Menu

Caution

You are not reading the latest stable version of this documentation. If you want up-to-date information, please have a look at 0.3.5.x.

Advanced Backup Tools

Warning

The following are advanced tools and using them is only advised when under the instruction of a Start9 Support Technician. USE AT YOUR OWN RISK - these operations are not supported outside of the context of support.

Mount a Backup

  1. Setup SSH Access and connect to your server via SSH. Elevate yourself to root once in:

    sudo -i
    
  2. Any previously added Network Folder backup location (or physical drive) will be available. Enter the following command:

    start-cli backup target list
    
    ../../../_images/backup-target-list.png
  3. Select the backup target from the available list. In this example, we could use either disk-/dev/sdb1 or cifs-1:

    start-cli backup target mount disk-/dev/sdb1 "YourMasterPasswordGoesHere"
    
    ../../../_images/backup-mount.png

    The terminal will print the directory where your decrypted backup is now mounted.

  4. ls the directory to inspect it, and continue any other operations necessary:

    ../../../_images/backup-mount-ls.png

Mount a StartOS Data Drive

If you have an encrypted disk from a prior StartOS installation, you can mount its decrypted contents on a Linux computer.

  1. Attach the StartOS data drive to your Linux desktop or laptop computer.

  2. Ensure cryptsetup is installed:

    sudo apt update && sudo apt install -y cryptsetup
    
  3. Enter the following command to reveal your disk’s crypto_LUKS filesystems and their labels:

    lsblk --fs
    
    ../../../_images/disk-mount-1-lsblk.png

    We are interested in the services data so copy the long label ending with package-data.

  4. Take that label, prepend /dev/mapper/ to it, and feed it to cryptsetup:

    sudo cryptsetup open /dev/mapper/EMBASSY_NBMVE7OASAPTIIXNEPFN6PLAPJNT72F2XAVK43L2PGB6O2JRB35A-package--data startos_data_unlocked
    

    You will be prompted for the password to decrypt the filesystem which is password, and a new device mapping called startos_data_unlocked will be created.

  5. Mount the startos_data_unlocked device at a path of your choosing. Here, we will use /mnt/startos_data:

    sudo mkdir /mnt/startos_data
    sudo mount /dev/mapper/startos_data_unlocked /mnt/startos_data
    
  6. Inspect the decrypted files in preparation for copying via cp, scp, rsync or similar utility:

    ../../../_images/disk-mount-3-inspect.png