this post was submitted on 16 Jun 2023
9 points (100.0% liked)

datahoarder

7307 readers
3 users here now

Who are we?

We are digital librarians. Among us are represented the various reasons to keep data -- legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g. government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they're sure it's done right. Everyone has their reasons for curating the data they have decided to keep (either forever or For A Damn Long Time). Along the way we have sought out like-minded individuals to exchange strategies, war stories, and cautionary tales of failures.

We are one. We are legion. And we're trying really hard not to forget.

-- 5-4-3-2-1-bang from this thread

founded 5 years ago
MODERATORS
9
3-2-1 Backup Rule (www.starwindsoftware.com)
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 

Something i haven't seen posted here yet, but worth say over and over again.

Murphy's law says that anything that can go wrong will go wrong… but with the 3-2-1 strategy in place, your data always survives.

top 9 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 2 years ago (2 children)

any opinions about leaving a drive or two at work? I'm wondering if there's any risk to this, but it seems a convenient way to have off-site storage if I leave a couple drives in my drawer at work. encrypted of course...

[–] [email protected] 3 points 2 years ago (1 children)

My only concern would be if you end up leaving the company it might look suspicious when you're packing up some hard drives along with the rest of the stuff from your desk. Particularly if you're laid off, fired, etc.

[–] [email protected] 1 points 2 years ago

yeah that's a good point. would need a good explanation for the presence of drives that nobody can open.

[–] [email protected] 1 points 2 years ago (1 children)

IMHO There are complications with doing this at work. If you're in the tech industry, (or anything with computers at work), you could be accused of stealing data or doing something malicious or just have it stolen by someone at the office, (which goes into if you should encrypt your data... another can of worms to open).

The risk assessment is for you to decide.

[–] [email protected] 1 points 2 years ago

I mean, it also depends on the people you work with. You could just ask whoever is in charge if you can. Worst they will say is no. It is amazing how far you can get with a friendly smile and a box of doughnuts.

[–] [email protected] 3 points 2 years ago* (last edited 2 years ago) (1 children)

What’s the best way to make an offsite backup for 42tb at this point with 20mbps of bandwidth? It would take over 6 months to upload while maxing out my connection.

Maybe I could sneakernet an initial backup then incrementally replicate?

[–] [email protected] 2 points 2 years ago

Outside my depth but I'll give it a stab. Identify what data is important, (is the full 42Tb needed?). Can the data be split into easier to handle chunks?

If it is, then I personally do an initial sneakernet to get the fist set of data over. Then mirror different on a regular basis.

[–] [email protected] 2 points 2 years ago

Yes and of course as per usual here is the needed comment saying RAID is not a backup.

[–] [email protected] 2 points 2 years ago

I think it's as equally important to remember; A backup is not back up... Until you've restored from it.

Test your backups, folks.

load more comments
view more: next ›