Sponsored Content
Top Forums UNIX for Advanced & Expert Users rdist -- but not linked files Post 43284 by captainzeb on Friday 14th of November 2003 11:17:38 AM
Old 11-14-2003
rdist -- but not linked files

How do I rdist a directory from one server to another, excluding soft and hard links?

current rdist syntax:

1 2 * * * cd /apps/oasis/prdsch/log; rdist -c j1*.log oasis@oastdby:/apps/schiller/oasis/prdsch/log

31 2 * * * cd /apps/oasis/prdsch/log; rdist -c oasis_bin_trans*.log oasis@oastdby:/apps/schiller/oasis/prdsch/log

Currently all files ending in .log copied using rdist. I have a number of soft links in the same directory ending in .log and wish to exclude them.

Thanks.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

help with rdist utility

Does anyone know of any known bugs/issues with the RDIST utility on HP unix? I am trying to set up replication between two servers. All seems to work okay to start with, but the rdist program always terminates with a value of 1 - i.e. signifying an error. However - no error message or even warning... (1 Reply)
Discussion started by: man_with_no_nam
1 Replies

2. UNIX for Advanced & Expert Users

permissions with rdist

I am trying to synchronize to boxes running True64 Unix one as a live backup of the other for user directories. When running rdist, I receive the message "Permission Denied" when each directory is accessed with the sole exception of my own directory. This has to be an automated process which... (1 Reply)
Discussion started by: doug_hutch
1 Replies

3. UNIX for Advanced & Expert Users

Files Linked With A Binary

Hi, What is command in unix to find what are all the files linked with an executable binary. Thanks in advance. Rgds, Omkumar (2 Replies)
Discussion started by: tc.omkumar
2 Replies

4. HP-UX

Return codes of RDIST

Can any body please tell me the return codes of RDIST tool? I am using RDIST (through an UNIX script) to synchronize files between two servers say ukblx151(source) & ukapx050(target). RDIST raises an alert mail (through notify option) in case of success & also failure but there is a problem if... (0 Replies)
Discussion started by: vishal_ranjan
0 Replies

5. HP-UX

Where can I find rdist?

Hello, I am looking for either the rdist binaries or code for HPUX 11.11. Thanks (1 Reply)
Discussion started by: rfisher001
1 Replies

6. UNIX for Dummies Questions & Answers

rdist from unix to window XP

I need to rdist some files from unix to window XP, where the source file is in Unix box. I can't get a way to do it as it always prompted me permission denied. rdist -c migtest.tar <ipaddr>:/filedir/migtest.tar updating host <ipaddr> Permission denied. I'd tried to ftp and put the file... (0 Replies)
Discussion started by: lenniegu
0 Replies

7. Solaris

Rdist over ssh

How can we make rdist to work over ssh? By default rdist works with rsh protocol which is now the host server is refuses to accept the rsh connection. How to find rdist version which I am running? How to upgrade it to latest version? Working environment is solaris 9 and solaris 10. (1 Reply)
Discussion started by: naveenjami
1 Replies

8. Shell Programming and Scripting

How to retrieve all the linked script files/ctl files/sql files?

Hi I am going to migrate our datawarehouse system from HP Tru 64 Unix to the Red Hat Linux. Inside the box, it is running around 40 cron jobs; inside each cron job, it is calling other shell script files, and the shell script files may again call other shell script files or ctl files(for... (1 Reply)
Discussion started by: franksubramania
1 Replies

9. UNIX Desktop Questions & Answers

orphan soft linked files

How can we find files that were soft linked to an original file and then the original has been deleted. these soft linked files won't then be accessible. How can we find orphan linked files? Thanks, (3 Replies)
Discussion started by: Pouchie1
3 Replies

10. UNIX for Dummies Questions & Answers

List linked files

A perl script that displays the list of files which have multiple links..! ls -l shows number of links in a field. (0 Replies)
Discussion started by: aadi_uni
0 Replies
krb5_auth_rules(5)                                      Standards, Environments, and Macros                                     krb5_auth_rules(5)

NAME
krb5_auth_rules - Overview of Kerberos V5 authorization DESCRIPTION
When a user uses kerberized versions of the ftp, rdist, rcp, rlogin, rsh, or telnet clients to connect to a server, even if the user's claimed Kerberos V5 identity is authenticated, the user is not necessarily authorized. Authentication merely proves that the user is "who he says he is" to the Kerberos V5 authentication system. Authorization also needs to be done, since it determines if that Kerberos identity is permitted to access the Solaris user account that the client wants to access. Each user may have a private authorization list in a file ~/.k5login in his login directory (on the server). Each line in this file should contain a Kerberos principal name of the form principal/instance@realm. If the server finds a ~/.k5login file, then access is granted to the account if and only if the originating user is authenticated to one of the principals named in the ~/.k5login file. If there is no ~/.k5login file, the originating user will then be checked against the gsscred table (see gsscred(1M)). If the originating user's Kerberos V5 identity is in the gsscred table, and if the UNIX user id in the gsscred table corresponds to the user account the client is trying access, then the originating user is granted access to the account on the server. If the UNIX user id does not match, then the originating user is denied access. For example, suppose the originating user has a principal name of jdb@ENG.ACME.COM and the target account is jdb-user. If jdb@ENG.ACME.COM appears in the gsscred table with uid 23154 and if jdb-user appears in the user account database (see passwd(4)) with uid 23154, then access to account jdb-user is granted. Of course, normally, the target account name in this example would be jdb and not jdb-user. Finally, if there is no ~/.k5login file and if the originating user's Kerberos V5 identity is not in the gsscred table, then the user will be granted access to the account if and only if all of the following are true: o The user part of the authenticated principal name is the same as the target account name specified by the client. o The realm part of the client and server are the same. o The target account name exists on the server. For example, if the originating user has a principal name of jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, then even if jdb is a valid account name on the server, the client would be denied access. This is because the realms SALES.ACME.COM and ENG.ACME.COM differ. FILES
~/.k5login Per user-account authorization file. /etc/passwd System account file. This information may also be in a directory service. See passwd(4). ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gsscred(1M), passwd(4), attributes(5), gss_auth_rules(5) NOTES
To avoid security problems, the ~/.k5login file must be owned by the remote user. SunOS 5.10 13 Apr 2004 krb5_auth_rules(5)
All times are GMT -4. The time now is 05:53 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy