Solved

How to tell what is running NIS on network.

Posted on 2011-03-21
4
348 Views
Last Modified: 2012-05-11
I need to find out how many boxes on my network is running NIS no matter what form. Is there a command I can use to give me that information. I want to be able to sit at one machine and get my answer without logging into all of the machines. I have a little less than 600 machines to count for.

I am new to linux so please give answers like you are talking to a newbie.. thanks...
0
Comment
Question by:Bryant
  • 2
4 Comments
 
LVL 31

Expert Comment

by:farzanj
ID: 35181627
You need to issue the following commands.  You may have to ssh to all machines; depending upon the information you need.
Consider the following commands.

ypcat
yppoll

yppoll [ -h host ] [ -d domain ] mapname
ypcat [ -kt ] [ -d domain ] [ -h hostname ] mapname
ypcat -x

You may have to check /etc/nsswitch.conf, especially the lines that contain nis

You can man on these command.  If you are on Solaris, you may be using nis plus which is very different.

To being with you may have to get to a few suspected hosts and do
grep nis /etc/nsswitch

This should give you an idea.

You also may have authconfig utility that tell a little more details

You will have to do so research and read the man pages by issuing this command
man <command name>
0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 35193109
NIS is a stateless protocol, thus there are no "connections" which you could query from the server side.

You could try to capture/monitor the NIS network traffic from and to your server using something like iptables or wireshark.

wmp

0
 

Accepted Solution

by:
Bryant earned 0 total points
ID: 35268264
Thanks for your help. I had someone write a script that logged in a out of every machine using a domain account that dumped the results into a file. I was trying to avoid logging into every machine that is why I didnt use farzanj answer...
0
 

Author Closing Comment

by:Bryant
ID: 35312676
i have no idea how they wrote the script but it was a  team of 3 designers.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Using 'screen' for session sharing, The Simple Edition Step 1: user starts session with command: screen Step 2: other user (logged in with same user account) connects with command: screen -x Done. Both users are connected to the same CLI sessio…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now