Offsite Backup #74

Open
opened 2023-09-02 22:52:40 +02:00 by adrlau · 3 comments
adrlau commented 2023-09-02 22:52:40 +02:00 (Migrated from github.com)

Copy over backups on principal to external discs, so that we can have external backup outside of the serverrom. More documentation regarding backups here

Copy over backups on [principal](https://www.pvv.ntnu.no/pvv/Maskiner/Principal) to external discs, so that we can have external backup outside of the serverrom. More documentation regarding backups [here](https://www.pvv.ntnu.no/pvv/Drift/Backup)
adrlau commented 2023-09-02 23:08:14 +02:00 (Migrated from github.com)

After some discussion, the disk should probably be encrypted with the root password to avoid a situation where the disks could end up astray if the disk holder loses it somehow (gets stolen, lost during transport, etc.)

After some discussion, the disk should probably be encrypted with the root password to avoid a situation where the disks could end up astray if the disk holder loses it somehow (gets stolen, lost during transport, etc.)
oysteikt added this to the Kanban project 2024-08-03 22:52:55 +02:00
Owner

the nixos hydra infra uses zfs snapshots, sent with zrepl to rsync.net

66da5cfddb/build/haumea/zrepl.nix

before, both hexa and delroth were the ones to hold a backup. This might be a job for NVG, Omegaversktedet or some Tokyo drifters

After some discussion, the disk should probably be encrypted with the root password to avoid a situation where the disks could end up astray if the disk holder loses it somehow (gets stolen, lost during transport, etc.)

The zfs datasets themselves can be encrypted, and will then also be stored encrypted on the offsite host

the nixos hydra infra uses zfs snapshots, sent with zrepl to rsync.net https://github.com/NixOS/infra/blob/66da5cfddb8c67b5e2f0b5bba62899f1f82eec42/build/haumea/zrepl.nix before, both hexa and delroth were the ones to hold a backup. This might be a job for NVG, Omegaversktedet or some Tokyo drifters > After some discussion, the disk should probably be encrypted with the root password to avoid a situation where the disks could end up astray if the disk holder loses it somehow (gets stolen, lost during transport, etc.) The zfs datasets themselves can be encrypted, and will then also be stored encrypted on the offsite host
Owner

The zfs datasets themselves can be encrypted, and will then also be stored encrypted on the offsite host

There are traps here! You must use the raw (-w) flag to avoid it being decrypted and then reencrypted and recompressed and whatever according to the dataset rules on the receiving side.

> The zfs datasets themselves can be encrypted, and will then also be stored encrypted on the offsite host There are traps here! You must use the raw (`-w`) flag to avoid it being decrypted and then reencrypted and recompressed and whatever according to the dataset rules on the receiving side.
oysteikt added the
servers n' hardware
label 2024-08-06 18:14:02 +02:00
oysteikt added the
backup
label 2024-08-06 18:30:25 +02:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
3 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: Drift/issues#74
No description provided.