After a bit of searching, I found quite a few options. This was simple and got the job done.
find /directoryName -type f | awk 'NR>5'|xargs rm -f
Monday, July 30, 2012
Friday, March 23, 2012
Setup cron job from command line
The following command will insert 0 22 * * * /opt/scripts/backup into the crontab
(crontab -l 2>/dev/null -u; echo "0 22 * * * /opt/scripts/backup") | crontab -
If it is a new crontab, 2>/dev/null will get past the message of "crontab does not exist"
If you need to add for a different users, create a script called backupjob
#!/bin/bash
(crontab -l 2>/dev/null ; echo "0 22 * * * /opt/scripts/backup") | crontab -
Then call the script sudo -u jimbob backupjob
(crontab -l 2>/dev/null -u; echo "0 22 * * * /opt/scripts/backup") | crontab -
If it is a new crontab, 2>/dev/null will get past the message of "crontab does not exist"
If you need to add for a different users, create a script called backupjob
#!/bin/bash
(crontab -l 2>/dev/null ; echo "0 22 * * * /opt/scripts/backup") | crontab -
Then call the script sudo -u jimbob backupjob
Wednesday, February 29, 2012
CentOS/RHEL AD Authentication
Most of the research for this was done by Cooby and found in this article
http://blog.skinkers.com/2010/07/28/how-to-use-winbind-to-authenticate-against-ad-on-rhelcentos-5-x-automated-scripts/
The author of the article gets the credit, I'm just going to add some notes and clarification for spots where I got stuck. I recently set this up with an Amazon Linux instance authenticating Windows Domain built on Amazon EC2. There were a few tweaks needed. Nothing major, but something I would like to share and do not want to forget for the future.
Build an Amazon Linux instance from the Amazon AMIs. Connect to the instance with the ec2user and ssh key. Run Yum update for the latest packages
Do the following as root or use sudo
1) Add the CentOS Base Repo (samba packages are currently not available in the preconfigured Amazon Linux repos)
vi /etc/yum.repos.d/centos.repo
[centOS]
name=CentOS-6 Base
baseurl=http://mirror.centos.org/centos/6/os/x86_64/
enabled=1
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/6/os/x86_64/RPM-GPG-KEY-CentOS-6
2) yum install nscd samba samba-common samba-client samba-winbind
3) vi /etc/hosts
10.0.0.1 dc01.example.local dc01
4) Change the hostname, Amazon Linux by default will have a hostname like IP-10-248-246-135
That is more then 15 characters and is too log of a netbios name for joining to active directory
vi /etc/sysconfig/network
Change HOSTNAME=localhost.localdomain to a name shorter then 15 characters
5) Run authconfig-tui
Authentication Configuration - check Cache Information, Use Winbind, Use MD5 Passwords, Use Shadow Passwords, Use Winbind Authentication
Winbind Settings - check ads, type the short name of the domain, example.com needs to be just example in this field, enter FQDN of domain controllers, ADS realm is FQDN of primary DC, check /bin/bash
Click on Join Domain
Enter credentials for a domain administrator and make sure the server successfully joined the domain
6) vi /usr/local/bin/bash-wrapper - make it executable chmod +x
7) vi ad-phase2.sh - make it executable chmod +x
9)Try to login
ssh user@instance.DNS or ssh domain\\user@instance.DNS
The directory structure should be automatically created - /home/domain/user
10)Troubleshooting
Watch for any messages or errors along the way - make sure the instance has actually joined the domain
Make sure winbind is running - ps ax | grep winbind
There are changes between Linux distributions and slight changes from the original post
Example - samba-winbind is a relatively new package and is required
Another example - in ad-phase2.sh, ldap.conf is located at /etc/openldap instead of the root of /etc like in the original script
Time - A critical part of AD authentication, by default Amazon Windows and Linux instances talk to the Amazon NTP servers, I leave this as is and do not change any of it, but the servers must be in sync or AD authentication will fail
http://blog.skinkers.com/2010/07/28/how-to-use-winbind-to-authenticate-against-ad-on-rhelcentos-5-x-automated-scripts/
The author of the article gets the credit, I'm just going to add some notes and clarification for spots where I got stuck. I recently set this up with an Amazon Linux instance authenticating Windows Domain built on Amazon EC2. There were a few tweaks needed. Nothing major, but something I would like to share and do not want to forget for the future.
Build an Amazon Linux instance from the Amazon AMIs. Connect to the instance with the ec2user and ssh key. Run Yum update for the latest packages
Do the following as root or use sudo
1) Add the CentOS Base Repo (samba packages are currently not available in the preconfigured Amazon Linux repos)
vi /etc/yum.repos.d/centos.repo
[centOS]
name=CentOS-6 Base
baseurl=http://mirror.centos.org/centos/6/os/x86_64/
enabled=1
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/6/os/x86_64/RPM-GPG-KEY-CentOS-6
2) yum install nscd samba samba-common samba-client samba-winbind
3) vi /etc/hosts
10.0.0.1 dc01.example.local dc01
4) Change the hostname, Amazon Linux by default will have a hostname like IP-10-248-246-135
That is more then 15 characters and is too log of a netbios name for joining to active directory
vi /etc/sysconfig/network
Change HOSTNAME=localhost.localdomain to a name shorter then 15 characters
5) Run authconfig-tui
Authentication Configuration - check Cache Information, Use Winbind, Use MD5 Passwords, Use Shadow Passwords, Use Winbind Authentication
Winbind Settings - check ads, type the short name of the domain, example.com needs to be just example in this field, enter FQDN of domain controllers, ADS realm is FQDN of primary DC, check /bin/bash
Click on Join Domain
Enter credentials for a domain administrator and make sure the server successfully joined the domain
6) vi /usr/local/bin/bash-wrapper - make it executable chmod +x
| #!/bin/sh # This script restricts shell access to privileged users. The "template shell" # option in the '/etc/samba/smb.conf' file should be set to call this wrapper. # Get group memberships for this user. BFN_ID=$(/usr/bin/id) # Grant shell access to users that are in the local wheel group. if /bin/echo "$BFN_ID" | /bin/grep -P '[=,][0-9]{1,8}\(wheel\)' > /dev/null then exec /bin/bash --login "$@" fi # Grant shell access to users that are in the domain administrators group. if /bin/echo "$BFN_ID" | /bin/grep -P '[=,][0-9]{1,8}\(domain\ admins\)' > /dev/null then exec /bin/bash --login "$@" fi # Else print a notice and just exit. echo "Shell access to this computer is disabled." # eof |
7) vi ad-phase2.sh - make it executable chmod +x
#!/bin/sh
# ad-phase2.sh - Phase 2
# Author: Max Sanna
# Description: This script automates the process of joining a linux box
# to an AD domain. The process is divided in two parts.
#
# Please edit the relevant parts of the script below prior running it
# This block doesn't need to be edited
#sed -i 's%protocols: files%protocols: files winbind%g' /etc/nsswitch.conf
#sed -i 's%rpc: files%rpc: files winbind%g' /etc/nsswitch.conf
#sed -i 's%netgroup: files%netgroup: files winbind%g' /etc/nsswitch.conf
#sed -i 's%automount: files%automount: files winbind%g' /etc/nsswitch.conf
# The following line allows users to logon without the ugly EXAMPLE\user syntax
#sed -i 's%winbind use default domain = false%winbind use default domain = true%g' /etc/samba/smb.conf
# More parameters to make life easier with UID and GID correspondances
#sed -i 's% template shell = /bin/bash% template shell = /usr/local/bin/bash-wrapper%g' /etc/samba/smb.conf
#sed -i '/ winbind offline logon = false/a winbind enum users = true' /etc/samba/smb.conf
#sed -i '/winbind enum users = true/a winbind enum groups = true' /etc/samba/smb.conf
#sed -i '/winbind enum groups = true/a winbind cache time = 5' /etc/samba/smb.conf
#sed -i '/winbind cache time = 5/a winbind nested groups = true' /etc/samba/smb.conf
# This line will allow for home folders to be created in /home/DOMAIN/username upon first login
#echo "session optional pam_mkhomedir.so skel=/etc/skel/ umask=0022" >> /etc/pam.d/system-auth
# The following line will allow all the users within the Domain Admins group to sudo on the server
#echo "%domain\ admins ALL=(ALL) ALL" >> /etc/sudoers
# Replace "base OU=Users,DC=example,DC=com" with the container of the users you want to allow on the box
sed -i 's%base dc=example,dc=com%base OU=Users,DC=example,DC=com%g' /etc/openldap/ldap.conf
service winbind restart
service nscd restart
8)Restart the instance9)Try to login
ssh user@instance.DNS or ssh domain\\user@instance.DNS
The directory structure should be automatically created - /home/domain/user
10)Troubleshooting
Watch for any messages or errors along the way - make sure the instance has actually joined the domain
Make sure winbind is running - ps ax | grep winbind
There are changes between Linux distributions and slight changes from the original post
Example - samba-winbind is a relatively new package and is required
Another example - in ad-phase2.sh, ldap.conf is located at /etc/openldap instead of the root of /etc like in the original script
Time - A critical part of AD authentication, by default Amazon Windows and Linux instances talk to the Amazon NTP servers, I leave this as is and do not change any of it, but the servers must be in sync or AD authentication will fail
Monday, February 27, 2012
elasticfox-ec2tag
There are many methods for managing AWS. The web based management console provided by Amazon is very nice. They are constantly changing and tweaking it. I find in most cases this leads to a better end user experience.
The command line based tools are also useful. If you have a Amazon Linux instance, the tools are installed and updated by default. Setting up the tools for use in the Windows scripts is also straightforward. Developers also have many options with numerous SDKs.
I found ElasticFox is very helpful from a systems administration viewpoint. ElasticFox is a plugin for Firefox. There are many versions of this floating around, but I feel ElasticFox-ec2Tag is by far the best. They keep it updated and keep it working for the constantly updating Firefox.
It can be downloaded here:
https://github.com/cookpad/elasticfox-ec2tag/downloads
Download the xpi, Open Firefox and go to Tools > Add-Ons
Drag the xpi file onto the page and follow the instructions. Firefox will prompt for a restart
The command line based tools are also useful. If you have a Amazon Linux instance, the tools are installed and updated by default. Setting up the tools for use in the Windows scripts is also straightforward. Developers also have many options with numerous SDKs.
I found ElasticFox is very helpful from a systems administration viewpoint. ElasticFox is a plugin for Firefox. There are many versions of this floating around, but I feel ElasticFox-ec2Tag is by far the best. They keep it updated and keep it working for the constantly updating Firefox.
It can be downloaded here:
https://github.com/cookpad/elasticfox-ec2tag/downloads
Download the xpi, Open Firefox and go to Tools > Add-Ons
Drag the xpi file onto the page and follow the instructions. Firefox will prompt for a restart
Friday, February 24, 2012
Glassfish 3 Password Alias
In the previous post, there is a function to change admin authentication from local to active directory. It works great, but the password for the service account performing active directory lookups is in plain text. Best practices for security says that password should be hidden.
1)
Add
AS_ADMIN_ALIASPASSWORD=thepassword
to the password file located at /tmp/password
This file needs to be manually created to automate the GF install
2) Add the password to Glassfish's secure password store
3) Set the search-bind-password field - that "\" is quite important - lots of time spent trying to get that to work
/opt/AppSrv/glassfish3/glassfish/bin/asadmin -W /tmp/password set server.security-service.auth-realm.admin-realm.property.search-bind-password="\${ALIAS=ldapbind}"
Restart Glassfish and delete /tmp/password
1)
Add
AS_ADMIN_ALIASPASSWORD=thepassword
to the password file located at /tmp/password
This file needs to be manually created to automate the GF install
2) Add the password to Glassfish's secure password store
/opt/AppSrv/glassfish3/glassfish/bin/asadmin -W /tmp/password --secure create-password-alias ldapbind
3) Set the search-bind-password field - that "\" is quite important - lots of time spent trying to get that to work
/opt/AppSrv/glassfish3/glassfish/bin/asadmin -W /tmp/password set server.security-service.auth-realm.admin-realm.property.search-bind-password="\${ALIAS=ldapbind}"
Restart Glassfish and delete /tmp/password
Monday, February 6, 2012
GlassFish 3 Install Script
I have a new application to manage in 2012. GlassFish is an Oracle driven product to host Java applications. I have been tasked with helping to build new servers to upgrade from version 2 to version 3. To help with the deployment process, I created a bash script to automate the installation.
The script has supporting files including the latest version of GlassFish and Java JDK. The files need to be copied to a directory called /tmp/gf_install The script itself can be run from any location - user's home directory makes the most sense
The script has supporting files including the latest version of GlassFish and Java JDK. The files need to be copied to a directory called /tmp/gf_install The script itself can be run from any location - user's home directory makes the most sense
#!/bin/bash
DOMAIN_NAME=`hostname --short`
#read -p "Enter domain name " DOMAIN_NAME
TMP_DIR="/tmp/gf_install"
# Use with AD Authentication
#ASADMIN="sudo -u appadmin /opt/AppSrv/glassfish3/glassfish/bin/asadmin -W ${TMP_DIR}/password"
# Use without AD Authentication
ASADMIN="/opt/AppSrv/glassfish3/glassfish/bin/asadmin -W ${TMP_DIR}/password"
KEYSTORE_FILE="/opt/AppSrv/glassfish3/glassfish/domains/${DOMAIN_NAME}/config"
svn_prep (){
cd /opt
sudo svn checkout http://svn.fbfs.com/midtierscripts/
sudo chown -R appadmin:users /opt/midtierscripts
mkdir /tmp/gf_install
cd /opt/midtierscripts/serverInstall
cp answer password password2 glassfish /tmp/gf_install
cp /mnt/midtier_devtools/midtier/gfinstall/* /tmp/gf_install
}
edit_answer (){
sed -i -silent s/newdomain/${DOMAIN_NAME}/g ${TMP_DIR}/answer
}
java_install (){
sudo mkdir /opt/java ;
tar zxf ${TMP_DIR}/jdk-7u3-linux-x64.tar.gz -C ${TMP_DIR}
sudo mv ${TMP_DIR}/jdk1.7.0_03/* /opt/java
#sudo cp ${TMP_DIR}/jdk.sh /etc/profile.d/jdk.sh
#source /etc/profile.d/jdk.sh
sudo chown -R appadmin:users /opt/java/
}
gf_install (){
chmod +x ${TMP_DIR}/glassfish-3.1.2.2-unix.sh
# Use with AD Authentication
#sudo ${TMP_DIR}/glassfish-3.1.2-unix.sh -s -j /opt/java -a ${TMP_DIR}/answer
# Use without AD Authentication
${TMP_DIR}/glassfish-3.1.2.2-unix.sh -s -j /opt/java -a ${TMP_DIR}/answer
sudo chown -R appadmin:users /opt/AppSrv/
$ASADMIN start-domain
}
gf_restart (){
$ASADMIN stop-domain
$ASADMIN start-domain
}
enable_secure_admin (){
$ASADMIN enable-secure-admin
gf_restart
}
gf_config (){
wget https://localhost:4848 --no-check-certificate --delete-after -q
$ASADMIN set server-config.admin-service.jmx-connector.system.security-enabled=true
$ASADMIN set server-config.network-config.protocols.protocol.http-listener-2.security-enabled=true
$ASADMIN set server-config.network-config.protocols.protocol.sec-admin-listener.security-enabled=true
$ASADMIN set server-config.network-config.protocols.protocol.sec-admin-listener.ssl.cert-nickname=s1as
$ASADMIN deploy ${TMP_DIR}/wmq.jmsra.rar
$ASADMIN create-resource-adapter-config --property logWriterEnabled=true:maxConnections=4:traceLevel=3:traceEnabled=false:reconnectionRetryCount=5:reconnectionRetryInterval=300000:connectionConcurrency=1 wmq.jmsra
sudo -u appadmin /opt/AppSrv/glassfish3/glassfish/bin/asadmin -W ${TMP_DIR}/password2 --secure create-password-alias jenkins
sudo -u appadmin mkdir /mnt/midtier_logs/domain
$ASADMIN set-log-attributes --target server com.sun.enterprise.server.logging.GFFileHandler.file=/mnt/midtier_logs/domain/server.log
$ASADMIN set-log-attributes --target server com.sun.enterprise.server.logging.GFFileHandler.rotationTimelimitInMinutes=1440
sudo mkdir /opt/AppSrv/glassfish3/glassfish/nodes
sudo chown -R appadmin:users /opt/AppSrv
sed -i -silent s/org.glassfish.admingui.level=INFO/org.glassfish.admingui.level=FINE/g /opt/AppSrv/glassfish3/glassfish/domains/${DOMAIN_NAME}/config/logging.properties
gf_restart
}
cert_install (){
sudo -u appadmin keytool -import -noprompt -alias root -keystore ${KEYSTORE_FILE}/keystore.jks -trustcacerts -file ${TMP_DIR}/Root.cer -storepass changeit
sudo -u appadmin keytool -import -noprompt -alias intermediate_1 -keystore ${KEYSTORE_FILE}/keystore.jks -trustcacerts -file ${TMP_DIR}/Intermediate_1.cer -storepass changeit
sudo -u appadmin keytool -import -noprompt -alias issue -keystore ${KEYSTORE_FILE}/keystore.jks -trustcacerts -file ${TMP_DIR}/Issue.cer -storepass changeit
sudo -u appadmin keytool -import -noprompt -alias root -keystore ${KEYSTORE_FILE}/cacerts.jks -trustcacerts -file ${TMP_DIR}/Root.cer -storepass changeit
sudo -u appadmin keytool -import -noprompt -alias intermediate_1 -keystore ${KEYSTORE_FILE}/cacerts.jks -trustcacerts -file ${TMP_DIR}/FBL_Intermediate_1.cer -storepass changeit
sudo -u appadmin keytool -import -noprompt -alias issue -keystore ${KEYSTORE_FILE}/cacerts.jks -trustcacerts -file ${TMP_DIR}/Issue.cer -storepass changeit
sudo -u appadmin keytool -importkeystore -noprompt -deststorepass changeit -destkeypass changeit -destkeystore ${KEYSTORE_FILE}/keystore.jks -srckeystore ${TMP_DIR}/generic.p12 -srcstoretype PKCS12 -srcstorepass password -alias generic.domain.com
sudo -u appadmin sed -i -silent 's/s1as/generic.domain.com/g' ${KEYSTORE_FILE}/domain.xml
gf_restart
}
create_service (){
sudo mv ${TMP_DIR}/glassfish /etc/init.d/glassfish
cd /etc/init.d
sudo chmod +x glassfish
sudo chown root:root glassfish
sudo chkconfig --add glassfish
sudo chkconfig glassfish on
}
ldap_authentication (){
$ASADMIN --secure create-password-alias ldapbind
$ASADMIN set server.security-service.auth-realm.admin-realm.property.base-dn="dc=domain,dc=com"
$ASADMIN set server.security-service.auth-realm.admin-realm.property.directory=ldap://ldap.domain.com:389
$ASADMIN set server.security-service.auth-realm.admin-realm.property.search-bind-password="\${ALIAS=ldapbind}"
$ASADMIN set server.security-service.auth-realm.admin-realm.property.jaas-context=ldapRealm
$ASADMIN set server.security-service.auth-realm.admin-realm.property.group-search-filter="(&(member=%d)(objectcategory=group))"
$ASADMIN set server.security-service.auth-realm.admin-realm.property.search-bind-dn="cn=user user,OU=Service Accounts,DC=domain,DC=com"
$ASADMIN set server.security-service.auth-realm.admin-realm.property.search-filter="(&(objectClass=user)(memberOf=CN=Group,OU=Domain Groups,DC=domain,DC=com)(sAMAccountName=%s))"
$ASADMIN set server.security-service.auth-realm.admin-realm.property.assign-groups=asadmin
$ASADMIN set server.security-service.auth-realm.admin-realm.property.group-base-dn="ou=Domain Groups,dc=domain,dc=com"
$ASADMIN set server.security-service.auth-realm.admin-realm.classname=com.sun.enterprise.security.auth.realm.ldap.LDAPRealm
gf_restart
}
glassfish_update (){
$ASADMIN stop-domain
cd /opt/AppSrv/glassfish3/bin
sudo ./pkg image-update
$ASADMIN start-domain
sudo mkdir /opt/AppSrv/glassfish3/glassfish/nodes
sudo chown -R appadmin:users /opt/AppSrv
}
copy_drivers (){
cd ${TMP_DIR}
sudo cp db2jcc.jar db2jcc_license_cisuz.jar db2java.zip sqljdbc4.jar ojdbc6.jar WebSEAL_SAM.jar /opt/AppSrv/glassfish3/glassfish/lib/
gf_restart
}
cron (){
echo '#!/bin/bash' > $TMP_DIR/backup_cron
echo '(crontab -l 2>/dev/null -u appadmin; echo "0 21 * * * svn update /opt/midtierscripts"; echo "00 01 1 1,4,7,10 * /opt/midtierscripts/utility/devel_cert/cert_report.sh";) | crontab -' >> $TMP_DIR/backup_cron
sudo chmod +x $TMP_DIR/backup_cron
sudo -u appadmin $TMP_DIR/backup_cron
}
delete_tmp_dir (){
cd ~
rm -rf ${TMP_DIR}
}
svn_prep
edit_answer
java_install
gf_install
enable_secure_admin
gf_config
cert_install
create_service
ldap_authentication
glassfish_update
copy_drivers
cron
delete_tmp_dir
Subscribe to:
Comments (Atom)