Cedar Backup Software Manual

Kenneth J. Pronovici

This work is free; you can redistribute it and/or modify it under the terms of the GNU General Public License (the "GPL"), Version 2, as published by the Free Software Foundation.

For the purposes of the GPL, the "preferred form of modification" for this work is the original Docbook XML text files. If you choose to distribute this work in a compiled form (i.e. if you distribute HTML, PDF or Postscript documents based on the original Docbook XML text files), you must also consider image files to be "source code" if those images are required in order to construct a complete and readable compiled version of the work.

This work is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Copies of the GNU General Public License are available from the Free Software Foundation website, http://www.gnu.org/. You may also write the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.


Table of Contents

Preface
Purpose
Audience
Conventions Used in This Book
Typographic Conventions
Icons
Organization of This Manual
Acknowledgments
1. Introduction
What is Cedar Backup?
How to Get Support
History
2. Basic Concepts
General Architecture
Data Recovery
Cedar Backup Pools
The Backup Process
The Collect Action
The Stage Action
The Store Action
The Purge Action
The All Action
The Validate Action
The Initialize Action
The Rebuild Action
Coordination between Master and Clients
Managed Backups
Media and Device Types
Incremental Backups
Extensions
3. Installation
Background
Installing on a Debian System
Installing from Source
Installing Dependencies
Installing the Source Package
4. Command Line Tools
Overview
The cback command
Introduction
Syntax
Switches
Actions
The cback-amazons3-sync command
Introduction
Syntax
Switches
The cback-span command
Introduction
Syntax
Switches
Using cback-span
Sample run
5. Configuration
Overview
Configuration File Format
Sample Configuration File
Reference Configuration
Options Configuration
Peers Configuration
Collect Configuration
Stage Configuration
Store Configuration
Purge Configuration
Extensions Configuration
Setting up a Pool of One
Step 1: Decide when you will run your backup.
Step 2: Make sure email works.
Step 3: Configure your writer device.
Step 4: Configure your backup user.
Step 5: Create your backup tree.
Step 6: Create the Cedar Backup configuration file.
Step 7: Validate the Cedar Backup configuration file.
Step 8: Test your backup.
Step 9: Modify the backup cron jobs.
Setting up a Client Peer Node
Step 1: Decide when you will run your backup.
Step 2: Make sure email works.
Step 3: Configure the master in your backup pool.
Step 4: Configure your backup user.
Step 5: Create your backup tree.
Step 6: Create the Cedar Backup configuration file.
Step 7: Validate the Cedar Backup configuration file.
Step 8: Test your backup.
Step 9: Modify the backup cron jobs.
Setting up a Master Peer Node
Step 1: Decide when you will run your backup.
Step 2: Make sure email works.
Step 3: Configure your writer device.
Step 4: Configure your backup user.
Step 5: Create your backup tree.
Step 6: Create the Cedar Backup configuration file.
Step 7: Validate the Cedar Backup configuration file.
Step 8: Test connectivity to client machines.
Step 9: Test your backup.
Step 10: Modify the backup cron jobs.
Configuring your Writer Device
Device Types
Devices identified by by device name
Devices identified by SCSI id
Linux Notes
Finding your Linux CD Writer
Mac OS X Notes
Optimized Blanking Stategy
6. Official Extensions
System Information Extension
Amazon S3 Extension
Subversion Extension
MySQL Extension
PostgreSQL Extension
Mbox Extension
Encrypt Extension
Split Extension
Capacity Extension
A. Extension Architecture Interface
B. Dependencies
C. Data Recovery
Finding your Data
Recovering Filesystem Data
Full Restore
Partial Restore
Recovering MySQL Data
Recovering Subversion Data
Recovering Mailbox Data
Recovering Data split by the Split Extension
D. Securing Password-less SSH Connections
E. Copyright