1. I remember seeing a note in one of the recent release notes asserting a
feature of tar or cpio extraction of vos dump data (sorry, I don't
remember which format, or which post 3.4a AFS release notes).
2. Some of the steps I took, when moving bits from AFS to NFS here at
PARC:
- setup a test area in which to pour the data
- create map of AFS groups to NFS groups, matching memberships as much as
possible, given group membership limits in NFS (~16 groups per
user, one group owner - unless you want to map to POSIX ACLs)
- decide default group mapping for files not mappable in step above
- configure an AFS client with ~500 MB RAM
- switch the AFS cache to RAM
- enable root trusted mount of target NFS filesystem(s) by AFS client
pouring machine
- run Perl script to store all AFS ACLs and mode bits
- check ACLs for strange cases, like negative ACL entries
- run Perl script to store all AFS mount points to volume mappings
- make sure script walks through all involved volumes
- check for mount point loops...and delete them or replace them with
symlinks before pouring
- pour data with "tar cvfp - foo bar | (cd dest/ && tar xvfp -)"
- map ACLs to some appropriate set of file and directory modes. I picked
the mappings in the pair of hashes below. This was appropriate for
our web data, use what works for your environment.
my %dirmodetable = (
"rl" => 0555,
"rlidwk" => 0775,
"rlidwka" => 0775,
);
my %filemodetable = (
"rl" => 0444,
"rlidwk" => 0664,
"rlidwka" => 0664,
);
- run permission fixer Perl script: does chmod() and chown() based on
stored AFS ACLs and ACL to permission mode mappings.
- check results, debug scripts
- delete everything in the target area, then repeat the test
- when the results are correct, remove writable mount points for the
volumes to be poured, then pour for real
- keep the old data around for a few weeks, or through a full backup
cycle, for disaster recovery
- open beer can, drink beer, put can in recycling bin, repeat
-kaf
--
| Keith Farrar | Xerox PARC CSNS | Palo Alto, CA | 650-812-4292 |
| DOMAIN: [EMAIL PROTECTED] | |