!!! Overview Often we find ourselves digging through a [{$pagename}] [log|Logging] files looking for that proverbial needle.\\ We found these [{$pagename}] that seem to work pretty well in assisting. !! [LDAP Entry] Operations * [add Request] - grep for "add: dn ' * [modify Request] - grep for "modify: dn ' * [delete Request] - grep for "delete: dn ' * [modifyDNRequest] - grep for "DoModifyDN: dn ' (Why is this one not all lower case?) All of these can be more specific by adding the [FDN] of the specific [LDAP Entry] similar to: * [add Request] - grep for "add: dn (cn=jwilleke,ou=people,dc=example,dc=com)' !! [modify Request] Attribute Operations * add - grep for "add: <[attribute-Name]>' * delete - grep for "delete: <[attribute-Name]>' * replace - grep for "replace: <[attribute-Name]>' !! [searchRequest] * grep for "Search Request:' - The lines following this will be the full request. * find specific attribute being searched for - grep for 'attribute: <[attribute-Name]>' * find specific [LDAP SearchFilter] - grep for 'filter: <(specificFilter)>' !! [LDAP Result Codes] To find generic [LDAP Result Codes] which are not [LDAP_SUCCESS] grep for 'NDS error:' These can be more specific to find only the desired NDS error by using: * [LDAP_INVALID_CREDENTIALS] - ' Sending operation result 49' * [LDAP_NO_SUCH_OBJECT] - ' Sending operation result 32' * and so on. !! [Bind Request] specific [LDAP Result Codes] * [LDAP_INVALID_CREDENTIALS] - ' Sending operation result 49' ** [LDAP_INVALID_CREDENTIALS] - ' bad password' ** [LDAP_INVALID_CREDENTIALS] - ' failed authentication' - All other bind errors * grep for "password expired' - Results where the password was expired !! TAGS Be sure to use set ndstrace=+TAGS as the first entry on the line will be the "TAG" which will identify the connection for the current operation. !! Category %%category [eDirectory]%% !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }]