Recommendations for long term storage: RAID or ??

Started 3 months ago | Discussions thread
DerKeyser Contributing Member • Posts: 626
Re: Recommendations for long term storage: RAID or ??

gilliano wrote:

a_c_skinner wrote:

I'm happy with a Synology Diskstation NAS. I make backups of it to USB disks attached to the NAS directly. I've four copies of all the data with two off site. The NAS has copy and backup options built in.

You don't need RAID, which isn't about data security, it is about continuous availability.

The lower end Diskstations are about £100.

Thats similar to what I'm going with but I will back up off site automatically and will run RAID 1 on a dual bay NAS to prevent data loss in case of a drive failure locally. Continuous availability is pretty important to me.

Lots of bizarre answers here regarding storage and backup (and some good recs too, thanks!). Recommend anyone else looking for specifics on consumer level equipment go to stackexchange instead of this site. Got some great info there including on which drives to choose for the NAS and actual networking layouts for speed and efficency

Good choice - very much like my suggested solution. Remember to enable snapshotting on the NAS as that is a really really good measure against human error and ransomware attack.

just to clarify before I’m challanged on that statement. Yes NAS snapshotting is an excellent measure against ransomware attack on client workstations. They all see the NAS on a file level network protocol (smb, nfs or afp). The NAS implements snapshotting on a block level below the file system, so there is no way the clients can see nor touch that on the file level protocol. The snapshots will persist across a client encrypting the intire network drive (NAS) - so you can just press “revert” after the client has been disinfected/cleaned, and your NAS files are back 😄

Snapshots are an extremely nice feature - and has a very very low diskspace overhead in normal usecases. 
To have the snapshots destroyed (cannot be encrypted as they are read-only on a filesystem level), you would need to delete them or kill the intire volume. That requires a full hack and exploit on you NAS - extremely unlikely to happen at the same time as your client computers are under ransomware attack. 
should that happen, well then, there’s the automatic daily cloud backup to rely on - with versioned files if encrypted filed should be copied to the cloud before the disaster is discovered.

A pretty bullet proff solution - especially if you automate it as I suggested in my blog post. That will eliminate the BY FAR most common case of lost data: user error or lazyness combined with myrphys law in manual procedures around backup.
That’s the most difficult thing to explain to the hardliners of manual drive rotation schemes and such. But obviously - if they really are that good at doing it day in and day out - year after year - without fail, it’s not a problem. Statistics CLEARLY shows they are not, but until the accident happens to them personally - they keep believing it only happens to “other people” 😄

-- hide signature --

Happy Nikon Shooter
See my articles and galleries at:

Post (hide subjects) Posted by
Keyboard shortcuts:
FForum PPrevious NNext WNext unread UUpvote SSubscribe RReply QQuote BBookmark MMy threads
Color scheme? Blue / Yellow