Hadrian Barron
๐ค SpeakerAppearances Over Time
Podcast Appearances
Yeah, that's a great point.
A lot of times customers are worried about opening up permissions or really at the end of the day, how do the permissions come over?
So there's two ports of it, right?
So one of them is maintaining control and making sure there's no data leakage.
And then the other one is making sure the apps and business processes still work.
That's, you know, maintaining control and data leakage is key, but that's really controlled through the export permission or the CIFS share permission, kind of at that gatekeeper level.
After that, the ACLs are within the share.
That's really about who can touch what process or what UID can do what.
Um, ripping that bandaid off, you know, say for Isilon, which emulates, um, we'll just invent kind of fake UIDs for NTFS users.
If it doesn't see that name mapping, it can be a real challenge.
And the sooner that the bandaid comes off, um, the better life will be, you know, for the long duration in having an administrator.
you know, an IP team to be able to easily support the customer.
And after that, life was calm, right, for NAS, right?
And that's, you know, that's really what the goal is, right?
We as storage teams shouldn't be having to think about what permission is this or that.
We just want to let...
you know, let the data get access the way it needs to, but not worry about, well, is it this mode bits or is it this NTFS hack, or let the end users
kind of get their job done, and that's it.
Yeah, at the end of the day, right, the, you know, the two keys for success on a migration are, you know, in terms of planning, right?
Planning is that really important thing to do before you just start moving bits.