?
Solved

RHEL 6.5 Workstation, NFS Server Setup, Cannot mount drive from another workstaiton.

Posted on 2014-02-10
12
Medium Priority
?
871 Views
Last Modified: 2014-02-11
Here is the scenario. I have two RHEL 6.5 Workstations. Workstation1 has a partition that needs to be mounted on Workstation2.

The following is what I did to configure Workstation1 to be able to export the /share partion.
1. I set up the /etc/export file on Workstation1 to read
/share IPWorkstation2(rw)
2. ran exportfs -ra to make the changes in th export file take place
3. Made sure that NFS Service was running and retarted the service and the machine and checked it again.
4. No entries were made to the host.allow or deny files so NFS should let Worstation2 through.
5. On Workstation2 I created the /share mount point.
6. From Workstation2 I ran mount IPWorkstation1:/share /share

NFS times out like it cannot reach Workstation1. Workstation1 can be pinged by name or IP. I can ssh into Workstation1 from Worstation2, so connectivity does not seem to be the issue.

I have looked at the file /proc/fs/nfs/exports and there is no info in that file. This may be the problem, but this file is supposed to populate automatically when I run exportfs -ra and/or a reboot happens and Linux sees a change to the /etc/exports file.

Anyway I have exhausted all Google searches and spent too much time, so reaching out for some ideas. I must be missing something very simple...
--------------------------------------------------------------------------------
0
Comment
Question by:capperdog13
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
12 Comments
 
LVL 35

Expert Comment

by:Seth Simmons
ID: 39849134
if you do exportfs -av does it say it is exporting /share ?
if you do netstat -at | grep nfs does it show nfs as listening?
0
 
LVL 21

Expert Comment

by:Mazdajai
ID: 39849256
Have you ever try to open the filter to * to begin with? What errors are you getting?

/share *(rw)

Open in new window

0
 
LVL 13

Expert Comment

by:Sandy
ID: 39849320
#service rpcbind restart
#service nfs restart

#service iptables status
#sestatus

#showmount -e localhost

#netstat -alnp | grep 111
#netstat -alnp | grep 2049

Please paste output of these commands.

TY/SA
0
WordPress Tutorial 2: Terminology

An important part of learning any new piece of software is understanding the terminology it uses. Thankfully WordPress uses fairly simple names for everything that make it easy to start using the software.

 

Author Comment

by:capperdog13
ID: 39850073
if you do exportfs -av does it say it is exporting /share ?
if you do netstat -at | grep nfs does it show nfs as listening?

Yes - Says it is exporting IPWorkstaion2:/share
Yes - tcp 0 0 *.nfs *:* LISTEN
0
 

Author Comment

by:capperdog13
ID: 39850090
Have you ever try to open the filter to * to begin with? What errors are you getting?


/share *(rw)


Are you talking about editing the /etc/exports with this?
0
 

Author Comment

by:capperdog13
ID: 39850119
# service rpcbind restart
Stopping rpcbind:                                          [  OK  ]
Starting rpcbind:                                          [  OK  ]

# service iptables status
Table: filter
Chain INPUT (policy ACCEPT)
num  target     prot opt source               destination        
1    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
2    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          
3    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
4    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:22
5    REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-host-prohibited

Chain FORWARD (policy ACCEPT)
num  target     prot opt source               destination        
1    REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-host-prohibited

Chain OUTPUT (policy ACCEPT)
num  target     prot opt source               destination        

# sestatus
SELinux status:                 enabled
SELinuxfs mount:                /selinux
Current mode:                   enforcing
Mode from config file:          enforcing
Policy version:                 24
Policy from config file:        targeted

# showmount -e localhost
clnt_create: RPC: Program not registered

# netstat -alnp | grep 111
tcp        0      0 0.0.0.0:111                 0.0.0.0:*                   LISTEN      6586/rpcbind        
tcp        0      0 :::111                      :::*                        LISTEN      6586/rpcbind        
udp        0      0 0.0.0.0:111                 0.0.0.0:*                               6586/rpcbind        
udp        0      0 :::111                      :::*                                    6586/rpcbind        

# netstat -alnp | grep 2049
tcp        0      0 0.0.0.0:2049                0.0.0.0:*                   LISTEN      -                  
tcp        0      0 :::2049                     :::*                        LISTEN      -                  
udp        0      0 0.0.0.0:2049                0.0.0.0:*                               -                  
udp        0      0 :::2049                     :::*                                    -                  
unix  2      [ ACC ]     STREAM     LISTENING     20492  2943/seahorse-daemo /tmp/orbit-root/linc-b7f-0-4eecf742e9cbd
unix  2      [ ACC ]     STREAM     LISTENING     22049  2972/nautilus       /tmp/orbit-root/linc-b9c-0-2214c727672b7
unix  3      [ ]         STREAM     CONNECTED     20495  2943/seahorse-daemo /tmp/orbit-root/linc-b7f-0-4eecf742e9cbd
unix  3      [ ]         STREAM     CONNECTED     20494  2933/gconfd-2      
unix  3      [ ]         STREAM     CONNECTED     20491  2933/gconfd-2       /tmp/orbit-root/linc-b75-0-582a8fe4f2252
unix  3      [ ]         STREAM     CONNECTED     20490  2943/seahorse-daemo
0
 
LVL 13

Expert Comment

by:Sandy
ID: 39850140
Just for testing if you can ignore security for some time use below

#service iptables stop
#setenfore 0

Then try to mount it on another node.

TY/SA
0
 

Author Comment

by:capperdog13
ID: 39850171
Bingo!

Mounted immediately. Can you give brief description of what we just did and how to edit the IPTables to allow the mounting?
0
 
LVL 13

Accepted Solution

by:
Sandy earned 2000 total points
ID: 39850173
You need to add a rule to allow 2049 and 111 port connections in your firewall..

TY/SA
0
 

Author Comment

by:capperdog13
ID: 39850185
TY SA! Will have a few happy campers today.
0
 
LVL 13

Expert Comment

by:Sandy
ID: 39850187
0
 

Author Closing Comment

by:capperdog13
ID: 39850198
Would be nice to have an admin of this calibre to work with. I spent 13 years in Windows and was made a Linux/Unix admin out of necessity. At times just Google and EE at the helm here. Can be very overwhelming at times. Thanks SA!
0

Featured Post

Basic Security of Your VPC

So, you’ve got this shiny new VPC and a fancy new application configured on your EC2 servers ready to go. This application is only accessible from your computer, which is great for security, but you need your users to be able to access it! So, what’s the easiest way to do this?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses
Course of the Month10 days, 8 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question