I think what he means is that if your backup is triggered from your main server and your main server is compromised the backups can also be attacked immediately. If the backup is requested from the backup machine you will at least have the time between the attack and the next backup to prevent the attack from reaching your backup machines.
You configure the backup systems to connect to the device to be backed up. The idea is if something bad happens on the main machine it won’t impact the backups
possiblylinux127@lemmy.zip 1 month ago
Configure each backup machine to read from the data you are backing up
surewhynotlem@lemmy.world 1 month ago
You can do it that way, but I don’t see how that’s more secure. Fewer server bits to maintain I guess?
EarMaster@lemmy.world 1 month ago
I think what he means is that if your backup is triggered from your main server and your main server is compromised the backups can also be attacked immediately. If the backup is requested from the backup machine you will at least have the time between the attack and the next backup to prevent the attack from reaching your backup machines.
peregus@lemmy.world 1 month ago
I’m sorry, but I still don’t understand what you mean. Could you please elaborate bit? Thanks!
possiblylinux127@lemmy.zip 1 month ago
You configure the backup systems to connect to the device to be backed up. The idea is if something bad happens on the main machine it won’t impact the backups
peregus@lemmy.world 1 month ago
Got it, good idea, thanks!