7. SysAdm™ Client

The following utilities are available in the SysAdm™ client:

Application Management

SysAdm Server Settings

System Management

Utilities

This chapter describes these utilities in more detail.

7.1. AppCafe®

Both PC-BSD® and TrueOS® provide tools to make it easy to manage software and to keep both the operating system and installed software up-to-date. PC-BSD® provides the graphical AppCafe® and Update Manager utilities for managing and upgrading software from the local system or from a web browser or mobile device. Since TrueOS® is a command-line only install and some users prefer to use command-line utilities, both PC-BSD® and TrueOS® provide the pkg command line utility to manage software, as well as pc-updatemanager to manage updates. If you install software using any of the tools described in this chapter, you will automatically be notified whenever a newer version of software is available.

The rest of this chapter demonstrates how to use the built-in graphical and command-line tools for managing software and upgrades. It also describes how to Create a Local Package Mirror.

AppCafe® provides an intuitive, graphical method for installing and managing software. It provides a graphical front-end to FreeBSD packages, which are pre-built applications tested for FreeBSD. It includes extra meta-data which is displayed in AppCafe®, such as screenshots and lists of similar applications.

AppCafe® does not require the root password to install software. This means that you do not have to give out the root password on multi-user systems. However, it will prompt for the user’s password and will fail if that user is not a member of the wheel group. This allows you to control which users are able to manage software.

If you prefer to manage software from the command line, refer to the section on Using the CLI pkg Utilities.

7.1.1. Configuring AppCafe®

AppCafe® includes the ability to remotely manage software from another system or mobile device. During the installation of a TrueOS® server, the installer provides the ability to configure the user, password, and port number for accessing AppCafe® from any device with a web browser. On a desktop installation, AppCafe® can be run as a local application and optionally configured for remote access. To launch the AppCafe® application on a PC-BSD® desktop, double-click its icon on the Desktop, go to Control Panel ‣ AppCafe®, or type appcafe from a command prompt. When prompted, input your password. Figure 7.1.1: Running AppCafe® from a Desktop shows the initial AppCafe® screen when it is started from a desktop.

images/remote1d.png

Note

if updates are available for any of the installed applications, an “Updates available” link with a yellow triangle icon will appear. If you click this link it will provide another link that you can click to get details about the update. Note that Update Manager is used to perform the actual update and that you won’t be able to add or delete any software while an update is in progress.

The top bar contains navigational arrows and a refresh icon. Click the icon at the far right of this bar to access the following options:

  • Configure: used to configure the package repository and remote access to AppCafe®.
  • Save Pkg List: click this option to generate a list of the installed software packages. A pop-up message will indicate the path to the file containing the list.
  • Search for Text: opens a search bar where you can input the name of an application. This is useful for quickly navigating to an application listed on the current screen.
  • Close AppCafe: used to exit this application.

Figure 7.1.2: Configuring the AppCafe® Repository shows the menu that appears if you click the “Configure” option.

images/remote2a.png

The “Repository Configuration” tab is used to determine which package set to use, where:

  • Enterprise: this package set is meant for enterprise users that wish to only receive software updates which fix known security vulnerabilities.
  • Production: is the default and recommended setting for most users. Software updates are provided every three months, which gives sufficient time for new software versions to be tested.
  • Edge: is meant for users who wish to assist with software testing or who can tolerate the occasional breakage caused by installing new software versions. Software updates are provided approximately every two weeks.
  • Custom: assumes that you have followed the instructions to Create a Local Package Mirror and are ready to click the “+” button to browse to the location of the custom .rpo file. To allow switching between custom repositories, multiple custom repositories can be listed, but only the one marked as active will be used.

To configure remote access, use the “Remote Access” tab shown in Figure 7.1.3: Configuring Remote Access.

images/remote3.png

Check the box to “Enable AppCafe Remote”. Then, input a username and password to use for remote access and select a port number. If the system has a public IP address, be sure to use a hard-to-guess username and password. If you change the port number, make sure it does not conflict with another application running on the system. Click “Apply” to complete the configuration. You will be prompted to input your password to save the configuration.

When using AppCafe® to access a system from a public network, it is highly recommended to configure the local firewall to only allow connections over the specified port number and from allowed IP address(es).

AppCafe® uses SSL by default and will automatically create a certificate to use for remote access. Once remote access is configured, use https:// and specify the IP address of the system and configured port number in a web browser. You will then be prompted to input the configured username and password. The AppCafe® interface will load in the web browser. It will be similar to the one shown in Figure 7.1.1: Running AppCafe® from a Desktop, except the top navigational buttons and configure button will not be displayed and a “Logout” option will be added to the dark grey bar. Note that AppCafe® will automatically log you out after 60 minutes of inactivity.

The /usr/local/etc/appcafe.conf file stores the configuration used by AppCafe® and can be edited in a text editor. By default, the “remote”, “port”, and “ssl” options are set using the information you provided either during a server installation or using the screen shown in Figure 7.1.3: Configuring Remote Access. The “mode” option is not set by default, but can be configured by removing the comment symbol (”;”) from that option and setting its value to either “desktop” or “server”. Here are the descriptions of the available modes as listed in that file:

; Set the mode to run AppCafe in (default will pick between server/desktop if X is installed)
; desktop = Full access to local system packages and jails
; server = Full access to local system packages and jails, no Xorg packages listed
; mode = desktop

The rest of this section describes how to manage software using AppCafe®.

7.1.2. Software Management

The “Home” tab, seen in Figure 7.1.1: Running AppCafe® from a Desktop, is used to browse for available software. Applications which are already installed and which are not required by other applications have a red “X”. If you click a red “X”, a pop-up message will ask if you would like to uninstall that application. Applications which are not installed have a grey download icon. Click the icon to install that application. Applications which are required by other applications will not display an icon. If you click on that application, a yellow “Required” triangle will be displayed and a “Related” tab will indicate the name of the application(s) which require it.

The “Recommended Applications” section displays applications which are recommended by other PC-BSD® users.

The “Categories” pane lists the available software categories. By default, only the recommended applications for each category are shown. Alternately, to view all of the available applications for each category, click the “Recommended” button which will change to an “All Apps” button. Click the name of a category to view the available software within that category.

To view all of the applications installed on the system, click the “Installed Apps” tab. The applications will be listed in alphabetical order. Click the name of an application to view more information about the application.

In the example shown in Figure 7.1.4: Viewing the Details of an Installed Application, the user has clicked “Firefox” on a system that has Firefox installed.

images/remote4d.png

The information for an application includes the following:

  • Name, version, and icon of the application.
  • A hyperlink to the application’s website. In this example, clicking “Mozilla” will open the application’s website in the user’s default web browser.
  • A hyperlink to the application’s information at freshports.org. Click the arrow icon next to “Mozilla” to open the FreshPorts website in the user’s default web browser.
  • A rating of up to five stars. Click the stars to open the PC-BSD® wiki page for the application. If you login to the wiki and hover the mouse over the number of stars to select, it will add your ranking and increment the vote number. If you make a mistake in your vote, refresh the browser, click the “remove” button, and re-select the desired number of stars.
  • User contributed tips and how-tos for the application. Click the blue circle icon to open this wiki page. If you login to the wiki, you can add your own usage tips for the application.
  • The download size.
  • Hyperlinks to add an icon for the application to the desktop (on window managers that support desktop icons), to add an entry for the application to the desktop menu for the logged on user only (on window managers that provide desktop menus), or to add an entry to the desktop menu of all users.
  • An icon indicating whether or not the application is already installed, can be installed, or is required by another application.
  • A description of the application.

The following tabs may also be displayed. If a tab is not displayed, it means that that information is not currently available for this particular application.

  • Screenshots: click a screenshot to view a larger version of the screenshot.
  • Related: provides an installable list of applications that provide similar functionality.
  • Plugins: provides an installable list of associated plugins. For an example, search for “firefox” and open its “Plugins” tab.
  • Options: shows the values of the make options that the package was built with.
  • Dependencies: lists the packages that are dependencies of this application.

The “App Search” tab is shown in Figure 7.1.5: Searching for Applications.

images/remote5c.png

To find an application, enter its name and click the “binoculars” icon. Alternately, enter a description. For example, a search for “browser” will display software with “browser” in the name as well as applications which provide browser functionality, such as Firefox.

By default, only recommended packages are searched. To search for all available software, including packages, check the “Search all available software” box.

If you install or uninstall any software, a “Status” tab will be added. In the example shown in Figure 7.1.6: Example Status Tab, the firefox application was installed. Click the hyperlink under the “Result” column to review the installation log.

images/remote6a.png

7.2. Using the CLI pkg Utilities

PC-BSD® uses pkg to manage packages from the command line.

The FreeBSD Handbook provides an introduction to using pkg. Section 4.4.1 is not needed on a PC-BSD® or TrueOS® system as the operating system installation does this for you. The various pkg commands have associated man pages. Type man pkg for an overview of general usage; the names of the associated man pages will be found towards the bottom of this man page. Once you know the name of a command, you can also use the built-in help system to get more information about that command. For example, to learn more about pkg install, type pkg help install.

7.2.1. Managing Jails from the CLI

In PC-BSD®, iocage can be used to install a pre-configured, isolated application into its own jail. A FreeBSD jail provides a very light-weight, operating system-level virtualization. A jail is similar to running an independent instance of FreeBSD on the same hardware, without all of the overhead usually associated with virtualization. Jails are usually created for running applications or services. For example, you could host your own media server on your desktop system without affecting other installed applications or your data. Each jail has its own IP address, running processes, and users. Whatever happens in that jail does not affect your operating system or other jails running on the PC-BSD® system.

iocage was specifically designed for jail management on systems formatted with the ZFS filesystem. It stores its configuration as a ZFS property rather than using a configuration file.

The iocage command line utility is a Bourne shell script. This script can be manually run from the command line on a PC-BSD® server or by users who prefer to manage jails using the command line. Advanced users can also refer to the command line version in their own jail management scripts.

If you type iocage at the command line, you will receive a summary of its usage:

usage:
 iocage [-v] activate ZPOOL
 iocage [-v] cap UUID|TAG
 iocage [-v] clean [-f] [-a|-r|-j|-t]
 iocage [-v] clone UUID|TAG [UUID|TAG@snapshot] [property=value]
 iocage [-v] console [-f] UUID|TAG
 iocage [-v] create [-e] [base=[RELEASE|NAME]] [pkglist=file] [property=value] [count=value]
 iocage [-v] deactivate ZPOOL
 iocage [-v] defaults
 iocage [-v] destroy [-f] UUID|TAG
 iocage [-v] df
 iocage [-v] exec [-u username | -U username] UUID|TAG|ALL command [arg ...]
 iocage [-v] export UUID|TAG
 iocage [-v] fetch [-P|-p|--ports] [release=RELEASE | ftphost=ftp.hostname.org |
                   ftpdir=/dir/ | ftpfiles="base.txz doc.txz lib32.txz src.txz"]
                   [ ftplocaldir=/dir/ ] [ compression=ALGO ]
 iocage [-v] get [-r] property|all UUID|TAG
 iocage [-v] help
 iocage [-v] import UUID [property=value]
 iocage [-v] init-host IP ZPOOL
 iocage [-v] inuse UUID|TAG
 iocage [-v] limits [UUID|TAG]
 iocage [-v] list [-t|-r|-s jd|uuid|boot|state|tag|type|ip4]
 iocage [-v] promote UUID|TAG
 iocage [-v] rcboot
 iocage [-v] reboot|restart [-s] UUID|TAG
 iocage [-v] rcshutdown
 iocage [-v] reset UUID|TAG|ALL
 iocage [-v] restart UUID|TAG
 iocage [-v] rollback UUID|TAG@snapshotname
 iocage [-v] runtime UUID|TAG
 iocage [-v] send [-c|-i|-I|-h|-u|-m] POOL
 iocage [-v] set property=value [property=value] UUID|TAG
 iocage [-v] snaplist UUID|TAG
 iocage [-v] snapremove UUID|TAG@snapshotname|ALL
 iocage [-v] snapshot|snap [-f|-r] UUID|TAG [UUID|TAG@snapshotname]
 iocage [-v] start [-f] UUID|TAG
 iocage [-v] stop UUID|TAG|ALL
 iocage [-v] uncap UUID|TAG
 iocage [-v] update [-p|-P] UUID|TAG|RELEASE
 iocage [-v] upgrade UUID|TAG [release=RELEASE]
 iocage [-v] version | --version

Before creating a jail for the first time, specify the version of FreeBSD to install. To see which versions are available and to install the selection, run iocage fetch. By default, the currently installed version will be selected as seen in this example:

sudo iocage fetch
Password:
Setting up zpool [tank] for iocage usage...
If you wish to change zpool, use 'iocage activate'
  INFO: creating tank/iocage
  INFO: creating tank/icoage/.defaults
  INFO: creating tank/iocage/download
  INFO: creating tank/iocage/jails
  INFO: creating tank/iocage/releases
  INFO: creating tank/iocage/templates
Supported releases are:
  11.0-CURRENT
  10.3-RELEASE
  10.2-RELEASE
   9.3-RELEASE
Please select a release [10.3-RELEASE]:
base.txz                                      100% of   63 MB 1908 kBps 00m34s
doc.txz                                       100% of 1395 kB 1301 kBps 00m01s
lib32.txz                                     100% of   15 MB 1762 kBps 00m10s
src.txz                                       100% of  109 MB 2116 kBps 00m53s
Extracting: base.txz
Extracting: doc.txz
Extracting: lib32.txz
Extracting: src.txz
* Updating base jail template.
Looking up update.FreeBSD.org mirrors... none found.
Fetching public key from update.FreeBSD.org... done.
Looking up update.FreeBSD.org mirrors... none found.
Fetching public key from update.FreeBSD.org... done.
Fetching metadata signature for 10.3-RELEASE from update.FreeBSD.org... done.
Fetching metadata index... done.
Fetching 2 metadata files... done.
Inspecting system... done.
Preparing to download files... done.
Installing updates... done.
Creating basejail ZFS datasets... please wait.

In this example, the user has specified to install the 10.3-RELEASE template. Once the template has been installed, you can create a jail. In this example, the template to use, the jail’s hostname, network interface, and IP address are specified:

sudo iocage create release=10.3-RELEASE tag=jail1 ip4_addr="em0|192.168.1.7/24"
Password:
Successfully created: b00945a3-d028-11e5-8dc9-68f72865c4fc (jail1)

You can list the properties of the jail with this command:

iocage get all jail1

To start the jail and check its status:

sudo iocage start jail1
Password:
* Starting b00945a3-d028-11e5-8dc9-68f72865c4fc (jail1)
 + Started
 + Configuring VNETifconfig: interface em0 does not exist      OK
 + Starting services        OK

iocage list
JID   UUID                                  BOOT  STATE  TAG   TYPE
1     b00945a3-d028-11e5-8dc9-68f72865c4fc  off   up     jail1 basejail

To access the jail:

sudo iocage console jail1
Password:
FreeBSD 10.3-RELEASE (GENERIC) #0: Mon Apr 11 15:54:50 UTC 2016

Welcome to FreeBSD!

Release Notes, Errata: https://www.FreeBSD.org/releases/
Security Advisories:   https://www.FreeBSD.org/security/
FreeBSD Handbook:      https://www.FreeBSD.org/handbook/
FreeBSD FAQ:           https://www.FreeBSD.org/faq/
Questions List: https://lists.FreeBSD.org/mailman/listinfo/freebsd-questions/
FreeBSD Forums:        https://forums.FreeBSD.org/

Documents installed with the system are in the /usr/local/share/doc/freebsd/
directory, or can be installed later with:  pkg install en-freebsd-doc
For other languages, replace "en" with a language code like de or fr.

Show the version of FreeBSD installed:  freebsd-version ; uname -a
Please include that output and any error messages when posting questions.
Introduction to manual pages:  man man
FreeBSD directory layout:      man hier

Edit /etc/motd to change this login announcement.
root@b00945a3-d028-11e5-8dc9-68f72865c4fc:~ #

Once inside the jail, you can manage it just like any other FreeBSD system and install software using pkg. To leave the jail, type exit.

7.3. Update Manager

Update Manager provides a graphical interface for keeping the PC-BSD® operating system and its installed applications up-to-date. Update Manager will automatically track updates to software installed using either the graphical or command line equivalents of AppCafe®.

This utility can be started from Control Panel or by typing pc-updategui. It can also be accessed from its icon in the system tray, if you are logged into a desktop that provides a system tray.

The status of the icon lets you determine at a glance if any of your installed applications are out-of-date, if a system update is available, or if a new version of the operating system is available. The possible statuses are as follows:

images/update1.png

Your system is up-to-date.

images/update2.png

The system is currently checking for updates and patches.

images/update3.png

Your operating system is out-of-date and system update(s) or patch(es) are available.

images/update4.png

Newer versions of installed applications are available.

images/update5.png

The system was unable to check for updates, meaning you should check your Internet connection.

images/update6.png

The system is currently updating.

images/update7.png

The system needs to restart in order for the newly installed update to take effect.

If you right-click the icon, you will see the menu shown in Figure 7.3.1: Right-click Menu for Update Manager.

images/update8a.png

This menu contains the following options:

  • Start the Update Manager: launches the Update Manager GUI which can be used as described in Manual Updates (GUI Method).
  • Check for Updates: by default, updates are checked every 24 hours or 20 minutes after booting the system. However, the system won’t check for updates more than once per day should you reboot multiple times within a day. You can check for updates now by clicking this option.
  • Start the AppCafe: launches AppCafe® which can be used to manage installed software as described in AppCafe®.
  • Run at Startup: to disable the automatic update check after the system boots, uncheck this box.
  • Display Notifications: to disable the pop-up message over the icon when an update becomes available, uncheck this box.
  • Check Jails: to also be notified when updates are available to running jails, check this box.
  • Routing through Tor: check this box to start browsing the Internet anonymously as described in Tor Mode.
  • Check Tor connection: click this to determine if the system is currently routing all Internet traffic through the Tor network.
  • Quit: to remove Update Manager from the system tray, click this entry. You can put the icon back into the tray by typing pc-systemupdatertray &.

7.3.1. How PC-BSD® Updating Works

The PC-BSD® update mechanism provides several safeguards to ensure that updating the operating system or its software is a low-risk operation. The following steps occur automatically during an update:

  • The update automatically creates a copy of the current operating system, known as a snapshot or boot environment (BE), and mounts that snapshot in the background. All of the updates then occur in the snapshot. This means that you can safely continue to use your system while it is updating as no changes are being made to the operating system or any of the applications currently in use. Instead, all changes are being made to the mounted copy.

Note

if the system is getting low on disk space and there is not enough space to create a new BE, the update will fail with a message indicating that there is not enough space to perform the update.

  • While the update is occurring, and until you reboot after the update, you won’t be able to use AppCafe® to manage software. This is a safety measure to prevent package conflicts. Also, the system shutdown and restart buttons will be greyed out until the update is complete and the system is ready for reboot. Should a power failure occur in the middle of an update, the system will reboot into the current boot environment, returning the system to the point before the upgrade started. Simply restart the update to continue the update process.
  • Once the update is complete, the new boot environment, or updated snapshot, is added as the first entry in the boot menu and activated so that the system will boot into it, unless you pause the boot menu and specify otherwise. A pop-up message, shown in Figure 7.3.2: Managing the Reboot After Update, will indicate that a reboot is required. You can either finish what you are doing and reboot now into the upgraded snapshot, or ask the system to remind you again at a later time. To configure the time of the next warning, click the “Next Reminder” drop-down menu where you can select 1, 5, 12, or 24 hours, 30 minutes, or never (for this login session). Note that the system will not apply any more updates or allow you to start another manual update or install additional software using AppCafe® until you reboot.
  • The default ZFS layout used by PC-BSD® ensures that when new boot environments are created, the /usr/local/, /usr/home/, /usr/ports/, /usr/src/ and /var/ directories remain untouched. This way, if you decide to rollback to a previous boot environment, you will not lose data in your home directories, any installed applications, or downloaded src or ports. However, you will return the system to its previous state, before the update was applied.
  • As the update is running, a log is written to /var/log/pc-updatemanager.log and this log is displayed in the “View Log” tab of the graphical Update Manager utility, shown in Figure 7.3.3: Viewing the Update Log. This way you can see which software is being updated and if there are any updating errors. The next time an update occurs, the previous log is written to /var/log/pc-updatemanager.log.prev, so that you also have a copy of the previous update’s log.
  • You no longer need to initiate updates manually. PC-BSD® now uses an automated updater that automatically checks for updates, no more than once per day, 20 minutes after a reboot and then every 24 hours. You can configure what gets updated using the “Configure Automatic Updates” tab of Update Manager, shown in Figure 7.3.4: Configuring What to Update. Choices are “Security & Packages” (all updates), “Security” (only security patches and operating system updates), “Packages” (only installed software), or “Nothing” (disables automatic updating).
images/update9.png
images/update10a.png
images/update11a.png

The “View” menu of Update Manager provides the following information:

  • Vulnerabilities: click this entry to determine if any of the installed software has a known, unpatched vulnerability. In the example shown in Figure 7.3.5: Viewing Installed Software Vulnerability Information, two installed packages have known vulnerabilities. If you highlight an entry and click the “More info...” button, the default web browser will open to a page that provides more details about the vulnerability.
  • Base updates history: the “Version” field in About usually includes a patch number which indicates the level to which the operating system has been patched against known vulnerabilities. If you click this entry, it will provide an overview of which vulnerabilities were addressed at each patch level. In the example shown in Figure 7.3.6: Viewing Operating System Patches, the system is running “10.2-RELEASE-p15, or patch level 15. Most patch levels have an associated Security Advisory (SA). More information about each advisory is available from the FreeBSD Security Advisories page.
images/update14.png
images/update15a.png

The “System” menu of Update Manager provides one option:

  • Branches: users who wish to test upcoming versions can switch software branches and update to that software branch. In the example shown in Figure 7.3.7: Switching Branches, this system is currently running the 10.2 branch and the upcoming 11.0 branch is available for selection.
images/branch1a.png

Updates can still be initiated manually using either a GUI or a command-line application. The rest of this section demonstrates how to manually update using either the GUI or the command-line method.

7.3.2. Manual Updates (GUI Method)

The automatic updater will automatically keep your system up-to-date. You will know that an update has completed when the pop-up menu, shown in Figure 7.3.2: Managing the Reboot After Update, indicates that a reboot is needed to complete the update process. The automatic updater will only update what it has been configured to update. If you would like to double-check or change what gets updated, start Update Manager, enter your password, and use the drop-down menu in the “Configure Automatic Updates” screen shown in Figure 7.3.4: Configuring What to Update.

Due to its schedule, the automatic updater will never check for new updates more than once in a 24 hour period. To manually check for updates, right-click the Update Manager in system tray and click “Check for Updates”. Alternatively, start Update Manager. If any updates are available, an “Updates Available” tab will appear, as seen in the example in Figure 7.3.8: Updates are Available. If no updates are available, of if the system is currently updating, this tab will not appear.

images/update12a.png

In this example, a security update is available. Click the “Start Updates” button to manually start the update. When prompted, reboot so that the system can boot into the newly patched operating system.

When package updates are available a “View Package Updates” box can be clicked to see which packages will be upgraded.

Note

how often package updates are available depends upon the “Repository Settings” set in AppCafe® ‣ Configure. The default setting of “Production” will only provide package updates every 3 months whereas a setting of “Edge” will provide package updates as soon as a new version is available. If you need application stability, stay on “Production”. If you can handle some application breakage in favor of having the latest software, change to “Edge”. Also, if you select “Security” or “Nothing” in the “Configure Automatic Updates” tab of Update Manager, packages will only get updated with the next software release which happens every 3 months.

Warning

updates will update all installed software. If you have placed a lock on a package using pkg or an older version of AppCafe®, Update Manager will fail and will generate a message in the log indicating that the failure is due to a locked package. If you prefer to lock certain applications against being updated, select “Security” or “Nothing” in the “Configure Automatic Updates” tab of Update Manager and manually update software as needed using pkg.

7.3.3. Manual Updates (CLI Method)

TrueOS® users, or those who prefer to use a command-line utility, can use pc-updatemanager to manually apply updates. If you type pc-updatemanager, it will show its available options:

pc-updatemanager
pc-updatemanager - Usage
----
branches             - List available system branches
chbranch <tag>       - Change to new system branch
check                - Check for system updates
showeol              - Show end of life (support) date for this release
install <tag>,<tag2> - Install system updates
pkgcheck             - Check for updates to packages
pkgupdate [-f]       - Install packages updates
fbsdupdate           - Install freebsd-update patches
fbsdupdatepkgs       - Install freebsd-update patches and any package updates
syncconf             - Update PC-BSD pkg configuration
confcheck            - Check PC-BSD pkg configuration
cron                 - Perform delayed check for system and pkg updates.

To determine if any system updates are available, type the following command:

sudo pc-updatemanager check
Checking for FreeBSD updates...
The following updates are available:
------------------------------------
NAME: FreeBSD security updates
TYPE: SECURITYUPDATE

To install: "pc-updatemanager fbsdupdate"

End of Life Notice
------------------------------------
This version of PC-BSD / TrueOS has an EOL date of:
Sat Dec 31 18:59:59 EST 2016
------------------------------------

If any updates are available, follow the instructions to install the update:

sudo pc-updatemanager fbsdupdate
Stopping syscache...
Creating stage BE...
Pruning old boot-environments...
Mounting the stage BE...
Mounted successfully on '/.updateStage'
Fetching freebsd-update files...
Installing freebsd-update files...
Unmounting stage BE...
Unmounted successfully
GRUB configuration updated successfully
Renamed successfully
GRUB configuration updated successfully
Renamed successfully
GRUB configuration updated successfully
Activated successfully
Generating grub configuration file ...
Found theme: /boot/grub/themes/pcbsd/theme.txt
done
Installing GRUB to ada0
Starting syscache...
Your update is finished! Please reboot to load into the new boot-environment

If no updates are available, the check command will indicate “Your system is up to date!”.

To determine if package updates are available, use this command:

sudo pc-updatemanager pkgcheck
Updating repository catalogue
pcbsd-major repository is up-to-date.
All repositories are up-to-date.
Updating pcbsd-major repository catalogue...
pcbsd-major repository is up-to-date.
All repositories are up-to-date.
Checking for upgrades (1471 candidates)... done
Processing candidates (1471 candidates)... done
The following 8 package(s) will be affected (of 0 checked):

 Installed packages to be UPGRADED:
         pcbsd-utils-qt5: 1430339597 -> 1430509574
         pcbsd-utils: 1430412291 -> 1430489128
         pcbsd-syscache: 1430342138 -> 1430496237
         pcbsd-i18n-qt5: 1430413188 -> 1430610765
         lumina: 0.8.4_1 -> 0.8.4_1,1
         life-preserver: 1430338357 -> 1430521060
         git: 2.3.6 -> 2.3.7
         curl: 7.42.0 -> 7.42.1

 The process will require 923 KiB more space.
 112 MiB to be downloaded.
 The following updates are available:
 ------------------------------------
 NAME: System package updates
 TYPE: PKGUPDATE

 To install: "pc-updatemanager pkgupdate"

In this example, newer versions are available. If no updates were available, the output would have instead said “All packages are up to date!”.

If updates are available, you can install them with this command:

sudo pc-updatemanager pkgupdate
Stopping syscache...
Updating the package repo database...
Cleaning old pkg upgrade cache...
Verifying / fetching packages for ports-mgmt/pkg - pkg-1.5.1.txz
The following packages will be fetched:

 New packages to be FETCHED:
        pkg-1.5.1 (100.00% of 2 MiB: 2 MiB)

 The process will require 2 MiB more space.
 2 MiB to be downloaded.
 Fetching pkg-1.5.1.txz... done
 Verifying / fetching packages for misc/pcbsd-base - pcbsd-base-1425064224.txz
 The following packages will be fetched:

 New packages to be FETCHED:
 <SNIP>
 The process will require 733 MiB more space.
 733 MiB to be downloaded.
 <SNIP>
 Creating stage BE...
 Pruning old boot-environments...
 Mounting the stage BE...
 Mounted successfully on '/.updateStage'
 Preparing the new boot-environment... (This may take a while)
 <SNIP>
 Deinstallation has been requested for the following 1590 packages (of 0 packages in the universe):
 <SNIP>
 The operation will free 11 GiB.
 [1/1590] Deinstalling pcbsd-meta-kde-1429798531...
 <SNIP>
 Extracting ports overlay...
 Pruning: /usr/local/share/applications/cups.desktop
 Pruning: /usr/local/share/kde4/services/kdm.desktop
 Pruning: /usr/local/share/applications/kde4/kuser.desktop
 Pruning: /usr/local/share/xsessions/[0-9a-zA-Z]*.desktop
 Extracting ports overlay data...DONE
 Updating pkgng config...
 Unmounting stage BE...
 Unmounted successfully
 GRUB configuration updated successfully
 Renamed successfully
 GRUB configuration updated successfully
 Renamed successfully
 GRUB configuration updated successfully
 Activated successfully
 Generating grub configuration file ...
 Found theme: /boot/grub/themes/pcbsd/theme.txt
 done
 Installing GRUB to ada0
 Starting syscache...
 Your update is finished! Please reboot to load into the new boot-environment

While the package output has been snipped from this example due to the amount of packages to be upgraded, the update process will download the latest versions of the packages which need updating, displaying the download progress for each file. Once the downloads are complete, it will create a new boot environment and display the installation process for each file within the boot environment. The last step of the update process is to extract the desktop (or server) overlay and upgrade GRUB and then to return the prompt. Once the update is complete, reboot to boot into the updated version of the system.

7.3.4. Upgrading from 9.x to 10.x

PC-BSD® 10.x has switched to 64-bit and ZFS-only. This means that you can not upgrade a system that is either 32-bit or formatted with UFS. If the hardware supports 64-bit, you will need to backup your important data to another system or external drive and then perform a new installation. The new installation will perform a format of the selected disk(s) with ZFS.

The boot loader and default ZFS layout has changed to support the Boot Environment Manager and ZFS snapshot management with Life Preserver. For this reason, 9.x users should backup their important data to another system or external drive and then perform a new installation which will create the required ZFS layout.

7.3.5. Upgrading from 10.x to 11.0

Upgrading from any 10.x version to 11.0 is the same as applying any system update. This means the update to 11.0 will either appear in Update Manager as a package update, for both “Edge” and “Production” users, or in the listing of pc-updatemanager check.

Note

a fresh install, rather than an update, is only required if you wish to take advantage of any of the following features: UEFI boot (on a current non-UEFI installation), full disk encryption, or the improved encryption key generation provided by GELIv7. This means that you will have to backup your data to an external drive or another system, perform the new install, then restore your data from the backup.

7.4. Create a Local Package Mirror

The official PC-BSD® package repository is hosted as a ScaleEngine CDN (Content Delivery Network). It is possible to rsync a copy of the package repository, which means you can have a locally hosted, complete package repository available for your own clients.

To create a local package mirror, first setup a directory which is served over HTTP. The web server can be a public URL on the Internet or a private web server, as long as it is accessible to your target audience. Ensure this directory is browsable by a web browser from a client system before moving on to the next step.

Once you have the HTTP directory ready for serving, use the following commands to sync with the official package repository:

rsync -van --delete-delay --delay-updates pcbsd-rsync.scaleengine.net::pkg /my/path/to/httpd/directory/pkg

The complete package repository may be well over 200GB in size. If you do not need the entire repository, you can instead sync the specific version of PC-BSD® packages to pull as shown in these examples:

rsync -van --delete-delay --delay-updates pcbsd-rsync.scaleengine.net::pkg/10.0-RELEASE /my/path/to/httpd/directory/pkg

rsync -van --delete-delay --delay-updates pcbsd-rsync.scaleengine.net::pkg/11.0-CURRENTMAR2015 /my/path/to/httpd/directory/pkg

Note that for major RELEASES, you will pull the .0 version for the entire branch. In other words, both the 10.1 and 10.2 minor releases use the 10.0-RELEASE package directory.

Once the repository is downloaded, configure each client by editing their /usr/local/etc/pcbsd.conf file with the following. Replace <myhost> with the URL to the local repository:

PACKAGE_SET: CUSTOM
PACKAGE_URL: http://<myhost>/pkg/%VERSION%/edge/%ARCH%

After editing each client’s file, run pc-updatemanager syncconf on the client to apply the changes.

Alternately, on each client, configure AppCafe® to use the custom repository. Go to Configure ‣ Repository Settings. Click “Custom” in the screen shown in Figure 7.4.1: Add the Custom Repository to AppCafe®, then the “+” button. Input the URL to the repository and click “OK”.

images/repo1.png

It will take a few minutes for AppCafe® to read in the INDEX for the custom repository.

Configured clients will now use your local mirror whenever they use pkg or AppCafe®.

7.5. Manage SSL Keys

7.6. Boot Environment Manager

PC-BSD® supports a feature of ZFS known as multiple boot environments (BEs). With multiple boot environments, the process of updating software becomes a low-risk operation as the updates are applied to a different boot environment. If needed, you have the option of booting into a backup boot environment. Other examples of using boot environments include:

  • If you are making software changes, you can take a snapshot of that boot environment at any stage during the modifications.
  • You can save multiple boot environments on your system and perform various updates on each of them as needed. You can install, test, and update different software packages on each.
  • You can mount a boot environment in order to chroot into the mount point and update specific packages on the mounted environment.
  • You can move a boot environment to another machine, physical or virtual, in order to check hardware support.

Note

for boot environments to work properly, do not delete the default ZFS mount points during installation. The default ZFS layout ensures that when boot environments are created, the /usr/local/, /usr/home/, /usr/ports/, /usr/src/ and /var/ directories remain untouched. This way, if you rollback to a previous boot environment, you will not lose data in your home directories, any installed applications, or downloaded src or ports. During installation, you can add additional mount points, just don’t delete the default ones.

To ensure that the files that the operating system needs are included when the system boots, all boot environments on a PC-BSD® system include /usr, /usr/local, and /var. User-specific data is not included in the boot environment. This means that /usr/home, /usr/jails, /var/log, /var/tmp, and /var/audit will not change, regardless of which boot environment is selected at system boot.

To view, manage, and create boot environments using the SysAdm™ graphical client, go to System Management ‣ Boot Environment Manager. In the example shown in Figure 7.6.1: Managing Boot Environments, there is an entry named initial that represents the original PC-BSD® installation.

images/be1.png

From left to right, the icons on the top bar are used to:

Create BE: a new boot environment. You should do this before making any changes to the system that may impact on your current boot environment. You will be prompted for a name which can only contain letters or numbers. Once you click “OK”, the system will create the environment, then add it to the list of boot environments.

Clone BE: creates a copy of an existing boot environment.

Delete BE: will delete the highlighted boot environment. You can not delete the boot environment which has a “Running” status of Yes as that is the current boot environment.

Rename BE: used to rename the highlighted boot environment. The name is what appears in the boot menu when the system boots. You cannot rename the BE you are currently booted into and an error message will occur if you try to do so.

Mount BE: mounts the highlighted BE in /tmp so that its contents are browseable. Note that this setting only applies to inactive BEs.

Unmount BE: unmounts the previously mounted BE.

Activate BE: tells the system to boot into the highlighted boot environment at next system boot. The “Default” will change to Yes, but the “Running” will remain the same. In other words, “Running” refers to the boot environment the system last booted into (is currently running from) whereas “Default” indicates which boot environment the system will boot into at next system boot.

Whenever there are multiple boot environments, a boot menu similar to the one seen in Figure 7.6.2: Boot Menu With Multiple Boot Environments will appear for two seconds during system boot. If you do not pause this screen, the system will automatically boot into either the last “Running” boot environment or, if you have activated another boot environment, the environment that was set as the “Default”.

images/be4.png

The “Boot Environment Menu” entry indicates that multiple boot environments are available. To browse the available boot environments, press the spacebar to pause the screen, arrow down to “Boot Environment Menu” and press Enter. In the example shown in Figure 7.6.3: Boot Menu Shows Created Boot Environments, two boot environments are available. The entry with “default” in the name indicates the date and time of the initial installation. The first boot entry indicates the operating system’s current patch level and the date the system was updated. It is first in the boot order and since it is highlighted in blue, it is the active boot environment, or the one the system will boot into unless another BE is manually selected in this menu. Use the arrow keys to highlight the boot environment you would like to boot into, and press Enter to continue booting into the selected boot environment.

images/be2.png

7.6.1. Managing Boot Environments from the Command Line

If you are running TrueOS® or prefer to use the command line, you can manage boot environments using the beadm command as the superuser. For example, this command creates a boot environment named beforeupgrade:

beadm create beforeupgrade
GRUB configuration updated successfully
Created successfully

To view all boot environments, use the list command:

beadm list
BE                                  Active Mountpoint  Space Created             Nickname
initial                             -      -            8.4G 2015-05-07 10:14    intial
10.1-RELEASE-p20-up-20150512_114505 NR     /           33.1G 2015-05-12 10:57    10.1-RELEASE-p20-up-20150512_114505
beforeupgrade                       -      -            8.2M 2015-05-12 17:30    beforeupgrade

The possible flags in the “Active” field are as follows:

  • R: active on reboot
  • N: active now
  • -: inactive

In this example, the current boot environment is called 10.1-RELEASE-p20-up-20150512_114505, it is active now, will be used at next reboot, and it is mounted. The newly created beforeupgrade boot environment exists, but is inactive and unmounted. To activate the new boot environment:

beadm activate beforeupgrade
GRUB configuration updated successfully
Activated successfully

beadm list
BE                                  Active Mountpoint  Space Created             Nickname
intial                             -      -            8.4G 2015-05-07 10:14     initial
10.1-RELEASE-p20-up-20150512_114505 N      /           12.6M 2015-05-12 10:57    10.1-RELEASE-p20-up-20150512_114505
beforeupgrade                       R      -           33.1G 2015-05-12 17:30    beforeupgrade

The flags now indicate that the system is currently booted into 10.1-RELEASE-p20-up-20150512_114505, but at next boot the system will boot into beforeupgrade.

To modify the maximum number of boot environments, change the number of this variable in /usr/local/etc/pcbsd.conf:

MAXBE: 5

Note that valid values range from 1 to 10.

7.7. Task Manager

7.8. Life Preserver

The built-in Life Preserver utility was designed to take full advantage of the functionality provided by ZFS snapshots. This utility allows you to schedule snapshots of a local ZFS pool and to optionally replicate those snapshots to another system over an encrypted connection. This design provides several benefits:

  • A snapshot provides a “point-in-time” image of the ZFS pool. In one way, this is similar to a full system backup as the snapshot contains the information for the entire filesystem. However, it has several advantages over a full backup. Snapshots occur instantaneously, meaning that the filesystem does not need to be unmounted and you can continue to use applications on your system as the snapshot is created. Since snapshots contain the meta-data ZFS uses to access files, the snapshots themselves are small and subsequent snapshots only contain the changes that occurred since the last snapshot was taken. This space efficiency means that you can take snapshots often. Snapshots also provide a convenient way to access previous versions of files as you can simply browse to the point-in-time for the version of the file that you need. Life Preserver makes it easy to configure when snapshots are taken and provides a built-in graphical browser for finding and restoring the files within a snapshot.
  • Replication is an efficient way to keep the files on two systems in sync. In the case of Life Preserver, the snapshots taken on the PC-BSD® system will be synchronized with their versions stored on the backup server.
  • Snapshots are sent to the backup server oven an encrypted connection and can optionally be stored in an encrypted format, which protects the contents of the snapshots.
  • Having a copy of the snapshots on another system makes it possible to perform an operating system restore should the PC-BSD® system become unusable or to deploy an identical system to different hardware.

To manage snapshots and replication using the SysAdm™ graphical client, go to Utilities ‣ Life Preserver. The rest of this section describes where to find and how to use the features built into Life Preserver.

7.8.1. Snapshots Tab

Figure 7.8.1: Snapshot Tab shows the initial Life Preserver screen on a system that has not yet been configured. It is opened to the “Snapshots” tab and the system has a “ZFS Pool” named “tank”. This screen will display any manually created snapshots and contains buttons to do the following:

images/lpreserver1.png

Remove: used to delete the previously created and highlighted snapshot. This is a permanent change that can not be reversed. In other words, the versions of files at that point in time will be lost.

Create: click this button to manually create a snapshot now. For example, you can create a snapshot before making changes to a file, so that you can preserve a copy of the previous version of the file. Or, you can create a snapshot as you make modifications to the system configuration. When creating a snapshot, a pop-up message will prompt you to input a name for the snapshot, allowing you to choose a name that is useful in helping you remember why you took the snapshot.

Revert:

7.8.2. Replication Tab

Life Preserver can be configured to replicate snapshots to another system over an encrypted SSH connection, though the backup itself is stored in an encrypted format. This ensures that you have a backup copy of your snapshots on another system.

In order to configure replication, the remote system to hold a copy of the snapshots must first meet the following requirements:

  • The backup server must be formatted with the latest version of ZFS, also known as ZFS feature flags or ZFSv5000. Operating systems that support this version of ZFS include PC-BSD®, FreeBSD 9.2 or higher, and FreeNAS 9.1.x or higher.
  • That system must have SSH installed and the SSH service must be running. If the backup server is running PC-BSD®, SSH is already installed and you can start SSH using Service Manager. If that system is running FreeNAS® or FreeBSD, SSH is already installed, but you will need to start SSH.
  • If the backup server is running PC-BSD®, you will need to open TCP port 22 (SSH) using Firewall Manager. If the server is running FreeBSD and a firewall has been configured, add a rule to open this port in the firewall ruleset. FreeNAS® does not run a firewall by default. Also, if there is a network firewall between the PC-BSD® system and the backup system, make sure it has a rule to allow SSH.

Figure 7.8.2: Replication Tab shows the initial “Replication” tab on a system that has not yet been configured for replication. This screen is used to create, view, remove, and configure the replication schedule.

images/lpreserver2.png

To schedule the replication, click the “+” button to display the “Setup Replication” screen shown in Figure 7.8.3: Scheduling a Replication.

images/lpreserver3.png

Input the following information:

  • Host IP: the IP address of the remote system to store the replicated snapshots.
  • SSH Port: the port number, if the remote system is running SSH on a port other than the default of 22.
  • Dataset: the name of the ZFS pool and optional dataset on the remote system. For example, “remotetank” will save the snapshots to a ZFS pool of that name and “remotetank/mybackups” will save the snapshots to an existing dataset named “mybackups” on the pool named “remotetank”.
  • Frequency: use the drop-down menu to select how often to initiate the replication. Available choices are “Sync with snapshot” (at the same time a snapshot is created), “Daily” (when selected, displays a time drop-down menu so you can select the time of day), “Hourly”, every “30 minutes”, every “10 minutes”, or “Manual Only” (only occurs when you click the “Start” button) in this screen.
  • Username: the username must already exist on the remote system, have write access to the specified “Dataset”, and have permission to SSH into that system.
  • Password: the password associated with the “Username”.
  • Local DS: use the drop-down menu to select the pool or dataset to replicate to the remote system.

The buttons at the top of the “Setup Replication” screen are used to:

+ icon add a replication schedule. Multiple schedules are supported, meaning that you can replicate to multiple systems or replicate different “Local DS” datasets at different times.

- icon remove an already created, and highlighted, replication schedule.

gear icon: modify the schedule for the highlighted replication.

Start: manually starts a replication to the system specified in the highlighted replication.

Initialize: deletes the existing replicated snapshots on the remote system and starts a new replication. This is useful if a replication gets stuck and will not complete.

7.8.3. Schedules Tab

This tab is used to manage when snapshots of the ZFS pool are created. Multiple snapshot schedules are supported if the system has multiple pools.

Note

snapshots are created on the entire pool as they are needed when Restoring the Operating System.

To create a snapshot schedule, click the “camera” icon in the lower left corner of this tab. This will activate the “Setup Snapshot Schedule” pane as seen in Figure 7.8.4: Scheduling a Snapshot.

images/lpreserver4.png

This pane contains the following options:

ZPool: select the ZFS pool to snapshot.

Snapshots to keep: snapshots are automatically pruned after the specified number of snapshots to prevent snapshots from eventually using up all of your disk space. If you would like to have multiple versions of files to choose from, select the number of snapshots to keep. Note that auto-pruning only occurs on the snapshots generated by Life Preserver according to the configured schedule. Auto-pruning will not delete any snapshots you create manually in the “Snapshots” tab.

Frequency: use the drop-down menu to select how often snapshots occur. Options include “Daily” (which will allow you to select the time of day), “Hourly” every “30 Minutes”, every “10 Minutes”, or every “5 Minutes”.

Once you have created a snapshot schedule, you can use the “gear” icon next to the “camera” icon to modify the highlighted schedule or the “X” icon to delete the highlighted schedule.

This screen can also be used to manage the ZFS scrub schedule. Scrubs are recommended as they can provide an early indication of a potential disk failure. Since scrubs can be scheduled on a per-pool basis, if you have multiple pools, create a scrub schedule for each pool.

To schedule when the scrub occurs, click the third icon from the right which will activate the “Setup Scrub Schedule” screen shown in Figure 7.8.5: Scheduling a Scrub.

images/lpreserver5.png

Select the pool from the “ZPool” drop-down menu, then select the “Frequency”. Supported frequencies are “Daily”, “Weekly”, or “Monthly”. If you select “Daily”, you can configure the “Hour”. If you select “Weekly”, you can configure the “Day of week” and the “Hour”. If you select “Monthly”, you can configure the “Date” and “Hour”. Since a scrub can be disk I/O intensive, it is recommended to pick a time when the system will not be in heavy use.

Once you have created a scrub schedule, you can use the “gear” icon next to the “schedule scrub” icon to modify the highlighted schedule or the “X” icon to delete the highlighted schedule.

7.8.4. Settings Tab

Disk Usage Warning:

Email:

Email Trigger:

Recursive Management:

7.8.5. Replication to a FreeNAS® System

FreeNAS® is an open source Networked Attached Storage (NAS) operating system based on FreeBSD. This operating system is designed to be installed onto a USB stick so that it is kept separate from the storage disk(s) installed on the system. You can download the latest STABLE version of FreeNAS® 9.10 from download.freenas.org and read its documentation at doc.freenas.org.

This section demonstrates how to configure FreeNAS® 9.10 as the backup server for Life Preserver to replicate to. It assumes that you have already installed this version of FreeNAS® using the installation instructions in the FreeNAS® 9.10 Users Guide and are able to access the FreeNAS® system from a web browser.

In order to prepare the FreeNAS® system to store the backups created by Life Preserver, you will need to create a ZFS pool, create and configure the dataset to store the backups, create a user account that has permission to access that dataset, and enable the SSH service.

In the example shown in Figure 7.8.6: Creating a ZFS Volume in FreeNAS®, the user has clicked Storage ‣ Volumes ‣ Volume Manager in order to create a ZFS pool to hold the backups.

images/lpreserver10.png

Input a “Volume Name”, drag the slider to select the desired number of available disks, and click the “Add Volume” button. The Volume Manager will automatically select the optimal layout for both storage capacity and redundancy. In this example, a RAIDZ2 named volume1 will be created.

Note

make sure that the size of the pool is large enough to hold the replicated snapshots. To determine the size of the initial snapshot, run zpool list on the PC-BSD® system and look at the value in the “ALLOC” field. Subsequent snapshots will be smaller and will be the size of the data that has changed.

To create the dataset to backup to, click the “+” next to the entry for the newly created volume, then click “Create ZFS Dataset”. In the example shown in Figure 7.8.7: Creating a ZFS Dataset in FreeNAS®, the “Dataset Name” is backups. Click the “Add Dataset” button to create the dataset.

images/lpreserver11.png

To create the user account, go to Account ‣ Users ‣ Add User. In the screen shown in Figure 7.8.8: Creating a User in FreeNAS®, input a “Username” that you will later configure Life Preserver to use. Under “Home Directory”, use the browse button to browse to the location of the dataset that you made to store the backups. Input a “Full Name”, then input and confirm a “Password”. When finished, click the “OK” button to create the user.

images/lpreserver12.png

Next, give the user permissions to the dataset by going to Storage ‣ Volumes, click the + next to the name of the volume, click the “+” next to the name of the dataset, then click “Change Permissions” for the expanded dataset. In the screen shown in Figure 7.8.9: Setting Permissions in FreeNAS®, change the “Owner (user)”and “Owner (group)” to the user that you created. Click “Change” to save the change.

images/lpreserver13a.png

Next, click on “Shell” and type the following command, replacing dru and volume1/backups with the name of the user, volume, and dataset that you created:

zfs allow -u dru atime,canmount,clone,compression,create,destroy,hold,mount,mountpoint,promote,receive,rename,send,userprop volume1/backups

Click the “x” in the upper right corner to close “Shell”. Then, to enable the SSH service, go to Services ‣ Control Services, shown in Figure 7.8.10: Start SSH in FreeNAS®.

images/lpreserver14.png

Click the red “OFF” button next to SSH to enable that service. Once it turns to a blue “ON”, the FreeNAS® system is ready to be used as the backup server.

click the “+SSH” button. Life Preserver will scan the network for systems running SSHD and, if the scan is successful, a pop-up menu will show the hostnames of the available systems. If multiple systems are running SSH, use the drop-down menu to select the desired system and click “OK”. If you instead receive an error message, check to see if there is a firewall between the PC-BSD® and the FreeNAS® system as this scan requires UDP port 5353 to be open on any firewalls running on or between the two systems.

Once the system is selected, its IP address will be added to the drop-down menu to the left of the “+SSH” button, the port number SSH is listening on will display in the “SSH Port” menu, and the rest of this screen will be activated. In the example shown in Figure 7.8.11: Finishing the Configuration, the IP address of the FreeNAS® system is 192.168.1.73.

images/lpreserver24.png

Input the name of the user and the name of the dataset you created on the FreeNAS® system. In this example, the “User Name” is dru and the “Remote Dataset” is volume1/backups.

When finished, click “Apply”, Life Preserver will check that it can connect to the backup server and will prompt for the password of “User Name”. A second pop-up message will remind you to save the SSH key to a USB stick (as described in Life Preserver Options) as this key is required for Restoring the Operating System.

Note

if you don’t receive the pop-up message asking for the password, check that the firewall on the backup system, or a firewall within the network, is not preventing access to the port number listed in “SSH Port”. Also, this pop-up only occurs once. If the password changes or you are not able to successfully login, use Snapshots ‣ Reset Replication Password to re-input the password.

Once the SSH login is successful, Life Preserver will begin to replicate snapshots to the remote system at the configured “Frequency”. Note that the first replication can take several hours to complete, depending upon the speed of the network. Subsequent replications will only contain changed data and will be much smaller. You can confirm that the snapshots have been received by clicking Storage ‣ Snapshots on the FreeNAS® system. This should provide a listing of the replicated datasets, allowing you to manage the replicated snapshots as described in Snapshots.

Life Preserver uses backend checks so that it is safe to keep making snapshots while a replication is in process. It will not prune any existing snapshots until the replication is finished and it will not start a second replication before the first replication finishes.

7.8.6. Restoring the Operating System

If you have replicated the system’s snapshots to a remote backup server, you can use a PC-BSD® installation media to perform an operating system restore or to clone another system. Start the installation as usual until you get to the screen shown in Figure 7.8.12: Selecting to Restore/Clone From Backup.

images/restore1.png

Before you can perform a restore, the network interface must be configured. Click the “network connectivity” icon (second from the left) in order to determine if the network connection was automatically detected. If it was not, refer to the instructions in Network Configuration and make sure that networking is working before continuing.

Once you are ready, click “Restore from Life-Preserver backup” and the “Next” button. This will start the Restore Wizard. In the screen shown in Figure 7.8.13: Input the Information for a SSH Restore, input the IP address of the backup server and the name of the user account used to replicate the snapshots. If the server is listening on a non-standard SSH port, change the “SSH port” number. Then, click “Next” to select an authentication method in the screen shown in Figure %s: Select the Authentication Method.

images/restore2.png
images/restore3.png

If you previously saved the SSH key to a USB stick, insert the stick then press “Next”. Otherwise, change the selection to “Use password authentication” and press “Next”. The next screen will either read the inserted USB key or prompt for the password, depending upon your selection. The wizard will then attempt a connection to the server.

Once the connection to the backup server succeeds, you will be able to select which host to restore. In the example shown in Figure 7.8.15: Select the Host to Restore, only one host has been backed up to the replication server.

images/restore4.png

After making your selection, click “Next”. The restore wizard will provide a summary of which host it will restore from, the name of the user account associated with the replication, and the hostname of the target system. Click “Finish” and the installer will proceed to the Disk Selection Screen. At this point, you can click the “Customize” button to customize the disk options. However, in the screen shown in Figure 3.3h, the ZFS datasets will be greyed out as they will be recreated from the backup during the restore. Once you are finished with any customizations, click “Next” to perform the restore.

7.8.7. Using the lpreserver CLI

The lpreserver command line utility can be used to manage snapshots and replication from the command line of a PC-BSD® or TrueOS® system. This command needs to be run as the superuser. To display its usage, type the command without any arguments:

lpreserver
Life-Preserver
---------------------------------
Available commands
Type in help <command> for information and usage about that command
      help - This help file or the help for the specified command
  cronsnap - Schedule snapshot creation via cron
 cronscrub - Schedule scrub via cron
       get - Get list of lpreserver options
  listcron - Listing of scheduled snapshots
  listsnap - List snapshots of a zpool/dataset
    mksnap - Create a ZFS snapshot of a zpool/dataset
 replicate - Enable / Disable ZFS replication to a remote system
revertsnap - Revert zpool/dataset to a snapshot
    rmsnap - Remove a snapshot
       set - Set lpreserver options
    status - List datasets, along with last snapshot / replication date
     zpool - Manage a zpool by attaching / detaching disks

Each command has its own help text that describes its parameters and provides a usage example. For example, to receive help on how to use the lpreserver cronsnap command, type:

lpreserver help cronsnap
Life-Preserver
---------------------------------
Help cronsnap
Schedule a ZFS snapshot
Usage:
For a listing of all scheduled snapshots
# lpreserver listcron
or
To start / stop snapshot scheduling
# lpreserver cronsnap <dataset> <action> <frequency> <numToKeep>
action = start / stop
frequency = auto / daily@XX / hourly / 30min / 10min / 5min
                         ^^ Hour to execute

numToKeep = Number of snapshots to keep total

NOTE: When Frequency is set to auto the following will take place:
* Snapshots will be created every 5 minutes and kept for an hour.
* A hourly snapshot will be kept for a day.
* A daily snapshot will be kept for a month.
* A Monthly snapshot will be kept for a year.
* The life-preserver daemon will also keep track of the zpool disk space,
  if the capacity falls below 75%, the oldest snapshot will be auto-pruned.

Example:
lpreserver cronsnap tank1/usr/home/kris start daily@22 10
or
lpreserver cronsnap tank1/usr/home/kris stop

Table 8.19a shows the command line equivalents to the graphical options provided by the Life Preserver GUI. Note that some options are only available from the command line.

Table 8.19a: Command Line and GUI Equivalents

Command Line GUI Description
cronsnap Configure ‣ Local Snapshots schedule when snapshots occur and how long to keep them; the stop option can be used to disable snapshot creation
cronscrub   schedule a ZFS scrub
get   list Life Preserver options
listcron   list which ZFS pools have a scheduled snapshot
listsnap Restore Data list snapshots of specified dataset
mksnap Snapshots ‣ New Snapshot create and replicate a new ZFS snapshot; by default, snapshots are recursive, meaning that a snapshot is taken of every dataset within a pool
replicate Configure ‣ Replication used to list, add, and remove backup server; read the help for this command for examples
revertsnap   revert dataset to the specified snapshot version
rmsnap Snapshots ‣ Delete Snapshot deletes specified snapshot; by default, all datasets within the snapshot are deleted
set   configures Life Preserver options; read help for the list of configurable options
status Status lists the last snapshot name and replication status
zpool Disks ‣ Attach Disk and Disks ‣ Detach Disk used to attach/detach drives from the pool; read help for examples

7.8.7.1. Mirroring the System to a Local Disk

In addition to replicating to a remote server, the lpreserver command also provides a method for attaching a new disk drive to an existing ZFS pool, and live-mirroring all data to that disk as data changes on the pool. The attached disk drive can be another internal disk or an external USB disk. When the new disk is attached for the first time, it will be erased and used solely as a mirror of the existing system drive. In addition, it will be made bootable, allowing you to boot from and use the new disk should the primary disk fail. In order to use this feature you will need the following:

  • an internal or external disk drive that is the same size or larger than the existing system disk.
  • since the disk will be formatted, it must be either blank or not have any data that you wish to keep intact.
  • in order to boot from the disk should the primary disk fail, the system must support booting from the new disk. For example, if you are using a USB disk, make sure that the BIOS is able to boot from a USB disk.

The superuser can setup the new disk using the following command. Replace tank1 with the name of your ZFS pool and /dev/da0 with the name of the disk to format. For example, the first USB disk will be /dev/da0 and the second internal hard disk will be /dev/ad1:

lpreserver zpool attach tank1 /dev/da0

When the disk is first attached, it will be formatted with ZFS and configured to mirror the size of the existing disk. GRUB will also be stamped on the new disk, making it bootable should another drive in the array go bad. You can add multiple disks to the pool in this manner, giving any level of redundancy that you require.

Once the disk is attached, it will begin to resilver. This process mirrors the data from the primary disk to the newly attached disk. This may take a while, depending upon the speed of the disks and system load. Until this is finished you should not reboot the system, or detach the disk. You can monitor the resilvering process by typing zpool status.

To get a listing of the disks in your mirror, run this command, replacing tank1 with the name of the pool:

lpreserver zpool list tank1

If you are using an external drive, there may be occasions where you wish to disconnect the backup drive, such as when using a laptop and going on the road. In order to so this safely, it is recommended that you first offline the external disk using the following command:

lpreserver zpool offline tank1 /dev/da0

Then when you re-connect the drive, you can place it in online mode again using:

lpreserver zpool online tank1 /dev/da0

Sometimes, the disk name will change as a result of being disconnected. The lpreserver zpool list tank1 command can be used to get the proper device ID.

If you wish to permanently remove a disk from the mirror, run the following command. If you decide to re-attach this disk later, a full disk copy will again have to be performed:

lpreserver zpool detach tank1 /dev/da0

Note

in addition to working with mirrors, the lpreserver zpool command can also be used to manage a RAIDZ configuration, although you will probably not want to use external disks in this case.