Sorry to be spammy. From looking at tcpdumps I see it is checking the
modifytimestamp.  It looks like the problem is the value is stored with a
decimal in the directory, but not in the filter.

For example, it is looking for  "(modifytimestamp>=20110807030345Z)", and
never gets any results. If I change that
to  "(modifytimestamp>=20110807030345.0Z)" it returns the entries that are
modified.

Thanks,
Joel

On Mon, Aug 6, 2012 at 9:00 PM, dunkan <[email protected]> wrote:

> It looks like FORCE, with forcevalues will always put what I need, so that
> part is working out now.
>
> I'm not sure about the async job though. How does it determine that it
> needs to update?  The logs give the indication that it is searching every 5
> seconds, but changes don't show up. If I stop and re-run it again they are
> always picked up.
>
> -Joel
>
>
> On Mon, Aug 6, 2012 at 7:02 PM, dunkan <[email protected]> wrote:
>
>> Hey there,
>>
>> I am working on one way syncing AD to OpenLDAP. I am seeing a difference
>> in operation between using lsc in async vs sync mode.
>>
>> If I start lsc like so:
>>
>> # bin/lsc -f etc -a all
>>
>> users are read from active directory using my filter correctly, and
>> attributes are updated as I would expect.
>>
>> If I start lsc in async like so:
>>
>> # bin/lsc -f etc -s all
>>
>> lsc attempts to create users every time, and I will get a failure to add
>> as the entry already exists.
>>
>> From what I have read this sort of behavior shouldn't change using sync
>> vs async, is that correct?
>> It seems like an easy work around for now is to just use async and
>> trigger an event.
>>
>>
>> My second issue I believe is configuration. I have been using
>> http://lsc-project.org/wiki/documentation/2.0/configuration/syncoptions as
>> my guide for this.
>>
>> AD has a different objectclass than OpenLDAP.
>>
>> So in AD the objectClass will be OrgainzationalPerson, person
>> In OpenLDAP it is Account, PossixAccount.
>>
>>  I want the values in OpenLDAP to always be the OpenLDAP values, leave
>> existing entries alone, and create new users with those values.
>>
>> I thought the way to do this would be to set policy to FORCE and
>> defaultvalues to my requested values.
>> This creates a new user ok, but existing users get trampled.
>>
>> If I set it to KEEP and defaultvalues to the requested values, existing
>> users don't get messed with, but new users use the AD objectclass.
>>
>> I tried using forcevalues and createvalues with KEEP/FORCE as well, but
>> am not having any luck getting the behavior I am looking for.
>>
>> Any tips?
>>
>> Thanks,
>> Joel
>>
>>
>>
>
_______________________________________________________________
Ldap Synchronization Connector (LSC) - http://lsc-project.org

lsc-users mailing list
[email protected]
http://lists.lsc-project.org/listinfo/lsc-users

Reply via email to