<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NFS export rule for Kickstart in ONTAP Hardware</title>
    <link>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51110#M3601</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;rw=@nfs-all-rw,nosuid exports to specified group &lt;STRONG&gt;only&lt;/STRONG&gt;; all other clients are denied access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried ro,rw=@nfs-all-rw,nosuid - effectively giving default read-only to everyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Jan 2011 07:39:28 GMT</pubDate>
    <dc:creator>aborzenkov</dc:creator>
    <dc:date>2011-01-15T07:39:28Z</dc:date>
    <item>
      <title>NFS export rule for Kickstart</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51106#M3600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to migrate our CentOS Kickstart environment from a Solaris server to a NetApp FAS 2040 running ONTAP 7.3.2, but am not having much luck.&amp;nbsp; Specifically, I'm getting stuck on finding the /etc/exports rule that is needed to allow anonymous read-only access from any client and to allow read/write access from a specific group of clients (a netgroup) for the /vol/public volume (which contains the Kickstart configuration file).&amp;nbsp; I've tried a couple of different combinations so far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/vol/public&amp;nbsp;&amp;nbsp;&amp;nbsp; -sec=none,ro,nosuid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outcome of this is that a Kickstart works, but the files cannot be edited (as expected).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/vol/public&amp;nbsp;&amp;nbsp;&amp;nbsp; -sec=sys,rw=@nfs-all-rw,nosuid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outcome of this is that systems in nfs-all-rw can edit the files, but a Kickstart does not work.&amp;nbsp; Note that even for systems in nfs-all-rw, a Kickstart results in permission denied (not expected).&amp;nbsp; Systems not in nfs-all-rw also fail to Kickstart (as expected).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/vol/public&amp;nbsp;&amp;nbsp;&amp;nbsp; -sec=sys,rw=@nfs-all-rw,nosuid,sec=none,ro,nosuid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was an attempt to combine the two rules.&amp;nbsp; As I understood from man na_exports, if multiple security flavors are&amp;nbsp; specified then that security flavor is used for all following options&amp;nbsp; until the next security flavor is specified.&amp;nbsp; The Kickstart environment gives pretty lousy debugging information (it just says permission denied), but a packet capture of the session shows that the NFS export gets mounted on the client, but then the NetApp filer denies access to the file (130.127.48.95 is a member of nfs-all-rw, 130.127.48.251 is the NetApp filer):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0.000000 130.127.48.95 -&amp;gt; 130.127.48.251 TCP 36963 &amp;gt; sunrpc [SYN] Seq=0 Win=5840 Len=0 MSS=1460 TSV=1606691 TSER=0 WS=7&lt;BR /&gt;&amp;nbsp; 0.000049 130.127.48.251 -&amp;gt; 130.127.48.95 TCP sunrpc &amp;gt; 36963 [SYN, ACK] Seq=0 Ack=1 Win=8760 Len=0 MSS=1460 WS=0 TSV=1948604 TSER=1606691&lt;BR /&gt;&amp;nbsp; 0.000097 130.127.48.95 -&amp;gt; 130.127.48.251 TCP 36963 &amp;gt; sunrpc [ACK] Seq=1 Ack=1 Win=5888 Len=0 TSV=1606691 TSER=1948604&lt;BR /&gt;&amp;nbsp; 0.000147 130.127.48.95 -&amp;gt; 130.127.48.251 Portmap V2 DUMP Call&lt;BR /&gt;&amp;nbsp; 0.000247 130.127.48.251 -&amp;gt; 130.127.48.95 Portmap V2 DUMP Reply (Call In 4)&lt;BR /&gt;&amp;nbsp; 0.000296 130.127.48.95 -&amp;gt; 130.127.48.251 TCP 36963 &amp;gt; sunrpc [ACK] Seq=45 Ack=553 Win=7040 Len=0 TSV=1606692 TSER=1948604&lt;BR /&gt;&amp;nbsp; 0.000302 130.127.48.95 -&amp;gt; 130.127.48.251 TCP 36963 &amp;gt; sunrpc [FIN, ACK] Seq=45 Ack=553 Win=7040 Len=0 TSV=1606692 TSER=1948604&lt;BR /&gt;&amp;nbsp; 0.000307 130.127.48.251 -&amp;gt; 130.127.48.95 TCP sunrpc &amp;gt; 36963 [ACK] Seq=553 Ack=46 Win=8760 Len=0 TSV=1948604 TSER=1606692&lt;BR /&gt;&amp;nbsp; 0.000344 130.127.48.95 -&amp;gt; 130.127.48.251 MOUNT V3 MNT Call /vol/public/kickstart/config&lt;BR /&gt;&amp;nbsp; 0.000347 130.127.48.251 -&amp;gt; 130.127.48.95 TCP sunrpc &amp;gt; 36963 [FIN, ACK] Seq=553 Ack=46 Win=8760 Len=0 TSV=1948604 TSER=1606692&lt;BR /&gt;&amp;nbsp; 0.000396 130.127.48.95 -&amp;gt; 130.127.48.251 TCP 36963 &amp;gt; sunrpc [ACK] Seq=46 Ack=554 Win=7040 Len=0 TSV=1606692 TSER=1948604&lt;BR /&gt;&amp;nbsp; 0.000546 130.127.48.251 -&amp;gt; 130.127.48.95 MOUNT V3 MNT Reply (Call In 9)&lt;BR /&gt;&amp;nbsp; 0.000646 130.127.48.95 -&amp;gt; 130.127.48.251 Portmap V2 GETPORT Call NFS(100003) V:3 UDP&lt;BR /&gt;&amp;nbsp; 0.000651 130.127.48.251 -&amp;gt; 130.127.48.95 Portmap V2 GETPORT Reply (Call In 13) Port:2049&lt;BR /&gt;&amp;nbsp; 0.000845 130.127.48.95 -&amp;gt; 130.127.48.251 NFS V3 NULL Call&lt;BR /&gt;&amp;nbsp; 0.000851 130.127.48.251 -&amp;gt; 130.127.48.95 NFS V3 NULL Reply (Call In 15)&lt;BR /&gt;&amp;nbsp; 0.000945 130.127.48.95 -&amp;gt; 130.127.48.251 NFSACL V3 NULL Call&lt;BR /&gt;&amp;nbsp; 0.000951 130.127.48.251 -&amp;gt; 130.127.48.95 NFSACL V3 NULL Reply (Call In 17)&lt;BR /&gt;&amp;nbsp; 0.001045 130.127.48.95 -&amp;gt; 130.127.48.251 NFS V3 FSINFO Call, FH:0x397d4ea8&lt;BR /&gt;&amp;nbsp; 0.001095 130.127.48.251 -&amp;gt; 130.127.48.95 NFS V3 FSINFO Reply (Call In 19)&lt;BR /&gt;&amp;nbsp; 0.001145 130.127.48.95 -&amp;gt; 130.127.48.251 NFS V3 FSINFO Call, FH:0x397d4ea8&lt;BR /&gt;&amp;nbsp; 0.001245 130.127.48.251 -&amp;gt; 130.127.48.95 NFS V3 FSINFO Reply (Call In 21)&lt;BR /&gt;&amp;nbsp; 0.001295 130.127.48.95 -&amp;gt; 130.127.48.251 NFS V3 ACCESS Call, FH:0x397d4ea8&lt;BR /&gt;&amp;nbsp; 0.001345 130.127.48.251 -&amp;gt; 130.127.48.95 NFS V3 ACCESS Reply (Call In 23) Error:NFS3ERR_ACCES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This boggles me, since permissions on the file are 664 and permissions on all directories leading up to the file are 775.&amp;nbsp; Any idea what could be wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For what it's worth, the Solaris NFS server that we're trying to migrate away from uses sec=sys,ro as NFS export options.&amp;nbsp; Obviously that doesn't allow us to modify the files over NFS, so we just edit the files on the Solaris system itself; unfortunately we don't have that capability with the files stored on a NetApp filer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 07:02:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51106#M3600</guid>
      <dc:creator>duckwos</dc:creator>
      <dc:date>2025-06-05T07:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: NFS export rule for Kickstart</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51110#M3601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;rw=@nfs-all-rw,nosuid exports to specified group &lt;STRONG&gt;only&lt;/STRONG&gt;; all other clients are denied access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried ro,rw=@nfs-all-rw,nosuid - effectively giving default read-only to everyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 07:39:28 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51110#M3601</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2011-01-15T07:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: NFS export rule for Kickstart</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51115#M3602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sometimes you just need a second pair of eyes.&amp;nbsp; That does in fact work, although sec=sys,ro is a little bit less secure than sec=anon,ro.&amp;nbsp; I don't think it will matter in this case since we're not dealing with sensitive data.&amp;nbsp; Thanks!&amp;nbsp; (And sorry for the long delay in responding).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 13:22:58 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/NFS-export-rule-for-Kickstart/m-p/51115#M3602</guid>
      <dc:creator>duckwos</dc:creator>
      <dc:date>2011-01-28T13:22:58Z</dc:date>
    </item>
  </channel>
</rss>

