Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Meaningfully backup dom0 with Qubes Backup #5608

Closed
marmot1791 opened this issue Jan 29, 2020 · 2 comments
Closed

Meaningfully backup dom0 with Qubes Backup #5608

marmot1791 opened this issue Jan 29, 2020 · 2 comments
Labels
P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. R: duplicate Resolution: Another issue exists that is very similar to or subsumes this one. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.

Comments

@marmot1791
Copy link

The problem you're addressing (if any)
Qubes Backup does not meaningfully backup dom0. The backup only includes the user's home directory which should contain effectively nothing. The parts of dom0 that may have actually been customized like the Qubes-RPC policy in /etc or the Salt configurations are not backed up.

Describe the solution you'd like
Initially, better documentation to the end user that dom0 is not backed up in a meaningful way.
Then, actual backups of useful dom0 configuration files.

Where is the value to a user, and who might that user be?
Most end users expect to be able to go from a fresh install + recent backup back to their prior state. Qubes Backup implies that promise by capturing all Qubes and offering to backup dom0, but does not keep that implied promise by storing dom0 data.

The Qubes documentation mentions changes to the dom0 configuration in several places, these changes should be preserved after a restore so they do not need to be manually recreated.

Describe alternatives you've considered
One alternative might be to version and or backup the dom0 configuration directly into the user's dom0 home directory so that the existing backup system need not be modified at all.

Another alternative might be to modify the backup implementation to capture more of dom0, but perhaps not all of dom0.

Questions for others
What configuration data in dom0 should be backed up? /etc? /srv?
What is the impact of restoring dom0 configuration data across versions of Qubes - both minor and major versions? Even if we're just advising users how to restore configuration data and not restoring it automatically, what advice should we give them?

Relevant documentation you've consulted
Backup and restore documentation: https://www.qubes-os.org/doc/backup-restore/

Related, non-duplicate issues
restore process UX issues: #4946
backup VM list improvements: #4712

@marmot1791 marmot1791 added P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. labels Jan 29, 2020
@andrewdavidwong
Copy link
Member

Duplicate of #1635

@andrewdavidwong andrewdavidwong marked this as a duplicate of #1635 Jan 30, 2020
@andrewdavidwong
Copy link
Member

This appears to be a duplicate of an existing issue. If so, please comment on the appropriate existing issue instead. If you believe this is not really a duplicate, please leave a comment briefly explaining why. We'll be happy to take another look and, if appropriate, reopen this issue. Thank you.

@andrewdavidwong andrewdavidwong added the R: duplicate Resolution: Another issue exists that is very similar to or subsumes this one. label Jan 30, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. R: duplicate Resolution: Another issue exists that is very similar to or subsumes this one. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Projects
None yet
Development

No branches or pull requests

2 participants