Recovering data from a compromised VM: Difference between revisions

no edit summary
No edit summary
No edit summary
 
Line 14: Line 14:
# The VM is shut down and locked at the sysadmin level.
# The VM is shut down and locked at the sysadmin level.
# You are notified by email.
# You are notified by email.


==Why do you need to rebuild?== <!--T:4-->
==Why do you need to rebuild?== <!--T:4-->
Line 20: Line 19:
* The contents of the VM are no longer trustworthy, but it is relatively safe to extract the data.
* The contents of the VM are no longer trustworthy, but it is relatively safe to extract the data.
* You have to build a new VM.
* You have to build a new VM.


==What steps should you take?== <!--T:5-->
==What steps should you take?== <!--T:5-->
Line 29: Line 27:
# Under <i>Volumes</i>, select <i>Manage Attachments</i> for the volume that was compromised and select <i>Attach To Instance</i> (select the recovery instance you just launched).
# Under <i>Volumes</i>, select <i>Manage Attachments</i> for the volume that was compromised and select <i>Attach To Instance</i> (select the recovery instance you just launched).
# ssh in to your recovery instance: you will now see your old, compromised volume available as the “vdb” disk.
# ssh in to your recovery instance: you will now see your old, compromised volume available as the “vdb” disk.
# Mounting the appropriate filesystem out of a partition or a LVM logical volume depends on how the base OS image was created. Because instructions vary greatly, contact someone with experience to continue.
# Mounting the appropriate filesystem out of a partition or an LVM logical volume depends on how the base OS image was created. Because instructions vary greatly, contact someone with experience to continue.


<!--T:7-->
<!--T:7-->
[[Category:Cloud]]
[[Category:Cloud]]
</translate>
</translate>
rsnt_translations
56,430

edits