跳转至主要内容
  • 快速、轻松地下订单
  • 查看订单并跟踪您的发货状态
  • 创建并访问您的产品列表

NetWorker: Fixing inconsistent NSR peer information

摘要: NSR peer information error during backup and recovery. There is already a machine using the name (client_name). Either choose a different name for your machine, or delete the "NSR peer information" entry for (client_name) on host: (host_name) ' ...

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

症状

Backups, recoveries and communications fail on client with the following errors:
 
'nsrexecd: SYSTEM error: There is already a machine using the name (client_name). Either choose a different name for your machine, or delete the "NSR peer information" entry for (client_name) on host: (host_name)'
'nsrexecd: SYSTEM error: Connection reset by peer'

 
nsrexecd.exe may cause application faults on one or more clients, including the server or storage nodes.

原因

The res\nsrladb folder is the home of the new certificate-based host authentication (nsrauth). It contains both the individual client's local certificate, and a cached copy of all hosts with whom it has communicated.

At the first connection, a host will request and receive the certificate for the host it connects to, and cache that hosts certificate for future comparison. Barring directed recoveries and storage nodes, a standard environment would have each client certificate cached on the NetWorker server and Storage Nodes, and the server's certificate cached on each client and Storage Node. These cached certificates are reflected in the Local Hosts branch of the Configuration tree

When a client is reinstalled, the certificate is generated anew locally on the client; this causes the server's cached copy of the client's certificate to be invalidated, causing the errors. The same condition results by simply renaming the nsrladb on the client.
 

解决方案

The NSR peer information is set at the client level, not at the server level. In other words: you must connect to the NSRLA not the NSR database. To perform this, you must connect via "nsradmin -p nsrexec" or "nsradmin -p nsrexecd". "nsradmin" by itself will connect to the NetWorker server.

Delete the non-matching / cached old certificate of the client (client_name) on the NetWorker host generating the error message (host_name). In the event the NetWorker server was upgraded / reinstalled, the server certificate must be removed from each client using nsrauth strong authentication. In either event, the corrective operation is the same and one of the following:
  1. Delete the certificate for the client which has been updated from any host with a copy of the old one via Local Hosts in NMC
  2. Delete the old/cached certificate from the affected client using the command line
To clear the peer information of the client machine (from server)
 
nsradmin -s <host_name> -p nsrexec
nsradmin> delete type: nsr peer information; peer hostname: <client_name>
 
To clear the peer information on the client machine
 
nsradmin -p nsrexec
nsradmin> print type: nsr peer information
delete 

 
For further support see: 

其他信息

You can safely delete all certificates, as they will be refreshed at next connection anyway. As there may be exist peer information for both long name (FQDN) and short name. Please note that certificate caching is only enabled for clients whose authentication method includes nsrauth as part of its value.

Workaround depending on version:
  1. Disabling nsrauth on server and storage nodes only (and restarting NW) will address this problem for good.
  2. Set the NetWorker server to nsrauth or nsrauth/oldauth mode.
Oldauth mode cannot be used for NetWorker server if using with NMC 8.0.

A NetWorker 7.5.x, 7.6.x or 8.0 servers in oldauth mode cannot be used with NMC 8.0, which by default is in nsrauth/oldauth mode.

受影响的产品

NetWorker

产品

NetWorker, NetWorker Series
文章属性
文章编号: 000024312
文章类型: Solution
上次修改时间: 21 7月 2021
版本:  5
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。