


- #OPENZFS NATIVE ENCRYPTION FULL#
- #OPENZFS NATIVE ENCRYPTION PASSWORD#
- #OPENZFS NATIVE ENCRYPTION OFFLINE#
Backup data is directly streamed to external disks without temporary storage on extbackup server.External disks should only get decrypted during a backup run and getting encrypted/unmounted right afterwards.
#OPENZFS NATIVE ENCRYPTION PASSWORD#
#OPENZFS NATIVE ENCRYPTION FULL#
#OPENZFS NATIVE ENCRYPTION OFFLINE#
So, we are talking about offline backups in addition to the fact having this server offsite - at a different location than your main backup server. We would now like to set up a second offsite backup server that just cares about storing data to an encrypted external drive and after each backup run, you are going to physically detach that drive. Backup data is stored in ZFS datasets, ideally as individual datasets per full-system backup for each host. Let's assume you already have an existing backup server that is connected to the internet 24/7 and runs daily/weekly/monthly backup jobs. So let's go ahead and built that thing from scratch on a fresh 2021 stack! What we want to accomplish: A performant and secure backup solution based on ZFS, using zfs send|recv for efficient data transfer, and ZFS native encryption to secure our external drives. Also, LUKS encryption may be a bit low level and inflexible. As we all know, transferring data with rsync can get horribly slow and blow up your I/O if you're transferring millions of small files. Back then, I was using rsync over SSH to pull backup data, and LUKS encryption as full disk encryption for the external drives. Let's improve our Simple and Secure External Backup solution I have published back in 2018.
