Until zfs native encryption becomes fast and stable, use LUKS for local encryption and restic for encrypted incremental backups. #16589
Closed
amano-kenji
started this conversation in
Ideas
Replies: 1 comment 9 replies
-
Do you plan to pay us for the advertisement of your products while blaming ZFS for problems with no details? |
Beta Was this translation helpful? Give feedback.
9 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Right now, zfs native encryption is slower than LUKS. It is also unstable and leads to kernel panics and various errors when sending or receiving raw encrypted zfs snapshots.
Thus, I propose LUKS for local encryption and restic for making encrypted incremental backups.
Restic stores file blocks and makes incremental snapshots. It can delete arbitrary restic snapshots without losing data just like zfs snapshots. It supports compression, deduplication, and encryption. Thus, you can store restic snapshots on untrusted remote machines. You can use amazon cloud storage, https://rsync.net/, https://zfs.rent/, and other cloud storage providers.
Restic 0.17 started supporting
RESTIC_FEATURES=device-id-for-hardlinks
which supports backing up $ZFS-MOUNTPOINT/.zfs/snapshot/$SNAPSHOT-NAME efficiently. Restic 0.18 will remove device-id-for-hardlinks feature flag and support .zfs/snapshot directories efficiently witout any feature flag.If you want to back up zfs dataset, you can take
restic
ZFS snapshot, back up .zfs/snapshot/restic as a new restic snapshot, and delete restic ZFS snapshot after backing it up. In this way, restic doesn't need to know about local sanoid ZFS snapshots which are independent from restic snapshots.Beta Was this translation helpful? Give feedback.
All reactions