[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Ldap simple bind problems on slaves during network outage (chaining)



Hi,

On Tue, 3 Dec 2013, Christian Kratzer wrote:
Hi,

we are currently chasing a strange issue at a customers site where the ldap slaves become unresponsive when network connectivity to master ldaps and dns servers is lost.

They have a setup of two masters and two slaves at separate sites. There is a load balancer sitting in front of the slaves that performs regular health checks consisting of binds followed by a search of their binddn.


It seems that this is due to ldap chaining from slave to master running without a timeout and eventually blocking all of slapd.

We use referrals and chaining for slapo-ppolicy and slapo-lastbind (with replication patch from ITS#7721).

I tried to resolve this using olcDbKeepalive and olcDbKeepalive but have not been sucessfull yet.

This is how the chaining backend is configured on the slaves in our lab:

olcDatabase={1}ldap,olcOverlay={0}chain,olcDatabase={-1}frontend,cn=config
objectClass: olcLDAPConfig
objectClass: olcChainDatabase
olcDatabase: {1}ldap
olcDbURI: "ldap://ldaptest0.example.org";
olcDbStartTLS: start   starttls=no  tls_cert="/usr/local/etc/openldap/certs/server.cert"  tls_key="/usr/local/etc/openldap/certs/server.key"  tls_cacert="/usr/local/etc/openldap/certs/ca.cert"  tls_reqcert=demand  tls_crlcheck=none
olcDbIDAssertBind: mode=self  flags=prescriptive,proxy-authz-non-critical  bindmethod=simple  binddn="cn=chain,ou=system,dc=de,dc=telefonica,dc=com"  credentials="XXXXXXXXXXX"  keepalive=60:6:10  tls_cert="/usr/local/etc/openldap/certs/server.cert"  tls_key="/usr/local/etc/openldap/certs/server.key"  tls_cacert="/usr/local/etc/openldap/certs/ca.cert" tls_reqcert=demand  tls_crlcheck=none
olcDbRebindAsUser: FALSE
olcDbChaseReferrals: TRUE
olcDbTFSupport: no
olcDbProxyWhoAmI: FALSE
olcDbProtocolVersion: 3
olcDbSingleConn: FALSE
olcDbCancel: abandon
olcDbUseTemporaryConn: FALSE
olcDbConnectionPoolMax: 16
olcDbSessionTrackingRequest: FALSE
olcDbNoRefs: FALSE
olcDbNoUndefFilter: FALSE
olcDbOnErr: continue
olcDbKeepalive: 60:6:10
olcDbNetworkTimeout: 3

Any pointers on what we should change to allow quick detection of unreachable olcDbURI ?


Greetings
Christian


During regular operations the load balancers health checks look as follows [1]

Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 fd=36 ACCEPT from IP=192.0.2.189:33852 (IP=192.0.2.129:389) Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=0 BIND dn="cn=keepalive-check-lb,ou=system,dc=example,dc=org" method=128 Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=0 BIND dn="cn=keepalive-check-lb,ou=system,dc=example,dc=org" mech=SIMPLE ssf=0 Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=0 RESULT tag=97 err=0 text= Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=1 SRCH base="ou=system,dc=example,dc=org" scope=1 deref=0 filter="(cn=keepalive-check-lb)" Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=1 ENTRY dn="cn=keepalive-check-lb,ou=system,dc=example,dc=org" Dec 2 14:38:05 ldap slapd[57585]: conn=3924716 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
 Dec  2 14:38:05 ldap slapd[57585]: conn=3924716 op=2 UNBIND
Dec 2 14:38:05 ldap slapd[57585]: connection_closing: readying conn=3924716 sd=36 for close Dec 2 14:38:05 ldap slapd[57585]: connection_resched: attempting closing conn=3924716 sd=36
 Dec  2 14:38:05 ldap slapd[57585]: conn=3924716 fd=36 closed


When they experience a network outage separating the slaves from the masters and the dns servers the load balancers are not able to bind the slaves:

Dec 2 14:38:50 ldap slapd[57585]: conn=3924725 fd=44 ACCEPT from IP=192.0.2.188:35761 (IP=192.0.2.129:389) Dec 2 14:38:50 ldap slapd[57585]: connection_closing: readying conn=3924725 sd=44 for close Dec 2 14:38:50 ldap slapd[57585]: connection_close: deferring conn=3924725 sd=44 Dec 2 14:38:50 ldap slapd[57585]: conn=3924725 op=0 BIND dn="cn=keepalive-check-lb,ou=system,dc=example,dc=org" method=128 Dec 2 14:38:50 ldap slapd[57585]: conn=3924725 op=0 BIND dn="cn=keepalive-check-lb,ou=system,dc=example,dc=org" mech=SIMPLE ssf=0 Dec 2 14:38:50 ldap slapd[57585]: connection_resched: attempting closing conn=3924725 sd=44 Dec 2 14:38:50 ldap slapd[57585]: conn=3924725 fd=44 closed (connection lost)

We have not been able to reproduce this problem in a lab setup which is supposed to be identical to the production setup. It does not seem to be related to the servers not being able to perform reverse mapping on the client ips. We run a mixture of 2.4.35 and 2.4.38 on CentOS 6.4. In the lab the slaves are able to perform queries just fine without connectivity to the masters or to their dns servers.

The servers are currently running with following loglevel:

 dn: cn=config
 olcLogLevel: Conns
 olcLogLevel: Stats
 olcLogLevel: Stats2
 olcLogLevel: Sync

It seems we only get to the point where the bind credentials are parsed after which the connection is closed.

This could of course be a problem with the load balancer prematurely closing the connection.

I am trying to eliminate any causes in the ldap servers.

Any ideas on how to debug this or where we could look.

Greetings
Christian

[1] dns and ips obfuscated to protect the customer



--
Christian Kratzer                      CK Software GmbH
Email:   ck@cksoft.de                  Wildberger Weg 24/2
Phone:   +49 7032 893 997 - 0          D-71126 Gaeufelden
Fax:     +49 7032 893 997 - 9          HRB 245288, Amtsgericht Stuttgart
Web:     http://www.cksoft.de/         Geschaeftsfuehrer: Christian Kratzer