Bug 1213748

Summary: [Build :29919:bind] openQA test fails in dns_srv - because of issue with 'systemctl --no-pager start named'
Product: [SUSE Linux Enterprise Server] PUBLIC SUSE Linux Enterprise Server 15 SP3 Reporter: Zaoliang Luo <zluo>
Component: BasesystemAssignee: Jorik Cronenberg <jorik.cronenberg>
Status: NEW --- QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: fvogt, jpupava, max
Version: SLES15SP3Maint-Upd   
Target Milestone: unspecified   
Hardware: x86-64   
OS: SLES 15   
URL: https://openqa.suse.de/tests/11684115/modules/dns_srv/steps/11
Whiteboard:
Found By: openQA Services Priority:
Business Priority: Blocker: Yes
Marketing QA Status: --- IT Deployment: ---
Attachments: journal

Description Zaoliang Luo 2023-07-28 07:32:20 UTC
I retriggered the test but got same issue.

please find logs at https://openqa.suse.de/tests/11684115#downloads



## Observation

openQA test in scenario sle-15-SP3-Server-DVD-Incidents-x86_64-mau-webserver@64bit fails in
[dns_srv](https://openqa.suse.de/tests/11684115/modules/dns_srv/steps/11)

## Test suite description
Testsuite maintained at https://gitlab.suse.de/qa-maintenance/qam-openqa-yml.


## Reproducible

Fails since (at least) Build [:29919:bind](https://openqa.suse.de/tests/11682940)


## Expected result

Last good: [:29970:glibc](https://openqa.suse.de/tests/11678944) (or more recent)


## Further details

Always latest result in this scenario: [latest](https://openqa.suse.de/tests/latest?arch=x86_64&distri=sle&flavor=Server-DVD-Incidents&machine=64bit&test=mau-webserver&version=15-SP3)
Comment 1 Fabian Vogt 2023-07-28 07:37:15 UTC
openQA jobs can and will get garbage collected, so please attach logs to bug reports.

The error is:

Jul 28 03:04:34.687786 susetest named[2852]: ./config.c: option 'dnstap-identity' was not enabled at compile time
Jul 28 03:04:34.687885 susetest named[2852]: unable to load internal defaults: failure
Jul 28 03:04:34.687962 susetest named[2852]: exiting (due to early fatal error)
Comment 2 Jozef Pupava 2023-07-28 07:54:01 UTC
Created attachment 868476 [details]
journal

I contacted maintenance coordinator of bind update which is causing this failure
S:M:29919:303920 https://build.suse.de/request/show/303920
https://suse.slack.com/archives/C02D16TCP99/p1690530463768859
Comment 5 Maintenance Automation 2023-10-02 12:30:41 UTC
SUSE-SU-2023:3934-1: An update that solves one vulnerability, contains two features and has one security fix can now be installed.

Category: security (important)
Bug References: 1213748, 1215472
CVE References: CVE-2023-3341
Jira References: PED-4852, PED-4853
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): bind-9.16.6-150300.22.41.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): bind-9.16.6-150300.22.41.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): bind-9.16.6-150300.22.41.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): bind-9.16.6-150300.22.41.1
SUSE Manager Proxy 4.2 (src): bind-9.16.6-150300.22.41.1
SUSE Manager Retail Branch Server 4.2 (src): bind-9.16.6-150300.22.41.1
SUSE Manager Server 4.2 (src): bind-9.16.6-150300.22.41.1
SUSE Enterprise Storage 7.1 (src): bind-9.16.6-150300.22.41.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.