Looks like I lied, I must not have saved my config, or got lucky with a timestamp. Even using the right format I can't reproduce the success. It seems that anytime I use a dateFormat other then the default the interval is ignored and it sends many requests a second to the server.
Looking at the source the default is yyyyMMddHHmmss.'Z', I tried a few variations; including yyyyMMddHHmmss.S'Z' but none appear to work. Could there be a problem with lastSuccessfulSync not getting the proper format? I need to find a way to get this, or normal sync mode to work. I could start it in async, let it run x # of seconds, then kill it with lsc-agent, but that seems sorta hackerish. -Joel On Tue, Aug 7, 2012 at 1:26 PM, dunkan <[email protected]> wrote: > Turns out this was user error, I had: > > <dateFormat>yyyyMMddHHmmss.'0Z'</dateFormat> > > instead of > <dateFormat>yyyyMMddHHmmss.SZ</dateFormat> > > turns out that doesn't work very well, and breaks the world. > > Async is working very well now, thank you for the support! > > -Joel > > On Mon, Aug 6, 2012 at 11:51 PM, Sébastien Bahloul < > [email protected]> wrote: > >> Hi Dunkan, >> >> Yes you are completely right, that's why you can customize it. Look at >> the following page : >> >> >> http://lsc-project.org/wiki/documentation/2.0/configuration/service/sourceldap >> >> and set the "*dateFormat" value to the following setting (not tested) :* >> * >> * >> *yyyyMMddHHmmss.S'Z * >> >> The pattern to use is documented in standard Java documentation for >> SimpleDateFormat class: >> http://docs.oracle.com/javase/1.4.2/docs/api/java/text/SimpleDateFormat.html >> >> >> Regards, >> >> -- >> Sebastien BAHLOUL >> IAM / Security specialist >> Ldap Synchronization Connector : http://lsc-project.org >> Blog : http://sbahloul.wordpress.com/ >> >> >> >> 2012/8/7 dunkan <[email protected]> >> >>> Sorry to be spammy. From looking at tcpdumps I see it is checking the >>> modifytimestamp. It looks like the problem is the value is stored with a >>> decimal in the directory, but not in the filter. >>> >>> For example, it is looking for "(modifytimestamp>=20110807030345Z)", >>> and never gets any results. If I change that >>> to "(modifytimestamp>=20110807030345.0Z)" it returns the entries that are >>> modified. >>> >>> Thanks, >>> Joel >>> >>> >>> On Mon, Aug 6, 2012 at 9:00 PM, dunkan <[email protected]> wrote: >>> >>>> It looks like FORCE, with forcevalues will always put what I need, so >>>> that part is working out now. >>>> >>>> I'm not sure about the async job though. How does it determine that it >>>> needs to update? The logs give the indication that it is searching every 5 >>>> seconds, but changes don't show up. If I stop and re-run it again they are >>>> always picked up. >>>> >>>> -Joel >>>> >>>> >>>> On Mon, Aug 6, 2012 at 7:02 PM, dunkan <[email protected]> wrote: >>>> >>>>> Hey there, >>>>> >>>>> I am working on one way syncing AD to OpenLDAP. I am seeing a >>>>> difference in operation between using lsc in async vs sync mode. >>>>> >>>>> If I start lsc like so: >>>>> >>>>> # bin/lsc -f etc -a all >>>>> >>>>> users are read from active directory using my filter correctly, and >>>>> attributes are updated as I would expect. >>>>> >>>>> If I start lsc in async like so: >>>>> >>>>> # bin/lsc -f etc -s all >>>>> >>>>> lsc attempts to create users every time, and I will get a failure to >>>>> add as the entry already exists. >>>>> >>>>> From what I have read this sort of behavior shouldn't change using >>>>> sync vs async, is that correct? >>>>> It seems like an easy work around for now is to just use async and >>>>> trigger an event. >>>>> >>>>> >>>>> My second issue I believe is configuration. I have been using >>>>> http://lsc-project.org/wiki/documentation/2.0/configuration/syncoptions as >>>>> my guide for this. >>>>> >>>>> AD has a different objectclass than OpenLDAP. >>>>> >>>>> So in AD the objectClass will be OrgainzationalPerson, person >>>>> In OpenLDAP it is Account, PossixAccount. >>>>> >>>>> I want the values in OpenLDAP to always be the OpenLDAP values, >>>>> leave existing entries alone, and create new users with those values. >>>>> >>>>> I thought the way to do this would be to set policy to FORCE and >>>>> defaultvalues to my requested values. >>>>> This creates a new user ok, but existing users get trampled. >>>>> >>>>> If I set it to KEEP and defaultvalues to the requested values, >>>>> existing users don't get messed with, but new users use the AD >>>>> objectclass. >>>>> >>>>> I tried using forcevalues and createvalues with KEEP/FORCE as well, >>>>> but am not having any luck getting the behavior I am looking for. >>>>> >>>>> Any tips? >>>>> >>>>> Thanks, >>>>> Joel >>>>> >>>>> >>>>> >>>> >>> >>> _______________________________________________________________ >>> Ldap Synchronization Connector (LSC) - http://lsc-project.org >>> >>> lsc-users mailing list >>> [email protected] >>> http://lists.lsc-project.org/listinfo/lsc-users >>> >>> >> >
_______________________________________________________________ Ldap Synchronization Connector (LSC) - http://lsc-project.org lsc-users mailing list [email protected] http://lists.lsc-project.org/listinfo/lsc-users

