![]() ![]() Apart from the Hyper-V role, Windows Server also includes various server roles and features, thus, providing more advanced functionality than the Hyper-V Server.As for Windows Server 2016, you first need to install Windows Server 2016 and then manually enable the Hyper-V role on your computer. Hyper-V Server 2016 is ready for use right after the installation operation is complete. While for openSUSE: sudo zypper install resticįor those who are Solus users eopkg install resticįinally for those who are interested in knowing more about it and also in consulting its mode of use, you can consult the details In the following link.In general, free Hyper-V Server and the Hyper-V role on Windows Server differ in the following ways: Or in the case of Red Hat or CentOS and derivatives or based on these: sudo dnf install epel-release In the case of those who are users of Arch Linux, Manjaro or any other derivative: sudo pacman -S resticįor Fedora users: sudo dnf install restic How to install Restic on Linux?įor those who are interested in being able to install this tool, as mentioned above, its installation process is relatively simple, since the utility is within the majority of the repositories of the main Linux distributions.įor example, to install Restic on Ubuntu, Debian or derivatives, just open a terminal and type: sudo apt-get install restic It is possible to verify the backup using checksums and authentication codes to confirm that the integrity of the files is not violated and that the necessary files can be restored and do not include hidden modifications. Encryption can be provided by both access keys and passwords. Information on external servers is stored in encrypted form (SHA-256 is used for checksums, AES-256-CTR for encryption, and Poly1305-AES-based authentication codes to ensure integrity.) The system was originally designed to ensure that backups are stored in untrusted environments and that a backup falling into the wrong hands does not compromise the system. It also provides commands to analyze changes and selectively extract files. To visually assess the contents of the repository and simplify recovery, a snapshot with a backup can be mounted in the form of a virtual partition (mounted with FUSE). Based on the SHA-256 hash of the content, deduplication is performed and unnecessary copying of data is excluded. The information is stored in association with the content, not with the names of the files (the names and entities associated with the data are defined at the block metadata level). The system does not handle entire files, but blocks float-size selected using the Rabin signature. To ensure efficient storage, repository data is not duplicated and additional snapshots cover only changed data. To save traffic, only changed data is copied during the backup process. It is possible to copy snapshots between different repositories. Every time a new backup is created, a snapshot associated with it is created, allowing you to restore the current state. Snapshots are supported, that reflect the state of a particular directory with all files and subdirectories at a given time. A repeatable assembly is provided for the executable file itself, allowing you to independently verify that the binary assembly is formed from the supplied source texts. To work with backups, it is enough to copy an executable file that can be used without additional settings. Restic is easy to install, use, and retrieve information, plus it's worth mentioning that it's cross-platform (Linux, macOS, Windows, FreeBSD, and OpenBSD). The format of ignore rules is familiar and resembles rsync or gitignore. It has support for storing backups on a local file system, on an external server with road access SFTP/SSH or HTTP REST, in the clouds Amazon S3, OpenStack Swift, BackBlaze B2, Microsoft Azure Blob Storage, and Google Cloud Storage, as well as any storage for which there are rclone backends.Ī special rest server can also be used to organize storage, giving higher performance compared to other backends and can work in an add-only mode that won't let you delete or change backups in case the origin server is compromised and access the encryption.Īnother of the positive points of restic is that has support for defining flexible rules to exclude files and directories when creating backups (for example, to exclude logs, temporary files, and easily reproducible data from the backup). Restic data is stored in encrypted form, plus the user can define flexible rules to include and exclude files and directories when creating a backup. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |