Solved

Backup software that could backup at vm level yet look inside luks encrypted lvm volume of guess linux os for individual file restores?

Posted on 2016-08-23
4
111 Views
Last Modified: 2016-08-29
Backup software that could backup at vm level yet look inside luks encrypted lvm volume of guess linux os for individual file restores?  

Now that we are on the VMware I would like to be able to use a backup software that can backup at the VMware level.   However I have linux guests and I have to have them disk encrypted.  This does two very annoying things.  First it destroys the compression.... And second I have to restore an entire virtual machine just to get at one file.  

Any backup software suggestions that can get around this?
0
Comment
Question by:Xetroximyn
  • 2
4 Comments
 
LVL 7

Assisted Solution

by:Senior IT System Engineer
Senior IT System Engineer earned 250 total points
ID: 41768118
Have you tried Veeam Backup ?

The latest edition version 9.5 also includes the updated Agent for Linux.
0
 
LVL 118

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 250 total points
ID: 41768275
Anything which encrypts in the VM OS, is going to stop any granular file restore, when the VMDK is backed up.

You will need to use software inside the OS.

and backups can be slow, if using Agents in VMs.
0
 

Author Comment

by:Xetroximyn
ID: 41769636
Anything which encrypts in the VM OS, is going to stop any granular file restore, when the VMDK is backed up.

I would think that in theory such a backup software could exist.... not sure if it does.... but I don't see any reason why a backup software (if provided with the luks password) couldn't do file level restores.  They would need to be vmdk and luks and lvm aware.... but it seems possible.  :-)
0
 
LVL 118

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE)
Andrew Hancock (VMware vExpert / EE MVE) earned 250 total points
ID: 41769817
Discuss with vendor.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

HOW TO: Connect to the VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere (HTML5 Web) Host Client 6.5, and perform a simple configuration task of adding a new VMFS 6 datastore.
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
In this Micro Tutorial viewers will learn how to restore their server from Bare Metal Backup image created with Windows Server Backup feature. As an example Windows 2012R2 is used.
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now