> You don't say what distribution or release you are running.

Apologies—I meant to add that and then got distracted. They are both CentoOS 
Stream 9 running 4.9.8 (master) and 4.10.0 (replica). I was actually surprised 
they aren't the same version—I'm not sure how that happened TBH.

> I'd
> recommend installing {free}ipa-healthcheck and seeing if that detects
> any issues.

Thank you! I didn't know it existed—that's very useful.

On the master it only identifies that the replica is not functioning correctly.
On the replica, the first thing it identified was the ldap / NSS DB mismatch on 
'subsystemCert cert-pki-ca'—that I fixed with the instruction on 
https://floblanc.wordpress.com/2017/09/11/troubleshooting-freeipa-pki-tomcatd-fails-to-start/
 and pki-tomcatd now starts.  Although oddly ipa-healthcheck is still showing 
it as a error. And it seems other renewed certificates were not updated in the 
replica's ldap either:

[
  {
    "source": "ipahealthcheck.dogtag.ca",
    "check": "DogtagCertsConnectivityCheck",
    "result": "ERROR",
    "uuid": "b64ca4ed-889b-4707-88f8-f6231adaaecb",
    "when": "20241019190638Z",
    "duration": "0.095653",
    "kw": {
      "key": "cert_show_ra",
      "error": "Certificate operation cannot be completed: Request failed with 
status 404: Non-2xx response from CA REST API: 404. Certificate ID 0x13 not 
found (404)",
      "serial": "19",
      "msg": "Serial number not found: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPADogtagCertsMatchCheck",
    "result": "ERROR",
    "uuid": "63e59ed6-42f8-4c7c-b884-1ff18aa879db",
    "when": "20241019190644Z",
    "duration": "0.654190",
    "kw": {
      "key": "ocspSigningCert cert-pki-ca",
      "nickname": "ocspSigningCert cert-pki-ca",
      "dbdir": "/etc/pki/pki-tomcat/alias",
      "msg": "{nickname} certificate in NSS DB {dbdir} does not match entry in 
LDAP"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPADogtagCertsMatchCheck",
    "result": "ERROR",
    "uuid": "f09f4527-a9fa-4b28-8433-7c802cf6e6b7",
    "when": "20241019190644Z",
    "duration": "0.725190",
    "kw": {
      "key": "subsystemCert cert-pki-ca",
      "nickname": "subsystemCert cert-pki-ca",
      "dbdir": "/etc/pki/pki-tomcat/alias",
      "msg": "{nickname} certificate in NSS DB {dbdir} does not match entry in 
LDAP"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPADogtagCertsMatchCheck",
    "result": "ERROR",
    "uuid": "32caa7a6-1eec-469b-9ba8-9e75a76f0a7f",
    "when": "20241019190644Z",
    "duration": "0.792584",
    "kw": {
      "key": "auditSigningCert cert-pki-ca",
      "nickname": "auditSigningCert cert-pki-ca",
      "dbdir": "/etc/pki/pki-tomcat/alias",
      "msg": "{nickname} certificate in NSS DB {dbdir} does not match entry in 
LDAP"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPARAAgent",
    "result": "ERROR",
    "uuid": "7f7b4a56-6c93-4b11-90f1-86a658c6259a",
    "when": "20241019190645Z",
    "duration": "0.021523",
    "kw": {
      "key": "description_mismatch",
      "expected": "2;19;CN=Certificate Authority,O=SIMPLYWS.COM;CN=IPA 
RA,O=SIMPLYWS.COM",
      "got": "2;7;CN=Certificate Authority,O=SIMPLYWS.COM;CN=IPA 
RA,O=SIMPLYWS.COM",
      "msg": "RA agent description does not match. Found {got} in LDAP and 
expected {expected}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "22545043-3a4d-43d7-af30-c6da0432ce8b",
    "when": "20241019190645Z",
    "duration": "0.120478",
    "kw": {
      "key": "20221129200204",
      "serial": 19,
      "error": "Certificate operation cannot be completed: Request failed with 
status 404: Non-2xx response from CA REST API: 404. Certificate ID 0x13 not 
found (404)",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "9100d431-8156-4951-99f2-04bae21f8044",
    "when": "20241019190645Z",
    "duration": "0.294161",
    "kw": {
      "key": "20221129200205",
      "serial": 17,
      "error": "Certificate operation cannot be completed: Request failed with 
status 404: Non-2xx response from CA REST API: 404. Certificate ID 0x11 not 
found (404)",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "9f30d1ea-03f5-44b5-abf8-7e369df23fb5",
    "when": "20241019190646Z",
    "duration": "0.468931",
    "kw": {
      "key": "20221129200209",
      "serial": 15,
      "error": "Certificate operation cannot be completed: Request failed with 
status 404: Non-2xx response from CA REST API: 404. Certificate ID 0xf not 
found (404)",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "05d6e5cf-25e4-47c3-ac54-142e8f0a79cd",
    "when": "20241019190646Z",
    "duration": "0.644094",
    "kw": {
      "key": "20221129200212",
      "serial": 16,
      "error": "Certificate operation cannot be completed: Request failed with 
status 404: Non-2xx response from CA REST API: 404. Certificate ID 0x10 not 
found (404)",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "f73d24c3-ecd2-45bb-81a8-95430d31ebd4",
    "when": "20241019190646Z",
    "duration": "1.138467",
    "kw": {
      "key": "20221129200213",
      "serial": 1,
      "error": "Failed to authenticate to CA REST API",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "a7d3a152-ce3a-4240-8e70-c959a11a710a",
    "when": "20241019190646Z",
    "duration": "1.367480",
    "kw": {
      "key": "20221129200214",
      "serial": 13,
      "error": "Failed to authenticate to CA REST API",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "7fb7d331-667b-4010-8678-a824bbc4bd02",
    "when": "20241019190647Z",
    "duration": "1.548316",
    "kw": {
      "key": "20221129195719",
      "serial": 12,
      "error": "Failed to authenticate to CA REST API",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "3728dfb8-0e7b-4ff7-b1fe-bc09ba6f58cf",
    "when": "20241019190647Z",
    "duration": "1.797597",
    "kw": {
      "key": "20221129195645",
      "serial": 11,
      "error": "Failed to authenticate to CA REST API",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "9b9afa55-06f6-4794-a6e8-7abb1c55b8ca",
    "when": "20241019190647Z",
    "duration": "1.981098",
    "kw": {
      "key": "20221129200256",
      "serial": 14,
      "error": "Failed to authenticate to CA REST API",
      "msg": "Request for certificate serial number {serial} in request {key} 
failed: {error}"
    }
  }
]

All of which I guess points to a replication problem? Although changes that 
I've made to users have replicated fine, including ones after the certificate 
renewal and ipa-replica-conncheck doesn't report any problems...

Would 'ipa-replica-manage re-initialize' be a reasonable approach to resolving 
those missing entries?

Thank you for your help—it's much appreciated.
-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to