CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Understand the correct way to backup with shell tools
Backups
Backups
Terms and Utilities
rsync,
tar,
burning software,
tape drive
rsync,
tar,
enterprise backup software,
tape libraries
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
What to backup
3
Backup for:
•Hardware failures
•Software failures
•[Epic] User failures
•Disasters
Backups
What to backup:
•At minimum, all user data and intellectual property
•At maximum, entire systems, OS and all
Factors for what gets backed up:
•budget
•time
•resources
•need
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Where to backup and How
4
Backup to:
•Local online copies
•Remote online copies
•Offline copies - Disk, Tape
How to Backup:
•Small scenario:
rsync, tar, burning software, tape drive
•Large scenario:
rsync, tar, enterprise backup software, tape libraries
Backups
How to backup a directory?
The directory represents an entire tree of files and directories?
How can you put all of the information necessary to recreate the tree into one file?
tar
Originally the Tape Archive tool. Used to backup directory trees to tape.
Nowadays more commonly used to “flatten” a tree into one file.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and view tar archives
5
To create a tar archive: tar cf <tarfile.tar> <file> [file]...
•The c option tells tar to create an archive.
•The f option is critical - tells tar to put archive in a file on disk, rather than on tape device.
•You can add the v option (tar cvf) to get verbose output.
Tar will report every file added to the archive.
Backups
To view a tar archive (a table of contents): tar tf tarfile.tar
•The t option asks tar to print a table of contents of the archive.
•add the verbose flag (tvf), tar will report detailed info on each file, similar to ls –l cmd.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
extract tar archives
6
To Extract right requires understanding of how tar stores file in the archive.
•When an archive is created, the pathnames are stored into the archive.
•When you view the table of contents, you’re viewing the relative pathnames as they would
be created on extraction.
Backups
Ex: • If tar tvf file.tar reports:
memo.txt
report/
report/data
• Then when the archive is extracted, resulting files will be:
CWD/memo.txt
CWD/report/
CWD/report/data
• Where CWD represents the current working directory
To extract an archive: tar xf tarfile.tar
•(careful) tarfile.tar will be extracted to the current working directory.
•Understand contents of tar file to be sure you don’t accidentally overwrite existing files.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
compress arquives
7
Tar files can get quite large, and storing/sharing them uncompressed wastes a
large amount of storage space and bandwidth.
Enter: compression.
Compression uses complex algorithms to rewrite contents of a file in a way that
takes up less space, and can be reversed back to original contents.
Backups
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Compression algorithms
8
BZIP2 - Powerful algorithm: Burrows-Wheeler Block Sorting Huffman Coding
•Achieves 50-75% compression on average
•Extension: .bz2
•Compress: bzip2
•Decompress: bunzip2
Backups
One of the original compression algorithms: the Adaptive Lempel-Ziv.
Not used very much any more, especially in Linux environment
•Achieves 40-50% compression on average
•Extension: .Z
•Compress: compress
•Decompress: decompress
GZIP - Updated algorithm: Limpel-Ziv 77 ( LZ77 )
•Achieves 60-70% compression on average
•Extension: .gz
•Compress: gzip
•Decompress: gunzip
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tar + compression
9
Backups
Once a tarball has been created, it’s generally compressed with gzip or bzip2
Ex: gzip -9 tarfile.tar
bzip2 -9 tarfile.tar
•The -9 option tells compression tool to maximize compression efficiency (taking longer).
•1-9 are acceptable values, with -1 indicating minimal efficiency and maximum speed.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
ZIP Files
10
Backups
Zip files, originally put forward in DOS/Windows world via the pkzip tools, and now
winzip, are actually a combination of hierarchy archiving and compression.
zip files include features of tar and compression in one format.
There are open source tools which allow access to creating, viewing and extracting zip files in
the Linux environment.
ZIP - Lots of algorithms implemented
Varying compression ratio depending on algorithms used
•Extension: .zip
•Compress: zip
•Decompress: unzip
• zip files are not just compressed files. Archive contains files and directories within, so
interface is closer to tar than gzip or bzip2.
• Generally, zip files are only encountered in the Linux when interacting with Windows world.
Within Linux, everything is a compressed tarball
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
11

More Related Content

PPT
101 apend. backups
PDF
Archiving in linux tar
PPT
Compression Commands in Linux
PPT
4.1 create partitions and filesystems
PPT
101 4.1 create partitions and filesystems
PDF
quickguide-einnovator-10-redis-admin
PPTX
Hadoop Interacting with HDFS
PDF
CASPUR Staging System II
101 apend. backups
Archiving in linux tar
Compression Commands in Linux
4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
quickguide-einnovator-10-redis-admin
Hadoop Interacting with HDFS
CASPUR Staging System II

What's hot (20)

PDF
Scaling Servers and Storage for Film Assets
ODP
Rpm Introduction
PDF
Redhat 6 & 7
PDF
The Linux Command Cheat Sheet
PPT
Linux Commands
ODP
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
PDF
Linux fundamental - Chap 09 pkg
PPT
101 3.3 perform basic file management
PPT
101 2.4 use debian package management
PPT
3.3 perform basic file management
PDF
Pitr Made Easy
PDF
Basic shell commands by Jeremy Sanders
PPTX
JetStor Unified Storage NAS/SAN/Cloud 1600s
PDF
CASPUR Tape Dispatcher
KEY
Redis - N✮SQL Berlin
PDF
Docker and coreos20141020b
PDF
HDFS_Command_Reference
PPT
101 3.3 perform basic file management
PPT
101 3.3 perform basic file management
PDF
Linux Security Quick Reference Guide
Scaling Servers and Storage for Film Assets
Rpm Introduction
Redhat 6 & 7
The Linux Command Cheat Sheet
Linux Commands
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Linux fundamental - Chap 09 pkg
101 3.3 perform basic file management
101 2.4 use debian package management
3.3 perform basic file management
Pitr Made Easy
Basic shell commands by Jeremy Sanders
JetStor Unified Storage NAS/SAN/Cloud 1600s
CASPUR Tape Dispatcher
Redis - N✮SQL Berlin
Docker and coreos20141020b
HDFS_Command_Reference
101 3.3 perform basic file management
101 3.3 perform basic file management
Linux Security Quick Reference Guide
Ad

Viewers also liked (20)

PPT
4.3 control mounting and unmounting of filesystems v2
PPT
1.1 hardware settings v2
PPT
4.6 create and change hard and symbolic links v2
PPT
Apend. kernel
PPT
4.9.a apend tuning and performance
PPT
Apend. networking linux
PPT
3.5 create, monitor and kill processes v2
PPT
4.5 manage file permissions and ownership v3
PPT
4.9 apend troubleshooting tools v2
PPT
3.8 perform basic file editing operations using vi
PDF
1.1.b hdd block sector
PDF
3.8.a how to - vim course book
PDF
Angebote fuer psychisch kranke, abhängigkeitskranke und geistig behinderte me...
PPT
Apend. networking generic a
PPT
Apend. networking generic b details
PPT
4.7 find system files and place files in the correct location
PPT
1.2 boot the system v2
PPT
1.3 runlevels, shutdown, and reboot v3
PPT
4.4 manage disk quotas
PDF
1.1.a mbr limits v2
4.3 control mounting and unmounting of filesystems v2
1.1 hardware settings v2
4.6 create and change hard and symbolic links v2
Apend. kernel
4.9.a apend tuning and performance
Apend. networking linux
3.5 create, monitor and kill processes v2
4.5 manage file permissions and ownership v3
4.9 apend troubleshooting tools v2
3.8 perform basic file editing operations using vi
1.1.b hdd block sector
3.8.a how to - vim course book
Angebote fuer psychisch kranke, abhängigkeitskranke und geistig behinderte me...
Apend. networking generic a
Apend. networking generic b details
4.7 find system files and place files in the correct location
1.2 boot the system v2
1.3 runlevels, shutdown, and reboot v3
4.4 manage disk quotas
1.1.a mbr limits v2
Ad

Similar to 4.8 apend backups (20)

PPT
101 4.2 maintain the integrity of filesystems
PPT
101 4.2 maintain the integrity of filesystems
PPT
4.2 maintain the integrity of filesystems
PPTX
linuxtl04.pptx
PPT
2.5 use rpm and yum package management
PPT
101 2.5 use rpm and yum package management
PPT
101 2.5 use rpm and yum package management
PPT
101 apend. troubleshooting tools v2
PPT
101 apend. kernel
PPT
101 4.4 manage disk quotas
PPT
101 4.4 manage disk quotas
PDF
Inspection and maintenance tools (Linux / OpenStack)
PDF
Linux Server Deep Dives (DrupalCon Amsterdam)
DOCX
How to install_and_configure_r_on_a_linux_server
PDF
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
PDF
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
DOCX
Cis 2903 project -202110
PDF
17 Linux Basics #burningkeyboards
PPT
Linux
PDF
Read-only rootfs: theory and practice
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
4.2 maintain the integrity of filesystems
linuxtl04.pptx
2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
101 apend. troubleshooting tools v2
101 apend. kernel
101 4.4 manage disk quotas
101 4.4 manage disk quotas
Inspection and maintenance tools (Linux / OpenStack)
Linux Server Deep Dives (DrupalCon Amsterdam)
How to install_and_configure_r_on_a_linux_server
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
Cis 2903 project -202110
17 Linux Basics #burningkeyboards
Linux
Read-only rootfs: theory and practice

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Getting Started with Data Integration: FME Form 101
DOCX
search engine optimization ppt fir known well about this
PDF
Hybrid model detection and classification of lung cancer
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Unlock new opportunities with location data.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Getting Started with Data Integration: FME Form 101
search engine optimization ppt fir known well about this
Hybrid model detection and classification of lung cancer
Univ-Connecticut-ChatGPT-Presentaion.pdf
Architecture types and enterprise applications.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
Unlock new opportunities with location data.pdf
Getting started with AI Agents and Multi-Agent Systems
A review of recent deep learning applications in wood surface defect identifi...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Zenith AI: Advanced Artificial Intelligence
Enhancing emotion recognition model for a student engagement use case through...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

4.8 apend backups