Simple Backup Methods Jon Larsen Omaha Linux User Group March 7th, 2006.

Slides:



Advertisements
Similar presentations
Backup and Restore Procedures. Introduction Performing regular backups should be considered one of a responsible system administrators top priorities.
Advertisements

DIFFSYNC A file synchronization program CLASS PROJECT – EEL6883 BY ADAM RADWAN GARGI CHIPALKATTI.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Operating Systems: Software in the Background
1 Chapter 2 Operating Systems: Software in the Background.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Lesson 22 – Introduction to Linux Systems Administration.
CIS 240 Introduction to UNIX Instructor: Sue Sampson.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Chapter 5 System Software.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
1 DOS with Windows 3.1 and 3.11 Operating Environments n Designed to allow applications to have a graphical interface DOS runs in the background as the.
*nix and Non-Intel Platform issues CSC 486/586 1.
Genie Backup ManagerServer 7.0 Product Profile. Copyright© Genie-Soft Corporation All rights reserved. Overview GBM Server 7.0 is a fully integrated.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
© 2010 IBM Corporation Kelly Beavers Director, IBM Storage Software Changing the Economics of Storage.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Backups in Linux Ning Zhu Class presentation. Introduction The dump and restore commands are the most common way to create and restore from backups in.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
Offline File Storage. Module 12 Offline File Storage ♦ Introduction Backup is usually done by first collecting all the data in a single archive file,
1 Intro to Linux - getting around HPC systems Himanshu Chhetri.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Basics  Operating systems (OS) can help computer users do many things, like managing and manipulating files and folders.  Operating systems also.
CIS 90 - Lesson 14 Lesson Module Status Slides – Properties - Flash cards – No-stress quiz – Web calendar summary – Web book pages – Commands – Lab – done.
Lesson 11-Locating, Printing, and Archiving User Files.
Operating Systems. The foundation for operating system software and application software. Source:
Backup Track SA-E AfNOG workshop May 15, 2009 Cairo, Egypt (Slides by Phil Regnauld)
Linux Operations and Administration
Software.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Linux+ Guide to Linux Certification Chapter Thirteen Compression, System Back-Up, and Software Installation.
Day 7 Installing Software RPM tar, mtools make, ssh.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Find Find basics. find ~ -name myfile –print find directory criteria This will search the home directory (~) looking for files.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Managing Disks and Drives Chapter 13 powered by dj.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Storing data on your computer & network. Storage devices Hardware Hard drive Flash drive Tape File server (HD) SAN NAS Software System software Windows.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
M EANING A backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. Chutipon Hirankanokkul.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Mephisto Backup for Linux. By: Phillip Tribble.. Overview ➲ Purpose. ➲ What is Mephisto ? ➲ Feature List. ➲ What makes it different ? ➲ Links and documentation.
Filesystem Management and Backups. 2 Section Overview Devices and Files Filesystem Management Network Filesystems Backups.
Backups When just having a system isn’t enough. 321 Rule of Thumb 3 generations 2 media 1 off-site at least.
Chapter 19 File System Backup. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. Objectives To describe how files and directories can be archived.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Using Grsync with Ubuntu Presented by Dave Mawdsley, DACS Member, Linux SIG August 20, 2008 (making rsync easy with a memory key or a server)
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Back it up – Don't be a fool!
Introducing, Installing, and Upgrading Windows 7
Backing Up Your System With rsnapshot
Department of Computer Engineering
Filesystem Management and Backups
Overview – SOE Rsync SEP 2014.
2. OPERATING SYSTEM 2.1 Operating System Function
Cairo, Egypt (Slides by Phil Regnauld)
FTP - File Transfer Protocol
File Managements.
The Linux Command Line Chapter 18
Lecture 5 Additional useful commands COP 3353 Introduction to UNIX 1.
Data Preservation During Upgrades
Downloading workshop files to your computer
Lecture 5 Additional useful commands COP 3353 Introduction to UNIX 1.
Chapter 10 Archives and Backups.
Presentation transcript:

Simple Backup Methods Jon Larsen Omaha Linux User Group March 7th, 2006

Simple Backups? Protecting your data is very important. There are several backup methods under Linux/UNIX we can be used to protect your data. We will discuss a few of the simple, common tools.

Utilites Covered in this presentation tar rsync netcat dd unison

tar ● Originally designed for sequential tape devices for backup purposes ● Has been extended to use to use the -f option for files ● Compression capabilities added (-z, -Z and -j) ● Unix Pipes can also be used ● Man tar ●

Backup a directory ● In it's simplest form – tar -czf filename.tar.gz /home/username ● c – create ● z – gzip ● f - filename ● /home/user – 'source'

Alternate ● Using bzip2 – tar -cjP -–preserve -f filename.tar.bz2 /home/username – c – create – j – bzip2 – P – don't strip leading '/' from paths – --preserve – preserve file permissions – f - file

Simple Tape Drive Backup #!/bin/bash DATE=`date '+%Y%m%d'` tar -cv –blocking-factor 64 –label=Home$DATE –tape-length –exclude /proc –totals -f /dev/st0 /

Restore tar ● Restore backup – tar -xjf filename.tar.bz2 – tar -xzf filename.tar.gz – tar --blocking-factor=64 --tape-length xvf /dev/st0 home/username/file

rsync ● rsync is a computer program which synchronizes files and directories from one location to another ● mirroring takes place with only one transmission in each direction ● ssh tunnel ●

rsync example ● rsync -avz –delete -e “ssh -l username” rname /home/username ● Use ssh tunnel for encryption – a - archive – v - verbose – z - compress

netcat ● In computing, netcat is a network utility for reading from and writing to network connections on either TCP or UDP. It is designed in a thin and simple way, which makes it easy to incorporate in larger applications. Because of its versatility, netcat is also called the "TCP/IP Swiss Army knife". ●

Netcat example ● Create a listener ● nc -l -p 8000 | tar -xP –preserve ● Create the sender ● tar czp –preserve / | nc :8000

dd ● dd is a common Unix program whose primary purpose is the low- level copying and conversion of files. ●

dd example ● Backup a hard drive (duplicate) ● dd if=/dev/hda of=/dev/hdb

unison ● Unison is a file synchronization program for Unix (including Linux, Mac OS X, and Solaris) and Windows used for synchronizing files and directories on multiple computers. ●

unison

Advanced Solutions ● Bacula – ● Amanda –

Open Discussion