Check tape dump
A couple of quick questions:
1) How do I confirm that my tape dump has properly completed? At the moment I run the commands: Code:
>dump -0f /dev/nst0 /boot 2) How can I make the tape drive on st0 available to another server to do the same backup on it? Would it be easier to mount / on the other server to a share on the first? Background Red Hat ES4, Ultrium 960 LTO drive |
It's always good to check backup tapes and confirm that your backup worked. You've used dump and created two dump files on the tape. You can check it using the mt command and the restore command. There is an interactive option (-i) for restore that allows you to look through the contents of the tape and tag files to restore. You can do things like:
Code:
# mt -f /dev/nst0 status As far as getting a dump from one machine to the tape drive on another, there was just a discussion of this topic on another thread. It was with reference to Solaris and ufsdump, but the same thing works with linux and dump. Check it out here: http://www.linuxquestions.org/questi...aris-9-611910/ |
Thanks for that. I seem to be having some problems.
The dump seems to be OK using the dump described above, and also adding -b 256 to get better speeds from the LTO. However, when I try the second mt command I get an error, similarly when I try to run restore. Output as follows: Code:
# dump -0u -b 256 -f /dev/nst0 /boot |
OK managed to fix the mt problem. Needed to have the tape rewound. My Bad :)
Also managed to find a suggestion on using ssh to tunnel to the server hosting the tape drive for dump. However, how do you define the password - seems to catch me in a loop when I try... |
Sounds like you're figuring things out.
Not sure how you are trying to do the password. Did you look at the other thread? It was intended using public key authentication for the ssh. You can find very good detailed documentation of how to do that at the following sites: http://sial.org/howto/openssh/publickey-auth/ http://sourceforge.net/docman/displa...761&group_id=1 Having an actual password in a script and trying to get the password to be applied to the login is insecure and messy. With keys, you can also have restrictions specified in the private key portion that prevent misuse. For example, I use ssh public/private key combinations for the backup user amanda, and the private key portion only allows the amanda user from the specified computer to connect only to the amanda process using that public key. Pretty cool. |
All times are GMT -5. The time now is 03:55 AM. |