pbis / BeyondTrust

Change Loglevel https://www.beyondtrust.com/docs/ad-bridge/how-to/troubleshoot/agent/logging/index.htm

There are debug logs for the following services in AD Bridge Enterprise:

  • lsass: The authentication service. Generate a debug log for lsass when you need to troubleshoot authentication errors or failures.
  • PAM: The pluggable authentication modules used by AD Bridge Enterprise. Create a debug log for PAM when you need to troubleshoot logon or authentication problems.
  • netlogon: The site affinity service that detects the optimal domain controller and global catalog. Generate a debug log for netlogon when you need to troubleshoot problems with sending requests to domain controllers or getting information from the global catalog.
  • lwio: The input-output service that manages interprocess communication.
  • eventlog: The event collection service. Generate a debug log for eventlog to troubleshoot the collection and processing of security events.
  • lwreg: The AD Bridge Enterprise registry service. Generate a debug log for lwreg to troubleshoot ill-fated configuration changes to the registry.
  • lwsm: The service manager.
  • reapsysl: Part of the data collection service. Capture a debug log for reapsysl to investigate the collection and processing of events.
  • gpagent: The Group Policy agent. Generate a debug log for gpagent to troubleshoot the application or processing of Group Policy Objects (GPOs).
  • eventfwd: The event forwarding service. Generate a debug log to verify that the service is receiving events and forwarding them to a collector server.
  • lwsc: The smart card service. Gather logging information for the smart card service when card-insertion or card-removal behavior is other than expected.
  • lwpkcs11: A service that aids in logging on and logging off with a smart card. Gather logging information about it when there is a problem logging on or logging off with a smart card.



Troubleshooting



List Likewise/PBIS service

>/opt/pbis/bin/lwsm list

Example:

> /opt/pbis/bin/lwsm list
lwreg       running (container: 5544)
dcerpc      stopped
eventlog    stopped
lsass       running (container: 5660)
lwio        running (container: 5621)
netlogon    running (container: 5584)
rdr         running (io: 5621)

Delete AD Object/Computer Account

Add pbis to path:

> PATH=/opt/pbis/bin:$PATH

Create Kerberos ticket:

> kinit testzzdom@testdom.testads.de
Password for testzzdom@testdom.testads.de:

enter password. Now you can list the tickets with:

> klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: testzzdom@testdom.testads.de
 
Valid starting     Expires            Service principal
04/25/23 10:31:05  04/25/23 20:31:11  krbtgt/testdom.testads.de@testdom.testads.de
        renew until 05/02/23 10:31:05

Show all computer objects with filter server*:

> adtool -a search-computer --name 'server*'
CN=server,OU=Test-OU,OU=Computers,OU=Test,OU=Provider,DC=testdom,DC=testads,DC=de
CN=secondserver,OU=Test-OU,OU=Computers,OU=Test,OU=Provider,DC=testdom,DC=zzads,DC=de
 
Total computers: 2

Finally delete the object with:

> adtool -a delete-object --dn 'CN=secondserver,OU=Test-OU,OU=Computers,OU=Test,OU=Provider,DC=testdom,DC=testads,DC=de'
Object CN=secondserver,OU=Test-OU,OU=Computers,OU=Test,OU=Provider,DC=testdom,DC=testads,DC=de has been deleted.


Authors:
  • Claus Astheimer
  • Jochen Schnürle