9 Replies Latest reply: Dec 31, 2012 5:02 AM by FromOZ
Evian Level 1 Level 1 (0 points)

I have several network users. After sleeping - and approx. one minute - if I wake them I get the users WITHOUT home folder (see log below). Any one with the same problem


Mac mini, Mac OS X (10.7)
  • iDash Level 1 Level 1 (0 points)

    sounds very similar to the problem I just posted ?

     

    https://discussions.apple.com/thread/4653255?tstart=0

     

    Are you seeing the same behaviour as I ?

  • Evian Level 1 Level 1 (0 points)

    This the outcome from the comsole

     

    12/31/12 12:35:36.951 PM CalendarAgent[203]: CoreData: error: (1802) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:1802, 'disk I/O error' errno:9

    12/31/12 12:35:36.961 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) The account "julio" has been deleted out from under us!

    12/31/12 12:35:36.962 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) In a future build of the OS, this error will be fatal.

    12/31/12 12:35:37.078 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:40.400 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:41.427 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:45.229 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:45.230 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file' with userInfo = {

        NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

        NSSQLiteErrorDomain = 21;

    }

    12/31/12 12:35:46.364 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = unable to open database file with userInfo = {

        NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

        NSSQLiteErrorDomain = 14;

    }

    12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:46.466 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file' with userInfo = {

        NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

        NSSQLiteErrorDomain = 21;

    }

    12/31/12 12:35:51.178 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:51.977 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:35:52.100 PM CalendarAgent[203]: *** -[CalManagedObjectContext executeFetchRequest:error:]: error: Error Domain=NSCocoaErrorDomain Code=256 "The file “Calendar Cache” couldn’t be opened." UserInfo=0x7fa0ed502650 {NSFilePath=/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache, NSSQLiteErrorDomain=21, NSUnderlyingException=I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'} {

        NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

        NSSQLiteErrorDomain = 21;

        NSUnderlyingException = "I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'";

    }

    12/31/12 12:35:52.465 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x13013].com.apple.inputmethod.ironwood[197]) Exited: Killed: 9

    12/31/12 12:35:52.485 PM com.apple.launchd.peruser.1025[143]: (com.apple.talagent[169]) Exited: Killed: 9

    12/31/12 12:35:52.489 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x18018].com.apple.AppleSpell[218]) Exited: Terminated: 15

    12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x19019].com.apple.iTunesHelper[233]) Exited with code: 1

    12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: (com.apple.mdworker.shared.04000000-0000-0000-0000-000000000000[441]) Exited: Killed: 9

    12/31/12 12:35:52.746 PM NotificationCenter[192]: Connection interrupted.

    12/31/12 12:35:56.999 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'

    12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: UserName

    12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: GroupName

    12/31/12 12:36:09.340 PM com.apple.launchd.peruser.1025[143]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self

    12/31/12 12:36:09.344 PM loginwindow[614]: Connection with distnoted server was invalidated

    12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m

    12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m

    12/31/12 12:36:13.562 PM com.apple.launchd.peruser.1025[143]: (com.apple.tccd[189]) Job appears to have crashed: Abort trap: 6

    12/31/12 12:36:18.852 PM CalendarAgent[716]: *** -[IADomainCache init]: IA domains cache is out of date.

    12/31/12 12:36:22.729 PM CalendarAgent[716]: Duplicate UID: 040000008200E00074C5B7101A82E008000000006014846FF7CBCD0100000000000000001000000 0E3E7ACD9478940488122A33214668A1C

    12/31/12 12:36:29.887 PM Messages[678]: Error launching spell checker for Deutsch:  Error Domain=NSCocoaErrorDomain Code=256 "The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)." UserInfo=0x7fa01d2b4850 {NSURL=file://localhost/System/Library/Services/AppleSpell.service/, NSLocalizedDescription=The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)., NSUnderlyingError=0x7fa01dc9da60 "The operation couldn’t be completed. (OSStatus error -1712.)"}

    12/31/12 12:36:56.334 PM AddressBookSourceSync[738]: *** -[IADomainCache init]: IA domains cache is out of date.

    12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory

    12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3) for weird reason: 2

    12/31/12 12:37:09.782 PM com.apple.launchd.peruser.1025[143]: (com.apple.mrt.uiagent[745]) Exited with code: 255

  • Evian Level 1 Level 1 (0 points)

    very similar problem with two remarks: mine are network users (not client) and it happens when waking up after 30 minutes - 1 hour

  • Evian Level 1 Level 1 (0 points)

    And this is the system log from the server (no open directory issues)

     

    Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:51209 for host/server.example.com@server.example.com [canonicalize]

    Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:59097 for HTTP/server.example.com@server.example.com [canonicalize]

    Dec 31 12:41:19 server.example.com ruby[55078]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Dec 31 12:41:19 server.example.com ruby[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Dec 31 12:41:19 server com.apple.launchd[1] (com.apple.collabd.expire[55078]): Exited with code: 1

    Dec 31 12:41:20 server.example.com collabpp[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Dec 31 12:41:21 server kernel[0]: Sandbox: sandboxd(55090) deny mach-lookup com.apple.coresymbolicationd

    Dec 31 12:41:21 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

    Dec 31 12:41:22 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

    Dec 31 12:41:53 --- last message repeated 1 time ---

    Dec 31 12:42:06 server.example.com com.apple.backupd-helper[55097]: Not starting scheduled Time Machine backup - time machine destination not resolvable.

    Dec 31 12:44:19 server.example.com collabd[104]: [CSContentService:47 45cc000 +22ms] Detected Magic Superuser Auth Token

    Dec 31 12:46:19 server.example.com ruby[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Dec 31 12:46:19 server.example.com collabpp[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Dec 31 12:46:19 server kernel[0]: Sandbox: sandboxd(55154) deny mach-lookup com.apple.coresymbolicationd

    Dec 31 12:46:19 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

    Dec 31 12:46:20 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

    Dec 31 12:46:51 --- last message repeated 1 time ---

    Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

    Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:49670 for afpserver/server.local@server.example.com [canonicalize]

    Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

    Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

    Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:49670

    Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:58353 for afpserver/server.local@server.example.com

    Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: afpserver/server.local@server.example.com: no such entry found in hdb

    Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:58353

    Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:62667 for afpserver/server.local@server.example.com [canonicalize]

    Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

    Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

    Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:62667

    Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:64650 for krbtgt/LOCAL@server.example.com

    Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

    Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:64650

    Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

    Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

    Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

    Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

    Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

    Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50162

    Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50163

    Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50164 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50165 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from 10.0.1.8:50166 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50167 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:63201 for vnc/server.local@server.example.com [canonicalize]

    Dec 31 12:48:24 server.example.com kdc[51]: Searching referral for server.local

    Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:63201

    Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:60737 for vnc/server.local@server.example.com

    Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: vnc/server.local@server.example.com: no such entry found in hdb

    Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:60737

    Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50169

    Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50170

    Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

    Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50171 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 --- last message repeated 1 time ---

    Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

    Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50172 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 --- last message repeated 1 time ---

    Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

    Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50173 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 --- last message repeated 1 time ---

    Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

    Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50174 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 --- last message repeated 1 time ---

    Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

    Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

    Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50175 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

    Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50176 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

    Dec 31 12:48:34 server.example.com screensharingd[55188]: Authentication: SUCCEEDED :: User Name: serveradmin :: Viewer Address: 10.0.1.8 :: Type: Kerberos

    Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:64121 for krbtgt/server.example.com@server.example.com

    Dec 31 12:48:46 --- last message repeated 1 time ---

    Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

    Dec 31 12:48:46 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:65105 for krbtgt/server.example.com@server.example.com

    Dec 31 12:48:46 --- last message repeated 1 time ---

    Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Dec 31 12:48:46 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

    Dec 31 12:48:46 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Dec 31 12:48:46 server.example.com kdc[51]: Requested flags: forwardable

    Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53531 for host/server.example.com@server.example.com [canonicalize]

    Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53574 for ldap/server.example.com@server.example.com [canonicalize]

    Dec 31 12:48:49 server com.apple.launchd.peruser.1028[738] (com.apple.serveralertproxy): Throttling respawn: Will start in 4 seconds

    Dec 31 12:48:49 server.example.com servermgrd[55205]: flushing dns cache

    Dec 31 12:48:49 server.example.com mDNSResponder[45]: SIGHUP: Purge cache

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

    Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:63756 for krbtgt/server.example.com@server.example.com

    Dec 31 12:48:57 --- last message repeated 1 time ---

    Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

    Dec 31 12:48:57 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:49561 for krbtgt/server.example.com@server.example.com

    Dec 31 12:48:57 --- last message repeated 1 time ---

    Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Dec 31 12:48:57 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

    Dec 31 12:48:57 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Dec 31 12:48:57 server.example.com kdc[51]: Requested flags: forwardable

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:63394 for host/server.example.com@server.example.com [canonicalize]

    Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:54527 for ldap/server.example.com@server.example.com [canonicalize]

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:48:58 server.example.com servermgrd[55205]: --Module servermgr_devicemgr's response has retain count of 3.

    Dec 31 12:48:58 server.example.com servermgrd[55205]: --request was {

                  command = getState;

              }

    Dec 31 12:48:58 server.example.com servermgrd[55205]: --response was {

                  state = STOPPED;

              }

    Dec 31 12:49:00 server.example.com servermgrd[55205]: --Module servermgr_swupdate's response has retain count of 3.

    Dec 31 12:49:00 server.example.com servermgrd[55205]: --request was {

                  command = getLogPaths;

              }

    Dec 31 12:49:00 server.example.com servermgrd[55205]: --response was {

                  swupdateAccessLog = "/var/log/swupd/swupd_access_log";

                  swupdateErrorLog = "/var/log/swupd/swupd_error_log";

                  swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";

              }

    Dec 31 12:49:05 server.example.com sudo[55238]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Dec 31 12:49:12 server com.apple.launchd[1] (com.apple.xpcd.59000000-0000-0000-0000-000000000000[52349]): Exited: Killed: 9

    Dec 31 12:49:12 server kernel[0]: memorystatus_thread: idle exiting pid 52349 [xpcd]

    Dec 31 12:49:15 server.example.com sudo[55263]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Dec 31 12:49:15 server.example.com servermgrd[55205]: nsc_smb XPC: handle_event error : < Connection invalid >

    Dec 31 12:49:17 --- last message repeated 1 time ---

    Dec 31 12:49:17 server.example.com sudo[55292]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Dec 31 12:49:22 server.example.com sudo[55327]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

    Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

    Dec 31 12:49:32 server.example.com Server[55196]: Error reading data store for Messages service

    Dec 31 12:49:48 server.example.com servermgrd[55205]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

  • FromOZ Level 2 Level 2 (405 points)

    Do you own the domain 'example.com'?

     

    12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache.  SQLite error code:21, 'unable to open database file'


    If you used 'example.com' as the domain of your production OS X server installation then that was not a good thing to do.

     

    If you open Network Utility on both a client machine (assuming client machine in your LAN not on Internet) and the server and go to the tab 'Lookup' and do a lookup on:

     

    'example.com' then 'server.example.com' (minus the quote marks)

     

    what do you see?

     

    If you go to the server, open a terminal window and run this command:

     

    sudo changeip -checkhostname

     

    What do you see? If it does not say 'success' then you have a problem.

     

    If you used 'example.com' as the domain name (and you don't own the domain) then the server installation could have significant DNS issues.

  • Evian Level 1 Level 1 (0 points)

    Hi FromOz. Thankd for your post.

     

    The DNS is OK (lookup shows the right info as well as changeip). The "example.com" is just a dummy name. The real one is working without any problem (internal/external with mail, VPN, calendar, contacts, etc).

  • FromOZ Level 2 Level 2 (405 points)

    So you did a search/replace for all occurances of 'your_server.your_domain.com' in logs and changed them to 'server.example.com' ?

     

    So, obviously then, when the client log says things like "'unable to open database file'" this is due to, after the fact, lost network connection?

  • Evian Level 1 Level 1 (0 points)

    Yes to your first question.

     

    To your second question I guess so if my macs are not able to find the home folder...

  • FromOZ Level 2 Level 2 (405 points)

    OK clear.

     

    Sorry at this stage I'll have to advise I don't have any answers to hand. I don't use network based home folders. Question may end up needing to be asked to Apple directly if no joy on the forums.