Paul B. Henson
2015-11-04 03:14:02 UTC
Content preview: We're running MIT kerberos with the ldap backend, specifically
3 openldap servers doing delta syncrepl. We started having a problem a while
back where once a day the kdc would time out authentication requests, and
finally tracked it down to openldap purging the accesslog. We currently have
the accesslog overlay configured to delete entries over 7 days old once a
day, and it seems that while openldap is processing the purge the kdc is
starved out and unable to process authentications in a timely fashion. We
do (thanks to our ISO) have account lockout enabled, so every authentication
involves not only a read but a write. [...]
Content analysis details: (-1.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low
trust
[206.46.173.23 listed in list.dnswl.org]
0.7 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail)
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0007]
We're running MIT kerberos with the ldap backend, specifically 3
openldap servers doing delta syncrepl. We started having a problem a
while back where once a day the kdc would time out authentication
requests, and finally tracked it down to openldap purging the accesslog.
We currently have the accesslog overlay configured to delete entries
over 7 days old once a day, and it seems that while openldap is
processing the purge the kdc is starved out and unable to process
authentications in a timely fashion. We do (thanks to our ISO) have
account lockout enabled, so every authentication involves not only a
read but a write.
Is it expected for the accesslog purge to be so disruptive? Is there any
way to tune it so it doesn't overwhelm the system to the point of being
unresponsive?
Would it be better to purge the accesslog more frequently as to amortize
the work across multiple intervals rather than being concentrated once a
day?
Thanks for any suggestions...
3 openldap servers doing delta syncrepl. We started having a problem a while
back where once a day the kdc would time out authentication requests, and
finally tracked it down to openldap purging the accesslog. We currently have
the accesslog overlay configured to delete entries over 7 days old once a
day, and it seems that while openldap is processing the purge the kdc is
starved out and unable to process authentications in a timely fashion. We
do (thanks to our ISO) have account lockout enabled, so every authentication
involves not only a read but a write. [...]
Content analysis details: (-1.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low
trust
[206.46.173.23 listed in list.dnswl.org]
0.7 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail)
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0007]
We're running MIT kerberos with the ldap backend, specifically 3
openldap servers doing delta syncrepl. We started having a problem a
while back where once a day the kdc would time out authentication
requests, and finally tracked it down to openldap purging the accesslog.
We currently have the accesslog overlay configured to delete entries
over 7 days old once a day, and it seems that while openldap is
processing the purge the kdc is starved out and unable to process
authentications in a timely fashion. We do (thanks to our ISO) have
account lockout enabled, so every authentication involves not only a
read but a write.
Is it expected for the accesslog purge to be so disruptive? Is there any
way to tune it so it doesn't overwhelm the system to the point of being
unresponsive?
Would it be better to purge the accesslog more frequently as to amortize
the work across multiple intervals rather than being concentrated once a
day?
Thanks for any suggestions...