Skip to content

Backup Server System Overview

Enterprise-Level Backup Infrastructure for Network Projects

Status: Phase 1 implementation in progress

Core Infrastructure

Server Configuration

  • Primary Server: Servarica 1 (209.209.10.41)
  • Purpose: Network-wide backup and disaster recovery
  • Capacity: Enterprise-level storage and redundancy
  • Security: SSH key authentication and access controls

Backup Targets

  • Production Server: ES7 (89.116.44.206)
  • Documentation Server: Rocky Linux 8 (89.116.173.103) - satoshihost.dev
  • Project Repositories: Git-based development work
  • Configuration Files: System and application configurations

Technical Architecture

Backup Components

  • SSH Key Authentication: Secure, automated access
  • Automated Scripts: Daily backup execution
  • Verification Systems: Backup integrity checking
  • Log Management: Comprehensive monitoring and reporting

Data Protection Strategy

Production Systems → Backup Server → Verification → Retention
      ↓                    ↓              ↓           ↓
   Daily Sync        Compressed       Integrity    30-day
   Automated         Storage          Checks       Rotation

Implementation Phases

Phase 1: FoundationIn Progress

  • SSH Key Setup: Secure authentication infrastructure
  • User Management: Dedicated backup user accounts
  • Basic Scripts: Core backup automation
  • Manual Testing: Verification of backup procedures
  • Initial Monitoring: Basic health checking

Phase 2: Automation 📋 Planned

  • Cron Job Configuration: Fully automated scheduling
  • Log Rotation: Automated log management
  • Cleanup Scripts: Storage optimization
  • Monthly Reporting: Comprehensive status reports

Phase 3: Monitoring 📋 Future

  • Health Check Scripts: Advanced system monitoring
  • Storage Monitoring: Capacity and performance tracking
  • Alert Notifications: Proactive issue detection
  • Recovery Testing: Regular disaster recovery validation

Backup Coverage

Production Server (ES7)

  • Database Dumps: Listmonk, ROFLFaucet, ClickForCharity
  • Application Configurations: Docker, service configurations
  • User Data: Project files and repositories
  • System Configurations: OS and security settings

Documentation Server (Rocky Linux 8)

  • Git Repositories: /var/git/ - All project documentation
  • Web Content: /var/www/ - Built documentation sites
  • Server Configurations: Nginx, SSL certificates
  • Deployment Logs: /var/log/docs-deploy/
  • Python Environments: MkDocs and dependencies

Network Projects

  • ClickForCharity: WordPress installations and databases
  • DirectSponsor: Payment system configurations
  • ROFLFaucet: Gaming data and user progress
  • FreeHostingReviews: Review data and configurations
  • LottoFaucet: (Future) Lottery system data

Security Framework

Access Control

  • SSH Key Authentication: No password access
  • Dedicated Users: Isolated backup accounts
  • Limited Permissions: Minimum required access
  • Secure Transfers: Encrypted data transmission

Data Protection

  • Compressed Storage: Efficient space utilization
  • Integrity Verification: Checksum validation
  • Retention Policies: Automated old backup cleanup
  • Access Logging: Comprehensive audit trail

Disaster Recovery

Recovery Procedures

  • Rapid Restoration: Quick system recovery capabilities
  • Selective Recovery: Individual file/database restoration
  • Full System Recovery: Complete infrastructure rebuild
  • Documentation: Step-by-step recovery procedures

Testing Protocols

  • Monthly Recovery Tests: Validation of backup integrity
  • Documentation Updates: Procedure refinement
  • Performance Monitoring: Recovery time optimization
  • Failure Simulation: Disaster scenario testing

Operational Management

Daily Operations

  • Automated Backups: 2 AM UTC execution
  • Health Monitoring: System status verification
  • Log Review: Error detection and resolution
  • Storage Tracking: Capacity management

Maintenance Schedule

  • Weekly: System updates and performance review
  • Monthly: Full backup verification and testing
  • Quarterly: Security audit and procedure review
  • Annually: Infrastructure assessment and upgrade planning

Documentation References

Core System Documentation

Implementation Guides

  • Setup Scripts: Automated installation procedures
  • Configuration Templates: Standard backup configurations
  • Monitoring Tools: Health check and reporting systems
  • Recovery Procedures: Step-by-step restoration guides

WebDAV Client Troubleshooting

Common Issues and Solutions

Group Permission Errors (Linux)

Problem: "not in correct group" error when accessing WebDAV mounts

Symptoms: - WebDAV mount appears to work but generates permission errors - User cannot access mounted WebDAV filesystem - davfs2 group membership exists but not active in current shell

Diagnosis:

# Check current active groups
groups

# Check if davfs2 group exists and user is member
getent group davfs2

# Check specific user membership
id username

Solutions (in order of preference):

  1. System Reboot (Most Reliable)
  2. Restart the system to activate new group membership
  3. Group changes often require a full logout/login cycle

  4. Switch Group Context (Temporary)

    # Switch to davfs2 group context
    sg davfs2
    
    # Or start new shell with group
    newgrp davfs2
    

  5. Manual Session Refresh (Advanced)

    # Force refresh user session (logout/login required)
    sudo pkill -u username
    

Verification:

# Verify group is now active
groups | grep davfs2

# Check WebDAV mount status
mount | grep davfs

# Test WebDAV access
ls -la /path/to/webdav/mount

Mount Point Issues

Problem: WebDAV mount fails or becomes unresponsive

Common Causes: - Network connectivity issues - Authentication failures - Stale mount points

Solutions:

# Unmount stale WebDAV mounts
sudo umount /path/to/mount

# Force unmount if necessary
sudo umount -f /path/to/mount

# Clean up and remount
sudo mount -t davfs https://backup.example.com/path /mount/point

Prevention Tips

  • Add users to davfs2 group during initial system setup
  • Document group membership requirements in deployment procedures
  • Include group verification in system health checks
  • Test WebDAV access after system updates or user changes

Strategic Importance

Business Continuity

  • Zero Data Loss: Comprehensive protection strategy
  • Rapid Recovery: Minimal downtime in emergencies
  • Compliance: Professional backup standards
  • Growth Support: Scalable infrastructure

Network Protection

  • Multi-Project Coverage: All network systems protected
  • Cross-Platform: Supports diverse technology stacks
  • Future-Proof: Expandable for new projects
  • Cost-Effective: Centralized backup infrastructure

The Backup Server System provides enterprise-level data protection for the entire SatoshiHost.dev network, ensuring business continuity and rapid disaster recovery across all charitable and revenue-generating projects.