Backup policies. Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical



Similar documents
Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

Linux System Administration

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Planning for an Amanda Disaster Recovery System

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Understanding Backup and Recovery Methods

Backing Up TestTrack Native Project Databases

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

Oracle VM Server Recovery Guide. Version 8.2

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Linux System Administration. System Administration Tasks

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

Disaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software

Using Depositit to Backup Microsoft Exchange Server

4PSA Total Backup User's Guide. for Plesk and newer versions

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Backing Up Your System With rsnapshot

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER

Navigating the Rescue Mode for Linux

Retrospect 7.7 User s Guide Addendum

Backup and Recovery using PITR Mark Jones EnterpriseDB Corporation. All rights reserved. 1

Perforce Backup Strategy & Disaster Recovery at National Instruments

This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore

Recovering Data from Windows Systems by Using Linux

Linux Backups. Russell Adams Linux Backups p. 1

Private Server and Physical Server Backup and Restoration:

Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

BackupPC. Network Startup Resource Center

Module 5 Introduction to Processes and Controls

Getting Started. Backup Repositories. Getting Started 1/6

Acronis True Image 2015 REVIEWERS GUIDE

Computer forensic science

How to Restore a Windows System to Bare Metal

VERITAS NetBackup TM 6.0

ONLINE BACKUP MANAGER MS EXCHANGE MAIL LEVEL BACKUP

Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L

Data storage, backup and restore

RDS Online Backup Suite v5.1 Brick-Level Exchange Backup

Recommended Backup Strategy for FileMaker Server 7, 8, 9 and 10 for Macintosh & Windows Updated February 2009

Linux System Administration on Red Hat

Rentavault Online Backup. MS Exchange Mail Level Backup

NBU651 BMR. Avi Weinberger

This is when a server versus a workstation is desirable because it has the capability to have:

Redundant Array of Inexpensive/Independent Disks. RAID 0 Disk striping (best I/O performance, no redundancy!)

DO NOT ASSUME THAT THE BACKUP IS CORRECT. MAKE SURE IT IS.

Integrating Data Protection Manager with StorTrends itx

Table of Contents. Online backup Manager User s Guide

NovaBACKUP. User Manual. NovaStor / November 2011

Tk20 Backup Procedure

A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE. Version

Databoks Remote Backup. MS Exchange Mail Level Backup

Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02

Cloning Utility for VersaView Industrial Computers

Using Secure4Audit in an IRIX 6.5 Environment

Over-the-top Upgrade Guide for Snare Server v7

Incremental Backup Script. Jason Healy, Director of Networks and Systems

Recovering Data from Windows Systems by Using Linux

Recommended Backup Strategy for FileMaker Pro Server 7/8 for Macintosh & Windows Updated March 2006

Suite. How to Use GrandMaster Suite. Backup and Restore

Solcon Online Backup. MS Exchange Mail Level Backup

Veeam Best Practices with Exablox

EVault Software. Course 361 Protecting Linux and UNIX with EVault

Swiss Safe Storage Online Backup MS Exchange Mail Level Backup

Symantec NetBackup Blueprints

Configure Cisco Emergency Responder Disaster Recovery System

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

How to Restore a Linux Server Using Bare Metal Restore

DFW Backup Software. Whitepaper DFW Backup Agent

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0

Backing up the Embedded Oracle database of a Red Hat Network Satellite

Considerations when Choosing a Backup System for AFS

When Bad Things Happen to Good Amanda Backup Servers

TELE 301 Lecture 7: Linux/Unix file

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

Acer erecovery Management

Total Backup Recovery Server for Linux. User s Guide

Getting Started with Paragon Recovery CD. Quick Guide

Ahsay Online Backup Suite v5.1. Brick-Level Exchange Backup

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Zoner Online Backup. Whitepaper Zoner Backup Agent

BrightStor ARCserve Backup for UNIX

File Systems Management and Examples

Back Up Linux And Windows Systems With BackupPC

Centralized Disaster Recovery using RDS

Version: Page 1 of 5

Ahsay Backup Software. Whitepaper Ahsay Backup Agent

Transcription:

Backup policies Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical

This is the bottom line The EGTDC cannot be held responsible for loss of data on Bio-Linux machines, either from user error, hardware failure or software failure. First of all users are responsible for their own data. The nominated systems administrator is responsible for ensuring that users back up important data to another location to preserve data integrity.

Looking after your /home If it fits on a floppy - put it on a floppy!! If it doesn't fit on a floppy - put it on a CD! Keep two copies of files locally just in case you accidentally delete one copy! We suggest that users on the system, as a first level of disaster recovery periodically burn all the data in their home directories onto a CD-R or CD-RW. Instructions are in the Bio-Linux User FAQ. Many institutions have networked drives where people can store data. Using 'tar' and 'gzip' to compress data in your home directory and moving it elsewhere is also an efficient backup system (ftp or scp).

Speaking to your IT staff If your IT department provides a networked backup solution, we strongly recommend that you integrate with them in order to provide a more regular system of backups. The EGTDC will assist, where possible, in integrating Bio-Linux into an existing backup framework.

Disaster recovery on Bio-Linux Bio-Linux does have a built in backup system, but this is intended for disaster recovery of data in the event of hard drive failure - and is not recommended as a system for recovering files accidentally deleted as it requires good familiarity with Unix in order to use. Bio-Linux machines have two hard drives. One (called /dev/hda) contains the operating system, and all data stored on the machine. The second (called /dev/hdb) contains backups of the primary hard drive. /dev/hdb has a single 'partition' and is mounted on /backups

Disaster recovery (2) Backups are controlled by a 'cron' job, and run daily. Cron is a system daemon (program that runs all the time and provides a service) that runs certain tasks at certain times (hour/day/week) The backup script can be found at /etc/cron.daily/backup.sh. Each Sunday a full backup of all files on /dev/hda is taken. Every other day of the week an incremental backup of files which have been changed on that day is done. The backup script uses 'dump' to store a compressed version of your primary hard drive (onto /dev/hdb1).

Disaster recovery (3) Backups have the following naming convention; hda[x].bak.[y] X in this case is either 1, 2, 5 or 6 and refers to the partition number that has been backed up. the following partitions map to the following mountpoints: /dev/hda1 => / /dev/hda2 /dev/hda5 /dev/hda6 /dev/hdb1 => /var => /usr => /home => /backups Y refers to the backup level where 0 = full and 9 = incremental

Disaster recovery (4) In order to restore files from these backups, you must use the Unix 'restore' command. This is not for the inexperienced, you must have a good knowledge of the system architechture and know how to repair the system once a file is recovered. You must also be logged in as root - using sudo will not work! More information on this is given in the Advanced Bio-Linux course.

EGTDC and data collection As mentioned, the EGTDC is not responsible for loss of data, and is not a 'backup service' for your data. However part of the remit of the EGTDC is to act as a repository for data that is generated such as EST data, microaray data etc. This is to enable meta-analysis of data, and open up data generated to the EG community. If you are generating large volumes of data, and would like to speak to the EGTDC about solutions for data storage and analysis please do not hesitate to ask. Microarray storage already provided by GeneSprings GeNet a MIAME compliant data repository.