You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ID: net.ipv4.conf.default.rp_filter
Function: sysctl.present
Result: True
Comment: Sysctl value net.ipv4.conf.default.rp_filter = 1 is already set
Changes:
ID: net.ipv4.tcp_syncookies
Function: sysctl.present
Result: True
Comment: Sysctl value net.ipv4.tcp_syncookies = 1 is already set
Changes:
ID: net.ipv6.conf.all.accept_ra
Function: sysctl.present
Result: False
Comment: An exception occurred in this state: Traceback (most recent call last):
File "/usr/lib/python2.6/site-packages/salt/state.py", line 1379, in call
**cdata['kwargs'])
File "/usr/lib/python2.6/site-packages/salt/states/sysctl.py", line 72, in present
update = __salt__['sysctl.persist'](name, value, config)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 226, in persist
assign(name, value)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 118, in assign
raise CommandExecutionError('sysctl {0} does not exist'.format(name))
CommandExecutionError: sysctl net.ipv6.conf.all.accept_ra does not exist
Changes:
ID: net.ipv6.conf.default.accept_ra
Function: sysctl.present
Result: False
Comment: An exception occurred in this state: Traceback (most recent call last):
File "/usr/lib/python2.6/site-packages/salt/state.py", line 1379, in call
**cdata['kwargs'])
File "/usr/lib/python2.6/site-packages/salt/states/sysctl.py", line 72, in present
update = __salt__['sysctl.persist'](name, value, config)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 226, in persist
assign(name, value)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 118, in assign
raise CommandExecutionError('sysctl {0} does not exist'.format(name))
CommandExecutionError: sysctl net.ipv6.conf.default.accept_ra does not exist
Changes:
ID: net.ipv6.conf.default.accept_redirects
Function: sysctl.present
Result: False
Comment: An exception occurred in this state: Traceback (most recent call last):
File "/usr/lib/python2.6/site-packages/salt/state.py", line 1379, in call
**cdata['kwargs'])
File "/usr/lib/python2.6/site-packages/salt/states/sysctl.py", line 72, in present
update = __salt__['sysctl.persist'](name, value, config)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 226, in persist
assign(name, value)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 118, in assign
raise CommandExecutionError('sysctl {0} does not exist'.format(name))
CommandExecutionError: sysctl net.ipv6.conf.default.accept_redirects does not exist
Changes:
ID: net.ipv6.conf.all.accept_redirects
Function: sysctl.present
Result: False
Comment: An exception occurred in this state: Traceback (most recent call last):
File "/usr/lib/python2.6/site-packages/salt/state.py", line 1379, in call
**cdata['kwargs'])
File "/usr/lib/python2.6/site-packages/salt/states/sysctl.py", line 72, in present
update = __salt__['sysctl.persist'](name, value, config)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 226, in persist
assign(name, value)
File "/usr/lib/python2.6/site-packages/salt/modules/linux_sysctl.py", line 118, in assign
raise CommandExecutionError('sysctl {0} does not exist'.format(name))
CommandExecutionError: sysctl net.ipv6.conf.all.accept_redirects does not exist
Changes:
ID: /etc/sudo-ldap.conf
Function: file.managed
Result: True
Comment: File /etc/sudo-ldap.conf updated
Changes:
----------
diff:
---
+++
@@ -1,86 +1,12 @@
-## BINDDN DN
-## The BINDDN parameter specifies the identity, in the form of a Dis‐
-## tinguished Name (DN), to use when performing LDAP operations. If
-## not specified, LDAP operations are performed with an anonymous
-## identity. By default, most LDAP servers will allow anonymous
-## access.
-##
-#binddn uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
+uri ldap://vuwunicoipam001.ods.vuw.ac.nz ldap://vuwunicoipam002.ods.vuw.ac.nz ldap://vuwunicoipam003.ods.vuw.ac.nz
+ldap_version 3
+sudoers_base ou=SUDOers,dc=ods,dc=vuw,dc=ac,dc=nz
+binddn uid=sudo,cn=sysaccounts,cn=etc,dc=ods,dc=vuw,dc=ac,dc=nz
+bindpw www.apac.c0m
+bind_timelimit 5000
+timelimt 15
+ssl start_tls
+tls_checkpeer (yes)
+tls_cacertfile /etc/ipa/ca.crt
+sudoers_debug 2
-## BINDPW secret
-## The BINDPW parameter specifies the password to use when performing
-## LDAP operations. This is typically used in conjunction with the
-## BINDDN parameter.
-##
-#bindpw secret
-
-## SSL start_tls
-## If the SSL parameter is set to start_tls, the LDAP server connec‐
-## tion is initiated normally and TLS encryption is begun before the
-## bind credentials are sent. This has the advantage of not requiring
-## a dedicated port for encrypted communications. This parameter is
-## only supported by LDAP servers that honor the start_tls extension,
-## such as the OpenLDAP and Tivoli Directory servers.
-##
-#ssl start_tls
-
-## TLS_CACERTFILE file name
-## The path to a certificate authority bundle which contains the cer‐
-## tificates for all the Certificate Authorities the client knows to
-## be valid, e.g. /etc/ssl/ca-bundle.pem. This option is only sup‐
-## ported by the OpenLDAP libraries. Netscape-derived LDAP libraries
-## use the same certificate database for CA and client certificates
-## (see TLS_CERT).
-##
-#tls_cacertfile /path/to/CA.crt
-
-## TLS_CHECKPEER on/true/yes/off/false/no
-## If enabled, TLS_CHECKPEER will cause the LDAP server's TLS certifi‐
-## cated to be verified. If the server's TLS certificate cannot be
-## verified (usually because it is signed by an unknown certificate
-## authority), sudo will be unable to connect to it. If TLS_CHECKPEER
-## is disabled, no check is made. Note that disabling the check cre‐
-## ates an opportunity for man-in-the-middle attacks since the
-## server's identity will not be authenticated. If possible, the CA's
-## certificate should be installed locally so it can be verified.
-## This option is not supported by the Tivoli Directory Server LDAP
-## libraries.
-#tls_checkpeer yes
-
-##
-## URI ldap[s]://[hostname[:port]] ...
-## Specifies a whitespace-delimited list of one or more
-## URIs describing the LDAP server(s) to connect to.
-##
-#uri ldap://ldapserver
-
-##
-## SUDOERS_BASE base
-## The base DN to use when performing sudo LDAP queries.
-## Multiple SUDOERS_BASE lines may be specified, in which
-## case they are queried in the order specified.
-##
-#sudoers_base ou=SUDOers,dc=example,dc=com
-
-##
-## BIND_TIMELIMIT seconds
-## The BIND_TIMELIMIT parameter specifies the amount of
-## time to wait while trying to connect to an LDAP server.
-##
-#bind_timelimit 30
-
-##
-## TIMELIMIT seconds
-## The TIMELIMIT parameter specifies the amount of time
-## to wait for a response to an LDAP query.
-##
-#timelimit 30
-
-##
-## SUDOERS_DEBUG debug_level
-## This sets the debug level for sudo LDAP queries. Debugging
-## information is printed to the standard error. A value of 1
-## results in a moderate amount of debugging information.
-## A value of 2 shows the results of the matches themselves.
-##
-#sudoers_debug 1
mode:
0440
Running a high state
Failed run
Summary
Succeeded: 68
Failed: 5
Total: 73
-bash-4.1# ls -l
Perfect run
-bash-4.1# salt -l debug -t 3600 vuwunicoojst002.ods.vuw.ac.nz state.sls sysctl
[DEBUG ] Reading configuration from /etc/salt/master
[DEBUG ] Missing configuration file: /root/.saltrc
[DEBUG ] Configuration file path: /etc/salt/master
[DEBUG ] Reading configuration from /etc/salt/master
[DEBUG ] Missing configuration file: /root/.saltrc
[DEBUG ] LocalClientEvent PUB socket URI: ipc:///var/run/salt/master/master_event_pub.ipc
[DEBUG ] LocalClientEvent PULL socket URI: ipc:///var/run/salt/master/master_event_pull.ipc
[DEBUG ] Loaded no_out as virtual quiet
[DEBUG ] Loaded json_out as virtual json
[DEBUG ] Loaded yaml_out as virtual yaml
[DEBUG ] Loaded pprint_out as virtual pprint
vuwunicoojst002.ods.vuw.ac.nz:
Summary
Succeeded: 23
Failed: 0
Total: 23
-bash-4.1#
Salt master and minion are EPEL rpms from RHEL6 64 bit,
eg
salt-minion-2014.1.10-4.el6.noarch
I never saw these failures on earlier rpm versions eg 2014.1.7.x or 2014.1.5.x
The text was updated successfully, but these errors were encountered: