• 1 Post
  • 16 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle
  • I’ve been using renewed (refurbished) 8TB drives off of Ebay - SAS 8TB for $50-60 each. Not a single failure in over a year on the dozen or so drives I’m running right now. I’m running unRAID with a combination of unRAID’s native array drives (for media and “disposable” stuff) in a dual parity config, and ZFS (with snapshots replicated to a live backup on a secondary server) for important personal stuff (and backed-up off-site a few times a year).

    Even if something were to perish, I have enough spares to just chuck one in and let it resilver without worrying at all. I’m content with this as a homelabber and when I’m not supplying critical service for a business, etc.















  • Nogami@lemmy.worldtodatahoarder@lemmy.mlWhat is your offsite backup solution?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    7
    ·
    edit-2
    1 year ago

    Running 2 redundant unRAID systems which mirror ZFS snapshots between systems. The main system(150TB) is the one that has all of the SMB connections to the rest of the network and allows modifications to the filesystem (with a valid login). The backup system has no public shares and exists only to replicate the main system and is just large enough to store personal documents and such.

    For critical data (read: personal documents, family photos, etc), I keep an 8TB drive in a safe deposit box, and I bring it home about every 6 months to rsync all of the latest updates to it from the backup server.

    For media (TV shows, Movies, music), it’s only “protected” against failure with unRAID’s array system with dual parity. I don’t bother with backups at all, because it’s very large, and all easily replaceable.



  • VPNs are one tool to help. They’re not the end-all-be-all. If the VPN provider is reliable, they can protect your IP address and keep your internet link more secure if using public network facilities (wifi or cellular) as the VPN tunnel is (should be) encrypted.

    That said, if you are using software that fails to protect your user information by defect or by design, it can still leak data at the endpoint you are using, even though your connection is (hopefully) more secure.