{"id":4823,"date":"2011-05-25T11:42:08","date_gmt":"2011-05-25T11:42:08","guid":{"rendered":"http:\/\/blog.open-e.com\/?p=4823"},"modified":"2025-07-03T11:28:31","modified_gmt":"2025-07-03T11:28:31","slug":"backup-it-lose-it-restore-it-and-stay-calm-10-basic-rules-for-the-wary","status":"publish","type":"post","link":"https:\/\/www.open-e.com\/blog\/backup-it-lose-it-restore-it-and-stay-calm-10-basic-rules-for-the-wary\/","title":{"rendered":"Backup it, lose it, restore it and stay calm \u2013 10 basic rules for the wary"},"content":{"rendered":"<p>\t\t\t\t<strong><strong style=\"font-weight: bold;\">Life is full of imperfections \u2013 we all know it. Sometimes bad things happen to people for no particular reason. As they say: \u201c<em>it happens<\/em>\u201d. All we can do is find a way to make some unavoidable situations\u2026 avoidable.<\/strong><\/strong><\/p>\n<p>Every kind of hardware has its restrictions, weak points, resistance, etc. Whatever we do, we cannot be sure that our data is absolutely safe. Even James Bond-like data HQ cannot give us such assurance. So, what is a solution? How do we protect our incredibly valuable data? We would like to present a few basic rules connected with good backup practices. Take a look at our decalogue:<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Do not rely on luck<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Think forward and do not learn from your own mistakes.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Quality!<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>This involves both hardware and software and is not a place for compromises \u2013 nothing more, nothing less. You have to remember that your decisions about your data storage solutions are strictly related to your data safety. One wrong move may cause many problems.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Simplicity<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>The third rule is according to the K.I.S.S. principle (&#8220;<em>Keep it simple, Stupid!<\/em>&#8220;) and also Albert Einstein\u2019s quotation: &#8220;<em>Everything must be made as simple as possible. But not simpler<\/em>&#8220;. It concerns hardware and software in the same way &#8211; especially when we talk about backup process, which is essentially a laborious and time-consuming task.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">\u201c<em>It will never happen to me<\/em>\u201d \u2013 yeah, right!<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Do not fall into this old paradigm \u2013 this is the fourth important thing. Remember Murphy\u2019s rule: \u201c<em>If anything can go wrong, it will<\/em>\u201d.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Frequency and automation<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>The frequency of backups should be based on the rate or frequency of changes in your files. Do it regularly and remember: automation is your friend.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Strategy, good planning and scheduling is a must!<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Understand threats, create proper procedures in case of a crisis, determine priorities \u2026 \u201cChaos\u201d does not equal \u201csafety\u201d.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Backup log<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Create a backup log &#8211; always. It may help you, undoubtedly.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Shutdown the database before you run the backup process<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>If it is not possible, think about special database dump software or database agent software that enables consistent backup of the database. This is an important tip \u2013 consider it.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Save a copy of your files in a place where they cannot be damaged<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>On different continent \u2013 if possible&#8230; That way, no matter what happens to your database, you can have security in the fact that all of your files are available. Do you think it is an overstatement? If yes, read the last rule:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: bold; margin-top: 25px; color: #ce0709;\">Being overly cautious and paranoid does not mean that there is no danger<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Remember then, simplicity is a clue, quality is the best choice, thinking forward \u2013 that is the way\u2026 and there is nothing bad in being cautious.\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Life is full of imperfections \u2013 we all know it. Sometimes bad things happen to people for no particular reason. As they say: \u201cit happens\u201d. All we can do is&nbsp;&#8230;<\/p>\n","protected":false},"author":7,"featured_media":55812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14,29,18],"tags":[86,198,203,674],"class_list":["post-4823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-storage-technology","category-data-protection","category-hardware","tag-backup","tag-data-security","tag-data-storage-software","tag-troubleshooting"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/4823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/comments?post=4823"}],"version-history":[{"count":1,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/4823\/revisions"}],"predecessor-version":[{"id":55241,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/4823\/revisions\/55241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media\/55812"}],"wp:attachment":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media?parent=4823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/categories?post=4823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/tags?post=4823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}