Hi, The pki/httpd logs on the el9 are almost empty during the healthcheck on the el8 system. The pki/httpd logs on the el8 server complain quite a bit during the health check on the el8 system.
I've attached them (just the tail from the logs during the ipa-healthcheck running on the el8 system) Rob Op wo 18 jan. 2023 om 17:39 schreef Rob Crittenden <rcrit...@redhat.com>: > It is trying to read three certs from the CA just to validate that > things are working. Some exception is being thrown during the POST. The > pki and/or httpd logs might contain more info. > > rob > > Rob Verduijn wrote: > > Hi, > > > > I don't see anything strange in the output but thats probably my > ignorance. > > With your extended command the output is now free of certs so I'm > > attaching it. > > > > Rob > > > > > > Op wo 18 jan. 2023 om 15:22 schreef Rob Crittenden <rcrit...@redhat.com > > <mailto:rcrit...@redhat.com>>: > > > > Rob Verduijn wrote: > > > Hello, > > > > > > I ran healthcheck with the debug option.There was a huge amount of > > > output which stopped after the healtherror I mentioned before. > > > > > > Sadly the amount also contained all certificates so I cannot post > > it here. > > > The debug output is quite overwhelming. > > > Could you give some pointers at to what I should be looking for ? > > > > You can narrow the output by adding the cli options --source > > pki.server.healthcheck.clones.connectivity_and_data --check > > ClonesConnectivyAndDataCheck > > > > The error reported by the plugin is an internal error so you're > looking > > for back traces or other suppressed output. > > > > rob > > > > > > > > Rob > > > > > > > > > Op di 17 jan. 2023 om 15:55 schreef Rob Crittenden > > <rcrit...@redhat.com <mailto:rcrit...@redhat.com> > > > <mailto:rcrit...@redhat.com <mailto:rcrit...@redhat.com>>>: > > > > > > Rob Verduijn via FreeIPA-users wrote: > > > > I do have migration in mind, and I already have seen that > doc. > > > > > > > > I double checked the roles, and the only two roles that are > > > enabled are > > > > CA-server and DNS-server. > > > > They are present on both systems. > > > > > > > > However currently I'm 'just' adding an el9 replica and the > > old el8 > > > > master can't seem to reach the ca accourding to the > healthcheck. > > > > > > > > And I don't want to start migrating before the current > > situation has a > > > > good alth status for all the replicas/masters. > > > > > > Can you re-run it with --debug? Some older versions of > > healthcheck had a > > > bug in the debug switch where it got turned off while > > importing external > > > checks so if you don't get much, you've hit that. > > > > > > rob > > > > > > > > > > > > > > > Op di 17 jan. 2023 om 15:37 schreef Francisco Triviño García > > > > <ftriv...@redhat.com <mailto:ftriv...@redhat.com> > > <mailto:ftriv...@redhat.com <mailto:ftriv...@redhat.com>> > > > <mailto:ftriv...@redhat.com <mailto:ftriv...@redhat.com> > > <mailto:ftriv...@redhat.com <mailto:ftriv...@redhat.com>>>>: > > > > > > > > > > > > On 1/17/23 09:33, Rob Verduijn via FreeIPA-users wrote: > > > >> Hello all, > > > >> > > > >> I wanted to migrate my old el8 freeipa server to el9. > > > >> > > > >> So I installed a new system with el9 and configured a > > replica > > > on it. > > > >> > > > >> After this was completed I ran ipa-healthcheck on the > > new el9 > > > >> replica and all was well. > > > >> > > > >> However after this I ran ipa-healthcheck on the old el8 > ipa > > > server > > > >> and I got the following error. > > > >> ipa-healthcheck > > > >> Internal server error 'Link' > > > >> [ > > > >> { > > > >> "source": > > > "pki.server.healthcheck.clones.connectivity_and_data", > > > >> "check": "ClonesConnectivyAndDataCheck", > > > >> "result": "ERROR", > > > >> "uuid": "5aea196e-1693-4c14-93c5-649286c8ef7f", > > > >> "when": "20230117082651Z", > > > >> "duration": "0.402024", > > > >> "kw": { > > > >> "status": "ERROR: pki-tomcat : Internal error > > testing CA > > > >> clone. Host: freeipa01.tjako.thuis Port: 443" > > > >> } > > > >> } > > > >> ] > > > >> > > > >> I double checked the firewall and all ports were open > > on the el9 > > > >> server > > > >> firewall-cmd --list-all > > > >> public (active) > > > >> target: default > > > >> icmp-block-inversion: no > > > >> interfaces: br0 enp1s0 > > > >> sources: > > > >> services: cockpit dhcpv6-client dns freeipa-ldap > > freeipa-ldaps > > > >> http https ntp ssh > > > >> ports: > > > >> protocols: > > > >> forward: yes > > > >> masquerade: no > > > >> forward-ports: > > > >> source-ports: > > > >> icmp-blocks: > > > >> rich rules: > > > >> > > > >> On the el9 server ipa-healthcheck yields no errors and > > ipactl > > > >> status shows everything is > > > >> running. > > > >> > > > >> Anybody know why the old el8 server fails the > > ipa-healthcheck ? > > > > > > > > Assuming that the new server (as a replica of the el8 > > server) was > > > > installed including all the server roles present on el8, > > I guess > > > > there are more steps to be completed, here you can find > > the full > > > > migration guide: > > > > > > > > > > > > > > https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/migrating_to_identity_management_on_rhel_9/assembly_migrating-your-idm-environment-from-rhel-8-servers-to-rhel-9-servers_migrating-to-idm-on-rhel-9 > > > > > > > > is freeipa01.tjako.thuis the new server? > > > > > > > > > > > >> > > > >> Rob > > > >> > > > >> > > > >> _______________________________________________ > > > >> FreeIPA-users mailing list -- > > > freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org> > > > <mailto:freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org>> > > > <mailto:freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org> > > > <mailto:freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org>>> > > > >> To unsubscribe send an email to > > > freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org> > > > <mailto:freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org>> > > > <mailto:freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org> > > > <mailto:freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org>>> > > > >> Fedora Code of Conduct: > > > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > > > >> List Guidelines: > > > https://fedoraproject.org/wiki/Mailing_list_guidelines > > > >> List Archives: > > > > > > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > > > >> Do not reply to spam, report it: > > > https://pagure.io/fedora-infrastructure/new_issue > > > > > > > > > > > > _______________________________________________ > > > > FreeIPA-users mailing list -- > > freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org> > > > <mailto:freeipa-users@lists.fedorahosted.org > > <mailto:freeipa-users@lists.fedorahosted.org>> > > > > To unsubscribe send an email to > > > freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org> > > > <mailto:freeipa-users-le...@lists.fedorahosted.org > > <mailto:freeipa-users-le...@lists.fedorahosted.org>> > > > > Fedora Code of Conduct: > > > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > > > > List Guidelines: > > > https://fedoraproject.org/wiki/Mailing_list_guidelines > > > > List Archives: > > > > > > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > > > > Do not reply to spam, report it: > > > https://pagure.io/fedora-infrastructure/new_issue > > > > > > > > > > >
==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:16:32 +0100] "POST /ca/rest/certs/search?size=3 HTTP/1.1" 200 324 ==> httpd/ssl_request_log <== [19/Jan/2023:08:16:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "POST /ca/rest/certs/search?size=3 HTTP/1.1" 324
==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:14:22 +0100] "GET /ca/rest/certs/1 HTTP/1.1" 200 10022 172.16.1.13 - - [19/Jan/2023:08:14:22 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:22 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:22 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:22 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - ==> httpd/error_log <== [Thu Jan 19 08:14:22.646451 2023] [ssl:error] [pid 161107:tid 140111790450432] [client 172.16.1.13:37898] AH: verify client post handshake [Thu Jan 19 08:14:22.695899 2023] [ssl:error] [pid 121025:tid 140111496804096] [client 172.16.1.13:37910] AH: verify client post handshake [Thu Jan 19 08:14:22.718404 2023] [ssl:error] [pid 161107:tid 140111211648768] [client 172.16.1.13:37914] AH: verify client post handshake [Thu Jan 19 08:14:22.734121 2023] [ssl:error] [pid 161107:tid 140111936460544] [client 172.16.1.13:37922] AH: verify client post handshake [Thu Jan 19 08:14:22.761048 2023] [ssl:error] [pid 161107:tid 140111362651904] [client 172.16.1.13:37934] AH: verify client post handshake ==> httpd/ssl_request_log <== [19/Jan/2023:08:14:22 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/1 HTTP/1.1" 10022 [19/Jan/2023:08:14:22 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:22 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:22 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:22 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - ==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/certs/7 HTTP/1.1" 200 10282 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - ==> httpd/error_log <== [Thu Jan 19 08:14:31.165403 2023] [ssl:error] [pid 121026:tid 140111824021248] [client 172.16.1.13:43108] AH: verify client post handshake [Thu Jan 19 08:14:31.210523 2023] [ssl:error] [pid 121026:tid 140111815628544] [client 172.16.1.13:43116] AH: verify client post handshake [Thu Jan 19 08:14:31.244115 2023] [ssl:error] [pid 121025:tid 140111480018688] [client 172.16.1.13:43124] AH: verify client post handshake [Thu Jan 19 08:14:31.284547 2023] [ssl:error] [pid 161107:tid 140111337473792] [client 172.16.1.13:43138] AH: verify client post handshake [Thu Jan 19 08:14:31.329858 2023] [ssl:error] [pid 161107:tid 140111320688384] [client 172.16.1.13:43146] AH: verify client post handshake ==> httpd/ssl_request_log <== [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/7 HTTP/1.1" 10282 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - ==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/certs/5 HTTP/1.1" 200 10004 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:31 +0100] "GET /ca/rest/certs/2 HTTP/1.1" 200 10169 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - ==> httpd/error_log <== [Thu Jan 19 08:14:31.586155 2023] [ssl:error] [pid 161107:tid 140111228434176] [client 172.16.1.13:43158] AH: verify client post handshake [Thu Jan 19 08:14:31.634332 2023] [ssl:error] [pid 121026:tid 140111807235840] [client 172.16.1.13:43172] AH: verify client post handshake [Thu Jan 19 08:14:31.662384 2023] [ssl:error] [pid 161107:tid 140111928067840] [client 172.16.1.13:43174] AH: verify client post handshake [Thu Jan 19 08:14:31.679921 2023] [ssl:error] [pid 121024:tid 140111919675136] [client 172.16.1.13:43184] AH: verify client post handshake [Thu Jan 19 08:14:31.736497 2023] [ssl:error] [pid 121025:tid 140111463233280] [client 172.16.1.13:43200] AH: verify client post handshake [Thu Jan 19 08:14:31.983461 2023] [ssl:error] [pid 121026:tid 140111765272320] [client 172.16.1.13:43212] AH: verify client post handshake [Thu Jan 19 08:14:32.062623 2023] [ssl:error] [pid 161107:tid 140111220041472] [client 172.16.1.13:43216] AH: verify client post handshake [Thu Jan 19 08:14:32.129615 2023] [ssl:error] [pid 161107:tid 140111807235840] [client 172.16.1.13:43232] AH: verify client post handshake [Thu Jan 19 08:14:32.161340 2023] [ssl:error] [pid 161107:tid 140111186470656] [client 172.16.1.13:43246] AH: verify client post handshake [Thu Jan 19 08:14:32.211977 2023] [ssl:error] [pid 161107:tid 140111824021248] [client 172.16.1.13:43260] AH: verify client post handshake ==> httpd/ssl_request_log <== [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/5 HTTP/1.1" 10004 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:31 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/2 HTTP/1.1" 10169 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - ==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/certs/4 HTTP/1.1" 200 10352 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/certs/1 HTTP/1.1" 200 10022 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:32 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/certs/3 HTTP/1.1" 200 10634 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/certs/14 HTTP/1.1" 200 12527 ==> httpd/error_log <== [Thu Jan 19 08:14:32.454219 2023] [ssl:error] [pid 121026:tid 140111756879616] [client 172.16.1.13:43266] AH: verify client post handshake [Thu Jan 19 08:14:32.507144 2023] [ssl:error] [pid 161107:tid 140111832413952] [client 172.16.1.13:43276] AH: verify client post handshake [Thu Jan 19 08:14:32.549564 2023] [ssl:error] [pid 161107:tid 140111790450432] [client 172.16.1.13:43284] AH: verify client post handshake [Thu Jan 19 08:14:32.570615 2023] [ssl:error] [pid 161107:tid 140111782057728] [client 172.16.1.13:43290] AH: verify client post handshake [Thu Jan 19 08:14:32.600760 2023] [ssl:error] [pid 121026:tid 140111731701504] [client 172.16.1.13:43292] AH: verify client post handshake [Thu Jan 19 08:14:32.845536 2023] [ssl:error] [pid 121024:tid 140111832413952] [client 172.16.1.13:43296] AH: verify client post handshake [Thu Jan 19 08:14:32.898653 2023] [ssl:error] [pid 161107:tid 140111194863360] [client 172.16.1.13:43298] AH: verify client post handshake [Thu Jan 19 08:14:32.930993 2023] [ssl:error] [pid 121026:tid 140111723308800] [client 172.16.1.13:43314] AH: verify client post handshake [Thu Jan 19 08:14:32.949978 2023] [ssl:error] [pid 121026:tid 140111706523392] [client 172.16.1.13:43324] AH: verify client post handshake [Thu Jan 19 08:14:32.993599 2023] [ssl:error] [pid 161107:tid 140111815628544] [client 172.16.1.13:43328] AH: verify client post handshake [Thu Jan 19 08:14:33.217637 2023] [ssl:error] [pid 161107:tid 140111312295680] [client 172.16.1.13:43344] AH: verify client post handshake [Thu Jan 19 08:14:33.252930 2023] [ssl:error] [pid 161107:tid 140111354259200] [client 172.16.1.13:43348] AH: verify client post handshake [Thu Jan 19 08:14:33.276275 2023] [ssl:error] [pid 121026:tid 140111698130688] [client 172.16.1.13:43352] AH: verify client post handshake [Thu Jan 19 08:14:33.291350 2023] [ssl:error] [pid 121026:tid 140111681345280] [client 172.16.1.13:43360] AH: verify client post handshake [Thu Jan 19 08:14:33.317728 2023] [ssl:error] [pid 161107:tid 140111911282432] [client 172.16.1.13:43366] AH: verify client post handshake [Thu Jan 19 08:14:33.422029 2023] [ssl:error] [pid 161107:tid 140111329081088] [client 172.16.1.13:43374] AH: verify client post handshake ==> httpd/ssl_request_log <== [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/4 HTTP/1.1" 10352 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/1 HTTP/1.1" 10022 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:32 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/3 HTTP/1.1" 10634 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/14 HTTP/1.1" 12527 ==> httpd/access_log <== 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/certs/17 HTTP/1.1" 200 12425 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/certs/10 HTTP/1.1" 200 12348 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/account/login HTTP/1.1" 200 304 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 200 1167 172.16.1.13 - - [19/Jan/2023:08:14:33 +0100] "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 200 1218 172.16.1.13 - - [19/Jan/2023:08:14:34 +0100] "GET /ca/rest/account/logout HTTP/1.1" 204 - ==> httpd/error_log <== [Thu Jan 19 08:14:33.454460 2023] [ssl:error] [pid 161107:tid 140111345866496] [client 172.16.1.13:43388] AH: verify client post handshake [Thu Jan 19 08:14:33.477405 2023] [ssl:error] [pid 161107:tid 140111203256064] [client 172.16.1.13:43402] AH: verify client post handshake [Thu Jan 19 08:14:33.493202 2023] [ssl:error] [pid 161107:tid 140111178077952] [client 172.16.1.13:43414] AH: verify client post handshake [Thu Jan 19 08:14:33.519167 2023] [ssl:error] [pid 161107:tid 140111919675136] [client 172.16.1.13:43430] AH: verify client post handshake [Thu Jan 19 08:14:33.693626 2023] [ssl:error] [pid 161107:tid 140111798843136] [client 172.16.1.13:43440] AH: verify client post handshake [Thu Jan 19 08:14:33.728253 2023] [ssl:error] [pid 161107:tid 140111211648768] [client 172.16.1.13:43450] AH: verify client post handshake [Thu Jan 19 08:14:33.748617 2023] [ssl:error] [pid 161107:tid 140111936460544] [client 172.16.1.13:43462] AH: verify client post handshake [Thu Jan 19 08:14:33.766133 2023] [ssl:error] [pid 161107:tid 140111362651904] [client 172.16.1.13:43466] AH: verify client post handshake [Thu Jan 19 08:14:33.795384 2023] [ssl:error] [pid 161107:tid 140111337473792] [client 172.16.1.13:43470] AH: verify client post handshake [Thu Jan 19 08:14:33.906617 2023] [ssl:error] [pid 161107:tid 140111320688384] [client 172.16.1.13:43478] AH: verify client post handshake [Thu Jan 19 08:14:33.938941 2023] [ssl:error] [pid 121026:tid 140111936460544] [client 172.16.1.13:43490] AH: verify client post handshake [Thu Jan 19 08:14:33.960693 2023] [ssl:error] [pid 121024:tid 140111815628544] [client 172.16.1.13:43506] AH: verify client post handshake [Thu Jan 19 08:14:33.989521 2023] [ssl:error] [pid 121024:tid 140111798843136] [client 172.16.1.13:43510] AH: verify client post handshake [Thu Jan 19 08:14:34.015202 2023] [ssl:error] [pid 121024:tid 140111790450432] [client 172.16.1.13:43516] AH: verify client post handshake ==> httpd/ssl_request_log <== [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/17 HTTP/1.1" 12425 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" - [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/certs/10 HTTP/1.1" 12348 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/login HTTP/1.1" 304 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/cert HTTP/1.1" 1167 [19/Jan/2023:08:14:33 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/authorities/2d0b61bc-e11f-4347-8985-211b158721ed/chain HTTP/1.1" 1218 [19/Jan/2023:08:14:34 +0100] 172.16.1.13 TLSv1.3 TLS_AES_256_GCM_SHA384 "GET /ca/rest/account/logout HTTP/1.1" -
_______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue