Scénario #33960
Bareos sur scribe 2.8.1 (suite upgrade)
100%
Description
Bonjour,
Depuis la migration des scribes en 2.8.1 ( 2.7.2 vers 2.8.1 et 2.8.0 vers 28.1 )
nous constatons que les sauvegardes incrémentales et différentielles se terminent toutes par une erreur.
25-févr. 09:38 scribe-dir JobId 15: Fatal error: Network error with FD during Backup: ERR=Aucune donnée disponible
25-févr. 09:38 scribe-dir JobId 15: Fatal error: Director's comm line to SD dropped.
25-févr. 09:38 scribe-dir JobId 15: Fatal error: No Job status returned from FD.
25-févr. 09:38 scribe-dir JobId 15: Error: Bareos scribe-dir 20.0.0 (16Dec20):
Tandis que pour les sauvegardes totales c'est ok.
Avant l'upgrade de ces serveurs il n'y avait pas de problème de sauvegarde.
Cordialement
Subtasks
Related issues
History
#1 Updated by Gilles Grandgérard about 1 year ago
- Tracker changed from Demande to Scénario
- Start date deleted (
03/25/2022) - Release set to EOLE 2.8.1
#2 Updated by Gilles Grandgérard about 1 year ago
- Subject changed from Bareos sur scribe 2.8.1 to Bareos sur scribe 2.8.1 (suite upgrade)
#3 Updated by Joël Cuissinat about 1 year ago
- Release changed from EOLE 2.8.1 to Carnet de produit (Cadoles)
- Story points set to 2.0
#4 Updated by Emmanuel GARETTE about 1 year ago
- Due date set to 04/15/2022
- Assigned To set to Benjamin Bohard
- Target version set to Prestation Cadoles MEN 2022 13-15
- Start date set to 03/28/2022
#5 Updated by Pascal Baptendier about 1 year ago
- File Bareos_diag.txt View added
Bonjour
En pièce jointe les résultats demandés en fonction du type de sauvegarde
sur notre scribe 2.8.1 de test.
Cordialement
#6 Updated by Pascal Baptendier about 1 year ago
- File Bareos_diag_jjr.txt View added
Résultat sur en scribe en production après une incrémentale
#7 Updated by Pascal Baptendier about 1 year ago
Résultat pendant une incrémentale
root@Testing:~# scribe_fd (10): filed/socket_server.cc:128-0 filed: listening on port 9102
scribe_fd (50): lib/tls_openssl.cc:79-0 Preparing TLS_PSK SERVER callback
scribe_fd (50): lib/bnet.cc:142-0 TLS server negotiation established.
scribe_fd (50): lib/cram_md5.cc:105-0 send: auth cram-md5 <1558590934.1648714213@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:60-0 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_DIRECTOR::scribe-dir>
scribe_fd (99): lib/cram_md5.cc:231-0 sending resp to challenge: W7/0J7U1W1+gf2/MUH+LrA
scribe_fd (5): filed/dir_cmd.cc:1623-52 set sd auth key
scribe_fd (5): filed/dir_cmd.cc:1626-52 set sd ssl_policy to 4
scribe_fd (10): filed/dir_cmd.cc:1447-52 LevelCmd: level = full mtime_only=0
scribe_fd (50): lib/tls_openssl.cc:64-52 Preparing TLS_PSK CLIENT context for identity R_JOB JobSchedulePre.2022-03-31_10.10.09_22
scribe_fd (50): lib/bnet.cc:196-52 TLS client negotiation established.
scribe_fd (50): lib/cram_md5.cc:60-52 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_STORAGE::scribe-sd>
scribe_fd (99): lib/cram_md5.cc:231-52 sending resp to challenge: dgRYA/+V0H+3w+/Fd9/R1D
scribe_fd (50): lib/cram_md5.cc:105-52 send: auth cram-md5 <1759290877.1648714213@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:134-52 Authenticate OK 9cC49ARRFgL09Zhb5+KWC
scribe_fd (50): lib/tls_openssl.cc:79-0 Preparing TLS_PSK SERVER callback
scribe_fd (50): lib/bnet.cc:142-0 TLS server negotiation established.
scribe_fd (50): lib/cram_md5.cc:105-0 send: auth cram-md5 <734353707.1648714260@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:60-0 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_DIRECTOR::scribe-dir>
scribe_fd (99): lib/cram_md5.cc:231-0 sending resp to challenge: d4oNvG/0JXN6t7k3gR+oKA
scribe_fd (5): filed/dir_cmd.cc:1623-53 set sd auth key
scribe_fd (5): filed/dir_cmd.cc:1626-53 set sd ssl_policy to 4
scribe_fd (10): filed/dir_cmd.cc:1447-53 LevelCmd: level = incremental mtime_only=0
scribe_fd (10): filed/dir_cmd.cc:1447-53 LevelCmd: level = since_utime 1648647324 mtime_only=0 prev_job=JobSauvegarde.2022-03-30_15.34.32_26
scribe_fd (50): lib/tls_openssl.cc:64-53 Preparing TLS_PSK CLIENT context for identity R_JOB JobSauvegarde.2022-03-31_10.10.09_24
scribe_fd (50): lib/bnet.cc:196-53 TLS client negotiation established.
scribe_fd (50): lib/cram_md5.cc:60-53 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_STORAGE::scribe-sd>
scribe_fd (99): lib/cram_md5.cc:231-53 sending resp to challenge: H9sAfU+yvHwMBj+AgHMa8B
scribe_fd (50): lib/cram_md5.cc:105-53 send: auth cram-md5 <1630765035.1648714260@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:134-53 Authenticate OK d6+sxD+by4oZOxl6g4+ILC
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): findlib/find.cc:171-53 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939422472>
scribe_fd (50): lib/crypto_openssl.cc:1602-0 jcr=7efdc8015ce0 TLS read/write failure.: ERR=error:1409E10F:SSL routines:ssl3_write_bytes:bad length
scribe_fd (50): lib/tls_openssl.cc:79-0 Preparing TLS_PSK SERVER callback
scribe_fd (50): lib/bnet.cc:142-0 TLS server negotiation established.
scribe_fd (50): lib/cram_md5.cc:105-0 send: auth cram-md5 <205410623.1648714281@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:60-0 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_DIRECTOR::scribe-dir>
scribe_fd (99): lib/cram_md5.cc:231-0 sending resp to challenge: p8/4em+fH6+8c/r9D+9wD
scribe_fd (5): filed/dir_cmd.cc:1623-54 set sd auth key
scribe_fd (5): filed/dir_cmd.cc:1626-54 set sd ssl_policy to 4
scribe_fd (10): filed/dir_cmd.cc:1447-54 LevelCmd: level = full mtime_only=0
scribe_fd (50): lib/tls_openssl.cc:64-54 Preparing TLS_PSK CLIENT context for identity R_JOB BackupCatalog.2022-03-31_10.10.09_26
scribe_fd (50): lib/bnet.cc:196-54 TLS client negotiation established.
scribe_fd (50): lib/cram_md5.cc:60-54 my_name: <R_CLIENT::scribe_fd> - challenge_name: <R_STORAGE::scribe-sd>
scribe_fd (99): lib/cram_md5.cc:231-54 sending resp to challenge: G2/ayw/r85/j1/0vF2++TB
scribe_fd (50): lib/cram_md5.cc:105-54 send: auth cram-md5 <472429976.1648714281@R_CLIENT::scribe_fd> ssl=1
scribe_fd (50): lib/cram_md5.cc:134-54 Authenticate OK U0/oWH/8gT/hz5lN64RqxB
scribe_fd (50): findlib/find.cc:171-54 Verify=<V> Accurate=<Cmcs> BaseJob=<Jspug5> flags=<-939367672>
#8 Updated by Emmanuel GARETTE about 1 year ago
- Status changed from Nouveau to Résolu
#9 Updated by Joël Cuissinat about 1 year ago
- Status changed from Résolu to Terminé (Sprint)
- Release changed from Carnet de produit (Cadoles) to EOLE 2.8.1