Solved

Cyrus mailbox transfers

Posted on 2004-08-07
3
1,232 Views
Last Modified: 2009-12-16
Hi (Jim ;) )
I had to take a server down while in full use by users. Not all mailboxes could be "cleaned" via POP3 before I disconnected, so some of the mailboxes still have messages in them.

I've built a new server and installed a newer version of cyrus etc, and I just want to confirm/find out what the correct way is to rebuild the mailboxes.

Can I just create all the accounts as per old system, then copy the message files into the new boxes and use the reconstruct command or must I copy the cyrus.header, cyrus.cache etc files as well?



0
Comment
Question by:psimation
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 50 total points
ID: 11745267
> Can I just create all the accounts as per old system, then copy the message files into the new boxes and use the reconstruct command.

Bascially yes, but that won't handle sub-folders of user's mail boxes. That might not be a problem if all of the users were POP clients since POP doesn't allow for sub-folders. To handle sub-folders uyou need to dump the mailboxes DB to a flat file (ctl_mboxlist -d >mailboxes) and import it on the new server. (ctl_mboxlist -u <mailboxes)
0
 
LVL 17

Author Comment

by:psimation
ID: 11746660
Thanks Jim
Luckily none of my users use POP3 ( iprefer it that way, else they hog the server space...)

Anyway, it worked like a charm, it just obviously didn't pick up the "seen" status for the one IMAP account I use, but that is minor ( would it have done so if I copied the cyrus header files as well? - was afraid to do that between 2 different versions of Cyrus)

0
 
LVL 40

Expert Comment

by:jlevie
ID: 11746842
You loose the seen state when making a big jump in Cyrus versions unless you do an IMAP copy of the data from one server to another.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux Mint 18 31 78
linux apache localhost dev laptop 5 48
bad ownership or modes for chroot directory 6 68
Changing passwords in Linux Systems 3 42
Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now