SlideShare a Scribd company logo
1 of 6
Download to read offline
If there is any issue at setup or connection contact support@k21technologies.com
Overview of Unix
Activity Guide 6
[Edition 1]
[Last Update 130815]
For any issues/help contact : support@k21technologies.com
If there is any issue at setup or connection contact support@k21technologies.com
BACKUP AND RESTORE IN LINUX
 In information Technology, a backup or the process of backing up is masking copies of data
which may be used to restore the original after a data loss event.
 Backups have two district purposes.
 The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data
loss is a very common experience of computer users. 67% of Internet users have suffered
serious data loss.
 The secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long
copies of data are required.
 Backup is the most important job of a system administrator, as a system admin it is your duty to
take backup of the data every day.
 Many companies have gone out of the market because of poor backup planning.
 The easiest way to backup up your files is just copying. But if you have too many files to backup,
copying and restoring may take too long time and it is not convinient. If there is a tool that can
put many files into one file, the world will be better. Fortunetly, 'tar' is used to create archive
files. It can pack files or directories into a 'tar' file. It is like Winzip in windows, without much
compression.
 The gzip program compress a single file. One important thing to remember about gzip is that,
unlike tar, it replaces your original file with a compressed version. (The amout of compression
varies with the type of data, but a typical text file will be reduced by 70 to 80 percent).
If there is any issue at setup or connection contact support@k21technologies.com
To backup the file using tar
 To backup the file using tar Syntax is
#tar -cvf <destination and name to be > <source file>
Check the size of tar file by using du -h <filename> command #du -h /opt/etc.tar
Now apply gzip on tar file and check the size
To apply gzip on a tar file, the syntax is #gzip <file name>
#gzip /u02/etc.tar
Now check the size of the file
If there is any issue at setup or connection contact support@k21technologies.com
Transfer the file to other system and remove gzip and tar from it and check the size on every step
 Let's Transfer the file to other computer using scp
#scp /u02/etc.tar.gz 192.168.2.10:/root/
Untar the file and check for the size of the file / directory
tar -xvf <file name>
If there is any issue at setup or connection contact support@k21technologies.com
If there is any issue at setup or connection contact support@k21technologies.com
=============End of the Activity 6 Guide========

More Related Content

What's hot

Software estimation
Software estimationSoftware estimation
Software estimation
Md Shakir
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24
koolkampus
 

What's hot (20)

SECh123
SECh123SECh123
SECh123
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
 
Software estimation
Software estimationSoftware estimation
Software estimation
 
Testing in multiplatform environment
Testing in multiplatform environmentTesting in multiplatform environment
Testing in multiplatform environment
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
File000152
File000152File000152
File000152
 
Linux Internals - Part I
Linux Internals - Part ILinux Internals - Part I
Linux Internals - Part I
 
Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application development
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide show
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Course 102: Lecture 24: Archiving and Compression of Files
Course 102: Lecture 24: Archiving and Compression of Files Course 102: Lecture 24: Archiving and Compression of Files
Course 102: Lecture 24: Archiving and Compression of Files
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24
 
What is Rapid Application Development
What is Rapid Application DevelopmentWhat is Rapid Application Development
What is Rapid Application Development
 
Device Tree Overlay implementation on AOSP 9.0
Device Tree Overlay implementation on AOSP 9.0Device Tree Overlay implementation on AOSP 9.0
Device Tree Overlay implementation on AOSP 9.0
 
The Extreme Programming (XP) Model
The Extreme Programming (XP) ModelThe Extreme Programming (XP) Model
The Extreme Programming (XP) Model
 
Evolving role of Software
Evolving role of SoftwareEvolving role of Software
Evolving role of Software
 

Viewers also liked

Linux Ensim Reseller Doc
Linux Ensim Reseller DocLinux Ensim Reseller Doc
Linux Ensim Reseller Doc
dineshviswanath
 
Thesis - Linux on the desktop
Thesis - Linux on the desktopThesis - Linux on the desktop
Thesis - Linux on the desktop
Adam Lalani
 
Linux server world
Linux server worldLinux server world
Linux server world
Akshat Singh
 
Redhat training &certification
Redhat training &certificationRedhat training &certification
Redhat training &certification
Ahmed Abbas Ahmed
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
iimjobs and hirist
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
Kavya Sri
 

Viewers also liked (14)

Linux Ensim Reseller Doc
Linux Ensim Reseller DocLinux Ensim Reseller Doc
Linux Ensim Reseller Doc
 
Thesis - Linux on the desktop
Thesis - Linux on the desktopThesis - Linux on the desktop
Thesis - Linux on the desktop
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
linux interview questions and answers
linux interview questions and answerslinux interview questions and answers
linux interview questions and answers
 
Devops interview questions
Devops interview questionsDevops interview questions
Devops interview questions
 
Linux server world
Linux server worldLinux server world
Linux server world
 
Linux System Administration Crash Course
Linux System Administration Crash CourseLinux System Administration Crash Course
Linux System Administration Crash Course
 
Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12
 
Linux administration classes in mumbai
Linux administration classes in mumbaiLinux administration classes in mumbai
Linux administration classes in mumbai
 
Redhat training &certification
Redhat training &certificationRedhat training &certification
Redhat training &certification
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
 
Self introduction
Self introductionSelf introduction
Self introduction
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 

Similar to Backup and restore in linux

List the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docxList the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docx
darlened3
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
christinemaritza
 

Similar to Backup and restore in linux (20)

Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper
 
List the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docxList the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docx
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
Emc World Keynote Slootman
Emc World Keynote SlootmanEmc World Keynote Slootman
Emc World Keynote Slootman
 
Testing pc’s performance lf
Testing pc’s performance lfTesting pc’s performance lf
Testing pc’s performance lf
 
Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
 
By default software
By default softwareBy default software
By default software
 
CTERA Minimizing the threat of Ransomware with enterprise file services
CTERA  Minimizing the threat of Ransomware with enterprise file servicesCTERA  Minimizing the threat of Ransomware with enterprise file services
CTERA Minimizing the threat of Ransomware with enterprise file services
 
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesMinimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
 

More from Mohammed Yazdani (8)

Installing webmin on linux
Installing webmin on linux Installing webmin on linux
Installing webmin on linux
 
Configuring vnc server in linux
Configuring vnc server  in linux Configuring vnc server  in linux
Configuring vnc server in linux
 
Administering Remote System in Linux
Administering Remote System in Linux Administering Remote System in Linux
Administering Remote System in Linux
 
Overview on Linux
Overview on LinuxOverview on Linux
Overview on Linux
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
 
User and group administration in Linux
User and group administration in LinuxUser and group administration in Linux
User and group administration in Linux
 
Solaris 10 installation on vmware
Solaris 10 installation on vmware Solaris 10 installation on vmware
Solaris 10 installation on vmware
 
Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Backup and restore in linux

  • 1. If there is any issue at setup or connection contact support@k21technologies.com Overview of Unix Activity Guide 6 [Edition 1] [Last Update 130815] For any issues/help contact : support@k21technologies.com
  • 2. If there is any issue at setup or connection contact support@k21technologies.com BACKUP AND RESTORE IN LINUX  In information Technology, a backup or the process of backing up is masking copies of data which may be used to restore the original after a data loss event.  Backups have two district purposes.  The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss is a very common experience of computer users. 67% of Internet users have suffered serious data loss.  The secondary purpose of backups is to recover data from an earlier time, according to a user- defined data retention policy, typically configured within a backup application for how long copies of data are required.  Backup is the most important job of a system administrator, as a system admin it is your duty to take backup of the data every day.  Many companies have gone out of the market because of poor backup planning.  The easiest way to backup up your files is just copying. But if you have too many files to backup, copying and restoring may take too long time and it is not convinient. If there is a tool that can put many files into one file, the world will be better. Fortunetly, 'tar' is used to create archive files. It can pack files or directories into a 'tar' file. It is like Winzip in windows, without much compression.  The gzip program compress a single file. One important thing to remember about gzip is that, unlike tar, it replaces your original file with a compressed version. (The amout of compression varies with the type of data, but a typical text file will be reduced by 70 to 80 percent).
  • 3. If there is any issue at setup or connection contact support@k21technologies.com To backup the file using tar  To backup the file using tar Syntax is #tar -cvf <destination and name to be > <source file> Check the size of tar file by using du -h <filename> command #du -h /opt/etc.tar Now apply gzip on tar file and check the size To apply gzip on a tar file, the syntax is #gzip <file name> #gzip /u02/etc.tar Now check the size of the file
  • 4. If there is any issue at setup or connection contact support@k21technologies.com Transfer the file to other system and remove gzip and tar from it and check the size on every step  Let's Transfer the file to other computer using scp #scp /u02/etc.tar.gz 192.168.2.10:/root/ Untar the file and check for the size of the file / directory tar -xvf <file name>
  • 5. If there is any issue at setup or connection contact support@k21technologies.com
  • 6. If there is any issue at setup or connection contact support@k21technologies.com =============End of the Activity 6 Guide========