permission deniedpermission to perform operations deniedoperation timed out./var/log/likewise.log:YYYY-MM-DDTHH:MM:SS DEBUG netlogon: LWNetGetDCNameExt():dcinfo.c:###: Error at ../netlogon/client/dcinfo.c:### [code: ####]YYYY-MM-DDTHH:MM:SS DEBUG netlogon: LWNetSrvGetDCName():dcinfo.c:###: Looking for a DC in domain '<domain_name>', site '<null>' with flags ###[..]YYYY-MM-DDTHH:MM:SS ERROR netlogon: CLDAP timed out: domain_controller.domainYYYY-MM-DDTHH:MM:SS ERROR lsass: LSA User Manager - unable to determine whether users have logged off.YYYY-MM-DDTHH:MM:SS ERROR lsass: Error while checking user refresh credentials list: #####YYYY-MM-DDTHH:MM:SS INFO netlogon: Filtering list of 2 servers with list of 0 black listed serversYYYY-MM-DDTHH:MM:SS ERROR netlogon: CLDAP timed out: domain_controller.domain/var/run/log/hostd.log:YYYY-MM-DDTHH:MM:SS In(166) Hostd[PID]: [Originator@PID sub=Solo.VmwareCLI opID=<Host_FQDN> sid=SIDca user=root] Dispatch system.permission.set doneYYYY-MM-DDTHH:MM:SS In(166) Hostd[PID]: [Originator@PID sub=Vimsvc.ha-eventmgr opID=<Host_FQDN> sid=SID] Event PID : Cannot login user <username>\<domain>@<IP_ADDR>: no permissionVMware vSphere ESXi 8.x
The 389 port on the host with the issue could still be blocked as ESXi does not "scan" the network as it strictly asks the DNS Server for a list of available Domain Controllers.
Preform the following checks with your internal networking team to identify and fix the issue:
nslookup -type=SRV _ldap._tcp.dc._msdcs.<YOUR_DOMAIN_NAME>/usr/lib/vmware/likewise/bin/lw-get-dc-name <YOUR_DOMAIN_NAME>nc -u -z -v -w 5 <IP_OF_UKDC-01> 389 nc -u -z -v -w 5 <IP_OF_UKDC-02> 389 -w 5 flag prevents hanging/usr/lib/vmware/likewise/bin/lwregshell set_value "[HKEY_THIS_MACHINE\Services\lsass\Parameters\Providers\ActiveDirectory]" "LdapProbeTimeout" 1515 is the Timeout in seconds/etc/init.d/lwsmd restart/usr/lib/vmware/likewise/bin/lw-lsa list-groups-for-user <User_Account>