Backup Server System Overview
Enterprise-Level Backup Infrastructure for Network Projects
Status: Phase 1 implementation in progress
Core Infrastructure
Server Configuration
- Primary Server: Servarica 1 (209.209.10.41)
- Purpose: Network-wide backup and disaster recovery
- Capacity: Enterprise-level storage and redundancy
- Security: SSH key authentication and access controls
Backup Targets
- Production Server: ES7 (89.116.44.206)
- Documentation Server: Rocky Linux 8 (89.116.173.103) - satoshihost.dev
- Project Repositories: Git-based development work
- Configuration Files: System and application configurations
Technical Architecture
Backup Components
- SSH Key Authentication: Secure, automated access
- Automated Scripts: Daily backup execution
- Verification Systems: Backup integrity checking
- Log Management: Comprehensive monitoring and reporting
Data Protection Strategy
Production Systems → Backup Server → Verification → Retention
↓ ↓ ↓ ↓
Daily Sync Compressed Integrity 30-day
Automated Storage Checks Rotation
Implementation Phases
Phase 1: Foundation ✅ In Progress
- SSH Key Setup: Secure authentication infrastructure
- User Management: Dedicated backup user accounts
- Basic Scripts: Core backup automation
- Manual Testing: Verification of backup procedures
- Initial Monitoring: Basic health checking
Phase 2: Automation 📋 Planned
- Cron Job Configuration: Fully automated scheduling
- Log Rotation: Automated log management
- Cleanup Scripts: Storage optimization
- Monthly Reporting: Comprehensive status reports
Phase 3: Monitoring 📋 Future
- Health Check Scripts: Advanced system monitoring
- Storage Monitoring: Capacity and performance tracking
- Alert Notifications: Proactive issue detection
- Recovery Testing: Regular disaster recovery validation
Backup Coverage
Production Server (ES7)
- Database Dumps: Listmonk, ROFLFaucet, ClickForCharity
- Application Configurations: Docker, service configurations
- User Data: Project files and repositories
- System Configurations: OS and security settings
Documentation Server (Rocky Linux 8)
- Git Repositories: /var/git/ - All project documentation
- Web Content: /var/www/ - Built documentation sites
- Server Configurations: Nginx, SSL certificates
- Deployment Logs: /var/log/docs-deploy/
- Python Environments: MkDocs and dependencies
Network Projects
- ClickForCharity: WordPress installations and databases
- DirectSponsor: Payment system configurations
- ROFLFaucet: Gaming data and user progress
- FreeHostingReviews: Review data and configurations
- LottoFaucet: (Future) Lottery system data
Security Framework
Access Control
- SSH Key Authentication: No password access
- Dedicated Users: Isolated backup accounts
- Limited Permissions: Minimum required access
- Secure Transfers: Encrypted data transmission
Data Protection
- Compressed Storage: Efficient space utilization
- Integrity Verification: Checksum validation
- Retention Policies: Automated old backup cleanup
- Access Logging: Comprehensive audit trail
Disaster Recovery
Recovery Procedures
- Rapid Restoration: Quick system recovery capabilities
- Selective Recovery: Individual file/database restoration
- Full System Recovery: Complete infrastructure rebuild
- Documentation: Step-by-step recovery procedures
Testing Protocols
- Monthly Recovery Tests: Validation of backup integrity
- Documentation Updates: Procedure refinement
- Performance Monitoring: Recovery time optimization
- Failure Simulation: Disaster scenario testing
Operational Management
Daily Operations
- Automated Backups: 2 AM UTC execution
- Health Monitoring: System status verification
- Log Review: Error detection and resolution
- Storage Tracking: Capacity management
Maintenance Schedule
- Weekly: System updates and performance review
- Monthly: Full backup verification and testing
- Quarterly: Security audit and procedure review
- Annually: Infrastructure assessment and upgrade planning
Documentation References
Core System Documentation
- Backup System Details: Comprehensive technical documentation
- Server Deployment: Infrastructure setup procedures
- Security Protocols: Access control and security measures
Implementation Guides
- Setup Scripts: Automated installation procedures
- Configuration Templates: Standard backup configurations
- Monitoring Tools: Health check and reporting systems
- Recovery Procedures: Step-by-step restoration guides
WebDAV Client Troubleshooting
Common Issues and Solutions
Group Permission Errors (Linux)
Problem: "not in correct group" error when accessing WebDAV mounts
Symptoms:
- WebDAV mount appears to work but generates permission errors
- User cannot access mounted WebDAV filesystem
- davfs2
group membership exists but not active in current shell
Diagnosis:
# Check current active groups
groups
# Check if davfs2 group exists and user is member
getent group davfs2
# Check specific user membership
id username
Solutions (in order of preference):
- System Reboot (Most Reliable)
- Restart the system to activate new group membership
-
Group changes often require a full logout/login cycle
-
Switch Group Context (Temporary)
# Switch to davfs2 group context sg davfs2 # Or start new shell with group newgrp davfs2
-
Manual Session Refresh (Advanced)
# Force refresh user session (logout/login required) sudo pkill -u username
Verification:
# Verify group is now active
groups | grep davfs2
# Check WebDAV mount status
mount | grep davfs
# Test WebDAV access
ls -la /path/to/webdav/mount
Mount Point Issues
Problem: WebDAV mount fails or becomes unresponsive
Common Causes: - Network connectivity issues - Authentication failures - Stale mount points
Solutions:
# Unmount stale WebDAV mounts
sudo umount /path/to/mount
# Force unmount if necessary
sudo umount -f /path/to/mount
# Clean up and remount
sudo mount -t davfs https://backup.example.com/path /mount/point
Prevention Tips
- Add users to
davfs2
group during initial system setup - Document group membership requirements in deployment procedures
- Include group verification in system health checks
- Test WebDAV access after system updates or user changes
Strategic Importance
Business Continuity
- Zero Data Loss: Comprehensive protection strategy
- Rapid Recovery: Minimal downtime in emergencies
- Compliance: Professional backup standards
- Growth Support: Scalable infrastructure
Network Protection
- Multi-Project Coverage: All network systems protected
- Cross-Platform: Supports diverse technology stacks
- Future-Proof: Expandable for new projects
- Cost-Effective: Centralized backup infrastructure
The Backup Server System provides enterprise-level data protection for the entire SatoshiHost.dev network, ensuring business continuity and rapid disaster recovery across all charitable and revenue-generating projects.