The snapshot is a PIT copy of all the data in the ZFS, the new device can be an other ZFS that you created.
The ZFS snapshot will grow - quickly if there is a lot of write activity, but the send and recieve operation will send an exact copy of the required data to the new location.
If the customer has a big down on the key exchange then use the following;
Hello,
Our RAID and server recently crashed and we are trying to recover our data. The problem appears to be that the Veritas File System/Logical Volume Manger became corrupt on our RAID. We are down to our last option, which is to run some Veritas commands that "may" result in data loss.
... (1 Reply)
I 've few data sets in my zfs pool which has been exported to the non global zones and i want to copy data on those datasets/file systems to my datasets in new pool mounted on global zone, how can i do that ? (2 Replies)
With Solaris 11 coming out with a requirement of ZFS on the root disk, I was curious to know who is using the Zeta File System now?
I have been using ZFS for the past year and don't plan to go back to UFS since ZFS is much more reliable and easier to maintain. (13 Replies)
Hi,
I need some advice please. I have this server with a couple of zpools, lets call them
pay_serv
ukb_pool
There are two zones attached to these pools. When I do a zfs list I see this
pay_serv 8.41G 265G 8.41G /pay_serv
ukb_pool 79.8G 194G 23K /ukb_pool
ukb_pool/temp_ps 9.11G... (4 Replies)
Hi! I'm a new user... I'm looking for some informations about the ZDF file sytem... In my ubuntu box i have installed cryptkeeper, and i want to know if in Solaris 11 Express can find something similar... (3 Replies)
Good morning everyone,
I'm looking for some help to retrieve data in a scenario where I might have made a big mistake. I'm hoping to understand what I did wrong.
My system is made of two Solaris 11 Express servers (old free version for evaluation). The first if for data and the second is... (7 Replies)
Discussion started by: rnd
7 Replies
LEARN ABOUT OPENSOLARIS
acl_check
acl_check(3SEC) File Access Control Library Functions acl_check(3SEC)NAME
acl_check - check the validity of an ACL
SYNOPSIS
cc [ flag... ] file... -lsec [ library... ]
#include <sys/acl.h>
int acl_check(acl_t *aclp, int isdir);
DESCRIPTION
The acl_check() function checks the validity of an ACL pointed to by aclp. The isdir argument checks the validity of an ACL that will be
applied to a directory. The ACL can be either a POSIX draft ACL as supported by UFS or NFSv4 ACL as supported by ZFS or NFSV4.
When the function verifies a POSIX draft ACL, the rules followed are described in aclcheck(3SEC). For NFSv4 ACL, the ACL is verified
against the following rules:
o The inheritance flags are valid.
o The ACL must have at least one ACL entry and no more than {MAX_ACL_ENTRIES}.
o The permission field contains only supported permissions.
o The entry type is valid.
o The flag fields contain only valid flags as supported by NFSv4/ZFS.
If any of the above rules are violated, the function fails with errno set to EINVAL.
RETURN VALUES
If the ACL is valid, acl_check() returns 0. Otherwise errno is set to EINVAL and the return value is set to one of the following:
EACL_INHERIT_ERROR There are invalid inheritance flags specified.
EACL_FLAGS_ERROR There are invalid flags specified on the ACL that don't map to supported flags in NFSV4/ZFS ACL model.
EACL_ENTRY_ERROR The ACL contains an unknown value in the type field.
EACL_MEM_ERROR The system cannot allocate any memory.
EACL_INHERIT_NOTDIR Inheritance flags are only allowed for ACLs on directories.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Committed |
+-----------------------------+-----------------------------+
|MT-Level |MT-Safe |
+-----------------------------+-----------------------------+
SEE ALSO acl(2), aclcheck(3SEC), aclsort(3SEC), acl(5), attributes(5)SunOS 5.11 22 Apr 2008 acl_check(3SEC)