• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion

Question Backup Plesk in case of server failure?

safemoon

Basic Pleskian
Hello,

Scenario:
let's say i have a plesk dedicated (web host edition) server with 100 hosting accounts, each hosting account has their own domains with their own web applications.

How can I migrate everything (or maybe have a second server that is always synced with the original) in a new server in case the server crashes, gets hacked/attacked, or any other bad scenario, with minimum downtime?

What is the best practice to solve such problems? (the databases have to be up to date to avoid data loss)
 
a plesk dedicated (web host edition) server with 100 hosting accounts, each hosting account has their own domains with their own web applications.
How can I migrate everything
Use the "Plesk Migrator" extension.

(or maybe have a second server that is always synced with the original)
A live synced failover scenario is not supported. You can vote for the feature here:


in case the server crashes,
If a server crashes, it is either for
a) hardware defects
b) RAID controller defects
c) hard disk defects
In either case, the faulty component needs to be replaced. The server will normally reboot trouble-free aftwards.

For the hard disk I recommend to have at least RAID 1 (hard disk mirroring), better RAID 5 (three disks). When you have a lot of load I also highly recommend to not to use software RAID, but hardware RAID, because it will deliver the best possible performance even if your server is under high load. Software RAID won't in that case.


gets hacked/attacked
An attack is normally not directed against a specific IP, but against a specific domain name, website respectively. You need to be prepared with different mitigation strategies how to tackle different attack types. You also need different layers of protection, e.g. DDoS protected BEFORE your server, meaning in the data center before traffic reaches your server, protection for individual domains on the Internet, e.g. using Cloudflare, then maybe some operating system tweaks to minimize the load on a server if an attack comes through, also use Fail2Ban that comes with Plesk to block typical simple brute force attacks, use ModSecurity (Web Application Firewall) that comes with Plesk, pay attention to the "Site Vulnerability Report" that comes with Wordpress Toolkit, use ImunifyAV, which also comes with Plesk to detect known malware on your system.

In all these cases a migration to a different hardware won't mitigate the issue, because that new hardware will come under attack just as the old hardware did. It is much better to implement all possible levels of protection instead.


, or any other bad scenario, with minimum downtime?
What is the best practice to solve such problems? (the databases have to be up to date to avoid data loss)
Minimum downtime, that's something everybody wants. But is it really so super important to get all the emails instantaneously? Does it really hurt if a server cannot be reached for a few hours during a total desaster scenario? Yes, customers will complain, and they will also believe that they are about to lose business. But the reality is: If a website cannot be reached, people will try again later. It's a big myth that if people cannot reach a website they immediately give up.
 
An attack is normally not directed against a specific IP, but against a specific domain name, website respectively. You need to be prepared with different mitigation strategies how to tackle different attack types. You also need different layers of protection, e.g. DDoS protected BEFORE your server, meaning in the data center before traffic reaches your server, protection for individual domains on the Internet, e.g. using Cloudflare, then maybe some operating system tweaks to minimize the load on a server if an attack comes through, also use Fail2Ban that comes with Plesk to block typical simple brute force attacks, use ModSecurity (Web Application Firewall) that comes with Plesk, pay attention to the "Site Vulnerability Report" that comes with Wordpress Toolkit, use ImunifyAV, which also comes with Plesk to detect known malware on your system.
Hello Peter, thank you for your detailed reply!
I agree, which extensions would you recommend (even paid ones) for maximum security? What about Imunify360 or Juggernaut?
Is there any service provided by Plesk to configure my servers for maximum security and recommend solutions for other server related needs? (willing to pay)

As for the attacks, you are right, they target domains and not IPs so unless you are not fully protected you can't avoid it. But in addition to my other thread (Question - Virtual IP redirect traffic to main ip?)
Is there any way I can add a virtual IP/controller in front of the server? The scenario I want to work on is in case the server has a hardware failure, I can change the configuration and point the secondary server (that is already synced with the original server) to that virtual public IP to minimize downtime.

That way in case of a server failure I will not have to change the A record of all the domains to the new server, since it will remain the same.

Again thanks for you help!
 
Is there any way I can add a virtual IP/controller in front of the server? The scenario I want to work on is in case the server has a hardware failure, I can change the configuration and point the secondary server (that is already synced with the original server) to that virtual public IP to minimize downtime.
You'll need to talk to your data center about this. It is technically possible, but it will normally cause more then twice the costs of a single server plus needs some maintenance attention. It is nothing that can be done on the server itself, but needs a load balancer before the server.
 
You'll need to talk to your data center about this. It is technically possible, but it will normally cause more then twice the costs of a single server plus needs some maintenance attention. It is nothing that can be done on the server itself, but needs a load balancer before the server.
Thanks,
is there any other approach that is better?
 
Back
Top