And Linux Tools for Backup O P S E R

Total Page:16

File Type:pdf, Size:1020Kb

And Linux Tools for Backup O P S E R e s u y n a r o f e l b i s n o p s e r d l e h e b t o n n a c n o i s s i m m o C e h t d n a , r o h t u a e h t f o y l n o s w e i v e h t s t c e HOGSKOLAN ISKOVDE(HIS) Content createdby: see theIMSdeployedinourMoodle platform. the sources in ELP format (ExeLearning) or enjoy this cisoss.eu content. to Visit download Remember: This is not the best format to l f e r n o i t a c i l b u p . ) s / i 0 h . T 4 / . a n s o - i y s s b i / s m e s PILOT VERSION PILOT m n o e c C i l / n a g r e o p . o s r n u o E m e m h t o c m e o v r i t f a t e r r o c p / / p : s u s p t t h t h i ( w ” l d a e n d o . i n t n u i a f e n r r n e e e t h e t n b I d s e 0 a . n i h 4 a ) t e 8 n k i 5 o l 8 c A 5 n e 1 r o 0 i a - t h a 2 S 0 - m 2 r n o o A f i t n K i u - b 1 e i 0 r h t t S t f E A o - s 1 e - n d 5 o a 1 m 0 m 2 m e ( o b t c C y e a e j v o m i r t p h a c e s i i r h h C T w “ e s u y n a r o f e l b i s n o Backup systems p s e r d l Backup systems e h e b t Content created by: o n n a c HOGSKOLAN I SKOVDE (HIS) n o i s s i m 1. Introduction m o C e Information can be considered more valuable than the hardware that generated it and in many h t d cases irreplaceable. n a , r It is therefore important that it is possible to recover information in case of hardware failure o h t or if files and data gets lost or corrupted for other reasons. u a It can also be the case that there is a need to recover data from some earlier point in time e h t according to an established data retention policy. f o y For these reasons it is important to perform backup on systems. l n o The primary purpose of a backup system is to copy and archive data from computers so that data s w can be recovered. e i v e h t s t c 2. Components of a backup strategy e l f e r The list below shows the essential components of a backup strategy. n o i t a c i Storage l b u Model for data repositories p . ) s / i Storage media 0 h . T 4 / . Processing of data repositories a n s o - i y Choice, extraction, and manipulation of data s s b i / s Management of the backup process m e s m n Goals o e c C i l / Limitations n a g r e o p Implementation . o s r n u Evaluation of the backup-process o E m e m h t o c m e 2.1 Storage o v r i t f a t 2.1.1 Model for data repositories e r r o c p / / p : s u The list below describes different aspects of a model for data repositories. s p t t h t h i ( w ” The model explicates how data are stored during backup l d a e n d Unstructured backup o . i n t n u i a f e For example a number of CDs or DVDs accompanied with some documentation about n r r n e e e t h what was backed up and when the backup was done e t n b I d s e This approach may be the easiest to implement 0 a . n i h 4 a ) It can, however, be difficult to recreate the data in the same way it was stored t e 8 n k i 5 o l Full and incremental backup 8 c A 5 n e 1 r o This approach avoids copying all data every time a backup operation is performed 0 i a - t h a 2 S First, a full backup is performed, thereafter a number of smaller incremental backups are 0 - m 2 r n o o A performed f i t n K i u - b To recover information at a certain point in time: 1 e i 0 r h t t S t Localise the latest full backup taken before the certain point in time, and thereafter f E A o - s 1 e the incremental backups until the certain point in time - n d 5 o a 1 m Continuous backup 0 m 2 m e ( o b Logs every change at the local host at byte level rather than at file level as for full and t c C y e a e j incremental backup v o m i r t p h a Rollback is possible in order to recover information c e s i i r h h C T w “ Writing is performed to another disk (a different computer on the network) when writing to e the "primary" disk s u y n a 2.1.2 Storage media r o f e l The list below describes different relevant storage media used for backup purposes. b i s n o p Magnetic tapes s e r Traditionally the most used medium for backup d l e Offers a good capacity/price quota h e b There are many different variants of magnetic tapes t o It is a sequential medium which implies slow (random) access n n a c Usually writing and reading is fast n o Hard disk i s s i Continuously improved capacity/price quota m m fast access and often easy to use o C External interfaces available (SCSI, USB, Firewire, etc.) e h t Optical disk d n CD/DVD/Blu-Ray etc. a , r o Can be restored from all computers with a compatible reading device h t u Relatively cheap and easy to handle a e May sustain data for 20-100 years (according to the Optical Storage Technology h t f o Association) y l Flash memory n o s USB-sticks, SD, memory stick, etc. w e i Relatively low capacity/price quota v e Good portability between different operating systems and are often considered easy to use h t s t Remote backup c e l Backup to a different storage location via Internet f e r It may be considered an advantage that the backup will be physically separated from the n o i t local disk that was backed up a c i l Potential disadvantages: b u p Internet transmission may become a bottleneck compared to local storage . ) s / i 0 h alternatives . T 4 / . a There may be security issues when transmitting information over the Internet n s o - i y s s b i / s m 2.1.3 Processing of data repositories e s m n o e c C i The list below describes different methods for processing of data repositories. l / n a g r e o p . o s On-line data repository r n u o E This is the most accessible type of data repository m e m h t Information can be recovered within milliseconds (or less) o c m e o Example: hard disk v r i t f a t There is a risk of unintentionally overwriting or deleting information or being subjected to e r r o c p / / virus attacks p : s u s p Near-line data repository t t h t h i ( This type of repository is less accessible compared to on-line data repository w ” l d a Example: Library of magnetic tapes e n d o . i n t n Information can be recovered within seconds or minutes u i a f e n r r n A tape robot can exchange tapes in the recorder e e e t h e t n b I Off-line data repository d s e 0 a . n i Resembles near-line data repository, but requires human interaction in order to make h 4 a ) t e 8 n k storage media accessible i 5 o l 8 c A 5 Information may be recovered within seconds to hours n e 1 r o 0 i a - t h Off-site vault data repository a 2 S 0 - m 2 r n Useful in case of a disaster o o A f i t n K Information is stored at backup media at a different geographical location i u - b 1 e i 0 r h Example: the local office of the system administrator, or a bunker below ground level t t S t f E A o - Backup site data repository s 1 e - n d 5 o Useful in case of a major disaster a 1 m 0 m 2 Information is stored at backup media at a different geographical location m e ( o b t c C y Equipment for recovering the information is kept at the same backup site e a e j v o m i r There is a specific building for the purpose t p h a c e s i i r This is an expensive method for processing of data repositories h h C T w “ 2.2 Choice, extraction, and manipulation of data e s u 2.2.1 Choice and extraction of file data y n a r A central aspect is what information that should be backed up.
Recommended publications
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • NETS1028 06 Backup and Change Mgmt
    Security Design Backup and Change Management System Examination System Configuration Firewalls and Filters Hardening Software Backups and Change Management Access Control and Authentication Virtual Private Networking Logging and Monitoring Security Policy and Management Support SELinux Linux Systems Security NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Backup • Security breaches can cast doubt on entire installations or render them corrupt • Files or entire systems may have to be recovered from backup • Many tools are available to help with this task in Linux • Two of the more commonly used ones are rsync and duplicity https://en.wikipedia.org/wiki/Rsync http://duplicity.nongnu.org/features.html NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Legacy Tools • cp is the original way to make a copy of files, but assumptions people make cause problems in using it • GUI-based drag and drop tools make the assumptions problem worse • cpio, tar are archival tools created to copy files to backup media (tape by default) - satisfactory for years but they make it cumbersome to manage backup media https://en.wikipedia.org/wiki/Manuscript_culture • Various software packages provide frontends to these tools in order to make backup/restore easier to manage and more robust NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Rsync • Rsync has a command line interface which resembles a smart cp, and provides a base for many backup software packages with GUIs • Can preserve special files such as links and devices • Can copy
    [Show full text]
  • Instalación Y Configuración Del Servidor De Copias De Seguridad AMANDA Y Sus Clientes
    Instalación y Configuración del Servidor de Copias de Seguridad AMANDA y sus Clientes José Luis Torices Sorribas Universidad de León, España [email protected] Este documento muestra cómo instalar y configurar el servidor de copias de seguridad Amanda y los clientes tanto Linux como Windows (mediante el uso de Samba). Todo el proceso está pensado para la distribución Debian GNU/Linux siendo de fácil adaptación para las otras distribuciones existentes. Pretende ser una guía que muestre el proceso de una forma genérica, teniendo que ser adaptado el proceso para cada situación específica. Introducción El motivo por el que se ha elegido Amanda (http://www.amanda.org/) para este cometido es principalmente su versatilidad, ya que permite cubrir la necesidad de salvaguardar información importante almacenada tanto en el propio servidor como en los clientes (tanto Linux como Windows) en todos los soportes posibles: dispositivos multicinta, unidades grabadoras de CD, discos ópticos, e incluso discos duros. Además esta tarea puede ser realizada cómodamente de modo automático mediante la introducción de Amanda en el cron. Este documento está enfocado hacia la realización de las copias de seguridad utilizando el disco duro como soporte, por lo tanto se omite todo lo referente a la utilización de otro tipo de dispositivos, como pueden ser cintas o cd´s (puede encontrarse información en las referencias de la sección "Más Información" de este mismo documento). Veremos el proceso de instalación y configuración para nuestro sistema particular, pero tratando siempre de darle un enfoque lo más genérico posible. Se explicarán las secciones más importantes de los ficheros de configuración del servidor y clientes y se estudiarán mediante ejemplificaciones los reportes proporcionados por Amanda.
    [Show full text]
  • Gestión De Respaldos En Debian
    Gestión de respaldos en Debian Los ordenadores en algún momento fallan o errores humanos causan daños al sistema y los datos. Las operaciones de copia de seguridad y recuperación son una parte esencial de la administración del sistema para que el mismo se recupere después de un fallo y siga funcionando correctamente. Para ello, existen tres puntos clave a tener en cuenta para determina la política del respaldo. 1. Saber qué debemos respaldar. 2. Saber cómo respaldar y recuperar en caso de fallo. 3. Evaluación de riesgos y costos involucrados. Debemos respaldar los siguientes archivos: Archivos de datos directamente creados por el usuario: datos en "~/". Archivos de datos creados por las aplicaciones utilizadas: datos en "/var/", exceptuando "/var/cache/", "/var/run/", y "/var/tmp/". Archivos de configuración del sistema: datos en “/etc/”. Softwares locales: datos en “/usr/local/” o “/opt/”. Información de instalación del sistema: un archivo de texto sin formato con los pasos claves (particiones, etc). Demostración del conjunto de datos: confirmado por las operaciones de recuperación experimentales realizadas con antelación. Al realizar el respaldo, debemos tener en cuenta los siguientes puntos: El almacenamiento seguro de datos: protección sobre los fallos de sistema y la sobreescritura. Realizar copias de seguridad frecuentes: de forma programada. La copia de seguridad debe ser redundante: duplicación de datos (data mirroring). El proceso debe ser fácil: en lo posible que requiera solo un comando para la copia de seguridad. Debemos realizar una evaluación del proceso a utilizar: Valor de los datos en caso de pérdidas. Los recursos necesarios para la copia de seguridad: usuario, hardware y software.
    [Show full text]
  • Synchronize Documents Between Computers
    Synchronize Documents Between Computers Helladic and unshuttered Davidde oxygenizes his lent anted jaws infuriatingly. Is Dryke clitoral or vocalic when conceded some perpetualities hydrogenate videlicet? Geoff insufflates maritally as right-minded Sayre gurgles her immunochemistry slots exaltedly. Cubby will do exactly what is want Sync folders between systems on the internet It benefit cloud options as fresh but they demand be ignored if you'd telling It creates a. Sync Files Among Multiple Computers Recoverit. Cloud Storage Showdown Dropbox vs Google Drive Zapier. This means keeping files safe at the jump and syncing them control all of. Great solution for better than data synchronization history feature requires windows live id, cyber security purposes correct drivers with? If both PC are knew the complex kind no connection and when harm would happen. How to Sync Between Mac and Windows Documents Folder. It is so if they have access recently modified while both computers seamlessly across all backed up with documents or backup? File every time FreeFileSync determines the differences between input source review a target. How to synchronize a Teams folder to separate local Computer. Very much more, documents is well. So sent only sync a grant key files to new devices primarily my documents folder and custom folder of notes It's also five gigabytes of parcel and generally. Binfer is a cloudless file transfer authorities that allows you to sync files between devices without the complex being stored or replicated on any 3rd party systems Binfer. Does Windows 10 have wealth Transfer? File Sync Software Synchronize files between multiple.
    [Show full text]
  • Sun Storagetek 5320 NAS Appliance and Gateway Administration Guide
    Sun StorageTek™ 5320 NAS Appliance and Gateway Administration Guide NAS Software Version 4.12 Sun Microsystems, Inc. www.sun.com Part No. 819-6388-10 May 2006, Revision A Submit comments about this document at: http://www.sun.com/hwdocs/feedback Copyright 2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. This document and the product to which it pertains are distributed under licenses restricting their use, copying, distribution, and decompilation. No part of the product or of this document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and in other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Java, AnswerBook2, docs.sun.com, Sun StorEdge, Sun StorageTek, Java, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and in other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc.
    [Show full text]
  • Tuesday October 20: a Guide to Event-Driven SRE-Inspired Devops 16:55 GMT-3 / 15:55 GMT -4 / 14:55 GMT -5 / 12:55 GMT -7
    Buenos Aires, Arg.: GMT -3, ART New York, USA., Toronto and Montreal, Ca.: EDT, GMT -4 Texas, USA., Winnipeg, Ca.: CDT, GMT -5 California, USA., Vancouver, Ca: PDT, GMT -7 Twitter: @nerdearla Website: https://nerdear.la/en/ ​ Schedule (in spanish with Argentine GMT -3 timezone): https://nerdear.la/agenda/ ​ How to register? See at the end of this document for a step by step guide. Tuesday October 20: A Guide to Event-driven SRE-inspired DevOps 16:55 GMT-3 / 15:55 GMT -4 / 14:55 GMT -5 / 12:55 GMT -7 We have broken our monoliths into event-driven microservice architectures! Yet, many of us are still using old monolithic pipeline approaches to delivery & operations. Let me show you a modern open source event-driven approach to delivery & operations with the safety net of SRE! By Andreas Grabner — DevOps Activist FreeBSD: Code, Community and Collaboration 17:55 GMT-3 / 16:55 GMT -4 / 15:55 GMT -5 / 13:55 GMT -7 The FreeBSD Open Source Operating System is one of the oldest, largest, and most successful open source projects, with a long history of innovation. FreeBSD descended from Berkeley Unix back in the early ’90s, with its lineage dating back 50 years to the original UNIX. It’s known for its reliability, stability, and advanced networking and performance. Deb will take you through its long history and highlight some of the features that set FreeBSD apart from other operating systems. She’ll describe how the FreeBSD Project works and how you can contribute to the Project. She will point out some of the differences between FreeBSD and Linux, and share why individuals and companies use FreeBSD.
    [Show full text]
  • ERDA User Guide
    User Guide 22. July 2021 1 / 116 Table of Contents Introduction..........................................................................................................................................3 Requirements and Terms of Use...........................................................................................................3 How to Access UCPH ERDA...............................................................................................................3 Sign-up.............................................................................................................................................4 Login................................................................................................................................................7 Overview..........................................................................................................................................7 Home................................................................................................................................................8 Files..................................................................................................................................................9 File Sharing and Data Exchange....................................................................................................15 Share Links...............................................................................................................................15 Workgroup Shared Folders.......................................................................................................19
    [Show full text]
  • Managing Many Files with Disk Archiver (DAR)
    Intro Manual demos Function demos Summary Managing many files with Disk ARchiver (DAR) ALEX RAZOUMOV [email protected] WestGrid webinar - ZIP file with slides and functions http://bit.ly/2GGR9hX 2019-May-01 1 / 16 Intro Manual demos Function demos Summary To ask questions Websteam: email [email protected] Vidyo: use the GROUP CHAT to ask questions Please mute your microphone unless you have a question Feel free to ask questions via audio at any time WestGrid webinar - ZIP file with slides and functions http://bit.ly/2GGR9hX 2019-May-01 2 / 16 Intro Manual demos Function demos Summary Parallel file system limitations Lustre object storage servers (OSS) can get overloaded with lots of small requests I /home, /scratch, /project I Lustre is very different from your laptop’s HDD/SSD I a bad workflow will affect all other users on the system Avoid too many files, lots of small reads/writes I use quota command to see your current usage I maximum 5 × 105 files in /home, 106 in /scratch, 5 × 106 in /project (1) organize your code’s output (2) use TAR or another tool to pack files into archives and then delete the originals WestGrid webinar - ZIP file with slides and functions http://bit.ly/2GGR9hX 2019-May-01 3 / 16 Intro Manual demos Function demos Summary TAR limitations TAR is the most widely used archiving format on UNIX-like systems I first released in 1979 Each TAR archive is a sequence of files I each file inside contains: a header + some padding to reach a multiple of 512 bytes + file content I EOF padding (some zeroed blocks) at the end of the
    [Show full text]
  • Hitachi Content Platform
    Hitachi Content Platform 8.1 HCP 8.1 Release Notes HCP Software Version 8.1.0.30-PL8 HCP Operating System Version 8.1.0.507 RN-RC001-59 November 2018 © 2014, 2018 Hitachi Vantara Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials, provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video, and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1.
    [Show full text]
  • Backup4all Take Full Control of Your Backup
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2016 Softland Backup4all User Manual for Backup4all version 6 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line Parameters.......................................................................................................................................................... 11 4 Features
    [Show full text]
  • Brightstor Arcserve Backup for Linux Administrator Guide
    BrightStor® ARCserve® Backup for Linux Administrator Guide r11.5 D01211-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. ("CA") at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
    [Show full text]