Bug 1695125
| Summary: | [RFE] dns-check-system-records would be _very_ helpful | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Oliver Falk <ofalk> |
| Component: | ipa-healthcheck | Assignee: | Rob Crittenden <rcritten> |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | --- | CC: | afarley, fcami, fhanzelk, ksiddiqu, mkosek, pcech, pvoborni, rcritten, sumenon, tscherf |
| Target Milestone: | rc | Keywords: | FutureFeature, TestCaseProvided |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ipa-healthcheck-0.4-1 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-04-28 15:43:29 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Oliver Falk
2019-04-02 14:21:47 UTC
Upstream ticket: https://pagure.io/freeipa/issue/7871 Moving this to RHEL 8 Fixed upstream in master: 95dbb7ff70d686f93a0230532c02eb8969ab8a16 This checks the equivalent of: ipa dns-update-system-records --dry-run It only checks the first resolver that answers on the current system. Verified the bug using ipa-healthcheck-0.4-3.module+el8.2.0+5089+8260dc50.noarch.
[root@master yum.repos.d]# cat /etc/redhat-release
Red Hat Enterprise Linux release 8.2 Beta (Ootpa)
[root@master ~]# rpm -q ipa-healthcheck
ipa-healthcheck-0.4-3.module+el8.2.0+5089+8260dc50.noarch
Scenario1: IPA server with --setup-dns
[root@master ~]# ipa-healthcheck --source ipahealthcheck.ipa.idns
[
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "e03f05a8-0d84-4849-92aa-fc9abfbf6689",
"when": "20200113115950Z",
"duration": "0.021425",
"kw": {
"key": "_ldap._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "52bf2904-73ce-4117-bf77-26873e00b965",
"when": "20200113115950Z",
"duration": "0.022131",
"kw": {
"key": "_kerberos._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "eaf16eb1-849c-427b-89f3-7ac1da573191",
"when": "20200113115950Z",
"duration": "0.022802",
"kw": {
"key": "_kerberos._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "883ae1e5-13df-40fe-a1b1-beed8ef8b8cd",
"when": "20200113115950Z",
"duration": "0.023477",
"kw": {
"key": "_kerberos-master._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "05cfa1ef-f2f8-46f5-86d6-d3caee35cc8e",
"when": "20200113115950Z",
"duration": "0.024152",
"kw": {
"key": "_kerberos-master._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "e96fe767-06c0-40ff-812f-025a49ce91cd",
"when": "20200113115950Z",
"duration": "0.024820",
"kw": {
"key": "_kpasswd._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "1c39fd08-78d7-41a4-988f-5ff3dc39925f",
"when": "20200113115950Z",
"duration": "0.025489",
"kw": {
"key": "_kpasswd._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "6e98ee9c-7487-422b-bc42-e5db4ba9f5bb",
"when": "20200113115950Z",
"duration": "0.026072",
"kw": {
"key": "\"RHEL82.TEST\""
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "SUCCESS",
"uuid": "bbb7e31c-cdd0-4487-bada-b53d766aab33",
"when": "20200113115950Z",
"duration": "0.026655",
"kw": {
"key": "192.168.122.110"
}
}
]
=== Scenario 2: IPA_Server without dns installed ===
[root@master ~]# ipa-healthcheck --source ipahealthcheck.ipa.idns
[
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "a463bbc6-87d9-40e0-9ab8-de97e7fd3c3c",
"when": "20200113120808Z",
"duration": "0.031086",
"kw": {
"msg": "Expected SRV record missing",
"key": "_ldap._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "6d148fdc-3ebe-4342-93bd-10b0c4ba6092",
"when": "20200113120808Z",
"duration": "0.101711",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "7f04f517-c4bc-4961-9260-4da0e48516d9",
"when": "20200113120808Z",
"duration": "0.176847",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "69988bad-a798-474d-ac66-3ee999c9b82a",
"when": "20200113120808Z",
"duration": "0.252321",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos-master._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "027d647b-5265-4184-8a14-cc5326636851",
"when": "20200113120808Z",
"duration": "0.328644",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos-master._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "3451baae-7cd6-4e20-9c8e-2cc532032d74",
"when": "20200113120808Z",
"duration": "0.402386",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kpasswd._tcp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "1d6197d9-2dc3-4a9a-9b8a-6c186e9b622a",
"when": "20200113120808Z",
"duration": "0.477942",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kpasswd._udp.rhel82.test.:master.rhel82.test."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "28346051-8333-4786-8352-6d0c5ff68a49",
"when": "20200113120808Z",
"duration": "0.632176",
"kw": {
"msg": "Got {count} ipa-ca A records, expected {expected}",
"count": 0,
"expected": 1
}
}
]
clearing needinfo Upstream test master: https://pagure.io/freeipa/c/fd9f1b3d5bf35f8286505d1ed0971a42349a476b Upstream test ipa-4-8: https://pagure.io/freeipa/c/f6171fd6271d8a9de47337ea1852c08980a83302 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1640 |