Solved

Cyrus mailbox transfers

Posted on 2004-08-07
3
1,235 Views
Last Modified: 2009-12-16
Hi (Jim ;) )
I had to take a server down while in full use by users. Not all mailboxes could be "cleaned" via POP3 before I disconnected, so some of the mailboxes still have messages in them.

I've built a new server and installed a newer version of cyrus etc, and I just want to confirm/find out what the correct way is to rebuild the mailboxes.

Can I just create all the accounts as per old system, then copy the message files into the new boxes and use the reconstruct command or must I copy the cyrus.header, cyrus.cache etc files as well?



0
Comment
Question by:psimation
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 50 total points
ID: 11745267
> Can I just create all the accounts as per old system, then copy the message files into the new boxes and use the reconstruct command.

Bascially yes, but that won't handle sub-folders of user's mail boxes. That might not be a problem if all of the users were POP clients since POP doesn't allow for sub-folders. To handle sub-folders uyou need to dump the mailboxes DB to a flat file (ctl_mboxlist -d >mailboxes) and import it on the new server. (ctl_mboxlist -u <mailboxes)
0
 
LVL 17

Author Comment

by:psimation
ID: 11746660
Thanks Jim
Luckily none of my users use POP3 ( iprefer it that way, else they hog the server space...)

Anyway, it worked like a charm, it just obviously didn't pick up the "seen" status for the one IMAP account I use, but that is minor ( would it have done so if I copied the cyrus header files as well? - was afraid to do that between 2 different versions of Cyrus)

0
 
LVL 40

Expert Comment

by:jlevie
ID: 11746842
You loose the seen state when making a big jump in Cyrus versions unless you do an IMAP copy of the data from one server to another.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
winscp where are logs stored 3 69
VMware Tools Install On Linux Problem 3 101
Samba 4, Users Permission, 5 62
IMAP copying tool 14 43
Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question