| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850 | .\" Man page generated from reStructuredText...TH BORG 1 "2017-02-05" "" "borg backup tool".SH NAMEborg \- deduplicating and encrypting backup tool..nr rst2man-indent-level 0..de1 rstReportMargin\\$1 \\n[an-margin]level \\n[rst2man-indent-level]level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]-\\n[rst2man-indent0]\\n[rst2man-indent1]\\n[rst2man-indent2]...de1 INDENT.\" .rstReportMargin pre:. RS \\$1. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]. nr rst2man-indent-level +1.\" .rstReportMargin post:...de UNINDENT. RE.\" indent \\n[an-margin].\" old: \\n[rst2man-indent\\n[rst2man-indent-level]].nr rst2man-indent-level -1.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]].in \\n[rst2man-indent\\n[rst2man-indent-level]]u...SH SYNOPSIS.spborg [common options] <command> [options] [arguments].SH DESCRIPTION.\" we don't include the README.rst here since we want to keep this terse...spBorgBackup (short: Borg) is a deduplicating backup program.Optionally, it supports compression and authenticated encryption..spThe main goal of Borg is to provide an efficient and secure way to backup data.The data deduplication technique used makes Borg suitable for daily backupssince only changes are stored.The authenticated encryption technique makes it suitable for backups to notfully trusted targets..spBorg stores a set of files in an \fIarchive\fP\&. A \fIrepository\fP is a collectionof \fIarchives\fP\&. The format of repositories is Borg\-specific. Borg does notdistinguish archives from each other in any way other than their name,it does not matter when or where archives were created (e.g. different hosts)..SH EXAMPLES.SS A step\-by\-step example.INDENT 0.0.IP 1. 3Before a backup can be made a repository has to be initialized:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg init \-\-encryption=repokey /path/to/repo.ft P.fi.UNINDENT.UNINDENT.IP 2. 3Backup the \fB~/src\fP and \fB~/Documents\fP directories into an archive called\fIMonday\fP:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg create /path/to/repo::Monday ~/src ~/Documents.ft P.fi.UNINDENT.UNINDENT.IP 3. 3The next day create a new archive called \fITuesday\fP:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg create \-\-stats /path/to/repo::Tuesday ~/src ~/Documents.ft P.fi.UNINDENT.UNINDENT.spThis backup will be a lot quicker and a lot smaller since only new neverbefore seen data is stored. The \fB\-\-stats\fP option causes Borg tooutput statistics about the newly created archive such as the amount of uniquedata (not shared with other archives):.INDENT 3.0.INDENT 3.5.sp.nf.ft C\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-Archive name: TuesdayArchive fingerprint: bd31004d58f51ea06ff735d2e5ac49376901b21d58035f8fb05dbf866566e3c2Time (start): Tue, 2016\-02\-16 18:15:11Time (end):   Tue, 2016\-02\-16 18:15:11Duration: 0.19 secondsNumber of files: 127\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-                      Original size      Compressed size    Deduplicated sizeThis archive:                4.16 MB              4.17 MB             26.78 kBAll archives:                8.33 MB              8.34 MB              4.19 MB                      Unique chunks         Total chunksChunk index:                     132                  261\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-.ft P.fi.UNINDENT.UNINDENT.IP 4. 3List all archives in the repository:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg list /path/to/repoMonday                               Mon, 2016\-02\-15 19:14:44Tuesday                              Tue, 2016\-02\-16 19:15:11.ft P.fi.UNINDENT.UNINDENT.IP 5. 3List the contents of the \fIMonday\fP archive:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg list /path/to/repo::Mondaydrwxr\-xr\-x user   group          0 Mon, 2016\-02\-15 18:22:30 home/user/Documents\-rw\-r\-\-r\-\- user   group       7961 Mon, 2016\-02\-15 18:22:30 home/user/Documents/Important.doc\&....ft P.fi.UNINDENT.UNINDENT.IP 6. 3Restore the \fIMonday\fP archive by extracting the files relative to the current directory:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg extract /path/to/repo::Monday.ft P.fi.UNINDENT.UNINDENT.IP 7. 3Recover disk space by manually deleting the \fIMonday\fP archive:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg delete /path/to/repo::Monday.ft P.fi.UNINDENT.UNINDENT.UNINDENT.sp\fBNOTE:\fP.INDENT 0.0.INDENT 3.5Borg is quiet by default (it works on WARNING log level).You can use options like \fB\-\-progress\fP or \fB\-\-list\fP to get specificreports during command execution.  You can also add the \fB\-v\fP (or\fB\-\-verbose\fP or \fB\-\-info\fP) option to adjust the log level to INFO toget other informational messages..UNINDENT.UNINDENT.SH NOTES.SS Positional Arguments and Options: Order matters.spBorg only supports taking options (\fB\-s\fP and \fB\-\-progress\fP in the example)to the left or right of all positional arguments (\fBrepo::archive\fP and \fBpath\fPin the example), but not in between them:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cborg create \-s \-\-progress repo::archive path  # good and preferredborg create repo::archive path \-s \-\-progress  # also worksborg create \-s repo::archive path \-\-progress  # works, but uglyborg create repo::archive \-s \-\-progress path  # BAD.ft P.fi.UNINDENT.UNINDENT.spThis is due to a problem in the argparse module: \fI\%http://bugs.python.org/issue15112\fP.SS Repository URLs.sp\fBLocal filesystem\fP (or locally mounted network filesystem):.sp\fB/path/to/repo\fP \- filesystem path to repo directory, absolute path.sp\fBpath/to/repo\fP \- filesystem path to repo directory, relative path.spAlso, stuff like \fB~/path/to/repo\fP or \fB~other/path/to/repo\fP works (this isexpanded by your shell)..spNote: you may also prepend a \fBfile://\fP to a filesystem path to get URL style..sp\fBRemote repositories\fP accessed via ssh \fI\%user@host\fP:.sp\fBuser@host:/path/to/repo\fP \- remote repo, absolute path.sp\fBssh://user@host:port/path/to/repo\fP \- same, alternative syntax, port can be given.sp\fBRemote repositories with relative paths\fP can be given using this syntax:.sp\fBuser@host:path/to/repo\fP \- path relative to current directory.sp\fBuser@host:~/path/to/repo\fP \- path relative to user\(aqs home directory.sp\fBuser@host:~other/path/to/repo\fP \- path relative to other\(aqs home directory.spNote: giving \fBuser@host:/./path/to/repo\fP or \fBuser@host:/~/path/to/repo\fP or\fBuser@host:/~other/path/to/repo\fP is also supported, but not required here..sp\fBRemote repositories with relative paths, alternative syntax with port\fP:.sp\fBssh://user@host:port/./path/to/repo\fP \- path relative to current directory.sp\fBssh://user@host:port/~/path/to/repo\fP \- path relative to user\(aqs home directory.sp\fBssh://user@host:port/~other/path/to/repo\fP \- path relative to other\(aqs home directory.spIf you frequently need the same repo URL, it is a good idea to set the\fBBORG_REPO\fP environment variable to set a default for the repo URL:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cexport BORG_REPO=\(aqssh://user@host:port/path/to/repo\(aq.ft P.fi.UNINDENT.UNINDENT.spThen just leave away the repo URL if only a repo URL is needed and you wantto use the default \- it will be read from BORG_REPO then..spUse \fB::\fP syntax to give the repo URL when syntax requires giving a positionalargument for the repo (e.g. \fBborg mount :: /mnt\fP)..SS Repository / Archive Locations.spMany commands want either a repository (just give the repo URL, see above) oran archive location, which is a repo URL followed by \fB::archive_name\fP\&..spArchive names must not contain the \fB/\fP (slash) character. For simplicity,maybe also avoid blanks or other characters that have special meaning on theshell or in a filesystem (borg mount will use the archive name as directoryname)..spIf you have set BORG_REPO (see above) and an archive location is needed, use\fB::archive_name\fP \- the repo URL part is then read from BORG_REPO..SS Logging.spBorg writes all log output to stderr by default. But please note that somethingshowing up on stderr does \fInot\fP indicate an error condition just because it ison stderr. Please check the log levels of the messages and the return code ofborg for determining error, warning or success conditions..spIf you want to capture the log output to a file, just redirect it:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cborg create repo::archive myfiles 2>> logfile.ft P.fi.UNINDENT.UNINDENT.spCustom logging configurations can be implemented via BORG_LOGGING_CONF..spThe log level of the builtin logging configuration defaults to WARNING.This is because we want Borg to be mostly silent and only outputwarnings, errors and critical messages, unless output has been requestedby supplying an option that implies output (e.g. \fB\-\-list\fP or \fB\-\-progress\fP)..spLog levels: DEBUG < INFO < WARNING < ERROR < CRITICAL.spUse \fB\-\-debug\fP to set DEBUG log level \-to get debug, info, warning, error and critical level output..spUse \fB\-\-info\fP (or \fB\-v\fP or \fB\-\-verbose\fP) to set INFO log level \-to get info, warning, error and critical level output..spUse \fB\-\-warning\fP (default) to set WARNING log level \-to get warning, error and critical level output..spUse \fB\-\-error\fP to set ERROR log level \-to get error and critical level output..spUse \fB\-\-critical\fP to set CRITICAL log level \-to get critical level output..spWhile you can set misc. log levels, do not expect that every command willgive different output on different log levels \- it\(aqs just a possibility..sp\fBWARNING:\fP.INDENT 0.0.INDENT 3.5Options \fB\-\-critical\fP and \fB\-\-error\fP are provided for completeness,their usage is not recommended as you might miss important information..UNINDENT.UNINDENT.SS Return codes.spBorg can exit with the following return codes (rc):.TScenter;|l|l|._T{Return codeT}	T{MeaningT}_T{0T}	T{success (logged as INFO)T}_T{1T}	T{warning (operation reached its normal end, but there were warnings \-\-you should check the log, logged as WARNING)T}_T{2T}	T{error (like a fatal error, a local or remote exception, the operationdid not reach its normal end, logged as ERROR)T}_T{128+NT}	T{killed by signal N (e.g. 137 == kill \-9)T}_.TE.spIf you use \fB\-\-show\-rc\fP, the return code is also logged at the indicatedlevel as the last log entry..SS Environment Variables.spBorg uses some environment variables for automation:.INDENT 0.0.TP.B General:.INDENT 7.0.TP.B BORG_REPOWhen set, use the value to give the default repository location. If a command needs an archiveparameter, you can abbreviate as \fB::archive\fP\&. If a command needs a repository parameter, youcan either leave it away or abbreviate as \fB::\fP, if a positional parameter is required..TP.B BORG_PASSPHRASEWhen set, use the value to answer the passphrase question for encrypted repositories.It is used when a passphrase is needed to access an encrypted repo as well as when a newpassphrase should be initially set when initializing an encrypted repo.See also BORG_NEW_PASSPHRASE..TP.B BORG_PASSCOMMANDWhen set, use the standard output of the command (trailing newlines are stripped) to answer thepassphrase question for encrypted repositories.It is used when a passphrase is needed to access an encrypted repo as well as when a newpassphrase should be initially set when initializing an encrypted repo. Note that the commandis executed without a shell. So variables, like \fB$HOME\fP will work, but \fB~\fP won\(aqt.If BORG_PASSPHRASE is also set, it takes precedence.See also BORG_NEW_PASSPHRASE..TP.B BORG_PASSPHRASE_FDWhen set, specifies a file descriptor to read a passphrasefrom. Programs starting borg may choose to open an anonymous pipeand use it to pass a passphrase. This is safer than passing viaBORG_PASSPHRASE, because on some systems (e.g. Linux) environmentcan be examined by other processes.If BORG_PASSPHRASE or BORG_PASSCOMMAND are also set, they take precedence..TP.B BORG_NEW_PASSPHRASEWhen set, use the value to answer the passphrase question when a \fBnew\fP passphrase is asked for.This variable is checked first. If it is not set, BORG_PASSPHRASE and BORG_PASSCOMMAND will alsobe checked.Main usecase for this is to fully automate \fBborg change\-passphrase\fP\&..TP.B BORG_DISPLAY_PASSPHRASEWhen set, use the value to answer the "display the passphrase for verification" question when defining a new passphrase for encrypted repositories..TP.B BORG_HOSTNAME_IS_UNIQUE=noBorg assumes that it can derive a unique hostname / identity (see \fBborg debug info\fP).If this is not the case or you do not want Borg to automatically remove stale locks,set this to \fIno\fP\&..TP.B BORG_HOST_IDBorg usually computes a host id from the FQDN plus the results of \fBuuid.getnode()\fP (which usually returnsa unique id based on the MAC address of the network interface. Except if that MAC happens to be all\-zero \- inthat case it returns a random value, which is not what we want (because it kills automatic stale lock removal).So, if you have a all\-zero MAC address or other reasons to better externally control the host id, just set thisenvironment variable to a unique value. If all your FQDNs are unique, you can just use the FQDN. If not,use \fI\%fqdn@uniqueid\fP\&..TP.B BORG_LOGGING_CONFWhen set, use the given filename as \fI\%INI\fP\-style logging configuration..TP.B BORG_RSHWhen set, use this command instead of \fBssh\fP\&. This can be used to specify ssh options, such asa custom identity file \fBssh \-i /path/to/private/key\fP\&. See \fBman ssh\fP for other options. Usingthe \fB\-\-rsh CMD\fP commandline option overrides the environment variable..TP.B BORG_REMOTE_PATHWhen set, use the given path as borg executable on the remote (defaults to "borg" if unset).Using \fB\-\-remote\-path PATH\fP commandline option overrides the environment variable..TP.B BORG_FILES_CACHE_TTLWhen set to a numeric value, this determines the maximum "time to live" for the files cacheentries (default: 20). The files cache is used to quickly determine whether a file is unchanged.The FAQ explains this more detailed in: \fIalways_chunking\fP.TP.B BORG_SHOW_SYSINFOWhen set to no (default: yes), system information (like OS, Python version, ...) inexceptions is not shown.Please only use for good reasons as it makes issues harder to analyze..TP.B TMPDIRwhere temporary files are stored (might need a lot of temporary space for some operations), see \fI\%tempfile\fP for details.UNINDENT.TP.B Some automatic "answerers" (if set, they automatically answer confirmation questions):.INDENT 7.0.TP.B BORG_UNKNOWN_UNENCRYPTED_REPO_ACCESS_IS_OK=no (or =yes)For "Warning: Attempting to access a previously unknown unencrypted repository".TP.B BORG_RELOCATED_REPO_ACCESS_IS_OK=no (or =yes)For "Warning: The repository at location ... was previously located at ...".TP.B BORG_CHECK_I_KNOW_WHAT_I_AM_DOING=NO (or =YES)For "Warning: \(aqcheck \-\-repair\(aq is an experimental feature that might result in data loss.".TP.B BORG_DELETE_I_KNOW_WHAT_I_AM_DOING=NO (or =YES)For "You requested to completely DELETE the repository \fIincluding\fP all archives it contains:".TP.B BORG_RECREATE_I_KNOW_WHAT_I_AM_DOING=NO (or =YES)For "recreate is an experimental feature.".UNINDENT.spNote: answers are case sensitive. setting an invalid answer value might either give the defaultanswer or ask you interactively, depending on whether retries are allowed (they by default areallowed). So please test your scripts interactively before making them a non\-interactive script..TP.B Directories and files:.INDENT 7.0.TP.B BORG_BASE_DIRDefault to \(aq$HOME\(aq, \(aq~$USER\(aq, \(aq~\(aq (in that order)\(aq.If we refer to ~ below, we in fact mean BORG_BASE_DIR..TP.B BORG_CONFIG_DIRDefault to \(aq~/.config/borg\(aq. This directory contains the whole config directories..TP.B BORG_CACHE_DIRDefault to \(aq~/.cache/borg\(aq. This directory contains the local cache and might need a lotof space for dealing with big repositories..TP.B BORG_SECURITY_DIRDefault to \(aq~/.config/borg/security\(aq. This directory contains information borg uses totrack its usage of NONCES ("numbers used once" \- usually in encryption context) and othersecurity relevant data..TP.B BORG_KEYS_DIRDefault to \(aq~/.config/borg/keys\(aq. This directory contains keys for encrypted repositories..TP.B BORG_KEY_FILEWhen set, use the given filename as repository key file..UNINDENT.TP.B Building:.INDENT 7.0.TP.B BORG_OPENSSL_PREFIXAdds given OpenSSL header file directory to the default locations (setup.py)..TP.B BORG_LIBLZ4_PREFIXAdds given prefix directory to the default locations. If a \(aqinclude/lz4.h\(aq is found Borgwill be linked against the system liblz4 instead of a bundled implementation. (setup.py).TP.B BORG_LIBB2_PREFIXAdds given prefix directory to the default locations. If a \(aqinclude/blake2.h\(aq is found Borgwill be linked against the system libb2 instead of a bundled implementation. (setup.py).TP.B BORG_LIBZSTD_PREFIXAdds given prefix directory to the default locations. If a \(aqinclude/zstd.h\(aq is found Borgwill be linked against the system libzstd instead of a bundled implementation. (setup.py).UNINDENT.UNINDENT.spPlease note:.INDENT 0.0.IP \(bu 2be very careful when using the "yes" sayers, the warnings with prompt exist for your / your data\(aqs security/safety.IP \(bu 2also be very careful when putting your passphrase into a script, make sure it has appropriate file permissions(e.g. mode 600, root:root)..UNINDENT.SS File systems.spWe strongly recommend against using Borg (or any other database\-likesoftware) on non\-journaling file systems like FAT, since it is notpossible to assume any consistency in case of power failures (or asudden disconnect of an external drive or similar failures)..spWhile Borg uses a data store that is resilient against these failureswhen used on journaling file systems, it is not possible to guaranteethis with some hardware \-\- independent of the software used. We don\(aqtknow a list of affected hardware..spIf you are suspicious whether your Borg repository is still consistentand readable after one of the failures mentioned above occurred, run\fBborg check \-\-verify\-data\fP to make sure it is consistent.Requirements for Borg repository file systems.INDENT 0.0.IP \(bu 2Long file names.IP \(bu 2At least three directory levels with short names.IP \(bu 2Typically, file sizes up to a few hundred MB.Large repositories may require large files (>2 GB)..IP \(bu 2Up to 1000 files per directory (10000 for repositories initialized with Borg 1.0).IP \(bu 2mkdir(2) should be atomic, since it is used for locking.IP \(bu 2Hardlinks are needed for \fIborg_upgrade\fP \fB\-\-inplace\fP.UNINDENT.SS Units.spTo display quantities, Borg takes care of respecting theusual conventions of scale. Disk sizes are displayed in \fI\%decimal\fP, using powers of ten (so\fBkB\fP means 1000 bytes). For memory usage, \fI\%binary prefixes\fP are used, and areindicated using the \fI\%IEC binary prefixes\fP,using powers of two (so \fBKiB\fP means 1024 bytes)..SS Date and Time.spWe format date and time conforming to ISO\-8601, that is: YYYY\-MM\-DD andHH:MM:SS (24h clock)..spFor more information about that, see: \fI\%https://xkcd.com/1179/\fP.spUnless otherwise noted, we display local date and time.Internally, we store and process date and time as UTC..SS Resource Usage.spBorg might use a lot of resources depending on the size of the data set it is dealing with..spIf one uses Borg in a client/server way (with a ssh: repository),the resource usage occurs in part on the client and in another part on theserver..spIf one uses Borg as a single process (with a filesystem repo),all the resource usage occurs in that one process, so just add up client +server to get the approximate resource usage..INDENT 0.0.TP.B CPU client:.INDENT 7.0.IP \(bu 2\fBborg create:\fP does chunking, hashing, compression, crypto (high CPU usage).IP \(bu 2\fBchunks cache sync:\fP quite heavy on CPU, doing lots of hashtable operations..IP \(bu 2\fBborg extract:\fP crypto, decompression (medium to high CPU usage).IP \(bu 2\fBborg check:\fP similar to extract, but depends on options given..IP \(bu 2\fBborg prune / borg delete archive:\fP low to medium CPU usage.IP \(bu 2\fBborg delete repo:\fP done on the server.UNINDENT.spIt won\(aqt go beyond 100% of 1 core as the code is currently single\-threaded.Especially higher zlib and lzma compression levels use significant amountsof CPU cycles. Crypto might be cheap on the CPU (if hardware accelerated) orexpensive (if not)..TP.B CPU server:It usually doesn\(aqt need much CPU, it just deals with the key/value store(repository) and uses the repository index for that..spborg check: the repository check computes the checksums of all chunks(medium CPU usage)borg delete repo: low CPU usage.TP.B CPU (only for client/server operation):When using borg in a client/server way with a \fI\%ssh:\-type\fP repo, the sshprocesses used for the transport layer will need some CPU on the client andon the server due to the crypto they are doing \- esp. if you are pumpingbig amounts of data..TP.B Memory (RAM) client:The chunks index and the files index are read into memory for performancereasons. Might need big amounts of memory (see below).Compression, esp. lzma compression with high levels might need substantialamounts of memory..TP.B Memory (RAM) server:The server process will load the repository index into memory. Might needconsiderable amounts of memory, but less than on the client (see below)..TP.B Chunks index (client only):Proportional to the amount of data chunks in your repo. Lots of chunksin your repo imply a big chunks index.It is possible to tweak the chunker params (see create options)..TP.B Files index (client only):Proportional to the amount of files in your last backups. Can be switchedoff (see create options), but next backup might be much slower if you do.The speed benefit of using the files cache is proportional to file size..TP.B Repository index (server only):Proportional to the amount of data chunks in your repo. Lots of chunksin your repo imply a big repository index.It is possible to tweak the chunker params (see create options) toinfluence the amount of chunks being created..TP.B Temporary files (client):Reading data and metadata from a FUSE mounted repository will consume up tothe size of all deduplicated, small chunks in the repository. Big chunkswon\(aqt be locally cached..TP.B Temporary files (server):None..TP.B Cache files (client only):Contains the chunks index and files index (plus a collection of single\-archive chunk indexes which might need huge amounts of disk space,depending on archive count and size \- see FAQ about how to reduce)..TP.B Network (only for client/server operation):If your repository is remote, all deduplicated (and optionally compressed/encrypted) data of course has to go over the connection (\fBssh://\fP repo url).If you use a locally mounted network filesystem, additionally some copyoperations used for transaction support also go over the connection. Ifyou backup multiple sources to one target repository, additional traffichappens for cache resynchronization..UNINDENT.SS Support for file metadata.spBesides regular file and directory structures, Borg can preserve.INDENT 0.0.IP \(bu 2symlinks (stored as symlink, the symlink is not followed).IP \(bu 2special files:.INDENT 2.0.IP \(bu 2character and block device files (restored via mknod).IP \(bu 2FIFOs ("named pipes").IP \(bu 2special file \fIcontents\fP can be backed up in \fB\-\-read\-special\fP mode.By default the metadata to create them with mknod(2), mkfifo(2) etc. is stored..UNINDENT.IP \(bu 2hardlinked regular files, devices, FIFOs (considering all items in the same archive).IP \(bu 2timestamps in nanosecond precision: mtime, atime, ctime.IP \(bu 2other timestamps: birthtime (on platforms supporting it).IP \(bu 2permissions:.INDENT 2.0.IP \(bu 2IDs of owning user and owning group.IP \(bu 2names of owning user and owning group (if the IDs can be resolved).IP \(bu 2Unix Mode/Permissions (u/g/o permissions, suid, sgid, sticky).UNINDENT.UNINDENT.spOn some platforms additional features are supported:.\" Yes/No's are grouped by reason/mechanism/reference...TScenter;|l|l|l|l|._T{PlatformT}	T{ACLs[5]T}	T{xattr[6]T}	T{Flags[7]T}_T{LinuxT}	T{YesT}	T{YesT}	T{Yes [1]T}_T{Mac OS XT}	T{YesT}	T{YesT}	T{Yes (all)T}_T{FreeBSDT}	T{YesT}	T{YesT}	T{Yes (all)T}_T{OpenBSDT}	T{n/aT}	T{n/aT}	T{Yes (all)T}_T{NetBSDT}	T{n/aT}	T{No [2]T}	T{Yes (all)T}_T{Solaris and derivativesT}	T{No [3]T}	T{No [3]T}	T{n/aT}_T{Windows (cygwin)T}	T{No [4]T}	T{NoT}	T{NoT}_.TE.spOther Unix\-like operating systems may work as well, but have not been tested at all..spNote that most of the platform\-dependent features also depend on the file system.For example, ntfs\-3g on Linux isn\(aqt able to convey NTFS ACLs..IP [1] 5Only "nodump", "immutable", "compressed" and "append" are supported.Feature request #618 for more flags..IP [2] 5Feature request #1332.IP [3] 5Feature request #1337.IP [4] 5Cygwin tries to map NTFS ACLs to permissions with varying degress of success..IP [5] 5The native access control list mechanism of the OS. This normally limits access tonon\-native ACLs. For example, NTFS ACLs aren\(aqt completely accessible on Linux with ntfs\-3g..IP [6] 5extended attributes; key\-value pairs attached to a file, mainly used by the OS.This includes resource forks on Mac OS X..IP [7] 5aka \fIBSD flags\fP\&. The Linux set of flags [1] is portable across platforms.The BSDs define additional flags..SH SEE ALSO.sp\fIborg\-common(1)\fP for common command line options.sp\fIborg\-init(1)\fP,\fIborg\-create(1)\fP, \fIborg\-mount(1)\fP, \fIborg\-extract(1)\fP,\fIborg\-list(1)\fP, \fIborg\-info(1)\fP,\fIborg\-delete(1)\fP, \fIborg\-prune(1)\fP,\fIborg\-recreate(1)\fP.sp\fIborg\-compression(1)\fP, \fIborg\-patterns(1)\fP, \fIborg\-placeholders(1)\fP.INDENT 0.0.IP \(bu 2Main web site \fI\%https://www.borgbackup.org/\fP.IP \(bu 2Releases \fI\%https://github.com/borgbackup/borg/releases\fP.IP \(bu 2Changelog \fI\%https://github.com/borgbackup/borg/blob/master/docs/changes.rst\fP.IP \(bu 2GitHub \fI\%https://github.com/borgbackup/borg\fP.IP \(bu 2Security contact \fI\%https://borgbackup.readthedocs.io/en/latest/support.html#security\-contact\fP.UNINDENT.SH AUTHORThe Borg Collective.\" Generated by docutils manpage writer..
 |