The admin@local account is getting locked due to unauthorized login attempts.
search cancel

The admin@local account is getting locked due to unauthorized login attempts.

book

Article ID: 396492

calendar_today

Updated On:

Products

VCF Operations/Automation (formerly VMware Aria Suite)

Issue/Introduction

Lifecycle manager admin@local user is getting locked frequently.

Environment

VMware Aria Suite Lifecycle 8.x

Resolution

Here are the steps to find the IP address of the machine that causing the admin@local account to be locked.

1. Review the /var/log/nginx/access.log 

Utilize the following command to filter and display relevant information:

2. SSH to the LCM appliance as root

3. Review the access.log using the command

 cat /var/log/nginx/access.log | grep -a 'admin@local' | awk '{print $1,$3,$7,$9}' | grep -v ' 20[0-9]' | sort | uniq -c | sort -n 

Example results:

      1 172.16.239.37 admin@local /lcm/authzn/api/vidmcluserhealth 401
      1 172.16.239.37 admin@local /lcm/locker/api/v2/certificates/import 400
      1 172.16.239.56 admin@local /lcm/lcops/api/settings/systemsettings 502
      2 172.16.239.37 admin@local /lcm/locker/api/v2/passwords 409
      2 172.16.84.22 admin@local /lcm/bootstrap/api/status 502
      4 172.16.84.22 vcfadmin@local /lcm/authzn/api/login 401
     18 172.16.84.23 admin@local /lcm/authzn/api/login 401
     38 172.16.84.22 admin@local /lcm/authzn/api/login 401
  38347 172.16.239.56 admin@local /lcm/lcops/api/settings/systemsettings 401


Search for lines containing admin@local.
Extract the IP address ($1), timestamp ($3), endpoint ($7), and response code ($9).
Exclude successful login attempts (status code 20[0-9]).
Sort the results by IP address and then by count of occurrences.
Analyzing Suspicious IP Addresses:
Identify IP addresses with a high number of failed login attempts, particularly those targeting the /lcm/authzn/api/login endpoint.

4. Find the device that is using Suspicious IP Addresses

5. Review applications on the machine found in point 4 and update the admin@local credentials.