Issues installing inotify-tools on RedHat Linux

I wish to install inotify-tools-3.20.1-2.4.x86_64.rpm on Linux and fire inotifywait command.

Initially i was looking for "inotify-tools-3.xx.tar.gz" as instructed here http://jensd.be/248/linux/use-inotify-tools-on-centos-7-or-rhel-7-to-watch-files-and-directories-for-events

I have restrictions for download that package and hence I got the rpm from RPM resource inotify-tools

I understand that this is for Suse Linux and not RedHat as was looking for 3.2x version or above.

Installation give me the below error:

yum install inotify-tools-3.20.1-2.4.x86_64.rpm
Loaded plugins: langpacks
Examining inotify-tools-3.20.1-2.4.x86_64.rpm: inotify-tools-3.20.1-2.4.x86_64
Marking inotify-tools-3.20.1-2.4.x86_64.rpm to be installed
Resolving Dependencies
--> Running transaction check
---> Package inotify-tools.x86_64 0:3.20.1-2.4 will be installed
--> Processing Dependency: libinotifytools.so.0()(64bit) for package: inotify-tools-3.20.1-2.4.x86_64
--> Finished Dependency Resolution
Error: Package: inotify-tools-3.20.1-2.4.x86_64 (/inotify-tools-3.20.1-2.4.x86_64)
           Requires: libinotifytools.so.0()(64bit)
           Available: inotify-tools-3.14-8.el7.x86_64 (oel-7-latest)
               libinotifytools.so.0()(64bit)
 You could try using --skip-broken to work around the problem
** Found 1 pre-existing rpmdb problem(s), 'yum check' output follows:
2:microcode_ctl-2.1-47.5.0.3.el7_6.x86_64 has missing requires of kernel
uname -a
Linux mymach 4.14.35-1844.4.5.el7uek.x86_64 #2 SMP Tue Apr 9 00:29:47 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux

Below is what i did to try to resolve the error but it did not help.

yum clean all
yum reinstall glibc glibc-common libgcc
yum upgrade

And then:

yum install yum-utils
package-cleanup --problems
package-cleanup --dupes

Can you please suggest any solution to the problem ?

Can you just download the source from https://github.com/rvoicilas/inotify-tools/archive/v3.14.tar.gz and build it yourself?

This worked fine for me:

cd /tmp
git clone https://github.com/rvoicilas/inotify-tools.git
cd inotify-tools
./autogen.sh
./configure && make && make install
1 Like

Don't have priviledges. I got to do this in offline mode. Please suggest.

No, I have no suggestions or work-a-rounds for anyone who does not have access rights to do things.

You should discuss that (security and access rights) with your boss at work.

I have root access however, mostly banks are not open to github (external URLs) for security reasons. I will discuss with the security if that is not a NORM.

Are you trying to install centos / redhat packages on oracle enterprise linux ?
I see UEK kernel and oel packages, while you are following centos / redhat tutorial ?

If you are in offline mode, you can always install the exact same version of distribution in virtualbox on your PC.
Download the packages and dependencies via yum.
Copy and install them on the server in question.

Other then that a simple squid proxy for couple of minutes should not be a security breach of any kind.
You can turn off the squid proxy and power off it after the action is completed.
There is also an option to tunnel via ssh.

Hope that helps
Regards
Peasant.

No... this is not correct per IT security policy:

An employee cannot bypass security using a proxy at a major bank as an employee to bypass access controls set up by the bank without being in violation of internal bank policies.

mohtashims must follow his bank's IT security policies and not "turn on proxies" or do anything to bypass security without working with his supervisor and his IT security team to insure he has his organizations permission to do so.

When "you" are a system admin on a platform, you must follow company policy. If mohtashims does not have network access; he also may not have permission to install outside software.

I have worked as a system admin and also in IT security at a number of banks and other organizations with a similar risk management profile. Most of these organizations do not permit employees to go to the web, download and install tools from the Internet. This is why they block developers and system admins from access.

We are not here at unix.com to advise anyone to break their company IT security policies, directly or indirectly. We are here to advise them NOT to break their company rules and policies.

mohtashims should go to his IT security staff and his supervisor and find a way under banking IT security policies to install the software he wishes to install at his work.

I did not mean not talking to anybody in security department and doing stuff in DIY mode :slight_smile:
A simple proxy or tunnel for a one time operation should not classify as a security breach if communicated properly.

Regards
Peasant.

Hi Peasant,

Thanks for clarifying.

Yes, you might not have meant for the OP to break IT security policy; but that is not what you typed in your reply, so hence my post. I must insure people here at not advising users to break their organizations IT security policy, either accidentally, indirectly, or on purpose.

As the forum admin, your reply read to me like you were advising the original poster to use a proxy briefly to download software from the Internet. You did not mention anything about coordinating or asking permission from his IT security manager or his supervisor at his bank.

We are not here to advise people who work at banks and other organizations (with high risk management profiles and tight access controls in place) how to bypass their internal IT security.

mohtashims can easily discuss his options with his management and IT security team. I am sure they have their own policies on how to deal with this; and they can help him, as they should.

I'm closing this thread before others start accidentally or purposely advising mohtashims how to breach his bank's IT security access controls and policies to download software from the Internet at his work.

It is my job here to make these calls since I'm the forum admin and have the overall responsibility to insure we are not assisting people to violate company policies.

The correct answer to mohtashims is "go talk to your boss and IT security team".

Thanks for understanding.