Cover V01, I02
Article

jul92.tar


Questions and Answers

Bjorn Satdeva

Before we go to the questions in this issue, let's look briefly at a number of upcoming events of interest to system administrators. The most important of these is the USENIX LISA VI conference, which will take place in Long Beach, CA, October 19th through 23rd, 1992. If your budget will allow you only one conference trip for this year, this is the one.

The chair of the LISA VI conference is Trent Hein (trent@xor.com) from XOR Computer Systems. Steve Simmons (scs@iti.org) is handling the alternate tracks, and Arch Mott (arch@pei.wpd.sgi.com) is coordinating the BOFs. There will also be a vendor display. For information about this, contact John Donnelly (johnd@alumni.cs.colorado.edu).

In previous years LISA has targeted large installations. This year, however, the scope of the conference is being extended to include system administrators from all UNIX sites. To get more information, please contact Trent Hein or the USENIX Conference office at (714) 588-8649. You can also reach the USENIX Conference Coordinator, Judith DesHarnais, by e-mail at judy@usenix.org.

This year, for the first time, there will be two system administration conferences. The other conference (actually the first, chronologically), is the 1992 World Conference on System Administration and Security, scheduled for July 20 - 23, in Washington, DC. Since this is a new conference, I have very little information about it; however, my impression is that it is targeted toward government installations. For more information, contact the conference chair, Alan Paller (paller@fedunix.org).

A third conference is the USENIX UNIX Security Symposium, which will take place in Baltimore, September 14 - 16. The chair is Edward DeHart from CERT (Computer Emergency Response Team), who can be reached at (412) 268-6179 or by e-mail at ecd@cert.sei.cmu.edu. Information can also be obtained from the USENIX Conference Office mentioned earlier.

Finally, there will be a LISA VII conference next year, to be chaired by yours truly. Ideas and requests for this conference can be e-mailed to bjorn@sysadmin.com

And now to something completely different...

 Q Until recently we have been using Suns exclusively. Now, however, other machines have been introduced. This is a problem, as we rely heavily on NIS. Do you know of any public implementation of NIS?

 A To my knowledge, no such thing exists. Moreover, my experience with NIS's from vendors other than Sun Microsystems suggests that they do not work as well as could be desired. I recommend that, with the exception of the password file, you use rdist to distribute the files now serviced through NIS. Depending on how you have set up your site, this could generate less network traffic than NIS, and it will eliminate some of the less desirable side effects of NIS.

rdist is a program that distributes files to remote systems. It differs from other file distribution programs, such as rcp, primarily in that it is driven by a control file and that it updates the remote file only if the file is out of date. When you use rdist to distribute system configuration files, local copies of the file are kept on each system. This eliminates network traffic for lookups and provides you with an easy way of ensuring that the dreaded plus sign is not in hosts.equiv. Of course, if you change the system configuration files frequently, the network traffic required for updating these files could rise above the level required to run NIS. In my experience, however, that this has rarely been the case. You will need to decide how often you want to perform the file distribution; for my purposes an hourly distribution has worked well for files of this type.

Unlike NIS, rdist can be used to distribute any type of file, including program files. rdist also has a command option which allows directories to be kept as exact copies of the master. When this option is used, files deleted on the master will automatically be deleted on the rdist slaves. These two capabilities can be used, for example, to keep /usr/local identical across all machines.

As mentioned earlier, rdist cannot be used to distribute the password file, because this file, in a non-NIS environment, is updated on the local machine. If a password file were to be distributed by rdist, any password change a user had made would be lost. Over the years, several solutions to this problem have appeared. My favorite is ACMaint, by David Curry (davy@purdue.edu). A description of this package appears in the LISA IV proceedings. If you are unable to borrow the proceedings from a friend, or from your neighborhood library, you can purchase it from the USENIX conference office.

 Q How do I make changes to the /etc/exports file take effect without rebooting?

 A As root, type

exportfs -a

 Q I am looking for a good network-wide backup program. Any suggestions?

 A Over the years I have seen many such backup programs, their most common characteristic being that they do not work. The two basic requirements for a backup program are (1) that it work well all the time, and, especially, (2) that it perform appropriate actions when something goes wrong. Therefore, for anything much bigger than a home computer, if the standard UNIX dump (or cpio if your box is brain-damaged and does not have dump) will not do, I would recommend a commercial backup program.

There are currently three packages available which amount to more than just a replacement for an existing UNIX command or a front-end shell script to tar. These are the Legato Networker, BackupUNet for System Center, and Budtools from Delta Microsystems.

The Legato Networker uses its own proprietary archive format, which results in better performance, but creates problems for the system administrator. The improved performance will do you no good if you are unable to reclaim the data from the tape -- if, for example, the archive indexes have been damaged (a situation I have encountered with this product). In addition, the "touch and feel" of the graphical user interface is MacIntosh-like and, therefore, counterintuitive to me as an experienced UNIX system administrator.

The other two products, BackupNet and Budtools, have rather similar graphical user interfaces, but are very different in their underlying design and in their licensing structure. BackupUNet, like Legato Networker, uses a proprietary backup program, but the archive format written to the tape is that of a standard UNIX utility (tar), which allows for a fallback to a manual restore using that utility if the tape index is lost or damaged. Budtools uses the existing backup utilities (dump, tar, cpio) and can easily be extended to any other backup utility, such as GNUtar.

You must do your own evaluation of these three products in order to find the one that fits your requirements best. I strongly suggest that, as part of the evaluation, you run Elizabeth Zwicky's Backup Torture test. This test does awful things to your backup program and has found bugs in every backup utility it has been tested on so far (including my old friend dump). Be forewarned: do this only on a machine that can be allowed to crash on a regular basis, and only on a file system you do not mind subjecting to newfs afterwards. A paper describing this test and the findings for various backup utilities on a number of vendor platforms can be found in the LISA V conference proceedings from last year. The test program is available by anonymous ftp from ftp.erg.sri.com. Elizabeth can be reached by e-mail at zwicky@erg.sri.com.

About the Author

Bjorn Satdeva is the president of /sys/admin, inc., a consulting firm which specializes in large installation system administration. Bjorn is also co-founder and former president of Bay-LISA, a San Francisco Bay Area user's group for system administrators of large sites. Bjorn can be contacted at /sys/admin, inc., 2787 Moorpark Ave., San Jose, CA 95128; electronically at bjorn@sysadmin.com; or by phone at (408) 241-3111.