Solved

Question in Linux home directory

Posted on 2013-06-17
9
507 Views
Last Modified: 2013-06-20
I need to perform this tasks on 10 Servers


remove the account of user A ( h95922) .

DO NOT REMOVE THE HOME DIRECTORY
Move the home directory for h95922 to the home directory of User_B , and make User_B  of the files.  Also, do a find from the / directory of the systems
and search for any files owned by h95922 and change the ownership to User_B .  


the commands i am thinking to use are :



# userdel h95922
# mv /home/h95922 /home/User_B
# cd /home/user_B/h95922
# chown -R user_B /home/h95922


is this correct so far ?




Also, do a find from the / directory of the systems
and search for any files owned by h95922 and change the ownership to User_B .  

( any help on this would be appreciated)
0
Comment
Question by:c_hockland
9 Comments
 
LVL 31

Accepted Solution

by:
farzanj earned 500 total points
ID: 39253725
Yes.

find / -user h95922 -exec chown User_B {} \;
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39253816
This sounds like a homework. Is it?
0
 
LVL 37

Expert Comment

by:Gerwin Jansen
ID: 39253870
@c_hockland - Answer of farzanj is correct but: you could have tested all the commands you listed on a testuser / testdirectory yourself so why the question?
0
 
LVL 34

Expert Comment

by:Seth Simmons
ID: 39253904
the fourth line is incorrect because the second line you have User_b for destination folder so that command wouldn't work.  it would be chown -R user_b /home/user_b/h95922

farzanj's find command wouldn't work since you are specifying the user though your first command you are removing the user account; you would instead specify -uid <uid> since the user doesn't exist and the files would only show uid/gid (or group) in a directory listing (example - if h95922 uid is 600, use find / -uid 600 and your other parameters/expressions)
0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 37

Expert Comment

by:Gerwin Jansen
ID: 39253931
>> the fourth line is incorrect
No, it is correct, the h95922 folder is moved to a subfolder of user_B and the chown is recursive so subfolder h95922 has owner user_B after the chown command.
0
 
LVL 34

Expert Comment

by:Seth Simmons
ID: 39254002
i understand it's recursive

read what you just wrote...the h95922 folder is moved to a subfolder of user_B, I understand that.  now look at specified path in that command - /home/h95922

with h95922 being moved under user_b then h95922 wouldn't be directly under /home, now would it?  the path would be /home/user_b/h95922 so the correct 4th command would be chown -R /home/user_b which would, of course, trickle down through the h95922 folder within; or just chown -R /home/user_b/h95922 for just that folder that was moved
0
 
LVL 37

Expert Comment

by:Gerwin Jansen
ID: 39254139
Yup, the path is wrong ;)

Still: OP could have tested all this before asking the question...
0
 

Author Comment

by:c_hockland
ID: 39264655
these are production servers .
Unfortunately i cannot create test users and test these commands.
0
 
LVL 28

Expert Comment

by:serialband
ID: 39264791
You could use virtualbox or xen to make test servers.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
linux crontab output 3 69
Linux Scripting 3 103
php ssh2_scp_send 1 49
nagios alerts 3 33
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now