rcp gets hung for long time


 
Thread Tools Search this Thread
Operating Systems AIX rcp gets hung for long time
# 1  
Old 01-09-2008
rcp gets hung for long time

Every evening I run a script in AIX production box, which executes below command:
rcp prod_bkup.tar prodapp@IP:/data/appl/prod

This will rcp a backup of around 11 GB from production to another machine (runs every evening so overwrites previous one). Just to keep the backup safe. Since 2-3 days, I notice that this command takes quite longer than normal days and when I go to another machine - I am allowed to login, But when I give 'ls -l /data/appl/prod' nothing comes and looks like session on both windows kinda hung state. Then I press ctrl C on production.

Then next morning 'ls -l /data/appl/prod' command also works fine on another machine and I see that backup is copied (not fully, the byte difference is there) of around 2 hours later time stamp. And I tried rcping a 0 byte from production to another machine also works fine. Only problem comes during evening when I rcp the backup.

Do you know what might be going wrong and where can I find such logs on AIX machines?

Please advice / Thank you.
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

First script in a long time

I was wondering if I could get some feedback on my script to grab time from our MDM... I blocked out all of the important stuff. I really appreciate any guidance, since I am long out of practice. #!/bin/bash serial=$1 # get last seen value of ipad lastseen=$(curl -s -X "GET"... (11 Replies)
Discussion started by: andysensible
11 Replies

2. UNIX for Dummies Questions & Answers

ls is taking long time to list

Hi, All the data are kept on Netapp using NFS. some directories are so fast when doing ls but few of them are slow. After doing few times, it becomes fast. Then again after few minutes, it becomes slow again. Can you advise what's going on? This one directory I am very interested is giving... (3 Replies)
Discussion started by: samnyc
3 Replies

3. Shell Programming and Scripting

How long ago since time - Using perl

echo "1337124526" | perl -pe 's/(\d+)/easttime($1)/e' the above gives a date and time. how can i subtract the date and time given by this command, from the current present date? can this be a one liner or as close to a one-liner as possible? (1 Reply)
Discussion started by: SkySmart
1 Replies

4. Shell Programming and Scripting

sort takes a long time

Dear experts I have a 200MG text file in this format: text \tab number I try to sort using options -fd and it takes very long! is that normal or I can speed it up in some ways? I dont want to split the file since this one is already splitted. I use this command: sort -fd file >... (12 Replies)
Discussion started by: voolek
12 Replies

5. UNIX for Dummies Questions & Answers

Job is taking long time

Hi , We have 20 jobs are scheduled. In that one of our job is taking long time ,it's not completing. If we are not terminating it's running infinity time actually the job completion time is 5 minutes. The job is deleting some records from the table and two insert statements and one select... (7 Replies)
Discussion started by: ajaykumarkona
7 Replies

6. HP-UX

Strange- RCP command works every other time

This just started happening. I use the rcp command to copy a file from one server to another. Now when I use the command, every other time I execute the exact same command I get the error: remshd: login correct Example: 1. rcp testfile server2:/db/tmp (Work ok, verified file... (6 Replies)
Discussion started by: jrowland
6 Replies

7. HP-UX

ssh session getting hung (smilar to hpux telnet session is getting hung after about 15 minutes)

Our network administrators implemented some sort of check to kill idle sessions and now burden is on us to run some sort of keep alive. Client based keep alive doesn't do a very good job. I have same issue with ssh. Does solution 2 provided above apply for ssh sessions also? (1 Reply)
Discussion started by: yoda9691
1 Replies

8. Shell Programming and Scripting

help - exec time too long

Dear everyone... thanks to this forum I am able to do everyday more and more complex scripts...but now I come up with problem with optimisation.. problem 1 - optimise: here is my code: while read number do nawk -F "|" -v... (8 Replies)
Discussion started by: abdulaziz
8 Replies

9. Solaris

ssh Long time to return prompt.

Hi All, I was installed new server M5000 on solaris10. I'am try to connect to server by ssh client (putty) after type user name and password the server take long time to return prompt to me about 30-60 second. any body can suggess me how to do it. (8 Replies)
Discussion started by: cesmk
8 Replies

10. Programming

Debug env for long time use

Hi, I'm pritty new to C, but a recent bug in a program i've been using has forced me to debug it. But I am unable to find a debugger that can act as a layer between the OS and the program to see whats going on.. The problem is that this piece of software makes a connection through localhost... (2 Replies)
Discussion started by: nephilimbe
2 Replies
Login or Register to Ask a Question
rcp(1)								   User Commands							    rcp(1)

NAME
rcp - remote file copy SYNOPSIS
rcp [-p] [-a] [-K] [-x] [-PN | -PO] [-k realm] filename1 filename2 rcp [-pr] [-a] [-K] [-x] [-PN | -PO] [-k realm] filename... directory DESCRIPTION
The rcp command copies files between machines. Each filename or directory argument is either a remote file name of the form: hostname:path or a local file name (containing no : (colon) characters, or / (backslash) before any : (colon) characters). The hostname can be an IPv4 or IPv6 address string. See inet(7P) and inet6(7P). Since IPv6 addresses already contain colons, the hostname should be enclosed in a pair of square brackets when an IPv6 address is used. Otherwise, the first occurrence of a colon can be interpreted as the separator between hostname and path. For example, [1080::8:800:200C:417A]:tmp/file If a filename is not a full path name, it is interpreted relative to your home directory on hostname. A path on a remote host can be quoted using , ", or ', so that the metacharacters are interpreted remotely. Please notice that the kerberized versions of rcp are not IPv6-enabled. rcp does not prompt for passwords. It either uses Kerberos authentication which is enabled through command-line options or your current local user name must exist on hostname and allow remote command execution by rsh(1). The rcp session can be kerberized using any of the following Kerberos specific options : -a, -PN or -PO, -x, and -k realm. Some of these options (-a, -x and -PN or -PO) can also be specified in the [appdefaults] section of krb5.conf(4). The usage of these options and the expected behavior is discussed in the OPTIONS section below. If Kerberos authentication is used, authorization to the account is controlled by rules in krb5_auth_rules(5). If this authorization fails, fallback to normal rcp using rhosts occurs only if the -PO option is used explicitly on the command line or is specified in krb5.conf(4). If authorization succeeds, remote copy succeeds without any prompting of password. Also notice that the -PN or -PO, -x, and -k realm options are just supersets of the -a option. rcp handles third party copies, where neither source nor target files are on the current machine. Hostnames can also take the form username@hostname:filename to use username rather than your current local user name as the user name on the remote host. rcp also supports Internet domain addressing of the remote host, so that: username@host.domain:filename specifies the username to be used, the hostname, and the domain in which that host resides. File names that are not full path names are interpreted relative to the home directory of the user named username, on the remote host. OPTIONS
The following options are supported: -a This option explicitly enables Kerberos authentication and trusts the .k5login file for access-control. If the authorization check by in.rshd(1M) on the server-side succeeds and if the .k5login file permits access, the user is allowed to carry out the rcp transfer. -k realm Causes rcp to obtain tickets for the remote host in realm instead of the remote host's realm as determined by krb5.conf(4). -K realm This option explicitly disables Kerberos authentication. It canbe used to override the autologin variable inkrb5.conf(4). -p Attempts to give each copy the same modification times, access times, modes, and ACLs if applicable as the original file. -PO Explicitly requests new (-PN) or old (-PO) version of the Kerberos "rcmd" protocol. The new protocol avoids many security prob- -PN lems prevalant in the old one and is regarded much more secure, but is not interoperable with older (MIT/SEAM) servers. The new protocol is used by default, unless explicitly specified using these options or through krb5.conf(4). If Kerberos authorization fails when using the old "rcmd" protocol, there is fallback to regular, non-kerberized rcp. This is not the case when the new, more secure "rcmd" protocol is used. -r Copies each subtree rooted at filename; in this case the destination must be a directory. -x Causes the information transferred between hosts to be encrypted. Notice that the command is sent unencrypted to the remote system. All subsequent transfers are encrypted. USAGE
See largefile(5) for the description of the behavior of rcp when encountering files greater than or equal to 2 Gbyte ( 2^31 bytes). The rcp command is IPv6-enabled. See ip6(7P). IPv6 is not currently supported with Kerberos V5 authentication. For the kerberized rcp session, each user can have a private authorization list in a file .k5login in their home directory. Each line in this file should contain a Kerberos principal name of the form principal/instance@realm. If there is a ~/.k5login file, then access is granted to the account if and only if the originater user is authenticated to one of the principals named in the ~/.k5login file. Other- wise, the originating user is granted access to the account if and only if the authenticated principal name of the user can be mapped to the local account name using the authenticated-principal-name -> local-user-name mapping rules. The .k5login file (for access control) comes into play only when Kerberos authentication is being done. EXIT STATUS
The following exit values are returned: 0 All files were copied successfully. >0 An error occurred. See the NOTES section for caveats on the exit code. FILES
$HOME/.profile $HOME/.k5login File containing Kerberos principals that are allowed access /etc/krb5/krb5.conf Kerberos configuration file ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWrcmdc | +-----------------------------+-----------------------------+ |CSI |Enabled | +-----------------------------+-----------------------------+ SEE ALSO
cpio(1), ftp(1), rlogin(1), rsh(1), setfacl(1), tar(1), tar(1), in.rshd(1M), hosts.equiv(4), krb5.conf(4), attributes(5), largefile(5), krb5_auth_rules(5), inet(7P), inet6(7P), ip6(7P) NOTES
rcp is meant to copy between different hosts. Attempting to rcp a file onto itself, as with: example% rcp tmp/file myhost:/tmp/file results in a severely corrupted file. rcp might not correctly fail when the target of a copy is a file instead of a directory. rcp can become confused by output generated by commands in a $HOME/.profile on the remote host. rcp requires that the source host have permission to execute commands on the remote host when doing third-party copies. rcp does not properly handle symbolic links. Use tar or cpio piped to rsh to obtain remote copies of directories containing symbolic links or named pipes. See tar(1) and cpio(1). If you forget to quote metacharacters intended for the remote host, you get an incomprehensible error message. rcp fails if you copy ACLs to a file system that does not support ACLs. rcp is CSI-enabled except for the handling of username, hostname, and domain. When rcp is used to perform third-party copies where either of the remote machines is not running Solaris, the exit code cannot be relied upon. That is, errors could occur when success is reflected in the exit code, or the copy could be completely successful even though an error is reflected in the exit code. SunOS 5.11 23 Dec 2008 rcp(1)

Featured Tech Videos