FreeIPA その3 IdMサーバの初期設定~動作確認~ログ管理の調査のつづき

■サービスと起動

FreeIPA その1 IdMサーバのインストールipa-serverとipa-server-dnsをインストールした際に、依存してるパッケージも含めて全部で198個のパッケージがインストールされたが、これらのパッケージの中でsystemdユニットファイルを含むパッケージとユニットファイル名は下記の通り。

-------- 389-ds-base ---------
/usr/lib/systemd/system/dirsrv@.service
-------- bind ---------
/usr/lib/systemd/system/named-setup-rndc.service
/usr/lib/systemd/system/named.service
-------- bind-pkcs11 ---------
/usr/lib/systemd/system/named-pkcs11.service
-------- hsqldb ---------
/usr/lib/systemd/system/hsqldb.service
-------- httpd ---------
/usr/lib/systemd/system/htcacheclean.service
/usr/lib/systemd/system/httpd.service
-------- ipa-server-common ---------
/usr/lib/systemd/system/ipa-custodia.service
-------- krb5-server ---------
/usr/lib/systemd/system/kadmin.service
/usr/lib/systemd/system/kprop.service
/usr/lib/systemd/system/krb5kdc.service
-------- opencryptoki ---------
/usr/lib/systemd/system/pkcsslotd.service
-------- opendnssec ---------
/usr/lib/systemd/system/ods-enforcerd.service
/usr/lib/systemd/system/ods-signerd.service
-------- pki-server ---------
/usr/lib/systemd/system/pki-tomcatd-nuxwdog@.service
/usr/lib/systemd/system/pki-tomcatd@.service
-------- sssd-dbus ---------
/usr/lib/systemd/system/sssd-ifp.service
-------- tomcat ---------
/usr/lib/systemd/system/tomcat.service
/usr/lib/systemd/system/tomcat@.service
-------- certmonger ---------
/usr/lib/systemd/system/certmonger.service
-------- dbus ---------
/usr/lib/systemd/system/dbus.service
/usr/lib/systemd/system/messagebus.service
/usr/lib/systemd/system/multi-user.target.wants/dbus.service
-------- sssd-common ---------
/usr/lib/systemd/system/sssd-autofs.service
/usr/lib/systemd/system/sssd-nss.service
/usr/lib/systemd/system/sssd-pac.service
/usr/lib/systemd/system/sssd-pam.service
/usr/lib/systemd/system/sssd-secrets.service
/usr/lib/systemd/system/sssd-ssh.service
/usr/lib/systemd/system/sssd-sudo.service
/usr/lib/systemd/system/sssd.service

 

・ユニットファイルの中身

------- /usr/lib/systemd/system/dirsrv@.service --------

# you usually do not want to edit this file - instead, edit the
# /etc/sysconfig/dirsrv.systemd file instead - otherwise,
# do not edit this file in /lib/systemd/system - instead, do the following:
# cp /lib/systemd/system/dirsrv\@.service /etc/systemd/system/dirsrv\@.service
# mkdir -p /etc/systemd/system/dirsrv.target.wants
# edit /etc/systemd/system/dirsrv\@.service - uncomment the LimitNOFILE=8192 line
# where %i is the name of the instance
# you may already have a symlink in
# /etc/systemd/system/dirsrv.target.wants/dirsrv@%i.service pointing to
# /lib/systemd/system/dirsrv\@.service - you will have to change it to link
# to /etc/systemd/system/dirsrv\@.service instead
# ln -s /etc/systemd/system/dirsrv\@.service /etc/systemd/system/dirsrv.target.wants/dirsrv@%i.service
# systemctl daemon-reload
# systemctl (re)start dirsrv.target
[Unit]
Description=389 Directory Server %i.
PartOf=dirsrv.target
After=chronyd.service ntpd.service network-online.target syslog.target
Before=radiusd.service
[Service]
Type=notify
NotifyAccess=all
TimeoutStartSec=0
TimeoutStopSec=600
EnvironmentFile=/etc/sysconfig/dirsrv
EnvironmentFile=/etc/sysconfig/dirsrv-%i
PIDFile=/var/run/dirsrv/slapd-%i.pid
ExecStartPre=/usr/sbin/ds_systemd_ask_password_acl /etc/dirsrv/slapd-%i/dse.ldif
ExecStart=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-%i -i /var/run/dirsrv/slapd-%i.pid
# Hardening options:
# PrivateDevices=true
# ProtectSystem=true
# ProtectHome=true
# PrivateTmp=true
# if you need to set other directives e.g. LimitNOFILE=8192
# set them in this file
.include /etc/sysconfig/dirsrv.systemd
[Install]
WantedBy=multi-user.target

------- /usr/lib/systemd/system/named-setup-rndc.service --------

[Unit]
Description=Generate rndc key for BIND (DNS)
[Service]
Type=oneshot
ExecStart=/usr/libexec/generate-rndc-key.sh

------- /usr/lib/systemd/system/named.service --------

[Unit]
Description=Berkeley Internet Name Domain (DNS)
Wants=nss-lookup.target
Wants=named-setup-rndc.service
Before=nss-lookup.target
After=network.target
After=named-setup-rndc.service
[Service]
Type=forking
Environment=NAMEDCONF=/etc/named.conf
EnvironmentFile=-/etc/sysconfig/named
Environment=KRB5_KTNAME=/etc/named.keytab
PIDFile=/run/named/named.pid
ExecStartPre=/bin/bash -c 'if [ ! "$DISABLE_ZONE_CHECKING" == "yes" ]; then /usr/sbin/named-checkconf -z "$NAMEDCONF"; else echo "Checking of zone files is disabled"; fi'
ExecStart=/usr/sbin/named -u named -c ${NAMEDCONF} $OPTIONS
ExecReload=/bin/sh -c '/usr/sbin/rndc reload > /dev/null 2>&1 || /bin/kill -HUP $MAINPID'
ExecStop=/bin/sh -c '/usr/sbin/rndc stop > /dev/null 2>&1 || /bin/kill -TERM $MAINPID'
PrivateTmp=true
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/named-pkcs11.service --------
 

[Unit]

Description=Berkeley Internet Name Domain (DNS) with native PKCS#11
Wants=nss-lookup.target
Wants=named-setup-rndc.service
Before=nss-lookup.target
After=network.target
After=named-setup-rndc.service
[Service]
Type=forking
Environment=NAMEDCONF=/etc/named.conf
EnvironmentFile=-/etc/sysconfig/named
Environment=KRB5_KTNAME=/etc/named.keytab
PIDFile=/run/named/named.pid
ExecStartPre=/bin/bash -c 'if [ ! "$DISABLE_ZONE_CHECKING" == "yes" ]; then /usr/sbin/named-checkconf -z "$NAMEDCONF"; else echo "Checking of zone files is disabled"; fi'
ExecStart=/usr/sbin/named-pkcs11 -u named -c ${NAMEDCONF} $OPTIONS
ExecReload=/bin/sh -c '/usr/sbin/rndc reload > /dev/null 2>&1 || /bin/kill -HUP $MAINPID'
ExecStop=/bin/sh -c '/usr/sbin/rndc stop > /dev/null 2>&1 || /bin/kill -TERM $MAINPID'
PrivateTmp=true
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/hsqldb.service --------
 

[Unit]
Description=HyperSQL Database Engine
After=network.target
[Service]
Type=simple
User=hsqldb
Group=hsqldb
ExecStart=/usr/lib/hsqldb/hsqldb-wrapper
ExecStartPost=/usr/lib/hsqldb/hsqldb-post
ExecStop=/usr/lib/hsqldb/hsqldb-stop
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/htcacheclean.service --------
 

[Unit]
Description=Disk Cache Cleaning Daemon for Apache HTTP Server
After=httpd.service
Documentation=man:htcacheclean(8)
[Service]
Type=forking
User=apache
PIDFile=/run/httpd/htcacheclean/pid
EnvironmentFile=/etc/sysconfig/htcacheclean
ExecStart=/usr/sbin/htcacheclean -P /run/httpd/htcacheclean/pid -d $INTERVAL -p $CACHE_ROOT -l $LIMIT $OPTIONS


------- /usr/lib/systemd/system/httpd.service --------
 

[Unit]
Description=The Apache HTTP Server
After=network.target remote-fs.target nss-lookup.target
Documentation=man:httpd(8)
Documentation=man:apachectl(8)
[Service]
Type=notify
EnvironmentFile=/etc/sysconfig/httpd
ExecStart=/usr/sbin/httpd $OPTIONS -DFOREGROUND
ExecReload=/usr/sbin/httpd $OPTIONS -k graceful
ExecStop=/bin/kill -WINCH ${MAINPID}
# We want systemd to give httpd some time to finish gracefully, but still want
# it to kill httpd after TimeoutStopSec if something went wrong during the
# graceful stop. Normally, Systemd sends SIGTERM signal right after the
# ExecStop, which would kill httpd. We are sending useless SIGCONT here to give
# httpd time to finish.
KillSignal=SIGCONT
PrivateTmp=true
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/ipa-custodia.service --------
 

[Unit]
Description=IPA Custodia Service
[Service]
Type=notify
ExecStart=/usr/libexec/ipa/ipa-custodia /etc/ipa/custodia/custodia.conf
PrivateTmp=yes
Restart=on-failure
RestartSec=60s
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/kadmin.service --------
 

[Unit]
Description=Kerberos 5 Password-changing and Administration
Wants=network-online.target
After=syslog.target network.target network-online.target
[Service]
Type=forking
PIDFile=/var/run/kadmind.pid
EnvironmentFile=-/etc/sysconfig/kadmin
ExecStart=/usr/sbin/_kadmind -P /var/run/kadmind.pid $KADMIND_ARGS
ExecReload=/bin/kill -HUP $MAINPID
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/kprop.service --------
 

[Unit]
Description=Kerberos 5 Propagation
Wants=network-online.target
After=syslog.target network.target network-online.target
[Service]
Type=forking
EnvironmentFile=-/etc/sysconfig/kprop
ExecStart=/usr/sbin/_kpropd $KPROPD_ARGS
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/krb5kdc.service --------
 

[Unit]
Description=Kerberos 5 KDC
Wants=network-online.target
After=syslog.target network.target network-online.target
[Service]
Type=forking
PIDFile=/var/run/krb5kdc.pid
EnvironmentFile=-/etc/sysconfig/krb5kdc
ExecStart=/usr/sbin/krb5kdc -P /var/run/krb5kdc.pid $KRB5KDC_ARGS
ExecReload=/bin/kill -HUP $MAINPID
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/pkcsslotd.service --------
 

[Unit]
Description=Daemon which manages cryptographic hardware tokens for the openCryptoki package
After=local-fs.target
[Service]
Type=forking
PIDFile=/var/run/pkcsslotd.pid
ExecStart=/usr/sbin/pkcsslotd
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/ods-enforcerd.service --------
 

[Unit]
Description=OpenDNSSEC Enforcer daemon
After=syslog.target network.target
[Service]
Type=forking
PIDFile=/var/run/opendnssec/enforcerd.pid
EnvironmentFile=-/etc/sysconfig/ods
ExecStart=/usr/sbin/ods-enforcerd $ODS_ENFORCERD_OPT
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/ods-signerd.service --------
 

[Unit]
Description=OpenDNSSEC signer daemon
After=syslog.target network.target ods-enforcerd
[Service]
Type=simple
PIDFile=/var/run/opendnssec/signerd.pid
EnvironmentFile=-/etc/sysconfig/ods
ExecStart=/usr/sbin/ods-signerd -d $ODS_SIGNERD_OPT
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/pki-tomcatd-nuxwdog@.service --------
 

[Unit]
Description=PKI Tomcat Server %i Started by Nuxwdog
PartOf=pki-tomcatd-nuxwdog.target
[Service]
Type=forking
EnvironmentFile=/etc/tomcat/tomcat.conf
Environment="NAME=%i"
Environment="STARTED_BY_SYSTEMD=1"
EnvironmentFile=-/etc/sysconfig/%i
ExecStartPre=/usr/bin/pkidaemon start %i
ExecStart=/bin/nuxwdog -f /etc/pki/%i/nuxwdog.conf
SuccessExitStatus=143
TimeoutStartSec=180
PIDFile=/var/lib/pki/%i/logs/wd-%i.pid


------- /usr/lib/systemd/system/pki-tomcatd@.service --------
 

[Unit]
Description=PKI Tomcat Server %i
PartOf=pki-tomcatd.target
[Service]
Type=simple
EnvironmentFile=/etc/tomcat/tomcat.conf
Environment="NAME=%i"
EnvironmentFile=-/etc/sysconfig/%i
ExecStartPre=/usr/bin/pkidaemon start %i
ExecStart=/usr/libexec/tomcat/server start
ExecStop=/usr/libexec/tomcat/server stop
SuccessExitStatus=143
User=pkiuser
Group=pkiuser


------- /usr/lib/systemd/system/sssd-ifp.service --------
 

[Unit]
Description=SSSD IFP Service responder
Documentation=man:sssd-ifp(5)
After=sssd.service
BindsTo=sssd.service
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
Type=dbus
BusName=org.freedesktop.sssd.infopipe
ExecStart=/usr/libexec/sssd/sssd_ifp --uid 0 --gid 0 --dbus-activated ${DEBUG_LOGGER}
Restart=on-failure


------- /usr/lib/systemd/system/tomcat.service --------
 

# Systemd unit file for default tomcat
#
# To create clones of this service:
# DO NOTHING, use tomcat@.service instead.
[Unit]
Description=Apache Tomcat Web Application Container
After=syslog.target network.target
[Service]
Type=simple
EnvironmentFile=/etc/tomcat/tomcat.conf
Environment="NAME="
EnvironmentFile=-/etc/sysconfig/tomcat
ExecStart=/usr/libexec/tomcat/server start
SuccessExitStatus=143
User=tomcat
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/tomcat@.service --------
 

# Systemd unit file for tomcat instances.
#
# To create clones of this service:
# 0. systemctl enable tomcat@name.service
# 1. create catalina.base directory structure in
#    /var/lib/tomcats/name
# 2. profit.
[Unit]
Description=Apache Tomcat Web Application Container
After=syslog.target network.target
[Service]
Type=simple
EnvironmentFile=/etc/tomcat/tomcat.conf
Environment="NAME=%I"
EnvironmentFile=-/etc/sysconfig/tomcat@%I
ExecStart=/usr/libexec/tomcat/server start
ExecStop=/usr/libexec/tomcat/server stop
SuccessExitStatus=143
User=tomcat
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/certmonger.service --------
 

[Unit]
Description=Certificate monitoring and PKI enrollment
After=syslog.target network.target dbus.service
[Service]
Type=dbus
PIDFile=/var/run/certmonger.pid
EnvironmentFile=-/etc/sysconfig/certmonger
ExecStart=/usr/sbin/certmonger -S -p /var/run/certmonger.pid -n $OPTS
BusName=org.fedorahosted.certmonger
[Install]
WantedBy=multi-user.target


------- /usr/lib/systemd/system/dbus.service --------
 

[Unit]
Description=D-Bus System Message Bus
Documentation=man:dbus-daemon(1)
Requires=dbus.socket
[Service]
ExecStart=/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation
ExecReload=/usr/bin/dbus-send --print-reply --system --type=method_call --dest=org.freedesktop.DBus / org.freedesktop.DBus.ReloadConfig
OOMScoreAdjust=-900


------- /usr/lib/systemd/system/messagebus.service --------
 

[Unit]
Description=D-Bus System Message Bus
Documentation=man:dbus-daemon(1)
Requires=dbus.socket
[Service]
ExecStart=/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation
ExecReload=/usr/bin/dbus-send --print-reply --system --type=method_call --dest=org.freedesktop.DBus / org.freedesktop.DBus.ReloadConfig
OOMScoreAdjust=-900


------- /usr/lib/systemd/system/multi-user.target.wants/dbus.service --------
 

[Unit]
Description=D-Bus System Message Bus
Documentation=man:dbus-daemon(1)
Requires=dbus.socket
[Service]
ExecStart=/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation
ExecReload=/usr/bin/dbus-send --print-reply --system --type=method_call --dest=org.freedesktop.DBus / org.freedesktop.DBus.ReloadConfig
OOMScoreAdjust=-900


------- /usr/lib/systemd/system/sssd-autofs.service --------
 

[Unit]
Description=SSSD AutoFS Service responder
Documentation=man:sssd.conf(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-autofs.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStartPre=-/bin/chown sssd:sssd /var/log/sssd/sssd_autofs.log
ExecStart=/usr/libexec/sssd/sssd_autofs ${DEBUG_LOGGER} --socket-activated
Restart=on-failure
User=sssd
Group=sssd
PermissionsStartOnly=true


------- /usr/lib/systemd/system/sssd-nss.service --------
 

[Unit]
Description=SSSD NSS Service responder
Documentation=man:sssd.conf(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-nss.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStart=/usr/libexec/sssd/sssd_nss ${DEBUG_LOGGER} --socket-activated
Restart=on-failure


------- /usr/lib/systemd/system/sssd-pac.service --------
 

[Unit]
Description=SSSD PAC Service responder
Documentation=man:sssd.conf(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-pac.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStartPre=-/bin/chown sssd:sssd /var/log/sssd/sssd_pac.log
ExecStart=/usr/libexec/sssd/sssd_pac ${DEBUG_LOGGER} --socket-activated
Restart=on-failure
User=sssd
Group=sssd
PermissionsStartOnly=true


------- /usr/lib/systemd/system/sssd-pam.service --------
 

[Unit]
Description=SSSD PAM Service responder
Documentation=man:sssd.conf(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-pam.socket sssd-pam-priv.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStartPre=-/bin/chown sssd:sssd /var/log/sssd/sssd_pam.log
ExecStart=/usr/libexec/sssd/sssd_pam ${DEBUG_LOGGER} --socket-activated
Restart=on-failure
User=sssd
Group=sssd
PermissionsStartOnly=true


------- /usr/lib/systemd/system/sssd-secrets.service --------
 

[Unit]
Description=SSSD Secrets Service responder
Documentation=man:sssd-secrets(5)
Requires=sssd-secrets.socket
After=sssd-secrets.socket
[Install]
Also=sssd-secrets.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
ExecStart=/usr/libexec/sssd/sssd_secrets --uid 0 --gid 0 ${DEBUG_LOGGER}


------- /usr/lib/systemd/system/sssd-ssh.service --------
 

[Unit]
Description=SSSD SSH Service responder
Documentation=man:sssd.conf(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-ssh.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStartPre=-/bin/chown sssd:sssd /var/log/sssd/sssd_ssh.log
ExecStart=/usr/libexec/sssd/sssd_ssh ${DEBUG_LOGGER} --socket-activated
Restart=on-failure
User=sssd
Group=sssd
PermissionsStartOnly=true


------- /usr/lib/systemd/system/sssd-sudo.service --------
 

[Unit]
Description=SSSD Sudo Service responder
Documentation=man:sssd.conf(5) man:sssd-sudo(5)
After=sssd.service
BindsTo=sssd.service
RefuseManualStart=true
[Install]
Also=sssd-sudo.socket
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStartPre=-/bin/chown sssd:sssd /var/log/sssd/sssd_sudo.log
ExecStart=/usr/libexec/sssd/sssd_sudo --socket-activated
Restart=on-failure
User=sssd
Group=sssd
PermissionsStartOnly=true


------- /usr/lib/systemd/system/sssd.service --------
 

[Unit]
Description=System Security Services Daemon
# SSSD must be running before we permit user sessions
Before=systemd-user-sessions.service nss-user-lookup.target
Wants=nss-user-lookup.target
[Service]
Environment=DEBUG_LOGGER=--logger=files
EnvironmentFile=-/etc/sysconfig/sssd
ExecStart=/usr/sbin/sssd -i ${DEBUG_LOGGER}
Type=notify
NotifyAccess=main
PIDFile=/var/run/sssd.pid
[Install]
WantedBy=multi-user.target

 

FreeIPA その2 IdMクライアントのインストールのつづき

■動作確認

5.3. IDM コマンドラインユーティリティー

[centos7]$ ipa user-add dagyah1
First name: dagyah
Last name: one
--------------------
Added user "dagyah1"
--------------------
  User login: dagyah1
  First name: dagyah
  Last name: one
  Full name: dagyah one
  Display name: dagyah one
  Initials: do
  Home directory: /home/dagyah1
  GECOS: dagyah one
  Login shell: /bin/sh
  Principal name: dagyah1@DAGYAH.COM
  Principal alias: dagyah1@DAGYAH.COM
  Email address: dagyah1@dagyah.com
  UID: 1942000001
  GID: 1942000001
  Password: False
  Member of groups: ipausers
  Kerberos keys available: False

[centos7]$ ipa user-add dagyah2
First name: dagyah
Last name: two
--------------------
Added user "dagyah2"
--------------------
  User login: dagyah2
  First name: dagyah
  Last name: two
  Full name: dagyah two
  Display name: dagyah two
  Initials: dt
  Home directory: /home/dagyah2
  GECOS: dagyah two
  Login shell: /bin/sh
  Principal name: dagyah2@DAGYAH.COM
  Principal alias: dagyah2@DAGYAH.COM
  Email address: dagyah2@dagyah.com
  UID: 1942000003
  GID: 1942000003
  Password: False
  Member of groups: ipausers
  Kerberos keys available: False

・クライアントからユーザ登録

[centos7copy]$ kinit admin@DAGYAH.COM ←これをやらないと登録できない
Password for admin@DAGYAH.COM: Password123

※TGT を取得して、その TGT が有効にしている。
[centos7copy]$ ipa user-add dagyah3
First name: dagyah
Last name: three
--------------------
Added user "dagyah3"
--------------------
  User login: dagyah3
  First name: dagyah
  Last name: three
  Full name: dagyah three
  Display name: dagyah three
  Initials: dt
  Home directory: /home/dagyah3
  GECOS: dagyah three
  Login shell: /bin/sh
  Principal name: dagyah3@DAGYAH.COM
  Principal alias: dagyah3@DAGYAH.COM
  Email address: dagyah3@dagyah.com
  UID: 1942000004
  GID: 1942000004
  Password: False
  Member of groups: ipausers
  Kerberos keys available: False

[centos7copy]$ ipa user-find dagyah3
--------------
1 user matched
--------------
  User login: dagyah3
  First name: dagyah
  Last name: three
  Home directory: /home/dagyah3
  Login shell: /bin/sh
  Principal name: dagyah3@DAGYAH.COM
  Principal alias: dagyah3@DAGYAH.COM
  Email address: dagyah3@dagyah.com
  UID: 1942000004
  GID: 1942000004
  Account disabled: False
----------------------------
Number of entries returned 1
----------------------------

[centos7copy]$ ipa group-find dagyah1
----------------
0 groups matched
----------------
----------------------------
Number of entries returned 0
----------------------------

[centos7copy]$ ipa group-find admin
----------------
3 groups matched
----------------
  Group name: admins
  Description: Account administrators group
  GID: 1942000000

  Group name: editors
  Description: Limited admins who can edit other users
  GID: 1942000002

  Group name: trust admins
  Description: Trusts administrators group
----------------------------
Number of entries returned 3
----------------------------

[centos7copy]$ ipa host-show centos7
  Host name: centos7.dagyah.com
  Principal name: host/centos7.dagyah.com@DAGYAH.COM
  Principal alias: host/centos7.dagyah.com@DAGYAH.COM
  SSH public key fingerprint: SHA256:qxqjOv4CnDXGIrrZhYpSP9+vfTtfUzAQE5ZN/l+epyw (ssh-rsa), SHA256:6kXS/CuuQPpvj/G7E5P5lLL5WsEOTU9qSD9kATs9te8 (ecdsa-sha2-nistp256),
                              SHA256:TXeiWcAAFO2lPUKh14XiBMQOwzNmTwqs1lt2xpm9p2g (ssh-ed25519)
  Password: False
  Member of host-groups: ipaservers
  Keytab: True
  Managed by: centos7.dagyah.com

[centos7copy]$ ipa topologysuffix-find
---------------------------
2 topology suffixes matched
---------------------------
  Suffix name: ca
  Managed LDAP suffix DN: o=ipaca

  Suffix name: domain
  Managed LDAP suffix DN: dc=dagyah,dc=com
----------------------------
Number of entries returned 2
----------------------------

 

■ログ管理の調査

・クライアントのログ

クライアントのログは少ない。こんだけみたい。

[centos7copy]$ ls -l /var/log/sssd
total 0
-rw-------. 1 root root 0 Nov  9 06:43 krb5_child.log
-rw-------. 1 root root 0 Nov  9 06:43 ldap_child.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_dagyah.com.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_nss.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_pac.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_pam.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_ssh.log
-rw-------. 1 root root 0 Nov  9 06:43 sssd_sudo.log

・サーバのログ

[centos7]$ find . -type f | while read x;do ls -l $x;done | grep "Nov  8"
-rw-r--r--. 1 root root 292292 Nov  8 14:19 ./lastlog
-rw-rw-r--. 1 root utmp 15360 Nov  8 14:19 ./wtmp
-rw-------. 1 root root 105 Nov  8 06:39 ./sssd/sssd_dagyah.com.log-20201108
-rw-------. 1 root root 246 Nov  8 13:05 ./sssd/sssd_dagyah.com.log
-rw-------. 1 root root 94 Nov  8 06:39 ./sssd/sssd_ifp.log-20201108
-rw-------. 1 root root 94 Nov  8 09:17 ./sssd/sssd_ifp.log
-rw-------. 1 root root 0 Nov  8 07:27 ./sssd/sssd.log
-rw-------. 1 root root 11490 Nov  8 06:40 ./sssd/sssd_nss.log-20201108
-rw-------. 1 root root 14262 Nov  8 13:07 ./sssd/sssd_nss.log
-rw-------. 1 root root 94 Nov  8 06:39 ./sssd/sssd_pac.log-20201108
-rw-------. 1 root root 94 Nov  8 09:17 ./sssd/sssd_pac.log
-rw-------. 1 root root 248 Nov  8 06:40 ./sssd/sssd_pam.log-20201108
-rw-------. 1 root root 248 Nov  8 13:06 ./sssd/sssd_pam.log
-rw-------. 1 root root 94 Nov  8 06:39 ./sssd/sssd_ssh.log-20201108
-rw-------. 1 root root 94 Nov  8 09:17 ./sssd/sssd_ssh.log
-rw-------. 1 root root 95 Nov  8 06:39 ./sssd/sssd_sudo.log-20201108
-rw-------. 1 root root 95 Nov  8 09:17 ./sssd/sssd_sudo.log
-rw-------. 1 root root 1846926 Nov  8 16:41 ./audit/audit.log
-rw-------. 1 root lp 315 Nov  8 16:16 ./cups/access_log
-rw-r--r--. 1 root root 21372 Nov  8 06:39 ./gdm/:0.log.2
-rw-r--r--. 1 root root 20477 Nov  8 06:40 ./gdm/:0.log.1
-rw-r--r--. 1 root root 33749 Nov  8 14:25 ./gdm/:0.log
-rw-r--r--. 1 root gdm 0 Nov  8 06:40 ./gdm/:0-greeter.log.1
-rw-r--r--. 1 root gdm 0 Nov  8 13:06 ./gdm/:0-greeter.log
-rw-r--r--. 1 root root 175808 Nov  8 16:40 ./sa/sa08
-rw-r--r--. 1 root root 8790 Nov  8 13:06 ./tuned/tuned.log
-rw-------. 1 root root 17440 Nov  8 13:05 ./boot.log
-rw-r--r--. 1 root root 10456 Nov  8 13:05 ./vmware-vgauthsvc.log.0
-rw-r--r--. 1 root root 12673 Nov  8 13:05 ./vmware-vmsvc.log
-rw-r--r--. 1 root root 9606 Nov  8 13:21 ./firewalld
-rw-r--r--. 1 root root 280 Nov  8 13:07 ./wpa_supplicant.log
-rw-r--r--. 1 root root 125718 Nov  8 06:40 ./dmesg.old
-rw-r--r--. 1 root root 26504 Nov  8 06:40 ./Xorg.0.log.old
-rw-rw----. 1 pkiuser pkiuser 2210 Nov  8 10:56 ./pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20201108105640
-rw-rw----. 1 pkiuser pkiuser 13053 Nov  8 10:58 ./pki/pki-tomcat/ca/archive/spawn_manifest.20201108105640
-rw-r-----. 1 pkiuser pkiuser 1340851 Nov  8 14:20 ./pki/pki-tomcat/ca/signedAudit/ca_audit
-rw-r-----. 1 pkiuser pkiuser 30498370 Nov  8 16:47 ./pki/pki-tomcat/ca/debug
-rw-r-----. 1 pkiuser pkiuser 86902 Nov  8 13:07 ./pki/pki-tomcat/ca/system
-rw-r-----. 1 pkiuser pkiuser 15284 Nov  8 13:07 ./pki/pki-tomcat/ca/transactions
-rw-r-----. 1 pkiuser pkiuser 29937 Nov  8 13:07 ./pki/pki-tomcat/ca/selftests.log
-rw-r--r--. 1 pkiuser pkiuser 0 Nov  8 06:39 ./pki/pki-tomcat/catalina.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser 381230 Nov  8 11:00 ./pki/pki-tomcat/localhost.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser 0 Nov  8 06:39 ./pki/pki-tomcat/manager.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser 0 Nov  8 06:39 ./pki/pki-tomcat/host-manager.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser 55321 Nov  8 14:20 ./pki/pki-tomcat/localhost_access_log.2020-11-08.txt
-rw-rw-r--. 1 root root 29495 Nov  8 09:15 ./pki/pki-ca-destroy.20201108091508.log
-rw-rw-r--. 1 root root 173091 Nov  8 10:58 ./pki/pki-ca-spawn.20201108105640.log
-rw-r--r--. 1 root root 26143 Nov  8 15:25 ./httpd/access_log
-rw-r--r--. 1 root root 18152 Nov  8 07:27 ./httpd/error_log-20201108
-rw-r--r--. 1 root root 50074 Nov  8 15:25 ./httpd/error_log
-rw-------. 1 dirsrv dirsrv 86294 Nov  8 13:07 ./dirsrv/slapd-DAGYAH-COM/errors
-rw-------. 1 dirsrv dirsrv 63 Nov  8 10:55 ./dirsrv/slapd-DAGYAH-COM/errors.rotationinfo
-rw-------. 1 dirsrv dirsrv 2479014 Nov  8 16:47 ./dirsrv/slapd-DAGYAH-COM/access
-rw-------. 1 dirsrv dirsrv 63 Nov  8 10:55 ./dirsrv/slapd-DAGYAH-COM/access.rotationinfo
-rw-------. 1 dirsrv dirsrv 0 Nov  8 10:55 ./dirsrv/slapd-DAGYAH-COM/audit
-rw-------. 1 dirsrv dirsrv 63 Nov  8 10:55 ./dirsrv/slapd-DAGYAH-COM/audit.rotationinfo
-rw-rw----. 1 tomcat tomcat 0 Nov  8 07:27 ./tomcat/catalina.out
-rw-------. 1 root root 4414291 Nov  8 11:03 ./ipaserver-install.log
-rw-------. 1 root root 4536 Nov  8 13:07 ./kadmind.log
-rw-r-----. 1 root root 246999 Nov  8 16:43 ./krb5kdc.log
-rw-r--r--. 1 root root 644 Nov  8 13:07 ./ipa/ipactl.log
-rw-------. 1 root root 101143 Nov  8 10:08 ./ipaserver-uninstall.log
-rw-------. 1 root root 52625 Nov  8 10:08 ./ipaclient-uninstall.log
-rw-------. 1 root root 5082 Nov  8 13:39 ./ipaclient-install.log
-rw-------. 1 root root 14730 Nov  8 07:27 ./boot.log-20201108
-rw-------. 1 root root 44357 Nov  8 07:27 ./cron-20201108
-rw-------. 1 root root 7652 Nov  8 16:40 ./cron
-rw-------. 1 root root 1186 Nov  8 06:40 ./maillog-20201108
-rw-------. 1 root root 194 Nov  8 13:06 ./maillog
-rw-------. 1 root root 2555962 Nov  8 07:27 ./messages-20201108
-rw-------. 1 root root 549502 Nov  8 16:40 ./messages
-rw-------. 1 root root 129387 Nov  8 06:56 ./secure-20201108
-rw-------. 1 root root 79095 Nov  8 14:19 ./secure
-rw-------. 1 root root 0 Nov  8 07:27 ./spooler
-rw-r--r--. 1 root root 125889 Nov  8 13:05 ./dmesg
-rw-r--r--. 1 root root 41492 Nov  8 14:25 ./Xorg.0.log

 

[centos7]$ ls -lR /var/log/tomcat/
/var/log/tomcat/:
total 4
-rw-rw----. 1 tomcat tomcat  0 Nov  8 07:27 catalina.out
-rw-rw----. 1 tomcat tomcat 48 Jun 11 07:52 catalina.out-20201108.gz


[centos7]$ ls -lR /var/log/sssd
/var/log/sssd:
total 80
-rw-------. 1 root root     0 Nov  5 19:59 krb5_child.log
-rw-------. 1 root root     0 Nov  5 19:59 ldap_child.log
-rw-------. 1 root root   246 Nov  8 13:05 sssd_dagyah.com.log
-rw-------. 1 root root   105 Nov  8 06:39 sssd_dagyah.com.log-20201108
-rw-------. 1 root root    94 Nov  8 09:17 sssd_ifp.log
-rw-------. 1 root root    94 Nov  8 06:39 sssd_ifp.log-20201108
-rw-------. 1 root root     0 Nov  8 07:27 sssd.log
-rw-------. 1 root root   424 Nov  5 18:16 sssd.log-20201108
-rw-------. 1 root root 14262 Nov  8 13:07 sssd_nss.log
-rw-------. 1 root root 11490 Nov  8 06:40 sssd_nss.log-20201108
-rw-------. 1 root root    94 Nov  8 09:17 sssd_pac.log
-rw-------. 1 root root    94 Nov  8 06:39 sssd_pac.log-20201108
-rw-------. 1 root root   248 Nov  8 13:06 sssd_pam.log
-rw-------. 1 root root   248 Nov  8 06:40 sssd_pam.log-20201108
-rw-------. 1 root root    94 Nov  8 09:17 sssd_ssh.log
-rw-------. 1 root root    94 Nov  8 06:39 sssd_ssh.log-20201108
-rw-------. 1 root root    95 Nov  8 09:17 sssd_sudo.log
-rw-------. 1 root root    95 Nov  8 06:39 sssd_sudo.log-20201108


[centos7]$ ls -lR /var/log/pki
/var/log/pki:
total 796
-rw-rw-r--. 1 root    root     29324 Nov  5 19:40 pki-ca-destroy.20201105194056.log
-rw-rw-r--. 1 root    root     33982 Nov  5 19:52 pki-ca-destroy.20201105195214.log
-rw-rw-r--. 1 root    root     29495 Nov  8 09:15 pki-ca-destroy.20201108091508.log
-rw-rw-r--. 1 root    root    173559 Nov  5 19:24 pki-ca-spawn.20201105192305.log
-rw-rw-r--. 1 root    root    172083 Nov  5 19:45 pki-ca-spawn.20201105194445.log
-rw-rw-r--. 1 root    root    172605 Nov  5 19:57 pki-ca-spawn.20201105195655.log
-rw-rw-r--. 1 root    root    173091 Nov  8 10:58 pki-ca-spawn.20201108105640.log
-rw-r--r--. 1 root    root       244 Nov  5 18:16 pki-server-upgrade-10.5.17.log
drwxrwx---. 3 pkiuser pkiuser   4096 Nov  8 06:40 pki-tomcat

/var/log/pki/pki-tomcat:
total 2492
drwxrwx---. 4 pkiuser pkiuser     108 Nov  5 19:23 ca
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  5 19:23 catalina.2020-11-05.log
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  8 06:39 catalina.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  5 19:23 host-manager.2020-11-05.log
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  8 06:39 host-manager.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser 1913181 Nov  5 19:58 localhost.2020-11-05.log
-rw-r--r--. 1 pkiuser pkiuser  381230 Nov  8 11:00 localhost.2020-11-08.log
-rw-r--r--. 1 pkiuser pkiuser  186018 Nov  5 21:23 localhost_access_log.2020-11-05.txt
-rw-r--r--. 1 pkiuser pkiuser     111 Nov  6 00:12 localhost_access_log.2020-11-06.txt
-rw-r--r--. 1 pkiuser pkiuser   55321 Nov  8 14:20 localhost_access_log.2020-11-08.txt
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  5 19:23 manager.2020-11-05.log
-rw-r--r--. 1 pkiuser pkiuser       0 Nov  8 06:39 manager.2020-11-08.log

/var/log/pki/pki-tomcat/ca:
total 29948
drwxrwx---. 2 pkiuser pkiuser     4096 Nov  8 10:58 archive
-rw-r-----. 1 pkiuser pkiuser 30522172 Nov  8 17:07 debug
-rw-r-----. 1 pkiuser pkiuser    29937 Nov  8 13:07 selftests.log
drwxrwx---. 2 pkiuser pkiuser       22 Nov  5 19:23 signedAudit
-rw-r-----. 1 pkiuser pkiuser    86902 Nov  8 13:07 system
-rw-r-----. 1 pkiuser pkiuser    15812 Nov  8 17:00 transactions

/var/log/pki/pki-tomcat/ca/archive:
total 80
-rw-rw----. 1 pkiuser pkiuser  2210 Nov  5 19:23 spawn_deployment.cfg.20201105192305
-rw-rw----. 1 pkiuser pkiuser  2210 Nov  5 19:44 spawn_deployment.cfg.20201105194445
-rw-rw----. 1 pkiuser pkiuser  2210 Nov  5 19:56 spawn_deployment.cfg.20201105195655
-rw-rw----. 1 pkiuser pkiuser  2210 Nov  8 10:56 spawn_deployment.cfg.20201108105640
-rw-rw----. 1 pkiuser pkiuser 13330 Nov  5 19:24 spawn_manifest.20201105192305
-rw-rw----. 1 pkiuser pkiuser 13053 Nov  5 19:45 spawn_manifest.20201105194445
-rw-rw----. 1 pkiuser pkiuser 13053 Nov  5 19:57 spawn_manifest.20201105195655
-rw-rw----. 1 pkiuser pkiuser 13053 Nov  8 10:58 spawn_manifest.20201108105640

/var/log/pki/pki-tomcat/ca/signedAudit:
total 1312
-rw-r-----. 1 pkiuser pkiuser 1340851 Nov  8 14:20 ca_audit


[centos7]$ ls -lR /var/log/httpd/
/var/log/httpd/:
total 108
-rw-r--r--. 1 root root 26143 Nov  8 15:25 access_log
-rw-r--r--. 1 root root  7956 Nov  6 00:48 access_log-20201108
-rw-r--r--. 1 root root 50074 Nov  8 15:25 error_log
-rw-r--r--. 1 root root 18152 Nov  8 07:27 error_log-20201108


[centos7]$ ls -lR /var/log/dirsrv/
/var/log/dirsrv/:
total 0
drwxrwx---. 2 dirsrv dirsrv 127 Nov  8 10:55 slapd-DAGYAH-COM

/var/log/dirsrv/slapd-DAGYAH-COM:
total 2788
-rw-------. 1 dirsrv dirsrv 2527497 Nov  8 17:12 access
-rw-------. 1 dirsrv dirsrv      63 Nov  8 10:55 access.rotationinfo
-rw-------. 1 dirsrv dirsrv       0 Nov  8 10:55 audit
-rw-------. 1 dirsrv dirsrv      63 Nov  8 10:55 audit.rotationinfo
-rw-------. 1 dirsrv dirsrv   86294 Nov  8 13:07 errors
-rw-------. 1 dirsrv dirsrv      63 Nov  8 10:55 errors.rotationinfo