pull-style syncoid
This commit is contained in:
parent
bcf8ecf759
commit
80142a5052
2 changed files with 55 additions and 55 deletions
|
|
@ -176,26 +176,26 @@
|
|||
];
|
||||
};
|
||||
|
||||
#services.syncoid = {
|
||||
# enable = true;
|
||||
# user = "backup";
|
||||
# sshKey = "/var/lib/syncoid/.ssh/id_ed25519";
|
||||
# commonArgs = [
|
||||
# #"--sshoption=StrictHostKeyChecking=off"
|
||||
# "--sshoption=UserKnownHostsFile=/var/lib/syncoid/.ssh/known_hosts"
|
||||
# "--sshoption=IdentitiesOnly=yes"
|
||||
# ];
|
||||
# #commands."zima-bitrot" = {
|
||||
# # source = "backup@zima:bitrot";
|
||||
# # target = "tank/backups/zima/bitrot";
|
||||
# # recursive = true;
|
||||
# #};
|
||||
# commands."zima-rpool-safe" = {
|
||||
# source = "backup@zima:rpool/safe";
|
||||
# target = "tank/backups/zima/rpool-safe";
|
||||
# recursive = true;
|
||||
# };
|
||||
#};
|
||||
services.syncoid = {
|
||||
enable = true;
|
||||
user = "backup";
|
||||
sshKey = "/var/lib/syncoid/.ssh/id_ed25519";
|
||||
commonArgs = [
|
||||
#"--sshoption=StrictHostKeyChecking=off"
|
||||
"--sshoption=UserKnownHostsFile=/var/lib/syncoid/.ssh/known_hosts"
|
||||
"--sshoption=IdentitiesOnly=yes"
|
||||
];
|
||||
commands."zima-bitrot" = {
|
||||
source = "backup@zima:bitrot";
|
||||
target = "tank/backups/zima/bitrot";
|
||||
recursive = true;
|
||||
};
|
||||
commands."zima-rpool-safe" = {
|
||||
source = "backup@zima:rpool/safe";
|
||||
target = "tank/backups/zima/rpool-safe";
|
||||
recursive = true;
|
||||
};
|
||||
};
|
||||
#systemd.services.syncoid-zima-rpool-safe.serviceConfig = {
|
||||
# Environment = [
|
||||
# "HOME=/var/lib/syncoid"
|
||||
|
|
|
|||
|
|
@ -181,43 +181,43 @@
|
|||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDtgW+cxPjo70k6dkYPqzP0FR5G9zvbArp/85ZHRrMRL backup@cryochamber"
|
||||
];
|
||||
};
|
||||
services.syncoid = {
|
||||
enable = true;
|
||||
user = "backup";
|
||||
sshKey = "/var/lib/syncoid/.ssh/id_ed25519";
|
||||
commonArgs = [
|
||||
#"--sshoption=StrictHostKeyChecking=off"
|
||||
"--sshoption=UserKnownHostsFile=/var/lib/syncoid/.ssh/known_hosts"
|
||||
"--sshoption=IdentitiesOnly=yes"
|
||||
"--no-sync-snap"
|
||||
];
|
||||
commands."backup-zima-bitrot" = {
|
||||
source = "bitrot";
|
||||
target = "root@cryochamber:tank/backups/zima/bitrot";
|
||||
recursive = true;
|
||||
};
|
||||
commands."backup-zima-rpool-safe" = {
|
||||
source = "rpool/safe";
|
||||
target = "root@cryochamber:tank/backups/zima/rpool-safe";
|
||||
recursive = true;
|
||||
};
|
||||
};
|
||||
#services.syncoid = {
|
||||
# enable = true;
|
||||
# user = "backup";
|
||||
# sshKey = "/var/lib/syncoid/.ssh/id_ed25519";
|
||||
# commonArgs = [
|
||||
# #"--sshoption=StrictHostKeyChecking=off"
|
||||
# "--sshoption=UserKnownHostsFile=/var/lib/syncoid/.ssh/known_hosts"
|
||||
# "--sshoption=IdentitiesOnly=yes"
|
||||
# "--no-sync-snap"
|
||||
# ];
|
||||
# commands."backup-zima-bitrot" = {
|
||||
# source = "bitrot";
|
||||
# target = "root@cryochamber:tank/backups/zima/bitrot";
|
||||
# recursive = true;
|
||||
# };
|
||||
# commands."backup-zima-rpool-safe" = {
|
||||
# source = "rpool/safe";
|
||||
# target = "root@cryochamber:tank/backups/zima/rpool-safe";
|
||||
# recursive = true;
|
||||
# };
|
||||
#};
|
||||
# This was needed when trying to get the backup user to work instead of using
|
||||
# root; probably not needed now
|
||||
systemd.services.syncoid-backup-zima-bitrot.serviceConfig = {
|
||||
Environment = [
|
||||
"HOME=/var/lib/syncoid"
|
||||
"SSH_AUTH_SOCK="
|
||||
];
|
||||
ExecStartPre = [
|
||||
"+${pkgs.coreutils}/bin/mkdir -p /var/lib/syncoid/.ssh"
|
||||
"+${pkgs.coreutils}/bin/cp /home/backup/.ssh/id_ed25519 /var/lib/syncoid/.ssh/"
|
||||
"+${pkgs.coreutils}/bin/cp /home/backup/.ssh/known_hosts /var/lib/syncoid/.ssh/"
|
||||
"+${pkgs.coreutils}/bin/chown -R backup:syncoid /var/lib/syncoid/.ssh"
|
||||
"+${pkgs.coreutils}/bin/chmod 700 /var/lib/syncoid/.ssh"
|
||||
"+${pkgs.coreutils}/bin/chmod 600 /var/lib/syncoid/.ssh/id_ed25519"
|
||||
];
|
||||
};
|
||||
#systemd.services.syncoid-backup-zima-bitrot.serviceConfig = {
|
||||
# Environment = [
|
||||
# "HOME=/var/lib/syncoid"
|
||||
# "SSH_AUTH_SOCK="
|
||||
# ];
|
||||
# ExecStartPre = [
|
||||
# "+${pkgs.coreutils}/bin/mkdir -p /var/lib/syncoid/.ssh"
|
||||
# "+${pkgs.coreutils}/bin/cp /home/backup/.ssh/id_ed25519 /var/lib/syncoid/.ssh/"
|
||||
# "+${pkgs.coreutils}/bin/cp /home/backup/.ssh/known_hosts /var/lib/syncoid/.ssh/"
|
||||
# "+${pkgs.coreutils}/bin/chown -R backup:syncoid /var/lib/syncoid/.ssh"
|
||||
# "+${pkgs.coreutils}/bin/chmod 700 /var/lib/syncoid/.ssh"
|
||||
# "+${pkgs.coreutils}/bin/chmod 600 /var/lib/syncoid/.ssh/id_ed25519"
|
||||
# ];
|
||||
#};
|
||||
|
||||
services.tailscale.enable = true;
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue