Lohit,
I did this while working @ NASA. I had two tools I used, one affectionately
known as "luke file walker" (to modify traditional unix permissions) and
the other known as the "milleniumfacl" (to modify posix ACLs). Stupid jokes
aside, there were some real technical challenges here.
I don't
On 09/06/2020 14:57, Jonathan Buzzard wrote:
[SNIP]
I actually thinking on it more thought a generic C random UID/GID to
UID/GID mapping program is a really simple piece of code and should be
nearly as fast as chown -R. It will be very slightly slower as you have
to look the mapping up for
Jonathan brings up a good point that you’ll only get one shot at this — if
you’re using the file system as your record of who owns what.
You might want to use the policy engine to record the existing file names and
ownership (and then provide updates using the same policy engine for the things
On 09/06/2020 14:07, Stephen Ulmer wrote:
Jonathan brings up a good point that you’ll only get one shot at this —
if you’re using the file system as your record of who owns what.
Not strictly true if my existing UID's are in the range 1-1 and
my target UID's are in the range
On 08/06/2020 18:44, Lohit Valleru wrote:
Hello Everyone,
We are planning to migrate from LDAP to AD, and one of the best solution
was to change the uidNumber and gidNumber to what SSSD or Centrify would
resolve.
May I know, if anyone has come across a tool/tools that can change the
First talk:
https://www.spectrumscaleug.org/event/ssugdigital-spectrum-scale-expert-talk-what-is-new-in-spectrum-scale-5-0-5/
What is new in Spectrum Scale 5.0.5?
18th June 2020. No registration required, just click the Webex link in the page
above.
Simon
From: on behalf of
> I presume there is a large technical blocker which is why you are looking at
> remapping the filesystem?
Like anytime there is a corporate AD with mandated attributes?
Though isn’t there an AD thing now for doing schema view type things now which
allow you to inherit certain attributes and
Hi Lohit (hey Jim & Christof),
Whilst you _could_ trawl your entire filesystem, flip uids and work
out how to successfully replace ACL ids without actually pushing ACLs
(which could break defined inheritance options somewhere in your file
tree if you had not first audited your filesystem) the