Hi, I'm not sure the issue is really on PKI side. On ipa server-del call, IPA should also make sure to call something similar to pki securitydomain-host-del to make sure that the host is removed from PKI security domain.
This was tracked in BZ 1740702 <https://bugzilla.redhat.com/show_bug.cgi?id=1740702> that was closed as Duplicate, but I believe this was a mistake (the other bug 1902173 <https://bugzilla.redhat.com/show_bug.cgi?id=1902173> was about not crashing if KRA unregistration failed). flo On Thu, Jun 3, 2021 at 12:16 PM Kees Bakker via FreeIPA-users < freeipa-users@lists.fedorahosted.org> wrote: > On 01-06-2021 18:01, Rob Crittenden wrote: > > Kees Bakker via FreeIPA-users wrote: > >> On 29-05-2021 10:21, Alexander Bokovoy wrote: > >>> On pe, 28 touko 2021, Kees Bakker via FreeIPA-users wrote: > >>>> On 28-05-2021 19:32, Kees Bakker via FreeIPA-users wrote: > >>>>> On 28-05-2021 17:22, Kees Bakker via FreeIPA-users wrote: > >>>>>> Hi, > >>>>>> > >>>>>> After installing a new replica and running > >>>>>> > >>>>>> /usr/bin/ipa-healthcheck --source > >>>>>> pki.server.healthcheck.clones.connectivity_and_data > >>>>>> > >>>>>> I'm getting this error > >>>>>> > >>>>>> keyctl_search: Required key not available > >>>>>> Enter password for Internal Key Storage Token: > >>>>>> Internal server error HTTPSConnectionPool(host='iparep3.ghs.nl', > >>>>>> port=443): Max retries exceeded with url: > >>>>>> /ca/rest/certs/search?size=3 (Caused by > >>>>>> NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection > >>>>>> object at 0x7fc473262a90>: Failed to establish a new connection: > >>>>>> [Errno 113] No route to host',)) > >>>>>> [ > >>>>>> { > >>>>>> "source": > "pki.server.healthcheck.clones.connectivity_and_data", > >>>>>> "check": "ClonesConnectivyAndDataCheck", > >>>>>> "result": "ERROR", > >>>>>> "uuid": "c2f3ec1d-494b-4f6a-b6e3-0e38108f2005", > >>>>>> "when": "20210528150818Z", > >>>>>> "duration": "30.348789", > >>>>>> "kw": { > >>>>>> "status": "ERROR: pki-tomcat : Internal error testing CA > >>>>>> clone. Host: iparep3.ghs.nl Port: 443" > >>>>>> } > >>>>>> } > >>>>>> ] > >>>>>> > >>>>>> First, it is asking for a password, and I have no clue for what. > I've > >>>>>> tried the admin password and the Directory Manager password. It > >>>>>> makes no difference. > >>>>>> > >>>>>> Second, it tries to connect to a replica that was removed several > >>>>>> months > >>>>>> ago. Both ipa-replica-manage list and ipa-csreplica-manage show the > >>>>>> correct list of masters that we currently have. > >>>>>> > >>>>>> Where does ipa-healthcheck get the information from to query the > >>>>>> removed > >>>>>> replica? > >>>>>> > >>>>>> BTW. Two replica run CentOS 8 Stream, and one runs CentOS 7. The > >>>>>> first two give > >>>>>> this healthcheck error, the centos7 master does not. > >>>>> That last remark should be: on CentOS 7 there was no such check. So, > >>>>> perhaps > >>>>> the error is there too. > >>>>> > >>>>> # /usr/bin/ipa-healthcheck --source > >>>>> pki.server.healthcheck.clones.connectivity_and_data > >>>>> Source 'pki.server.healthcheck.clones.connectivity_and_data' not > found > >>>> The problem seems to be that PKI has its own information about > >>>> masters (and clones). In our PKI configuration there are still two > hosts > >>>> that were deleted from FreeIPA a long time ago. So, the > >>>> ipa-replica-manage del > >>>> command did not remove them from PKI?? > >>> CA replica management is done with 'ipa-csreplica-manage' tool, not > >>> 'ipa-replica-manage'. > >>> > >>> > >> But I did use "ipa-csreplica-manage del" as well. However, I remember > >> that it > >> complained it couldn't remove that host. I was assuming it was already > >> gone. > >> When I list with ipa-csreplica-manage then I don't see the old hosts > >> anymore. > >> > >> So, two things > >> 1) "ipa-csreplica-manage del" somehow failed (it's probably too late to > >> look at logs) > >> 2) how can I still remove the old hosts? > > I'm not sure how to remove hosts from the CA-managed security domain but > > you can show the hosts it knows about with pki securitydomain-show to > > confirm that this is where it is finding the old one. > > > > This check is provided by dogtag and executed within ipa-healthcheck. > > Can you open a ticket on it at https://github.com/dogtagpki/pki/ > > > > rob > > > > https://github.com/dogtagpki/pki/issues/3552 > _______________________________________________ > FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org > To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > Do not reply to spam on the list, report it: > https://pagure.io/fedora-infrastructure >
_______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure