So I have been running a PBS to complement my home lab PVE cluster for a while now and everything works beautifully.
And yet I am not fully happy because if my (management) network ever were breached and my VMs compromised, the next steps for an attacker would be to go after my backups. And if the attacker managed to hack my PVE, chances are the attacker could also breach my PBS and destroy/encrypt my backups.
Now while I make regular tape copies of my PBS's datastore, I would like to move the PBS out of my management network so that an attacker that breached my PVE could not just move laterally to my PBS as well. The problem with this is that PVE backups to PBS by pushing the backups there. And that doesn't work, if PBS is another network behind a firewall.
One solution would be to set up another PBS on that other network that syncs (pulls) from my main PBS. And I do have that at an offsite location. But this means that I have everything twice (which in itself isn't bad but it does create redundancy).
So what I am looking here is a solution where my main PBS polls my PVE cluster and initiates the backups (rather than my PVE cluster pushing the backups). My off network PBS would be able to connect to the PVE cluster through the firewall and the PVE cluster would be able respond but the PVE cluster would have no way of reaching the PBS on its own (and so would any attacker).
Can that be done?
Or what is the best practice to keep a potential attacker from getting to the PBS?
Thanks!
And yet I am not fully happy because if my (management) network ever were breached and my VMs compromised, the next steps for an attacker would be to go after my backups. And if the attacker managed to hack my PVE, chances are the attacker could also breach my PBS and destroy/encrypt my backups.
Now while I make regular tape copies of my PBS's datastore, I would like to move the PBS out of my management network so that an attacker that breached my PVE could not just move laterally to my PBS as well. The problem with this is that PVE backups to PBS by pushing the backups there. And that doesn't work, if PBS is another network behind a firewall.
One solution would be to set up another PBS on that other network that syncs (pulls) from my main PBS. And I do have that at an offsite location. But this means that I have everything twice (which in itself isn't bad but it does create redundancy).
So what I am looking here is a solution where my main PBS polls my PVE cluster and initiates the backups (rather than my PVE cluster pushing the backups). My off network PBS would be able to connect to the PVE cluster through the firewall and the PVE cluster would be able respond but the PVE cluster would have no way of reaching the PBS on its own (and so would any attacker).
Can that be done?
Or what is the best practice to keep a potential attacker from getting to the PBS?
Thanks!