Skip to main content

Satellite Traceback failure alert troubleshoot


The tracebacks are coming from system "<server>.<domain>.com". 
Is seems there is one or more systems using the same jabber id 'osad-d89e8dd1a0@<satellite_server>.<domain>.com/osad' via the same /etc/sysconfig/rhn/osad-auth.conf file and this causes the deadlock condition to occur.

Check the OSAD config file on the system 
# cd /etc/sysconfig/rhn/
# ls -al
total 44
drwxr-xr-x. 4 root root 4096 Apr  5  2018 .
drwxr-xr-x. 8 root root 4096 Aug  2 04:43 ..
drwxr-xr-x. 4 root root 4096 Apr  5  2018 allowed-actions
drwxr-xr-x. 2 root root 4096 Apr  5  2018 clientCaps.d
-rw-------. 1 root root  129 Apr 17  2017 osad-auth.conf
-rw-rw-r--. 1 root root 1785 Sep 23  2016 osad.conf
-rw-r--r--. 1 root root 1446 Oct 29  2015 rhncfg-client.conf
-rw-r--r--. 1 root root   10 Apr 17  2017 rhnsd
-rw-------  1 root root 1322 Jun  4  2018 systemid
-rw-------. 1 root root 1320 Apr 17  2017 systemid.save
-rw-------. 1 root root 2035 Jun  4  2018 up2date
#


Always take backup beforing removing from the serevr and check
# cp -r osad-auth.conf /u01/home/<user>
# ll /u01/home/<user>
total 4
-rw------- 1 root root 129 Aug 13 05:55 osad-auth.conf
#


Remove the config file on server
# rm osad-auth.conf
rm: remove regular file `osad-auth.conf'? y
#


Validate the path on the server
# ll
total 32
drwxr-xr-x. 4 root root 4096 Apr  5  2018 allowed-actions
drwxr-xr-x. 2 root root 4096 Apr  5  2018 clientCaps.d
-rw-rw-r--. 1 root root 1785 Sep 23  2016 osad.conf
-rw-r--r--. 1 root root 1446 Oct 29  2015 rhncfg-client.conf
-rw-r--r--. 1 root root   10 Apr 17  2017 rhnsd
-rw-------  1 root root 1322 Jun  4  2018 systemid
-rw-------. 1 root root 1320 Apr 17  2017 systemid.save
-rw-------. 1 root root 2035 Jun  4  2018 up2date
#


Restart OSAD services in the server
# service osad restart
Shutting down osad:                                        [  OK  ]
Starting osad:                                             [  OK  ]
#

Comments

Popular posts from this blog

SQL Dorks

-------------------------------------------------------------------------------- Admin 22-05-2014, 08:20 PM cat.asp?-cat= productlist.asp?catalogid= Category.asp?category_id= Category.cfm?category_id= category.asp?cid= category.cfm?cid= category.asp?cat= category.cfm?cat= category.asp?id= index.cfm?pageid= category.asp?catid= Category.asp?c= Category.cfm?c= productlist.cfm?catalogid= productlist.asp?catalogid= viewitem.asp?catalogid= viewitem.cfm?catalogid= catalog.cfm?catalogId= catalog.asp?catalogId= department.cfm?dept= department.asp?dept= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= product_detail.asp?catalogid= product_detail.cfm?catalogid= product_list.asp?catalogid= product_list.cfm?catalogid= ShowProduct.cfm?CatID= ShowProduct.asp?CatID= search_results.cfm?txtsearchParamCat= search_results.asp?txtsearchParamCat= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= store-page.cfm?go= store-page.asp?go= Detail.cfm?CatalogID= Detail.asp?CatalogID= browse.cfm?category_i...

10 BEST LINUX DISTRIBUTION FOR HACKING &PEN TESTING 2020

🔴Use wisely🔴 ⭕️Info:     These Linux distributions offer lots of useful tools for penetration testing, wireless security, forensic, etc.  ✍1. BackTrack 5r3 ✅useful : wireless cracking, exploiting, web application assessment, learning. ✍2. BackBox Linux  ✅Useful: penetration tests and security assessments. It provides all suspects for Forensic Analysis, Documentation & Reporting, Reverse Engineering with John, Nmap, Social Engineering Tool, etc. ✍3. Blackbuntu ✅Useful:   Tools for Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Maintaining Access, radio Network Analysis, Reverse Engineering, etc.  ✍4.Samurai Web Testing Framework ✅Useful: It offers lots of open source and free tools that would help you focus on testing and attacking websites. ✍5. Knoppix STD ✅useful:  live CD and can be installed on a hard disk. The STD stands for Security Tools Distribution. Knoppix provides you a full scenario for cry...

🔰How To Remove Shortcut Virus From Your Pc🔰

✅ Method 1.  - Clean up and remove Shortcut Virus by CMD - 1. Click on  Start  and select  Run; 2. Type: CMD  and Hit Enter to open  Command Prompt; 3. Type the  drive letter  of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.) 4. Type:  attrib g:*.* /d /s -h -r -s  and hit Enter. You’ll be able to see your files and data on Windows PC or USB flash drive now. ✅Method 2.  -Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software- *If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try* ➡️Trojan Removal Tool; ➡️Shortcut virus fixfolder; ➡️Malwarebytes Anti-Malware, etc. ✅Method 3.  - Delete/Wipe Shortcut Virus from Registry - 1. Press Win+R and type: reged...