Network users un-mounts after sleep
I have several network users. After sleeping - and approx. one minute - if I wake them I get the users WITHOUT home folder (see log below). Any one with the same problem
Mac mini, Mac OS X (10.7)
Apple Event: May 7th at 7 am PT
I have several network users. After sleeping - and approx. one minute - if I wake them I get the users WITHOUT home folder (see log below). Any one with the same problem
Mac mini, Mac OS X (10.7)
sounds very similar to the problem I just posted ?
https://discussions.apple.com/thread/4653255?tstart=0
Are you seeing the same behaviour as I ?
This the outcome from the comsole
12/31/12 12:35:36.951 PM CalendarAgent[203]: CoreData: error: (1802) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:1802, 'disk I/O error' errno:9
12/31/12 12:35:36.961 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) The account "julio" has been deleted out from under us!
12/31/12 12:35:36.962 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) In a future build of the OS, this error will be fatal.
12/31/12 12:35:37.078 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:40.400 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:41.427 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:45.229 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:45.230 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {
NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";
NSSQLiteErrorDomain = 21;
}
12/31/12 12:35:46.364 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = unable to open database file with userInfo = {
NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";
NSSQLiteErrorDomain = 14;
}
12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:46.466 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {
NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";
NSSQLiteErrorDomain = 21;
}
12/31/12 12:35:51.178 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:51.977 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:35:52.100 PM CalendarAgent[203]: *** -[CalManagedObjectContext executeFetchRequest:error:]: error: Error Domain=NSCocoaErrorDomain Code=256 "The file “Calendar Cache” couldn’t be opened." UserInfo=0x7fa0ed502650 {NSFilePath=/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache, NSSQLiteErrorDomain=21, NSUnderlyingException=I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'} {
NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";
NSSQLiteErrorDomain = 21;
NSUnderlyingException = "I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'";
}
12/31/12 12:35:52.465 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x13013].com.apple.inputmethod.ironwood[197]) Exited: Killed: 9
12/31/12 12:35:52.485 PM com.apple.launchd.peruser.1025[143]: (com.apple.talagent[169]) Exited: Killed: 9
12/31/12 12:35:52.489 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x18018].com.apple.AppleSpell[218]) Exited: Terminated: 15
12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x19019].com.apple.iTunesHelper[233]) Exited with code: 1
12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: (com.apple.mdworker.shared.04000000-0000-0000-0000-000000000000[441]) Exited: Killed: 9
12/31/12 12:35:52.746 PM NotificationCenter[192]: Connection interrupted.
12/31/12 12:35:56.999 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: UserName
12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: GroupName
12/31/12 12:36:09.340 PM com.apple.launchd.peruser.1025[143]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self
12/31/12 12:36:09.344 PM loginwindow[614]: Connection with distnoted server was invalidated
12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m
12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m
12/31/12 12:36:13.562 PM com.apple.launchd.peruser.1025[143]: (com.apple.tccd[189]) Job appears to have crashed: Abort trap: 6
12/31/12 12:36:18.852 PM CalendarAgent[716]: *** -[IADomainCache init]: IA domains cache is out of date.
12/31/12 12:36:22.729 PM CalendarAgent[716]: Duplicate UID: 040000008200E00074C5B7101A82E008000000006014846FF7CBCD0100000000000000001000000 0E3E7ACD9478940488122A33214668A1C
12/31/12 12:36:29.887 PM Messages[678]: Error launching spell checker for Deutsch: Error Domain=NSCocoaErrorDomain Code=256 "The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)." UserInfo=0x7fa01d2b4850 {NSURL=file://localhost/System/Library/Services/AppleSpell.service/, NSLocalizedDescription=The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)., NSUnderlyingError=0x7fa01dc9da60 "The operation couldn’t be completed. (OSStatus error -1712.)"}
12/31/12 12:36:56.334 PM AddressBookSourceSync[738]: *** -[IADomainCache init]: IA domains cache is out of date.
12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory
12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3) for weird reason: 2
12/31/12 12:37:09.782 PM com.apple.launchd.peruser.1025[143]: (com.apple.mrt.uiagent[745]) Exited with code: 255
very similar problem with two remarks: mine are network users (not client) and it happens when waking up after 30 minutes - 1 hour
And this is the system log from the server (no open directory issues)
Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:51209 for host/server.example.com@server.example.com [canonicalize]
Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:59097 for HTTP/server.example.com@server.example.com [canonicalize]
Dec 31 12:41:19 server.example.com ruby[55078]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.
Dec 31 12:41:19 server.example.com ruby[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.
Dec 31 12:41:19 server com.apple.launchd[1] (com.apple.collabd.expire[55078]): Exited with code: 1
Dec 31 12:41:20 server.example.com collabpp[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.
Dec 31 12:41:21 server kernel[0]: Sandbox: sandboxd(55090) deny mach-lookup com.apple.coresymbolicationd
Dec 31 12:41:21 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib
Dec 31 12:41:22 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Library/Preferences/.GlobalPreferences.plist
Dec 31 12:41:53 --- last message repeated 1 time ---
Dec 31 12:42:06 server.example.com com.apple.backupd-helper[55097]: Not starting scheduled Time Machine backup - time machine destination not resolvable.
Dec 31 12:44:19 server.example.com collabd[104]: [CSContentService:47 45cc000 +22ms] Detected Magic Superuser Auth Token
Dec 31 12:46:19 server.example.com ruby[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.
Dec 31 12:46:19 server.example.com collabpp[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.
Dec 31 12:46:19 server kernel[0]: Sandbox: sandboxd(55154) deny mach-lookup com.apple.coresymbolicationd
Dec 31 12:46:19 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib
Dec 31 12:46:20 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Library/Preferences/.GlobalPreferences.plist
Dec 31 12:46:51 --- last message repeated 1 time ---
Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc
Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:49670 for afpserver/server.local@server.example.com [canonicalize]
Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local
Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb
Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:49670
Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:58353 for afpserver/server.local@server.example.com
Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: afpserver/server.local@server.example.com: no such entry found in hdb
Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:58353
Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:62667 for afpserver/server.local@server.example.com [canonicalize]
Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local
Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb
Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:62667
Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:64650 for krbtgt/LOCAL@server.example.com
Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb
Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:64650
Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc
Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)
Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)
Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)
Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)
Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50162
Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50163
Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50164 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50165 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from 10.0.1.8:50166 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50167 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:63201 for vnc/server.local@server.example.com [canonicalize]
Dec 31 12:48:24 server.example.com kdc[51]: Searching referral for server.local
Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:63201
Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:60737 for vnc/server.local@server.example.com
Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: vnc/server.local@server.example.com: no such entry found in hdb
Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:60737
Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50169
Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50170
Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name
Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50171 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 --- last message repeated 1 time ---
Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP
Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50172 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 --- last message repeated 1 time ---
Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP
Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50173 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 --- last message repeated 1 time ---
Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize
Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50174 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 --- last message repeated 1 time ---
Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2
Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize
Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50175 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]
Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50176 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]
Dec 31 12:48:34 server.example.com screensharingd[55188]: Authentication: SUCCEEDED :: User Name: serveradmin :: Viewer Address: 10.0.1.8 :: Type: Kerberos
Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:64121 for krbtgt/server.example.com@server.example.com
Dec 31 12:48:46 --- last message repeated 1 time ---
Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP
Dec 31 12:48:46 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:65105 for krbtgt/server.example.com@server.example.com
Dec 31 12:48:46 --- last message repeated 1 time ---
Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
Dec 31 12:48:46 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com
Dec 31 12:48:46 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
Dec 31 12:48:46 server.example.com kdc[51]: Requested flags: forwardable
Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53531 for host/server.example.com@server.example.com [canonicalize]
Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53574 for ldap/server.example.com@server.example.com [canonicalize]
Dec 31 12:48:49 server com.apple.launchd.peruser.1028[738] (com.apple.serveralertproxy): Throttling respawn: Will start in 4 seconds
Dec 31 12:48:49 server.example.com servermgrd[55205]: flushing dns cache
Dec 31 12:48:49 server.example.com mDNSResponder[45]: SIGHUP: Purge cache
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)
Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:63756 for krbtgt/server.example.com@server.example.com
Dec 31 12:48:57 --- last message repeated 1 time ---
Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP
Dec 31 12:48:57 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:49561 for krbtgt/server.example.com@server.example.com
Dec 31 12:48:57 --- last message repeated 1 time ---
Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
Dec 31 12:48:57 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com
Dec 31 12:48:57 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
Dec 31 12:48:57 server.example.com kdc[51]: Requested flags: forwardable
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:63394 for host/server.example.com@server.example.com [canonicalize]
Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:54527 for ldap/server.example.com@server.example.com [canonicalize]
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:48:58 server.example.com servermgrd[55205]: --Module servermgr_devicemgr's response has retain count of 3.
Dec 31 12:48:58 server.example.com servermgrd[55205]: --request was {
command = getState;
}
Dec 31 12:48:58 server.example.com servermgrd[55205]: --response was {
state = STOPPED;
}
Dec 31 12:49:00 server.example.com servermgrd[55205]: --Module servermgr_swupdate's response has retain count of 3.
Dec 31 12:49:00 server.example.com servermgrd[55205]: --request was {
command = getLogPaths;
}
Dec 31 12:49:00 server.example.com servermgrd[55205]: --response was {
swupdateAccessLog = "/var/log/swupd/swupd_access_log";
swupdateErrorLog = "/var/log/swupd/swupd_error_log";
swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";
}
Dec 31 12:49:05 server.example.com sudo[55238]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations
Dec 31 12:49:12 server com.apple.launchd[1] (com.apple.xpcd.59000000-0000-0000-0000-000000000000[52349]): Exited: Killed: 9
Dec 31 12:49:12 server kernel[0]: memorystatus_thread: idle exiting pid 52349 [xpcd]
Dec 31 12:49:15 server.example.com sudo[55263]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations
Dec 31 12:49:15 server.example.com servermgrd[55205]: nsc_smb XPC: handle_event error : < Connection invalid >
Dec 31 12:49:17 --- last message repeated 1 time ---
Dec 31 12:49:17 server.example.com sudo[55292]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations
Dec 31 12:49:22 server.example.com sudo[55327]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations
Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)
Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)
Dec 31 12:49:32 server.example.com Server[55196]: Error reading data store for Messages service
Dec 31 12:49:48 server.example.com servermgrd[55205]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297
Do you own the domain 'example.com'?
12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'
If you used 'example.com' as the domain of your production OS X server installation then that was not a good thing to do.
If you open Network Utility on both a client machine (assuming client machine in your LAN not on Internet) and the server and go to the tab 'Lookup' and do a lookup on:
'example.com' then 'server.example.com' (minus the quote marks)
what do you see?
If you go to the server, open a terminal window and run this command:
sudo changeip -checkhostname
What do you see? If it does not say 'success' then you have a problem.
If you used 'example.com' as the domain name (and you don't own the domain) then the server installation could have significant DNS issues.
Hi FromOz. Thankd for your post.
The DNS is OK (lookup shows the right info as well as changeip). The "example.com" is just a dummy name. The real one is working without any problem (internal/external with mail, VPN, calendar, contacts, etc).
So you did a search/replace for all occurances of 'your_server.your_domain.com' in logs and changed them to 'server.example.com' ?
So, obviously then, when the client log says things like "'unable to open database file'" this is due to, after the fact, lost network connection?
Yes to your first question.
To your second question I guess so if my macs are not able to find the home folder...
OK clear.
Sorry at this stage I'll have to advise I don't have any answers to hand. I don't use network based home folders. Question may end up needing to be asked to Apple directly if no joy on the forums.
Network users un-mounts after sleep