Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 586670 Details for
Bug 749275
ipa-csreplica-manage list is incorrect when setting agreement between 2 replicas
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Test verification info, stdout for Master and Replica Installs.
test-bz-749275.txt (text/plain), 22.64 KB, created by
Kashyap Chamarthy
on 2012-05-24 16:03:07 UTC
(
hide
)
Description:
Test verification info, stdout for Master and Replica Installs.
Filename:
MIME Type:
Creator:
Kashyap Chamarthy
Created:
2012-05-24 16:03:07 UTC
Size:
22.64 KB
patch
obsolete
>Test: >----- >1] Create Master (neptune) >1.1] Create replica files for Replica-1(mars) and Replica-2(silverbolt). And scp them to respective machines. > >2] Do a replica install with '--setup-ca' on Replica-1 > >3] Do a replica install with '--setup-ca' on Replica-2 > >3.1] Generate a replica file on Replica-2 for Replica-3 > >4] On Replica-3, Do an replica install with '--setup-ca' > >Then run 'ipa-csreplica-manage list' on Master, Replica1, Replica-2, Replica-3 > >#------------------------------------------------------------------------# >[root@neptune /]# ipa-server-install --setup-dns --no-forwarders -r LAB.ENG.PNQ.REDHAT.COM -p Secret123 -P Secret123 -a Secret123 -U >#------------------------------------------------------------------------# >[root@neptune ~]# ipa-replica-prepare -p Secret123 mars.lab.eng.pnq.redhat.com --ip-address 10.65.201.42 >Preparing replica for mars.lab.eng.pnq.redhat.com from neptune.lab.eng.pnq.redhat.com >Creating SSL certificate for the Directory Server >Creating SSL certificate for the dogtag Directory Server >Creating SSL certificate for the Web Server >Exporting RA certificate >Copying additional files >Finalizing configuration >Packaging replica information into /var/lib/ipa/replica-info-mars.lab.eng.pnq.redhat.com.gpg >Adding DNS records for mars.lab.eng.pnq.redhat.com >Using reverse zone 201.65.10.in-addr.arpa. >[root@neptune ~]# >#------------------------------------------------------------------------# >[root@neptune ~]# ipa-replica-prepare -p Secret123 silverbolt.lab.eng.pnq.redhat.com --ip-address 10.65.201.99 >Preparing replica for silverbolt.lab.eng.pnq.redhat.com from neptune.lab.eng.pnq.redhat.com >Creating SSL certificate for the Directory Server >Creating SSL certificate for the dogtag Directory Server >Creating SSL certificate for the Web Server >Exporting RA certificate >Copying additional files >Finalizing configuration >Packaging replica information into /var/lib/ipa/replica-info-silverbolt.lab.eng.pnq.redhat.com.gpg >Adding DNS records for silverbolt.lab.eng.pnq.redhat.com >Using reverse zone 201.65.10.in-addr.arpa. >[root@neptune ~]# >#------------------------------------------------------------------------# >[root@neptune /]# scp /var/lib/ipa/replica-info-mars.lab.eng.pnq.redhat.com.gpg root@mars.lab.eng.pnq.redhat.com:/var/lib/ipa/ >Error looking up public keys >root@mars.lab.eng.pnq.redhat.com's password: >replica-info-mars.lab.eng.pnq.redhat.com.gpg 100% 29KB 28.8KB/s 00:00 >[root@neptune /]# >#------------------------------------------------------------------------# >[root@neptune ~]# scp /var/lib/ipa/replica-info-silverbolt.lab.eng.pnq.redhat.com.gpg root@silverbolt.lab.eng.pnq.redhat.com:/var/lib/ipa/ >root@silverbolt.lab.eng.pnq.redhat.com's password: >replica-info-silverbolt.lab.eng.pnq.redhat.com.gpg 100% 29KB 28.9KB/s 00:00 >[root@neptune ~]# >#------------------------------------------------------------------------# > >=> On Replica-1(mars) <= >#------------------------------------------------------------------------# >[root@mars etc]# ipa-replica-install --no-host-dns /var/lib/ipa/replica-info-mars.lab.eng.pnq.redhat.com.gpg >Directory Manager (existing master) password: > >Warning: skipping DNS resolution of host mars.lab.eng.pnq.redhat.com >Run connection check to master >Check connection from replica to remote master 'neptune.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos Kpasswd: TCP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > >The following list of ports use UDP protocol and would need to be >checked manually: > Kerberos KDC: UDP (88): SKIPPED > Kerberos Kpasswd: UDP (464): SKIPPED > >Connection from replica to master is OK. >Start listening on required ports for remote master check >Get credentials to log in to remote master >admin@LAB.ENG.PNQ.REDHAT.COM password: > >Execute check on remote master >Check connection from master to remote replica 'mars.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos KDC: UDP (88): OK > Kerberos Kpasswd: TCP (464): OK > Kerberos Kpasswd: UDP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > >Connection from master to replica is OK. > >Connection check OK >Configuring ntpd > [1/4]: stopping ntpd > [2/4]: writing configuration > [3/4]: configuring ntpd to start on boot > [4/4]: starting ntpd >done configuring ntpd. >Configuring directory server: Estimated time 31 minutes > [1/30]: creating directory server user > [2/30]: creating directory server instance > [3/30]: adding default schema > [4/30]: enabling memberof plugin > [5/30]: enabling referential integrity plugin > [6/30]: enabling winsync plugin > [7/30]: configuring replication version plugin > [8/30]: enabling IPA enrollment plugin > [9/30]: enabling ldapi > [10/30]: configuring uniqueness plugin > [11/30]: configuring uuid plugin > [12/30]: configuring modrdn plugin > [13/30]: enabling entryUSN plugin > [14/30]: configuring lockout plugin > [15/30]: creating indices > [16/30]: configuring ssl for ds instance > [17/30]: configuring certmap.conf > [18/30]: configure autobind for root > [19/30]: configure new location for managed entries > [20/30]: restarting directory server > [21/30]: setting up initial replication >Starting replication, please wait until this has completed. >Update in progress >Update in progress >Update in progress >Update succeeded > [22/30]: adding replication acis > [23/30]: setting Auto Member configuration > [24/30]: enabling S4U2Proxy delegation > [25/30]: initializing group membership > [26/30]: adding master entry > [27/30]: configuring Posix uid/gid generation > [28/30]: enabling compatibility plugin > [29/30]: tuning directory server > [30/30]: configuring directory to start on boot >done configuring dirsrv. >Configuring Kerberos KDC: Estimated time 30 minutes 30 seconds > [1/9]: adding sasl mappings to the directory > [2/9]: writing stash file from DS > [3/9]: configuring KDC > [4/9]: creating a keytab for the directory > [5/9]: creating a keytab for the machine > [6/9]: adding the password extension to the directory > [7/9]: enable GSSAPI for replication > [8/9]: starting the KDC > [9/9]: configuring KDC to start on boot >done configuring krb5kdc. >Configuring kadmin > [1/2]: starting kadmin > [2/2]: configuring kadmin to start on boot >done configuring kadmin. >Configuring ipa_memcached > [1/2]: starting ipa_memcached > [2/2]: configuring ipa_memcached to start on boot >done configuring ipa_memcached. >Configuring the web interface: Estimated time 31 minutes > [1/13]: disabling mod_ssl in httpd > [2/13]: setting mod_nss port to 443 > [3/13]: setting mod_nss password file > [4/13]: enabling mod_nss renegotiate > [5/13]: adding URL rewriting rules > [6/13]: configuring httpd > [7/13]: setting up ssl > [8/13]: publish CA cert > [9/13]: creating a keytab for httpd > [10/13]: clean up any existing httpd ccache > [11/13]: configuring SELinux for httpd > [12/13]: restarting httpd > [13/13]: configuring httpd to start on boot >done configuring httpd. >Applying LDAP updates >Restarting the directory server >Restarting the KDC >Restarting the web server >[root@mars etc]# >#------------------------------------------------------------------------# > >=> On Replica-2 (silverbolt) <= >#------------------------------------------------------------------------# >[root@silverbolt ~]# ipa-replica-install --no-host-dns /var/lib/ipa/replica-info-silverbolt.lab.eng.pnq.redhat.com.gpg --setup-ca >Directory Manager (existing master) password: > >Warning: skipping DNS resolution of host silverbolt.lab.eng.pnq.redhat.com >Run connection check to master >Check connection from replica to remote master 'neptune.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos Kpasswd: TCP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > PKI-CA: Directory Service port (7389): OK > >The following list of ports use UDP protocol and would need to be >checked manually: > Kerberos KDC: UDP (88): SKIPPED > Kerberos Kpasswd: UDP (464): SKIPPED > >Connection from replica to master is OK. >Start listening on required ports for remote master check >Get credentials to log in to remote master >admin@LAB.ENG.PNQ.REDHAT.COM password: > >Execute check on remote master >Check connection from master to remote replica 'silverbolt.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos KDC: UDP (88): OK > Kerberos Kpasswd: TCP (464): OK > Kerberos Kpasswd: UDP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > PKI-CA: Directory Service port (7389): OK > >Connection from master to replica is OK. > >Connection check OK >Configuring ntpd > [1/4]: stopping ntpd > [2/4]: writing configuration > [3/4]: configuring ntpd to start on boot > [4/4]: starting ntpd >done configuring ntpd. >Configuring directory server for the CA: Estimated time 30 minutes 30 seconds > [1/3]: creating directory server user > [2/3]: creating directory server instance > [3/3]: restarting directory server >done configuring pkids. >Configuring certificate server: Estimated time 33 minutes 30 seconds > [1/13]: creating certificate server user > [2/13]: creating pki-ca instance > [3/13]: configuring certificate server instance > [4/13]: disabling nonces > [5/13]: creating RA agent certificate database > [6/13]: importing CA chain to RA certificate database > [7/13]: fixing RA database permissions > [8/13]: setting up signing cert profile > [9/13]: set up CRL publishing > [10/13]: set certificate subject base > [11/13]: enabling Subject Key Identifier > [12/13]: configuring certificate server to start on boot > [13/13]: Configure HTTP to proxy connections >done configuring pki-cad. >Restarting the directory and certificate servers >Configuring directory server: Estimated time 31 minutes > [1/30]: creating directory server user > [2/30]: creating directory server instance > [3/30]: adding default schema > [4/30]: enabling memberof plugin > [5/30]: enabling referential integrity plugin > [6/30]: enabling winsync plugin > [7/30]: configuring replication version plugin > [8/30]: enabling IPA enrollment plugin > [9/30]: enabling ldapi > [10/30]: configuring uniqueness plugin > [11/30]: configuring uuid plugin > [12/30]: configuring modrdn plugin > [13/30]: enabling entryUSN plugin > [14/30]: configuring lockout plugin > [15/30]: creating indices > [16/30]: configuring ssl for ds instance > [17/30]: configuring certmap.conf > [18/30]: configure autobind for root > [19/30]: configure new location for managed entries > [20/30]: restarting directory server > [21/30]: setting up initial replication >Starting replication, please wait until this has completed. >Update in progress >Update in progress >Update in progress >Update succeeded > [22/30]: adding replication acis > [23/30]: setting Auto Member configuration > [24/30]: enabling S4U2Proxy delegation > [25/30]: initializing group membership > [26/30]: adding master entry > [27/30]: configuring Posix uid/gid generation > [28/30]: enabling compatibility plugin > [29/30]: tuning directory server > [30/30]: configuring directory to start on boot >done configuring dirsrv. >Configuring Kerberos KDC: Estimated time 30 minutes 30 seconds > [1/9]: adding sasl mappings to the directory > [2/9]: writing stash file from DS > [3/9]: configuring KDC > [4/9]: creating a keytab for the directory > [5/9]: creating a keytab for the machine > [6/9]: adding the password extension to the directory > [7/9]: enable GSSAPI for replication > [8/9]: starting the KDC > [9/9]: configuring KDC to start on boot >done configuring krb5kdc. >Configuring kadmin > [1/2]: starting kadmin > [2/2]: configuring kadmin to start on boot >done configuring kadmin. >Configuring ipa_memcached > [1/2]: starting ipa_memcached > [2/2]: configuring ipa_memcached to start on boot >done configuring ipa_memcached. >Configuring the web interface: Estimated time 31 minutes > [1/13]: disabling mod_ssl in httpd > [2/13]: setting mod_nss port to 443 > [3/13]: setting mod_nss password file > [4/13]: enabling mod_nss renegotiate > [5/13]: adding URL rewriting rules > [6/13]: configuring httpd > [7/13]: setting up ssl > [8/13]: publish CA cert > [9/13]: creating a keytab for httpd > [10/13]: clean up any existing httpd ccache > [11/13]: configuring SELinux for httpd > [12/13]: restarting httpd > [13/13]: configuring httpd to start on boot >done configuring httpd. >Applying LDAP updates >Restarting the directory server >Restarting the KDC >Restarting the web server >[root@silverbolt ~]# >#------------------------------------------------------------------------# > >=> On Replica-2(silverbolt). Prepare replica for Replica-3(uranus) <= >#------------------------------------------------------------------------# >[root@silverbolt ~]# ipa-replica-prepare -p Secret123 uranus.lab.eng.pnq.redhat.com --ip-address 10.65.201.46 >Preparing replica for uranus.lab.eng.pnq.redhat.com from silverbolt.lab.eng.pnq.redhat.com >Creating SSL certificate for the Directory Server >Creating SSL certificate for the dogtag Directory Server >Creating SSL certificate for the Web Server >Exporting RA certificate >Copying additional files >Finalizing configuration >Packaging replica information into /var/lib/ipa/replica-info-uranus.lab.eng.pnq.redhat.com.gpg >Adding DNS records for uranus.lab.eng.pnq.redhat.com >Using reverse zone 201.65.10.in-addr.arpa. >[root@silverbolt ~]# >#------------------------------------------------------------------------# >[root@silverbolt ~]# scp /var/lib/ipa/replica-info-uranus.lab.eng.pnq.redhat.com.gpg root@uranus.lab.eng.pnq.redhat.com:/var/lib/ipa/ >Error looking up public keys >root@uranus.lab.eng.pnq.redhat.com's password: >replica-info-uranus.lab.eng.pnq.redhat.com.gpg 100% 29KB 28.7KB/s 00:00 >[root@silverbolt ~]# >#------------------------------------------------------------------------# > >=> On Replica-3(uranus) <= >#------------------------------------------------------------------------# >[root@uranus network-scripts]# ipa-replica-install --no-host-dns /var/lib/ipa/replica-info-uranus.lab.eng.pnq.redhat.com.gpg --setup-ca >Directory Manager (existing master) password: > >Warning: skipping DNS resolution of host uranus.lab.eng.pnq.redhat.com >Run connection check to master >Check connection from replica to remote master 'silverbolt.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos Kpasswd: TCP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > PKI-CA: Directory Service port (7389): OK > >The following list of ports use UDP protocol and would need to be >checked manually: > Kerberos KDC: UDP (88): SKIPPED > Kerberos Kpasswd: UDP (464): SKIPPED > >Connection from replica to master is OK. >Start listening on required ports for remote master check >Get credentials to log in to remote master >admin@LAB.ENG.PNQ.REDHAT.COM password: > >Execute check on remote master >Check connection from master to remote replica 'uranus.lab.eng.pnq.redhat.com': > Directory Service: Unsecure port (389): OK > Directory Service: Secure port (636): OK > Kerberos KDC: TCP (88): OK > Kerberos KDC: UDP (88): OK > Kerberos Kpasswd: TCP (464): OK > Kerberos Kpasswd: UDP (464): OK > HTTP Server: Unsecure port (80): OK > HTTP Server: Secure port (443): OK > PKI-CA: Directory Service port (7389): OK > >Connection from master to replica is OK. > >Connection check OK >Configuring ntpd > [1/4]: stopping ntpd > [2/4]: writing configuration > [3/4]: configuring ntpd to start on boot > [4/4]: starting ntpd >done configuring ntpd. >Configuring directory server for the CA: Estimated time 30 minutes 30 seconds > [1/3]: creating directory server user > [2/3]: creating directory server instance > [3/3]: restarting directory server >done configuring pkids. >Configuring certificate server: Estimated time 33 minutes 30 seconds > [1/13]: creating certificate server user > [2/13]: creating pki-ca instance > [3/13]: configuring certificate server instance > [4/13]: disabling nonces > [5/13]: creating RA agent certificate database > [6/13]: importing CA chain to RA certificate database > [7/13]: fixing RA database permissions > [8/13]: setting up signing cert profile > [9/13]: set up CRL publishing > [10/13]: set certificate subject base > [11/13]: enabling Subject Key Identifier > [12/13]: configuring certificate server to start on boot > [13/13]: Configure HTTP to proxy connections >done configuring pki-cad. >Restarting the directory and certificate servers >Configuring directory server: Estimated time 31 minutes > [1/30]: creating directory server user > [2/30]: creating directory server instance > [3/30]: adding default schema > [4/30]: enabling memberof plugin > [5/30]: enabling referential integrity plugin > [6/30]: enabling winsync plugin > [7/30]: configuring replication version plugin > [8/30]: enabling IPA enrollment plugin > [9/30]: enabling ldapi > [10/30]: configuring uniqueness plugin > [11/30]: configuring uuid plugin > [12/30]: configuring modrdn plugin > [13/30]: enabling entryUSN plugin > [14/30]: configuring lockout plugin > [15/30]: creating indices > [16/30]: configuring ssl for ds instance > [17/30]: configuring certmap.conf > [18/30]: configure autobind for root > [19/30]: configure new location for managed entries > [20/30]: restarting directory server > [21/30]: setting up initial replication >Starting replication, please wait until this has completed. >Update in progress >Update in progress >Update in progress >Update in progress >Update in progress >Update in progress >Update in progress >Update in progress >Update succeeded > [22/30]: adding replication acis > [23/30]: setting Auto Member configuration > [24/30]: enabling S4U2Proxy delegation > [25/30]: initializing group membership > [26/30]: adding master entry > [27/30]: configuring Posix uid/gid generation > [28/30]: enabling compatibility plugin > [29/30]: tuning directory server > [30/30]: configuring directory to start on boot >done configuring dirsrv. >Configuring Kerberos KDC: Estimated time 30 minutes 30 seconds > [1/9]: adding sasl mappings to the directory > [2/9]: writing stash file from DS > [3/9]: configuring KDC > [4/9]: creating a keytab for the directory > [5/9]: creating a keytab for the machine > [6/9]: adding the password extension to the directory > [7/9]: enable GSSAPI for replication > [8/9]: starting the KDC > [9/9]: configuring KDC to start on boot >done configuring krb5kdc. >Configuring kadmin > [1/2]: starting kadmin > [2/2]: configuring kadmin to start on boot >done configuring kadmin. >Configuring ipa_memcached > [1/2]: starting ipa_memcached > [2/2]: configuring ipa_memcached to start on boot >done configuring ipa_memcached. >Configuring the web interface: Estimated time 31 minutes > [1/13]: disabling mod_ssl in httpd > [2/13]: setting mod_nss port to 443 > [3/13]: setting mod_nss password file > [4/13]: enabling mod_nss renegotiate > [5/13]: adding URL rewriting rules > [6/13]: configuring httpd > [7/13]: setting up ssl > [8/13]: publish CA cert > [9/13]: creating a keytab for httpd > [10/13]: clean up any existing httpd ccache > [11/13]: configuring SELinux for httpd > [12/13]: restarting httpd > [13/13]: configuring httpd to start on boot >done configuring httpd. >Applying LDAP updates >Restarting the directory server >Restarting the KDC >Restarting the web server >[root@uranus network-scripts]# >#------------------------------------------------------------------------# > > >On Master >--------- >[root@neptune ~]# ipa-csreplica-manage list -p Secret123 >mars.lab.eng.pnq.redhat.com: CA not configured >neptune.lab.eng.pnq.redhat.com: master >silverbolt.lab.eng.pnq.redhat.com: master >uranus.lab.eng.pnq.redhat.com: master >[root@neptune ~]# > >[root@neptune slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 neptune.lab.eng.pnq.redhat.com >silverbolt.lab.eng.pnq.redhat.com >[root@neptune slapd-LAB-ENG-PNQ-REDHAT-COM]# > > >[root@neptune slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 silverbolt.lab.eng.pnq.redhat.com >neptune.lab.eng.pnq.redhat.com >uranus.lab.eng.pnq.redhat.com >[root@neptune slapd-LAB-ENG-PNQ-REDHAT-COM]# > > >On Replica-1 (mars. This is replica of Master with --setup-ca) >------------ >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 >mars.lab.eng.pnq.redhat.com: CA not configured >neptune.lab.eng.pnq.redhat.com: master >silverbolt.lab.eng.pnq.redhat.com: master >uranus.lab.eng.pnq.redhat.com: master >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# > >(Expected) >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 mars.lab.eng.pnq.redhat.com >Can't contact LDAP server >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# > >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 silverbolt.lab.eng.pnq.redhat.com >neptune.lab.eng.pnq.redhat.com >uranus.lab.eng.pnq.redhat.com >[root@mars slapd-LAB-ENG-PNQ-REDHAT-COM]# > > >On Replica-2 (silverbolt. This is replica of Master with --setup-ca) >------------ >[root@silverbolt ~]# ipa-csreplica-manage list -p Secret123 >mars.lab.eng.pnq.redhat.com: CA not configured >neptune.lab.eng.pnq.redhat.com: master >silverbolt.lab.eng.pnq.redhat.com: master >uranus.lab.eng.pnq.redhat.com: master > >[root@silverbolt slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 silverbolt.lab.eng.pnq.redhat.com >neptune.lab.eng.pnq.redhat.com >uranus.lab.eng.pnq.redhat.com >[root@silverbolt slapd-LAB-ENG-PNQ-REDHAT-COM]# > >[root@silverbolt slapd-LAB-ENG-PNQ-REDHAT-COM]# ipa-csreplica-manage list -p Secret123 uranus.lab.eng.pnq.redhat.com >silverbolt.lab.eng.pnq.redhat.com >[root@silverbolt slapd-LAB-ENG-PNQ-REDHAT-COM]# > > >On Replica-3 (uranus. This is replica of uranus with --setup-ca) >------------ >[root@uranus network-scripts]# ipa-csreplica-manage list -p Secret123 >mars.lab.eng.pnq.redhat.com: CA not configured >neptune.lab.eng.pnq.redhat.com: master >silverbolt.lab.eng.pnq.redhat.com: master >uranus.lab.eng.pnq.redhat.com: master >[root@uranus network-scripts]# > > >[root@uranus network-scripts]# ipa-csreplica-manage list -p Secret123 uranus.lab.eng.pnq.redhat.com >silverbolt.lab.eng.pnq.redhat.com >[root@uranus network-scripts]# > > >[root@uranus network-scripts]# ipa-csreplica-manage list -p Secret123 silverbolt.lab.eng.pnq.redhat.com >neptune.lab.eng.pnq.redhat.com >uranus.lab.eng.pnq.redhat.com >[root@uranus network-scripts]# > > > > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 749275
:
530308
|
530309
| 586670