| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.

Slides:



Advertisements
Similar presentations
FlareCo Ltd ALTER DATABASE AdventureWorks SET PARTNER FORCE_SERVICE_ALLOW_DATA_LOSS Slide 1.
Advertisements

HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Installation and Deployment in Microsoft Dynamics CRM 4.0
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Chapter 5 Configuring the RMAN Environment. Objectives Show command to see existing settings Configure command to change settings Backing up the controlfile.
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Configuring the MagicInfo Pro Display
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
Recovery Manager Overview Target Database Recovery Catalog Database Enterprise Manager Recovery Manager (RMAN) Media Options Server Session.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
| nectar.org.au NECTAR TRAINING Module 7 Launching and Connecting.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
Managing Disks and Drives Chapter 13 powered by dj.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
| nectar.org.au NECTAR TRAINING Module 7 Launching and Connecting.
Microsoft Windows XP Professional MCSE Exam
Understanding Backup and Recovery Methods Lesson 8.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Product Training 1 JetFlash Software Application.
Using Grsync with Ubuntu Presented by Dave Mawdsley, DACS Member, Linux SIG August 20, 2008 (making rsync easy with a memory key or a server)
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Copyright © 2003 by Prentice Hall 1 Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background BSM025 Computers.
Back it up – Don't be a fool!
Backing Up Your System With rsnapshot
Sharing and Synching files
Maintaining Windows Server 2008 File Services
Module 4: Managing Access to Resources
LCGAA nightlies infrastructure
Introduction to Computers
File Transfer Olivia Irving and Cameron Foss
SUSE Linux Enterprise Desktop Administration
File System Management
Presentation transcript:

| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up

Backing up & packing up How to back up your VM and your data Taking Snapshots of your VM Backing up data How to “pack up” and release resources Terminating an instance Securely erasing storage Releasing storage

Why is it important to release resources? Two reasons: Running VMs and existing volumes block the resources to other researchers! Play fair. Your running VMs will use up your allocated CPU hours! It is easy! You can restore the state of your resources with the Snapshots and backups.

Instance Snapshots Copy the state of your instance, and reboot it later in the same state: Snapshots of an instance can be used like other Images to start new instances. Snapshots only include data on your primary ephemeral drive.

Volume Snapshots A Volume Snapshot creates a copy of a Volume. Is stored on the Research Cloud. Uses up storage allocation quota. A Snapshot can be used to create new Volumes. Snapshots depend on the original Volume: it must still exist! To delete a volume, you have to delete all snapshots of it first. “Backups” — discussed later — offer a different functionality.

Instance Snapshots Exercise 1 Take a snapshot of an instance on the Dashboard

Instance Snapshots Exercise 2 Launch a new instance from the snapshot 1.Go to Dashboard > Compute > Images 2.Find the Snapshot image you would like to launch a new instance from, and click Launch This brings up the familiar launch dialogue.

Volume Snapshots Exercise 3: Create a Volume Snapshot First, make sure the Volume is detached and in Status available.

Volume Snapshots Exercise 4: Create a new Volume from a Snapshot Go to Dashboard > Compute > Volumes and click on “Create Volume”

Backing up

You may back up your data On-line (in the cloud) Off-line (on your premises)

On-line backups

Object store Already maintains redundant copies. Scripts can be written to automate backups. Volumes Snapshots & Backups On-Instance storage Primary drive: Instance Snapshots Secondary drive: Only manual backups, e.g. onto a Volume.

Backing up Object Storage on-line Object storage is quite robust against data loss. To backup the data on-line: Use clients like CyberDuck or FTP clients like FileZilla to copy your files across manually (see Module 7). Write scripts for automated backups with OpenStack command line tools discussed in Module 10.

On-line Volume “Backups” “Backups” can be made with the OpenStack command line client. This will be explained in Module 10. It is planned to integrate Backups in the Dashboard as well. This will be similar to taking Snapshots.

Volume Snapshot vs. Backup Snapshot 1:1 copy of entire volume. Stored as Image on the NeCTAR Image Server. Create a new volume. Depend on the existing original volume. Backup Backup used data on volume. Stored in Object Storage. Create a new volume or restore an existing volume. Independent of original volumes existence.

Off-line backups

Object storage Copy files with clients like Cyberduck. Scripts can be written to automate backups with the openstack command. Volumes and On-Instance Storage Manual backups Incremental backup tools RSync command line utility Automated services like BackupPC … and more which support backup of remote directories.

RSync command line utility Rsync is a Unix command line tool Maintains a copy of a local directory on a (typically) remote system, in a traditional “mirror” fashion. The contents of the two folders, which we call source and destination folders, are synchronized.

Rsync command line utility Creates incremental backups: only what has changed in the directory since the last backup will be copied to the backup folder. Can compress and encrypt data streams during the backup process.

Rsync command line utility A good choice if: You want to create a backup of the most recent state of your volume or secondary ephemeral drive. And save the backup on your local computer, or another computer onto which you can log on to with a terminal.

Rsync command line utility Advantages: Incremental per-file copies enable a generally fast backup. Easy to access (and edit) files off-line and then synchronize. Uses ssh for a secure connection. Drawbacks: Difficult to maintain backups of multiple time points. Aborted rsync process leaves a mix of old and new files. It is s a bit more complicated to set up automated backups.

Rsync command line utility Installation of Rsync on your local computer: Linux: On many distributions, rsync is already installed. If it is not, install for example on Ubuntu/Debian: $ sudo apt-get install rsync On Mac OS X, rsync is available by default. Under Windows, rsync can be installed as part of the cygwin package and used from the command line.

Backing up Exercise 5 (Linux and Mac users) Reference: Usage of rsync, automatically using your ssh keys: $ rsync -av (Manually specify ssh key with option -e '-i ’) Step 1. Create a test file with some text in your ssh terminal, e.g. in the /data folder. Then, synchronize in your local terminal: $ rsync -av dataCopy/ $ ls dataCopy Step 2. Create a test file with some text in your local dataCopy folder. In your local terminal: $ rsync -av dataCopy/ In your ssh terminal: $ ls /data

Packing up

Cleaning up Be responsible and have your instance and volume storage up and running only when you really need it. Or your resources will sit idle, and you will be using up your CPU hours and block the resources to other researchers. We will now learn how to Terminate instances Securely erase data Delete volumes

Securely erasing data Just removing all files from your secondary ephemeral drive or your Volumes won’t do the job. To securely erase the data, you have to overwrite all bits with other (random) bits.

Securely erasing data This is good, but: To make absolutely sure nobody ever gets access to your data, you should encrypt it! After securely erasing data, you can release the storage. Terminate instance to release 2ndary drive. Delete volume storage.

Securely erasing data A number of tools can be used to securely erase data: The dd command line utility $ sudo dd if=/dev/urandom of= bs=4K The shred command line utility $ sudo shred -v.. and more. See On-Line Documentation for more details.

Securely erasing data Exercise 6: Use dd to erase a volume or 2ndary ephemeral drive. Find out your device file name. In your ssh terminal: $ sudo lsblk –l Unmount your device, e.g. $ sudo umount /dev/vdc Erase the drive: $ sudo dd if=/dev/urandom of=/dev/vdc bs=4K This is finished when dd reports the error “No space left on device”

Packing up Terminating instances on the Dashboard First make sure you have securely erased the data on the secondary ephemeral disk. Go to Dashboard > Compute > Instances and find the instance you want to terminate in the list. In the right-hand side drop-box next to the instance, select Terminate instance.

Packing up Deleting Volumes on the Dashboard First, make sure you have securely erased all data. Detach the Volume from any instance. go to Dashboard > Compute > Volumes and find the volume you want to delete in the list. In the right-hand side drop-down menu, select Delete Volume.

Closing note You have now learned how to back up your instances and your data. release resources securely for other researchers. recover your resources after you have terminated or deleted them. You are now ready to apply your knowledge about the Research Cloud to your research!