| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383 | .. include:: global.rst.inc.. highlight:: bash.. _quickstart:Quick Start===========This chapter will get you started with Borg and coversvarious use cases.A step by step example----------------------.. include:: quickstart_example.rst.incArchives and repositories-------------------------A *Borg archive* is the result of a single backup (``borg create``). An archivestores a snapshot of the data of the files "inside" it. One can later extract ormount an archive to restore from a backup.*Repositories* are filesystem directories acting as self-contained stores of archives.Repositories can be accessed locally via path or remotely via ssh. Under the hood,repositories contain data blocks and a manifest tracking which blocks are in eacharchive. If some data hasn't changed from one backup to another, Borg can simplyreference an already uploaded data chunk (deduplication).Important note about free space-------------------------------Before you start creating backups, please make sure that there is *always*a good amount of free space on the filesystem that has your backup repository(and also on ~/.cache). A few GB should suffice for most hard-drive sizedrepositories. See also :ref:`cache-memory-usage`.Borg doesn't use space reserved for root on repository disks (even when run as root),on file systems which do not support this mechanism (e.g. XFS) we recommend to reservesome space in Borg itself just to be safe by adjusting the ``additional_free_space``setting (a good starting point is ``2G``)::    borg config /path/to/repo additional_free_space 2GIf Borg runs out of disk space, it tries to free as much space as itcan while aborting the current operation safely, which allows the user to free more spaceby deleting/pruning archives. This mechanism is not bullet-proof in somecircumstances [1]_.If you *really* run out of disk space, it can be hard or impossible to free space,because Borg needs free space to operate - even to delete backuparchives.You can use some monitoring process or just include the free space informationin your backup log files (you check them regularly anyway, right?).Also helpful:- create a big file as a "space reserve", that you can delete to free space- if you use LVM: use a LV + a filesystem that you can resize later and have  some unallocated PEs you can add to the LV.- consider using quotas- use `prune` and `compact` regularly.. [1] This failsafe can fail in these circumstances:    - The underlying file system doesn't support statvfs(2), or returns incorrect      data, or the repository doesn't reside on a single file system    - Other tasks fill the disk simultaneously    - Hard quotas (which may not be reflected in statvfs(2))Important note about permissions--------------------------------Using root likely will be required if you want to backup files of other usersor the operating system. If you only back up your own files, you neither neednor want to use root.Avoid to create a mixup of users and permissions in your repository (or cache).This can easily happen if you run borg using different user accounts (e.g. yournon-privileged user and root) while accessing the same repo.Of course, a non-root user will have no permission to work with the filescreated by root (or another user) and borg operations will just fail with`Permission denied`.The easy way to avoid this is to always access the repo as the same user:For a local repository just always invoke borg as same user.For a remote repository: always use e.g. borg@remote_host. You can use thisfrom different local users, the remote user accessing the repo will always beborg.If you need to access a local repository from different users, you can use thesame method by using ssh to borg@localhost.Important note about files changing during the backup process-------------------------------------------------------------Borg does not do anything about the internal consistency of the datait backs up.  It just reads and backs up each file in whatever statethat file is when Borg gets to it.  On an active system, this can leadto two kinds of inconsistency:- By the time Borg backs up a file, it might have changed since the backup process was initiated- A file could change while Borg is backing it up, making the file internally inconsistentIf you have a set of files and want to ensure that they are backed upin a specific or consistent state, you must take steps to preventchanges to those files during the backup process.  There are a fewcommon techniques to achieve this.- Avoid running any programs that might change the files.- Snapshot files, filesystems, container storage volumes, or logical volumes.  LVM or ZFS might be useful here.- Dump databases or stop the database servers.- Shut down virtual machines before backing up their images.- Shut down containers before backing up their storage volumes.For some systems Borg might work well enough without theseprecautions.  If you are simply backing up the files on a system thatisn't very active (e.g. in a typical home directory), Borg usuallyworks well enough without further care for consistency.  Log files andcaches might not be in a perfect state, but this is rarely a problem.For databases, virtual machines, and containers, there are specifictechniques for backing them up that do not simply use Borg to backupthe underlying filesystem.  For databases, check your databasedocumentation for techniques that will save the database state betweentransactions.  For virtual machines, consider running the backup onthe VM itself or mounting the filesystem while the VM is shut down.For Docker containers, perhaps docker's "save" command can help.Automating backups------------------The following example script is meant to be run daily by the ``root`` user ondifferent local machines. It backs up a machine's important files (but not thecomplete operating system) to a repository ``~/backup/main``  on a remote server.Some files which aren't necessarily needed in this backup are excluded. See:ref:`borg_patterns` on how to add more exclude options.After the backup this script also uses the :ref:`borg_prune` subcommand to keeponly a certain number of old archives and deletes the others.Finally, it uses the :ref:`borg_compact` subcommand to remove deleted objectsfrom the segment files in the repository to preserve disk space.Before running, make sure that the repository is initialized as documented in:ref:`remote_repos` and that the script has the correct permissions to be executableby the root user, but not executable or readable by anyone else, i.e. root:root 0700.You can use this script as a starting point and modify it where it's necessary to fityour setup.Do not forget to test your created backups to make sure everything you need is beingbacked up and that the ``prune`` command is keeping and deleting the correct backups.::    #!/bin/sh    # Setting this, so the repo does not need to be given on the commandline:    export BORG_REPO=ssh://username@example.com:2022/~/backup/main    # Setting this, so you won't be asked for your repository passphrase:    export BORG_PASSPHRASE='XYZl0ngandsecurepa_55_phrasea&&123'    # or this to ask an external program to supply the passphrase:    export BORG_PASSCOMMAND='pass show backup'    # some helpers and error handling:    info() { printf "\n%s %s\n\n" "$( date )" "$*" >&2; }    trap 'echo $( date ) Backup interrupted >&2; exit 2' INT TERM    info "Starting backup"    # Backup the most important directories into an archive named after    # the machine this script is currently running on:    borg create                         \        --verbose                       \        --filter AME                    \        --list                          \        --stats                         \        --show-rc                       \        --compression lz4               \        --exclude-caches                \        --exclude '/home/*/.cache/*'    \        --exclude '/var/cache/*'        \        --exclude '/var/tmp/*'          \                                        \        ::'{hostname}-{now}'            \        /etc                            \        /home                           \        /root                           \        /var                            \    backup_exit=$?    info "Pruning repository"    # Use the `prune` subcommand to maintain 7 daily, 4 weekly and 6 monthly    # archives of THIS machine. The '{hostname}-' prefix is very important to    # limit prune's operation to this machine's archives and not apply to    # other machines' archives also:    borg prune                          \        --list                          \        --prefix '{hostname}-'          \        --show-rc                       \        --keep-daily    7               \        --keep-weekly   4               \        --keep-monthly  6               \    prune_exit=$?    # actually free repo disk space by compacting segments    borg compact    compact_exit=$?    # use highest exit code as global exit code    global_exit=$(( backup_exit > prune_exit ? backup_exit : prune_exit ))    global_exit=$(( compact_exit > global_exit ? compact_exit : global_exit ))    if [ ${global_exit} -eq 1 ];    then        info "Backup, Prune and/or Compact finished with a warning"    fi    if [ ${global_exit} -gt 1 ];    then        info "Backup, Prune and/or Compact finished with an error"    fi    exit ${global_exit}Pitfalls with shell variables and environment variables-------------------------------------------------------This applies to all environment variables you want Borg to see, not just``BORG_PASSPHRASE``. The short explanation is: always ``export`` your variable,and use single quotes if you're unsure of the details of your shell's expansionbehavior. E.g.::    export BORG_PASSPHRASE='complicated & long'This is because ``export`` exposes variables to subprocesses, which Borg may beone of. More on ``export`` can be found in the "ENVIRONMENT" section of thebash(1) man page.Beware of how ``sudo`` interacts with environment variables. For example, youmay be surprised that the following ``export`` has no effect on your command::   export BORG_PASSPHRASE='complicated & long'   sudo ./yourborgwrapper.sh  # still prompts for passwordFor more information, refer to the sudo(8) man page and ``env_keep`` inthe sudoers(5) man page... Tip::    To debug what your borg process is actually seeing, find its PID    (``ps aux|grep borg``) and then look into ``/proc/<PID>/environ``... backup_compression:Backup compression------------------The default is lz4 (very fast, but low compression ratio), but other methods aresupported for different situations.You can use zstd for a wide range from high speed (and relatively lowcompression) using N=1 to high compression (and lower speed) using N=22.zstd is a modern compression algorithm and might be preferable over zlib andlzma, except if you need compatibility to older borg versions (< 1.1.4) thatdid not yet offer zstd.    $ borg create --compression zstd,N /path/to/repo::arch ~Other options are:If you have a fast repo storage and you want minimum CPU usage, no compression::    $ borg create --compression none /path/to/repo::arch ~If you have a less fast repo storage and you want a bit more compression (N=0..9,0 means no compression, 9 means high compression): ::    $ borg create --compression zlib,N /path/to/repo::arch ~If you have a very slow repo storage and you want high compression (N=0..9, 0 meanslow compression, 9 means high compression): ::    $ borg create --compression lzma,N /path/to/repo::arch ~You'll need to experiment a bit to find the best compression for your use case.Keep an eye on CPU load and throughput... _encrypted_repos:Repository encryption---------------------You can choose the repository encryption mode at repository creation time::    $ borg init --encryption=MODE PATHFor a list of available encryption MODEs and their descriptions, please referto :ref:`borg_init`.If you use encryption, all data is encrypted on the client before being writtento the repository.This means that an attacker who manages to compromise the host containing anencrypted repository will not be able to access any of the data, even while thebackup is being made.Key material is stored in encrypted form and can be only decrypted by providingthe correct passphrase.For automated backups the passphrase can be specified using the`BORG_PASSPHRASE` environment variable... note:: Be careful about how you set that environment, see          :ref:`this note about password environments <password_env>`          for more information... warning:: The repository data is totally inaccessible without the key    and the key passphrase.    Make a backup copy of the key file (``keyfile`` mode) or repo config    file (``repokey`` mode) and keep it at a safe place, so you still have    the key in case it gets corrupted or lost. Also keep your passphrase    at a safe place.    You can make backups using :ref:`borg_key_export` subcommand.    If you want to print a backup of your key to paper use the ``--paper``    option of this command and print the result, or print this `template`_    if you need a version with QR-Code.    A backup inside of the backup that is encrypted with that key/passphrase    won't help you with that, of course... _template: paperkey.html.. _remote_repos:Remote repositories-------------------Borg can initialize and access repositories on remote hosts if thehost is accessible using SSH.  This is fastest and easiest when Borgis installed on the remote host, in which case the following syntax is used::  $ borg init user@hostname:/path/to/repoNote: please see the usage chapter for a full documentation of repo URLs.Remote operations over SSH can be automated with SSH keys. You can restrict theuse of the SSH keypair by prepending a forced command to the SSH public key inthe remote server's `authorized_keys` file. This example will start Borgin server mode and limit it to a specific filesystem path::  command="borg serve --restrict-to-path /path/to/repo",restrict ssh-rsa AAAAB3[...]If it is not possible to install Borg on the remote host,it is still possible to use the remote host to store a repository bymounting the remote filesystem, for example, using sshfs::  $ sshfs user@hostname:/path/to /path/to  $ borg init /path/to/repo  $ fusermount -u /path/toYou can also use other remote filesystems in a similar way. Just be careful,not all filesystems out there are really stable and working good enough tobe acceptable for backup usage.
 |