Backup policies Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical.

Slides:



Advertisements
Similar presentations
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Advertisements

Everything your business needs to know but probably doesn’t.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 12.
Chapter 12 - Backup and Disaster Recovery1 Ch. 12 – Backups and Disaster Recovery MIS 431 – Created Spring 2006.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Linux Install. Resources Guide to Linux Installation and Administration, Nicholas Wells, Course Technology, 2000.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Maintaining Windows Server 2008 File Services
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Windows Server 2003 資料備份與還原 林寶森
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Module 8: Designing Active Directory Disaster Recovery in Windows Server 2008.
Offline File Storage. Module 12 Offline File Storage ♦ Introduction Backup is usually done by first collecting all the data in a single archive file,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
Drive Imaging Richard Woods March 14, Major Disaster Recovery What if?  Major software corruption  Hard disk failure You could spend 1-2 days.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Window NT File System JianJing Cao (#98284).
David N. Wozei Systems Administrator, IT Auditor.
Linux Operations and Administration
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
Software.
Day 8 Exporting Displays Cronjobs Mount. Chapter 5 Chapter 5 talks about X windows. –You should read the chapter. –However, you do not need to pay particular.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
The Handover Process P6.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
1 Backups Part of a Systems Administrators job is maintaining the integrity of the system. This does not mean that she is expected to prevent anything.
System Administration – Part 2. Devices in UNIX are files: A device can be accessed with different file names All device files are stored in /dev or its.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
Understanding Backup and Recovery Methods Lesson 8.
1 itec 400 Backups George Vaughan Franklin University.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Filesystem Management and Backups. 2 Section Overview Devices and Files Filesystem Management Network Filesystems Backups.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Managing Data & Information Procedures & Techniques.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Backing Up Lesson 12. Backups A backup is simply a copy of the data on a computer’s hard disks, stored on another medium in case a hard drive fails. If.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Memory management. Linux Memory Management Total memory available for processes = real memory + paging space - 1MB. First megabyte of real memory is used.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
tar: The tape archive program _______________________ Amber Jain IC-2K7-05 _______________________.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Slide Template for Module 4 Data Storage, Backup, and Security
Filesystem Management and Backups
AS ICT Module 2 Objectives: Security of Data
Lesson Objectives Aims You should be able to:
Maintaining Windows Server 2008 File Services
LO2: Understand Computer Software
Operating System Module 1: Linux Installation
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Guarding against loss of data
Computer communications
Introducing NTFS Reliability Security Long file names Efficiency
Presentation transcript:

Backup policies Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical

This is the bottom line The EGTDC cannot be held responsible for loss of data on Bio-Linux machines, either from user error, hardware failure or software failure. First of all users are responsible for their own data. The nominated systems administrator is responsible for ensuring that users back up important data to another location to preserve data integrity.

Looking after your /home If it fits on a floppy - put it on a floppy!! If it doesn't fit on a floppy - put it on a CD! Keep two copies of files locally – just in case you accidentally delete one copy! We suggest that users on the system, as a first level of disaster recovery periodically burn all the data in their home directories onto a CD-R or CD- RW. Many institutions have networked drives where people can store data. Using 'tar' and 'gzip' to compress data in your home directory and moving it elsewhere is also an efficient backup system (ftp or scp).

Speaking to your IT staff If your IT department provides a networked backup solution, we strongly recommend that you integrate with them in order to provide a more regular system of backups. The EGTDC will assist, where possible, in integrating Bio-Linux into an existing backup framework.

Disaster recovery on Bio-Linux Bio-Linux does have a built in backup system, but this is intended for disaster recovery of data in the event of hard drive failure - and is not recommended as a system for recovering files accidentally deleted as it requires good familiarity with Unix in order to use. Bio-Linux machines have two hard drives. One (called /dev/hda) contains the operating system, and all data stored on the machine. The second (called /dev/hdb) contains backups of the primary hard drive. /dev/hdb has a single 'partition' and is mounted on /backups

Disaster recovery (2) Backups are controlled by a 'cron' job, and run daily. Cron is a system daemon (program that runs all the time and provides a service) that runs certain tasks at certain times (hour/day/week) The backup script can be found at /etc/cron.daily/backup.sh. Each Sunday a full backup of all files on /dev/hda is taken. Every other day of the week an incremental backup of files which have been changed on that day is done. The backup script uses 'dump' to store a compressed version of your primary hard drive (onto /dev/hdb1).

Disaster recovery (3) Backups have the following naming convention; hda[X].bak.[Y] X in this case is either 1, 2, 5 or 6 and refers to the partition number that has been backed up. the following partitions map to the following mountpoints: /dev/hda1=>/ /dev/hda2=>/var /dev/hda5=>/usr /dev/hda6=>/home /dev/hdb1=>/backups Y refers to the backup level where 0 = full and 9 = incremental

Disaster recovery (4) In order to restore files from these backups, you must use the Unix 'restore' command. This is not for the inexperienced, you must have a good knowledge of the system architechture and know how to repair the system once a file is recovered. You must also be logged in as root - using sudo will not work!

EGTDC and data collection As mentioned, the EGTDC is not responsible for loss of data, and is not a 'backup service' for your data. However part of the remit of the EGTDC is to act as a repository for data that is generated such as EST data, microaray data etc. This is to enable meta-analysis of data, and open up data generated to the EG community. If you are generating large volumes of data, and would like to speak to the EGTDC about solutions for data storage and analysis please do not hesitate to ask. Microarray storage already provided by GeneSprings GeNet – a MIAME compliant data repository.