Newsroom Update

Beginning in May, a special Today at Apple series titled “Made for Business” will offer small business owners and entrepreneurs free opportunities to learn how Apple products and services can support their growth and success. Learn more >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Network users un-mounts after sleep

I have several network users. After sleeping - and approx. one minute - if I wake them I get the users WITHOUT home folder (see log below). Any one with the same problem

Mac mini, Mac OS X (10.7)

Posted on Dec 31, 2012 2:07 AM

Reply
9 replies

Dec 31, 2012 3:45 AM in response to Evian

This the outcome from the comsole


12/31/12 12:35:36.951 PM CalendarAgent[203]: CoreData: error: (1802) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:1802, 'disk I/O error' errno:9

12/31/12 12:35:36.961 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) The account "julio" has been deleted out from under us!

12/31/12 12:35:36.962 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) In a future build of the OS, this error will be fatal.

12/31/12 12:35:37.078 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:40.400 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:41.427 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:45.229 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:45.230 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

}

12/31/12 12:35:46.364 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = unable to open database file with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 14;

}

12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:46.466 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

}

12/31/12 12:35:51.178 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:51.977 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:52.100 PM CalendarAgent[203]: *** -[CalManagedObjectContext executeFetchRequest:error:]: error: Error Domain=NSCocoaErrorDomain Code=256 "The file “Calendar Cache” couldn’t be opened." UserInfo=0x7fa0ed502650 {NSFilePath=/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache, NSSQLiteErrorDomain=21, NSUnderlyingException=I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'} {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

NSUnderlyingException = "I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'";

}

12/31/12 12:35:52.465 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x13013].com.apple.inputmethod.ironwood[197]) Exited: Killed: 9

12/31/12 12:35:52.485 PM com.apple.launchd.peruser.1025[143]: (com.apple.talagent[169]) Exited: Killed: 9

12/31/12 12:35:52.489 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x18018].com.apple.AppleSpell[218]) Exited: Terminated: 15

12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x19019].com.apple.iTunesHelper[233]) Exited with code: 1

12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: (com.apple.mdworker.shared.04000000-0000-0000-0000-000000000000[441]) Exited: Killed: 9

12/31/12 12:35:52.746 PM NotificationCenter[192]: Connection interrupted.

12/31/12 12:35:56.999 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: UserName

12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: GroupName

12/31/12 12:36:09.340 PM com.apple.launchd.peruser.1025[143]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self

12/31/12 12:36:09.344 PM loginwindow[614]: Connection with distnoted server was invalidated

12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m

12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m

12/31/12 12:36:13.562 PM com.apple.launchd.peruser.1025[143]: (com.apple.tccd[189]) Job appears to have crashed: Abort trap: 6

12/31/12 12:36:18.852 PM CalendarAgent[716]: *** -[IADomainCache init]: IA domains cache is out of date.

12/31/12 12:36:22.729 PM CalendarAgent[716]: Duplicate UID: 040000008200E00074C5B7101A82E008000000006014846FF7CBCD0100000000000000001000000 0E3E7ACD9478940488122A33214668A1C

12/31/12 12:36:29.887 PM Messages[678]: Error launching spell checker for Deutsch: Error Domain=NSCocoaErrorDomain Code=256 "The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)." UserInfo=0x7fa01d2b4850 {NSURL=file://localhost/System/Library/Services/AppleSpell.service/, NSLocalizedDescription=The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)., NSUnderlyingError=0x7fa01dc9da60 "The operation couldn’t be completed. (OSStatus error -1712.)"}

12/31/12 12:36:56.334 PM AddressBookSourceSync[738]: *** -[IADomainCache init]: IA domains cache is out of date.

12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory

12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3) for weird reason: 2

12/31/12 12:37:09.782 PM com.apple.launchd.peruser.1025[143]: (com.apple.mrt.uiagent[745]) Exited with code: 255

Dec 31, 2012 3:57 AM in response to Evian

And this is the system log from the server (no open directory issues)


Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:51209 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:59097 for HTTP/server.example.com@server.example.com [canonicalize]

Dec 31 12:41:19 server.example.com ruby[55078]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:19 server.example.com ruby[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:19 server com.apple.launchd[1] (com.apple.collabd.expire[55078]): Exited with code: 1

Dec 31 12:41:20 server.example.com collabpp[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:21 server kernel[0]: Sandbox: sandboxd(55090) deny mach-lookup com.apple.coresymbolicationd

Dec 31 12:41:21 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

Dec 31 12:41:22 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

Dec 31 12:41:53 --- last message repeated 1 time ---

Dec 31 12:42:06 server.example.com com.apple.backupd-helper[55097]: Not starting scheduled Time Machine backup - time machine destination not resolvable.

Dec 31 12:44:19 server.example.com collabd[104]: [CSContentService:47 45cc000 +22ms] Detected Magic Superuser Auth Token

Dec 31 12:46:19 server.example.com ruby[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:46:19 server.example.com collabpp[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:46:19 server kernel[0]: Sandbox: sandboxd(55154) deny mach-lookup com.apple.coresymbolicationd

Dec 31 12:46:19 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

Dec 31 12:46:20 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

Dec 31 12:46:51 --- last message repeated 1 time ---

Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:49670 for afpserver/server.local@server.example.com [canonicalize]

Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:49670

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:58353 for afpserver/server.local@server.example.com

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: afpserver/server.local@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:58353

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:62667 for afpserver/server.local@server.example.com [canonicalize]

Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:62667

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:64650 for krbtgt/LOCAL@server.example.com

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:64650

Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50162

Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50163

Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50164 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50165 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from 10.0.1.8:50166 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50167 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:63201 for vnc/server.local@server.example.com [canonicalize]

Dec 31 12:48:24 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:63201

Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:60737 for vnc/server.local@server.example.com

Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: vnc/server.local@server.example.com: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:60737

Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50169

Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50170

Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50171 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50172 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50173 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50174 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50175 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50176 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

Dec 31 12:48:34 server.example.com screensharingd[55188]: Authentication: SUCCEEDED :: User Name: serveradmin :: Viewer Address: 10.0.1.8 :: Type: Kerberos

Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:64121 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:46 --- last message repeated 1 time ---

Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:46 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:65105 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:46 --- last message repeated 1 time ---

Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:46 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

Dec 31 12:48:46 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:46 server.example.com kdc[51]: Requested flags: forwardable

Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53531 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53574 for ldap/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:49 server com.apple.launchd.peruser.1028[738] (com.apple.serveralertproxy): Throttling respawn: Will start in 4 seconds

Dec 31 12:48:49 server.example.com servermgrd[55205]: flushing dns cache

Dec 31 12:48:49 server.example.com mDNSResponder[45]: SIGHUP: Purge cache

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:63756 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:57 --- last message repeated 1 time ---

Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:57 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:49561 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:57 --- last message repeated 1 time ---

Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:57 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

Dec 31 12:48:57 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:57 server.example.com kdc[51]: Requested flags: forwardable

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:63394 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:54527 for ldap/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:58 server.example.com servermgrd[55205]: --Module servermgr_devicemgr's response has retain count of 3.

Dec 31 12:48:58 server.example.com servermgrd[55205]: --request was {

command = getState;

}

Dec 31 12:48:58 server.example.com servermgrd[55205]: --response was {

state = STOPPED;

}

Dec 31 12:49:00 server.example.com servermgrd[55205]: --Module servermgr_swupdate's response has retain count of 3.

Dec 31 12:49:00 server.example.com servermgrd[55205]: --request was {

command = getLogPaths;

}

Dec 31 12:49:00 server.example.com servermgrd[55205]: --response was {

swupdateAccessLog = "/var/log/swupd/swupd_access_log";

swupdateErrorLog = "/var/log/swupd/swupd_error_log";

swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";

}

Dec 31 12:49:05 server.example.com sudo[55238]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:12 server com.apple.launchd[1] (com.apple.xpcd.59000000-0000-0000-0000-000000000000[52349]): Exited: Killed: 9

Dec 31 12:49:12 server kernel[0]: memorystatus_thread: idle exiting pid 52349 [xpcd]

Dec 31 12:49:15 server.example.com sudo[55263]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:15 server.example.com servermgrd[55205]: nsc_smb XPC: handle_event error : < Connection invalid >

Dec 31 12:49:17 --- last message repeated 1 time ---

Dec 31 12:49:17 server.example.com sudo[55292]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:22 server.example.com sudo[55327]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:49:32 server.example.com Server[55196]: Error reading data store for Messages service

Dec 31 12:49:48 server.example.com servermgrd[55205]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

Dec 31, 2012 4:01 AM in response to Evian

Do you own the domain 'example.com'?


12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

If you used 'example.com' as the domain of your production OS X server installation then that was not a good thing to do.


If you open Network Utility on both a client machine (assuming client machine in your LAN not on Internet) and the server and go to the tab 'Lookup' and do a lookup on:


'example.com' then 'server.example.com' (minus the quote marks)


what do you see?


If you go to the server, open a terminal window and run this command:


sudo changeip -checkhostname


What do you see? If it does not say 'success' then you have a problem.


If you used 'example.com' as the domain name (and you don't own the domain) then the server installation could have significant DNS issues.

Network users un-mounts after sleep

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.