Operations Guide
This guide covers operational procedures for running Enprivacy Invisiq, including backup, restore, and reference RTO/RPO targets.
Backup
Section titled “Backup”Backup and recovery is your responsibility as the operator. The following outlines the recommended backup scope and frequency.
What to Back Up
Section titled “What to Back Up”| Component | Description |
|---|---|
| Application database | Primary data store (user data, workspace config, audit logs) |
| Object / blob storage | Uploaded files and attachments |
| Application configuration | Environment variables and secrets (back up separately and securely) |
Recommended Backup Frequency
Section titled “Recommended Backup Frequency”| Component | Recommended frequency |
|---|---|
| Application database | TODO |
| Object / blob storage | TODO |
Restore Procedures
Section titled “Restore Procedures”Restoring the Database
Section titled “Restoring the Database”Restoring Object Storage
Section titled “Restoring Object Storage”Reference RTO / RPO
Section titled “Reference RTO / RPO”These are reference targets for typical reference architectures. Actual values depend on your infrastructure and backup configuration.
| Architecture | RTO | RPO |
|---|---|---|
| Single-node (development) | TODO | TODO |
| High-availability (production) | TODO | TODO |
Health Checks
Section titled “Health Checks”Log Management
Section titled “Log Management”Invisiq emits structured JSON audit logs to stdout. These should be forwarded to your SIEM or log aggregation platform.
Upgrades
Section titled “Upgrades”See the Deployment Guide for upgrade procedures.