Using NFS Metrics and Logs to Troubleshoot LDAP and Kerberos Issues

Use an outbound connector or mount target's NFS metrics and service logs to diagnose issues with file systems that use LDAP for authorization and Kerberos for authentication.

File Storage outbound connectors and mount targets that use LDAP, or use both LDAP and Kerberos, emit metrics to help you monitor connectivity, performance, and errors. The following charts are designed to capture specific errors:

For complete details on File Storage metrics and charts, see File System Metrics.

We recommend that you enable NFS logs for mount targets that use LDAP or Kerberos and set alarms on errors. See Details for File Storage for more information.

LDAP Connection Errors

The LDAP Connection Errors chart captures the following error types:

  • LDAP Connection Timeout
  • LDAP Connection Refused/Reset
  • LDAP Name Resolution Failure
  • LDAP Bind Login Failed
  • LDAP Certificate Validation Failure

For "LDAP Connection Timeout" and "LDAP Connection Refused/Reset" errors:

  1. Verify that VCN security rules allow communication with your LDAP and DNS servers. See Scenario D: Mount target uses LDAP for authorization
  2. Verify that the LDAP service is running on the customer-managed LDAP server.
    Tip

    You can test LDAP search capability using the ldapsearch command from a Linux instance in the same subnet as the mount target. See Testing for LDAP Schema Support for more information.
  3. Verify that the mount target is using an outbound connector with the correct LDAP server and LDAPS port. See Managing Outbound Connectors for more information.

For "LDAP Name Resolution Failed" errors:

  1. Verify that VCN security rules allow communication with your LDAP and DNS servers. See Scenario D: Mount target uses LDAP for authorization for more information.
  2. Ensure that the DNS zone files on the DNS server contain A and PTR records for the LDAP server.
  3. If the configured DNS server is customer-managed and uses DHCP Options, verify that the DHCP options are correct and that the mount target is in the subnet which has DHCP options set.
  4. Verify that the name service is reachable and running on your DNS server. You can use a DNS lookup and reverse lookup from an instance in the same subnet as your mount target.

For "LDAP Bind Login Failed" errors:

Verify that the outbound connector is using the correct Bind Distinguished Name and correct password. See Managing Outbound Connectors for more information.

For "LDAP Certificate Validation Failure" errors:

Verify that the LDAP server has a valid certificate.

LDAP Request Errors

The LDAP Request Errors chart captures the following error types:

  • Lookup Username by UID
  • Lookup UID by Username
  • Lookup User Groups

LDAP request errors can result in permissions issues or errors when mounting file systems.

You can use the ldapsearch command from a Linux instance with connectivity to the LDAP server to verify that:

  1. A user entry is present under Search Base for Users with uid, uidNumber and gidNumber.
  2. A group entry of the user is present under Search Base for Groups with memberUid attribute.

For more information, see Testing for LDAP Schema Support.

Kerberos Errors

The Kerberos Errors chart captures the following error types:

  • Kerberos no keytab
  • Kerberos no key
  • Kerberos key version number mismatch
  • Kerberos clock skew

For "Kerberos no keytab" errors:

Verify that you've uploaded a Kerberos keytab to OCI Vault and selected the secret when enabling Kerberos authentication.

For "Kerberos no key" errors:

There are no keys in the keytab. For more information, see Kerberos Keytab.

For "Kerberos key version number mismatch" errors:

  1. Key version numbers are used to distinguish between different keys in the same domain. This error occurs when the system can't find a kvno in the keytab that corresponds to the ticket. The ticket might be out-of-date or expired. For more information, see Kerberos Keytab.
  2. Verify that the selected keytab secret is correct. If not, extract the correct keytab for the mount target principal from the KDC, then re-upload the keytab as the secret and select the new secret version.

For "Kerberos clock skew" errors:

Verify that the date and time are correct on the client and in the KDC. To prevent intruders from resetting their system clocks and using expired tickets, Kerberos rejects ticket requests from any host whose clock is out of sync.