|
Lines 2269-2276
Link Here
|
| 2269 |
restore it, even if you have not asked it to!</para> |
2269 |
restore it, even if you have not asked it to!</para> |
| 2270 |
</sect2> |
2270 |
</sect2> |
| 2271 |
</sect1> |
2271 |
</sect1> |
| 2272 |
|
2272 |
|
|
|
2273 |
<sect1 id="backup-strategies"> |
| 2274 |
<title>Backup Strategies</title> |
| 2275 |
|
| 2276 |
<para> |
| 2277 |
The first requirement in devising a backup plan is to make sure that all of the |
| 2278 |
following problems are covered: |
| 2279 |
<itemizedlist> |
| 2280 |
<listitem> |
| 2281 |
<para> |
| 2282 |
disk failure |
| 2283 |
</para> |
| 2284 |
</listitem> |
| 2285 |
<listitem> |
| 2286 |
<para> |
| 2287 |
accidental file deletion |
| 2288 |
</para> |
| 2289 |
</listitem> |
| 2290 |
<listitem> |
| 2291 |
<para> |
| 2292 |
random file corruption |
| 2293 |
</para> |
| 2294 |
</listitem> |
| 2295 |
<listitem> |
| 2296 |
<para> |
| 2297 |
complete machine destruction (e.g., fire) including destruction of any on-site backups |
| 2298 |
</para> |
| 2299 |
</listitem> |
| 2300 |
</itemizedlist></para> |
| 2301 |
|
| 2302 |
<para>It is perfectly possible that some systems will be best served by |
| 2303 |
having each of these problems covered by a completely different |
| 2304 |
technique. Except for strictly personal systems with very low-value |
| 2305 |
data, it is unlikely that one technique would cover all of them.</para> |
| 2306 |
|
| 2307 |
<para>Some of the techniques in the toolbox are:</para> |
| 2308 |
<itemizedlist> |
| 2309 |
<listitem> |
| 2310 |
<para>archives of the whole system, backed up onto permanent media |
| 2311 |
offsite. This actually provides protection against all of the |
| 2312 |
possible problems listed above, but is slow and inconvenient to |
| 2313 |
restore from. You can keep copies of the backups onsite and/or |
| 2314 |
online, but there will still be inconveniences in restoring files, |
| 2315 |
especially for non-privileged users.</para> |
| 2316 |
</listitem> |
| 2317 |
|
| 2318 |
<listitem> |
| 2319 |
<para>filesystem snapshots. This is really only helpful in the |
| 2320 |
accidental file deletion scenario, but it can be |
| 2321 |
<emphasis>very</emphasis> helpful |
| 2322 |
in that case, and is quick and easy to deal with.</para> |
| 2323 |
</listitem> |
| 2324 |
|
| 2325 |
<listitem> |
| 2326 |
|
| 2327 |
<para> copies of whole filesystems and/or disks. [for example, |
| 2328 |
periodic rsync of the whole machine] This is generally most |
| 2329 |
useful in networks with unique requirements. For general |
| 2330 |
protection against disk failure, it is usually inferior to |
| 2331 |
<acronym>RAID</acronym>. For restoring accidentally deleted |
| 2332 |
files, it can be comparable to <acronym>UFS</acronym> |
| 2333 |
snapshots, but that depends on your preferences.</para> |
| 2334 |
|
| 2335 |
</listitem> |
| 2336 |
|
| 2337 |
<listitem> |
| 2338 |
|
| 2339 |
<para><acronym>RAID</acronym>. Minimizes or avoids downtime |
| 2340 |
when a disk fails. At the expense of having to deal with disk |
| 2341 |
failures more often (because you have more disks), albeit at a |
| 2342 |
much lower urgency.</para> |
| 2343 |
|
| 2344 |
</listitem> |
| 2345 |
|
| 2346 |
<listitem> |
| 2347 |
|
| 2348 |
<para>checking fingerprints of files. The |
| 2349 |
&man.mtree.8; |
| 2350 |
program is very useful for this. Although it is not a backup |
| 2351 |
technique, it helps guarantee that you will notice when you need |
| 2352 |
to resort to your backups. This is particularly important for |
| 2353 |
offline backups, and should be checked periodically. |
| 2354 |
|
| 2355 |
</listitem> |
| 2356 |
</itemizedlist> |
| 2357 |
|
| 2358 |
<para>It is quite easy to come up with even more techniques, many of them |
| 2359 |
variations on the ones listed above. Specialized requirements will |
| 2360 |
usually lead to specialized techniques (for example, backing up a live |
| 2361 |
database usually requires a method particular to the database |
| 2362 |
software as an intermediate step). The important thing is to know |
| 2363 |
what dangers you want to protect against, and how you will handle |
| 2364 |
each.</para> |
| 2365 |
|
| 2366 |
</sect1> |
| 2367 |
|
| 2273 |
<sect1 id="backup-basics"> |
2368 |
<sect1 id="backup-basics"> |
| 2274 |
<title>Backup Basics</title> |
2369 |
<title>Backup Basics</title> |
| 2275 |
|
2370 |
|
| 2276 |
<para>The three major backup programs are |
2371 |
<para>The three major backup programs are |