During the installation of Sametime, we found various error in the log.
We need the list of ErrorCode.
For example:
[34;1mcommunity_1 |[0m stserver 2025-03-25 09:27:14.513 FINEST 98 --- 140025626453824 : Authentication for db723f44 0ac140013 returned <0, CN=CISGUG,OU=Sistemas,OU=PRODUCCION,OU=MyDomain,OU=OU Entidades,DC=DomainX,DC=ORG, CISGUG, , CN=CISGUG,OU=Sistemas,OU=PRODUCCION,OU=MyDomain,OU=OU Entidades,DC=DomainX,DC=ORG, cn=domino/o=test>
[34;1mcommunity_1 |[0m stserver 2025-03-25 09:27:14.513 FINEST 98 --- 140025626453824 : SelectiveStatus for <CN=CISGUG,OU=Sistemas,OU=PRODUCCION,OU=MyDomain,OU=OU Entidades,DC=DONOSTIA,DC=ORG, db723f44 0ac140013> returned, rc = -2147483116
[34;1mcommunity_1 |[0m stserver 2025-03-25 09:27:14.513 FINEST 98 --- 140025626453824 : Element login failed: eType=14e0, eId=db723f44 0ac140013, uId=CN=CISGUG,OU=Sistemas,OU=PRODUCCION,OU=MyDomain,OU=OU Entidades,DC=DomainX,DC=ORG, reason=80000214
Hi,
Most of the error code details are listed here -> https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0037378
Thanks
From what you have pasted above it looks like a user (or the bind account) could not login, we tried to look up this account in LDAP and could not. 80000214 means Sametime could not verify the login.
Check these things:
- Check the beginning of the log from when Sametime was starting and make sure that the LDAP related services started up without errors (stusers, stresolve, stdirectory, userinfo).
- Adding LDAP debug will improve the error messages. Click here for Docker. Click here for Kubernetes. The parameter you need is
STI__DEBUG__VP_LDAP_TRACE
, and use the value =1
for Docker, or : "1"
for Kubernetes. - LDAP hostname is resolvable in DNS
- LDAP port is reachable from the Sametime environment. If you have k8s, the traffic may come from the pod's IP range depending on your cluster set up.
- If using the secure port, you MUST use a fully qualified domain name (FQDN) to reach LDAP and the FQDN that you use must match the LDAP server's certificate subject. (for ST 12.0.2). You can use openssl and connect to the secure port on your LDAP server to examine the subject of the certificate.
- Check the LDAP bind credentials (name/password). You can test the credentials using ldapsearch (see KB0024811) or a client like "LDAP Browser".
- If you are on Kubernetes, check this article for more troubleshooting.
Open a case with HCL Support if you need assistance.