|
@@ -24,7 +24,7 @@ SSHFS, the Borg client only can do file system operations and has no agent
|
|
|
running on the remote side, so *every* operation needs to go over the network,
|
|
|
which is slower.
|
|
|
|
|
|
-Can I backup from multiple servers into a single repository?
|
|
|
+Can I back up from multiple servers into a single repository?
|
|
|
------------------------------------------------------------
|
|
|
|
|
|
In order for the deduplication used by Borg to work, it
|
|
@@ -115,8 +115,8 @@ Which file types, attributes, etc. are *not* preserved?
|
|
|
Are there other known limitations?
|
|
|
----------------------------------
|
|
|
|
|
|
-- borg extract only supports restoring into an empty destination. After that,
|
|
|
- the destination will exactly have the contents of the extracted archive.
|
|
|
+- borg extract supports restoring only into an empty destination. After extraction,
|
|
|
+ the destination will have exactly the contents of the extracted archive.
|
|
|
If you extract into a non-empty destination, borg will (for example) not
|
|
|
remove files which are in the destination, but not in the archive.
|
|
|
See :issue:`4598` for a workaround and more details.
|
|
@@ -128,12 +128,12 @@ If a backup stops mid-way, does the already-backed-up data stay there?
|
|
|
|
|
|
Yes, Borg supports resuming backups.
|
|
|
|
|
|
-During a backup a special checkpoint archive named ``<archive-name>.checkpoint``
|
|
|
-is saved every checkpoint interval (the default value for this is 30
|
|
|
+During a backup, a special checkpoint archive named ``<archive-name>.checkpoint``
|
|
|
+is saved at every checkpoint interval (the default value for this is 30
|
|
|
minutes) containing all the data backed-up until that point.
|
|
|
|
|
|
This checkpoint archive is a valid archive,
|
|
|
-but it is only a partial backup (not all files that you wanted to backup are
|
|
|
+but it is only a partial backup (not all files that you wanted to back up are
|
|
|
contained in it). Having it in the repo until a successful, full backup is
|
|
|
completed is useful because it references all the transmitted chunks up
|
|
|
to the checkpoint. This means that in case of an interruption, you only need to
|
|
@@ -163,7 +163,7 @@ really desperate (e.g. if you have no completed backup of that file and you'ld
|
|
|
rather get a partial file extracted than nothing). You do **not** want to give
|
|
|
that option under any normal circumstances.
|
|
|
|
|
|
-How can I backup huge file(s) over a unstable connection?
|
|
|
+How can I back up huge file(s) over a unstable connection?
|
|
|
---------------------------------------------------------
|
|
|
|
|
|
Yes. For more details, see :ref:`checkpoints_parts`.
|
|
@@ -334,7 +334,7 @@ Assuming that all your chunks have a size of :math:`2^{21}` bytes (approximately
|
|
|
and we have a "perfect" hash algorithm, we can think that the probability of collision
|
|
|
would be of :math:`p^2/2^{n+1}` then, using SHA-256 (:math:`n=256`) and for example
|
|
|
we have 1000 million chunks (:math:`p=10^9`) (1000 million chunks would be about 2100TB).
|
|
|
-The probability would be around to 0.0000000000000000000000000000000000000000000000000000000000043.
|
|
|
+The probability would be around 0.0000000000000000000000000000000000000000000000000000000000043.
|
|
|
|
|
|
A mass-murderer space rock happens about once every 30 million years on average.
|
|
|
This leads to a probability of such an event occurring in the next second to about :math:`10^{-15}`.
|
|
@@ -342,9 +342,9 @@ That's **45** orders of magnitude more probable than the SHA-256 collision. Brie
|
|
|
if you find SHA-256 collisions scary then your priorities are wrong. This example was grabbed from
|
|
|
`this SO answer <https://stackoverflow.com/a/4014407/13359375>`_, it's great honestly.
|
|
|
|
|
|
-Still, the real question is if Borg tries to not make this happen?
|
|
|
+Still, the real question is if Borg tries not to make this happen?
|
|
|
|
|
|
-Well... it used to not check anything but there was a feature added which saves the size
|
|
|
+Well... previously it did not check anything until there was a feature added which saves the size
|
|
|
of the chunks too, so the size of the chunks is compared to the size that you got with the
|
|
|
hash and if the check says there is a mismatch it will raise an exception instead of corrupting
|
|
|
the file. This doesn't save us from everything but reduces the chances of corruption.
|
|
@@ -364,7 +364,7 @@ How do I configure different prune policies for different directories?
|
|
|
----------------------------------------------------------------------
|
|
|
|
|
|
Say you want to prune ``/var/log`` faster than the rest of
|
|
|
-``/``. How do we implement that? The answer is to backup to different
|
|
|
+``/``. How do we implement that? The answer is to back up to different
|
|
|
archive *names* and then implement different prune policies for
|
|
|
different prefixes. For example, you could have a script that does::
|
|
|
|
|
@@ -489,7 +489,7 @@ Using keyfile-based encryption with a blank passphrase
|
|
|
Using ``BORG_PASSCOMMAND`` with macOS Keychain
|
|
|
macOS has a native manager for secrets (such as passphrases) which is safer
|
|
|
than just using a file as it is encrypted at rest and unlocked manually
|
|
|
- (fortunately, the login keyring automatically unlocks when you login). With
|
|
|
+ (fortunately, the login keyring automatically unlocks when you log in). With
|
|
|
the built-in ``security`` command, you can access it from the command line,
|
|
|
making it useful for ``BORG_PASSCOMMAND``.
|
|
|
|
|
@@ -567,7 +567,7 @@ otherwise make unavailable) all your backups.
|
|
|
How can I protect against a hacked backup client?
|
|
|
-------------------------------------------------
|
|
|
|
|
|
-Assume you backup your backup client machine C to the backup server S and
|
|
|
+Assume you back up your backup client machine C to the backup server S and
|
|
|
C gets hacked. In a simple push setup, the attacker could then use borg on
|
|
|
C to delete all backups residing on S.
|
|
|
|
|
@@ -738,13 +738,13 @@ This has some pros and cons, though:
|
|
|
|
|
|
The long term plan to improve this is called "borgception", see :issue:`474`.
|
|
|
|
|
|
-Can I backup my root partition (/) with Borg?
|
|
|
+Can I back up my root partition (/) with Borg?
|
|
|
---------------------------------------------
|
|
|
|
|
|
Backing up your entire root partition works just fine, but remember to
|
|
|
-exclude directories that make no sense to backup, such as /dev, /proc,
|
|
|
+exclude directories that make no sense to back up, such as /dev, /proc,
|
|
|
/sys, /tmp and /run, and to use ``--one-file-system`` if you only want to
|
|
|
-backup the root partition (and not any mounted devices e.g.).
|
|
|
+back up the root partition (and not any mounted devices e.g.).
|
|
|
|
|
|
If it crashes with a UnicodeError, what can I do?
|
|
|
-------------------------------------------------
|
|
@@ -955,7 +955,7 @@ Another possible reason is that files don't always have the same path, for
|
|
|
example if you mount a filesystem without stable mount points for each backup
|
|
|
or if you are running the backup from a filesystem snapshot whose name is not
|
|
|
stable. If the directory where you mount a filesystem is different every time,
|
|
|
-Borg assumes they are different files. This is true even if you backup these
|
|
|
+Borg assumes they are different files. This is true even if you back up these
|
|
|
files with relative pathnames - borg uses full pathnames in files cache regardless.
|
|
|
|
|
|
It is possible for some filesystems, such as ``mergerfs`` or network filesystems,
|
|
@@ -1006,7 +1006,7 @@ How can I avoid unwanted base directories getting stored into archives?
|
|
|
|
|
|
Possible use cases:
|
|
|
|
|
|
-- Another file system is mounted and you want to backup it with original paths.
|
|
|
+- Another file system is mounted and you want to back it up with original paths.
|
|
|
- You have created a BTRFS snapshot in a ``/.snapshots`` directory for backup.
|
|
|
|
|
|
To achieve this, run ``borg create`` within the mountpoint/snapshot directory:
|