Test Matrix rear 2.6
We will fill up this page with tests we have done (and we accept input and feedback from the ReaR community).
- ReaR GitHub master 7281059 of 2020-05-29
-
rear mkopalpba
,rear mkrescue
on x86_64 bare metal - 3 SSDs, two of them (sda, sdb) using a mirrored Btrfs configuration on TCG-Opal 2 hardware-encrypted drives
lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
sda 238,5G
|-sda1 vfat 93M /boot/efi
|-sda2 btrfs 223,1G /volumes/01
`-sda3 swap 15,3G [SWAP]
sdb 238,5G
|-sdb1 vfat 93M
|-sdb2 btrfs 223,1G
`-sdb3 swap 15,3G
sdc 119,2G
`-sdc1 crypto_LUKS 119,2G
`-Foxtrot-02 btrfs 119,2G /volumes/02
etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
BACKUP=INTERNAL
OUTPUT=RAWDISK
BTRFS_SUBVOLUME_GENERIC_SETUP="true"
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///mnt/reserve/Transfer.nobackup/ReaR-Testing/Output"
-
rear recover
on VirtualBox VM: Recreating disk layout, skipping TCG Opal-2 SED setup (unavailable in emulation), skipping sdb mirror. Complete restore of /boot/efi and / -
BACKUP=INTERNAL
is used for a custom-made backup method with custom-made scripts in matching ReaR directories like usr/share/rear/restore/INTERNAL usr/share/rear/backup/INTERNAL usr/share/rear/prep/INTERNAL usr/share/rear/build/INTERNAL (which is exactly how ReaR is meant to be adapted and enhanced as needed for a special use case, cf. https://github.com/rear/rear/pull/2353#issuecomment-606656005)
- ReaR GitHub master 7281059 of 2020-05-29
-
rear mkrescue
on VirtualBox VM (x86_64) lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME FSTYPE SIZE MOUNTPOINT
sda 256G
|-sda1 vfat 512M /mnt/local/boot/efi
`-sda2 ext4 255.5G /mnt/local
sdb 256G
etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
OUTPUT=RAWDISK
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///tmp/ReaR-Output"
-
rear recover
on VirtualBox VM: Recreating disk layout only (as no backup method was used).
- ReaR GitHub master b41b4ad53941046860fc9caf321bb69ca875b28d of 2020-06-16
-
rear mkopalpba
,rear mkrescue
on x86_64 bare metal - 3 SSDs, two of them (sda, sdb) using a mirrored Btrfs configuration on TCG-Opal 2 hardware-encrypted drives
lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME FSTYPE SIZE MOUNTPOINT
sda 238,5G
|-sda1 vfat 93M /boot/efi
|-sda2 btrfs 223,1G /volumes/01
`-sda3 swap 15,3G [SWAP]
sdb 238,5G
|-sdb1 vfat 93M
|-sdb2 btrfs 223,1G
`-sdb3 swap 15,3G
sdc 119,2G
`-sdc1 crypto_LUKS 119,2G
`-Foxtrot-02 btrfs 119,2G /volumes/02
etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
BACKUP=INTERNAL
OUTPUT=RAWDISK
BTRFS_SUBVOLUME_GENERIC_SETUP="true"
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///mnt/reserve/Transfer.nobackup/ReaR-Testing/Output"
-
rear recover
on x86_64 bare metal - 1 SSD (TCG-Opal 2 hardware-encrypted drive), 1 HDD with the following block devices
NAME FSTYPE SIZE MOUNTPOINT
sda 238,5G
|-sda1 vfat 93M /boot/efi
|-sda2 btrfs 223,1G /
`-sda3 swap 15,3G [SWAP]
sdb 931,5G
`-sdb1 crypto_LUKS 931,5G
`-Foxtrot-02 btrfs 931,5G /volumes/02
- Complete restore where
BACKUP=INTERNAL
is used for a custom-made backup method, cf. the above test with Ubuntu 18.04.4 LTS (Desktop).
- Relax-and-Recover 2.5-git.3899.a575f8a.master / 2020-04-22
- Internal backup with BACKUP=NETFS (using tar)
- boot method: PXE
- /etc/rear/local.conf file:
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME
BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs
PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_CREATE_LINKS="IP"
USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"
FIRMWARE_FILES=( 'no' )
SSH_ROOT_PASSWORD="vagrant"
TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
USER_INPUT_TIMEOUT=3
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-04-27_14-01-39
- test results: https://gist.github.com/95bb816a60ffc880ab2503c4f96a7ca5
- CentOS 7.5
- Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
- Internal backup with BACKUP=NETFS (using tar)
- boot method: PXE
- /etc/rear/local.conf file:
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME
BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs
PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_RECOVER_MODE="unattended"
PXE_CREATE_LINKS="IP"
USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"
FIRMWARE_FILES=( 'no' )
SSH_ROOT_PASSWORD="vagrant"
TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_14-20-06
- test results: https://gist.github.com/d17c7cfff9da7c17539b904daf09175e
- CentOS 7.5
- Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
- Internal backup with BACKUP=BAREOS (version 17.2.7 (16 Jul 2018))
- boot method: ISO
- /etc/rear/local.conf file:
UTPUT=ISO
OUTPUT_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/isos
OUTPUT_OPTIONS="nfsvers=3,nolock"
BACKUP=BAREOS
BAREOS_RESTORE_JOB=client-restore
BAREOS_FILESET=client-fileset
BAREOS_RECOVERY_MODE="automatic"
PRE_BACKUP_SCRIPT=/usr/local/bin/client-backup-with-bareos
PROGS+=( showmount mount.nfs umount.nfs )
MODULES+=( nfs )
PRE_RECOVERY_SCRIPT="systemctl start rpcbind.target || rpcbind &"
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
ISO_DEFAULT="automatic"
ISO_RECOVER_MODE="unattended"
USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"
FIRMWARE_FILES=( 'no' )
SSH_ROOT_PASSWORD="vagrant"
TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_15-14-17
- test results: https://gist.github.com/b3eb0f20c5e0ba94c36b292323ae63b4
- CentOS 7.8
- Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
- Internal backup with BACKUP=NETFS (using tar)
- boot method: PXE
- /etc/rear/local.conf file
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME
BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs
PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_RECOVER_MODE="unattended"
PXE_CREATE_LINKS="IP"
USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"
FIRMWARE_FILES=( 'no' )
SSH_ROOT_PASSWORD="vagrant"
TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_16-07-57
- test results: https://gist.github.com/6d94e68d7548a915425b8ffd720dfed3
- Relax-and-Recover 2.5-git.0.0ea61df.unknown / 2020-06-04
- VirtualBox VM
- Disk layout
lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME FSTYPE SIZE MOUNTPOINT
sda 32G
|-sda1 xfs 1G /boot
|-sda2 swap 2.1G [SWAP]
`-sda3 xfs 15G /
- Internal backup with BACKUP=NETFS (using tar)
- boot method: ISO
- /etc/rear/local.conf file
OUTPUT=ISO
OUTPUT_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/isos
BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs
BACKUP_INTEGRITY_CHECK=1
USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"
FIRMWARE_FILES=( 'no' )
SSH_ROOT_PASSWORD="vagrant"
TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
- test results: https://gist.github.com/2f452f055ce9c57d1d96852985eb82af
- ReaR GitHub master 07bc30524f7591ea87388b01262b5ae1e88433dc dated 2020-05-27
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 12GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME FSTYPE SIZE MOUNTPOINT
sda 12G
|-sda1 swap 2G [SWAP]
`-sda2 ext3 10G /
sr0 iso9660
-
etc/rear/local.conf
(based on template conf/examples/SLE11-ext3-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk, cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda disk 20G
|-/dev/sda1 part swap 2G [SWAP]
`-/dev/sda2 part btrfs 18G /
/dev/sr0 rom iso9660
- btrfs structure
findmnt -a -t btrfs -o TARGET,SOURCE
TARGET SOURCE
/ /dev/sda2[/@/.snapshots/1/snapshot]
|-/var/lib/libvirt/images /dev/sda2[/@/var/lib/libvirt/images]
|-/var/lib/pgsql /dev/sda2[/@/var/lib/pgsql]
|-/boot/grub2/x86_64-efi /dev/sda2[/@/boot/grub2/x86_64-efi]
|-/var/opt /dev/sda2[/@/var/opt]
|-/var/lib/machines /dev/sda2[/@/var/lib/machines]
|-/var/tmp /dev/sda2[/@/var/tmp]
|-/var/cache /dev/sda2[/@/var/cache]
|-/var/lib/mariadb /dev/sda2[/@/var/lib/mariadb]
|-/boot/grub2/i386-pc /dev/sda2[/@/boot/grub2/i386-pc]
|-/var/crash /dev/sda2[/@/var/crash]
|-/tmp /dev/sda2[/@/tmp]
|-/home /dev/sda2[/@/home]
|-/var/lib/mysql /dev/sda2[/@/var/lib/mysql]
|-/var/lib/named /dev/sda2[/@/var/lib/named]
|-/var/log /dev/sda2[/@/var/log]
|-/srv /dev/sda2[/@/srv]
|-/.snapshots /dev/sda2[/@/.snapshots]
|-/usr/local /dev/sda2[/@/usr/local]
|-/var/spool /dev/sda2[/@/var/spool]
|-/opt /dev/sda2[/@/opt]
`-/var/lib/mailman /dev/sda2[/@/var/lib/mailman]
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /var/lib/libvirt/images /boot/grub2/x86_64-efi /var/lib/pgsql /var/opt /var/tmp /tmp /boot/grub2/i386-pc /var/cache /home /var/lib/mysql /var/lib/mariadb /var/lib/named /srv /var/log /usr/local /var/lib/machines /var/spool /opt /var/lib/mailman )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects on the "Suggested Partitioning" screen "Edit Proposal Settings" and then the "LVM-based Proposal", cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master 0ea61df57be40833127a30736b9e3f9c5f0cc5a8 dated 2020-06-04
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME KNAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda /dev/sda disk 20G
`-/dev/sda1 /dev/sda1 part LVM2_member 20G
|-/dev/mapper/system-swap /dev/dm-0 lvm swap 2G [SWAP]
`-/dev/mapper/system-root /dev/dm-1 lvm btrfs 18G /
/dev/sr0 /dev/sr0 rom iso9660
- btrfs structure
findmnt -a -t btrfs -o TARGET,SOURCE
TARGET SOURCE
/ /dev/mapper/system-root[/@/.snapshots/1/snapshot]
|-/tmp /dev/mapper/system-root[/@/tmp]
|-/srv /dev/mapper/system-root[/@/srv]
|-/boot/grub2/x86_64-efi /dev/mapper/system-root[/@/boot/grub2/x86_64-efi]
|-/var/lib/machines /dev/mapper/system-root[/@/var/lib/machines]
|-/var/cache /dev/mapper/system-root[/@/var/cache]
|-/opt /dev/mapper/system-root[/@/opt]
|-/home /dev/mapper/system-root[/@/home]
|-/var/log /dev/mapper/system-root[/@/var/log]
|-/.snapshots /dev/mapper/system-root[/@/.snapshots]
|-/var/crash /dev/mapper/system-root[/@/var/crash]
|-/var/lib/mailman /dev/mapper/system-root[/@/var/lib/mailman]
|-/var/lib/pgsql /dev/mapper/system-root[/@/var/lib/pgsql]
|-/var/lib/mariadb /dev/mapper/system-root[/@/var/lib/mariadb]
|-/var/lib/named /dev/mapper/system-root[/@/var/lib/named]
|-/var/tmp /dev/mapper/system-root[/@/var/tmp]
|-/var/lib/mysql /dev/mapper/system-root[/@/var/lib/mysql]
|-/var/spool /dev/mapper/system-root[/@/var/spool]
|-/usr/local /dev/mapper/system-root[/@/usr/local]
|-/var/lib/libvirt/images /dev/mapper/system-root[/@/var/lib/libvirt/images]
|-/var/opt /dev/mapper/system-root[/@/var/opt]
`-/boot/grub2/i386-pc /dev/mapper/system-root[/@/boot/grub2/i386-pc]
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /srv /boot/grub2/x86_64-efi /var/lib/machines /home /var/cache /var/log /var/lib/pgsql /var/lib/mailman /var/lib/mariadb /var/lib/named /var/lib/mysql /var/lib/libvirt/images /opt /var/tmp /var/spool /boot/grub2/i386-pc /usr/local /var/opt )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects on the "Suggested Partitioning" screen "Edit Proposal Settings" and then the "Encrypted LVM-based Proposal", cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master 0ea61df57be40833127a30736b9e3f9c5f0cc5a8 dated 2020-06-04
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME KNAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda /dev/sda disk 20G
|-/dev/sda1 /dev/sda1 part ext4 399M /boot
`-/dev/sda2 /dev/sda2 part crypto_LUKS 19.6G
`-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-0 crypt LVM2_member 19.6G
|-/dev/mapper/system-root /dev/dm-1 lvm btrfs 17.6G /
`-/dev/mapper/system-swap /dev/dm-2 lvm swap 2G [SWAP]
/dev/sr0 /dev/sr0 rom iso9660
- btrfs structure
findmnt -a -t btrfs -o TARGET,SOURCE
TARGET SOURCE
/ /dev/mapper/system-root[/@/.snapshots/1/snapshot]
|-/var/lib/mariadb /dev/mapper/system-root[/@/var/lib/mariadb]
|-/var/lib/named /dev/mapper/system-root[/@/var/lib/named]
|-/var/log /dev/mapper/system-root[/@/var/log]
|-/var/lib/pgsql /dev/mapper/system-root[/@/var/lib/pgsql]
|-/.snapshots /dev/mapper/system-root[/@/.snapshots]
|-/opt /dev/mapper/system-root[/@/opt]
|-/var/lib/mysql /dev/mapper/system-root[/@/var/lib/mysql]
|-/usr/local /dev/mapper/system-root[/@/usr/local]
|-/var/spool /dev/mapper/system-root[/@/var/spool]
|-/home /dev/mapper/system-root[/@/home]
|-/var/cache /dev/mapper/system-root[/@/var/cache]
|-/tmp /dev/mapper/system-root[/@/tmp]
|-/var/lib/libvirt/images /dev/mapper/system-root[/@/var/lib/libvirt/images]
|-/var/lib/mailman /dev/mapper/system-root[/@/var/lib/mailman]
|-/var/crash /dev/mapper/system-root[/@/var/crash]
|-/var/opt /dev/mapper/system-root[/@/var/opt]
|-/var/lib/machines /dev/mapper/system-root[/@/var/lib/machines]
|-/var/tmp /dev/mapper/system-root[/@/var/tmp]
`-/srv /dev/mapper/system-root[/@/srv]
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /var/opt /var/lib/pgsql /var/lib/mariadb /var/lib/mailman /var/lib/libvirt/images /var/lib/mysql /var/lib/named /srv /tmp /var/tmp /home /var/log /var/cache /var/spool /usr/local /opt /var/lib/machines )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"
The additional cryptsetup
option --force-password
was needed because of a weak LUKS password that was used only for this test here.
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk, cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda disk 20G
|-/dev/sda1 part 8M
|-/dev/sda2 part btrfs 18G /
`-/dev/sda3 part swap 2G [SWAP]
/dev/sr0 rom iso9660
- btrfs structure
findmnt -a -t btrfs -o TARGET,SOURCE
TARGET SOURCE
/ /dev/sda2[/@/.snapshots/1/snapshot]
|-/var /dev/sda2[/@/var]
|-/root /dev/sda2[/@/root]
|-/boot/grub2/x86_64-efi /dev/sda2[/@/boot/grub2/x86_64-efi]
|-/tmp /dev/sda2[/@/tmp]
|-/opt /dev/sda2[/@/opt]
|-/usr/local /dev/sda2[/@/usr/local]
|-/.snapshots /dev/sda2[/@/.snapshots]
|-/home /dev/sda2[/@/home]
|-/boot/grub2/i386-pc /dev/sda2[/@/boot/grub2/i386-pc]
`-/srv /dev/sda2[/@/srv]
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /root /var /boot/grub2/x86_64-efi /opt /srv /usr/local /home /boot/grub2/i386-pc )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Logical Volume Management (LVM)" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME KNAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda /dev/sda disk 20G
|-/dev/sda1 /dev/sda1 part 8M
`-/dev/sda2 /dev/sda2 part LVM2_member 20G
|-/dev/mapper/system-swap /dev/dm-0 lvm swap 2G [SWAP]
|-/dev/mapper/system-root /dev/dm-1 lvm btrfs 12.6G /
`-/dev/mapper/system-home /dev/dm-2 lvm xfs 5.4G /home
/dev/sr0 /dev/sr0 rom iso9660
- filesystems structure
findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET SOURCE FSTYPE
/ /dev/mapper/system-root[/@/.snapshots/1/snapshot] btrfs
|-/tmp /dev/mapper/system-root[/@/tmp] btrfs
|-/srv /dev/mapper/system-root[/@/srv] btrfs
|-/var /dev/mapper/system-root[/@/var] btrfs
|-/root /dev/mapper/system-root[/@/root] btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/system-root[/@/boot/grub2/x86_64-efi] btrfs
|-/.snapshots /dev/mapper/system-root[/@/.snapshots] btrfs
|-/usr/local /dev/mapper/system-root[/@/usr/local] btrfs
|-/boot/grub2/i386-pc /dev/mapper/system-root[/@/boot/grub2/i386-pc] btrfs
|-/opt /dev/mapper/system-root[/@/opt] btrfs
`-/home /dev/mapper/system-home xfs
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /root /var /boot/grub2/i386-pc /srv /opt /boot/grub2/x86_64-efi /usr/local )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Disk Encryption" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master fb23c5d711af9ee505a9b03ea7324a098f90891d dated 2020-06-09
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME KNAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda /dev/sda disk 20G
|-/dev/sda1 /dev/sda1 part 8M
|-/dev/sda2 /dev/sda2 part crypto_LUKS 12.6G
| `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-1 crypt btrfs 12.6G /
|-/dev/sda3 /dev/sda3 part crypto_LUKS 5.4G
| `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part3 /dev/dm-2 crypt xfs 5.4G /home
`-/dev/sda4 /dev/sda4 part crypto_LUKS 2G
`-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part4 /dev/dm-0 crypt swap 2G [SWAP]
/dev/sr0 /dev/sr0 rom iso9660
- filesystems structure
findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET SOURCE FSTYPE
/ /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/.snapshots/1/snapshot] btrfs
|-/srv /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/srv] btrfs
|-/.snapshots /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/.snapshots] btrfs
|-/root /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/root] btrfs
|-/boot/grub2/i386-pc /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/boot/grub2/i386-pc] btrfs
|-/opt /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/opt] btrfs
|-/var /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/var] btrfs
|-/usr/local /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/usr/local] btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/boot/grub2/x86_64-efi] btrfs
|-/tmp /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/tmp] btrfs
`-/home /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part3 xfs
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /srv /tmp /root /boot/grub2/i386-pc /opt /var /usr/local /boot/grub2/x86_64-efi )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"
The additional cryptsetup
option --force-password
was needed because of a weak LUKS password that was used only for this test here.
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup
i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Logical Volume Management (LVM)" and "Enable Disk Encryption" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html
- ReaR GitHub master 10e049b76a4e7a19c90d34c65bd9ab8e05dd3083 dated 2020-06-17
- KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
- Disk layout
lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME KNAME TYPE FSTYPE SIZE MOUNTPOINT
/dev/sda /dev/sda disk 20G
|-/dev/sda1 /dev/sda1 part 8M
`-/dev/sda2 /dev/sda2 part crypto_LUKS 20G
`-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-0 crypt LVM2_member 20G
|-/dev/mapper/system-root /dev/dm-1 lvm btrfs 12.6G /
|-/dev/mapper/system-swap /dev/dm-2 lvm swap 2G [SWAP]
`-/dev/mapper/system-home /dev/dm-3 lvm xfs 5.4G /home
/dev/sr0 /dev/sr0 rom
- filesystems structure
findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET SOURCE FSTYPE
/ /dev/mapper/system-root[/@/.snapshots/1/snapshot] btrfs
|-/root /dev/mapper/system-root[/@/root] btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/system-root[/@/boot/grub2/x86_64-efi] btrfs
|-/boot/grub2/i386-pc /dev/mapper/system-root[/@/boot/grub2/i386-pc] btrfs
|-/srv /dev/mapper/system-root[/@/srv] btrfs
|-/var /dev/mapper/system-root[/@/var] btrfs
|-/tmp /dev/mapper/system-root[/@/tmp] btrfs
|-/.snapshots /dev/mapper/system-root[/@/.snapshots] btrfs
|-/usr/local /dev/mapper/system-root[/@/usr/local] btrfs
|-/opt /dev/mapper/system-root[/@/opt] btrfs
`-/home /dev/mapper/system-home xfs
-
etc/rear/local.conf
(based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /srv /root /tmp /boot/grub2/x86_64-efi /usr/local /var /boot/grub2/i386-pc /opt )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"
The additional cryptsetup
option --force-password
was needed because of a weak LUKS password that was used only for this test here.
-
rear recover
on second KVM/QEMU virtual machine with same virtual hardware setup