NOTE: This is a question I found on StackOverflow which I’ve archived here, because the answer is so effing phenomenal.
If you are not into long explanations, see [Paolo Bergantino’s answer][2].
NOTE: This is a question I found on StackOverflow which I’ve archived here, because the answer is so effing phenomenal.
If you are not into long explanations, see [Paolo Bergantino’s answer][2].
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [dp_get_account_info_handler] (0x0200): Got request for [0x1][BE_REQ_USER][idnumber=4311] | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [dp_attach_req] (0x0400): DP Request [Account #29]: New request. Flags [0x0001]. | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [dp_attach_req] (0x0400): Number of active DP request: 1 | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [sss_domain_get_state] (0x1000): Domain LDAP is Active | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [sdap_id_op_connect_step] (0x4000): reusing cached connection | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [sdap_search_user_next_base] (0x0400): Searching for users with base [ou=People,dc=mnet,dc=qintra,dc=com] | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [sdap_print_server] (0x2000): Searching 151.116.137.34:1636 | |
| (Mon Apr 2 15:59:31 2018) [sssd[be[LDAP]]] [sdap_get_generic_ext_step] (0x0400): calling ldap_search_ext with [(&(mnetid=4311)(objectclass=mnetPerson)(uid=*)(&(mnetid=*)(!(mnetid=0))))][ou=People,dc=mnet, |
| #!/usr/bin/env python | |
| with open('/etc/group') as f: | |
| groups = f.readlines() | |
| mygroups = {} | |
| for ll in groups: | |
| ll = ll.split(':') | |
| if len(ll[3]) > 1: |
| --- | |
| - hosts: localhost | |
| gather_facts: no | |
| roles: | |
| - ldap | |
| vars: | |
| ldap_lookup_config: | |
| url: ldaps://192.168.1.100 | |
| base: ou=People,dc=com | |
| binddn: uid=bind,dc=com |
| --- | |
| - hosts: localhost | |
| roles: | |
| - ldap | |
| vars: | |
| ldap_lookup_config: | |
| url: ldaps://192.168.1.100 | |
| base: ou=People,dc=com | |
| binddn: uid=bind,dc=com | |
| bindpw: secret |
| --- | |
| - hosts: localhost | |
| roles: | |
| - ldap | |
| vars: | |
| ldap_lookup_config: | |
| url: ldaps://192.168.1.100 | |
| base: ou=People,dc=com | |
| binddn: uid=bind,dc=com | |
| bindpw: secret |
_________ _____ _______________ _____
\_ ___ \\ \\___________ \____ / ____\ ~/.bash/cliref.md
/ \ \/| | | || _/ __ \ __\ copy/paste from whatisdb
\ \___|__ |_|_ || | \ __/|_ | http://pastebin.com/yGmGiDQX
\________ /_____ \_||____|_ /____ /_| [email protected]
20160515 \/ 1527 \/ \/ \/
alias CLIRef.txt='curl -s "http://pastebin.com/raw/yGmGiDQX" | less -i'
| --- | |
| - hosts: all | |
| gather_facts: no | |
| tasks: | |
| - shell: ls ratelimit.log* | |
| args: | |
| chdir: /var/named/var/log/named | |
| register: ratelimitlogs |
| --- | |
| - hosts: all | |
| gather_facts: no | |
| tasks: | |
| - shell: ls ratelimit.log* | |
| args: | |
| chdir: /var/named/var/log/named | |
| register: ratelimitlogs |
| ==> default: Configuring and enabling network interfaces... | |
| INFO ssh: SSH is ready! | |
| INFO ssh: Execute: (sudo=false) | |
| ERROR warden: Error occurred: Vagrant attempted to execute the capability 'configure_networks' | |
| on the detect guest OS 'linux', but the guest doesn't | |
| support that capability. This capability is required for your | |
| configuration of Vagrant. Please either reconfigure Vagrant to | |
| avoid this capability or fix the issue by creating the capability. | |
| INFO warden: Beginning recovery process... | |
| INFO warden: Calling recover: #<Vagrant::Action::Builtin::HandleForwardedPortCollisions:0x000000024ff478> |