From ab45fa451fc2b00fe37b5f39f7f6a05432177831 Mon Sep 17 00:00:00 2001 From: Russ Allbery Date: Fri, 26 Aug 2005 05:53:43 +0000 Subject: [PATCH] * Update the configuration transcript to reflect the current packages, messages, and instructions. Thanks, Faheem Mitha. --- debian/changelog | 7 +- debian/configuration-transcript.txt | 771 +++++++++++++++++----------- 2 files changed, 462 insertions(+), 316 deletions(-) diff --git a/debian/changelog b/debian/changelog index bc4dc6e90..b9acab8cd 100644 --- a/debian/changelog +++ b/debian/changelog @@ -6,8 +6,11 @@ openafs (1.4rc1-1) unstable; urgency=low * Improve the documentation and scripts for setting up new servers or a new cell. afs-rootvol can now be run from a client configured to use dynroot. afs-newcell generates the server CellServDB directly to work - around oddities with bos addhost. Thanks to Fahemm Mitha and Sergio - Gelato for analysis and patches. (Closes: #322638) + around oddities with bos addhost. There are many other, more minor + improvements as well. Thanks to Faheem Mitha and Sergio Gelato for + analysis and patches. (Closes: #322638) + * Update the configuration transcript to reflect the current packages, + messages, and instructions. Thanks, Faheem Mitha. * Fill in the server CellServDB with information about the local cell, if available in the client CellServDB, rather than always initializing it to contain just the name of the cell. diff --git a/debian/configuration-transcript.txt b/debian/configuration-transcript.txt index b9403e2c0..4c96c1430 100644 --- a/debian/configuration-transcript.txt +++ b/debian/configuration-transcript.txt @@ -1,174 +1,100 @@ -[This transcript includes creation of a loopback mount on /vicepa -using file full of zeros. This is useful to know how to do because it -allows you to test an AFS server without repartitioning. However, for -production cells, you should repartition and create a /vicepa -partition.] - -snorklewacker:/# apt-get -q install openafs-dbserver openafs-krb5 krb5-admin-server -Reading Package Lists... -Building Dependency Tree... +This is a transcript of a user following the instructions in +README.servers. It is best read side-by-side with that documentation +while you are setting up your cell. + +This transcript includes creation of a loopback mount on /vicepa using +file full of zeros. This is useful to know how to do because it allows +you to test an AFS server without repartitioning. However, for production +cells, you should repartition and create a /vicepa partition. + +Thanks to Faheem Mitha for the transcript. + +########################################################################## + +riverside:/home/faheem# apt-get install krb5-admin-server +... The following extra packages will be installed: - krb5-kdc krb5-user libkrb53 openafs-client openafs-fileserver openafs-ptutil + krb5-config krb5-kdc krb5-user The following NEW packages will be installed: - krb5-admin-server krb5-kdc krb5-user libkrb53 openafs-client openafs-dbserver - openafs-fileserver openafs-krb5 openafs-ptutil -0 packages upgraded, 9 newly installed, 0 to remove and 22 not upgraded. -Need to get 2264kB of archives. After unpacking 5939kB will be used. -Do you want to continue? [Y/n] y -Get:1 http://www.mit.edu packages/ krb5-admin-server 1.2.1-5 [174kB] -Get:2 http://www.mit.edu packages/ krb5-kdc 1.2.1-5 [173kB] -Get:3 http://www.mit.edu packages/ krb5-user 1.2.1-5 [154kB] -Get:4 http://www.mit.edu packages/ libkrb53 1.2.1-5 [337kB] -Get:5 http://www.mit.edu packages/ openafs-client 1.0.snap20001106-6 [662kB] -Get:6 http://www.mit.edu packages/ openafs-dbserver 1.0.snap20001106-6 [211kB] -Get:7 http://www.mit.edu packages/ openafs-fileserver 1.0.snap20001106-6 [427kB] -Get:8 http://www.mit.edu packages/ openafs-krb5 1.3-3 [96.5kB] -Get:9 http://www.mit.edu packages/ openafs-ptutil 0.0.snap20001123-1 [30.3kB] -Fetched 2264kB in 8s (253kB/s) -Preconfiguring packages .. -Configuring Libkrb53 --------------------- + krb5-admin-server krb5-config krb5-kdc krb5-user +0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. +Need to get 348kB of archives. +After unpacking 889kB of additional disk space will be used. +Do you want to continue? [Y/n] +... +Configuring krb5-config +----------------------- + When users attempt to use Kerberos and specify a principal or user + name without specifying what administrative Kerberos realm that + principal belongs to, the system appends the default realm. + Normally default realm is the upper case version of the local DNS + domain. - When users attempt to use Kerberos and specify a principal or user - name without specifying what administrative Kerberos realm that - principal belongs to, the system appends the default realm. - Normally default realm is the upper case version of the local DNS - domain. +What is the default Kerberos version 5 realm? DULCI.BIOSTAT.DUKE.EDU -What is the default Kerberos realm? [ATHENA.MIT.EDU] SNORKLEWACKER.MIT.EDU -Configuring Krb5-kdc +Configuring krb5-kdc -------------------- -By default, Kerberos4 requests are allowed from principals that do not require -preauthentication. This allows Kerberos4 services to exist while requiring -most users to use Kerberos5 clients to get their initial tickets. These -tickets can then be converted to Kerberos4 tickets. Alternatively, the mode -can be set to full, allowing Kerberos4 to get initial tickets even when -preauthentication would normally be required, or to disable, which will -disable all Kerberos4 support. +By default, Kerberos4 requests are allowed from principals that do not +require preauthentication. This allows Kerberos4 services to exist +while requiring most users to use Kerberos5 clients to get their +initial tickets. These tickets can then be converted to Kerberos4 +tickets. Alternatively, the mode can be set to full, allowing +Kerberos4 to get initial tickets even when preauthentication would +normally be required, or to disable, which will disable all Kerberos4 +support. - d. disable f. full n. nopreauth + 1. disable 2. full 3. nopreauth 4. none -What Kerberos4 compatibility mode should be used? [n] +Kerberos4 compatibility mode to use: 3 -Configuring Krb5-admin-server +Configuring krb5-admin-server ----------------------------- Setting up a Kerberos Realm - This package contains the administrative tools necessary to run on - the Kerberos master server. However, installing this package does - not automatically set up a Kerberos realm. Doing so requires - entering passwords and as such is not well-suited for package - installation. To create the realm, run the krb5_newrealm command. - You may also wish to read /usr/share/doc/krb5-kdc/README.KDC and the - administration guide found in the krb5-doc package. - . - Don't forget to set up DNS information so your clients can find your - KDC and admin servers. Doing so is documented in the administration - guide. - -Configuring Openafs-client --------------------------- - +This package contains the administrative tools necessary to run on the +Kerberos master server. However, installing this package does not +automatically set up a Kerberos realm. Doing so requires entering +passwords and as such is not well-suited for package installation. To +create the realm, run the krb5_newrealm command. You may also wish to +read /usr/share/doc/krb5-kdc/README.KDC and the administration guide +found in the krb5-doc package. - AFS filespace is organized into cells or administrative domains. -[More] - Each workstation belongs to one cell. Usually the cell is the DNS - domain name of the workstation. - -What AFS cell does this workstation belong to? snorklewacker.mit.edu - - - AFS uses a area of the disk to cache remote files for faster - access. This cache will be mounted on /var/cache/openafs. It is - important that the cache not overfill the partition it is located - on. Often, people find it useful to dedicate a partition to their - AFS cache. - -How large is your AFS cache (kb)? [50000] 95000 - -Configuring Openafs-fileserver ------------------------------- +Don't forget to set up DNS information so your clients can find your +KDC and admin servers. Doing so is documented in the administration +guide. -Selecting previously deselected package libkrb53. -(Reading database ... 28342 files and directories currently installed.) -Unpacking libkrb53 (from .../libkrb53_1.2.1-5_i386.deb) ... +Selecting previously deselected package krb5-config. +(Reading database ... 81199 files and directories currently installed.) +Unpacking krb5-config (from .../krb5-config_1.6_all.deb) ... Selecting previously deselected package krb5-user. -Unpacking krb5-user (from .../krb5-user_1.2.1-5_i386.deb) ... +Unpacking krb5-user (from .../krb5-user_1.3.6-2sarge2_i386.deb) ... Selecting previously deselected package krb5-kdc. -Unpacking krb5-kdc (from .../krb5-kdc_1.2.1-5_i386.deb) ... +Unpacking krb5-kdc (from .../krb5-kdc_1.3.6-2sarge2_i386.deb) ... Selecting previously deselected package krb5-admin-server. -Unpacking krb5-admin-server (from .../krb5-admin-server_1.2.1-5_i386.deb) ... -Selecting previously deselected package openafs-client. -Unpacking openafs-client (from .../openafs-client_1.0.snap20001106-6_i386.deb) ... -Selecting previously deselected package openafs-fileserver. -Unpacking openafs-fileserver (from .../openafs-fileserver_1.0.snap20001106-6_i386.deb) ... -Selecting previously deselected package openafs-ptutil. -Unpacking openafs-ptutil (from .../openafs-ptutil_0.0.snap20001123-1_i386.deb) ... -Selecting previously deselected package openafs-dbserver. -Unpacking openafs-dbserver (from .../openafs-dbserver_1.0.snap20001106-6_i386.deb) ... -Selecting previously deselected package openafs-krb5. -Unpacking openafs-krb5 (from .../openafs-krb5_1.3-3_i386.deb) ... -Setting up openafs-client (1.0.snap20001106-6) ... -Configuring Openafs-client --------------------------- - -AFS uses the file /etc/openafs/CellServDB to hold the list of servers that -should be contacted to find parts of a cell. The cell you claim this -workstation belongs to is not in that file. Enter the host names of the -database servers separated by spaces. IMPORTANT: If you are creating a new -cell and this machine is to be a database server in that cell, only enter this -machine's name; add the other servers later after they are functioning. Also, -do not enable the AFS client to start at boot on this server until the cell is -configured. When you are ready you can edit /etc/openafs/afs.conf.client to -enable the client. - -What hosts are DB servers for your home cell?snorklewacker.mit.edu - -Should the Openafs filesystem be started and mounted at boot? Normally, most -users who install the openafs-client package expect to run it at boot. -However, if you are planning on setting up a new cell or are on a laptop, you -may not want it started at boot time. If you answer no to this question, run -/etc/init.d/openafs-client force-start to run. - -Run Openafs client at boot? [yes] n - -Starting AFS services: -Setting up openafs-fileserver (1.0.snap20001106-6) ... -Starting AFS Server: ===================== U.S. Government Restricted Rights ====================== -If you are licensing the Software on behalf of the U.S. Government -("Government"), the following provisions apply to you. If the Software is -supplied to the Department of Defense ("DoD"), it is classified as "Commercial -Computer Software" under paragraph 252.227-7014 of the DoD Supplement to the -Federal Acquisition Regulations ("DFARS") (or any successor regulations) -and the Government is acquiring only the license rights granted herein (the -license rights customarily provided to non-Government users). If the Software -is supplied to any unit or agency of the Government other than DoD, it is -classified as "Restricted Computer Software" and the Government's rights in -the Software are defined in paragraph 52.227-19 of the Federal Acquisition -Regulations ("FAR") (or any successor regulations) or, in the case of NASA, -in paragraph 18.52.227-86 of the NASA Supplement in the FAR (or any successor -regulations). -bosserver. - -Setting up openafs-ptutil (0.0.snap20001123-1) ... - -Setting up openafs-dbserver (1.0.snap20001106-6) ... - -Setting up libkrb53 (1.2.1-5) ... +Unpacking krb5-admin-server (from .../krb5-admin-server_1.3.6-2sarge2_i386.deb) ... +Setting up krb5-config (1.6) ... +Configuring krb5-config +----------------------- -Setting up krb5-user (1.2.1-5) ... +Enter the hostnames of Kerberos servers in the DULCI.BIOSTAT.DUKE.EDU Kerberos realm separated by spaces. -Setting up krb5-kdc (1.2.1-5) ... +What are the Kerberos servers for your realm? riverside.dulci.biostat.duke.edu -Setting up krb5-admin-server (1.2.1-5) ... +Enter the hostname of the administrative (password changing) server +for the DULCI.BIOSTAT.DUKE.EDU Kerberos realm. -Setting up openafs-krb5 (1.3-3) ... +What is the administrative server for your Kerberos realm? riverside.dulci.biostat.duke.edu +Setting up krb5-user (1.3.6-2sarge2) ... +Setting up krb5-kdc (1.3.6-2sarge2) ... +Setting up krb5-admin-server (1.3.6-2sarge2) ... +Starting Kerberos Administration Servers: kadmind: No such file or directory while initializing, aborting +kadmind. -snorklewacker:/# krb5_newrealm +riverside:/home/faheem# krb5_newrealm This script should be run on the master KDC/admin server to initialize a Kerberos realm. It will ask you to type in a master key password. This password will be used to generate a key that is stored in @@ -176,24 +102,16 @@ This password will be used to generate a key that is stored in is much more important that it be a strong password than that it be remembered. However, if you lose the password and /etc/krb5kdc/stash, you cannot decrypt your Kerberos database. -Initializing database '/var/lib/krb5kdc/principal' for realm 'SNORKLEWACKER.MIT.EDU', -master key name 'K/M@SNORKLEWACKER.MIT.EDU' +Loading random data +Initializing database '/var/lib/krb5kdc/principal' for realm 'DULCI.BIOSTAT.DUKE.EDU', +master key name 'K/M@DULCI.BIOSTAT.DUKE.EDU' You will be prompted for the database Master Password. It is important that you NOT FORGET this password. -Enter KDC database master key:foo - -Re-enter KDC database master key to verify:foo - -Authenticating as principal hartmans/admin@ATHENA.MIT.EDU with password. -Entry for principal kadmin/admin with kvno 3, encryption type Triple DES cbc mode with HMAC/sha1 added to keytab WRFILE:/etc/krb5kdc/kadm5.keytab. -Entry for principal kadmin/admin with kvno 3, encryption type DES cbc mode with CRC-32 added to keytab WRFILE:/etc/krb5kdc/kadm5.keytab. -Authenticating as principal hartmans/admin@ATHENA.MIT.EDU with password. -Entry for principal kadmin/changepw with kvno 3, encryption type Triple DES cbc mode with HMAC/sha1 added to keytab WRFILE:/etc/krb5kdc/kadm5.keytab. -Entry for principal kadmin/changepw with kvno 3, encryption type DES cbc mode with CRC-32 added to keytab WRFILE:/etc/krb5kdc/kadm5.keytab. +Enter KDC database master key: +Re-enter KDC database master key to verify: Starting Kerberos KDC: krb5kdc krb524d. Starting Kerberos Administration Servers: kadmind. - Now that your realm is set up you may wish to create an administrative principal using the addprinc subcommand of the kadmin.local program. Then, this principal can be added to /etc/krb5kdc/kadm5.acl so that @@ -206,37 +124,128 @@ created. Don't forget to set up DNS information so your clients can find your KDC and admin servers. Doing so is documented in the administration guide. -snorklewacker:/# kadmin.local -e des-cbc-crc:v4 -Authenticating as principal hartmans/admin@ATHENA.MIT.EDU with password. -kadmin.local: addprinc -randkey afs -addprinc -randkey afs -WARNING: no policy specified for afs@SNORKLEWACKER.MIT.EDU; defaulting to no policy -Principal "afs@SNORKLEWACKER.MIT.EDU" created. -kadmin.local: ktadd -k /tmp/snork.keytab afs -ktadd -k /tmp/snork.keytab afs -Entry for principal afs with kvno 3, encryption type DES cbc mode with CRC-32 added to keytab WRFILE:/tmp/snork.keytab. -kadmin.local: quit -quit -snorklewacker:/# kadmin.local -kadmin.local -Authenticating as principal hartmans/admin@ATHENA.MIT.EDU with password. -kadmin.local: addprinc hartmans -addprinc hartmans -WARNING: no policy specified for hartmans@SNORKLEWACKER.MIT.EDU; defaulting to no policy -Enter password for principal "hartmans@SNORKLEWACKER.MIT.EDU": foo - -Re-enter password for principal "hartmans@SNORKLEWACKER.MIT.EDU": foo - -Principal "hartmans@SNORKLEWACKER.MIT.EDU" created. -kadmin.local: quit -quit -snorklewacker:/# asetkey add 3 /tmp/snork.keytab afs -asetkey add 3 /tmp/snork.keytab afs -snorklewacker:/# snorklewacker:/# dd if=/dev/zero of=/var/lib/openafs/vicepa bs=1024k count=32 +riverside:/home/faheem# kadmin.local +Authenticating as principal root/admin@DULCI.BIOSTAT.DUKE.EDU with password. +kadmin.local: addprinc faheem/admin +WARNING: no policy specified for faheem/admin@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy +Enter password for principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU": +Re-enter password for principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU": +Principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU" created. +kadmin.local: addprinc faheem/admin +WARNING: no policy specified for faheem@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy +Enter password for principal "faheem@DULCI.BIOSTAT.DUKE.EDU": +Re-enter password for principal "faheem@DULCI.BIOSTAT.DUKE.EDU": +Principal "faheem@DULCI.BIOSTAT.DUKE.EDU" created. +kadmin.local: exit +riverside:/home/faheem# apt-get install openafs-dbserver openafs-krb5 +... +The following extra packages will be installed: + openafs-client openafs-fileserver +The following NEW packages will be installed: + openafs-client openafs-dbserver openafs-fileserver openafs-krb5 +0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. +Need to get 2927kB of archives. +After unpacking 6898kB of additional disk space will be used. +Do you want to continue? [Y/n] +... +Configuring openafs-client +-------------------------- + +AFS filespace is organized into cells or administrative domains. Each +workstation belongs to one cell. Usually the cell is the DNS domain +name of the site. + +What AFS cell does this workstation belong to? dulci.biostat.duke.edu + +AFS uses an area of the disk to cache remote files for faster access. +This cache will be mounted on /var/cache/openafs. It is important +that the cache not overfill the partition it is located on. Often, +people find it useful to dedicate a partition to their AFS cache. + +How large is your AFS cache (kB)? 50000 + +/afs generally contains an entry for each cell that a client can talk +to. Traditionally, these entries were generated by servers in the +client's home cell. However, OpenAFS clients can generate the +contents of /afs dynamically based on the contents of +/etc/openafs/CellServDB and DNS. + +If you generate /afs dynamically, you may need to create +/etc/openafs/CellAlias to include aliases for common cells. DO NOT +SELECT THIS OPTION IF THIS MACHINE IS THE FIRST DATABASE SERVER IN A +NEW CELL . + +Dynamically generate the contents of /afs? no + +Selecting previously deselected package openafs-client. +(Reading database ... 81267 files and directories currently installed.) +Unpacking openafs-client (from .../openafs-client_1.3.81-3sarge1_i386.deb) ... +Selecting previously deselected package openafs-fileserver. +Unpacking openafs-fileserver (from .../openafs-fileserver_1.3.81-3sarge1_i386.deb) ... +Selecting previously deselected package openafs-dbserver. +Unpacking openafs-dbserver (from .../openafs-dbserver_1.3.81-3sarge1_i386.deb) ... +Selecting previously deselected package openafs-krb5. +Unpacking openafs-krb5 (from .../openafs-krb5_1.3-10.1_i386.deb) ... +Setting up openafs-client (1.3.81-3sarge1) ... +Configuring openafs-client +-------------------------- + +AFS uses the file /etc/openafs/CellServDB to hold the list of servers +that should be contacted to find parts of a cell. The cell you claim +this workstation belongs to is not in that file. Enter the host names +of the database servers separated by spaces. IMPORTANT: If you are +creating a new cell and this machine is to be a database server in +that cell, only enter this machine's name; add the other servers later +after they are functioning. Also, do not enable the AFS client to +start at boot on this server until the cell is configured. When you +are ready you can edit /etc/openafs/afs.conf.client to enable the +client. + +What hosts are DB servers for your home cell? riverside.dulci.biostat.duke.edu + +Should the Openafs filesystem be started and mounted at boot? +Normally, most users who install the openafs-client package expect to +run it at boot. However, if you are planning on setting up a new cell +or are on a laptop, you may not want it started at boot time. If you +choose not to start AFS at boot , run /etc/init.d/openafs-client +force-start to start the client when you wish to run it. + +Run Openafs client now and at boot? no +Setting up openafs-fileserver (1.3.81-3sarge1) ... +Starting AFS Server: bosserver. + +Setting up openafs-dbserver (1.3.81-3sarge1) ... +Setting up openafs-krb5 (1.3-10.1) ... +riverside:/home/faheem# kadmin.local +Authenticating as principal root/admin@DULCI.BIOSTAT.DUKE.EDU with password. +kadmin.local: addprinc -randkey -e des-cbc-crc:v4 afs +WARNING: no policy specified for afs@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy +Principal "afs@DULCI.BIOSTAT.DUKE.EDU" created. +kadmin.local: ktadd -k /tmp/afs.keytab -e des-cbc-crc:v4 afs +Entry for principal afs with kvno 3, encryption type DES cbc mode with CRC-32 added to keytab WRFILE:/tmp/afs.keytab. +kadmin.local: getprinc afs +Principal: afs@DULCI.BIOSTAT.DUKE.EDU +Expiration date: [never] +Last password change: Wed Aug 24 03:09:42 EDT 2005 +Password expiration date: [none] +Maximum ticket life: 0 days 10:00:00 +Maximum renewable life: 7 days 00:00:00 +Last modified: Wed Aug 24 03:09:42 EDT 2005 (root/admin@DULCI.BIOSTAT.DUKE.EDU) +Last successful authentication: [never] +Last failed authentication: [never] +Failed password attempts: 0 +Number of keys: 1 +Key: vno 3, DES cbc mode with CRC-32, no salt +Attributes: +Policy: [none] +kadmin.local: exit +riverside:/home/faheem# asetkey add /tmp/afs.keytab afs +riverside:/home/faheem# dd if=/dev/zero of=/var/lib/openafs/vicepa bs=1024k count=32 32+0 records in 32+0 records out -snorklewacker:/# mke2fs /var/lib/openafs/vicepa -mke2fs 1.19, 13-Jul-2000 for EXT2 FS 0.5b, 95/08/09 +33554432 bytes transferred in 0.093776 seconds (357814258 bytes/sec) +riverside:/home/faheem# mke2fs /var/lib/openafs/vicepa +mke2fs 1.37 (21-Mar-2005) /var/lib/openafs/vicepa is not a block special device. Proceed anyway? (y,n) y Filesystem label= @@ -249,170 +258,304 @@ First data block=1 4 block groups 8192 blocks per group, 8192 fragments per group 2048 inodes per group -Superblock backups stored on blocks: - 8193, 24577 +Superblock backups stored on blocks: + 8193, 24577 -Writing inode tables: 0/41/42/43/4done +Writing inode tables: done Writing superblocks and filesystem accounting information: done -snorklewacker:/# mount -oloop /var/lib/openafs/vicepa /vicepa -snorklewacker:/# afs-newcell - Prerequisites +This filesystem will be automatically checked every 20 mounts or +180 days, whichever comes first. Use tune2fs -c or -i to override. +riverside:/home/faheem# mkdir /vicepa +riverside:/home/faheem# mount -oloop /var/lib/openafs/vicepa /vicepa +riverside:/home/faheem# afs-newcell + Prerequisites In order to set up a new AFS cell, you must meet the following: 1) You need a working Kerberos realm with Kerberos4 support. You - should install Heimdal with Kth-kerberos compatibility or MIT - Kerberos5. + should install Heimdal with Kth-kerberos compatibility or MIT + Kerberos5. -2) You need to create the AFS key and load it into - /etc/openafs/server/KeyFile. If your cell's name is the same as - your Kerberos realm then create a principal called afs. Otherwise, - create a principal called afs/cellname in your realm. The cell - name should be all lower case, unlike Kerberos realms which are all - upper case. You can use asetkey from the openafs-krb5 package, or - if you used AFS3 salt to create the key, the bos addkey command. +2) You need to create the single-DES AFS key and load it into + /etc/openafs/server/KeyFile. If your cell's name is the same as + your Kerberos realm then create a principal called afs. Otherwise, + create a principal called afs/cellname in your realm. The cell + name should be all lower case, unlike Kerberos realms which are all + upper case. You can use asetkey from the openafs-krb5 package, or + if you used AFS3 salt to create the key, the bos addkey command. 3) This machine should have a filesystem mounted on /vicepa. If you - do not have a free partition, then create a large file by using dd - to extract bytes from /dev/zero. Create a filesystem on this file - and mount it using -oloop. + do not have a free partition, then create a large file by using dd + to extract bytes from /dev/zero. Create a filesystem on this file + and mount it using -oloop. 4) You will need an administrative principal created in a Kerberos -realm. This principal will be added to susers and -system:administrators and thus will be able to run administrative -commands. Generally the user is a root instance of some administravie -user. For example if jruser is an administrator then it would be -reasonable to create jruser/root and specify jruser/root as the user -to be added in this script. + realm. This principal will be added to susers and + system:administrators and thus will be able to run administrative + commands. Generally the user is a root or admin instance of some + administrative user. For example if jruser is an administrator then + it would be reasonable to create jruser/root (or jruser/admin) and + specify that as the user to be added in this script. 5) The AFS client must not be running on this workstation. It will be -at the end of this script. + at the end of this script. Do you meet these requirements? [y/n] y If the fileserver is not running, this may hang for 30 seconds. /etc/init.d/openafs-fileserver stop -Stopping AFS Server: bosserver. -What administrative principal should be used?hartmans -echo \>snorklewacker.mit.edu >/etc/openafs/server/CellServDB -/etc/init.d/openafs-fileserver start -Starting AFS Server: ===================== U.S. Government Restricted Rights ====================== -If you are licensing the Software on behalf of the U.S. Government -("Government"), the following provisions apply to you. If the Software is -supplied to the Department of Defense ("DoD"), it is classified as "Commercial -Computer Software" under paragraph 252.227-7014 of the DoD Supplement to the -Federal Acquisition Regulations ("DFARS") (or any successor regulations) -and the Government is acquiring only the license rights granted herein (the -license rights customarily provided to non-Government users). If the Software -is supplied to any unit or agency of the Government other than DoD, it is -classified as "Restricted Computer Software" and the Government's rights in -the Software are defined in paragraph 52.227-19 of the Federal Acquisition -Regulations ("FAR") (or any successor regulations) or, in the case of NASA, -in paragraph 18.52.227-86 of the NASA Supplement in the FAR (or any successor -regulations). +Stopping AFS Server: bos: could not find entry (can't find cell '' in cell database) bosserver. -bos addhost snorklewacker snorklewacker -localauth ||true -bos adduser snorklewacker hartmans -localauth +What administrative principal should be used? faheem/admin + +/etc/openafs/server/CellServDB already exists, renaming to .old +/etc/init.d/openafs-fileserver start +Starting AFS Server: bosserver. +bos adduser riverside.dulci.biostat.duke.edu faheem.admin -localauth pt_util: /var/lib/openafs/db/prdb.DB0: Bad UBIK_MAGIC. Is 0 should be 354545 Ubik Version is: 2.0 Error while creating system:administrators: Entry for id already exists pt_util: Ubik Version number changed during execution. Old Version = 2.0, new version = 33554432.0 -bos create snorklewacker ptserver simple /usr/lib/openafs/ptserver -localauth -bos create snorklewacker vlserver simple /usr/lib/openafs/vlserver -localauth -bos create snorklewacker fs fs -cmd /usr/lib/openafs/fileserver -cmd /usr/lib/openafs/volserver -cmd /usr/lib/openafs/salvager -localauth +bos create riverside.dulci.biostat.duke.edu ptserver simple /usr/lib/openafs/ptserver -localauth +bos create riverside.dulci.biostat.duke.edu vlserver simple /usr/lib/openafs/vlserver -localauth +bos create riverside.dulci.biostat.duke.edu fs fs -cmd /usr/lib/openafs/fileserver -cmd /usr/lib/openafs/volserver -cmd /usr/lib/openafs/salvager -localauth Waiting for database elections: done. -vos create snorklewacker a root.afs -localauth -Volume 536870924 created on partition /vicepa of snorklewacker -echo snorklewacker.mit.edu >/etc/openafs/ThisCell +vos create riverside.dulci.biostat.duke.edu a root.afs -localauth +Volume 536870912 created on partition /vicepa of riverside.dulci.biostat.duke.edu /etc/init.d/openafs-client force-start -Starting AFS services: ===================== U.S. Government Restricted Rights ====================== -If you are licensing the Software on behalf of the U.S. Government -("Government"), the following provisions apply to you. If the Software is -supplied to the Department of Defense ("DoD"), it is classified as "Commercial -Computer Software" under paragraph 252.227-7014 of the DoD Supplement to the -Federal Acquisition Regulations ("DFARS") (or any successor regulations) -and the Government is acquiring only the license rights granted herein (the -license rights customarily provided to non-Government users). If the Software -is supplied to any unit or agency of the Government other than DoD, it is -classified as "Restricted Computer Software" and the Government's rights in -the Software are defined in paragraph 52.227-19 of the Federal Acquisition -Regulations ("FAR") (or any successor regulations) or, in the case of NASA, -in paragraph 18.52.227-86 of the NASA Supplement in the FAR (or any successor -regulations). -afsd: All AFS daemons started. - afsd. -Now, get tokens as hartmans in the snorklewacker.mit.edu cell. Then, run -afs-rootvol. -snorklewacker:/# -snorklewacker:/# kinit hartmans -Password for hartmans@SNORKLEWACKER.MIT.EDU: foo - -snorklewacker:/# aklog snorklewacker.mit.edu -k SNORKLEWACKER.MIT.EDU -snorklewacker:/# afs-rootvol - Prerequisites - -In order to set up the root.afs volume, you must meet the following pre-conditions: +Starting AFS services: afsd: All AFS daemons started. + afsd. + +Now, get tokens as faheem/admin in the dulci.biostat.duke.edu cell. +Then, run afs-rootvol. +riverside:/home/faheem# bos status localhost -local +Instance ptserver, currently running normally. +Instance vlserver, currently running normally. +Instance fs, currently running normally. + Auxiliary status is: file server running. +riverside:/home/faheem# kinit faheem/admin@DULCI.BIOSTAT.DUKE.EDU +Password for faheem/admin@DULCI.BIOSTAT.DUKE.EDU: +riverside:/home/faheem# aklog dulci.biostat.duke.edu -k DULCI.BIOSTAT.DUKE.EDU +riverside:/home/faheem# tokens + +Tokens held by the Cache Manager: + +User's (AFS ID 1) tokens for afs@dulci.biostat.duke.edu [Expires Aug 24 13:22] + --End of list-- +riverside:/home/faheem# boss status riverside +Instance ptserver, currently running normally. +Instance vlserver, currently running normally. +Instance fs, currently running normally. + Auxiliary status is: file server running. +riverside:/home/faheem# afs-rootvol + Prerequisites + +In order to set up the root.afs volume, you must meet the following +pre-conditions: 1) The cell must be configured, running a database server with a - volume location and protection server. + volume location and protection server. The afs-newcell script will + set up these services. -2) You must be logged into the cell with tokens in - system:administrators and with a principal that is in the susers +2) You must be logged into the cell with tokens in for a user in + system:administrators and with a principal that is in the UserList file of the servers in the cell. -3) You need a fileserver in the cell with partitions mounted and a root.afs volume created. - Presumably, it has no volumes on it, although the script will work - so long as nothing besides root.afs exists. +3) You need a fileserver in the cell with partitions mounted and a + root.afs volume created. Presumably, it has no volumes on it, + although the script will work so long as nothing besides root.afs + exists. The afs-newcell script will set up the file server. 4) The AFS client must be running pointed at the new cell. -Do you meet these conditions? (Y/n) y -You will need to select a server (hostname) and AFS -partition on which to create the root volumes. -What AFS Server should volumes be placed on? snorklewacker +Do you meet these conditions? (y/n) y + +You will need to select a server (hostname) and AFS partition on which to +create the root volumes. + +What AFS Server should volumes be placed on? riverside.dulci.biostat.duke.edu What partition? [a] +vos create riverside.dulci.biostat.duke.edu a root.cell -localauth +Volume 536870915 created on partition /vicepa of riverside.dulci.biostat.duke.edu fs sa /afs system:anyuser rl -vos create snorklewacker a root.cell -localauth -Volume 536870927 created on partition /vicepa of snorklewacker -fs mkm /afs/snorklewacker.mit.edu root.cell -cell snorklewacker.mit.edu -fs mkm /afs/andrew.cmu.edu root.cell -cell andrew.cmu.edu -fs mkm /afs/cs.cmu.edu root.cell -cell cs.cmu.edu -fs mkm /afs/ece.cmu.edu root.cell -cell ece.cmu.edu -fs mkm /afs/athena.mit.edu root.cell -cell athena.mit.edu -fs mkm /afs/dev.mit.edu root.cell -cell dev.mit.edu -fs mkm /afs/net.mit.edu root.cell -cell net.mit.edu -fs mkm /afs/sipb.mit.edu root.cell -cell sipb.mit.edu -fs mkm /afs/ir.stanford.edu root.cell -cell ir.stanford.edu -fs mkm /afs/umr.edu root.cell -cell umr.edu -fs mkm /afs/dementia.org root.cell -cell dementia.org -fs sa /afs/snorklewacker.mit.edu system:anyuser rl -fs mkm /afs/.snorklewacker.mit.edu root.cell -cell snorklewacker.mit.edu -rw +fs mkm /afs/dulci.biostat.duke.edu root.cell -cell dulci.biostat.duke.edu -fast || true +fs mkm /afs/grand.central.org root.cell -cell grand.central.org -fast || true +fs mkm /afs/wu-wien.ac.at root.cell -cell wu-wien.ac.at -fast || true +fs mkm /afs/hephy.at root.cell -cell hephy.at -fast || true +fs mkm /afs/itp.tugraz.at root.cell -cell itp.tugraz.at -fast || true +fs mkm /afs/cern.ch root.cell -cell cern.ch -fast || true +fs mkm /afs/ams.cern.ch root.cell -cell ams.cern.ch -fast || true +fs mkm /afs/ethz.ch root.cell -cell ethz.ch -fast || true +fs mkm /afs/psi.ch root.cell -cell psi.ch -fast || true +fs mkm /afs/extundo.com root.cell -cell extundo.com -fast || true +fs mkm /afs/mekinok.com root.cell -cell mekinok.com -fast || true +fs mkm /afs/membrain.com root.cell -cell membrain.com -fast || true +fs mkm /afs/midnightlinux.com root.cell -cell midnightlinux.com -fast || true +fs mkm /afs/setfilepointer.com root.cell -cell setfilepointer.com -fast || true +fs mkm /afs/sodre.cx root.cell -cell sodre.cx -fast || true +fs mkm /afs/desy.de root.cell -cell desy.de -fast || true +fs mkm /afs/gppc.de root.cell -cell gppc.de -fast || true +fs mkm /afs/ifh.de root.cell -cell ifh.de -fast || true +fs mkm /afs/lrz-muenchen.de root.cell -cell lrz-muenchen.de -fast || true +fs mkm /afs/ipp-garching.mpg.de root.cell -cell ipp-garching.mpg.de -fast || true +fs mkm /afs/mpe.mpg.de root.cell -cell mpe.mpg.de -fast || true +fs mkm /afs/i1.informatik.rwth-aachen.de root.cell -cell i1.informatik.rwth-aachen.de -fast || true +fs mkm /afs/tu-bs.de root.cell -cell tu-bs.de -fast || true +fs mkm /afs/tu-chemnitz.de root.cell -cell tu-chemnitz.de -fast || true +fs mkm /afs/e18.ph.tum.de root.cell -cell e18.ph.tum.de -fast || true +fs mkm /afs/uni-bonn.de root.cell -cell uni-bonn.de -fast || true +fs mkm /afs/atlass01.physik.uni-bonn.de root.cell -cell atlass01.physik.uni-bonn.de -fast || true +fs mkm /afs/uni-freiburg.de root.cell -cell uni-freiburg.de -fast || true +fs mkm /afs/physik.uni-freiburg.de root.cell -cell physik.uni-freiburg.de -fast || true +fs mkm /afs/urz.uni-heidelberg.de root.cell -cell urz.uni-heidelberg.de -fast || true +fs mkm /afs/uni-hohenheim.de root.cell -cell uni-hohenheim.de -fast || true +fs mkm /afs/rz.uni-jena.de root.cell -cell rz.uni-jena.de -fast || true +fs mkm /afs/meteo.uni-koeln.de root.cell -cell meteo.uni-koeln.de -fast || true +fs mkm /afs/rrz.uni-koeln.de root.cell -cell rrz.uni-koeln.de -fast || true +fs mkm /afs/physik.uni-mainz.de root.cell -cell physik.uni-mainz.de -fast || true +fs mkm /afs/uni-mannheim.de root.cell -cell uni-mannheim.de -fast || true +fs mkm /afs/physik.uni-wuppertal.de root.cell -cell physik.uni-wuppertal.de -fast || true +fs mkm /afs/s-et.aau.dk root.cell -cell s-et.aau.dk -fast || true +fs mkm /afs/ies.auc.dk root.cell -cell ies.auc.dk -fast || true +fs mkm /afs/asu.edu root.cell -cell asu.edu -fast || true +fs mkm /afs/hep.caltech.edu root.cell -cell hep.caltech.edu -fast || true +fs mkm /afs/clarkson.edu root.cell -cell clarkson.edu -fast || true +fs mkm /afs/andrew.cmu.edu root.cell -cell andrew.cmu.edu -fast || true +fs mkm /afs/club.cc.cmu.edu root.cell -cell club.cc.cmu.edu -fast || true +fs mkm /afs/chem.cmu.edu root.cell -cell chem.cmu.edu -fast || true +fs mkm /afs/cs.cmu.edu root.cell -cell cs.cmu.edu -fast || true +fs mkm /afs/ece.cmu.edu root.cell -cell ece.cmu.edu -fast || true +fs mkm /afs/scotch.ece.cmu.edu root.cell -cell scotch.ece.cmu.edu -fast || true +fs mkm /afs/qatar.cmu.edu root.cell -cell qatar.cmu.edu -fast || true +fs mkm /afs/sbp.ri.cmu.edu root.cell -cell sbp.ri.cmu.edu -fast || true +fs mkm /afs/msc.cornell.edu root.cell -cell msc.cornell.edu -fast || true +fs mkm /afs/dbic.dartmouth.edu root.cell -cell dbic.dartmouth.edu -fast || true +fs mkm /afs/northstar.dartmouth.edu root.cell -cell northstar.dartmouth.edu -fast || true +fs mkm /afs/eecs.harvard.edu root.cell -cell eecs.harvard.edu -fast || true +fs mkm /afs/iastate.edu root.cell -cell iastate.edu -fast || true +fs mkm /afs/athena.mit.edu root.cell -cell athena.mit.edu -fast || true +fs mkm /afs/dev.mit.edu root.cell -cell dev.mit.edu -fast || true +fs mkm /afs/net.mit.edu root.cell -cell net.mit.edu -fast || true +fs mkm /afs/sipb.mit.edu root.cell -cell sipb.mit.edu -fast || true +fs mkm /afs/msu.edu root.cell -cell msu.edu -fast || true +fs mkm /afs/nd.edu root.cell -cell nd.edu -fast || true +fs mkm /afs/pitt.edu root.cell -cell pitt.edu -fast || true +fs mkm /afs/cs.pitt.edu root.cell -cell cs.pitt.edu -fast || true +fs mkm /afs/psc.edu root.cell -cell psc.edu -fast || true +fs mkm /afs/scoobydoo.psc.edu root.cell -cell scoobydoo.psc.edu -fast || true +fs mkm /afs/cede.psu.edu root.cell -cell cede.psu.edu -fast || true +fs mkm /afs/rose-hulman.edu root.cell -cell rose-hulman.edu -fast || true +fs mkm /afs/cs.rose-hulman.edu root.cell -cell cs.rose-hulman.edu -fast || true +fs mkm /afs/rpi.edu root.cell -cell rpi.edu -fast || true +fs mkm /afs/hep.sc.edu root.cell -cell hep.sc.edu -fast || true +fs mkm /afs/cs.stanford.edu root.cell -cell cs.stanford.edu -fast || true +fs mkm /afs/ir.stanford.edu root.cell -cell ir.stanford.edu -fast || true +fs mkm /afs/slac.stanford.edu root.cell -cell slac.stanford.edu -fast || true +fs mkm /afs/cats.ucsc.edu root.cell -cell cats.ucsc.edu -fast || true +fs mkm /afs/acm.uiuc.edu root.cell -cell acm.uiuc.edu -fast || true +fs mkm /afs/ncsa.uiuc.edu root.cell -cell ncsa.uiuc.edu -fast || true +fs mkm /afs/umbc.edu root.cell -cell umbc.edu -fast || true +fs mkm /afs/glue.umd.edu root.cell -cell glue.umd.edu -fast || true +fs mkm /afs/wam.umd.edu root.cell -cell wam.umd.edu -fast || true +fs mkm /afs/umich.edu root.cell -cell umich.edu -fast || true +fs mkm /afs/atlas.umich.edu root.cell -cell atlas.umich.edu -fast || true +fs mkm /afs/citi.umich.edu root.cell -cell citi.umich.edu -fast || true +fs mkm /afs/lsa.umich.edu root.cell -cell lsa.umich.edu -fast || true +fs mkm /afs/math.lsa.umich.edu root.cell -cell math.lsa.umich.edu -fast || true +fs mkm /afs/umr.edu root.cell -cell umr.edu -fast || true +fs mkm /afs/physics.unc.edu root.cell -cell physics.unc.edu -fast || true +fs mkm /afs/uncc.edu root.cell -cell uncc.edu -fast || true +fs mkm /afs/eng.utah.edu root.cell -cell eng.utah.edu -fast || true +fs mkm /afs/cs.uwm.edu root.cell -cell cs.uwm.edu -fast || true +fs mkm /afs/cs.wisc.edu root.cell -cell cs.wisc.edu -fast || true +fs mkm /afs/engr.wisc.edu root.cell -cell engr.wisc.edu -fast || true +fs mkm /afs/hep.wisc.edu root.cell -cell hep.wisc.edu -fast || true +fs mkm /afs/physics.wisc.edu root.cell -cell physics.wisc.edu -fast || true +fs mkm /afs/ifca.unican.es root.cell -cell ifca.unican.es -fast || true +fs mkm /afs/ific.uv.es root.cell -cell ific.uv.es -fast || true +fs mkm /afs/biocenter.helsinki.fi root.cell -cell biocenter.helsinki.fi -fast || true +fs mkm /afs/dapnia.saclay.cea.fr root.cell -cell dapnia.saclay.cea.fr -fast || true +fs mkm /afs/in2p3.fr root.cell -cell in2p3.fr -fast || true +fs mkm /afs/anl.gov root.cell -cell anl.gov -fast || true +fs mkm /afs/rhic.bnl.gov root.cell -cell rhic.bnl.gov -fast || true +fs mkm /afs/usatlas.bnl.gov root.cell -cell usatlas.bnl.gov -fast || true +fs mkm /afs/fnal.gov root.cell -cell fnal.gov -fast || true +fs mkm /afs/ic-afs.arc.nasa.gov root.cell -cell ic-afs.arc.nasa.gov -fast || true +fs mkm /afs/jpl.nasa.gov root.cell -cell jpl.nasa.gov -fast || true +fs mkm /afs/nersc.gov root.cell -cell nersc.gov -fast || true +fs mkm /afs/bme.hu root.cell -cell bme.hu -fast || true +fs mkm /afs/caspur.it root.cell -cell caspur.it -fast || true +fs mkm /afs/fusione.it root.cell -cell fusione.it -fast || true +fs mkm /afs/icemb.it root.cell -cell icemb.it -fast || true +fs mkm /afs/infn.it root.cell -cell infn.it -fast || true +fs mkm /afs/kloe.infn.it root.cell -cell kloe.infn.it -fast || true +fs mkm /afs/le.infn.it root.cell -cell le.infn.it -fast || true +fs mkm /afs/lnf.infn.it root.cell -cell lnf.infn.it -fast || true +fs mkm /afs/lngs.infn.it root.cell -cell lngs.infn.it -fast || true +fs mkm /afs/pi.infn.it root.cell -cell pi.infn.it -fast || true +fs mkm /afs/psm.it root.cell -cell psm.it -fast || true +fs mkm /afs/tgrid.it root.cell -cell tgrid.it -fast || true +fs mkm /afs/ictp.trieste.it root.cell -cell ictp.trieste.it -fast || true +fs mkm /afs/ing.uniroma1.it root.cell -cell ing.uniroma1.it -fast || true +fs mkm /afs/vn.uniroma3.it root.cell -cell vn.uniroma3.it -fast || true +fs mkm /afs/italia root.cell -cell italia -fast || true +fs mkm /afs/cmf.nrl.navy.mil root.cell -cell cmf.nrl.navy.mil -fast || true +fs mkm /afs/lcp.nrl.navy.mil root.cell -cell lcp.nrl.navy.mil -fast || true +fs mkm /afs/es.net root.cell -cell es.net -fast || true +fs mkm /afs/laroia.net root.cell -cell laroia.net -fast || true +fs mkm /afs/sinenomine.net root.cell -cell sinenomine.net -fast || true +fs mkm /afs/slackers.net root.cell -cell slackers.net -fast || true +fs mkm /afs/nikhef.nl root.cell -cell nikhef.nl -fast || true +fs mkm /afs/1ts.org root.cell -cell 1ts.org -fast || true +fs mkm /afs/bazquux.org root.cell -cell bazquux.org -fast || true +fs mkm /afs/coed.org root.cell -cell coed.org -fast || true +fs mkm /afs/dementia.org root.cell -cell dementia.org -fast || true +fs mkm /afs/firelion.org root.cell -cell firelion.org -fast || true +fs mkm /afs/hackish.org root.cell -cell hackish.org -fast || true +fs mkm /afs/idahofuturetruck.org root.cell -cell idahofuturetruck.org -fast || true +fs mkm /afs/nimlabs.org root.cell -cell nimlabs.org -fast || true +fs mkm /afs/nomh.org root.cell -cell nomh.org -fast || true +fs mkm /afs/oc7.org root.cell -cell oc7.org -fast || true +fs mkm /afs/openafs.org root.cell -cell openafs.org -fast || true +fs mkm /afs/e.kth.se root.cell -cell e.kth.se -fast || true +fs mkm /afs/hallf.kth.se root.cell -cell hallf.kth.se -fast || true +fs mkm /afs/isk.kth.se root.cell -cell isk.kth.se -fast || true +fs mkm /afs/it.kth.se root.cell -cell it.kth.se -fast || true +fs mkm /afs/md.kth.se root.cell -cell md.kth.se -fast || true +fs mkm /afs/mech.kth.se root.cell -cell mech.kth.se -fast || true +fs mkm /afs/nada.kth.se root.cell -cell nada.kth.se -fast || true +fs mkm /afs/pdc.kth.se root.cell -cell pdc.kth.se -fast || true +fs mkm /afs/stacken.kth.se root.cell -cell stacken.kth.se -fast || true +fs mkm /afs/syd.kth.se root.cell -cell syd.kth.se -fast || true +fs mkm /afs/physto.se root.cell -cell physto.se -fast || true +fs mkm /afs/sanchin.se root.cell -cell sanchin.se -fast || true +fs mkm /afs/su.se root.cell -cell su.se -fast || true +fs mkm /afs/f9.ijs.si root.cell -cell f9.ijs.si -fast || true +fs mkm /afs/p-ng.si root.cell -cell p-ng.si -fast || true +fs mkm /afs/phy.bris.ac.uk root.cell -cell phy.bris.ac.uk -fast || true +fs mkm /afs/hep.man.ac.uk root.cell -cell hep.man.ac.uk -fast || true +fs mkm /afs/rl.ac.uk root.cell -cell rl.ac.uk -fast || true +fs sa /afs/dulci.biostat.duke.edu system:anyuser rl +fs mkm /afs/.dulci.biostat.duke.edu root.cell -cell dulci.biostat.duke.edu -rw fs mkm /afs/.root.afs root.afs -rw -vos create snorklewacker a user -localauth -Volume 536870930 created on partition /vicepa of snorklewacker -fs mkm /afs/snorklewacker.mit.edu/user user -fs sa /afs/snorklewacker.mit.edu/user system:anyuser rl -vos create snorklewacker a service -localauth -Volume 536870933 created on partition /vicepa of snorklewacker -fs mkm /afs/snorklewacker.mit.edu/service service -fs sa /afs/snorklewacker.mit.edu/service system:anyuser rl -ln -s /afs/snorklewacker.mit.edu /afs/snorklewacker -ln -s /afs/.snorklewacker.mit.edu /afs/.snorklewacker -vos addsite snorklewacker a root.afs -localauth -Added replication site snorklewacker /vicepa for volume root.afs -vos addsite snorklewacker a root.cell -localauth -Added replication site snorklewacker /vicepa for volume root.cell +vos create riverside.dulci.biostat.duke.edu a user -localauth +Volume 536870918 created on partition /vicepa of riverside.dulci.biostat.duke.edu +fs mkm /afs/dulci.biostat.duke.edu/user user +fs sa /afs/dulci.biostat.duke.edu/user system:anyuser rl +vos create riverside.dulci.biostat.duke.edu a service -localauth +Volume 536870921 created on partition /vicepa of riverside.dulci.biostat.duke.edu +fs mkm /afs/dulci.biostat.duke.edu/service service +fs sa /afs/dulci.biostat.duke.edu/service system:anyuser rl +ln -s dulci.biostat.duke.edu /afs/dulci +ln -s .dulci.biostat.duke.edu /afs/.dulci +vos addsite riverside.dulci.biostat.duke.edu a root.afs -localauth +Added replication site riverside.dulci.biostat.duke.edu /vicepa for volume root.afs +vos addsite riverside.dulci.biostat.duke.edu a root.cell -localauth +Added replication site riverside.dulci.biostat.duke.edu /vicepa for volume root.cell vos release root.afs -localauth Released volume root.afs successfully vos release root.cell -localauth Released volume root.cell successfully -snorklewacker:/# ls /afs -andrew.cmu.edu dementia.org ir.stanford.edu snorklewacker -athena.mit.edu dev.mit.edu net.mit.edu snorklewacker.mit.edu -cs.cmu.edu ece.cmu.edu sipb.mit.edu umr.edu -snorklewacker:/# ls /afs/athena.mit.edu -activity contrib dept project service system -astaff course org reference software user -snorklewacker:/# ls /afs/snorklewacker +riverside:/home/faheem# cd /afs/dulci.biostat.duke.edu/ +riverside:/afs/dulci.biostat.duke.edu# ls service user -snorklewacker:/# -- 2.39.5