Latest news

Morrolinux: Backup concepts correctly implemented under Linux

The protection of digital data depends largely on clearly structured planning and the consistent implementation of technical measures. In Linux environments, established tools and procedures are available that enable efficient and reproducible backups. The first step is to systematically record all directories whose loss would represent actual damage. This recording serves to limit the backup to data that is classified as permanent and indispensable. In cases without a clearly defined folder structure, a complete backup of the home directory is advisable, but with the exclusion of temporary content such as cache data or downloaded installation packages. This reduces the backup to the essential content without including unnecessary amounts of data.

However, a single backup image does not offer sufficient robustness. To avoid failures, the established 3-2-1 model is used, which provides for triple storage of the same data, distributed across at least two different media types and supplemented by a spatially separated copy. In practical implementation, this includes two additional storage locations in addition to the original system, such as mobile hard disks, tape drives or remote storage locations. Encrypted storage is recommended for external storage, especially if a cloud service is used.

The use of specialized software reduces sources of error and enables automated processes. Solutions such as Borg Backup provide differential and deduplicating backups that reduce resource requirements and ensure a high level of repeatability. The multi-tenant architecture prevents the backup archive from being manipulated or encrypted in the event of a ransomware attack on the local system. In addition, a graphical client such as Vorta makes setup easier, but requires basic knowledge of SSH and the associated key services. The creation and management of key pairs, the configuration of agent services and the storage of public keys on the target system are among the basic requirements for secure access.

However, a functioning backup environment only remains reliable if it is regularly checked for recoverability. The integrity check of existing archives is technical proof, but does not replace the actual restoration of individual directories. Only a real restore process identifies faulty key data, incomplete archives or incorrectly configured target paths. Periodic tests can ensure that the entire backup chain is stable and can restore without errors in an emergency.

The end result is a structured procedure that consists of clear data capture, the use of multiple redundant copies, the use of specialized software and regular recoverability testing. This combination minimizes the risk of failure and enables a permanently resilient data backup.

Conclusion

Reliable data backup under Linux is based on a combination of systematic planning, the use of proven open source tools and continuous validation. The steps described create a robust basis for avoiding data loss in the long term.

Source Key message Link
Linux Professional Institute Basics of SSH, key management and backup concepts in the LPIC-102 area https://learning.lpi.org
Borg Backup Project Description of functionality, deduplication and integrity check https://borgbackup.readthedocs.io
Restic Documentation Open source basics for data-efficient backup https://restic.net

 

Kommentar

Lade neue Kommentare

M
MD_Enigma

Mitglied

86 Kommentare 44 Likes

Backup muss man in zwei Kategorien trennen:

  • Datei-Level
  • Block-Level

Einen Shapshot mache ich nur, wenn ich danach auch Blöcke sichern möchte. Beispiel: MySQL-InnoDB oder Journaling-File-System.

Wenn ich Dateien sichern möchte, sieht die Infrastruktur anders aus. Idealerweise so wie OneDrive es macht mit einem Hook im Dateisystem.

Wir haben in der Vergangenheit ausschließlich auf Block-Ebene gesichert. Schneller effizienter. Leider muss dann das Backup-System "mächtiger" sein und einen Restore auf Dateiebene anbieten und ggf. Deltas im Archiv zusammenführen.

Soweit ich das sehe arbeitet Borg2 auf Dateisysteme ebene und finde ich persönlich im Jahr 2025 den falschen Ansatz. Da setze ich lieber auf OneDrive + Backup auf Block-Ebene auf dem Dateiserver.

Antwort Gefällt mir

M
MD_Enigma

Mitglied

86 Kommentare 44 Likes

PS: Auch gerne mal Bacula anschauen. Das hatten wir ganz früher benutzt. War damals (vor 2010) im Kern leider noch auf Tapes optimiert.

Antwort Gefällt mir

j
juppeck

Mitglied

24 Kommentare 8 Likes

Warum ist dies nur für Linux gültig? Kommerziell wäre Veeam B&R eine gute Wahl.

Antwort Gefällt mir

Danke für die Spende



Du fandest, der Beitrag war interessant und möchtest uns unterstützen? Klasse!

Hier erfährst Du, wie: Hier spenden.

Hier kannst Du per PayPal spenden.

About the author

Karsten Rabeneck-Ketme

Werbung

Werbung