> Finn Fysj via FreeIPA-users wrote: > > I think there is some misunderstanding about the purpose of backup and > restore. It is for catastrophic recovery only. > > This is why it wants all roles to be included because if you lose your > cluster and the only backup you have is lacking a role, say the CA, that > is less than awesome. > > A restore will disable all replication agreements. They can be > re-enabled but a restore by its very nature is going back in time which > is going to confuse the heck out of replication. At best any other > existing servers will need to be re-initialized. Otherwise they need to > be re-installed. Remember: catastrophic. > > It is not designed for recovering a single entry that was accidentally > deleted, or an undesired edit. If periodic backups are done the data is > available in the stored LDIFs but it is an exercise for the user to > restore in that case. > > rob
I appreciate so much for your response. I've experienced issues where I tried to uninstall the replica server and trying to re-installing: roles: - role: freeipa.ansible_freeipa.ipareplica ipaserver_ignore_topology_disconnect: true ipaserver_ignore_last_of_role: true state: absent Then I try to install it again: - role: freeipa.ansible_freeipa.ipareplica ipaclient_force_join: true ipareplica_install_packages: true ipareplica_setup_firewalld: false ipareplica_setup_dns: false ipareplica_servers: master1.example.com ipareplicas: ["{{ ansible_play_hosts_all | join(', ') }}"] ipareplica_domain: "example.com" ipaadmin_principal: "admin" ipaadmin_password: "Secret1213" ipadm_password: "my_password" I run into issues such as: "module_stdout": "Traceback (most recent call last):\r\n File \"/usr/lib/python3.9/site-packages/ipalib/krb_utils.py\", line 182, in get_principal\r\n creds = get_credentials(ccache_name=ccache_name)\r\n File \"/usr/lib/python3.9/site-packages/ipalib/krb_utils.py\", line 165, in get_credentials\r\n return gssapi.Credentials(usage=\"initiate\", name=name, store=store)\r\n File \"/usr/lib64/python3.9/site-packages/gssapi/creds.py\", line 63, in __new__\r\n res = cls.acquire(name, lifetime, mechs, usage,\r\n File \"/usr/lib64/python3.9/site-packages/gssapi/creds.py\", line 136, in acquire\r\n res = rcreds.acquire_cred(name, lifetime,\r\n File \"gssapi/raw/creds.pyx\", line 161, in gssapi.raw.creds.acquire_cred\r\ngssapi.raw.exceptions.MissingCredentialsError: Major (458752): No credentials were supplied, or the credentials were unavailable or inaccessible, Minor (2529639053): No Kerberos credentials available (default cache: )\r\n\r\nDuring handling of the above excepti on, another exception occurred:\r\n\r\nTraceback (most recent call last):\r\n File \"/home/ansible/.ansible/tmp/ansible-tmp-1706882379.2962139-14800-182642519268134/AnsiballZ_ipareplica_add_to_ipaservers.py\", line 107, in <module>\r\n _ansiballz_main()\r\n File \"/home/ansible/.ansible/tmp/ansible-tmp-1706882379.2962139-14800-182642519268134/AnsiballZ_ipareplica_add_to_ipaservers.py\", line 99, in _ansiballz_main\r\n invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS)\r\n File \"/home/ansible/.ansible/tmp/ansible-tmp-1706882379.2962139-14800-182642519268134/AnsiballZ_ipareplica_add_to_ipaservers.py\", line 47, in invoke_module\r\n runpy.run_module(mod_name='ansible_collections.freeipa.ansible_freeipa.plugins.modules.ipareplica_add_to_ipaservers', init_globals=dict(_module_fqn='ansible_collections.freeipa.ansible_freeipa.plugins.modules.ipareplica_add_to_ipaservers', _modlib_path=modlib_path),\r\n File \"/usr/lib64/python3.9/runpy.py\", line 225, in run_module\r\n return _run_module_code(code, init_globals, run_name, mod_spec)\r\n File \"/usr/lib64/python3.9/runpy.py\", line 97, in _run_module_code\r\n _run_code(code, mod_globals, init_globals,\r\n File \"/usr/lib64/python3.9/runpy.py\", line 87, in _run_code\r\n exec(code, run_globals)\r\n File \"/tmp/ansible_freeipa.ansible_freeipa.ipareplica_add_to_ipaservers_payload_gnneon23/ansible_freeipa.ansible_freeipa.ipareplica_add_to_ipaservers_payload.zip/ansible_collections/freeipa/ansible_freeipa/plugins/modules/ipareplica_add_to_ipaservers.py\", line 156, in <module>\r\n File \"/tmp/ansible_freeipa.ansible_freeipa.ipareplica_add_to_ipaservers_payload_gnneon23/ansible_freeipa.ansible_freeipa.ipareplica_add_to_ipaservers_payload.zip/ansible_collections/freeipa/ansible_freeipa/plugins/modules/ipareplica_add_to_ipaservers.py\", line 139, in main\r\n File \"/usr/lib/python3.9/site-packages/ipalib/backend.py\", line 69, in connect\r\n conn = self.create_connection(*args, **kw)\r\n Fil e \"/usr/lib/python3.9/site-packages/ipaserver/plugins/ldap2.py\", line 203, in create_connection\r\n principal = krb_utils.get_principal(ccache_name=ccache)\r\n File \"/usr/lib/python3.9/site-packages/ipalib/krb_utils.py\", line 185, in get_principal\r\n raise errors.CCacheError(message=str(e))\r\nipalib.errors.CCacheError: Major (458752): No credentials were supplied, or the credentials were unavailable or inaccessible, Minor (2529639053): No Kerberos credentials available (default cache: )\r\n", -- _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue