I think what he means is that if your backup is triggered from your main server and your main server is compromised the backups can also be attacked immediately. If the backup is requested from the backup machine you will at least have the time between the attack and the next backup to prevent the attack from reaching your backup machines.
You configure the backup systems to connect to the device to be backed up. The idea is if something bad happens on the main machine it won’t impact the backups
possiblylinux127@lemmy.zip 2 days ago
Configure each backup machine to read from the data you are backing up
surewhynotlem@lemmy.world 1 day ago
You can do it that way, but I don’t see how that’s more secure. Fewer server bits to maintain I guess?
EarMaster@lemmy.world 1 day ago
I think what he means is that if your backup is triggered from your main server and your main server is compromised the backups can also be attacked immediately. If the backup is requested from the backup machine you will at least have the time between the attack and the next backup to prevent the attack from reaching your backup machines.
peregus@lemmy.world 2 days ago
I’m sorry, but I still don’t understand what you mean. Could you please elaborate bit? Thanks!
possiblylinux127@lemmy.zip 1 day ago
You configure the backup systems to connect to the device to be backed up. The idea is if something bad happens on the main machine it won’t impact the backups
peregus@lemmy.world 22 hours ago
Got it, good idea, thanks!