Start a Conversation

This post is more than 5 years old

Solved!

Go to Solution

1969

December 24th, 2011 04:00

EMC Home Directories

Hi all

There seems to be multiple threads opened but I thought I would post our predicament!

We are just implementing the EMC Home Directories part of the Celerra and it has been successful (have set quota’s etc).

However, when (As an IT admin, I would need to do this on a rare occasion!) I navigate to a home directory of a user (their home paths are \\CIFSSERVER\HOME but I navigate to the \\CIFSSERVER\C$\STAFFHDFS\STR\%USERNAME% and get the below error)

cannot_connect_staffhdfs.JPG

It’s imperative I can get access to these drives any ideas?

Merry Christmas and thanks for your help

Richard

12 Posts

December 30th, 2011 04:00

Hi

Thanks for taking the time to reply. Yes I got it sorted, reg key was done fine - had to apply the Add Admins to roaming profile on the domain level Gpo

Weird huh?

Many thanks and happy new year

Richard

275 Posts

December 24th, 2011 05:00

There is a key in the register that can be changed so that adins have access to user's homedir

By default now only users have access

Look in the cifs documentation or in PowerLink and knowledge database

Claude

12 Posts

December 24th, 2011 05:00

OK I found the doc and changed the FLAG key in HKEY LOCAL MACHINE and then deleted the old home directory of my test acct, let it recreate with the registry key set and still the same issue

Permissions on the top dir (staff-hdfs) are as follows

staffhdfs.JPG

When I get to the domain directory it creates (STR) I get the following

str.JPG

When I try and set permissions on the STR directory, it doesn't let me?

I have a feeling I may need to log this with EMC support but if anyone has any ideas???

Thanks Richard

12 Posts

December 24th, 2011 05:00

Thanks Claude that is helpful - can you point me where to get to the documentation? I am a new Celerra admin and I am a bit nervy as I have done the nas ops course however this is my first big change of this!

8.6K Posts

December 24th, 2011 10:00

Are you sure your account is in the Celerra CIFS servers local Administrator group?

12 Posts

December 24th, 2011 12:00

Hi Rainer ... yup

cifs_memberoflocaladmin.JPG

mrharrisr is my acct, which is also in the domain admins group (along with Administrator etc). I have tried logged in as both users but to no avail

Merry Christmas btw.

Richard    

8.6K Posts

December 24th, 2011 13:00

Sorry - can't see the pictures on the iPhone Email

I would suggest to check the ACLs on the homedir - either from Windows or via server_cifssupport

Merry Christmas

Rainer

12 Posts

December 24th, 2011 14:00

I can't even get to the ACLs via Windows as i, nor Admins, are the owners?

[nasadmin@nascs01 ~]$ server_cifssupport server_2 -acl  -path /staff-hdfs/str/user

server_2 : done

ACL DUMP REPORT

Path         : /staff-hdfs/str/mrdumbledorea

UID          : 34980

GID          : 32874

Rights       : rwxr--r--

owner SID    : S-1-5-15-6124312a-87216b22-e40ca1e0-dc0

group SID    : S-1-5-15-6124312a-87216b22-e40ca1e0-201

DACL

USER 34980 S-1-5-15-6124312a-87216b22-e40ca1e0-dc0

ALLOWED 0x3 0x1f01ff RWXPDO

WELLKNOWN S-1-5-12

ALLOWED 0x3 0x1f01ff RWXPDO

Arrrrgh! Really fustrating me!

8.6K Posts

December 29th, 2011 15:00

any news? did you get it to work ?

Are you sure you changed the correct registry key ?

what VNX OE / DART version are you using ?

Rainer

8.6K Posts

December 30th, 2011 13:00

Thanks for the feedback

Could you explain a bit more so that others can avoid the problem?

How does you ACL look now?

Rainer

12 Posts

December 30th, 2011 13:00

Do you mean unix wise? (server_cifssupport)

Sent from my iPhone

8.6K Posts

December 30th, 2011 18:00

Yes

12 Posts

December 31st, 2011 00:00

Well ... here are the new ACLs (and it works perfectly and just the way i want it!)

[nasadmin@nascs01 ~]$ server_cifssupport server_2 -acl -path /staff-hdfs/mrdumbledorea

server_2 : done

ACL DUMP REPORT

Path         : /staff-hdfs/mrdumbledorea

UID          : 34980

GID          : 32874

Rights       : rwxr--r--

owner SID    : S-1-5-20-220

group SID    : S-1-5-15-6124312a-87216b22-e40ca1e0-201

DACL

ALL S-1-1-0

ALLOWED 0x13 0x1f01ff RWXPDO

GROUP 32909 S-1-5-15-6124312a-87216b22-e40ca1e0-f81

ALLOWED 0x10 0x1f01ff RWXPDO

And then with the GPO, on the domain level, in Comp Config -> System -> Profiles, I enabled "Add the Administrators security group to roaming user profiles"

Hope this is OK

8.6K Posts

December 31st, 2011 04:00

Thanks

Rainer

No Events found!

Top