cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3088
Views
11
Helpful
29
Replies

Unable to validate provider. Nexus Dashboard

Rem Markov
Level 1
Level 1

Unable to validate provider. Please check you configuration.
Nexus Dashboard , when I configured the provider DNS for the first time , it said  that it cannot validate it but why?


I followed  the steps, it arrives to the dns server but still it can't validate , even when I try to configure a LDAP domain login and try to add the provider it just throws the same error: "Unable to validate provider. Please check you configuration." 

what should I check? what can be wrong?

I'm really lost.

29 Replies 29

Im using ND 2.1.2 .
But The LDAP still doesn't work, We suspect it might be the time different causing the kerberos to fail, but I doubt it.

But I cant change it due to the fact that the command timedatectl prompts "timedatectl: Failed to create bus connection: No such file or directory" so I'm abit stuck here


Still it seems that the DNS keeps on searching weird DNS records and I would like it to stop, it is useless data traffic, It searches for "staging-connectdna.cisco.com." and "nodectrlr-svc.cisco.com" now it won't ever reach it cause it is a closed network so I really don't need it.

 

I suppose upgrading to Nexus Dashboard to 2.3 is a possibility but I don't that it is a solution. From the IDM side I see it recieving the DNS requests and the answers but it still fails.

 

Robert Burns
Cisco Employee
Cisco Employee

Do you have a valid NTP server configured?

I suppose. It doesnt prompt any error.

Robert Burns
Cisco Employee
Cisco Employee

If you use port 636 you will need to enable SSL
If you enable SSL, you must also provide the SSL Certificate and the SSL Certificate Validation type:
▪ Permissive: Accept a certificate signed by any certificate authority (CA) and use it for encryption.
▪ Strict: Verify the entire certificate chain before using it

Working with Certs is explained in the User Guide: https://www.cisco.com/c/en/us/td/docs/dcn/nd/2x/user-guide/cisco-nexus-dashboard-user-guide-211.pdf.  
If you're not using SSL, then you don't need this.  As long as the AVPair/GroupMap is setup, should be enough.

Robert

Well the user guide doesn't specify what ssl certificate to use.

Rem Markov
Level 1
Level 1

What I don't understand is how to set manually the time zone with the command timedatectl which doesnt work on the CLI of the Nexus Dashboard.

Nevertheless where can I look at logs in the Nexus Dashboard side to see what's going on with the LDAP attempt to get Validation from the IDM.

Because there is no tcpdump and no sudo on the Nexus Dashboard side.

 

You don't set anything from the CLI.  You can adjust the timezone from the UI. 

RobertBurns_0-1685466629955.png

Collecting a techsupport bundle will grab all logs.

Relevant Logs:
authy service logs: /logs/k8_infra/authy/<authy-service>/<authy-service>.log  <<< Look here for LDAP Transactions
APIGW logs: /logs/k8_infra/apigw/tyk/tyk.log
SRMS logs: /logs/k8_infra/apigw/srms/srms.log

Might want to consider opening a TAC case as your issue is a little more complex than a forum can assist with.

Robert

I see, so the time in the cli of the nexus dashboard when I type "date" has nothing to do with the LDAP request?

Because the time set there is different from what is set in the UI.

I will open a TAC , but firstly I will upgrade the NXD to 2.3. 

Is the Validation that you said exists only in 2.2 and earlier is only DNS related or also the LDAP?

It's DNS related only.  Advise TAC about the time discrepency, if they need to change/update it, they'll have root access.

Robert

Thanks about everything Robert!

I'll update here about the solution if I would find one and about the logs.

I think I might have found the problem, When setting up the LDAP in ACIP there is a field of "filter" while NXD doesn't have one.

After checking logs I see that "user doesn't exist" and a filter set to be "(sAMAccountName={username})" .

@Robert Burns 

Now I don't know how to change the filter in the NXD to check if it is the problem, But I set a filter in the APIC and it is working.

Robert Burns
Cisco Employee
Cisco Employee

On ND you only need to set the "LDAP Attribute" under the Provider configuration.  I'm using memberOf since I'm authenticating against MS AD with group maps

Here's my ND LDAP Provider settings

RobertBurns_0-1685625378508.png

Here's my APIC LDAP provider settings (both to same provider):

RobertBurns_1-1685625612806.png

Robert

Rem Markov
Level 1
Level 1

But that's exactly the problem. do you see the LDAP Filter in the APIC ? for us it is set to custom and to a different filter, In The Nexus Dashboard there is no way to change it and I need to change it.
The problem is that the IDM doesn't under stand "sAMAccountName = $userid" and I need it to be something else, "uid=$userid".

For some reason there is an option to change it in the APIC with "LDAP Filter" but no way to Change it in the Nexus Dashboard.
@Robert Burns 

I've confirmed that this functionality (Custom LDAP filter) does not yet exist on Nexus Dashboard.  I've opened an enhancement request to port the AAA functionality from APIC > ND so they're functionally similiar.  I'd suggest you open a TAC SR, and ask them to link to this CDET (will help prioritze this enhancement).  https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf51550

Robert

Thank you so much @Robert Burns for all the help ! I will update what Cisco will say in the TAC and hopefully it will be fixed.

Save 25% on Day-2 Operations Add-On License