On Sun, 2025-10-05 at 13:39 +0300, Alexander Bokovoy via FreeIPA-users wrote: > > Please read the release notes for 4.12.5 release: > https://www.freeipa.org/release-notes/4-12-5.html > > Specifically, Red Hat's knowledge base articles mentioned there.
Pity that those are locked behind a Red Hat account login. Fortunately I have an account. Pity for those that do not and are getting hit by this update by Red Hat within a minor version even. In any any case, the solution suggested there doesn't work (here): # kinit admin Password for [email protected]: [root@server ~]# klist Ticket cache: KEYRING:persistent:0:krb_ccache_HLUjJfd Default principal: [email protected] Valid starting Expires Service principal 2025-10-05 22:29:31 2025-10-06 21:54:00 krbtgt/[email protected] # ipa config-mod --enable-sid --add-sids ipa: ERROR: Failed to call DBus # klist Ticket cache: KEYRING:persistent:0:krb_ccache_HLUjJfd Default principal: [email protected] Valid starting Expires Service principal 2025-10-05 22:30:34 2025-10-06 21:54:00 HTTP/[email protected] 2025-10-05 22:29:31 2025-10-06 21:54:00 krbtgt/[email protected] [root@server ~]# ipa config-mod --enable-sid --add-sids ipa: ERROR: Failed to call DBus Here is the journal (with as much noise as I could find removed) during the above: Oct 05 22:12:17 server.example.com saslauthd[2092507]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:12:17 server.example.com saslauthd[2092507]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:12:19 server.example.com saslauthd[2092507]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:12:19 server.example.com saslauthd[2092507]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:12:23 server.example.com saslauthd[2092505]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:12:23 server.example.com saslauthd[2092505]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:12:25 server.example.com saslauthd[2092505]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:12:25 server.example.com saslauthd[2092505]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:12:28 server.example.com saslauthd[2092507]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:12:28 server.example.com saslauthd[2092507]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:12:31 server.example.com saslauthd[2092507]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:12:31 server.example.com saslauthd[2092507]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:12:42 server.example.com saslauthd[2092508]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:12:42 server.example.com saslauthd[2092508]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:12:44 server.example.com saslauthd[2092508]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:12:44 server.example.com saslauthd[2092508]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:18:13 server.example.com saslauthd[2092508]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:18:13 server.example.com saslauthd[2092508]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:18:15 server.example.com saslauthd[2092508]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:18:15 server.example.com saslauthd[2092508]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:18:19 server.example.com saslauthd[2092506]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:18:19 server.example.com saslauthd[2092506]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:18:21 server.example.com saslauthd[2092506]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:18:21 server.example.com saslauthd[2092506]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:18:24 server.example.com saslauthd[2092505]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:18:24 server.example.com saslauthd[2092505]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:18:26 server.example.com saslauthd[2092505]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:18:26 server.example.com saslauthd[2092505]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:18:37 server.example.com saslauthd[2092507]: pam_unix(imap:auth): check pass; user unknown Oct 05 22:18:37 server.example.com saslauthd[2092507]: pam_unix(imap:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Oct 05 22:18:39 server.example.com saslauthd[2092507]: DEBUG: auth_pam: pam_authenticate failed: Authentication failure Oct 05 22:18:39 server.example.com saslauthd[2092507]: : auth failure: [user=no-reply] [service=imap] [realm=example.com] [mech=pam] [reason=PAM auth error] Oct 05 22:30:45 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:45.025916230 -0400] - INFO - op_thread_cleanup - slapd shutting down - signaling operation threads - op stack size 48 max work q size 34 max work q stack size 34 Oct 05 22:30:45 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:45.269528591 -0400] - INFO - slapd_daemon - slapd shutting down - closing down internal subsystems and plugins Oct 05 22:30:46 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:46.267107945 -0400] - INFO - bdb_pre_close - Waiting for 5 database threads to stop Oct 05 22:30:46 server.example.com dbus-daemon[1811]: [system] Activating via systemd: service name='org.fedoraproject.Setroubleshootd' unit='setroubleshootd.service' requested by ':1.72' (uid=0 pid=1365 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") Oct 05 22:30:48 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:48.017486340 -0400] - INFO - bdb_pre_close - All database threads now stopped Oct 05 22:30:51 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Oct 05 22:30:53 server.example.com ipa-dnskeysyncd[3420151]: ipa-dnskeysyncd: ERROR syncrepl_poll: LDAP error ({'result': -1, 'desc': "Can't contact LDAP server", 'ctrls': []}) Oct 05 22:30:54 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:54.681272510 -0400] - INFO - ldbm_back_instance_set_destructor - Set of instances destroyed Oct 05 22:30:54 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:54.802175804 -0400] - INFO - connection_post_shutdown_cleanup - slapd shutting down - freed 34 work q stack objects - freed 50 op stack objects Oct 05 22:30:54 server.example.com ns-slapd[3419543]: [05/Oct/2025:22:30:54.879484858 -0400] - INFO - main - slapd stopped. Oct 05 22:30:55 server.example.com setroubleshoot[3726695]: AnalyzeThread.run(): Cancel pending alarm Oct 05 22:30:55 server.example.com systemd[1]: ipa-dnskeysyncd.service: Main process exited, code=exited, status=1/FAILURE Oct 05 22:30:55 server.example.com systemd[1]: ipa-dnskeysyncd.service: Failed with result 'exit-code'. Oct 05 22:30:59 server.example.com dbus-daemon[1811]: [system] Activating service name='org.fedoraproject.SetroubleshootPrivileged' requested by ':1.168011' (uid=985 pid=3726695 comm="/usr/libexec/platform-python -Es /usr/sbin/setroub" label="system_u:system_r:setroubleshootd_t:s0") (using servicehelper) Oct 05 22:30:59 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.SetroubleshootPrivileged' Oct 05 22:31:00 server.example.com systemd[1]: [email protected]: Succeeded. Oct 05 22:31:02 server.example.com setroubleshoot[3726695]: SELinux is preventing systemctl from getattr access on the filesystem /. For complete SELinux messages run: sealert -l 9e381eda-edb0-43f1-8254-cc8cef70df65 Oct 05 22:31:02 server.example.com setroubleshoot[3726695]: SELinux is preventing systemctl from getattr access on the filesystem /. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemctl should be allowed getattr access on the filesystem by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemctl' --raw | audit2allow -M my-systemctl # semodule -X 300 -i my-systemctl.pp Oct 05 22:31:02 server.example.com setroubleshoot[3726695]: AnalyzeThread.run(): Set alarm timeout to 10 Oct 05 22:31:03 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:03.485579559 -0400] - INFO - slapd_extract_cert - CA CERT NAME: EXAMPLE.COM IPA CA Oct 05 22:31:03 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:03.767367886 -0400] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. Oct 05 22:31:03 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:03.923513233 -0400] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.219338498 -0400] - INFO - Security Initialization - SSL info: Enabling default cipher set. Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.266979003 -0400] - INFO - Security Initialization - SSL info: Configured NSS Ciphers Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.317087928 -0400] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.367098089 -0400] - INFO - Security Initialization - SSL info: TLS_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.417336317 -0400] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.489263251 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.534559041 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.626477672 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.714513700 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.810223851 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.860334673 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.939440620 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:31:04 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:04.985597169 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.080981709 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.197083659 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.246234040 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.304818861 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.389397483 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.463257597 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.538601244 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.597262719 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.647350713 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.722610923 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.773061307 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.847829995 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.890024772 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:31:05 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:05.973418139 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.084319498 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.142531622 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.192631943 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.281591368 -0400] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.369860392 -0400] - INFO - Security Initialization - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.411855976 -0400] - INFO - main - 389-Directory/1.4.3.39 B2025.254.1138 starting up Oct 05 22:31:06 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:06.453288999 -0400] - INFO - main - Setting the maximum file descriptor limit to: 262144 Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.466269174 -0400] - INFO - PBKDF2_SHA256 - Based on CPU performance, chose 2048 rounds Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.578815222 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.627261591 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.719564798 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.785053566 -0400] - NOTICE - ldbm_back_start - found 16023608k physical memory Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.877663240 -0400] - NOTICE - ldbm_back_start - found 11418308k available Oct 05 22:31:07 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:07.981564039 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 1001475k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.122650906 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (3 total): 917504k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.202400578 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (3 total): 131072k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.269619054 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca entry cache (3 total): 917504k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.357949849 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca dn cache (3 total): 131072k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.408210274 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog entry cache (3 total): 917504k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.458334827 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog dn cache (3 total): 131072k Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.508401340 -0400] - NOTICE - ldbm_back_start - total cache size: 4246736384 B; Oct 05 22:31:08 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:08.868423128 -0400] - ERR - schema-compat-plugin - scheduled schema-compat-plugin tree scan in about 5 seconds after the server startup! Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.009983446 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=groups,cn=compat,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.093187169 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=computers,cn=compat,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.143407246 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=ng,cn=compat,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.210145475 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target ou=sudoers,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.260904819 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=users,cn=compat,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.360976616 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.402217056 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.469168577 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.560905092 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.602649483 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.644305590 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.686078695 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.753064450 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.794966914 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.853203426 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:09 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:09.895737068 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.206799297 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.245917130 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.450842708 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=automember rebuild membership,cn=tasks,cn=config does not exist Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.491697592 -0400] - INFO - slapi_vattrspi_regattr - Because krbPwdPolicyReference is a new registered virtual attribute , nsslapd-ignore-virtual-attrs was set to 'off' Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.553122897 -0400] - ERR - cos-plugin - cos_dn_defs_cb - Skipping CoS Definition cn=Password Policy,cn=accounts,dc=example,dc=com--no CoS Templates found, which should be added before the CoS Definition. Oct 05 22:31:10 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:10.899301485 -0400] - ERR - set_krb5_creds - Could not get initial credentials for principal [ldap/[email protected]] in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text)) Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.042433464 -0400] - ERR - schema-compat-plugin - schema-compat-plugin tree scan will start in about 5 seconds! Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.080079163 -0400] - INFO - validate_num_config_reservedescriptors - reserve descriptors changed from 64 to 231 Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.121821955 -0400] - INFO - connection_table_new - conntablesize:64000 Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.189210866 -0400] - INFO - slapd_daemon - slapd started. Listening on All Interfaces port 389 for LDAP requests Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.230274405 -0400] - INFO - slapd_daemon - Listening on All Interfaces port 636 for LDAPS requests Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.271968257 -0400] - INFO - slapd_daemon - Listening on /var/run/slapd-EXAMPLE-COM.socket for LDAPI requests Oct 05 22:31:11 server.example.com ldapmodify[3726777]: DIGEST-MD5 common mech free Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.530693672 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 194]: Sidgen task starts ... Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.754504866 -0400] - ERR - find_sid_for_ldap_entry - [file ipa_sidgen_common.c, line 533]: Cannot convert Posix ID [10] into an unused SID. Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.806069857 -0400] - ERR - do_work - [file ipa_sidgen_task.c, line 154]: Cannot add SID to existing entry. Oct 05 22:31:11 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:11.889609452 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 199]: Sidgen task finished [32]. Oct 05 22:31:13 server.example.com systemd[1]: setroubleshootd.service: Succeeded. Oct 05 22:31:16 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:16.145360656 -0400] - ERR - schema-compat-plugin - warning: no entries set up under cn=computers, cn=compat,dc=example,dc=com Oct 05 22:31:16 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:31:16.199480265 -0400] - ERR - schema-compat-plugin - Finished plugin initialization. Oct 05 22:31:55 server.example.com systemd[1]: ipa-dnskeysyncd.service: Service RestartSec=1min expired, scheduling restart. Oct 05 22:31:55 server.example.com systemd[1]: ipa-dnskeysyncd.service: Scheduled restart job, restart counter is at 1. Oct 05 22:31:56 server.example.com ipa-dnskeysyncd[3726839]: ipa-dnskeysyncd: INFO To increase debugging set debug=True in dns.conf See default.conf(5) for details Oct 05 22:31:58 server.example.com ipa-dnskeysyncd[3726839]: ipa-dnskeysyncd: INFO LDAP bind... Oct 05 22:31:58 server.example.com ipa-dnskeysyncd[3726839]: ipa-dnskeysyncd: INFO Commencing sync process Oct 05 22:31:58 server.example.com ipa-dnskeysyncd[3726839]: ipaserver.dnssec.keysyncer: INFO Initial LDAP dump is done, sychronizing with ODS and BIND Oct 05 22:32:02 server.example.com platform-python[3726845]: Configuration.cpp(96): Missing log.level in configuration. Using default value: INFO Oct 05 22:32:02 server.example.com platform-python[3726845]: Configuration.cpp(96): Missing slots.mechanisms in configuration. Using default value: ALL Oct 05 22:32:02 server.example.com platform-python[3726845]: Configuration.cpp(124): Missing slots.removable in configuration. Using default value: false Oct 05 22:32:02 server.example.com dbus-daemon[1811]: [system] Activating via systemd: service name='org.fedoraproject.Setroubleshootd' unit='setroubleshootd.service' requested by ':1.72' (uid=0 pid=1365 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") Oct 05 22:32:02 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:02.844710214 -0400] - INFO - op_thread_cleanup - slapd shutting down - signaling operation threads - op stack size 2 max work q size 2 max work q stack size 2 Oct 05 22:32:02 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:02.970635926 -0400] - INFO - slapd_daemon - slapd shutting down - waiting for 1 thread to terminate Oct 05 22:32:03 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:03.083631335 -0400] - INFO - slapd_daemon - slapd shutting down - closing down internal subsystems and plugins Oct 05 22:32:03 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Oct 05 22:32:04 server.example.com setroubleshoot[3726887]: AnalyzeThread.run(): Cancel pending alarm Oct 05 22:32:05 server.example.com dbus-daemon[1811]: [system] Activating service name='org.fedoraproject.SetroubleshootPrivileged' requested by ':1.168026' (uid=985 pid=3726887 comm="/usr/libexec/platform-python -Es /usr/sbin/setroub" label="system_u:system_r:setroubleshootd_t:s0") (using servicehelper) Oct 05 22:32:05 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.SetroubleshootPrivileged' Oct 05 22:32:06 server.example.com setroubleshoot[3726887]: SELinux is preventing systemctl from getattr access on the filesystem /. For complete SELinux messages run: sealert -l 9e381eda-edb0-43f1-8254-cc8cef70df65 Oct 05 22:32:06 server.example.com setroubleshoot[3726887]: SELinux is preventing systemctl from getattr access on the filesystem /. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemctl should be allowed getattr access on the filesystem by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemctl' --raw | audit2allow -M my-systemctl # semodule -X 300 -i my-systemctl.pp Oct 05 22:32:06 server.example.com setroubleshoot[3726887]: AnalyzeThread.run(): Set alarm timeout to 10 Oct 05 22:32:13 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:13.440343371 -0400] - INFO - bdb_pre_close - Waiting for 5 database threads to stop Oct 05 22:32:14 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:14.181117121 -0400] - INFO - bdb_pre_close - All database threads now stopped Oct 05 22:32:14 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:14.355126744 -0400] - INFO - ldbm_back_instance_set_destructor - Set of instances destroyed Oct 05 22:32:14 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:14.404560032 -0400] - INFO - connection_post_shutdown_cleanup - slapd shutting down - freed 2 work q stack objects - freed 4 op stack objects Oct 05 22:32:14 server.example.com ns-slapd[3726738]: [05/Oct/2025:22:32:14.454015755 -0400] - INFO - main - slapd stopped. Oct 05 22:32:14 server.example.com platform-python[3726839]: detected unhandled Python exception in '/usr/libexec/ipa/ipa-dnskeysyncd' Oct 05 22:32:16 server.example.com systemd[1]: [email protected]: Succeeded. Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: Traceback (most recent call last): Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: File "/usr/libexec/ipa/ipa-dnskeysyncd", line 130, in <module> Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: while ldap_connection.syncrepl_poll(all=1, msgid=ldap_search): Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: File "/usr/lib64/python3.6/site-packages/ldap/syncrepl.py", line 465, in syncrepl_poll Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: self.syncrepl_refreshdone() Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/keysyncer.py", line 126, in syncrepl_refreshdone Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: self.hsm_replica_sync() Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/keysyncer.py", line 192, in hsm_replica_sync Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: ipautil.run([paths.IPA_DNSKEYSYNCD_REPLICA]) Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: File "/usr/lib/python3.6/site-packages/ipapython/ipautil.py", line 600, in run Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: p.returncode, arg_string, output_log, error_log Oct 05 22:32:16 server.example.com ipa-dnskeysyncd[3726839]: ipapython.ipautil.CalledProcessError: CalledProcessError(Command ['/usr/libexec/ipa/ipa-dnskeysync-replica'] returned non-zero exit status 1: "ipa-dnskeysync-replica: INFO To increase debugging set debug=True in dns.conf See default.conf(5) for details\nipa-dnskeysync-replica: ERROR LDAP server is down: cannot connect to 'ldapi://%2Frun%2Fslapd-EXAMPLE-COM.socket': Connection reset by peer\n") Oct 05 22:32:16 server.example.com systemd[1]: ipa-dnskeysyncd.service: Main process exited, code=exited, status=1/FAILURE Oct 05 22:32:16 server.example.com systemd[1]: ipa-dnskeysyncd.service: Failed with result 'exit-code'. Oct 05 22:32:16 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:16.695927840 -0400] - INFO - slapd_extract_cert - CA CERT NAME: EXAMPLE.COM IPA CA Oct 05 22:32:16 server.example.com systemd[1]: setroubleshootd.service: Succeeded. Oct 05 22:32:17 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:17.092452511 -0400] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. Oct 05 22:32:17 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:17.279604704 -0400] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert Oct 05 22:32:17 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:17.945423352 -0400] - INFO - Security Initialization - SSL info: Enabling default cipher set. Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.153089500 -0400] - INFO - Security Initialization - SSL info: Configured NSS Ciphers Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.336100046 -0400] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.498114331 -0400] - INFO - Security Initialization - SSL info: TLS_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.615208755 -0400] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.790719632 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:32:18 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:18.857871078 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.000003307 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:32:19 server.example.com sssd_be[3404906]: Backend is offline Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.225362290 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.368506556 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.502023339 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.602144319 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.668927559 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.794031134 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.885921091 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:32:19 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:19.994398896 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.102883433 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.219679636 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.336688942 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.469996623 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.545441124 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.637203324 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.745908617 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.871177487 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:32:20 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:20.979627188 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.179804810 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.288725770 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.347141232 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.413964961 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.489063658 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.589753403 -0400] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.656310791 -0400] - INFO - Security Initialization - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.781628467 -0400] - INFO - main - 389-Directory/1.4.3.39 B2025.254.1138 starting up Oct 05 22:32:21 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:21.915024006 -0400] - INFO - main - Setting the maximum file descriptor limit to: 262144 Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.010983738 -0400] - INFO - PBKDF2_SHA256 - Based on CPU performance, chose 2048 rounds Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.086207009 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.188750776 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.287901380 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.371228487 -0400] - NOTICE - ldbm_back_start - found 16023608k physical memory Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.450597048 -0400] - NOTICE - ldbm_back_start - found 11550492k available Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.535109088 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 1001475k Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.627077079 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (3 total): 917504k Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.727566082 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (3 total): 131072k Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.819562974 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca entry cache (3 total): 917504k Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.886774125 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca dn cache (3 total): 131072k Oct 05 22:32:23 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:23.978814822 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog entry cache (3 total): 917504k Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.045591863 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog dn cache (3 total): 131072k Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.129238627 -0400] - NOTICE - ldbm_back_start - total cache size: 4246736384 B; Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.267232294 -0400] - ERR - schema-compat-plugin - scheduled schema-compat-plugin tree scan in about 5 seconds after the server startup! Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.357548476 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=groups,cn=compat,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.422623675 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=computers,cn=compat,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.547907102 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=ng,cn=compat,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.631511909 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target ou=sudoers,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.690151510 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=users,cn=compat,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.740626981 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.848931682 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:24 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:24.932859277 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.066925855 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.167146108 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.300618180 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.359350936 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.426463511 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.527088025 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.610680736 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.669854175 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.765600799 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.828845087 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:32:25 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:25.992764828 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=automember rebuild membership,cn=tasks,cn=config does not exist Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.083061936 -0400] - INFO - slapi_vattrspi_regattr - Because krbPwdPolicyReference is a new registered virtual attribute , nsslapd-ignore-virtual-attrs was set to 'off' Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.155166397 -0400] - ERR - cos-plugin - cos_dn_defs_cb - Skipping CoS Definition cn=Password Policy,cn=accounts,dc=example,dc=com--no CoS Templates found, which should be added before the CoS Definition. Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.451656515 -0400] - ERR - set_krb5_creds - Could not get initial credentials for principal [ldap/[email protected]] in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text)) Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.560182890 -0400] - ERR - schema-compat-plugin - schema-compat-plugin tree scan will start in about 5 seconds! Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.608684542 -0400] - INFO - validate_num_config_reservedescriptors - reserve descriptors changed from 64 to 231 Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.667281393 -0400] - INFO - connection_table_new - conntablesize:64000 Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.817862827 -0400] - INFO - slapd_daemon - slapd started. Listening on All Interfaces port 389 for LDAP requests Oct 05 22:32:26 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:26.876010504 -0400] - INFO - slapd_daemon - Listening on All Interfaces port 636 for LDAPS requests Oct 05 22:32:27 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:27.001152221 -0400] - INFO - slapd_daemon - Listening on /var/run/slapd-EXAMPLE-COM.socket for LDAPI requests Oct 05 22:32:27 server.example.com ldapmodify[3727036]: DIGEST-MD5 common mech free Oct 05 22:32:27 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:27.359538861 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 194]: Sidgen task starts ... Oct 05 22:32:27 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:27.581024803 -0400] - ERR - find_sid_for_ldap_entry - [file ipa_sidgen_common.c, line 533]: Cannot convert Posix ID [10] into an unused SID. Oct 05 22:32:27 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:27.677458301 -0400] - ERR - do_work - [file ipa_sidgen_task.c, line 154]: Cannot add SID to existing entry. Oct 05 22:32:27 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:27.813856487 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 199]: Sidgen task finished [32]. Oct 05 22:32:28 server.example.com dbus-daemon[1811]: [system] Activating service name='org.freedesktop.problems' requested by ':1.168032' (uid=0 pid=3727063 comm="/usr/libexec/platform-python /usr/bin/abrt-action-" label="system_u:system_r:abrt_t:s0-s0:c0.c1023") (using servicehelper) Oct 05 22:32:30 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.freedesktop.problems' Oct 05 22:32:31 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:31.582885802 -0400] - ERR - schema-compat-plugin - warning: no entries set up under cn=computers, cn=compat,dc=example,dc=com Oct 05 22:32:31 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:32:31.657444867 -0400] - ERR - schema-compat-plugin - Finished plugin initialization. Oct 05 22:33:02 server.example.com sssd_be[3404906]: Backend is online Oct 05 22:33:16 server.example.com systemd[1]: ipa-dnskeysyncd.service: Service RestartSec=1min expired, scheduling restart. Oct 05 22:33:16 server.example.com systemd[1]: ipa-dnskeysyncd.service: Scheduled restart job, restart counter is at 2. Oct 05 22:33:17 server.example.com ipa-dnskeysyncd[3727108]: ipa-dnskeysyncd: INFO To increase debugging set debug=True in dns.conf See default.conf(5) for details Oct 05 22:33:19 server.example.com ipa-dnskeysyncd[3727108]: ipa-dnskeysyncd: INFO LDAP bind... Oct 05 22:33:19 server.example.com ipa-dnskeysyncd[3727108]: ipa-dnskeysyncd: INFO Commencing sync process Oct 05 22:33:19 server.example.com ipa-dnskeysyncd[3727108]: ipaserver.dnssec.keysyncer: INFO Initial LDAP dump is done, sychronizing with ODS and BIND Oct 05 22:33:22 server.example.com platform-python[3727112]: Configuration.cpp(96): Missing log.level in configuration. Using default value: INFO Oct 05 22:33:22 server.example.com platform-python[3727112]: Configuration.cpp(96): Missing slots.mechanisms in configuration. Using default value: ALL Oct 05 22:33:22 server.example.com platform-python[3727112]: Configuration.cpp(124): Missing slots.removable in configuration. Using default value: false Oct 05 22:37:34 server.example.com systemd[1]: [email protected]:113-198.235.24.26:57794.service: Succeeded. Oct 05 22:37:36 server.example.com dbus-daemon[1811]: [system] Activating via systemd: service name='org.fedoraproject.Setroubleshootd' unit='setroubleshootd.service' requested by ':1.72' (uid=0 pid=1365 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") Oct 05 22:37:36 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:36.536697733 -0400] - INFO - op_thread_cleanup - slapd shutting down - signaling operation threads - op stack size 7 max work q size 2 max work q stack size 2 Oct 05 22:37:36 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:36.593042086 -0400] - INFO - slapd_daemon - slapd shutting down - closing down internal subsystems and plugins Oct 05 22:37:36 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Oct 05 22:37:37 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:37.221961710 -0400] - INFO - bdb_pre_close - Waiting for 5 database threads to stop Oct 05 22:37:38 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:38.087821118 -0400] - INFO - bdb_pre_close - All database threads now stopped Oct 05 22:37:38 server.example.com setroubleshoot[3727353]: AnalyzeThread.run(): Cancel pending alarm Oct 05 22:37:38 server.example.com ipa-dnskeysyncd[3727108]: ipa-dnskeysyncd: ERROR syncrepl_poll: LDAP error ({'result': -1, 'desc': "Can't contact LDAP server", 'ctrls': []}) Oct 05 22:37:38 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:38.466828760 -0400] - INFO - ldbm_back_instance_set_destructor - Set of instances destroyed Oct 05 22:37:38 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:38.524525531 -0400] - INFO - connection_post_shutdown_cleanup - slapd shutting down - freed 2 work q stack objects - freed 7 op stack objects Oct 05 22:37:38 server.example.com ns-slapd[3726996]: [05/Oct/2025:22:37:38.598948982 -0400] - INFO - main - slapd stopped. Oct 05 22:37:38 server.example.com systemd[1]: ipa-dnskeysyncd.service: Main process exited, code=exited, status=1/FAILURE Oct 05 22:37:38 server.example.com systemd[1]: ipa-dnskeysyncd.service: Failed with result 'exit-code'. Oct 05 22:37:39 server.example.com dbus-daemon[1811]: [system] Activating service name='org.fedoraproject.SetroubleshootPrivileged' requested by ':1.168048' (uid=985 pid=3727353 comm="/usr/libexec/platform-python -Es /usr/sbin/setroub" label="system_u:system_r:setroubleshootd_t:s0") (using servicehelper) Oct 05 22:37:40 server.example.com dbus-daemon[1811]: [system] Successfully activated service 'org.fedoraproject.SetroubleshootPrivileged' Oct 05 22:37:41 server.example.com setroubleshoot[3727353]: SELinux is preventing systemctl from getattr access on the filesystem /. For complete SELinux messages run: sealert -l 9e381eda-edb0-43f1-8254-cc8cef70df65 Oct 05 22:37:41 server.example.com setroubleshoot[3727353]: SELinux is preventing systemctl from getattr access on the filesystem /. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemctl should be allowed getattr access on the filesystem by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemctl' --raw | audit2allow -M my-systemctl # semodule -X 300 -i my-systemctl.pp Oct 05 22:37:41 server.example.com setroubleshoot[3727353]: AnalyzeThread.run(): Set alarm timeout to 10 Oct 05 22:37:41 server.example.com systemd[1]: [email protected]: Succeeded. Oct 05 22:37:42 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:42.340060511 -0400] - INFO - slapd_extract_cert - CA CERT NAME: EXAMPLE.COM IPA CA Oct 05 22:37:42 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:42.460527605 -0400] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. Oct 05 22:37:42 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:42.630190667 -0400] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert Oct 05 22:37:42 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:42.962547018 -0400] - INFO - Security Initialization - SSL info: Enabling default cipher set. Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.046774337 -0400] - INFO - Security Initialization - SSL info: Configured NSS Ciphers Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.163491511 -0400] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.271927506 -0400] - INFO - Security Initialization - SSL info: TLS_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.355431395 -0400] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.413836276 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.513945433 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.616265715 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.691467889 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.749911078 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.858347249 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:37:43 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:43.983654123 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.060712697 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.127475740 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.202573563 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.302651932 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.386103901 -0400] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.486180282 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.579081876 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.665213352 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.757005141 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.840419043 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:37:44 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:44.965529687 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.059700105 -0400] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.184820450 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_GCM_SHA256: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.268258904 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_GCM_SHA384: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.349830088 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.441560982 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.558303104 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.641898097 -0400] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA256: enabled Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.749936323 -0400] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.827559431 -0400] - INFO - Security Initialization - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2, max: TLS1.3 Oct 05 22:37:45 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:45.936250422 -0400] - INFO - main - 389-Directory/1.4.3.39 B2025.254.1138 starting up Oct 05 22:37:46 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:46.011057447 -0400] - INFO - main - Setting the maximum file descriptor limit to: 262144 Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.097132587 -0400] - INFO - PBKDF2_SHA256 - Based on CPU performance, chose 2048 rounds Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.147943785 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.225546806 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.324760767 -0400] - INFO - ldbm_instance_config_cachememsize_set - force a minimal value 512000 Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.391146930 -0400] - NOTICE - ldbm_back_start - found 16023608k physical memory Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.470470537 -0400] - NOTICE - ldbm_back_start - found 11411956k available Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.553932694 -0400] - NOTICE - ldbm_back_start - cache autosizing: db cache: 1001475k Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.663901124 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot entry cache (3 total): 917504k Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.772538534 -0400] - NOTICE - ldbm_back_start - cache autosizing: userRoot dn cache (3 total): 131072k Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.889321884 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca entry cache (3 total): 917504k Oct 05 22:37:47 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:47.997741757 -0400] - NOTICE - ldbm_back_start - cache autosizing: ipaca dn cache (3 total): 131072k Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.131200608 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog entry cache (3 total): 917504k Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.231267899 -0400] - NOTICE - ldbm_back_start - cache autosizing: changelog dn cache (3 total): 131072k Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.306633320 -0400] - NOTICE - ldbm_back_start - total cache size: 4246736384 B; Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.497356626 -0400] - ERR - schema-compat-plugin - scheduled schema-compat-plugin tree scan in about 5 seconds after the server startup! Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.634437759 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=groups,cn=compat,dc=example,dc=com does not exist Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.765382891 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=computers,cn=compat,dc=example,dc=com does not exist Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.848817646 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=ng,cn=compat,dc=example,dc=com does not exist Oct 05 22:37:48 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:48.943756601 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target ou=sudoers,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.018793289 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=users,cn=compat,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.127597503 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.210676087 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.311831255 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.378791455 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.544729372 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.697339524 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.789043002 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.872426667 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:49 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:49.972583722 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.055464974 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.163882998 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=example,dc=com does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.242169855 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.325550775 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.495690437 -0400] - WARN - NSACLPlugin - acl_parse - The ACL target cn=automember rebuild membership,cn=tasks,cn=config does not exist Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.588487771 -0400] - INFO - slapi_vattrspi_regattr - Because krbPwdPolicyReference is a new registered virtual attribute , nsslapd-ignore-virtual-attrs was set to 'off' Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.668680563 -0400] - ERR - cos-plugin - cos_dn_defs_cb - Skipping CoS Definition cn=Password Policy,cn=accounts,dc=example,dc=com--no CoS Templates found, which should be added before the CoS Definition. Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.864870299 -0400] - ERR - set_krb5_creds - Could not get initial credentials for principal [ldap/[email protected]] in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text)) Oct 05 22:37:50 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:50.969483272 -0400] - INFO - validate_num_config_reservedescriptors - reserve descriptors changed from 64 to 231 Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.044941348 -0400] - ERR - schema-compat-plugin - schema-compat-plugin tree scan will start in about 5 seconds! Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.136631896 -0400] - INFO - connection_table_new - conntablesize:64000 Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.290605689 -0400] - INFO - slapd_daemon - slapd started. Listening on All Interfaces port 389 for LDAP requests Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.380731529 -0400] - INFO - slapd_daemon - Listening on All Interfaces port 636 for LDAPS requests Oct 05 22:37:51 server.example.com systemd[1]: setroubleshootd.service: Succeeded. Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.509841964 -0400] - INFO - slapd_daemon - Listening on /var/run/slapd-EXAMPLE-COM.socket for LDAPI requests Oct 05 22:37:51 server.example.com ldapmodify[3727470]: DIGEST-MD5 common mech free Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.719731955 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 194]: Sidgen task starts ... Oct 05 22:37:51 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:51.963509837 -0400] - ERR - find_sid_for_ldap_entry - [file ipa_sidgen_common.c, line 533]: Cannot convert Posix ID [10] into an unused SID. Oct 05 22:37:52 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:52.059796528 -0400] - ERR - do_work - [file ipa_sidgen_task.c, line 154]: Cannot add SID to existing entry. Oct 05 22:37:52 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:52.126719622 -0400] - ERR - sidgen_task_thread - [file ipa_sidgen_task.c, line 199]: Sidgen task finished [32]. Oct 05 22:37:55 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:55.990752127 -0400] - ERR - schema-compat-plugin - warning: no entries set up under cn=computers, cn=compat,dc=example,dc=com Oct 05 22:37:56 server.example.com ns-slapd[3727433]: [05/Oct/2025:22:37:56.062592800 -0400] - ERR - schema-compat-plugin - Finished plugin initialization. Oct 05 22:38:38 server.example.com systemd[1]: ipa-dnskeysyncd.service: Service RestartSec=1min expired, scheduling restart. Oct 05 22:38:38 server.example.com systemd[1]: ipa-dnskeysyncd.service: Scheduled restart job, restart counter is at 3. Oct 05 22:38:39 server.example.com ipa-dnskeysyncd[3727487]: ipa-dnskeysyncd: INFO To increase debugging set debug=True in dns.conf See default.conf(5) for details Oct 05 22:38:42 server.example.com ipa-dnskeysyncd[3727487]: ipa-dnskeysyncd: INFO LDAP bind... Oct 05 22:38:42 server.example.com ipa-dnskeysyncd[3727487]: ipa-dnskeysyncd: INFO Commencing sync process Oct 05 22:38:42 server.example.com ipa-dnskeysyncd[3727487]: ipaserver.dnssec.keysyncer: INFO Initial LDAP dump is done, sychronizing with ODS and BIND Oct 05 22:38:45 server.example.com platform-python[3727504]: Configuration.cpp(96): Missing log.level in configuration. Using default value: INFO Oct 05 22:38:45 server.example.com platform-python[3727504]: Configuration.cpp(96): Missing slots.mechanisms in configuration. Using default value: ALL Oct 05 22:38:45 server.example.com platform-python[3727504]: Configuration.cpp(124): Missing slots.removable in configuration. Using default value: false Oct 05 22:40:01 server.example.com systemd[1]: sysstat-collect.service: Succeeded. Cheers, b. -- _______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
