OK, I tried your suggestion and got: [erik@Erik-PC ~]$ pgrep -lf bacula-dir 4226 bacula-dir
[erik@Erik-PC ~]$ netstat -an |grep LISTEN|grep 910 tcp 0 0 0.0.0.0:9102 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:9103 0.0.0.0:* LISTEN I suppose this is correct. Regarding tcpdump I have no idea how to use it. I have never had the need to use this tool before so I have no result from it. systemctl status for mariadb.service, bacula-dir.service, bacula-fd.service and bacula-sd.service show all services running correctly. Oddly my old desktop which is at the same level as my laptop is running the same software and does indeed do backups flawlessly. Diagnosing bacula has become a nightmare :-( -- Erik P. Olsen - Copenhagen, Denmark Fedora 30/64 bit Linux xfce Claws-Mail POP3 Gramps 5.1.1 Bacula 9.4.4 On 2019-12-05 at 14:25:23 Pierre Bernhardt wrote: > Am 05.12.19 um 13:59 schrieb Erik P. Olsen: > > Yes, ports 9101-9103 are all open. > > Do you have root access like with sudo? > Check on director server: > > Check that director is really running: > > pgrep -lf bacula-dir > 8473 bacula-dir > > If running is should be opened 9101 > which you can check with netstat: > > netstat -an |grep LISTEN|grep 910 > > You can try with tcpdump that a communication > is try to established: > > sudo tcpdump -ni <eth0 etc> port 9101 > > There should be something like this shown if you are starting a bconsole > from another machine: > > sudo tcpdump -ni eth0 port 9101 > tcpdump: verbose output suppressed, use -v or -vv for full protocol decode > listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes > root@backup:/media# tcpdump -ni eth0 port 9101 > tcpdump: verbose output suppressed, use -v or -vv for full protocol decode > listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes > 14:20:15.645897 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [S], seq > 157316563, > win 29200, options [mss 1460,sackOK,TS val 362236160 ecr 0,nop,wscale 7], > length 0 > 14:20:15.645931 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [S.], seq > 1935232238, ack 157316564, win 28960, options [mss 1460,sackOK,TS val > 1402703476 ecr > 362236160,nop,wscale 7], length 0 14:20:15.646116 IP 192.168.2.202.43984 > > 192.168.2.254.9101: Flags [.], ack 1, win 229, options [nop,nop,TS val > 362236160 ecr > 1402703476], length 0 14:20:15.646547 IP 192.168.2.202.43984 > > 192.168.2.254.9101: > Flags [P.], seq 1:35, ack 1, win 229, options [nop,nop,TS val 362236160 ecr > 1402703476], length 34 14:20:15.646598 IP 192.168.2.254.9101 > > 192.168.2.202.43984: > Flags [.], ack 35, win 227, options [nop,nop,TS val 1402703477 ecr > 362236160], length 0 > 14:20:15.646639 IP 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq > 1:60, ack > 35, win 227, options [nop,nop,TS val 1402703477 ecr 362236160], length 59 > 14:20:15.647063 IP 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack > 60, win > 229, options [nop,nop,TS val 362236160 ecr 1402703477], length 0 > 14:20:15.647069 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 35:62, ack 60, win > 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 27 14:20:15.647114 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 60:77, ack 62, win > 227, > options [nop,nop,TS val 1402703477 ecr 362236160], length 17 14:20:15.647526 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 62:119, ack 77, win > 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 57 14:20:15.647567 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 77:104, ack 119, > win 227, > options [nop,nop,TS val 1402703477 ecr 362236160], length 27 14:20:15.647782 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 119:136, ack 104, > win 229, > options [nop,nop,TS val 362236160 ecr 1402703477], length 17 14:20:15.690505 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 136, win 227, options > [nop,nop,TS val 1402703488 ecr 362236160], length 0 14:20:15.690896 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 136:653, ack 104, > win 229, > options [nop,nop,TS val 362236171 ecr 1402703488], length 517 14:20:15.690907 > IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [.], ack 653, win 235, options > [nop,nop,TS val 1402703488 ecr 362236171], length 0 14:20:15.691066 IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 104:4200, ack 653, > win 235, > options [nop,nop,TS val 1402703488 ecr 362236171], length 4096 > 14:20:15.691947 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [.], ack 4200, win 293, > options > [nop,nop,TS val 362236171 ecr 1402703488], length 0 14:20:15.691955 IP > 192.168.2.254.9101 > 192.168.2.202.43984: Flags [P.], seq 4200:4606, ack 653, > win 235, > options [nop,nop,TS val 1402703488 ecr 362236171], length 406 14:20:15.692868 > IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [P.], seq 653:660, ack 4606, > win 315, > options [nop,nop,TS val 362236171 ecr 1402703488], length 7 14:20:15.693863 IP > 192.168.2.202.43984 > 192.168.2.254.9101: Flags [R.], seq 660, ack 4606, win > 315, > options [nop,nop,TS val 362236172 ecr 1402703488], length 0 > > The first line is the connection request from bconsole, the second line the > answer from the director. > Maybe you will see other communication, which is not relevant, so it should > be shown exactly at time the bconsole has been executed. > > Cheers, > > > > > _______________________________________________ > Bacula-users mailing list > Bacula-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bacula-users _______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users