Skip to content

Test Matrix rear 2.6

Johannes Meixner edited this page Nov 3, 2021 · 35 revisions

Test Matrix rear 2.6

We will fill up this page with tests we have done (and we accept input and feedback from the ReaR community).

Arch x86

Ubuntu

Ubuntu 18.04.4 LTS (Desktop)

  • ReaR GitHub master 7281059 of 2020-05-29
  • rear mkopalpba, rear mkrescue on x86_64 bare metal
  • 3 SSDs, two of them (sda, sdb) using a mirrored Btrfs configuration on TCG-Opal 2 hardware-encrypted drives
  • lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
sda                        238,5G
|-sda1         vfat           93M /boot/efi
|-sda2         btrfs       223,1G /volumes/01
`-sda3         swap         15,3G [SWAP]
sdb                        238,5G
|-sdb1         vfat           93M
|-sdb2         btrfs       223,1G
`-sdb3         swap         15,3G
sdc                        119,2G
`-sdc1         crypto_LUKS 119,2G
  `-Foxtrot-02 btrfs       119,2G /volumes/02
  • etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
BACKUP=INTERNAL
OUTPUT=RAWDISK
BTRFS_SUBVOLUME_GENERIC_SETUP="true"
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///mnt/reserve/Transfer.nobackup/ReaR-Testing/Output"
  • rear recover on VirtualBox VM: Recreating disk layout, skipping TCG Opal-2 SED setup (unavailable in emulation), skipping sdb mirror. Complete restore of /boot/efi and /
  • BACKUP=INTERNAL is used for a custom-made backup method with custom-made scripts in matching ReaR directories like usr/share/rear/restore/INTERNAL usr/share/rear/backup/INTERNAL usr/share/rear/prep/INTERNAL usr/share/rear/build/INTERNAL (which is exactly how ReaR is meant to be adapted and enhanced as needed for a special use case, cf. https://github.com/rear/rear/pull/2353#issuecomment-606656005)

Ubuntu 20.04 LTS (Desktop)

  • ReaR GitHub master 7281059 of 2020-05-29
  • rear mkrescue on VirtualBox VM (x86_64)
  • lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME   FSTYPE   SIZE MOUNTPOINT
sda             256G 
|-sda1 vfat     512M /mnt/local/boot/efi
`-sda2 ext4   255.5G /mnt/local
sdb             256G
  • etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
OUTPUT=RAWDISK
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///tmp/ReaR-Output"
  • rear recover on VirtualBox VM: Recreating disk layout only (as no backup method was used).

Ubuntu 20.04 LTS (Desktop)

  • ReaR GitHub master b41b4ad53941046860fc9caf321bb69ca875b28d of 2020-06-16
  • rear mkopalpba, rear mkrescue on x86_64 bare metal
  • 3 SSDs, two of them (sda, sdb) using a mirrored Btrfs configuration on TCG-Opal 2 hardware-encrypted drives
  • lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME           FSTYPE        SIZE MOUNTPOINT
sda                        238,5G
|-sda1         vfat           93M /boot/efi
|-sda2         btrfs       223,1G /volumes/01
`-sda3         swap         15,3G [SWAP]
sdb                        238,5G
|-sdb1         vfat           93M
|-sdb2         btrfs       223,1G
`-sdb3         swap         15,3G
sdc                        119,2G
`-sdc1         crypto_LUKS 119,2G
  `-Foxtrot-02 btrfs       119,2G /volumes/02
  • etc/rear/local.conf
SSH_ROOT_PASSWORD='***'
BACKUP=INTERNAL
OUTPUT=RAWDISK
BTRFS_SUBVOLUME_GENERIC_SETUP="true"
SECURE_BOOT_BOOTLOADER="/boot/efi/EFI/ubuntu/shimx64.efi"
OUTPUT_URL="file:///mnt/reserve/Transfer.nobackup/ReaR-Testing/Output"
  • rear recover on x86_64 bare metal
  • 1 SSD (TCG-Opal 2 hardware-encrypted drive), 1 HDD with the following block devices
NAME           FSTYPE        SIZE MOUNTPOINT
sda                        238,5G
|-sda1         vfat           93M /boot/efi
|-sda2         btrfs       223,1G /
`-sda3         swap         15,3G [SWAP]
sdb                        931,5G
`-sdb1         crypto_LUKS 931,5G
  `-Foxtrot-02 btrfs       931,5G /volumes/02
  • Complete restore where BACKUP=INTERNAL is used for a custom-made backup method, cf. the above test with Ubuntu 18.04.4 LTS (Desktop).

CentOS

CentOS 8

  • Relax-and-Recover 2.5-git.3899.a575f8a.master / 2020-04-22
  • Internal backup with BACKUP=NETFS (using tar)
  • boot method: PXE
  • /etc/rear/local.conf file:
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME

BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs

PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_CREATE_LINKS="IP"

USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"

FIRMWARE_FILES=( 'no' )

SSH_ROOT_PASSWORD="vagrant"

TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org

USER_INPUT_TIMEOUT=3
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-04-27_14-01-39

CentOS 7

  • CentOS 7.5
  • Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
  • Internal backup with BACKUP=NETFS (using tar)
  • boot method: PXE
  • /etc/rear/local.conf file:
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME

BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs

PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_RECOVER_MODE="unattended"
PXE_CREATE_LINKS="IP"

USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"

FIRMWARE_FILES=( 'no' )

SSH_ROOT_PASSWORD="vagrant"

TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org

TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_14-20-06

  • CentOS 7.5
  • Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
  • Internal backup with BACKUP=BAREOS (version 17.2.7 (16 Jul 2018))
  • boot method: ISO
  • /etc/rear/local.conf file:
UTPUT=ISO
OUTPUT_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/isos
OUTPUT_OPTIONS="nfsvers=3,nolock"

BACKUP=BAREOS
BAREOS_RESTORE_JOB=client-restore
BAREOS_FILESET=client-fileset
BAREOS_RECOVERY_MODE="automatic"

PRE_BACKUP_SCRIPT=/usr/local/bin/client-backup-with-bareos

PROGS+=( showmount mount.nfs umount.nfs )
MODULES+=( nfs )
PRE_RECOVERY_SCRIPT="systemctl start rpcbind.target || rpcbind &"

PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg

ISO_DEFAULT="automatic"
ISO_RECOVER_MODE="unattended"

USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"

FIRMWARE_FILES=( 'no' )

SSH_ROOT_PASSWORD="vagrant"

TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org
TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_15-14-17

  • CentOS 7.8
  • Relax-and-Recover 2.5-git.0.071efe2.unknown / 2020-05-25
  • Internal backup with BACKUP=NETFS (using tar)
  • boot method: PXE
  • /etc/rear/local.conf file
OUTPUT=PXE
OUTPUT_PREFIX_PXE=$HOSTNAME

BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs

PXE_TFTP_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP
PXE_CONFIG_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/pxelinux.cfg
PXE_RECOVER_MODE="unattended"
PXE_CREATE_LINKS="IP"

USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"

FIRMWARE_FILES=( 'no' )

SSH_ROOT_PASSWORD="vagrant"

TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org

TEST_LOG_DIR_URL=nfs://10.0.2.2/export/rear-tests/logs/2020-05-26_16-07-57

Fedora 32

  • Relax-and-Recover 2.5-git.0.0ea61df.unknown / 2020-06-04
  • VirtualBox VM
  • Disk layout lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME   FSTYPE  SIZE MOUNTPOINT
sda             32G 
|-sda1 xfs       1G /boot
|-sda2 swap    2.1G [SWAP]
`-sda3 xfs      15G /
  • Internal backup with BACKUP=NETFS (using tar)
  • boot method: ISO
  • /etc/rear/local.conf file
OUTPUT=ISO
OUTPUT_URL=nfs://10.0.2.2/root/.config/VirtualBox/TFTP/isos
BACKUP=NETFS
BACKUP_URL=nfs://192.168.33.15/export/nfs
BACKUP_INTEGRITY_CHECK=1

USE_STATIC_NETWORKING=y
KERNEL_CMDLINE="$KERNEL_CMDLINE net.ifnames=0"

FIRMWARE_FILES=( 'no' )

SSH_ROOT_PASSWORD="vagrant"

TIMESYNC=NTPDATE
TIMESYNC_SOURCE=0.pool.ntp.org

SLES

SLES 11 SP 4

  • ReaR GitHub master 07bc30524f7591ea87388b01262b5ae1e88433dc dated 2020-05-27
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 12GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -io NAME,FSTYPE,SIZE,MOUNTPOINT
NAME   FSTYPE    SIZE MOUNTPOINT
sda               12G 
|-sda1 swap        2G [SWAP]
`-sda2 ext3       10G /
sr0    iso9660
  • etc/rear/local.conf (based on template conf/examples/SLE11-ext3-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 12 SP 5 with default btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk, cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME        TYPE FSTYPE   SIZE MOUNTPOINT
/dev/sda    disk           20G 
|-/dev/sda1 part swap       2G [SWAP]
`-/dev/sda2 part btrfs     18G /
/dev/sr0    rom  iso9660
  • btrfs structure findmnt -a -t btrfs -o TARGET,SOURCE
TARGET                    SOURCE
/                         /dev/sda2[/@/.snapshots/1/snapshot]
|-/var/lib/libvirt/images /dev/sda2[/@/var/lib/libvirt/images]
|-/var/lib/pgsql          /dev/sda2[/@/var/lib/pgsql]
|-/boot/grub2/x86_64-efi  /dev/sda2[/@/boot/grub2/x86_64-efi]
|-/var/opt                /dev/sda2[/@/var/opt]
|-/var/lib/machines       /dev/sda2[/@/var/lib/machines]
|-/var/tmp                /dev/sda2[/@/var/tmp]
|-/var/cache              /dev/sda2[/@/var/cache]
|-/var/lib/mariadb        /dev/sda2[/@/var/lib/mariadb]
|-/boot/grub2/i386-pc     /dev/sda2[/@/boot/grub2/i386-pc]
|-/var/crash              /dev/sda2[/@/var/crash]
|-/tmp                    /dev/sda2[/@/tmp]
|-/home                   /dev/sda2[/@/home]
|-/var/lib/mysql          /dev/sda2[/@/var/lib/mysql]
|-/var/lib/named          /dev/sda2[/@/var/lib/named]
|-/var/log                /dev/sda2[/@/var/log]
|-/srv                    /dev/sda2[/@/srv]
|-/.snapshots             /dev/sda2[/@/.snapshots]
|-/usr/local              /dev/sda2[/@/usr/local]
|-/var/spool              /dev/sda2[/@/var/spool]
|-/opt                    /dev/sda2[/@/opt]
`-/var/lib/mailman        /dev/sda2[/@/var/lib/mailman]
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /var/lib/libvirt/images /boot/grub2/x86_64-efi /var/lib/pgsql /var/opt /var/tmp /tmp /boot/grub2/i386-pc /var/cache /home /var/lib/mysql /var/lib/mariadb /var/lib/named /srv /var/log /usr/local /var/lib/machines /var/spool /opt /var/lib/mailman )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 12 SP 5 with default LVM and btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects on the "Suggested Partitioning" screen "Edit Proposal Settings" and then the "LVM-based Proposal", cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master 0ea61df57be40833127a30736b9e3f9c5f0cc5a8 dated 2020-06-04
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME                        KNAME     TYPE FSTYPE       SIZE MOUNTPOINT
/dev/sda                    /dev/sda  disk               20G 
`-/dev/sda1                 /dev/sda1 part LVM2_member   20G 
  |-/dev/mapper/system-swap /dev/dm-0 lvm  swap           2G [SWAP]
  `-/dev/mapper/system-root /dev/dm-1 lvm  btrfs         18G /
/dev/sr0                    /dev/sr0  rom  iso9660
  • btrfs structure findmnt -a -t btrfs -o TARGET,SOURCE
TARGET                    SOURCE
/                         /dev/mapper/system-root[/@/.snapshots/1/snapshot]
|-/tmp                    /dev/mapper/system-root[/@/tmp]
|-/srv                    /dev/mapper/system-root[/@/srv]
|-/boot/grub2/x86_64-efi  /dev/mapper/system-root[/@/boot/grub2/x86_64-efi]
|-/var/lib/machines       /dev/mapper/system-root[/@/var/lib/machines]
|-/var/cache              /dev/mapper/system-root[/@/var/cache]
|-/opt                    /dev/mapper/system-root[/@/opt]
|-/home                   /dev/mapper/system-root[/@/home]
|-/var/log                /dev/mapper/system-root[/@/var/log]
|-/.snapshots             /dev/mapper/system-root[/@/.snapshots]
|-/var/crash              /dev/mapper/system-root[/@/var/crash]
|-/var/lib/mailman        /dev/mapper/system-root[/@/var/lib/mailman]
|-/var/lib/pgsql          /dev/mapper/system-root[/@/var/lib/pgsql]
|-/var/lib/mariadb        /dev/mapper/system-root[/@/var/lib/mariadb]
|-/var/lib/named          /dev/mapper/system-root[/@/var/lib/named]
|-/var/tmp                /dev/mapper/system-root[/@/var/tmp]
|-/var/lib/mysql          /dev/mapper/system-root[/@/var/lib/mysql]
|-/var/spool              /dev/mapper/system-root[/@/var/spool]
|-/usr/local              /dev/mapper/system-root[/@/usr/local]
|-/var/lib/libvirt/images /dev/mapper/system-root[/@/var/lib/libvirt/images]
|-/var/opt                /dev/mapper/system-root[/@/var/opt]
`-/boot/grub2/i386-pc     /dev/mapper/system-root[/@/boot/grub2/i386-pc]
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /srv /boot/grub2/x86_64-efi /var/lib/machines /home /var/cache /var/log /var/lib/pgsql /var/lib/mailman /var/lib/mariadb /var/lib/named /var/lib/mysql /var/lib/libvirt/images /opt /var/tmp /var/spool /boot/grub2/i386-pc /usr/local /var/opt )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 12 SP 5 with default LUKS encrypted LVM and btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects on the "Suggested Partitioning" screen "Edit Proposal Settings" and then the "Encrypted LVM-based Proposal", cf. the "partition setup proposed" part in the SLES 12 SP 5 "Installation Quick Start" documentation at https://documentation.suse.com/sles/12-SP5/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master 0ea61df57be40833127a30736b9e3f9c5f0cc5a8 dated 2020-06-04
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME                                               KNAME     TYPE  FSTYPE       SIZE MOUNTPOINT
/dev/sda                                           /dev/sda  disk                20G 
|-/dev/sda1                                        /dev/sda1 part  ext4         399M /boot
`-/dev/sda2                                        /dev/sda2 part  crypto_LUKS 19.6G 
  `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-0 crypt LVM2_member 19.6G 
    |-/dev/mapper/system-root                      /dev/dm-1 lvm   btrfs       17.6G /
    `-/dev/mapper/system-swap                      /dev/dm-2 lvm   swap           2G [SWAP]
/dev/sr0                                           /dev/sr0  rom   iso9660
  • btrfs structure findmnt -a -t btrfs -o TARGET,SOURCE
TARGET                    SOURCE
/                         /dev/mapper/system-root[/@/.snapshots/1/snapshot]
|-/var/lib/mariadb        /dev/mapper/system-root[/@/var/lib/mariadb]
|-/var/lib/named          /dev/mapper/system-root[/@/var/lib/named]
|-/var/log                /dev/mapper/system-root[/@/var/log]
|-/var/lib/pgsql          /dev/mapper/system-root[/@/var/lib/pgsql]
|-/.snapshots             /dev/mapper/system-root[/@/.snapshots]
|-/opt                    /dev/mapper/system-root[/@/opt]
|-/var/lib/mysql          /dev/mapper/system-root[/@/var/lib/mysql]
|-/usr/local              /dev/mapper/system-root[/@/usr/local]
|-/var/spool              /dev/mapper/system-root[/@/var/spool]
|-/home                   /dev/mapper/system-root[/@/home]
|-/var/cache              /dev/mapper/system-root[/@/var/cache]
|-/tmp                    /dev/mapper/system-root[/@/tmp]
|-/var/lib/libvirt/images /dev/mapper/system-root[/@/var/lib/libvirt/images]
|-/var/lib/mailman        /dev/mapper/system-root[/@/var/lib/mailman]
|-/var/crash              /dev/mapper/system-root[/@/var/crash]
|-/var/opt                /dev/mapper/system-root[/@/var/opt]
|-/var/lib/machines       /dev/mapper/system-root[/@/var/lib/machines]
|-/var/tmp                /dev/mapper/system-root[/@/var/tmp]
`-/srv                    /dev/mapper/system-root[/@/srv]
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /var/opt /var/lib/pgsql /var/lib/mariadb /var/lib/mailman /var/lib/libvirt/images /var/lib/mysql /var/lib/named /srv /tmp /var/tmp /home /var/log /var/cache /var/spool /usr/local /opt /var/lib/machines )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"

The additional cryptsetup option --force-password was needed because of a weak LUKS password that was used only for this test here.

  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 15 SP 1 with default btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk, cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME        TYPE FSTYPE   SIZE MOUNTPOINT
/dev/sda    disk           20G 
|-/dev/sda1 part            8M 
|-/dev/sda2 part btrfs     18G /
`-/dev/sda3 part swap       2G [SWAP]
/dev/sr0    rom  iso9660
  • btrfs structure findmnt -a -t btrfs -o TARGET,SOURCE
TARGET                   SOURCE
/                        /dev/sda2[/@/.snapshots/1/snapshot]
|-/var                   /dev/sda2[/@/var]
|-/root                  /dev/sda2[/@/root]
|-/boot/grub2/x86_64-efi /dev/sda2[/@/boot/grub2/x86_64-efi]
|-/tmp                   /dev/sda2[/@/tmp]
|-/opt                   /dev/sda2[/@/opt]
|-/usr/local             /dev/sda2[/@/usr/local]
|-/.snapshots            /dev/sda2[/@/.snapshots]
|-/home                  /dev/sda2[/@/home]
|-/boot/grub2/i386-pc    /dev/sda2[/@/boot/grub2/i386-pc]
`-/srv                   /dev/sda2[/@/srv]
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /root /var /boot/grub2/x86_64-efi /opt /srv /usr/local /home /boot/grub2/i386-pc )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 15 SP 1 with default LVM and btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Logical Volume Management (LVM)" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master bf37459dcda016e96a0326e4ff354367d393e356 dated 2020-05-29
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME                        KNAME     TYPE FSTYPE       SIZE MOUNTPOINT
/dev/sda                    /dev/sda  disk               20G 
|-/dev/sda1                 /dev/sda1 part                8M 
`-/dev/sda2                 /dev/sda2 part LVM2_member   20G 
  |-/dev/mapper/system-swap /dev/dm-0 lvm  swap           2G [SWAP]
  |-/dev/mapper/system-root /dev/dm-1 lvm  btrfs       12.6G /
  `-/dev/mapper/system-home /dev/dm-2 lvm  xfs          5.4G /home
/dev/sr0                    /dev/sr0  rom  iso9660
  • filesystems structure findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET                   SOURCE                                            FSTYPE
/                        /dev/mapper/system-root[/@/.snapshots/1/snapshot] btrfs
|-/tmp                   /dev/mapper/system-root[/@/tmp]                   btrfs
|-/srv                   /dev/mapper/system-root[/@/srv]                   btrfs
|-/var                   /dev/mapper/system-root[/@/var]                   btrfs
|-/root                  /dev/mapper/system-root[/@/root]                  btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/system-root[/@/boot/grub2/x86_64-efi] btrfs
|-/.snapshots            /dev/mapper/system-root[/@/.snapshots]            btrfs
|-/usr/local             /dev/mapper/system-root[/@/usr/local]             btrfs
|-/boot/grub2/i386-pc    /dev/mapper/system-root[/@/boot/grub2/i386-pc]    btrfs
|-/opt                   /dev/mapper/system-root[/@/opt]                   btrfs
`-/home                  /dev/mapper/system-home                           xfs
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /tmp /root /var /boot/grub2/i386-pc /srv /opt /boot/grub2/x86_64-efi /usr/local )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 15 SP 1 with default LUKS encryption and btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Disk Encryption" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master fb23c5d711af9ee505a9b03ea7324a098f90891d dated 2020-06-09
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME                                               KNAME     TYPE  FSTYPE       SIZE MOUNTPOINT
/dev/sda                                           /dev/sda  disk                20G 
|-/dev/sda1                                        /dev/sda1 part                 8M 
|-/dev/sda2                                        /dev/sda2 part  crypto_LUKS 12.6G 
| `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-1 crypt btrfs       12.6G /
|-/dev/sda3                                        /dev/sda3 part  crypto_LUKS  5.4G 
| `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part3 /dev/dm-2 crypt xfs          5.4G /home
`-/dev/sda4                                        /dev/sda4 part  crypto_LUKS    2G 
  `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part4 /dev/dm-0 crypt swap           2G [SWAP]
/dev/sr0                                           /dev/sr0  rom   iso9660
  • filesystems structure findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET                   SOURCE                                                                   FSTYPE
/                        /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/.snapshots/1/snapshot] btrfs
|-/srv                   /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/srv]                   btrfs
|-/.snapshots            /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/.snapshots]            btrfs
|-/root                  /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/root]                  btrfs
|-/boot/grub2/i386-pc    /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/boot/grub2/i386-pc]    btrfs
|-/opt                   /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/opt]                   btrfs
|-/var                   /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/var]                   btrfs
|-/usr/local             /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/usr/local]             btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/boot/grub2/x86_64-efi] btrfs
|-/tmp                   /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2[/@/tmp]                   btrfs
`-/home                  /dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part3                           xfs
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /srv /tmp /root /boot/grub2/i386-pc /opt /var /usr/local /boot/grub2/x86_64-efi )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"

The additional cryptsetup option --force-password was needed because of a weak LUKS password that was used only for this test here.

  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup

SLES 15 SP 1 with default LVM and LUKS encryption and btrfs structure

i.e. the partitioning and filesystems layout that one gets by default from the YaST installer for a single 20 GiB disk when one selects "Enable Logical Volume Management (LVM)" and "Enable Disk Encryption" via the "Guided Setup", cf. the "Suggested Partitioning" section in the SLES 15 SP 1 "Installation Quick Start" documentation at https://documentation.suse.com/sles/15-SP1/html/SLES-all/art-sle-installquick.html

  • ReaR GitHub master 10e049b76a4e7a19c90d34c65bd9ab8e05dd3083 dated 2020-06-17
  • KVM/QEMU virtual machine (BIOS, 2GiB RAM, 20GiB disk, CDROM, single eth0 with DHCP)
  • Disk layout lsblk -ipo NAME,KNAME,TYPE,FSTYPE,SIZE,MOUNTPOINT
NAME                                               KNAME     TYPE  FSTYPE       SIZE MOUNTPOINT
/dev/sda                                           /dev/sda  disk                20G 
|-/dev/sda1                                        /dev/sda1 part                 8M 
`-/dev/sda2                                        /dev/sda2 part  crypto_LUKS   20G 
  `-/dev/mapper/cr_ata-QEMU_HARDDISK_QM00001-part2 /dev/dm-0 crypt LVM2_member   20G 
    |-/dev/mapper/system-root                      /dev/dm-1 lvm   btrfs       12.6G /
    |-/dev/mapper/system-swap                      /dev/dm-2 lvm   swap           2G [SWAP]
    `-/dev/mapper/system-home                      /dev/dm-3 lvm   xfs          5.4G /home
/dev/sr0                                           /dev/sr0  rom
  • filesystems structure findmnt -a -t btrfs,xfs -o TARGET,SOURCE,FSTYPE
TARGET                   SOURCE                                            FSTYPE
/                        /dev/mapper/system-root[/@/.snapshots/1/snapshot] btrfs
|-/root                  /dev/mapper/system-root[/@/root]                  btrfs
|-/boot/grub2/x86_64-efi /dev/mapper/system-root[/@/boot/grub2/x86_64-efi] btrfs
|-/boot/grub2/i386-pc    /dev/mapper/system-root[/@/boot/grub2/i386-pc]    btrfs
|-/srv                   /dev/mapper/system-root[/@/srv]                   btrfs
|-/var                   /dev/mapper/system-root[/@/var]                   btrfs
|-/tmp                   /dev/mapper/system-root[/@/tmp]                   btrfs
|-/.snapshots            /dev/mapper/system-root[/@/.snapshots]            btrfs
|-/usr/local             /dev/mapper/system-root[/@/usr/local]             btrfs
|-/opt                   /dev/mapper/system-root[/@/opt]                   btrfs
`-/home                  /dev/mapper/system-home                           xfs
  • etc/rear/local.conf (based on template conf/examples/SLE12-SP2-btrfs-example.conf)
OUTPUT=ISO
BACKUP=NETFS
BACKUP_OPTIONS="nfsvers=3,nolock"
BACKUP_URL=nfs://192.168.122.1/nfs
REQUIRED_PROGS+=( snapper chattr )
PROGS+=( lsattr )
COPY_AS_IS+=( /usr/lib/snapper/installation-helper /etc/snapper/config-templates/default )
BACKUP_PROG_INCLUDE=( /srv /root /tmp /boot/grub2/x86_64-efi /usr/local /var /boot/grub2/i386-pc /opt )
POST_RECOVERY_SCRIPT=( 'if snapper --no-dbus -r $TARGET_FS_ROOT get-config | grep -q "^QGROUP.*[0-9]/[0-9]" ; then snapper --no-dbus -r $TARGET_FS_ROOT set-config QGROUP= ; snapper --no-dbus -r $TARGET_FS_ROOT setup-quota && echo snapper setup-quota done || echo snapper setup-quota failed ; else echo snapper setup-quota not used ; fi' )
SSH_ROOT_PASSWORD="rear"
USE_DHCLIENT="yes"
LUKS_CRYPTSETUP_OPTIONS+=" --force-password"

The additional cryptsetup option --force-password was needed because of a weak LUKS password that was used only for this test here.

  • rear recover on second KVM/QEMU virtual machine with same virtual hardware setup