Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Network users un-mounts after sleep

I have several network users. After sleeping - and approx. one minute - if I wake them I get the users WITHOUT home folder (see log below). Any one with the same problem

Mac mini, Mac OS X (10.7)

Posted on Dec 31, 2012 2:07 AM

Reply
9 replies

Dec 31, 2012 3:45 AM in response to Evian

This the outcome from the comsole


12/31/12 12:35:36.951 PM CalendarAgent[203]: CoreData: error: (1802) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:1802, 'disk I/O error' errno:9

12/31/12 12:35:36.961 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) The account "julio" has been deleted out from under us!

12/31/12 12:35:36.962 PM com.apple.launchd.peruser.1025[143]: (com.apple.FontWorker[480]) In a future build of the OS, this error will be fatal.

12/31/12 12:35:37.078 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:40.400 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:41.427 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:45.229 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:45.230 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

}

12/31/12 12:35:46.364 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = unable to open database file with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 14;

}

12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:46.466 PM CalendarAgent[203]: Core Data: annotation: -executeRequest: encountered exception = I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file' with userInfo = {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

}

12/31/12 12:35:51.178 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:51.977 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:35:52.100 PM CalendarAgent[203]: *** -[CalManagedObjectContext executeFetchRequest:error:]: error: Error Domain=NSCocoaErrorDomain Code=256 "The file “Calendar Cache” couldn’t be opened." UserInfo=0x7fa0ed502650 {NSFilePath=/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache, NSSQLiteErrorDomain=21, NSUnderlyingException=I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'} {

NSFilePath = "/Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache";

NSSQLiteErrorDomain = 21;

NSUnderlyingException = "I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'";

}

12/31/12 12:35:52.465 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x13013].com.apple.inputmethod.ironwood[197]) Exited: Killed: 9

12/31/12 12:35:52.485 PM com.apple.launchd.peruser.1025[143]: (com.apple.talagent[169]) Exited: Killed: 9

12/31/12 12:35:52.489 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x18018].com.apple.AppleSpell[218]) Exited: Terminated: 15

12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: ([0x0-0x19019].com.apple.iTunesHelper[233]) Exited with code: 1

12/31/12 12:35:52.494 PM com.apple.launchd.peruser.1025[143]: (com.apple.mdworker.shared.04000000-0000-0000-0000-000000000000[441]) Exited: Killed: 9

12/31/12 12:35:52.746 PM NotificationCenter[192]: Connection interrupted.

12/31/12 12:35:56.999 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: UserName

12/31/12 12:36:09.339 PM com.apple.launchd.peruser.1025[143]: (com.apple.gamed) Ignored this key: GroupName

12/31/12 12:36:09.340 PM com.apple.launchd.peruser.1025[143]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self

12/31/12 12:36:09.344 PM loginwindow[614]: Connection with distnoted server was invalidated

12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m

12/31/12 12:36:10.380 PM talagent[683]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m

12/31/12 12:36:13.562 PM com.apple.launchd.peruser.1025[143]: (com.apple.tccd[189]) Job appears to have crashed: Abort trap: 6

12/31/12 12:36:18.852 PM CalendarAgent[716]: *** -[IADomainCache init]: IA domains cache is out of date.

12/31/12 12:36:22.729 PM CalendarAgent[716]: Duplicate UID: 040000008200E00074C5B7101A82E008000000006014846FF7CBCD0100000000000000001000000 0E3E7ACD9478940488122A33214668A1C

12/31/12 12:36:29.887 PM Messages[678]: Error launching spell checker for Deutsch: Error Domain=NSCocoaErrorDomain Code=256 "The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)." UserInfo=0x7fa01d2b4850 {NSURL=file://localhost/System/Library/Services/AppleSpell.service/, NSLocalizedDescription=The application “AppleSpell.service” could not be launched because a miscellaneous error occurred (OSStatus -1712)., NSUnderlyingError=0x7fa01dc9da60 "The operation couldn’t be completed. (OSStatus error -1712.)"}

12/31/12 12:36:56.334 PM AddressBookSourceSync[738]: *** -[IADomainCache init]: IA domains cache is out of date.

12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory

12/31/12 12:37:09.578 PM com.apple.launchd.peruser.1025[143]: (com.apple.afpstat-qfa[753]) Job failed to exec(3) for weird reason: 2

12/31/12 12:37:09.782 PM com.apple.launchd.peruser.1025[143]: (com.apple.mrt.uiagent[745]) Exited with code: 255

Dec 31, 2012 3:57 AM in response to Evian

And this is the system log from the server (no open directory issues)


Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:51209 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:36:56 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:59097 for HTTP/server.example.com@server.example.com [canonicalize]

Dec 31 12:41:19 server.example.com ruby[55078]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:19 server.example.com ruby[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:19 server com.apple.launchd[1] (com.apple.collabd.expire[55078]): Exited with code: 1

Dec 31 12:41:20 server.example.com collabpp[55079]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:41:21 server kernel[0]: Sandbox: sandboxd(55090) deny mach-lookup com.apple.coresymbolicationd

Dec 31 12:41:21 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

Dec 31 12:41:22 server.example.com sandboxd[55090] ([55079]): collabpp(55079) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

Dec 31 12:41:53 --- last message repeated 1 time ---

Dec 31 12:42:06 server.example.com com.apple.backupd-helper[55097]: Not starting scheduled Time Machine backup - time machine destination not resolvable.

Dec 31 12:44:19 server.example.com collabd[104]: [CSContentService:47 45cc000 +22ms] Detected Magic Superuser Auth Token

Dec 31 12:46:19 server.example.com ruby[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:46:19 server.example.com collabpp[55152]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Dec 31 12:46:19 server kernel[0]: Sandbox: sandboxd(55154) deny mach-lookup com.apple.coresymbolicationd

Dec 31 12:46:19 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Applications/Server.app/Contents/ServerRoot/usr/lib/libpq.5.5.dylib

Dec 31 12:46:20 server.example.com sandboxd[55154] ([55152]): collabpp(55152) deny file-read-data /Library/Preferences/.GlobalPreferences.plist

Dec 31 12:46:51 --- last message repeated 1 time ---

Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:49670 for afpserver/server.local@server.example.com [canonicalize]

Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:49670

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:58353 for afpserver/server.local@server.example.com

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: afpserver/server.local@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:58353

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:62667 for afpserver/server.local@server.example.com [canonicalize]

Dec 31 12:48:22 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:62667

Dec 31 12:48:22 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:64650 for krbtgt/LOCAL@server.example.com

Dec 31 12:48:22 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:22 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:64650

Dec 31 12:48:22 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from local-ipc

Dec 31 12:48:22 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:22 server.example.com kdc[51]: AS-REQ julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from local-ipc for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:22 server.example.com kdc[51]: UNKNOWN -- julio@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:22 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:23 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50162

Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:24 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50163

Dec 31 12:48:24 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50164 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50165 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- com.apple.idms.appleid.prd.78746b2f516b435876634a52477a63746675612b4e513d3d@LKD C:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from 10.0.1.8:50166 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: AS-REQ 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50167 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:24 server.example.com kdc[51]: UNKNOWN -- 6D4A9A4B19B1ACDD4F6EB62F8B2300C30A8C62A0@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D45 9704B3E7C3A2: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:63201 for vnc/server.local@server.example.com [canonicalize]

Dec 31 12:48:24 server.example.com kdc[51]: Searching referral for server.local

Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: krbtgt/LOCAL@server.example.com: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:63201

Dec 31 12:48:24 server.example.com kdc[51]: TGS-REQ julio@server.example.com from 10.0.1.8:60737 for vnc/server.local@server.example.com

Dec 31 12:48:24 server.example.com kdc[51]: Server not found in database: vnc/server.local@server.example.com: no such entry found in hdb

Dec 31 12:48:24 server.example.com kdc[51]: Failed building TGS-REP to 10.0.1.8:60737

Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from 10.0.1.8:50169

Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:34 server.example.com kdc[51]: Got a canonicalize request for a LKDC realm from fe80::226:bbff:fe4c:df46%en0:50170

Dec 31 12:48:34 server.example.com kdc[51]: LKDC referral to the real LKDC realm name

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50171 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50172 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50173 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

Dec 31 12:48:34 server.example.com kdc[51]: AS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50174 for krbtgt/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3 A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 --- last message repeated 1 time ---

Dec 31 12:48:34 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:34 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2

Dec 31 12:48:34 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:34 server.example.com kdc[51]: Requested flags: canonicalize

Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from 10.0.1.8:50175 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

Dec 31 12:48:34 server.example.com kdc[51]: TGS-REQ serveradmin@LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2 from fe80::226:bbff:fe4c:df46%en0:50176 for vnc/LKDC:SHA1.F4706FB41D3A1A9CD2467DF39D459704B3E7C3A2@LKDC:SHA1.F4706FB41D3A1A 9CD2467DF39D459704B3E7C3A2 [canonicalize]

Dec 31 12:48:34 server.example.com screensharingd[55188]: Authentication: SUCCEEDED :: User Name: serveradmin :: Viewer Address: 10.0.1.8 :: Type: Kerberos

Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:64121 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:46 --- last message repeated 1 time ---

Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:46 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:46 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:65105 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:46 --- last message repeated 1 time ---

Dec 31 12:48:46 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:46 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

Dec 31 12:48:46 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:46 server.example.com kdc[51]: Requested flags: forwardable

Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53531 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:46 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:53574 for ldap/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:49 server com.apple.launchd.peruser.1028[738] (com.apple.serveralertproxy): Throttling respawn: Will start in 4 seconds

Dec 31 12:48:49 server.example.com servermgrd[55205]: flushing dns cache

Dec 31 12:48:49 server.example.com mDNSResponder[45]: SIGHUP: Purge cache

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [111] (100000,0)

Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:63756 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:57 --- last message repeated 1 time ---

Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: REQ-ENC-PA-REP

Dec 31 12:48:57 server.example.com kdc[51]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Dec 31 12:48:57 server.example.com kdc[51]: AS-REQ server.example.com$@server.example.com from 127.0.0.1:49561 for krbtgt/server.example.com@server.example.com

Dec 31 12:48:57 --- last message repeated 1 time ---

Dec 31 12:48:57 server.example.com kdc[51]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Dec 31 12:48:57 server.example.com kdc[51]: ENC-TS pre-authentication succeeded -- server.example.com$@server.example.com

Dec 31 12:48:57 server.example.com kdc[51]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Dec 31 12:48:57 server.example.com kdc[51]: Requested flags: forwardable

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:63394 for host/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:57 server.example.com kdc[51]: TGS-REQ server.example.com$@server.example.com from 127.0.0.1:54527 for ldap/server.example.com@server.example.com [canonicalize]

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:48:57 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:48:58 server.example.com servermgrd[55205]: --Module servermgr_devicemgr's response has retain count of 3.

Dec 31 12:48:58 server.example.com servermgrd[55205]: --request was {

command = getState;

}

Dec 31 12:48:58 server.example.com servermgrd[55205]: --response was {

state = STOPPED;

}

Dec 31 12:49:00 server.example.com servermgrd[55205]: --Module servermgr_swupdate's response has retain count of 3.

Dec 31 12:49:00 server.example.com servermgrd[55205]: --request was {

command = getLogPaths;

}

Dec 31 12:49:00 server.example.com servermgrd[55205]: --response was {

swupdateAccessLog = "/var/log/swupd/swupd_access_log";

swupdateErrorLog = "/var/log/swupd/swupd_error_log";

swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";

}

Dec 31 12:49:05 server.example.com sudo[55238]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:12 server com.apple.launchd[1] (com.apple.xpcd.59000000-0000-0000-0000-000000000000[52349]): Exited: Killed: 9

Dec 31 12:49:12 server kernel[0]: memorystatus_thread: idle exiting pid 52349 [xpcd]

Dec 31 12:49:15 server.example.com sudo[55263]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:15 server.example.com servermgrd[55205]: nsc_smb XPC: handle_event error : < Connection invalid >

Dec 31 12:49:17 --- last message repeated 1 time ---

Dec 31 12:49:17 server.example.com sudo[55292]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:22 server.example.com sudo[55327]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/Applications/Server.app/Contents/ServerRoot/usr/bin/psql -h /Library/Server/PostgreSQL For Server Services/Socket -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (2,0)

Dec 31 12:49:32 server.example.com com.apple.SecurityServer[23]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [66] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [55205] (100000,0)

Dec 31 12:49:32 server.example.com Server[55196]: Error reading data store for Messages service

Dec 31 12:49:48 server.example.com servermgrd[55205]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

Dec 31, 2012 4:01 AM in response to Evian

Do you own the domain 'example.com'?


12/31/12 12:35:46.466 PM CalendarAgent[203]: CoreData: error: (21) I/O error for database at /Network/Servers/server.example.com/Users/julio/Library/Calendars/Calendar Cache. SQLite error code:21, 'unable to open database file'

If you used 'example.com' as the domain of your production OS X server installation then that was not a good thing to do.


If you open Network Utility on both a client machine (assuming client machine in your LAN not on Internet) and the server and go to the tab 'Lookup' and do a lookup on:


'example.com' then 'server.example.com' (minus the quote marks)


what do you see?


If you go to the server, open a terminal window and run this command:


sudo changeip -checkhostname


What do you see? If it does not say 'success' then you have a problem.


If you used 'example.com' as the domain name (and you don't own the domain) then the server installation could have significant DNS issues.

Network users un-mounts after sleep

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.