-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 12/11/18 6:21 AM, Chris Laprise wrote: > On 12/10/2018 08:27 PM, Andrew David Wong wrote: >> On 12/10/18 11:57 AM, Chris Laprise wrote: >>> On 12/10/2018 05:23 AM, Ivan Mitev wrote: >>>> That's really great work. >>>> >>>> On 12/9/18 5:38 PM, Chris Laprise wrote: >>>> >>>>> Status - Alpha version >>>>> ------ >>>>> >>>>> Can do full or incremental backups of Linux thin-provisioned LVM to >>>>> local dom0 or VM filesystems or via ssh, as well as simple volume >>>>> retrieval for restore and verify. >>>> >>>> I'm not familiar with the way OS X Time Machine works - apologies if >>>> that's a dumb question: would the tool be able to backup to a LUKS >>>> volume mounted in a VM, with the underlying volume being a file on an >>>> NFS share on a NAS ? (that's a bit convoluted but that's the way I >>>> backup my stuff now). >>> >>> It sounds like your setup would work readily with the current alpha >>> version: A remote disk image file accessed via NFS by a Qubes VM, and >>> the VM does a 'losetup' on the disk image file and then 'cryptsetup >>> luksOpen' on the loop device... If so, that's very similar to my own >>> setup where I use sshfs instead of NFS. For this kind of setup, specify >>> 'qubes://vmname' as the destvm in sparsebak.ini. >>> >>> Any VM-mounted disk filesystem thats reasonably modern (like Ext4 or >>> even NTFS) should work regardless of whether the back end is remote or >>> local. >>> >>> OTOH, someone wishing to directly use NFS, sshfs or samba sharing >>> (without an intermediate disk image file) would have some experimenting >>> to do at this stage as I haven't yet explored it. But it might work >>> without any special steps. The main thing is that currently sparsebak >>> will expect to see a mountpoint. >>> >>> Finally, there is an option to store each backup session as a single >>> .tar file which doesn't require hard links but this naturally limits the >>> user's maintenance options and makes restoring a volume much slower. >>> >>> >>>> >>>> > [...] >>>> > >>>> > One more item under 'Todo' I should also mention is the name: I >>>> don't >>>> > really like the current working title and would appreciate your >>>> > suggestions and PRs on this and many other issues! >>>> >>>> Given how backups take forever to complete and how they trash my >>>> laptop's CPU I do hope that the tool will get included "upstream" if >>>> no major issues are found. The name could be qubes-incremental-backup >>>> ; or the project, "Qubes incremental backups". Anyway, I'm not good at >>>> find good names :) >>>> >>> >>> You should find sparsebak to be extremely CPU & IO efficient for >>> incremental backups. For full/initial backups the advantage isn't as >>> dramatic, but should still be noticeable. >>> >>> I've already pointed Marek to the underlying fast delta-harvesting tech >>> that sparsebak uses in LVM and he seemed interested in that aspect. >>> Qubes is certainly also welcome to borrow or adopt code from my project >>> or have qvm-backup act as a wrapper for sparsebak. >>> >>> For now, I'd like to make it convenient for Qubes users to configure >>> volumes in sparsebak and run backup sessions. The next step is including >>> VM settings along with the volumes in the backups, and integrating >>> encryption so the user doesn't feel compelled to setup a destination >>> LUKS volume. >>> >> >> Looks great, Chris! Would you be willing to submit this as a package >> contribution? >> >> https://www.qubes-os.org/doc/package-contributions/ > > Yes, although I'll probably wait until it gets to beta stage before > submitting it. >
Sounds good! Looking forward to seeing this in Qubes someday. :) - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlwQapAACgkQ203TvDlQ MDCGpxAAwu9NZXUQaoToXFETojXn8gwIniZ0zLk6tJLXkLZx3GK7yjpkluQAV+oq AM04+suVJEVrOiYd17hVMxgZ9MDEhS5NtBIPwwGc7jqfBmubHA6ic9mromSUAFzR KssWIgDqQiVOya+u4rCRhOmMvQfvavhyOEb3/woXKyMVFB+MU8jN+HtVVntjkysl ldUAkSTuWJRYTqaIzuyM7hri/agxgC6WTujNrV7XJNNOtQAXFReq5b+JJu3GaXSH OoXZLonLT9bHiSrXbzpqk7E6U68F+cb1DTc6q1ESU7OfUDJHKHu+P2bwcPSIq7UU V0xlEFZSdwM4tW9kePkRGNjZjLLr4TwilRgoI6wwOlnR1B/hWQF1ThK9zJNft1eS 9D4fkp0HANgV21IYXd5OzYcivEShyRA/Jqbow9fu4diIT9wT/2+saahTy8I8bVA9 UFr0a1iPabsg/j3GGyrxl6KTN/pOCeI8xJkEtH+hCgmoEus8yJeS1o168oxUYs4o +ci1L1ym+94IZOgXGhUmk1+ba3U3z/POiy+HOyID6grBRZ3VTmDbx0WnzWPSDZyv vOy/2UnhcfwFv4FOgx6DItCwz8DmdEAwl3VujaF8K6GJILcGqhNsKMxuGkJ94l/X M+ptLQmEf+mtGNqWuostCyWtEu29oAeuxkAu3wFbvKPJv7y2i+s= =KFSb -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/8eeed6df-a722-79db-3b4e-c0545c7b4a7d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.