Registered users
Linkedin Twitter Facebook Google+
  This website uses its own cookies or from third parties Close
33HOPS, IT Consultants
33HOPS ::: Proveedores de Soluciones Informáticas :: Madrid :+34 91 663 6085Avda. Castilla la Mancha, 95 - local posterior - 28700 S.S. de los Reyes - MADRID33HOPS, Sistemas de Informacion y Redes, S.L.Info


Cron Management

The "Cron" menu entry is quite simple to operate with. It only has too options: install and uninstall.

Install/ Uninstall Cron

By installing the crontab you will be adding an entry to the /etc/rc.local.d/ file, so that every time you reboot the server, a copy of the crontabs corresponding to every user with an associated cron schedule will be re-introduced to the corresponding ESXi crontab. This is necessary as ESXi's crontabs are not persistent.

When installing and uninstalling the crontabs, you will be presented a list of users to choose from. Those are users of the ESXi host. So you need to add a user to your system before being able to install his crontab. You will also need to assign appropriate privileges, so that the user has enough permissions to perform the backups. This is equivalent to creating a user and assigning full permissions.

It is highly recommended that, unless you are ready to go through the backup user creation and permissions asigment, you stick to using root as the backup user.

Choose cron user

Key Exchange

Linking to another host means adding the current host's public key to the authorized_keys file in the second host. This allows to login from host A to B without being prompted for a password. You need to Link to other hosts before you can execute any crossed backup jobs by means of the --host argument, or when you simply want to backup to it via IP instead of to a local datastore.

XSIBackup Key Exchange

XSIBackup Menu offers two options in regards to linked hosts:
- List servers linked to the current host, which presents a list of public keys present in the local server's authorized_keys file. This shows which ESXi servers (they could also be other kind of OSs) are allowed to SSH into this server by using an RSA key.

- Add this host's XSIBackup RSA public key to the authorized_keys file of some other host (it could be other type of OS too). There are some things to clear up in regards to Linking:

XSIBackup uses its own key pair, which has nothing to do with the host's key pair, which BTW is not persistent in ESXI (as so many other things). So it's XSIBackup's public RSA key that is added to the remote server's authorized_keys file.

XSIBackup is able to use this menu option to detect SSH folders and add keys on *NIX servers based on systemd and init.d service managers, but it will not work out of the box with any OS you can think of. So, in case you get some error and you can't use the menu, just grab the key and add it to the remote server's authorized_keys file.

Website Map
IT Manager
In Site
Resources & help
Index of Docs
33HOPS Forum

Fill in to download
The download link will be sent to your e-mail.

            Read our Privacy Policy