.10.0-8.el9_1.noarch
>> ipa-healthcheck-0.9-9.el9.noarch
>> ipa-healthcheck-core-0.9-9.el9.noarch
>> ipa-selinux-4.9.8-7.el9_0.noarch
>> ipa-server-4.10.0-8.el9_1.x86_64
>> ipa-server-common-4.10.0-8.el9_1.noarch
>> ipa-server-dns-4.10.0-8.el9_1.noarch
>> libipa_hbac-2.7.3-4.el9_1.3.x86_64
>> python3-ipaclient-4.10.0-8.el9_1.noarch
>> python3-ipalib-4.10.0-8.el9_1.noarch
>> python3-ipaserver-4.10.0-8.el9_1.noarch
>> python3-libipa_hbac-2.7.3-4.el9_1.3.x86_64
>> sssd-ipa-2.7.3-4.el9_1.3.x86_64
>>
>> thanks,
>> Nick
>>
>> On Tue, 23 May 2023 at 10:01, Florence Blanc-Renaud <[email protected]>
>> wrote:
>>
>>> Hi,
>>>
>>> the replica-conncheck error means that a call to server_conncheck
>>> reached the wrong server. ipa-replica-conncheck performs multiple checks:
>>> - first from the replica to the existing master (here we seem to be good)
>>> - then from the existing master to the replica, by doing a call to the
>>> XMLRPC api server_conncheck on the master. If the connection from replica
>>> to master fails, another server is tried (in this case, the replica
>>> launches server_conncheck on itself), but there is a security that ensures
>>> the right server is handling the call.
>>> The logs shows that the connection fails because of SASL auth failure:
>>> 2023-05-22T18:14:03Z INFO Connection to
>>> https://ipa010.ad.companyx.fm/ipa/json failed with Insufficient access:
>>> SASL(-1): generic failure: GSSAPI Error: No credentials were supplied, or
>>> the credentials were unavailable or inaccessible (Credential cache is empty)
>>>
>>> Are you able to do kinit -kt /etc/krb5.keytab host/<replicafqdn>@<REALM>
>>> on the replica? And then kvno HTTP/<serverfqdn>@<REALM> ?
>>> flo
>>>
>>> On Tue, May 23, 2023 at 9:55 AM Nicholas Cross via FreeIPA-users <
>>> [email protected]> wrote:
>>>
>>>> That was the /var/log/ipareplica-conncheck.log log file
>>>>
>>>> it does looks like a DNs issue, but im not sure where.
>>>>
>>>> dns resolves the host fine on the host
>>>>
>>>> [root@ipa011 ~]# host ipa011
>>>> ipa011.ad.companyx.fm has address 10.32.225.7
>>>>
>>>> [root@ipa011 ~]# grep ipa /etc/ipa/default.conf
>>>> host = ipa011.ad.companyx.fm
>>>> xmlrpc_uri = https://ipa011.ad.companyx.fm/ipa/xml
>>>> ca_host = ipa010.ad.companyx.fm
>>>>
>>>> it's odd as i run the connection check before the start of the install,
>>>> to check ports and routes.   it works fine.
>>>> replica install works.
>>>> dns install works.
>>>> just the ca installer comes back with this error.
>>>>
>>>> As an additional test i added the dns record for this host into IPA
>>>> before the install.  Normally we don't need to, but just as a test, but it
>>>> made no difference.
>>>>
>>>>
>>>> We do have new DNS forwarders on the network - these are in front of
>>>> the IPA servers.   They are there just take the load from the k8s clusters
>>>> away from IPA DNS.
>>>> Would the CA install break if the DNS lookups are "proxied" by the DNS
>>>> forwarders?
>>>> All DNS tests i can think of work via the forwarders.  The IPA clients
>>>> (100s) are all fine with them.
>>>>
>>>> I will update the client to ignore the forwarders, but if you can think
>>>> of anything else to try?
>>>>
>>>> thanks, Nick
>>>> _______________________________________________
>>>> FreeIPA-users mailing list -- [email protected]
>>>> To unsubscribe send an email to
>>>> [email protected]
>>>> Fedora Code of Conduct:
>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> List Archives:
>>>> https://lists.fedorahosted.org/archives/list/[email protected]
>>>> Do not reply to spam, report it:
>>>> https://pagure.io/fedora-infrastructure/new_issue
>>>>
>>>
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to