Solved

What and how to backup zcs 6.0.x?

Posted on 2011-03-01
4
558 Views
Last Modified: 2012-05-11
This is using zimbra collaboration suite 6.0.6 64bit, in SUSE Linux Enterprise 11. What have to backup the zimbra, in order to restore it if needed? Should I have to jot down the domain name, hostname, password, certificate, local configuration, in case it needed to be restore? Is there any comprehensive way of backing it up?
0
Comment
Question by:Balack
  • 2
  • 2
4 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 35012821
0
 

Author Comment

by:Balack
ID: 35013707
Hi gheist,

Just to verify, that means I have to stop the zimbra services and than run "cp /opt/zimbra /backup" to make a full copy?

How about checking the setup and configurations of zimbra? such as hostname, domain name? list of mailboxes? Should I look for zmlocalconfig?
0
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 35013750
All scripts do it. Shutdown / snapshot / startup  best if you have a cluster...
0
 

Author Closing Comment

by:Balack
ID: 35033629
no choice
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
linux 2 101
IPA - can it be run on a web server? 3 182
IPA and Samba (and NFS and Samba....) 1 134
dns master and slave in linux 2 69
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question