Sponsored Content
Top Forums UNIX for Advanced & Expert Users Can't open nodes-6379.conf in order to acquire a lock: Permission denied Post 303022921 by nadeemrafikhan on Sunday 9th of September 2018 10:12:14 AM
Old 09-09-2018
Can't open nodes-6379.conf in order to acquire a lock: Permission denied

I am getting error on redis server on linux 7.5 after change the default path /var/lib/redis to /redisdata, and enable cluster-enabled yes. It would be really appreciate if some one can check and suggest on this issue.
error code:
Code:
1240:C 09 Sep 2018 13:53:51.058 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo
1240:C 09 Sep 2018 13:53:51.058 # Redis version=4.9.105, bits=64, commit=00000000, modified=0, pid=1240, just started
1240:C 09 Sep 2018 13:53:51.058 # Configuration loaded
1240:C 09 Sep 2018 13:53:51.058 * supervised by systemd, will signal readiness
1240:M 09 Sep 2018 13:53:51.060 # Can't open nodes-6379.conf in order to acquire a lock: Permission denied
1267:C 09 Sep 2018 13:56:05.470 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo
1267:C 09 Sep 2018 13:56:05.470 # Redis version=4.9.105, bits=64, commit=00000000, modified=0, pid=1267, just started
1267:C 09 Sep 2018 13:56:05.470 # Configuration loaded
1267:C 09 Sep 2018 13:56:05.470 * supervised by systemd, will signal readiness
1267:M 09 Sep 2018 13:56:05.471 # Can't open nodes-6379.conf in order to acquire a lock: Permission denied

 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

./ Permission Denied.

Could someone tell me why I am getting a permission denied message when I attempt to run this on an out file? Thanks! (8 Replies)
Discussion started by: trouscaillon
8 Replies

2. UNIX for Dummies Questions & Answers

Permission denied

I would like to copy data from local mechine to cluster. Basically, I typed scp -r DVD/ acount@cluster:/ it shows Permission denied. Could anyone please give me a clue to write permission on cluster, please? The poperty of where on cluster I'd like to put is drwxr-xr-x Any idea would... (1 Reply)
Discussion started by: su_in99
1 Replies

3. UNIX for Advanced & Expert Users

EACCES "Permission denied" while open(2)

guest@ulidtko:~$ id uid=126(guest) gid=134(guest) groups=134(guest) guest@ulidtko:~$ ls -ld /home drwxr-xr-x 8 root root 4096 May 12 19:47 /home guest@ulidtko:~$ ls -l /home ls: cannot open directory /home: Permission denied guest@ulidtko:~$ cat /proc/mounts rootfs / rootfs rw 0 0... (4 Replies)
Discussion started by: ulidtko
4 Replies

4. HP-UX

open ttydev: Permission denied

Whenever I try to open xterm, below error loops in itself adroit:/home/seo/hitendra/.dt 32> xterm & open ttydev: Permission denied open ttydev: Permission denied open ttydev: Permission denied open ttydev: Permission denied .... .... .... This error sometime comes ,sometime not.... (1 Reply)
Discussion started by: hiten.r.chauhan
1 Replies

5. Shell Programming and Scripting

Permission denied

I created a user so that when he logs in he will be directed to a menu /etc/passwd user1:x:115:1:Support -SysAd:/export/home/user1:/export/home/suppotrmenu/script.sh However when I logged in remotely from another server by ssh user1@1.1.1.1 , it saysexport/home/suppotrmenu/script.sh:... (4 Replies)
Discussion started by: lhareigh890
4 Replies

6. UNIX for Advanced & Expert Users

Testing privileges -lock lockfile /var/lock/subsys/..- Permission denied

Hi all, I have to test some user priviliges. The goal is to be sure that an unauthorized user can't restart some modules (ssh, mysql etc...). I'm trying to automate it with a shell script but in same cases I got the syslog broadcast message. Is there any way to simply get a return code... (3 Replies)
Discussion started by: Dedalus
3 Replies

7. Linux

/var/lock/subsys permission denied for root

Hello I have simple line of code here: FILE *lockfp = fopen("/var/lock/subsys/processName", "w"); which is denied even running as root. The result is locking failed for the following reason: Permission denied How is this possible? Why is this happening? Thanks for your... (4 Replies)
Discussion started by: flagman5
4 Replies

8. Linux

Permission denied

I am using korn shell When I type in Telnet on cmd line, I get message "cannot execute" How can I get permission to execute command ? In which dir is telnet located ? I looked in /usr/bin dir. but its not there Thanks (1 Reply)
Discussion started by: paramshamnani
1 Replies

9. UNIX for Dummies Questions & Answers

Permission denied

when i run echo "User” > /dev/tty5 why do i get permission denied? :confused: (2 Replies)
Discussion started by: chinababy
2 Replies

10. Ubuntu

Permission denied

Trying to get date into the txt file. It says Permission denied. echo $(date +%I:%M:%S_%D) >> /tmp/systemd_suspend_test_err.txt exec 2>> /tmp/systemd_suspend_test_err.txt if ; then # Do the thing you want before suspend here echo "we are suspending $(date +%I:%M:%S_%D)." elif ;... (5 Replies)
Discussion started by: drew77
5 Replies
WITH-LOCK-EX(1) 						 Chiark-utils-bin						   WITH-LOCK-EX(1)

NAME
with-lock-ex - file locker SYNOPSIS
with-lock-ex -w|-q|-f lockfile command args ... DESCRIPTION
with-lock-ex will open and lock the lockfile for writing and then feed the remainder of its arguments to exec(2); when that process termi- nates the fd will be closed and the file unlocked automatically by the kernel. If the file does not exist it is created, with permissions rw for each user class for which the umask has w. OPTIONS
-w Wait for the lock to be available. -f Fail (printing a message to stderr and exiting 255) if the lock cannot be acquired immediately because another process has it. -q Silently do nothing (ie, exit 0 instead of executing the specified process) if the lock cannot be acquired immediately because another process has it. STALE LOCKS
The locking protocol used does not suffer from stale locks. If the lock cannot be acquired, one or more running processes must currently hold the lock; if the lock needs to be freed those processes should be killed. Under no circumstances should `stale lock cleaner' cron jobs, or the like, be instituted. In systems where a great many locks may exist, old lockfiles may be removed from cron but only if each lock is acquired before the lockfile is removed, for example with with-lock-ex -q lockfile rm lockfile DEADLOCKS
There is no deadlock detection. In a system with several locks, a lock hierarchy should be established, such that for every pair of locks A and B which a process might lock simultaneously, either A>B or B>A where the relation > is transitive and noncyclic. Then, for any two locks X and Y with X>Y it is forbidden to acquire X while holding Y. Instead, acquire X first, or release Y before (re)acquiring X and Y in that order. (There are more complicated ways of avoiding deadlocks, but a lock hierarchy is simple to understand and implement. If it does not meet your needs, consult the literature.) LOCKING PROTOCOL
The locking protocol used by with-lock-ex is as follows: The lock is held by a process (or group of processes) which holds an fcntl exclusive lock on the first byte of the plain file which has the specified name. A holder of the lock (and only a holder of the lock) may delete the file or change the inode to which the name refers, and as soon as it does so it ceases to hold the lock. Any process may create the file if it does not exist. There is no need for the file to contain any actual data. Indeed, actually using the file for data storage is strongly disrecommended, as this will foreclose most strategies for reliable update. Use a separate lockfile instead. Ability to obtain the lock corresponds to write permission on the file (and of course permission to create the file, if it does not already exist). However, processes with only read permission on the file can prevent the lock being acquired at all; therefore lockfiles should not usually be world-readable. When a (group of) processes wishes to acquire the lock, it should open the file (with O_CREAT) and lock it with fcntl(2) F_RWLCK, operation F_SETLK or F_SETLKW. If this succeeds it should fstat the file descriptor it has, and the file by its path. If the device and inode match then the lock has been acquired and remains acquired until that group of processes changes which file the name refers to, deletes the file, or releases the fcntl lock. If they do not then another process acquired the lock and deleted the file in the meantime; you must now close your filedescriptor and start again. with-lock-ex follows this specification. Note that flock(2) is a different kind of lock to fcntl(2). with-lock-ex uses fcntl. AUTHOR
This Manual page was written by Matthew Vernon <matthew@debian.org> and enhanced by Ian Jackson <ian@chiark.greenend.org.uk>, in 2003, but may be used by anyone. COPYRIGHT
with-lock-ex was written by Ian Jackson <ian@chiark.greenend.org.uk> in 1993, 1994, 1995, 1996, 1998, 1999. He has placed it in the public domain. SEE ALSO
fcntl(2), flock(2), chmod(2) Debian July 2003 WITH-LOCK-EX(1)
All times are GMT -4. The time now is 09:15 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy