Hi Florence,I've gotten so spoiled with xterm scrollback buffering that I has to run it twice since I forgot to |tee| the console output. The VM running FreeIPA is the 1 host I didn't configure to buffer credentials for a week.
Here's the output of |ipactl restart --ignore-service-failures:| IPA version error: data needs to be upgraded (expected version '4.12.2-13.fc42', current version '4.12.2-8.fc41') Automatically running upgrade, for details see /var/log/ipaupgrade.log Be patient, this may take a few minutes. Automatic upgrade failed: Update complete Upgrading the configuration of the IPA services [Verifying that root certificate is published] [Migrate CRL publish directory] CRL tree already moved [Ensuring ephemeralRequest is enabled in KRA] ephemeralRequest is already enabled [Verifying that KDC configuration is using ipa-kdb backend] [Fix DS schema file syntax] Syntax already fixed [Removing RA cert from DS NSS database] RA cert already removed [Enable sidgen and extdom plugins by default] [Updating HTTPD service IPA configuration] [Updating HTTPD service IPA WSGI configuration] [Migrating from mod_nss to mod_ssl] Already migrated to mod_ssl [Moving HTTPD service keytab to gssproxy] [Removing self-signed CA] [Removing Dogtag 9 CA] [Set OpenSSL engine or provider for BIND] [Checking for deprecated KDC configuration files] [Checking for deprecated backups of Samba configuration files] dnssec-validation yes [Add missing CA DNS records] IPA CA DNS records already processed named user config '/etc/named/ipa-ext.conf' already exists named user config '/etc/named/ipa-options-ext.conf' already exists named user config '/etc/named/ipa-logging-ext.conf' already exists [Upgrading CA schema] CA schema update complete [Update certmonger certificate renewal configuration] Certmonger certificate renewal configuration already up-to-date [Enable PKIX certificate path discovery and validation] PKIX already enabled [Authorizing RA Agent to modify profiles] [Authorizing RA Agent to manage lightweight CAs] [Ensuring Lightweight CAs container exists in Dogtag database] [Enabling LWCA monitor] [Adding default OCSP URI configuration] [Disabling cert publishing] [Ensuring CA is using LDAPProfileSubsystem] [Migrating certificate profiles to LDAP] [Ensuring presence of included profiles] [Add default CA ACL] Default CA ACL already added IPA server upgrade failed: Inspect /var/log/ipaupgrade.log and run command ipa-server-upgrade manually. Unexpected error - see /var/log/ipaupgrade.log for details: RemoteRetrieveError: Failed to authenticate to CA REST API The ipa-server-upgrade command failed. See /var/log/ipaupgrade.log for more information See the upgrade log for more details and/or run /usr/sbin/ipa-server-upgrade again Aborting ipactl Stopping ipa-dnskeysyncd Service Stopping ods-enforcerd Service Stopping ipa-ods-exporter Service Stopping ipa-otpd Service Stopping pki-tomcatd Service Stopping ipa-custodia Service Stopping httpd Service Stopping named Service Stopping kadmin Service Stopping krb5kdc Service Stopping Directory ServiceI have the log available that I can email to you if necessary. I don't have time to make it suitable for sending to the list, though, as it's 49000+ lines. What are the next steps to get this back online.
Best regards, On 4/18/25 4:50 AM, Florence Blanc-Renaud wrote:
Hi,On Thu, Apr 17, 2025 at 11:09 PM Eric Ashley via FreeIPA-users <[email protected]> wrote:Hello, I'm running the following new versions: |Installed packages freeipa-client.x86_64 4.12.2-13.fc42 updates freeipa-client-common.noarch 4.12.2-13.fc42 updates freeipa-common.noarch 4.12.2-13.fc42 updates freeipa-healthcheck.noarch 0.17-6.fc42 fedora freeipa-healthcheck-core.noarch 0.17-6.fc42 fedora freeipa-selinux.noarch 4.12.2-13.fc42 updates freeipa-server.x86_64 4.12.2-13.fc42 updates freeipa-server-common.noarch 4.12.2-13.fc42 updates freeipa-server-dns.noarch 4.12.2-13.fc42 updates libcamera-ipa.x86_64 0.4.0-4.fc42 fedora libipa_hbac.x86_64 2.10.2-3.fc42 fedora python3-ipaclient.noarch 4.12.2-13.fc42 updates|| ||python3-ipalib.noarch 4.12.2-13.fc42 updates| |ipactl status |reports the following: Directory Service: RUNNING krb5kdc Service: STOPPED kadmin Service: STOPPED named Service: STOPPED httpd Service: RUNNING ipa-custodia Service: STOPPED pki-tomcatd Service: RUNNING ipa-otpd Service: STOPPED ipa-ods-exporter Service: STOPPED ods-enforcerd Service: STOPPED ipa-dnskeysyncd Service: RUNNING 5 service(s) are not running can you try ipactl restart --ignore-service-failuresthen check which services failed with ipactl status and report the output here? In your current output the KDC is stopped and any service using kerberos for authentication will fail as a consequence.flo On initial boot, the system started the FreeIPA upgrade, which got through all the certificate checks with no issues, then reports the following errors (with retry): |2025-04-17T18:43:18Z INFO [Ensuring presence of included profiles] 2025-04-17T18:43:18Z DEBUG Discovery: available servers for service 'CA' are phobos.ipa.ab-data.us <http://phobos.ipa.ab-data.us> 2025-04-17T18:43:18Z DEBUG Discovery: using phobos.ipa.ab-data.us <http://phobos.ipa.ab-data.us> for 'CA' service 2025-04-17T18:43:18Z DEBUG request GET https://phobos.ipa.ab-data.us:443/ca/rest/account/login <https://phobos.ipa.ab-data.us:443/ca/rest/account/login> 2025-04-17T18:43:18Z DEBUG request body '' 2025-04-17T18:43:18Z DEBUG response status 404 2025-04-17T18:43:18Z DEBUG response headers Date: Thu, 17 Apr 2025 18:43:18 GMT Server: Apache/2.4.63 (Fedora Linux) OpenSSL/3.2.4 mod_wsgi/5.0.2 Python/3.13 mod_auth_gssapi/1.6.5 Content-Type: text/html;charset=utf-8 Content-Language: en Transfer-Encoding: chunked 2025-04-17T18:43:18Z DEBUG response body (decoded): b'<!doctype html><html lang="en"><head><title>HTTP Status 404 \xe2\x80\x93 Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 \xe2\x80\x93 Not Found</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Message</b> The requested resource [/ca/rest/account/login] is not available</p><p><b>Description</b> The origin server did not find a current representation for the target resource or is not willing to disclose that one exists.</p><hr class="line" /><h3>Apache Tomcat/9.0.98</h3></body></html>' 2025-04-17T18:43:18Z DEBUG Overriding CA port: Failed to authenticate to CA REST API 2025-04-17T18:43:18Z DEBUG Profile 'KDCs_PKINIT_Certs' is already in LDAP; skipping 2025-04-17T18:43:18Z DEBUG Profile 'caIPAserviceCert' is already in LDAP; skipping 2025-04-17T18:43:18Z DEBUG Profile 'acmeIPAServerCert' is already in LDAP; skipping 2025-04-17T18:43:18Z DEBUG Profile 'IECUserRoles' is already in LDAP; skipping 2025-04-17T18:43:18Z INFO [Add default CA ACL] 2025-04-17T18:43:18Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state' 2025-04-17T18:43:18Z INFO Default CA ACL already added 2025-04-17T18:43:18Z DEBUG Loading StateFile from '/var/lib/ipa/sysupgrade/sysupgrade.state' 2025-04-17T18:43:18Z DEBUG Discovery: available servers for service 'CA' are phobos.ipa.ab-data.us <http://phobos.ipa.ab-data.us> 2025-04-17T18:43:18Z DEBUG Discovery: using phobos.ipa.ab-data.us <http://phobos.ipa.ab-data.us> for 'CA' service 2025-04-17T18:43:18Z DEBUG request GET https://phobos.ipa.ab-data.us:8443/ca/rest/account/login 2025-04-17T18:43:18Z DEBUG request body '' 2025-04-17T18:43:18Z DEBUG response status 404 2025-04-17T18:43:18Z DEBUG response headers Content-Type: text/html;charset=utf-8 Content-Language: en Content-Length: 784 Date: Thu, 17 Apr 2025 18:43:18 GMT 2025-04-17T18:43:18Z DEBUG response body (decoded): b'<!doctype html><html lang="en"><head><title>HTTP Status 404 \xe2\x80\x93 Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 \xe2\x80\x93 Not Found</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Message</b> The requested resource [/ca/rest/account/login] is not available</p><p><b>Description</b> The origin server did not find a current representation for the target resource or is not willing to disclose that one exists.</p><hr class="line" /><h3>Apache Tomcat/9.0.98</h3></body></html>' 2025-04-17T18:43:18Z ERROR IPA server upgrade failed: Inspect /var/log/ipaupgrade.log and run command ipa-server-upgrade manually. 2025-04-17T18:43:18Z DEBUG File "/usr/lib/python3.13/site-packages/ipapython/admintool.py", line 219, in execute return_value = self.run() File "/usr/lib/python3.13/site-packages/ipaserver/install/ipa_server_upgrade.py", line 54, in run server.upgrade() ~~~~~~~~~~~~~~^^ File "/usr/lib/python3.13/site-packages/ipaserver/install/server/upgrade.py", line 2097, in upgrade upgrade_configuration() ~~~~~~~~~~~~~~~~~~~~~^^ File "/usr/lib/python3.13/site-packages/ipaserver/install/server/upgrade.py", line 1958, in upgrade_configuration cainstance.repair_profile_caIPAserviceCert() ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^ File "/usr/lib/python3.13/site-packages/ipaserver/install/cainstance.py", line 2166, in repair_profile_caIPAserviceCert with api.Backend.ra_certprofile as profile_api: ^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3.13/site-packages/ipaserver/plugins/dogtag.py", line 610, in __enter__ raise errors.RemoteRetrieveError(reason=_('Failed to authenticate to CA REST API')) 2025-04-17T18:43:18Z DEBUG The ipa-server-upgrade command failed, exception: RemoteRetrieveError: Failed to authenticate to CA REST API 2025-04-17T18:43:18Z ERROR Unexpected error - see /var/log/ipaupgrade.log for details: RemoteRetrieveError: Failed to authenticate to CA REST API 2025-04-17T18:43:18Z ERROR The ipa-server-upgrade command failed. See /var/log/ipaupgrade.log for more information| Tomcat is active, all the certificates are current and in LDAP. I was unable to find anything similar in the archive. How to I go about getting this update to finish? Best regards, Eric-- _______________________________________________FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
binRcw0zcnJIO.bin
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
-- _______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
