The following list provides considerations of individual scalability server use cases:
This problem is related to the Samba security configuration setting. When the agents try to mount the share on the scalability server using CIFS, they only succeed in mounting it as guest user (which is the default when no library access has been provided), if the Samba scalability server is configured to use shared-level security.
If however, the Samba scalability server is configured to use another security type, like user-level security, the mounting with CIFS as anonymous user will not work since it requires an explicit user, along with the correct password. Furthermore, the user must have been added to the Samba user file with the smbpasswd -a command.
The reason to enforce the use of CIFS (mount -t cifs) if possible is that it handles NLCs in a much better way than the usual SMB (smbmount).
We suggest that administrators configure their scalability servers as follows:
This sets up the credentials for software delivery that are used when sending jobs to agents.
This sets up the credentials in Samba itself.
/etc/init.d/smb reload
The new settings are activated.
Note: If this configuration step is not done, the jobs will likely function anyway since the fallback solution, the Internal NOS-less transport mechanism, steps in. Internal NOS-less may not be as efficient as using Internal NOS, but it will work.
Linux systems that seem to work out-of-the-box include SuSE 9 ES; Linux systems that do not work out-of-the-box include RedHat 3 ES and RedHat 4 ES.
|
Copyright © 2013 CA.
All rights reserved.
|
|