Displaying 20 results from an estimated 33 matches for "solac".
Did you mean:
solar
2018 May 04
1
unexplained Replication failures...?
...forced-sync and --full-sync since the
start but in fact I wanted to make sure to force replication between the
servers.
Here is what I have noticed:
- replication works from dc00 -> dc00 but not from dc01 -> dc00:
[root at dc00 ~]# samba-tool drs replicate DC01 DC00
dc=ad,dc=lasthome,dc=solace,dc=krynn --sync-forced --full-sync
Replicate from DC00 to DC01 was successful.
[root at dc00 ~]# samba-tool drs replicate DC00 DC01
dc=ad,dc=lasthome,dc=solace,dc=krynn --sync-forced --full-sync
ERROR(<class 'samba.drs_utils.drsException'>): DsReplicaSync failed -
drsException: DsR...
2020 Aug 21
4
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...Rowland Penny,CN=Users,DC=samdom,DC=example,DC=com
>> dn: CN=dhcpduser,CN=Users,DC=samdom,DC=example,DC=com
>> dn: CN=Administrator,CN=Users,DC=samdom,DC=example,DC=com
>>
>> Rowland
>
> You're right, this works here too:
> ldapsearch -H ldaps://dc00.ad.lasthome.solace.krynn:636 -x -W -D
> "raistlin at ad.lasthome.solace.krynn" -b
> "dc=ad,dc=lasthome,dc=solace,dc=krynn"
> 'memberof:1.2.840.113556.1.4.1941:=cn=Domain
> Admins,CN=Users,dc=ad,dc=lasthome,dc=solace,dc=krynn'|grep 'dn:'
> Enter LDAP Password:
>...
2018 May 03
2
unexplained Replication failures...?
...l cannot get
automatic replication to work:
root at dc00 ~]# samba-tool drs showrepl
Krynn\DC00
DSA Options: 0x00000001
DSA object GUID: 204cb904-754b-4457-af09-9347f8714006
DSA invocationId: b72fc409-bf9a-45e2-a623-0e668386536a
==== INBOUND NEIGHBORS ====
DC=ForestDnsZones,DC=ad,DC=lasthome,DC=solace,DC=krynn
Krynn\DC01 via RPC
DSA object GUID: 9ac5b74a-383a-4336-9c5d-978b45bad9c9
Last attempt @ Thu May 3 18:50:52 2018 EDT failed, result 87 (WERR_INVALID_PARAMETER)
4 consecutive failure(s).
Last success @ NTTIME(0)...
2019 Jan 22
2
dbtool --cross-ncs and undeletable errors..
...this.. How do I fix those errors?
[root at dc00 ~]# samba-tool dbcheck --cross-ncs --fix --yes
Checking 3574 objects
ERROR: no target object found for GUID component for link fromServer in
object
CN=4b3f95b1-7774-42cf-8bc0-755c7d29f6cc,CN=LostAndFoundConfig,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
- <GUID=c8bf60b8-c3b9-442f-a330-d706221bc889>;CN=NTDS
Settings\0ADEL:c8bf60b8-c3b9-442f-a330-d706221bc889,CN=DC02\0ADEL:53a02791-a186-4a2f-aef9-6e180b814d8a,CN=Servers,CN=Krynn,CN=Sites,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
ERROR: target DN is deleted for fromServe...
2020 Aug 21
2
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
On 21/08/2020 20:08, Rowland penny via samba wrote:
> On 21/08/2020 19:28, Vincent S. Cojot via samba wrote:
>>
>> Hi everyone,
>>
>> I have a working Samba AD/DC (4.12.6 on RHEL7.8) setup I'm trying to
>> use with OpenShift (a container platform to which RedHat contributes
>> - aka OCP). I'm also not too skilled on LDAP even though I've been
2019 Jan 22
2
dbtool --cross-ncs and undeletable errors..
...[root at dc00 ~]# samba-tool dbcheck --cross-ncs --fix --yes
>> Checking 3574 objects
>> ERROR: no target object found for GUID component for link fromServer
>> in object
>> CN=4b3f95b1-7774-42cf-8bc0-755c7d29f6cc,CN=LostAndFoundConfig,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
>> - <GUID=c8bf60b8-c3b9-442f-a330-d706221bc889>;CN=NTDS
>> Settings\0ADEL:c8bf60b8-c3b9-442f-a330-d706221bc889,CN=DC02\0ADEL:53a02791-a186-4a2f-aef9-6e180b814d8a,CN=Servers,CN=Krynn,CN=Sites,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
>> ERROR: target...
2020 Aug 21
2
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...a wrote:
> Hi Rowland,
>
> First of all, thank you for taking the time to help me.
> I tried your suggestion and all results came up empty.
>
> Then I did a few lapdsearch(es) and found this:
>
> 1) This query returns two users:
> ldapsearch -H ldaps://dc00.ad.lasthome.solace.krynn:636 -x -W -D
> "raistlin at ad.lasthome.solace.krynn" -b
> "dc=ad,dc=lasthome,dc=solace,dc=krynn"
> 'memberOf:1.2.840.113556.1.4.1941:=cn=Domain
> Admins,CN=Users,dc=ad,dc=lasthome,dc=solace,dc=krynn'
>
> 2) This query returns no users (&quo...
2020 Aug 21
0
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...mdom,DC=example,DC=com
>>> dn: CN=dhcpduser,CN=Users,DC=samdom,DC=example,DC=com
>>> dn: CN=Administrator,CN=Users,DC=samdom,DC=example,DC=com
>>>
>>> Rowland
>>
>> You're right, this works here too:
>> ldapsearch -H ldaps://dc00.ad.lasthome.solace.krynn:636 -x -W -D
>> "raistlin at ad.lasthome.solace.krynn" -b
>> "dc=ad,dc=lasthome,dc=solace,dc=krynn"
>> 'memberof:1.2.840.113556.1.4.1941:=cn=Domain
>> Admins,CN=Users,dc=ad,dc=lasthome,dc=solace,dc=krynn'|grep 'dn:'
>> Ente...
2020 Aug 22
0
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...;>
>> First of all, thank you for taking the time to help me.
>> I tried your suggestion and all results came up empty.
>>
>> Then I did a few lapdsearch(es) and found this:
>>
>> 1) This query returns two users:
>> ldapsearch -H ldaps://dc00.ad.lasthome.solace.krynn:636 -x -W -D
>> "raistlin at ad.lasthome.solace.krynn" -b
>> "dc=ad,dc=lasthome,dc=solace,dc=krynn"
>> 'memberOf:1.2.840.113556.1.4.1941:=cn=Domain
>> Admins,CN=Users,dc=ad,dc=lasthome,dc=solace,dc=krynn'
>>
>> 2) This query ret...
2018 Dec 06
5
RHEL7/Centos7 with Samba AD
...omain.
The most important part was that the RHEL7 hosts wouldn't be heavily
modified, except for the two AD DCs which run a custom build of Samba, of
course.
For sssd, I used the following (customized file):
------------------------------------------------------
[sssd]
domains = ad.lasthome.solace.krynn
config_file_version = 2
services = nss, pam, pac
[domain/ad.lasthome.solace.krynn]
id_provider = ad
auth_provider = ad
access_provider = ad
chpass_provider = ad
ad_gpo_access_control = disabled
override_gid = 100
ad_domain = ad.lasthome.solace.krynn
krb5_realm = AD.LASTHOME.SOLACE.KRYNN
r...
2019 Jan 22
0
dbtool --cross-ncs and undeletable errors..
...rors?
>
> [root at dc00 ~]# samba-tool dbcheck --cross-ncs --fix --yes
> Checking 3574 objects
> ERROR: no target object found for GUID component for link fromServer
> in object
> CN=4b3f95b1-7774-42cf-8bc0-755c7d29f6cc,CN=LostAndFoundConfig,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
> - <GUID=c8bf60b8-c3b9-442f-a330-d706221bc889>;CN=NTDS
> Settings\0ADEL:c8bf60b8-c3b9-442f-a330-d706221bc889,CN=DC02\0ADEL:53a02791-a186-4a2f-aef9-6e180b814d8a,CN=Servers,CN=Krynn,CN=Sites,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
> ERROR: target DN is delete...
1999 Jul 25
1
Two Machines and Samba
...nect connect to through loopback to the server with smbclient
-L <Linux box IP>, even though I set the smb.conf file to accept 127.
host. Here might be a useful snip of my log.nmb file:
[1999/07/24 13:42:56, 0]
nmbd/nmbd_become_dmb.c:become_domain_master_stage2(118)
*****
Samba server SOLACE is now a domain master browser for workgroup SADNESS
on subnet 192.168.255.255
*****
[1999/07/24 13:42:57, 0] nmbd/nmbd_packets.c:process_browse_packet(1040)
process_browse_packet: Discarding datagram from IP 192.168.255.255.
Source name SOLACE<00> is one of our names
!
[1999/07/24 1...
2019 Jun 10
6
please confirm: sssd not a good idea :)
On 08/06/2019 21:32, Rowland penny via samba wrote:
> On 08/06/2019 16:24, Uwe Laverenz via samba wrote:
>> Hi all,
>>
>> when you join a linux server to an active directory with "realm" it
>> uses "sssd" as default. This works well as long as you just want to
>> be a simple domain member.
>>
>> As soon as you want a real member
2020 Aug 21
3
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
.../examples.openshift.pub/authentication/activedirectory-ldap
Thanks for reading,
Vincent
-------------- next part --------------
# oc adm groups sync --sync-config=krynn-ad-sync-config.yaml --confirm --whitelist=krynn_group_list.txt
kind: LDAPSyncConfig
apiVersion: v1
url: ldap://dc00.ad.lasthome.solace.krynn:389
insecure: false
ca: "KrynnAD.pem"
bindDN: "CN=openshift,CN=Users,DC=ad,DC=lasthome,DC=solace,DC=krynn"
bindPassword: "OBFUSCATED"
groupUIDNameMapping:
"CN=Administrators,CN=Users,DC=ad,DC=lasthome,DC=solace,DC=krynn": openshift_admins
"...
2019 Jan 22
0
dbtool --cross-ncs and undeletable errors..
...amba-tool dbcheck --cross-ncs --fix --yes
> >> Checking 3574 objects
> >> ERROR: no target object found for GUID component for link
> >> fromServer in object
> >> CN=4b3f95b1-7774-42cf-8bc0-755c7d29f6cc,CN=LostAndFoundConfig,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
> >> - <GUID=c8bf60b8-c3b9-442f-a330-d706221bc889>;CN=NTDS
> >> Settings\0ADEL:c8bf60b8-c3b9-442f-a330-d706221bc889,CN=DC02\0ADEL:53a02791-a186-4a2f-aef9-6e180b814d8a,CN=Servers,CN=Krynn,CN=Sites,CN=Configuration,DC=ad,DC=lasthome,DC=solace,DC=krynn
> >>...
2019 Jun 10
3
please confirm: sssd not a good idea :)
...t at cojot.name wrote:
>
> There is probably some amount of redtape on this but AFAIK it works
> fine for me: My RHEL7.6 hypervisors are joined to my AD DC 4.10.4 VMs
> through use of realm '(and thus sssd):
>
> Here's a RHEL7.6 client:
> # realm list
> ad.lasthome.solace.krynn
> ? type: kerberos
> ? realm-name: AD.LASTHOME.SOLACE.KRYNN
> ? domain-name: ad.lasthome.solace.krynn
> ? configured: kerberos-member
> ? server-software: active-directory
> ? client-software: sssd
> ? required-package: oddjob
> ? required-package: oddjob-mkhomedir
&g...
2019 Jun 12
0
please confirm: sssd not a good idea :)
...> There is probably some amount of redtape on this but AFAIK it works
> > fine for me: My RHEL7.6 hypervisors are joined to my AD DC 4.10.4 VMs
> > through use of realm '(and thus sssd):
> >
> > Here's a RHEL7.6 client:
> > # realm list
> > ad.lasthome.solace.krynn
> > type: kerberos
> > realm-name: AD.LASTHOME.SOLACE.KRYNN
> > domain-name: ad.lasthome.solace.krynn
> > configured: kerberos-member
> > server-software: active-directory
> > client-software: sssd
> > required-package: oddjob
> >...
2019 Jun 10
0
please confirm: sssd not a good idea :)
There is probably some amount of redtape on this but AFAIK it works fine
for me: My RHEL7.6 hypervisors are joined to my AD DC 4.10.4 VMs through
use of realm '(and thus sssd):
Here's a RHEL7.6 client:
# realm list
ad.lasthome.solace.krynn
type: kerberos
realm-name: AD.LASTHOME.SOLACE.KRYNN
domain-name: ad.lasthome.solace.krynn
configured: kerberos-member
server-software: active-directory
client-software: sssd
required-package: oddjob
required-package: oddjob-mkhomedir
required-package: sssd
requi...
2018 May 04
0
unexplained Replication failures...?
...t;
> root at dc00 ~]# samba-tool drs showrepl
> Krynn\DC00
> DSA Options: 0x00000001
> DSA object GUID: 204cb904-754b-4457-af09-9347f8714006
> DSA invocationId: b72fc409-bf9a-45e2-a623-0e668386536a
>
> ==== INBOUND NEIGHBORS ====
>
> DC=ForestDnsZones,DC=ad,DC=lasthome,DC=solace,DC=krynn
> Krynn\DC01 via RPC
> DSA object GUID: 9ac5b74a-383a-4336-9c5d-978b45bad9c9
> Last attempt @ Thu May 3 18:50:52 2018 EDT failed,
> result 87 (WERR_INVALID_PARAMETER)
> 4 consecutive failure(s).
> L...
2012 Jan 12
3
remoting ESS/R with tramp
......done
>>> > trying to (re)start process R for language S ...
>>> followed by the same minibuffer prompt and default response (but
>>> no error message or buffer=*ESS-errors*).
Rodney Sparapani Thu, 12 Jan 2012 12:09:18 -0600 (rearranged)
>> This may be no solace, but it just works for me out of the box.
It's comforting in that it validates my belief that this *should* work.
(And also that some ESS docs, e.g.,
http://ess.r-project.org/Manual/ess.html#ESS-processes-on-Remote-Computers
need updating. I mean, tramp's been part of GNU emacs since .....