Bug 1695125
Summary: | [RFE] dns-check-system-records would be _very_ helpful | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Oliver Falk <ofalk> |
Component: | ipa-healthcheck | Assignee: | Rob Crittenden <rcritten> |
Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | --- | CC: | afarley, fcami, fhanzelk, ksiddiqu, mkosek, pcech, pvoborni, rcritten, sumenon, tscherf |
Target Milestone: | rc | Keywords: | FutureFeature, TestCaseProvided |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | ipa-healthcheck-0.4-1 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-28 15:43:29 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Oliver Falk
2019-04-02 14:21:47 UTC
Upstream ticket: https://pagure.io/freeipa/issue/7871 Moving this to RHEL 8 Fixed upstream in master: 95dbb7ff70d686f93a0230532c02eb8969ab8a16 This checks the equivalent of: ipa dns-update-system-records --dry-run It only checks the first resolver that answers on the current system. Verified the bug using ipa-healthcheck-0.4-3.module+el8.2.0+5089+8260dc50.noarch. [root@master yum.repos.d]# cat /etc/redhat-release Red Hat Enterprise Linux release 8.2 Beta (Ootpa) [root@master ~]# rpm -q ipa-healthcheck ipa-healthcheck-0.4-3.module+el8.2.0+5089+8260dc50.noarch Scenario1: IPA server with --setup-dns [root@master ~]# ipa-healthcheck --source ipahealthcheck.ipa.idns [ { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "e03f05a8-0d84-4849-92aa-fc9abfbf6689", "when": "20200113115950Z", "duration": "0.021425", "kw": { "key": "_ldap._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "52bf2904-73ce-4117-bf77-26873e00b965", "when": "20200113115950Z", "duration": "0.022131", "kw": { "key": "_kerberos._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "eaf16eb1-849c-427b-89f3-7ac1da573191", "when": "20200113115950Z", "duration": "0.022802", "kw": { "key": "_kerberos._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "883ae1e5-13df-40fe-a1b1-beed8ef8b8cd", "when": "20200113115950Z", "duration": "0.023477", "kw": { "key": "_kerberos-master._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "05cfa1ef-f2f8-46f5-86d6-d3caee35cc8e", "when": "20200113115950Z", "duration": "0.024152", "kw": { "key": "_kerberos-master._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "e96fe767-06c0-40ff-812f-025a49ce91cd", "when": "20200113115950Z", "duration": "0.024820", "kw": { "key": "_kpasswd._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "1c39fd08-78d7-41a4-988f-5ff3dc39925f", "when": "20200113115950Z", "duration": "0.025489", "kw": { "key": "_kpasswd._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "6e98ee9c-7487-422b-bc42-e5db4ba9f5bb", "when": "20200113115950Z", "duration": "0.026072", "kw": { "key": "\"RHEL82.TEST\"" } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "SUCCESS", "uuid": "bbb7e31c-cdd0-4487-bada-b53d766aab33", "when": "20200113115950Z", "duration": "0.026655", "kw": { "key": "192.168.122.110" } } ] === Scenario 2: IPA_Server without dns installed === [root@master ~]# ipa-healthcheck --source ipahealthcheck.ipa.idns [ { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "a463bbc6-87d9-40e0-9ab8-de97e7fd3c3c", "when": "20200113120808Z", "duration": "0.031086", "kw": { "msg": "Expected SRV record missing", "key": "_ldap._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "6d148fdc-3ebe-4342-93bd-10b0c4ba6092", "when": "20200113120808Z", "duration": "0.101711", "kw": { "msg": "Expected SRV record missing", "key": "_kerberos._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "7f04f517-c4bc-4961-9260-4da0e48516d9", "when": "20200113120808Z", "duration": "0.176847", "kw": { "msg": "Expected SRV record missing", "key": "_kerberos._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "69988bad-a798-474d-ac66-3ee999c9b82a", "when": "20200113120808Z", "duration": "0.252321", "kw": { "msg": "Expected SRV record missing", "key": "_kerberos-master._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "027d647b-5265-4184-8a14-cc5326636851", "when": "20200113120808Z", "duration": "0.328644", "kw": { "msg": "Expected SRV record missing", "key": "_kerberos-master._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "3451baae-7cd6-4e20-9c8e-2cc532032d74", "when": "20200113120808Z", "duration": "0.402386", "kw": { "msg": "Expected SRV record missing", "key": "_kpasswd._tcp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "1d6197d9-2dc3-4a9a-9b8a-6c186e9b622a", "when": "20200113120808Z", "duration": "0.477942", "kw": { "msg": "Expected SRV record missing", "key": "_kpasswd._udp.rhel82.test.:master.rhel82.test." } }, { "source": "ipahealthcheck.ipa.idns", "check": "IPADNSSystemRecordsCheck", "result": "WARNING", "uuid": "28346051-8333-4786-8352-6d0c5ff68a49", "when": "20200113120808Z", "duration": "0.632176", "kw": { "msg": "Got {count} ipa-ca A records, expected {expected}", "count": 0, "expected": 1 } } ] clearing needinfo Upstream test master: https://pagure.io/freeipa/c/fd9f1b3d5bf35f8286505d1ed0971a42349a476b Upstream test ipa-4-8: https://pagure.io/freeipa/c/f6171fd6271d8a9de47337ea1852c08980a83302 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1640 |