Questions and Answers
Bjorn Satdeva
Before we go to the questions in this issue, let's look
briefly at
a number of upcoming events of interest to system administrators.
The most important of these is the USENIX LISA VI conference,
which
will take place in Long Beach, CA, October 19th through
23rd, 1992.
If your budget will allow you only one conference trip
for this year,
this is the one.
The chair of the LISA VI conference is Trent Hein (trent@xor.com)
from XOR Computer Systems. Steve Simmons (scs@iti.org)
is
handling the alternate tracks, and Arch Mott (arch@pei.wpd.sgi.com)
is coordinating the BOFs. There will also be a vendor
display. For
information about this, contact John Donnelly (johnd@alumni.cs.colorado.edu).
In previous years LISA has targeted large installations.
This year,
however, the scope of the conference is being extended
to include
system administrators from all UNIX sites. To get more
information,
please contact Trent Hein or the USENIX Conference office
at (714)
588-8649. You can also reach the USENIX Conference Coordinator,
Judith
DesHarnais, by e-mail at judy@usenix.org.
This year, for the first time, there will be two system
administration
conferences. The other conference (actually the first,
chronologically),
is the 1992 World Conference on System Administration
and Security,
scheduled for July 20 - 23, in Washington, DC. Since
this is a
new conference, I have very little information about
it; however,
my impression is that it is targeted toward government
installations.
For more information, contact the conference chair,
Alan Paller (paller@fedunix.org).
A third conference is the USENIX UNIX Security Symposium,
which will
take place in Baltimore, September 14 - 16. The chair
is Edward
DeHart from CERT (Computer Emergency Response Team),
who can be reached
at (412) 268-6179 or by e-mail at ecd@cert.sei.cmu.edu.
Information
can also be obtained from the USENIX Conference Office
mentioned earlier.
Finally, there will be a LISA VII conference next year,
to be chaired
by yours truly. Ideas and requests for this conference
can be e-mailed
to bjorn@sysadmin.com
And now to something completely different...
Until recently we have been using Suns exclusively.
Now,
however, other machines have been introduced. This is
a problem, as
we rely heavily on NIS. Do you know of any public implementation
of
NIS?
To my knowledge, no such thing exists. Moreover, my
experience
with NIS's from vendors other than Sun Microsystems
suggests that
they do not work as well as could be desired. I recommend
that, with
the exception of the password file, you use rdist to
distribute
the files now serviced through NIS. Depending on how
you have set
up your site, this could generate less network traffic
than NIS, and
it will eliminate some of the less desirable side effects
of NIS.
rdist is a program that distributes files to remote
systems.
It differs from other file distribution programs, such
as rcp,
primarily in that it is driven by a control file and
that it updates
the remote file only if the file is out of date. When
you use rdist
to distribute system configuration files, local copies
of the file
are kept on each system. This eliminates network traffic
for lookups
and provides you with an easy way of ensuring that the
dreaded plus
sign is not in hosts.equiv. Of course, if you change
the system
configuration files frequently, the network traffic
required for updating
these files could rise above the level required to run
NIS. In my
experience, however, that this has rarely been the case.
You will
need to decide how often you want to perform the file
distribution;
for my purposes an hourly distribution has worked well
for files of
this type.
Unlike NIS, rdist can be used to distribute any type
of file,
including program files. rdist also has a command option
which
allows directories to be kept as exact copies of the
master. When
this option is used, files deleted on the master will
automatically
be deleted on the rdist slaves. These two capabilities
can
be used, for example, to keep /usr/local identical across
all
machines.
As mentioned earlier, rdist cannot be used to distribute
the
password file, because this file, in a non-NIS environment,
is updated
on the local machine. If a password file were to be
distributed by
rdist, any password change a user had made would be
lost. Over
the years, several solutions to this problem have appeared.
My favorite
is ACMaint, by David Curry (davy@purdue.edu). A description
of this package appears in the LISA IV proceedings.
If you are unable
to borrow the proceedings from a friend, or from your
neighborhood
library, you can purchase it from the USENIX conference
office.
How do I make changes to the /etc/exports file take
effect
without rebooting?
As root, type
exportfs -a
I am looking for a good network-wide backup program.
Any suggestions?
Over the years I have seen many such backup programs,
their most common characteristic being that they do
not work. The
two basic requirements for a backup program are (1)
that it work well
all the time, and, especially, (2) that it perform appropriate
actions
when something goes wrong. Therefore, for anything much
bigger than
a home computer, if the standard UNIX dump (or cpio
if your box is brain-damaged and does not have dump)
will not
do, I would recommend a commercial backup program.
There are currently three packages available which amount
to more
than just a replacement for an existing UNIX command
or a front-end
shell script to tar. These are the Legato Networker,
BackupUNet
for System Center, and Budtools from Delta Microsystems.
The Legato Networker uses its own proprietary archive
format, which
results in better performance, but creates problems
for the system
administrator. The improved performance will do you
no good if you
are unable to reclaim the data from the tape -- if,
for example,
the archive indexes have been damaged (a situation I
have encountered
with this product). In addition, the "touch and
feel" of the
graphical user interface is MacIntosh-like and, therefore,
counterintuitive
to me as an experienced UNIX system administrator.
The other two products, BackupNet and Budtools, have
rather similar
graphical user interfaces, but are very different in
their underlying
design and in their licensing structure. BackupUNet,
like Legato Networker,
uses a proprietary backup program, but the archive format
written
to the tape is that of a standard UNIX utility (tar),
which
allows for a fallback to a manual restore using that
utility if the
tape index is lost or damaged. Budtools uses the existing
backup utilities
(dump, tar, cpio) and can easily be extended
to any other backup utility, such as GNUtar.
You must do your own evaluation of these three products
in order to
find the one that fits your requirements best. I strongly
suggest
that, as part of the evaluation, you run Elizabeth Zwicky's
Backup
Torture test. This test does awful things to your backup
program and
has found bugs in every backup utility it has been tested
on so far
(including my old friend dump). Be forewarned: do this
only
on a machine that can be allowed to crash on a regular
basis, and
only on a file system you do not mind subjecting to
newfs afterwards.
A paper describing this test and the findings for various
backup utilities
on a number of vendor platforms can be found in the
LISA V conference
proceedings from last year. The test program is available
by anonymous
ftp from ftp.erg.sri.com. Elizabeth can be reached by
e-mail at zwicky@erg.sri.com.
About the Author
Bjorn Satdeva is the president of /sys/admin, inc.,
a consulting
firm which specializes in large installation system
administration.
Bjorn is also co-founder and former president of Bay-LISA,
a San Francisco
Bay Area user's group for system administrators of large
sites. Bjorn
can be contacted at /sys/admin, inc., 2787 Moorpark
Ave., San Jose,
CA 95128; electronically at bjorn@sysadmin.com; or by
phone
at (408) 241-3111.
|