Changes for page Proxmox Backup server

Last modified by Kevin Wiki on 2024/05/21 21:23

From version 20.1
edited by Kevin Wiki
on 2024/04/06 14:02
Change comment: There is no comment for this version
To version 28.1
edited by Kevin Wiki
on 2024/05/21 19:17
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -2,6 +2,12 @@
2 2  (((
3 3  (% class="col-xs-12 col-sm-8" %)
4 4  (((
5 +(% class="wikigeneratedid" %)
6 +Following provides setup steps, configuration explanation and application instructions for backup server. This box both generates backups and syncs them to remote locations. View general backup explanation page [[Server backup>>doc:infra.Backup.WebHome]] for high-level information.
7 +
8 +(% class="wikigeneratedid" %)
9 +Web GUI: [[https:~~/~~/clio.schleppe:8007/#pbsDashboard>>url:https://clio.schleppe:8007/#pbsDashboard]]
10 +
5 5  = Backup Server configuration =
6 6  
7 7  Backup server is setup with:
... ... @@ -128,9 +128,6 @@
128 128  
129 129  Tailscale is used to create a network that uses wireguard to transparently between local and remote machines. To not require a third party a local instance of headscale is used as the tailscale login server.
130 130  
131 -Setting up a connection should only require `sudo tailscale up ~-~-login-server https:~/~/TAILSCALE_SUBDOMAIN.schleppe.cloud`.
132 -To view the status: `sudo tailscale status`.
133 -
134 134  {{code language="bash"}}
135 135  curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
136 136  curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/focal.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list
... ... @@ -139,10 +139,24 @@
139 139  sudo apt-get install tailscale
140 140  
141 141  systemctl status tailscaled.service
142 -sudo tailscale up --login-server SUBDOMAIN.schleppe.cloud --authkey AUTHKEY
145 +sudo tailscale up --login-server SUBDOMAIN.schleppe.cloud
143 143  tailscale status
144 144  {{/code}}
145 145  
149 +Connect to headscale login server:
150 +
151 +{{code language="none"}}
152 +$ sudo tailscale up --login-server https://SUBDOMAIN.schleppe.cloud
153 +
154 +To authenticate, visit:
155 +
156 + https://SUBDOMAIN.schleppe.cloud/register/nodekey:fe30125f6dc09b2ac387a3b06c3ebc2678f031d07bd87bb76d91cd1890226c9f
157 +
158 +Success.
159 +{{/code}}
160 +
161 +View more info in the docs: [[https:~~/~~/earvingad.github.io/posts/headscale/>>https://earvingad.github.io/posts/headscale/]]
162 +
146 146  = Jottacloud client =
147 147  
148 148  Cloud backup provider used is jottacloud. They provide a cli to easily add directories to sync to their cloud backup storage.
... ... @@ -191,16 +191,54 @@
191 191  
192 192  It also seems like there are a LOT of files shifting - being added and deleted. Making the diff uploaded to jottacloud huge.
193 193  
211 += Syncthing =
212 +
213 +TODO
214 +
194 194  = Client Configuration =
195 195  
196 196  Configure Backup on the Datacenter or PVE host level in the proxmox web GUI. If a backup storage is already added input the following preferences:
197 197  
198 198  * selection mode: include selected VMs
199 -* send email to: [[kevin.midboe+PVE_HOSTNAM[email protected]>>mailto:kevin.midboe+PVE_HOSTNAME@gmail.com]]
220 +* send email to: EMAIL_ADDRESS
200 200  * email: on failure only
201 201  * mode: snapshot
202 202  * enabled: true
203 203  * job comment: ~{~{guestname}}, ~{~{node}}, ~{~{vmid}}
225 +
226 +
227 += Debugging/issues live here =
228 +
229 +== Permission denied anything for certain backups ==
230 +
231 +When trying to restore a VM I noticed that it was very outdated. Before doing anything I got a `Permission denied (os error 13)` error message. I checked the permissions of the storage mount in proxmox cluster, generated new API key, removed and re-added the storage to node getting permission denied, and what gave it away I also got it when running the CLI command from proxmox-backup-server host.
232 +
233 +{{code language="bash"}}
234 +kevin@clio:~$ sudo proxmox-backup-client snapshot forget -ns apollo -repository proxmox-backup 'vm/201/2023-07-31T01:31:18Z'
235 +[sudo] password for kevin:
236 +Password for "root@pam": *****************
237 +fingerprint: **:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**:**
238 +Are you sure you want to continue connecting? (y/n): y
239 +storing login ticket failed: $XDG_RUNTIME_DIR must be set
240 +Error: removing backup snapshot "/mnt/pergamum/proxmox-backup/ns/apollo/vm/201/2023-07-31T01:31:18Z" failed - Permission denied (os error 13)
241 +
242 +kevin@clio:~$ ls -l "/mnt/pergamum/proxmox-backup/ns/apollo/vm/201/2023-07-31T01:31:18Z"
243 +total 263
244 +-rw-r--r-- 1 root root 667 Feb 17 01:16 client.log.blob
245 +-rw-r--r-- 1 root root 167936 Feb 17 01:16 drive-scsi0.img.fidx
246 +-rw-r--r-- 1 root root 539 Feb 17 01:16 index.json.blob
247 +-rw-r--r-- 1 root root 342 Feb 17 01:16 qemu-server.conf.blob
248 +{{/code}}
249 +
250 +Aha! The owner of everything in these folders should be `backup:backup`.
251 +
252 +**Resolve using:**
253 +
254 +{{code language="bash"}}
255 +kevin@clio:~$ sudo chown -R backup:backup /mnt/pergamum/proxmox-backup/ns/apollo/*
256 +{{/code}}
257 +
258 +
204 204  )))
205 205  
206 206