When Bad Things Happen to Good Amanda Backup Servers
|
|
|
- Annabella Francis
- 10 years ago
- Views:
Transcription
1 When Bad Things Happen to Good Amanda Backup Servers By Lois Garcia, Dmitri Joukovski and Pavel Pragin White Paper "Even if your backup system makes volumes that can be read by native backup utilities, without a database that identifies what s where, you have no idea what system is on what volume That means that this database has now become the most important database in your company. You need to make sure that it is backed up, and its recovery should be the easiest and most tested recovery in your entire environment." W. Curtis Preston Unix Backup and Recovery That s just perfectly normal paranoia. Everyone in the Universe has that. Slartibartfast The Ultimate Hitchhiker's Guide to the Galaxy by Douglas Adams Abstract This white paper describes methods of devising a multi-layered protection to the Amanda backup server by using Amanda backups and the standard operating systems tool rsync.
2 Table of Contents Ensuring the Availability of the Amanda Backup Server 3 Protecting the Amanda Server 3 Granular Protection 4 The Application Files 4 The Configuration Files 4 Methodology 5 Using Rsync to Protect the Amanda Server 5 Prerequisites 6 Deployment 7 Verifying and Restoring 9 Using Amanda Tape Backups to Protect Your Amanda Server 11 Prerequisites 11 Deployment 11 Verifying and Restoring 13 Best Practices 15 Conclusion 16 Please send your comments about this white paper to [email protected] 2
3 Ensuring the Availability of the Amanda Backup Server After purchasing a new tape library and evaluating several options for backup software you finally designed a backup strategy for your organization. You have spent considerable time on research and testing, you have set up your Amanda backups to reliably run according to your backup policy. The Amanda backup server has gone through a couple of dump cycles and after several tests you are confident you can reliably restore files from your backups. Your data recovery procedures are in a safe place, and you have accomplished what you had in mind... or have you? What happens if your backup server is compromised? Multiple surveys consistently show that a major percentage of data loss is caused by hardware or system malfunctions (40% to 60%) and by human error (20% to 30%) such as accidental file deletion. The backup server is as vulnerable to these types of outages as is any other server. To comprehensively protect against data loss, a well-executed backup plan must provide coverage for all types of situations. Your Amanda backup server itself must be easily recoverable and you should test the disaster recovery of your backup server several times under different scenarios. Since your Amanda backup server protects all the rest of your systems, that backup server could be considered the most important server in your organization and should have more than one layer of protection. The purpose of this white paper is to describe methods of devising multi-layered protection for the Amanda backup server by using Amanda backup software and the standard operating systems tool rsync. Protecting the Amanda Server Whether through hardware failure or file system corruption, loss of the Amanda configuration files, file indexes, and other dynamic records that reside on the backup server would not only interrupt your backup schedule but also make it more difficult to recover files from all computers protected by Amanda. Of course, since Amanda does not use any proprietary formats, you can always recover your files even without having Amanda installed, but a working installation of Amanda makes file restores so much easier. For more information about Amanda, please review the white papers and technical presentations about Amanda available to subscribers of Zmanda Network. Amanda depends on the configuration files to control backup media, to calculate dump cycles, to know exactly what is to be backed up, to send to the correct address, where to find a file for restore, and for other information relevant to your environment. The Amanda curinfo and index directories contain information that is updated at the time of every backup. Depending on the degree of customization and complexity in your backups and your environment, returning to your regular backup schedule could mean a considerable loss of productivity. Loss of regular backup capability might also leave the enterprise out of compliance with increasingly stringent state and federal regulations. 3
4 To protect the Amanda server, the first recommendation is to always make the server an Amanda client and add the server to your disk list entries (DLEs). Installing an Amanda client on the backup server and backing up the server's file system ensures the server's future availability. You have the ability to restore the server to its state at varying points in its history, for example, to its state before a disk crash. Amanda can communicate with standard operating system tools such as tar and dump, so you can perform a restore from backup media without Amanda software. Restore the Amanda server first, then restore the remainder of your data with the convenience of the Amanda interface. Granular Protection The Amanda server architecture consists of the base application and its associated configuration files. During the course of a backup cycle, backup logs, database and index files are created that are specific to that backup cycle and that are critical for Amanda's functionality. The Application Files The original software packages you used to install Amanda might not always be available when you need them. Even if you are on a timely upgrade schedule, there is no guarantee that when disaster strikes you will be on the latest Amanda release. Each release includes versions of Amanda executables and libraries. Always save a copy of the build that you have currently installed, whether it is a prebuilt package or one that you have built yourself from source. The Configuration Files Having your Amanda configuration files available in addition to the base application greatly simplifies data recovery. If you have followed the suggested configuration steps, the /etc/amandates file, the /etc/dumpdates file, and the /etc/amanda and /var/lib/amanda directories contain everything needed to return a default Amanda server installation to your individual setup. If you have changed the locations of any critical files, remember to adapt the instructions to conform to your changes. /etc/amandates and /etc/dumpdates Contain filesystem/directory names, dump levels and dump dates. This information is used to determine the need for incremental backups. The amandates file tracks Amanda's use of tar to perform incremental backups, while the dumpdates file tracks the use of dump. /etc/amanda The /etc/amanda directory holds a subdirectory for each backup configuration you have created. In each subdirectory is the amanda.conf file that regulates that backup 4
5 configuration. You will also find backup log files, the disklist file, the tapelist files, tape changer configuration files, and the curinfo and index directories. Both the curinfo and index directories contain crucial data related to your backups. The contents of the /etc/amanda directory change upon every backup and at every backup configuration modification. Note that the dynamic nature of the curinfo and index databases, as well as the /etc/amandates and /etc/dumpdates file, and the backup log files, affects the ability to use Amanda to backup its own server configuration. /var/lib/amanda By default, /var/lib/amanda is the home directory of the amandabackup user if you install from Amanda RPMs built by Zmanda. This directory holds typical user information, such as the.ssh directory containing user authentication details. Another important Amanda file in /var/lib/amanda is the hidden file,.amandahosts. The.amandahosts file facilitates connections between the Amanda backup server and its clients which is similar in function to the.rhosts file for rsh. Methodology Given the importance of the Amanda server to the enterprise and the highly stressful conditions surrounding most disaster recovery procedures, a streamlined method to recover the Amanda server is a sensible component of any business continuity planning. With the Amanda server file system backed up as part of your regular backup plan, the first level of the protection scheme for your Amanda server is accomplished. The next level is to protect just the configuration files. Keep in mind that some Amanda configuration files, e.g. logs, change when you backup the Amanda server itself. To get exact copies of all of your Amanda configuration files after a backup, including backup of the server itself, is complete, you can use rsync. Using Rsync to Protect the Amanda Server rsync is an open source UNIX/Linux utility which synchronizes files and directories from one location to another while minimizing data transfer using delta encoding when appropriate. rsync can be used to easily and reliably keep a copy of your Amanda configuration files in a safe location. In-depth information about rsync is available from the rsync website. Here we will provide just a brief overview of rsync functionality that is relevant to our illustration of how to use it for protecting the Amanda server. rsync works incrementally in that it copies only the changes to files, minimizing the size and length of transfers. Even though each data transfer is incremental, rsync keeps only one, up-to-date version of a file. rsync runs over rsh by default, but can be run over any shell, including ssh, and in daemon mode runs directly over TCP/IP. rsync has a long list of options that have been developed over time so that you can continue its use as your 5
6 needs become more complex. Some additional features of rsync are: support for copying links, devices, owners, groups, and permissions exclude options can use any transparent remote shell, including ssh or rsh does not require super-user privileges support for anonymous or authenticated rsync daemons To create and maintain a repository of Amanda configuration files, we will run rsync from an rsync server, separate from the Amanda server. We will put rsync into a script so that we can run the script from a crontab automatically or run the script manually as needed. Prerequisites Start with the Amanda server whose configuration you want to backup. We used a server based on Amanda RPMs built by Zmanda and freely available from the Zmanda downloads page. In addition to the Amanda server installation, you will need: 6
7 An rsync server on which to replicate your Amanda configuration files rsync and OpenSSH installed on the Amanda server and on the rsync server root access to the Amanda server and the rsync server Amanda client software installed on the rsync server. This is to ensure an identical amandabackup Amanda user on both machines. Deployment The rsync server will host an rsync script and will also be the repository of the duplicate Amanda server files. This server can reside anywhere, as long as you can reach it with ssh over a TCP/IP connection. 1. For rsync to run over a non-interactive secure shell (SSH) connection, we have to generate a public and private key pair for the amandabackup user. rsync connects non-interactively but securely across the network using ssh. If you have already generated ssh keys while under the amandabackup user account, you can skip the following ssh-related steps. amandabackup@iron:~> ssh-keygen -t rsa The generated files are saved in the directory /var/lib/amanda/.ssh amandabackup@iron:~> cd ~amandabackup/.ssh; ls -l total 16 -rw amandabackup disk :10 authorized_k eys -rw amandabackup disk :13 id_rsa -rw-r--r-- 1 amandabackup disk :13 id_rsa.pub -rw-r--r-- 1 amandabackup disk :23 known_hosts 2. Create an authorized_keys file in the.ssh directory in the home directory of the amandabackup user on the Amanda backup server machine (Quartz), and append the contents of the public key file, id_rsa.pub, created on Iron. If you have already begun a keyring, add the new key. Note that you cannot just transfer and rename the file. The contents of the id_rsa.pub file must be appended to the authorized_keys file. Make sure the permissions on the authorized_keys file are read and write for amandabackup, with no permissions for anyone else. Also compare file sizes; both files should be exactly the same. 3. Test the new key pair. The first time you login, you will be prompted to add Iron to the list of known hosts on Quartz. amandabackup@iron:~> ssh quartz.zmanda.com The authenticity of host 'quartz ( )' can't be estab lished. RSA key fingerprint is 07:bf:c0:b7:7a:69:47:6c:a4:4d:31:f8:63:38: 00:5e. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'quartz, ' (RSA) to the l ist of known hosts. 7
8 4. Return to Iron and create the rsync directories where the Amanda server configuration files will be mirrored. exit logout Connection to quartz closed. mkdir /amandamirror/etc_amanda mkdir /amandamirror/etc_amandates mkdir /amandamirror/etc_dumpdates mkdir /amandamirror/var_lib_amanda ls -l /amanda* /amandamirror: total 0 drwxr-xr-x 3 amandabackup disk :23 etc_amanda drwxr-xr-x 2 amandabackup disk :26 etc_amandates drwxr-xr-x 2 amandabackup disk :27 etc_dumpdates drwxr-xr-x 3 amandabackup disk :28 var_lib_amanda 5. Add the rsync commands to a script that can be run manually or placed in a crontab. amandabackup@iron:~> pwd /var/lib/amanda amandabackup@iron:~> vi sync #!/bin/bash rsync -av [email protected]:/etc/amanda /amandamirro r/etc_amanda >> /var/lib/amandabackup/sync.log rsync -av [email protected]:/etc/amandates /amandami rror/etc_amandates >> /var/lib/amandabackup/sync.log rsync -av [email protected]:/etc/amandates /amandami rror/etc_dumpdates >> /var/lib/amandabackup/sync.log rsync -av [email protected]:/var/lib/amanda /amandam irror/var_lib_amanda >> /var/lib/amandabackup/sync.log amandabackup@iron:~> chmod 700 sync amandabackup@iron:~> ls -l sync -rwx amandabackup disk :08 sync amandabackup@iron:~> 6. The sync script should run after, but never during, a backup, because Amanda updates several files during every backup. If you run rsync before Amanda has completed the backup, your results will be corrupt. The following cron example runs sync twice a day at 7:30 am and 7:30 pm. amandabackup@iron:~> crontab -e 30 7,19 * * * /var/lib/amanda/sync crontab: installing new crontab 8
9 Verifying and Restoring Let's test our work so far. 1. As the amandabackup user, run sync. 2. Look for a sync.log file in your home directory as amandabackup. amandabackup@iron:~> ls -l total 8 -rwx amandabackup disk :00 sync -rw-r--r-- 1 amandabackup disk :00 sync.log amandabackup@iron:~> cat sync.log receiving file list... done sent 20 bytes received 950 bytes bytes/sec total size is speedup is receiving file list... done sent 20 bytes received 90 bytes bytes/sec total size is 0 speedup is 0.00 receiving file list... done sent 20 bytes received 107 bytes bytes/sec total size is 0 speedup is 0.00 receiving file list... done sent 20 bytes received 367 bytes bytes/sec total size is speedup is The directories created under /amandamirror on Iron should now reflect the contents of the directories named in the sync script. Backup configurations and indexes should now all be safely mirrored. amandabackup@iron:~> cd /amandamirror amandabackup@iron:/amandamirror> ls etc_amanda etc_amandates etc_dumpdates var_lib_amanda amandabackup@iron:/amandamirror> tree. -- etc_amanda `-- amanda `-- test -- amanda.conf -- amdump.1 -- amdump.2 -- amdump.3 -- amdump.4 -- amdump.5 -- amdump.6 -- amdump.7 -- changer.conf-access 9
10 -- changer.conf-clean -- changer.conf-slot -- curinfo `-- copper.zmanda.com -- _amandadownloads `-- info `-- _boot `-- info -- disklist -- index `-- copper.zmanda.com -- _amandadownloads _0.gz _1.gz ` _1.gz `-- _boot _0.gz ` _1.gz -- log log log log log log log oldlog -- tapelist -- tapelist.amlabel `-- tapelist.yesterday -- etc_dumpdates `-- dumpdates -- etc_amandates `-- amandates `-- var_lib_amanda `-- amanda -- example `-- amanda.conf `-- gnutar-lists 17 directories, 31 files 4. Replication was successful! To complete the scenario, the true test (of any backup) is a successful restore. The rsync restores must be run as the root user on the Amanda backup server. 5. To understand the directories and files that need to be restored, look in the /amandamirror directory on your rsync server, Iron. The replication directories were named to give a visual clue as to the original location of the directories and file. iron:~ # cd /amandamirror iron:/amandamirror # ls etc_amanda etc_amandates etc_dumpdates var_lib_amanda iron:/amandamirror # 10
11 6. Then, as the root user on your Amanda server, Quartz, issue the corresponding rsync restore commands. quartz:~ # rsync -a root@iron:/amandamirror/etc_amanda/ /etc/ quartz:~ # rsync -a root@iron:/amandamirror/etc_amandates/ /etc/ quartz:~ # rsync -a root@iron:/amandamirror/etc_dumpdates/ /etc/ quartz:~ # rsync -a root@iron:/amandamirror/var_lib_amanda/ /var/ lib/amanda Using Amanda Tape Backups to Protect Your Amanda Server In addition to adding the Amanda server filesystem to your regular backup schedule, you can add targeted backups of the Amanda configuration and database files. Targeting these files will ease your recovery efforts, simplifying their accessibility from tape and so shortening the time required to return your Amanda backup server to production. We will isolate these critical Amanda files, similarly to how we targeted the files in the rsync method, except that in this case we will backup the files to tape. It's important to note that because Amanda writes to server files during a backup, certain log files cannot be captured by an Amanda backup except in their most recent state prior to the backup. Amanda is still running as it backs up its own log files and database information, so the configuration backup will always be one backup behind. When disaster recovery is performed, the Amanda database will not be as current as the last backup. It will be as current as the backup before the last. Prerequisites You need only an Amanda backup server installation with root and the Amanda user account access, in our case, amandabackup. Deployment 1. To make sure that every Amanda backup includes a backup of the most recent set of server configuration files, as the amandabackup user, add two new dumptypes called amanda-configbackup and include to each amanda.conf file in /etc/amanda/$config. Let's assume just one configuration, called DailySet1. define dumptype amanda-config-backup { root-tar comment "force Level 0 backups for Amanda config files" strategy noinc } define dumptype include { amanda-config-backup comment "force Level 0 backups and only backup files specified 11
12 in the include list" priority medium include list "/var/lib/amanda/srv_configs" } 2. Create the file list called by the new dumptype, include. amandabackup@quartz:/etc/amanda> cd /var/lib/amanda/dailyset1 amandabackup@quartz:/var/lib/amanda/dailyset1> vi srv_configs./amandates./dumpdates 3. Append the following lines to the existing /etc/amanda/dailyset1/disklist. quartz.zmanda.com /etc/amanda amanda-config-backup quartz.zmanda.com /var/lib/amanda amanda-config-backup quartz.zmanda.com /etc include 4. Still as the amandabackup user, run amcheck to verify that a backup will run successfully with the latest changes. quartz:/var/lib/amanda/dailyset1> amcheck DailySet1 Amanda Tape Server Host Check Holding disk /data/amanda/hold: KB disk space available, that's plenty slot 1: read label `TapeSet1-1', date `X' NOTE: skipping tape-writable test Tape TapeSet1-1 label ok NOTE: host info dir /etc/amanda/dailyset1/curinfo/quartz.zmanda.c om does not exist NOTE: it will be created on the next run. NOTE: index dir /etc/amanda/dailyset1/index/quartz.zmanda.com doe s not exist NOTE: it will be created on the next run. Server check took seconds Amanda Backup Client Hosts Check Client check: 1 host checked in seconds, 0 problems found 20. You can either wait until the next scheduled backup, or you can run amdump manually. The DailySet1 backup will run, including the new backup of the Amanda server configurations added to the disklist. a. Executing the backup manually: quartz:/var/lib/amanda/dailyset1> amdump DailySet1 b. Generated report for the backup: DUMP SUMMARY: DUMPER STATS TAPER STATS HOSTNAME DISK L ORIG-KB OUT-KB COMP% MMM:SS KB/s MMM:SS KB/s quartz.zmand /etc : :
13 quartz.zmand /etc/amanda : : quartz.zmand -lib/amanda : : Verifying and Restoring Become the root user to perform restores. 1. To restore the Amanda server configuration and database files, insert the most recent backup tape into the tape drive. 2. Create a temporary directory in which to extract the files from tape. quartz:~ # cd /tmp; mkdir config quartz:/tmp # cd /config quartz:/tmp/config # 3. We can now pull the files from tape with amrestore. From the new /tmp/config directory, extract the files backed up from /etc and /etc/amanda. quartz:/tmp/config # mt -f /dev/nst0 rewind quartz:/tmp/config # amrestore /dev/nst0 quartz.zmanda.com /etc amrestore: 1: restoring quartz.zmanda.com._etc amrestore: 2: skipping quartz.zmanda.com._var_lib_amanda amrestore: 3: restoring quartz.zmanda.com._etc_amanda Extract the files backed up from /var/lib/amanda. quartz:/tmp/config # mt -f /dev/nst0 rewind quartz:/tmp/config # amrestore /dev/nst0 quartz.zmanda.com /var/l ib/amanda amrestore: 1: skipping quartz.zmanda.com._etc amrestore: 2: restoring quartz.zmanda.com._var_lib_amanda amrestore: 3: reached end of tape: date List the extracted tar archives. quartz:/tmp/config # ls quartz.zmanda.com._etc _var_lib_amanda quartz.zmanda.com._etc_amanda Now, restore the files to their original locations. a. Enter the existing /etc directory and restore the amandates and dumpdates files. quartz.zmanda.com. quartz:/tmp/config # cd /etc quartz:/etc # tar -vxf /tmp/config/quartz.zmanda.com._etc /amandates b. Enter the existing /etc/amanda directory and restore the /etc/amanda files. quartz:/etc # cd /etc/amanda 13
14 quartz:/etc/amanda # tar -vxf /tmp/config/quartz.zmanda.com._etc_ amanda /./dailyset1/./dailyset1/curinfo/./dailyset1/curinfo/quartz.zmanda.com/./dailyset1/curinfo/quartz.zmanda.com/_etc/./dailyset1/curinfo/quartz.zmanda.com/_etc_amanda/./dailyset1/curinfo/quartz.zmanda.com/_var_lib_amanda/./dailyset1/index/./dailyset1/index/quartz.zmanda.com/./dailyset1/index/quartz.zmanda.com/_etc/./dailyset1/index/quartz.zmanda.com/_etc_amanda/./dailyset1/index/quartz.zmanda.com/_var_lib_amanda/./dailyset1/oldlog/..../dailyset1/log /dailyset1/log /dailyset1/tapelist./dailyset1/tapelist.amlabel./dailyset1/tapelist.yesterday./dailyset1/curinfo/quartz.zmanda.com/_etc/info./dailyset1/curinfo/quartz.zmanda.com/_etc_amanda/info./dailyset1/curinfo/quartz.zmanda.com/_var_lib_amanda/info./dailyset1/index/quartz.zmanda.com/_etc/ _0.gz./dailyset1/index/quartz.zmanda.com/_etc/ _0.gz./dailyset1/index/quartz.zmanda.com/_etc/ _0.gz./dailyset1/index/quartz.zmanda.com/_etc_amanda/ _0. gz.tmp./dailyset1/index/quartz.zmanda.com/_etc_amanda/ _0. gz./dailyset1/index/quartz.zmanda.com/_etc_amanda/ _0. gz.tmp./dailyset1/index/quartz.zmanda.com/_var_lib_amanda/ _0.gz./DailySet1/index/quartz.zmanda.com/_var_lib_amanda/ _0.gz c. Enter the existing /var/lib/amanda directory and restore the files. quartz:/etc/amanda # cd ~amandabackup quartz:/var/lib/amanda # tar -vxf /tmp/config/quartz.zmanda.com._ var_lib_amanda /./.gnupg/./.ssh/./gnutar-lists/./.amandahosts..../gnutar-lists/quartz.zmanda.com_etc_0./gnutar-lists/quartz.zmanda.com_etc_amanda_0 14
15 ./gnutar-lists/quartz.zmanda.com_var_lib_amanda_0./gnutar-lists/quartz.zmanda.com_var_lib_amanda_0.newfiles 7. As the amandabackup user, run amcleanup. We need to run amcleanup due to the inconsistencies created by having Amanda backup its configuration files while a backup is running. amandabackup@quartz:~> amcleanup DailySet1 amcleanup: processing outstanding log file. 10. Run amcheck on the restored server configuration, again making sure that a successful backup run is possible. amandabackup@quartz:~> amcheck DailySet1 Amanda Tape Server Host Check Holding disk /data/amanda/hold: KB disk space available, that's plenty slot 3: read label `TapeSet1-3', date ` ' cannot overwrite active tape TapeSet1-3 slot 4: read label `TapeSet1-4', date `X' NOTE: skipping tape-writable test Tape TapeSet1-4 label ok Server check took seconds Amanda Backup Client Hosts Check Client check: 1 host checked in seconds, 0 problems found 11. Run amcheckdb to verify the integrity of the Amanda database. amandabackup@quartz:~> amcheckdb DailySet1 Ready. Best Practices Your Amanda server should be a part of your regular backup disk list entries (DLEs). Since Amanda directories are relatively small, a full backup of your Amanda directories on every backup run is strongly recommended. Physically label tapes with date and contents. This will make your life much easier in any recovery situation, but will especially help in a crisis situation when untrained personnel may be called on to perform tasks outside of their normal operations. Save a copy of the RPM that you use to install Amanda on CD, DVD or a network drive, but not on the Amanda server itself. Keep copies of the original operating system and patches available, but in a safe location. Don't set up rsync server on the same machine as your Amanda server. Document the following (and keep the documentation available in case of emergency!): 15
16 o o o o o File system configurations for every server List of fully qualified domain names, IP addresses, and hostnames Hard drive configuration information Media device names Configuration information for all of the hardware you have Conclusion The key to disaster recovery planning is to always be ready. Taking extra steps as described here to protect the Amanda backup server will be worth your while if (when) disaster strikes. And most importantly, always test your recovery procedures including disaster recovery of your Amanda server. 16
Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes
Setting-Up an Open-Source Backup Software Amanda Community in About 5 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness,
Amanda in 15 Minutes
Amanda in 15 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness, functionality and scalability. Yet it is very easy to
Backing Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
Amanda The Open Source Backup & Archiving Software. Ian Turner [email protected] 11 April 2006. Copyright 2006 Zmanda, Inc. All rights reserved.
Amanda The Open Source Backup & Archiving Software Ian Turner [email protected] 11 April 2006 Copyright 2006 Zmanda, Inc. All rights reserved. 1 Agenda What is Amanda? Amanda features Configuration Administration
Back Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
Planning for an Amanda Disaster Recovery System
Planning for an Amanda Disaster Recovery System Bernd Harmsen [email protected] www.datasysteme.de 22nd April 2003 Contents 1 Introduction 1 1.1 Why we need a specialized Amanda Disaster Recovery System?..............
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Rsync: The Best Backup System Ever
LinuxFocus article number 326 http://linuxfocus.org Rsync: The Best Backup System Ever by Brian Hone About the author: Brian Hone is a system administrator and software developer at
MySQL Backups: From strategy to Implementation
MySQL Backups: From strategy to Implementation Mike Frank Senior Product Manager 1 Program Agenda Introduction The 5 Key Steps Advanced Options References 2 Backups are a DBAs Top Priority Be Prepared
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
4013779 Rev C. DBDS Backup and Restore Procedures For System Release 2.2 Through 4.3
4013779 Rev C DBDS Backup and Restore Procedures For System Release 2.2 Through 4.3 Please Read Important Please read this entire guide. If this guide provides installation or operation instructions,
Advantages of Amanda over Proprietary Backup
Advantages of Amanda over Proprietary Backup Gregory Grant Revision 02 Abstract This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences,
BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER
Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during
TCH Forecaster Installation Instructions
RESOURCE AND PATIENT MANAGEMENT SYSTEM TCH Forecaster Installation Instructions (BI) Addendum to Installation Guide and Release Notes Version 8.5 patch 8 Office of Information Technology Division of Information
Automated Offsite Backup with rdiff-backup
Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................
System Administration. Backups
System Administration Backups Why Backup? Problems will occur Hardware failure Accidental deletion Unwanted changes Backup Philosophies At mimimum back up what you can not replicate Your documents, important
Perforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
Disaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software
Technical Paper Disaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software The Sun Cobalt RaQ 3 server appliance supports the use of third-party backup solutions for performing
EVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
Performing Database and File System Backups and Restores Using Oracle Secure Backup
Performing Database and File System Backups and Restores Using Oracle Secure Backup Purpose This lesson introduces you to Oracle Secure Backup which enables you to perform database and file system backups
BrightStor ARCserve Backup for UNIX
BrightStor ARCserve Backup for UNIX Disaster Recovery Option Guide r11.5 D01200-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
Backing Up CNG SAFE Version 6.0
Backing Up CNG SAFE Version 6.0 The CNG-Server consists of 3 components. 1. The CNG Services (Server, Full Text Search and Workflow) 2. The data file repository 3. The SQL Server Databases The three services
EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
CA ehealth. Remote Poller Guide. r6.1
CA ehealth Remote Poller Guide r6.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only
Zmanda: Open Source Backup
Zmanda: Open Source Backup Chander Kant ([email protected]) CEO Zmanda, Inc. www.zmanda.com Zmanda: Open Source Backup 1 Agenda A Case for Open Source Backup Introduction to Amanda Amanda Enterprise Edition
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
Library Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Managing Cisco ISE Backup and Restore Operations
CHAPTER 14 This chapter describes the Cisco Identity Services Engine (ISE) database backup and restore operations, which include Cisco ISE application configuration and Cisco Application Deployment Engine
Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.
Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation
How to backup a remote MySQL server with ZRM over the Internet
How to backup a remote MySQL server with ZRM over the Internet White paper "As MySQL gains widespread adoption and moves more broadly into the enterprise, ZRM for MySQL addresses the growing need among
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in
SmartSync Backup Efficient NAS-to-NAS backup
Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
Installation & Maintenance Guide
The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier
Step One: Installing Rsnapshot and Configuring SSH Keys
Source: https://www.digitalocean.com/community/articles/how-to-installrsnapshot-on-ubuntu-12-04 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The
Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK
Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
CS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Backup and Disaster Recovery Department of Computer Science Stevens Institute of Technology Jan Schaumann [email protected]
STIDistrict Server Replacement
STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories
An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories Mac OS by bertram lyons senior consultant avpreserve AVPreserve Media Archiving & Data Management Consultants
Surround SCM Backup and Disaster Recovery Solutions
and Disaster Recovery Solutions by Keith Vanden Eynden Investing in a source code management application, like, protects your code from accidental overwrites, deleted versions, and other common errors.
Acronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone
SSH, SCP, SFTP, Denyhosts. Süha TUNA Res. Assist.
SSH, SCP, SFTP, Denyhosts Süha TUNA Res. Assist. Outline 1. What is Secure Shell? 2. ssh (Install and Configuration) 3. scp 4. sftp 5. X11 Forwarding 6. Generating Key Pairs 7. Disabling root Access 8.
This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore
APPENDIXA This appendix describes the following procedures: Cisco ANA Registry Oracle Database Cisco ANA Registry This section describes the Cisco ANA Registry backup and restore procedure. Overview Provides
Hadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Unit 4: Hadoop Administration An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government Users Restricted
File Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:
Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
EMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.
EMC AVAMAR 6.0 FOR IBM DB2 GUIDE P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright 2002-2011
Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data
Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered
Open source backup software Amanda
Open source backup software Amanda White paper "As the founder of a new software development business, I have been keenly aware that we must diligently protect our intellectual property and effectively
Microsoft Exchange 2003 Disaster Recovery Operations Guide
Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment
SSH Key Exchange: Windows client to Unix/Linux server
SSH Key Exchange: Windows client to Unix/Linux server Table of contents 1 Audience... 2 2 Purpose...2 3 Prerequisites...2 4 SSH Key exchange: Windows client & Unix/Linux Server...3 4.1 Outline of steps
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
Centralized Disaster Recovery using RDS
Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used
Using Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
using version control in system administration
LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
CA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
The Nuts and Bolts of Autodesk Vault Replication Setup
The Nuts and Bolts of Autodesk Vault Replication Setup James McMullen Autodesk, Inc PL4700-V Has your company decided to move toward a replicated Autodesk Vault software environment? Does your company
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1 This document supports the version of each product listed and supports all subsequent versions
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Agent for Microsoft SQL Server r11.5 D01173-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
EDB Backup and Recovery Tool Guide
EDB Backup and Recovery Tool 1.1 June 2, 2015 , Version 1.1 by EnterpriseDB Corporation Copyright 2014-2015 EnterpriseDB Corporation. All rights reserved. EnterpriseDB Corporation, 34 Crosby Drive, Suite
Linux System Administration
System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most
Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.7
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.7 This document supports the version of each product listed and supports all subsequent versions
WANSync SQL Server. Operations Guide
WANSync SQL Server Operations Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
