my problem is this: when I run a script from the command line it works but returns a failure if I run it from crontab.
Basically I wanted to send a file to hdfs,
I thought it was related to the fact that crontab do not know the path to hdfs so I put the full path but it still does not work: here is the piece of code that fails :
and here is the nice error message
Any help please ?
Moderator's Comments:
Anonymized host names
Last edited by Scrutinizer; 11-09-2017 at 06:31 AM..
Reason: anonymized data
Dear Friends,
I have tried to fire a job on daily basis through crontab command but it willn't work.
i have given in the following manner:
07 19 * * * exp /user_name/passwd/ file = /path/file-name full = N owner = user-name
but it is giving error that permission denied.
i have checked that... (8 Replies)
Hi everyone,
when executing this command in unix:
echo "WM7 Fatal Alerts:", $(cat query1.txt) > a.csvIt works fine, but running this command in a shell script gives an error saying that there's a syntax error.
here is content of my script:
tdbsrvr$ vi hc.sh
"hc.sh" 22 lines, 509... (4 Replies)
I have the following expect script sitting on a Linux box.
===
#!/usr/bin/expect -f
#
# backup.expect
#
# Expect script to backup a firewall via a SSH session
#
#
set firewall
set username
set password
set prompt
set filename
match_max 50000
spawn ssh -l... (2 Replies)
I have made a shell script(/bin/sh) that starts a perl script (that I haven't made my self) that's starts a ssh session. The ssh session uses a private/public key to login so no password is needed. The Perl script works perfect.
But when I put it in a cronjob (crontab) the ssh connection asks... (6 Replies)
Hi
I have created a script. Which i have configured in cron to make it run in every 2 min. But script is not running. If I checl the cron log at /var/cron/log .it shows its running in every 2 min. Below is the command which i configured in crontab.
But I am not able to find the way so that... (9 Replies)
Dear Friends,
I am trying to copy SAP log file from one HPux server1 to another HPux server2 remotely through one script.
following command has written in the script.
rcp -rp /oracle/PRD/sapreorg/*.dbf oraprd@drsite:/oracle/PRD/sapreorg
Above command working fine from command mode.... (5 Replies)
This is the crontab it is supossed to be running everyday but it didnt
5 0 * * * /export/app/CO/opge/scr/Informe_parametros_colombia.ksh >/dev/null 2>&1
Inside the above script connects to a database and extract data to a flat file, manually i run the script at about 2 a.m. and Works OK,... (6 Replies)
Hi,
I have written one script which is connecting to the the database and generating one CSV, it is running fine when i ran it manually though it is throwing any warning but CSV is generating and working fine but same script when i have configured in crontab not working and giving error, kindly... (6 Replies)
Hi,
I have written one script which is connecting to the the database and generating one CSV, it is running fine when i ran it manually though it is throwing any warning but CSV is generating and working fine but same script when i have configured in crontab not working and giving error, kindly... (1 Reply)
I have a simple task to replace unix line feed end of line characters with carriage returns.
When I run the following “change file in place” sed instruction from the command line all the Line feeds are successfully replaced with Carriage returns.
sed -i 's/$/\r/' lf_file.txt
But that same... (1 Reply)
Discussion started by: hawkman2k
1 Replies
LEARN ABOUT CENTOS
ipa-getkeytab
ipa-getkeytab(1) IPA Manual Pages ipa-getkeytab(1)NAME
ipa-getkeytab - Get a keytab for a Kerberos principal
SYNOPSIS
ipa-getkeytab -s ipaserver -p principal-name -k keytab-file [ -e encryption-types ] [ -q ] [ -D|--binddn BINDDN ] [ -w|--bindpw ] [
-P|--password PASSWORD ]
DESCRIPTION
Retrieves a Kerberos keytab.
Kerberos keytabs are used for services (like sshd) to perform Kerberos authentication. A keytab is a file with one or more secrets (or
keys) for a Kerberos principal.
A Kerberos service principal is a Kerberos identity that can be used for authentication. Service principals contain the name of the ser-
vice, the hostname of the server, and the realm name. For example, the following is an example principal for an ldap server:
ldap/foo.example.com@EXAMPLE.COM
When using ipa-getkeytab the realm name is already provided, so the principal name is just the service name and hostname (ldap/foo.exam-
ple.com from the example above).
WARNING: retrieving the keytab resets the secret for the Kerberos principal. This renders all other keytabs for that principal invalid.
This is used during IPA client enrollment to retrieve a host service principal and store it in /etc/krb5.keytab. It is possible to retrieve
the keytab without Kerberos credentials if the host was pre-created with a one-time password. The keytab can be retrieved by binding as the
host and authenticating with this one-time password. The -D|--binddn and -w|--bindpw options are used for this authentication.
OPTIONS -s ipaserver
The IPA server to retrieve the keytab from (FQDN).
-p principal-name
The non-realm part of the full principal name.
-k keytab-file
The keytab file where to append the new key (will be created if it does not exist).
-e encryption-types
The list of encryption types to use to generate keys. ipa-getkeytab will use local client defaults if not provided. Valid values
depend on the Kerberos library version and configuration. Common values are: aes256-cts aes128-cts des3-hmac-sha1 arcfour-hmac
des-hmac-sha1 des-cbc-md5 des-cbc-crc
-q Quiet mode. Only errors are displayed.
--permitted-enctypes
This options returns a description of the permitted encryption types, like this: Supported encryption types: AES-256 CTS mode with
96-bit SHA-1 HMAC AES-128 CTS mode with 96-bit SHA-1 HMAC Triple DES cbc mode with HMAC/sha1 ArcFour with HMAC/md5 DES cbc mode with
CRC-32 DES cbc mode with RSA-MD5 DES cbc mode with RSA-MD4
-P, --password
Use this password for the key instead of one randomly generated.
-D, --binddn
The LDAP DN to bind as when retrieving a keytab without Kerberos credentials. Generally used with the -w option.
-w, --bindpw
The LDAP password to use when not binding with Kerberos.
EXAMPLES
Add and retrieve a keytab for the NFS service principal on the host foo.example.com and save it in the file /tmp/nfs.keytab and retrieve
just the des-cbc-crc key.
# ipa-getkeytab -s ipaserver.example.com -p nfs/foo.example.com -k /tmp/nfs.keytab -e des-cbc-crc
Add and retrieve a keytab for the ldap service principal on the host foo.example.com and save it in the file /tmp/ldap.keytab.
# ipa-getkeytab -s ipaserver.example.com -p ldap/foo.example.com -k /tmp/ldap.keytab
Retrieve a keytab using LDAP credentials (this will typically be done by ipa-join(1) when enrolling a client using the
ipa-client-install(1) command:
# ipa-getkeytab -s ipaserver.example.com -p host/foo.example.com -k /etc/krb5.keytab -D fqdn=foo.example.com,cn=comput-
ers,cn=accounts,dc=example,dc=com -w password
EXIT STATUS
The exit status is 0 on success, nonzero on error.
0 Success
1 Kerberos context initialization failed
2 Incorrect usage
3 Out of memory
4 Invalid service principal name
5 No Kerberos credentials cache
6 No Kerberos principal and no bind DN and password
7 Failed to open keytab
8 Failed to create key material
9 Setting keytab failed
10 Bind password required when using a bind DN
11 Failed to add key to keytab
12 Failed to close keytab
IPA Oct 10 2007 ipa-getkeytab(1)