Sponsored Content
Top Forums UNIX for Advanced & Expert Users Ownership problem using a CIFS-mounted volume Post 302217837 by mph on Wednesday 23rd of July 2008 03:55:18 PM
Old 07-23-2008
You can use rsync transparently, sort of... That is, if what your looking for is automation, rsync can do it. It's been a couple of years since I did this but I'll take a poke at it.
Setup the variables in a script something like this:
Code:
CFGFILE=/etc/rsyncd.conf
LOGFILE="log file = \/var\/log\/rsync.log"
RUID="uid = 0"
RGID="gid = 0"
AUTHUSR="auth users = root"

You can use either:
PASSWD="root:passwd" (Not roots real password, but one you make up on both boxes for root to use).
Or:
SECRETS="secrets file = \/etc\/rsyncd.secrets" (Make this readable by root only -r--------) This is more secure as
 variables may sometimes be seen by others if exported.  Also it's more secure than using the mount command as 
you'd have to put the user name and password in it for automating the mounting / unmounting of the file systems 
anyway.

In your script you would use something like this:
Code:
rsync -av $EXCLUDES --delete root@$MACH::root/ $BASEDIR/$MACH/full/ \
        2>> $BASEDIR/$MACH/log/$MACH-full-$DATE-error.log \
        | tee -a $BASEDIR/$MACH/log/$MACH-full-$DATE.log

I at one time had a script for backing up several Linux boxes all of which had different configurations as far as excluded files, etc...(this will explain some of the above variables)
Each file contained something like this:
Code:
MACH=unix1
USR=root
OSTYPE=linux
EXCLUDES="--exclude /sys --exclude /initrd/proc --exclude /dev/pts --exclude /proc --exclude /mnt"

The above is set for a full backup. You can also setup sub directories for differentials between full backups. Set up your script to run in cron... and away you go!

Hope this helps.

M.P.H.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Stubborn file ownership problem! Argh!

Hi, I have Apache running well on a Linux server, with Samba installed. I do must of my work in Notepad2 on a Windows box using Samba shares on which I am logged in as a user on the box (non-root). I recently decided to expand into cgi-perl. My /htdocs/cgi-bin directory is already part of a... (0 Replies)
Discussion started by: questor
0 Replies

2. Linux

files ownership/permission problem

all the files and directories in my system are owned by root only.i try to(from root loggin) change the permission on the file but not permitted.can any one help to fix my problem .also while installing any software always error occur like no makefile available (1 Reply)
Discussion started by: jop
1 Replies

3. AIX

CIFS Mount Problem in AIX 5.3 TL12 SP-01-1016

Hi all, We are experiencing below mentioned error on mounting windows Share on AIX 5.3 when we migrate our TL from 8 to TL12-SP01, we also checked the allowed password length for mounting CIFS which is fine(10 characters in our case). On IBM fix central site there is a fix IZ63140 for... (10 Replies)
Discussion started by: m_raheelahmed
10 Replies

4. AIX

I/O speed to CIFS mounted Windows Share

I have an AIX box that mounts a Windows share across subnets. When I try to copy a 100 MB file to it, it copies around 2 MB/s. If I copy to another Windows share on the same subnet it copies around 12 MB/s. All I have is gigabit networks so I would expect it to go well over 12 MB/s, which is the... (8 Replies)
Discussion started by: kah00na
8 Replies

5. Shell Programming and Scripting

Directory / File changes on CIFS share mounted on Red Hat Linux

I have a requirement to copy the changed file on CIFS share mounted on Red Hat Linux to a remote FTP/SFTP server. I tried inotify-tools, but this didn't track the modified files. Has anyone tried incron or any other suggestion? (1 Reply)
Discussion started by: SupeAlok
1 Replies

6. Red Hat

Permissions problem with cifs.mount

hi, I have the following permission problems with cifs.mount : a share on a VNXe (EMC NAS) is accessed by two RHEL 5.9 accounts (authenticated by Active Directory); One account has read+wite permission to the share , the second one has only read permission. Both accounts uses the following... (0 Replies)
Discussion started by: Zarake
0 Replies

7. Solaris

In Solaries 10 how to mount multiple volume on same mounted point

Hi , I am completely stuck and not getting any clue to come out this . So looking for help Q : I have salaries 10 in server with that Dell Equallogic storage connected. in dell Equlalogic in i have 70 TB storage . I created 7 volumes 10 TB each . In Solaries 10 i have syslog server i... (1 Reply)
Discussion started by: Roahn Tiwari
1 Replies

8. Linux

Volume is mounted on two ServiceGuard nodes

Hey! I'm running a HP ServiceGuard cluster with three nodes. One of the packages was moved (not by me) from one node to another a few weeks ago. I just noticed that one of the volume groups is still mounted on the old node. Oops! When I run df, less space is used on the old node than the new. ... (0 Replies)
Discussion started by: tobiasvl
0 Replies

9. AIX

AIX 6.1 : Problem with cifs and win2012.

i want to connect a shared folder on a server w2k12 by cifs "mkcifsmnt", but without sucess, i tried to do the same on w2k3, it works, but both on win7 and w2k12 doesn't work, is there any suggestions about this problem, thks in advance. My aix version is 6.1 (3 Replies)
Discussion started by: aouiti
3 Replies
CIFS.IDMAP(8)						    System Administration tools 					     CIFS.IDMAP(8)

NAME
cifs.idmap - Userspace helper for mapping ids for Common Internet File System (CIFS) SYNOPSIS
cifs.idmap [--help|-h] [--timeout|-t] [--version|-v] {keyid} DESCRIPTION
This tool is part of the cifs-utils suite. cifs.idmap is a userspace helper program for the linux CIFS client filesystem. There are a number of activities that the kernel cannot easily do itself. This program is a callout program that does these things for the kernel and then returns the result. cifs.idmap is generally intended to be run when the kernel calls request-key(8) for a particular key type. While it can be run directly from the command-line, it is not generally intended to be run that way. This program is only called if a share is mounted with the cifsacl mount option. The kernel will only upcall to do this conversion if that mount option is specified. cifs.idmap relies on a plugin to handle the ID mapping. If it can't find the plugin then it will not work properly. The plugin (or a symlink to it) must be at /etc/cifs-utils/idmap-plugin. In the case where cifs.idmap or the plugin are unavailable, file objects in a mounted share are assigned uid and gid of the credentials of the process that mounted the share. It is strongly recomemended to use mount options of uid and gid to specify a default uid and gid to map owner SIDs and group SIDs in this situation. OPTIONS
--help|-h Print the usage message and exit. --timeout|-t Set the expiration timer, in seconds on the key. The default is 600 seconds (10 minutes). Setting this to 0 will cause the key to never expire. --version|-v Print version number and exit. CONFIGURATION FOR KEYCTL
cifs.idmap is designed to be called from the kernel via the request-key callout program. This requires that request-key be told where and how to call this program. Currently cifs.idmap handles a key type of: cifs.idmap This keytype is for mapping a SID to either an uid or a gid To make this program useful for CIFS, you will need to set up entry for it in request-key.conf(5). Here is an example of an entry for this key type: #OPERATION TYPE D C PROGRAM ARG1 ARG2... #========= ============= = = ================================ create cifs.idmap * * /usr/sbin/cifs.idmap %k See request-key.conf(5) for more info on each field. NOTES
Support for upcalls to cifs.idmap was initially introduced in the 3.0 kernel. SEE ALSO
request-key.conf(5), mount.cifs(8) AUTHOR
Shirish Pargaonkar wrote the cifs.idmap program. The Linux CIFS Mailing list is the preferred place to ask questions regarding these programs. cifs-utils 05/26/2011 CIFS.IDMAP(8)
All times are GMT -4. The time now is 11:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy