Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 9. IdM log files and directories
Identity Management (IdM) services generate log files that record system activity, service status, and authentication events. These logs are essential for monitoring the health of your IdM environment and performing root-cause analysis when troubleshooting service failures or security incidents.
9.1. IdM server and client log files and directories Copier lienLien copié sur presse-papiers!
Identity Management (IdM) generates logs across server, replica, and client systems to record deployment events and service operations. You can locate specific log files and directories for troubleshooting installation errors.
| Directory or File | Description |
|---|---|
|
| The installation log for the IdM server. |
|
| The installation log for the IdM replica. |
|
| The installation log for the IdM client. |
|
| Log files for SSSD. You can enable detailed logging for SSSD in the sssd.conf file or with the sssctl command. |
|
|
The log file for errors returned by remote procedure calls (RPCs) and responses by the |
|
| The log rotation policies for DNS, SSSD, Apache, Tomcat, and Kerberos. |
|
|
This link points to the default Certificate Authority logging configuration at |
9.2. Directory Server log files Copier lienLien copié sur presse-papiers!
The Directory Server (DS) instance serves as the central LDAP data store for Identity Management (IdM). Use the following log files to monitor data-level operations, track replication traffic between servers, and diagnose failures specific to the underlying LDAP service.
| Directory or file | Description |
|---|---|
|
| Log files associated with the DS instance used by the IdM server. Most operational data recorded here are related to server-replica interactions. |
|
| Contains audit trails of all DS operations when auditing is enabled in the DS configuration. Note
You can also audit the Apache error logs, where the IdM API logs access. However, because changes can be made directly over LDAP too, Red Hat recommends enabling the more comprehensive |
|
| Contains detailed information about attempted access for the domain DS instance. |
|
| Contains detailed information about failed operations for the domain DS instance. |
9.3. Enabling audit logging on an IdM server Copier lienLien copié sur presse-papiers!
Enable audit logging to track administrative changes and data modifications within the Identity Management (IdM) LDAP directory. You can use the detailed audit logs to monitor data, troubleshoot issues, and examine suspicious activity on the network.
The LDAP service might become slower if there are many LDAP changes logged, especially if the values are large.
Prerequisites
- The Directory Manager password
Procedure
Bind to the LDAP server:
ldapmodify -D "cn=Directory Manager" -W << EOF
$ ldapmodify -D "cn=Directory Manager" -W << EOFCopy to Clipboard Copied! Toggle word wrap Toggle overflow Specify all the modifications you want to make, for example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Indicate the end of the
ldapmodifycommand by entering EOF on a new line. - Press Enter twice.
- Repeat the previous steps on all the other IdM servers on which you want to enable audit logging.
Verification
Open the
/var/log/dirsrv/slapd-REALM_NAME/auditfile:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The fact that the file is not empty anymore confirms that auditing is enabled.
The system logs the bound LDAP distinguished name (DN) of the entry that makes a change. For this reason, you might have to post-process the log. For example, in the IdM Directory Server, it is an ID override DN that represents the identity of an AD user that modified a record:
modifiersName: ipaanchoruuid=:sid:s-1-5-21-19610888-1443184010-1631745340-279100,cn=default trust view,cn=views,cn=accounts,dc=idma,dc=idm,dc=example,dc=com
$ modifiersName: ipaanchoruuid=:sid:s-1-5-21-19610888-1443184010-1631745340-279100,cn=default trust view,cn=views,cn=accounts,dc=idma,dc=idm,dc=example,dc=comCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
pysss_nss_idmap.getnamebysidPython command to look up an AD user if you have the user SID:>>> import pysss_nss_idmap >>> pysss_nss_idmap.getnamebysid('S-1-5-21-1273159419-3736181166-4190138427-500')) {'S-1-5-21-1273159419-3736181166-4190138427-500': {'name': 'administrator@ad.vm', 'type': 3}}>>> import pysss_nss_idmap >>> pysss_nss_idmap.getnamebysid('S-1-5-21-1273159419-3736181166-4190138427-500')) {'S-1-5-21-1273159419-3736181166-4190138427-500': {'name': 'administrator@ad.vm', 'type': 3}}Copy to Clipboard Copied! Toggle word wrap Toggle overflow
9.4. Modifying error logging on an IdM server Copier lienLien copié sur presse-papiers!
Increase the error log level to obtain detailed debugging information for specific Directory Server sub-systems, such as replication. By adjusting the log level from its default state, you can capture more granular data to identify the root cause of service failures.
To record a different type of information, select a different number from the table in Error Log Logging Levels in the Red Hat Directory Server documentation.
The LDAP service might become slower if there are many types of LDAP errors logged, especially if the values are large.
Prerequisites
- The Directory Manager password.
Procedure
Bind to the LDAP server:
ldapmodify -x -D "cn=directory manager" -w <password>
$ ldapmodify -x -D "cn=directory manager" -w <password>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Specify the modifications you want to make. For example to collect only logs related to replication:
dn: cn=config changetype: modify add: nsslapd-errorlog-level nsslapd-errorlog-level: 8192
dn: cn=config changetype: modify add: nsslapd-errorlog-level nsslapd-errorlog-level: 8192Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Press [Enter] twice, to indicate the end of the
ldapmodifyinstruction. This displays themodifying entry "cn=config"message. -
Press [Ctrl+C] to exit the
ldapmodifycommand. Repeat the previous steps on all the other IdM servers on which you want to collect detailed logs about replication errors.
ImportantAfter you finish troubleshooting, set
nsslapd-errorlog-levelback to 0 to prevent performance problems.
9.5. The IdM Apache server log files Copier lienLien copié sur presse-papiers!
Identity Management (IdM) uses the Apache HTTP Server to host the Web UI and manage communication for the remote procedure call (RPC) interface. Use the following logs to monitor web-based traffic, audit administrative access to the management console, and troubleshoot issues.
| Directory or File | Description |
|---|---|
|
| Log files for the Apache web server. |
|
| Standard access and error logs for Apache servers. Messages specific to IdM are recorded along with the Apache messages because the IdM web UI and the RPC command-line interface use Apache. The access logs log mostly only the user principal and the URI used, which is often an RPC endpoint. The error logs contain the IdM server logs. |
|
|
9.6. Certificate System log files in IdM Copier lienLien copié sur presse-papiers!
Identity Management (IdM) uses the Certificate System to manage the lifecycle of certificates for hosts, services, and users. Use the following logs to audit certificate issuance, track Key Recovery Authority (KRA) operations, and troubleshoot the installation or status of the internal Certificate Authority (CA).
| Directory or File | Description |
|---|---|
|
| The installation log for the IdM certificate authority (CA). |
|
| The installation log for the IdM Key Recovery Authority (KRA). |
|
| The top level directory for PKI operation logs. Contains CA and KRA logs. |
|
| Directory with logs related to certificate operations. In IdM, these logs are used for service principals, hosts, and other entities which use certificates. |
|
| Directory with logs related to KRA. |
|
| Includes certificate error messages among other system messages. |
9.7. Kerberos log files in IdM Copier lienLien copié sur presse-papiers!
Kerberos serves as the primary authentication protocol for Identity Management (IdM). Use the following log files to monitor the activity of the Key Distribution Center (KDC) and the administration server, which are essential for diagnosing ticket-granting failures, credential synchronization issues, and principal management errors.
| Directory or File | Description |
|---|---|
|
| The primary log file for the Kerberos KDC server. |
|
| The primary log file for the Kerberos administration server. |
|
Locations for these files are configured in the | |
9.8. DNS log files in IdM Copier lienLien copié sur presse-papiers!
Identity Management (IdM) uses integrated DNS to facilitate service discovery and domain routing. Use the following system log to monitor DNS query activity and resolve name resolution issues.
| Directory or File | Description |
|---|---|
|
|
Includes DNS error messages and other system messages. DNS logging in this file is not enabled by default. To enable it, enter the |
9.9. Custodia log files in IdM Copier lienLien copié sur presse-papiers!
The following table presents directories and files that Custodia uses to log information in Identity Management (IdM).
| Directory or File | Description |
|---|---|
|
| Log file directory for the Custodia service. |