He claimed a couple days later that he managed to recover nearly everything and that it was no biggie. How do we know this isn't just a troll looking to make a headline somewhere? Like, what is the name of this Marco Marsala's company?
You mean like "There's no such thing as bad news"?
If you're a hosting company, there is such a thing. And this would be just about as bad as it gets. Whether or not it's a true story, though, is another thing.
How's this the hosting co's fault or bad news when the client burnt themselves? That said, yea it doesn't seem genuine with the post comments.
His was a hosting company, with some 1535 customers, according to his post.
Going to a command line and typing a command is not "code".
If this is true, think about the affected 1500 customers as well. How could you run an entire business plus the businesses of fricking 1500 clients without fool proof, remote backups?
but it was supposedly part of a script
Yeah, he had variables for the file path that werent set ($var1/$var2), which resulted in removing /. Someone mentioned in the comments on serverfault that this technically shouldnt have even been possible if he didnt pass --no-preserve-root unless he had a wildcard in the second variable ($var2) resulting in /*. I get that someone can make a mistake, even a series of mistakes, but at least try it once on a test machine to verify the script does what you think it should do.
If I had a company with 1.5K clients, I can tell you for sure that I would NOT be working on the front lines day in day out. I'd be golfing or whatever something liek that.
no he didnt.
All servers got deleted and the offsite backups too because the remote storage was mounted just before by the same script (that is a backup maintenance script).
Can one actually mount a drive that is offsite? If so, how does one keep malware from wiping out the backup at the same time?no he didnt.
No doubt. But if all those pennies go away at the same time . . .1500 shared hosting customers is like having 1500 customers on a paper route. He probably makes pennies a month off of most of them.
Can one actually mount a drive that is offsite? If so, how does one keep malware from wiping out the backup at the same time?
No doubt. But if all those pennies go away at the same time . . .
Yup. You just access a shared drive over a WAN link, e.g. an NFS shared volume. No reason why this can't be done over VPN.Can one actually mount a drive that is offsite? If so, how does one keep malware from wiping out the backup at the same time?
Can one actually mount a drive that is offsite? If so, how does one keep malware from wiping out the backup at the same time?
SAN Snapshots, people.
Anyway, that was incredibly boneheaded. His livelihood is gone, and now that this has been publicized, he'll never pass the Google test again either.
No idea how somebody who runs that many sites would be so idiotic to remain in business this long.