Changes for page Proxmox Backup server
Last modified by Kevin Wiki on 2024/05/21 21:23
From version
20.1
edited by Kevin Wiki
on 2024/04/06 14:02
on 2024/04/06 14:02
Change comment:
There is no comment for this version
To version
28.1
edited by Kevin Wiki
on 2024/05/21 19:17
on 2024/05/21 19:17
Change comment:
There is no comment for this version
Summary
Details
- Page properties
-
- Content
-
... ... @@ -2,6 +2,12 @@ 2 2 ((( 3 3 (% class="col-xs-12 col-sm-8" %) 4 4 ((( 5 +(% class="wikigeneratedid" %) 6 +Following provides setup steps, configuration explanation and application instructions for backup server. This box both generates backups and syncs them to remote locations. View general backup explanation page [[Server backup>>doc:infra.Backup.WebHome]] for high-level information. 7 + 8 +(% class="wikigeneratedid" %) 9 +Web GUI: [[https:~~/~~/clio.schleppe:8007/#pbsDashboard>>url:https://clio.schleppe:8007/#pbsDashboard]] 10 + 5 5 = Backup Server configuration = 6 6 7 7 Backup server is setup with: ... ... @@ -128,9 +128,6 @@ 128 128 129 129 Tailscale is used to create a network that uses wireguard to transparently between local and remote machines. To not require a third party a local instance of headscale is used as the tailscale login server. 130 130 131 -Setting up a connection should only require `sudo tailscale up ~-~-login-server https:~/~/TAILSCALE_SUBDOMAIN.schleppe.cloud`. 132 -To view the status: `sudo tailscale status`. 133 - 134 134 {{code language="bash"}} 135 135 curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null 136 136 curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list ... ... @@ -139,10 +139,24 @@ 139 139 sudo apt-get install tailscale 140 140 141 141 systemctl status tailscaled.service 142 -sudo tailscale up --login-server SUBDOMAIN.schleppe.cloud --authkey AUTHKEY145 +sudo tailscale up --login-server SUBDOMAIN.schleppe.cloud 143 143 tailscale status 144 144 {{/code}} 145 145 149 +Connect to headscale login server: 150 + 151 +{{code language="none"}} 152 +$ sudo tailscale up --login-server https://SUBDOMAIN.schleppe.cloud 153 + 154 +To authenticate, visit: 155 + 156 + https://SUBDOMAIN.schleppe.cloud/register/nodekey:fe30125f6dc09b2ac387a3b06c3ebc2678f031d07bd87bb76d91cd1890226c9f 157 + 158 +Success. 159 +{{/code}} 160 + 161 +View more info in the docs: [[https:~~/~~/earvingad.github.io/posts/headscale/>>https://earvingad.github.io/posts/headscale/]] 162 + 146 146 = Jottacloud client = 147 147 148 148 Cloud backup provider used is jottacloud. They provide a cli to easily add directories to sync to their cloud backup storage. ... ... @@ -191,16 +191,54 @@ 191 191 192 192 It also seems like there are a LOT of files shifting - being added and deleted. Making the diff uploaded to jottacloud huge. 193 193 211 += Syncthing = 212 + 213 +TODO 214 + 194 194 = Client Configuration = 195 195 196 196 Configure Backup on the Datacenter or PVE host level in the proxmox web GUI. If a backup storage is already added input the following preferences: 197 197 198 198 * selection mode: include selected VMs 199 -* send email to: [[kevin.midboe+PVE_HOSTNAM[email protected]>>mailto:kevin.midboe+PVE_HOSTNAME@gmail.com]]220 +* send email to: EMAIL_ADDRESS 200 200 * email: on failure only 201 201 * mode: snapshot 202 202 * enabled: true 203 203 * job comment: ~{~{guestname}}, ~{~{node}}, ~{~{vmid}} 225 + 226 + 227 += Debugging/issues live here = 228 + 229 +== Permission denied anything for certain backups == 230 + 231 +When trying to restore a VM I noticed that it was very outdated. Before doing anything I got a `Permission denied (os error 13)` error message. I checked the permissions of the storage mount in proxmox cluster, generated new API key, removed and re-added the storage to node getting permission denied, and what gave it away I also got it when running the CLI command from proxmox-backup-server host. 232 + 233 +{{code language="bash"}} 234 +kevin@clio:~$ sudo proxmox-backup-client snapshot forget -ns apollo -repository proxmox-backup 'vm/201/2023-07-31T01:31:18Z' 235 +[sudo] password for kevin: 236 +Password for "root@pam": ***************** 237 +fingerprint: **:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:** 238 +Are you sure you want to continue connecting? (y/n): y 239 +storing login ticket failed: $XDG_RUNTIME_DIR must be set 240 +Error: removing backup snapshot "/mnt/pergamum/proxmox-backup/ns/apollo/vm/201/2023-07-31T01:31:18Z" failed - Permission denied (os error 13) 241 + 242 +kevin@clio:~$ ls -l "/mnt/pergamum/proxmox-backup/ns/apollo/vm/201/2023-07-31T01:31:18Z" 243 +total 263 244 +-rw-r--r-- 1 root root 667 Feb 17 01:16 client.log.blob 245 +-rw-r--r-- 1 root root 167936 Feb 17 01:16 drive-scsi0.img.fidx 246 +-rw-r--r-- 1 root root 539 Feb 17 01:16 index.json.blob 247 +-rw-r--r-- 1 root root 342 Feb 17 01:16 qemu-server.conf.blob 248 +{{/code}} 249 + 250 +Aha! The owner of everything in these folders should be `backup:backup`. 251 + 252 +**Resolve using:** 253 + 254 +{{code language="bash"}} 255 +kevin@clio:~$ sudo chown -R backup:backup /mnt/pergamum/proxmox-backup/ns/apollo/* 256 +{{/code}} 257 + 258 + 204 204 ))) 205 205 206 206