install_ipa_oracle_linux
Differences
This shows you the differences between two versions of the page.
| install_ipa_oracle_linux [2025/07/26 17:09] – - Imported by DokuWiki Advanced Plugin wikiadm | install_ipa_oracle_linux [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Instalação FreeIPA - Oracle Linux ====== | ||
| - | <code bash> | ||
| - | # dnf module enable idm:DL1 | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # dnf distro-sync | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # dnf install ipa-server ipa-server-dns rng-tools | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # systemctl start rngd | ||
| - | # systemctl enable rngd | ||
| - | # systemctl status rngd | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # nmcli con mod ens160 ipv4.method manual ipv4.addresses 177.75.187.213/ | ||
| - | # nmcli con mod ens160 ipv6.method manual ipv6.addresses 2804: | ||
| - | # nmcli con mod ens160 ipv4.dns " | ||
| - | # nmcli con mod ens160 ipv6.dns " | ||
| - | # nmcli connection down ens160 ; nmcli c up ens160 | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # timedatectl set-timezone America/ | ||
| - | # hostnamectl set-hostname sp-spo-ipa.juntotelecom.com.br | ||
| - | # echo " | ||
| - | # echo " | ||
| - | </ | ||
| - | |||
| - | ===== Problema com o Bind ===== | ||
| - | <code bash> | ||
| - | # named -v | ||
| - | BIND 9.11.26-RedHat-9.11.26-6.el8 (Extended Support Version) < | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # dnf install bind-9.11.26-4.el8_4 | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # named -v | ||
| - | BIND 9.11.26-RedHat-9.11.26-4.el8_4 (Extended Support Version) < | ||
| - | </ | ||
| - | |||
| - | <code bashs> | ||
| - | # vim / | ||
| - | [main] | ||
| - | gpgcheck=1 | ||
| - | installonly_limit=3 | ||
| - | clean_requirements_on_remove=True | ||
| - | best=True | ||
| - | skip_if_unavailable=False | ||
| - | exclude=bind* | ||
| - | </ | ||
| - | |||
| - | ===== Configurando o FreeIPA ===== | ||
| - | <code bash> | ||
| - | # ipa-server-install --setup-dns --mkhomedir --auto-reverse | ||
| - | |||
| - | The log file for this installation can be found in / | ||
| - | ============================================================================== | ||
| - | This program will set up the IPA Server. | ||
| - | Version 4.9.6 | ||
| - | |||
| - | This includes: | ||
| - | * Configure a stand-alone CA (dogtag) for certificate management | ||
| - | * Configure the NTP client (chronyd) | ||
| - | * Create and configure an instance of Directory Server | ||
| - | * Create and configure a Kerberos Key Distribution Center (KDC) | ||
| - | * Configure Apache (httpd) | ||
| - | * Configure DNS (bind) | ||
| - | * Configure SID generation | ||
| - | * Configure the KDC to enable PKINIT | ||
| - | |||
| - | To accept the default shown in brackets, press the Enter key. | ||
| - | |||
| - | Enter the fully qualified domain name of the computer | ||
| - | on which you're setting up server software. Using the form | ||
| - | < | ||
| - | Example: master.example.com. | ||
| - | |||
| - | |||
| - | Server host name [sp-spo-ipa.juntotelecom.com.br]: | ||
| - | |||
| - | Warning: skipping DNS resolution of host sp-spo-ipa.juntotelecom.com.br | ||
| - | The domain name has been determined based on the host name. | ||
| - | |||
| - | Please confirm the domain name [juntotelecom.com.br]: | ||
| - | |||
| - | The kerberos protocol requires a Realm name to be defined. | ||
| - | This is typically the domain name converted to uppercase. | ||
| - | |||
| - | Please provide a realm name [JUNTOTELECOM.COM.BR]: | ||
| - | Certain directory server operations require an administrative user. | ||
| - | This user is referred to as the Directory Manager and has full access | ||
| - | to the Directory for system management tasks and will be added to the | ||
| - | instance of directory server created for IPA. | ||
| - | The password must be at least 8 characters long. | ||
| - | |||
| - | Directory Manager password: | ||
| - | Password (confirm): | ||
| - | |||
| - | The IPA server requires an administrative user, named ' | ||
| - | This user is a regular system account used for IPA server administration. | ||
| - | |||
| - | IPA admin password: | ||
| - | Password (confirm): | ||
| - | |||
| - | Checking DNS domain juntotelecom.com.br., | ||
| - | DNS check for domain juntotelecom.com.br. failed: The DNS operation timed out after 45.009133100509644 seconds. | ||
| - | Do you want to configure DNS forwarders? [yes]: no | ||
| - | No DNS forwarders configured | ||
| - | Checking DNS domain 187.75.177.in-addr.arpa., | ||
| - | Reverse zone 187.75.177.in-addr.arpa. for IP address 177.75.187.213 already exists | ||
| - | Checking DNS domain 1.0.0.4.0.0.c.4.4.9.6.0.4.0.8.2.ip6.arpa., | ||
| - | Reverse zone 1.0.0.4.0.0.c.4.4.9.6.0.4.0.8.2.ip6.arpa. for IP address 2804: | ||
| - | Trust is configured but no NetBIOS domain name found, setting it now. | ||
| - | Enter the NetBIOS name for the IPA domain. | ||
| - | Only up to 15 uppercase ASCII letters, digits and dashes are allowed. | ||
| - | Example: EXAMPLE. | ||
| - | |||
| - | |||
| - | NetBIOS domain name [JUNTOTELECOM]: | ||
| - | |||
| - | Do you want to configure chrony with NTP server or pool address? [no]: yes | ||
| - | Enter NTP source server addresses separated by comma, or press Enter to skip: | ||
| - | Enter a NTP source pool address, or press Enter to skip: pool.ntp.br | ||
| - | |||
| - | The IPA Master Server will be configured with: | ||
| - | Hostname: | ||
| - | IP address(es): | ||
| - | Domain name: juntotelecom.com.br | ||
| - | Realm name: | ||
| - | |||
| - | The CA will be configured with: | ||
| - | Subject DN: | ||
| - | Subject base: O=JUNTOTELECOM.COM.BR | ||
| - | Chaining: | ||
| - | |||
| - | BIND DNS server will be configured to serve IPA domain with: | ||
| - | Forwarders: | ||
| - | Forward policy: | ||
| - | Reverse zone(s): | ||
| - | |||
| - | NTP pool: | ||
| - | Continue to configure the system with these values? [no]: yes | ||
| - | |||
| - | The following operations may take some minutes to complete. | ||
| - | Please wait until the prompt is returned. | ||
| - | |||
| - | Disabled p11-kit-proxy | ||
| - | Synchronizing time | ||
| - | Configuration of chrony was changed by installer. | ||
| - | Attempting to sync time with chronyc. | ||
| - | Process chronyc waitsync failed to sync time! | ||
| - | Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. | ||
| - | Warning: IPA was unable to sync time with chrony! | ||
| - | Time synchronization is required for IPA to work correctly | ||
| - | Configuring directory server (dirsrv). Estimated time: 30 seconds | ||
| - | [1/41]: creating directory server instance | ||
| - | [2/41]: tune ldbm plugin | ||
| - | [3/41]: adding default schema | ||
| - | [4/41]: enabling memberof plugin | ||
| - | [5/41]: enabling winsync plugin | ||
| - | [6/41]: configure password logging | ||
| - | [7/41]: configuring replication version plugin | ||
| - | [8/41]: enabling IPA enrollment plugin | ||
| - | [9/41]: configuring uniqueness plugin | ||
| - | [10/41]: configuring uuid plugin | ||
| - | [11/41]: configuring modrdn plugin | ||
| - | [12/41]: configuring DNS plugin | ||
| - | [13/41]: enabling entryUSN plugin | ||
| - | [14/41]: configuring lockout plugin | ||
| - | [15/41]: configuring topology plugin | ||
| - | [16/41]: creating indices | ||
| - | [17/41]: enabling referential integrity plugin | ||
| - | [18/41]: configuring certmap.conf | ||
| - | [19/41]: configure new location for managed entries | ||
| - | [20/41]: configure dirsrv ccache and keytab | ||
| - | [21/41]: enabling SASL mapping fallback | ||
| - | [22/41]: restarting directory server | ||
| - | [23/41]: adding sasl mappings to the directory | ||
| - | [24/41]: adding default layout | ||
| - | [25/41]: adding delegation layout | ||
| - | [26/41]: creating container for managed entries | ||
| - | [27/41]: configuring user private groups | ||
| - | [28/41]: configuring netgroups from hostgroups | ||
| - | [29/41]: creating default Sudo bind user | ||
| - | [30/41]: creating default Auto Member layout | ||
| - | [31/41]: adding range check plugin | ||
| - | [32/41]: creating default HBAC rule allow_all | ||
| - | [33/41]: adding entries for topology management | ||
| - | [34/41]: initializing group membership | ||
| - | [35/41]: adding master entry | ||
| - | [36/41]: initializing domain level | ||
| - | [37/41]: configuring Posix uid/gid generation | ||
| - | [38/41]: adding replication acis | ||
| - | [39/41]: activating sidgen plugin | ||
| - | [40/41]: activating extdom plugin | ||
| - | [41/41]: configuring directory to start on boot | ||
| - | Done configuring directory server (dirsrv). | ||
| - | Configuring Kerberos KDC (krb5kdc) | ||
| - | [1/10]: adding kerberos container to the directory | ||
| - | [2/10]: configuring KDC | ||
| - | [3/10]: initialize kerberos container | ||
| - | [4/10]: adding default ACIs | ||
| - | [5/10]: creating a keytab for the directory | ||
| - | [6/10]: creating a keytab for the machine | ||
| - | [7/10]: adding the password extension to the directory | ||
| - | [8/10]: creating anonymous principal | ||
| - | [9/10]: starting the KDC | ||
| - | [10/10]: configuring KDC to start on boot | ||
| - | Done configuring Kerberos KDC (krb5kdc). | ||
| - | Configuring kadmin | ||
| - | [1/2]: starting kadmin | ||
| - | [2/2]: configuring kadmin to start on boot | ||
| - | Done configuring kadmin. | ||
| - | Configuring ipa-custodia | ||
| - | [1/5]: Making sure custodia container exists | ||
| - | [2/5]: Generating ipa-custodia config file | ||
| - | [3/5]: Generating ipa-custodia keys | ||
| - | [4/5]: starting ipa-custodia | ||
| - | [5/5]: configuring ipa-custodia to start on boot | ||
| - | Done configuring ipa-custodia. | ||
| - | Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes | ||
| - | [1/28]: configuring certificate server instance | ||
| - | [2/28]: stopping certificate server instance to update CS.cfg | ||
| - | [3/28]: backing up CS.cfg | ||
| - | [4/28]: Add ipa-pki-wait-running | ||
| - | [5/28]: secure AJP connector | ||
| - | [6/28]: reindex attributes | ||
| - | [7/28]: exporting Dogtag certificate store pin | ||
| - | [8/28]: disabling nonces | ||
| - | [9/28]: set up CRL publishing | ||
| - | [10/28]: enable PKIX certificate path discovery and validation | ||
| - | [11/28]: authorizing RA to modify profiles | ||
| - | [12/28]: authorizing RA to manage lightweight CAs | ||
| - | [13/28]: Ensure lightweight CAs container exists | ||
| - | [14/28]: starting certificate server instance | ||
| - | [15/28]: configure certmonger for renewals | ||
| - | [16/28]: requesting RA certificate from CA | ||
| - | [17/28]: publishing the CA certificate | ||
| - | [18/28]: adding RA agent as a trusted user | ||
| - | [19/28]: configure certificate renewals | ||
| - | [20/28]: Configure HTTP to proxy connections | ||
| - | [21/28]: updating IPA configuration | ||
| - | [22/28]: enabling CA instance | ||
| - | [23/28]: importing IPA certificate profiles | ||
| - | [24/28]: migrating certificate profiles to LDAP | ||
| - | [25/28]: adding default CA ACL | ||
| - | [26/28]: adding ' | ||
| - | [27/28]: configuring certmonger renewal for lightweight CAs | ||
| - | [28/28]: deploying ACME service | ||
| - | Done configuring certificate server (pki-tomcatd). | ||
| - | Configuring directory server (dirsrv) | ||
| - | [1/3]: configuring TLS for DS instance | ||
| - | [2/3]: adding CA certificate entry | ||
| - | [3/3]: restarting directory server | ||
| - | Done configuring directory server (dirsrv). | ||
| - | Configuring ipa-otpd | ||
| - | [1/2]: starting ipa-otpd | ||
| - | [2/2]: configuring ipa-otpd to start on boot | ||
| - | Done configuring ipa-otpd. | ||
| - | Configuring the web interface (httpd) | ||
| - | [1/21]: stopping httpd | ||
| - | [2/21]: backing up ssl.conf | ||
| - | [3/21]: disabling nss.conf | ||
| - | [4/21]: configuring mod_ssl certificate paths | ||
| - | [5/21]: setting mod_ssl protocol list | ||
| - | [6/21]: configuring mod_ssl log directory | ||
| - | [7/21]: disabling mod_ssl OCSP | ||
| - | [8/21]: adding URL rewriting rules | ||
| - | [9/21]: configuring httpd | ||
| - | Nothing to do for configure_httpd_wsgi_conf | ||
| - | [10/21]: setting up httpd keytab | ||
| - | [11/21]: configuring Gssproxy | ||
| - | [12/21]: setting up ssl | ||
| - | [13/21]: configure certmonger for renewals | ||
| - | [14/21]: publish CA cert | ||
| - | [15/21]: clean up any existing httpd ccaches | ||
| - | [16/21]: configuring SELinux for httpd | ||
| - | [17/21]: create KDC proxy config | ||
| - | [18/21]: enable KDC proxy | ||
| - | [19/21]: starting httpd | ||
| - | [20/21]: configuring httpd to start on boot | ||
| - | [21/21]: enabling oddjobd | ||
| - | Done configuring the web interface (httpd). | ||
| - | Configuring Kerberos KDC (krb5kdc) | ||
| - | [1/1]: installing X509 Certificate for PKINIT | ||
| - | Done configuring Kerberos KDC (krb5kdc). | ||
| - | Applying LDAP updates | ||
| - | Upgrading IPA:. Estimated time: 1 minute 30 seconds | ||
| - | [1/10]: stopping directory server | ||
| - | [2/10]: saving configuration | ||
| - | [3/10]: disabling listeners | ||
| - | [4/10]: enabling DS global lock | ||
| - | [5/10]: disabling Schema Compat | ||
| - | [6/10]: starting directory server | ||
| - | [7/10]: upgrading server | ||
| - | [8/10]: stopping directory server | ||
| - | [9/10]: restoring configuration | ||
| - | [10/10]: starting directory server | ||
| - | Done. | ||
| - | Restarting the KDC | ||
| - | dnssec-validation yes | ||
| - | Configuring DNS (named) | ||
| - | [1/11]: generating rndc key file | ||
| - | [2/11]: adding DNS container | ||
| - | [3/11]: setting up our zone | ||
| - | [4/11]: setting up our own record | ||
| - | [5/11]: setting up records for other masters | ||
| - | [6/11]: adding NS record to the zones | ||
| - | [7/11]: setting up kerberos principal | ||
| - | [8/11]: setting up named.conf | ||
| - | created new / | ||
| - | created named user config '/ | ||
| - | created named user config '/ | ||
| - | created named user config '/ | ||
| - | [9/11]: setting up server configuration | ||
| - | [10/11]: configuring named to start on boot | ||
| - | [11/11]: changing resolv.conf to point to ourselves | ||
| - | Done configuring DNS (named). | ||
| - | Restarting the web server to pick up resolv.conf changes | ||
| - | Configuring DNS key synchronization service (ipa-dnskeysyncd) | ||
| - | [1/7]: checking status | ||
| - | [2/7]: setting up bind-dyndb-ldap working directory | ||
| - | [3/7]: setting up kerberos principal | ||
| - | [4/7]: setting up SoftHSM | ||
| - | [5/7]: adding DNSSEC containers | ||
| - | [6/7]: creating replica keys | ||
| - | [7/7]: configuring ipa-dnskeysyncd to start on boot | ||
| - | Done configuring DNS key synchronization service (ipa-dnskeysyncd). | ||
| - | Restarting ipa-dnskeysyncd | ||
| - | Restarting named | ||
| - | Updating DNS system records | ||
| - | Configuring SID generation | ||
| - | [1/8]: creating samba domain object | ||
| - | [2/8]: adding admin(group) SIDs | ||
| - | [3/8]: adding RID bases | ||
| - | [4/8]: updating Kerberos config | ||
| - | ' | ||
| - | [5/8]: activating sidgen task | ||
| - | [6/8]: restarting Directory Server to take MS PAC and LDAP plugins changes into account | ||
| - | [7/8]: adding fallback group | ||
| - | [8/8]: adding SIDs to existing users and groups | ||
| - | This step may take considerable amount of time, please wait.. | ||
| - | Done. | ||
| - | Configuring client side components | ||
| - | This program will set up IPA client. | ||
| - | Version 4.9.6 | ||
| - | |||
| - | Using existing certificate '/ | ||
| - | Client hostname: sp-spo-ipa.juntotelecom.com.br | ||
| - | Realm: JUNTOTELECOM.COM.BR | ||
| - | DNS Domain: juntotelecom.com.br | ||
| - | IPA Server: sp-spo-ipa.juntotelecom.com.br | ||
| - | BaseDN: dc=juntotelecom, | ||
| - | |||
| - | Configured sudoers in / | ||
| - | Configured / | ||
| - | Systemwide CA database updated. | ||
| - | Adding SSH public key from / | ||
| - | Adding SSH public key from / | ||
| - | Adding SSH public key from / | ||
| - | SSSD enabled | ||
| - | Configured / | ||
| - | Configured / | ||
| - | Configured / | ||
| - | Configuring juntotelecom.com.br as NIS domain. | ||
| - | Client configuration complete. | ||
| - | The ipa-client-install command was successful | ||
| - | |||
| - | ============================================================================== | ||
| - | Setup complete | ||
| - | |||
| - | Next steps: | ||
| - | 1. You must make sure these network ports are open: | ||
| - | TCP Ports: | ||
| - | * 80, 443: HTTP/HTTPS | ||
| - | * 389, 636: LDAP/LDAPS | ||
| - | * 88, 464: kerberos | ||
| - | * 53: bind | ||
| - | UDP Ports: | ||
| - | * 88, 464: kerberos | ||
| - | * 53: bind | ||
| - | * 123: ntp | ||
| - | |||
| - | 2. You can now obtain a kerberos ticket using the command: 'kinit admin' | ||
| - | This ticket will allow you to use the IPA tools (e.g., ipa user-add) | ||
| - | and the web user interface. | ||
| - | |||
| - | Be sure to back up the CA certificates stored in / | ||
| - | These files are required to create replicas. The password for these | ||
| - | files is the Directory Manager password | ||
| - | The ipa-server-install command was successful | ||
| - | </ | ||
| - | |||
| - | ===== Checando o status ===== | ||
| - | # kinit admin | ||
| - | Password for admin@JUNTOTELECOM.COM.BR: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # klist | ||
| - | Ticket cache: KCM:0 | ||
| - | Default principal: admin@JUNTOTELECOM.COM.BR | ||
| - | |||
| - | Valid starting | ||
| - | 04/12/22 16: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipactl status | ||
| - | Directory Service: RUNNING | ||
| - | krb5kdc Service: RUNNING | ||
| - | kadmin Service: RUNNING | ||
| - | named Service: RUNNING | ||
| - | httpd Service: RUNNING | ||
| - | ipa-custodia Service: RUNNING | ||
| - | pki-tomcatd Service: RUNNING | ||
| - | ipa-otpd Service: RUNNING | ||
| - | ipa-dnskeysyncd Service: RUNNING | ||
| - | ipa: INFO: The ipactl command was successful | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa config-show | ||
| - | Maximum username length: 32 | ||
| - | Maximum hostname length: 64 | ||
| - | Home directory base: /home | ||
| - | Default shell: /bin/sh | ||
| - | Default users group: ipausers | ||
| - | Default e-mail domain: juntotelecom.com.br | ||
| - | Search time limit: 2 | ||
| - | Search size limit: 100 | ||
| - | User search fields: uid, | ||
| - | Group search fields: cn, | ||
| - | Enable migration mode: FALSE | ||
| - | Certificate Subject base: O=JUNTOTELECOM.COM.BR | ||
| - | Password Expiration Notification (days): 4 | ||
| - | Password plugin features: AllowNThash, | ||
| - | SELinux user map order: guest_u: | ||
| - | Default SELinux user: unconfined_u: | ||
| - | Default PAC types: MS-PAC, nfs:NONE | ||
| - | IPA masters: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA master capable of PKINIT: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA CA servers: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA CA renewal master: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA DNS servers: sp-spo-ipa.juntotelecom.com.br | ||
| - | </ | ||
| - | |||
| - | ===== Alterando o bash padrão ===== | ||
| - | <code bash> | ||
| - | # which false | ||
| - | / | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa config-mod --defaultshell=/ | ||
| - | Maximum username length: 32 | ||
| - | Maximum hostname length: 64 | ||
| - | Home directory base: /home | ||
| - | Default shell: / | ||
| - | Default users group: ipausers | ||
| - | Default e-mail domain: juntotelecom.com.br | ||
| - | Search time limit: 2 | ||
| - | Search size limit: 100 | ||
| - | User search fields: uid, | ||
| - | Group search fields: cn, | ||
| - | Enable migration mode: FALSE | ||
| - | Certificate Subject base: O=JUNTOTELECOM.COM.BR | ||
| - | Password Expiration Notification (days): 4 | ||
| - | Password plugin features: AllowNThash, | ||
| - | SELinux user map order: guest_u: | ||
| - | Default SELinux user: unconfined_u: | ||
| - | Default PAC types: MS-PAC, nfs:NONE | ||
| - | IPA masters: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA master capable of PKINIT: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA CA servers: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA CA renewal master: sp-spo-ipa.juntotelecom.com.br | ||
| - | IPA DNS servers: sp-spo-ipa.juntotelecom.com.br | ||
| - | </ | ||
| - | |||
| - | ===== Check NTP ===== | ||
| - | <code bash> | ||
| - | # chronyc -4 sources | ||
| - | MS Name/IP address | ||
| - | =============================================================================== | ||
| - | ^+ a.st1.ntp.br | ||
| - | ^+ a.ntp.br | ||
| - | ^- c.ntp.br | ||
| - | ^* gps.jd.ntp.br | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # chronyc sources -v | ||
| - | |||
| - | .-- Source mode ' | ||
| - | / .- Source state ' | ||
| - | | / ' | ||
| - | || .- xxxx [ yyyy ] +/- zzzz | ||
| - | || Reachability register (octal) -. | ||
| - | || Log2(Polling interval) --. | | yyyy = measured offset, | ||
| - | || \ | ||
| - | || | ||
| - | MS Name/IP address | ||
| - | =============================================================================== | ||
| - | ^+ a.st1.ntp.br | ||
| - | ^+ a.ntp.br | ||
| - | ^- c.ntp.br | ||
| - | ^* gps.jd.ntp.br | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # chronyc -4 tracking | ||
| - | Reference ID : 427DF641 (gps.jd.ntp.br) | ||
| - | Stratum | ||
| - | Ref time (UTC) : Tue Apr 12 19:59:44 2022 | ||
| - | System time : 0.000024061 seconds slow of NTP time | ||
| - | Last offset | ||
| - | RMS offset | ||
| - | Frequency | ||
| - | Residual freq : +0.001 ppm | ||
| - | Skew : 0.297 ppm | ||
| - | Root delay : 0.002696296 seconds | ||
| - | Root dispersion : 0.001138488 seconds | ||
| - | Update interval : 64.9 seconds | ||
| - | Leap status | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # chronyc sourcestats | ||
| - | Name/IP Address | ||
| - | ============================================================================== | ||
| - | a.st1.ntp.br | ||
| - | a.ntp.br | ||
| - | c.ntp.br | ||
| - | gps.jd.ntp.br | ||
| - | </ | ||
| - | |||
| - | ===== Check DNS ===== | ||
| - | <code bash> | ||
| - | # ipa dnszone-show juntotelecom.com.br | ||
| - | Zone name: juntotelecom.com.br. | ||
| - | Active zone: TRUE | ||
| - | Authoritative nameserver: sp-spo-ipa.juntotelecom.com.br. | ||
| - | Administrator e-mail address: hostmaster.juntotelecom.com.br. | ||
| - | SOA serial: 1649793010 | ||
| - | SOA refresh: 3600 | ||
| - | SOA retry: 900 | ||
| - | SOA expire: 1209600 | ||
| - | SOA minimum: 3600 | ||
| - | BIND update policy: grant JUNTOTELECOM.COM.BR krb5-self * A; grant JUNTOTELECOM.COM.BR krb5-self * AAAA; grant JUNTOTELECOM.COM.BR krb5-self * SSHFP; | ||
| - | Dynamic update: TRUE | ||
| - | Allow query: any; | ||
| - | Allow transfer: none; | ||
| - | </ | ||
| - | |||
| - | ===== Regras de firewall ===== | ||
| - | <code bash> | ||
| - | # firewall-cmd --permanent --add-service={freeipa-4, | ||
| - | # firewall-cmd --reload | ||
| - | </ | ||
install_ipa_oracle_linux.1753560544.txt.gz · Last modified: by wikiadm
