| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916 | .\" Man page generated from reStructuredText....nr rst2man-indent-level 0..de1 rstReportMargin\\$1 \\n[an-margin]level \\n[rst2man-indent-level]level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]-\\n[rst2man-indent0]\\n[rst2man-indent1]\\n[rst2man-indent2]...de1 INDENT.\" .rstReportMargin pre:. RS \\$1. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]. nr rst2man-indent-level +1.\" .rstReportMargin post:...de UNINDENT. RE.\" indent \\n[an-margin].\" old: \\n[rst2man-indent\\n[rst2man-indent-level]].nr rst2man-indent-level -1.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]].in \\n[rst2man-indent\\n[rst2man-indent-level]]u...TH "BORG" 1 "2023-02-26" "" "borg backup tool".SH NAMEborg \- deduplicating and encrypting backup tool.SH SYNOPSIS.spborg [common options] <command> [options] [arguments].SH DESCRIPTION.\" we don't include the README.rst here since we want to keep this terse...spBorgBackup (short: Borg) is a deduplicating backup program.Optionally, it supports compression and authenticated encryption..spThe main goal of Borg is to provide an efficient and secure way to back data up.The data deduplication technique used makes Borg suitable for daily backupssince only changes are stored.The authenticated encryption technique makes it suitable for backups to targets notfully trusted..spBorg stores a set of files in an \fIarchive\fP\&. A \fIrepository\fP is a collectionof \fIarchives\fP\&. The format of repositories is Borg\-specific. Borg does notdistinguish archives from each other in any way other than their name,it does not matter when or where archives were created (e.g. different hosts)..SH EXAMPLES.SS A step\-by\-step example.INDENT 0.0.IP 1. 3Before a backup can be made, a repository has to be initialized:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo rcreate \-\-encryption=repokey\-aes\-ocb.ft P.fi.UNINDENT.UNINDENT.IP 2. 3Back up the \fB~/src\fP and \fB~/Documents\fP directories into an archive called\fIMonday\fP:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo create Monday ~/src ~/Documents.ft P.fi.UNINDENT.UNINDENT.IP 3. 3The next day create a new archive called \fITuesday\fP:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo create \-\-stats Tuesday ~/src ~/Documents.ft P.fi.UNINDENT.UNINDENT.spThis backup will be a lot quicker and a lot smaller since only new, neverbefore seen data is stored. The \fB\-\-stats\fP option causes Borg tooutput statistics about the newly created archive such as the deduplicatedsize (the amount of unique data not shared with other archives):.INDENT 3.0.INDENT 3.5.sp.nf.ft CRepository: /path/to/repoArchive name: TuesdayArchive fingerprint: bcd1b53f9b4991b7afc2b339f851b7ffe3c6d030688936fe4552eccc1877718dTime (start): Sat, 2022\-06\-25 20:21:43Time (end):   Sat, 2022\-06\-25 20:21:43Duration: 0.07 secondsUtilization of max. archive size: 0%Number of files: 699Original size: 31.14 MBDeduplicated size: 502 B.ft P.fi.UNINDENT.UNINDENT.IP 4. 3List all archives in the repository:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo rlistMonday                               Sat, 2022\-06\-25 20:21:14 [b80e24d2...b179f298]Tuesday                              Sat, 2022\-06\-25 20:21:43 [bcd1b53f...1877718d].ft P.fi.UNINDENT.UNINDENT.IP 5. 3List the contents of the \fIMonday\fP archive:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo list Mondaydrwxr\-xr\-x user   group          0 Mon, 2016\-02\-15 18:22:30 home/user/Documents\-rw\-r\-\-r\-\- user   group       7961 Mon, 2016\-02\-15 18:22:30 home/user/Documents/Important.doc\&....ft P.fi.UNINDENT.UNINDENT.IP 6. 3Restore the \fIMonday\fP archive by extracting the files relative to the current directory:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo extract Monday.ft P.fi.UNINDENT.UNINDENT.IP 7. 3Delete the \fIMonday\fP archive (please note that this does \fBnot\fP free repo disk space):.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo delete \-a Monday.ft P.fi.UNINDENT.UNINDENT.spPlease note the \fB\-a\fP option here (short for \fB\-\-glob\-archives\fP) which enables youto give a globbing pattern to delete multiple archives, like \fB\-a \(aqoldcrap\-*\(aq\fP\&.You can also combine this with \fB\-\-first\fP, \fB\-\-last\fP and \fB\-\-sort\-by\fP\&.Be careful, always first use with \fB\-\-dry\-run\fP and \fB\-\-list\fP!.IP 8. 3Recover disk space by compacting the segment files in the repo:.INDENT 3.0.INDENT 3.5.sp.nf.ft C$ borg \-r /path/to/repo compact.ft P.fi.UNINDENT.UNINDENT.UNINDENT.sp\fBNOTE:\fP.INDENT 0.0.INDENT 3.5Borg is quiet by default (it defaults to WARNING log level).You can use options like \fB\-\-progress\fP or \fB\-\-list\fP to get specificreports during command execution.  You can also add the \fB\-v\fP (or\fB\-\-verbose\fP or \fB\-\-info\fP) option to adjust the log level to INFO toget other informational messages..UNINDENT.UNINDENT.SH NOTES.SS Positional Arguments and Options: Order matters.spBorg only supports taking options (\fB\-s\fP and \fB\-\-progress\fP in the example)to the left or right of all positional arguments (\fBrepo::archive\fP and \fBpath\fPin the example), but not in between them:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cborg create \-s \-\-progress archive path  # good and preferredborg create archive path \-s \-\-progress  # also worksborg create \-s archive path \-\-progress  # works, but uglyborg create archive \-s \-\-progress path  # BAD.ft P.fi.UNINDENT.UNINDENT.spThis is due to a problem in the argparse module: \fI\%https://bugs.python.org/issue15112\fP.SS Repository URLs.sp\fBLocal filesystem\fP (or locally mounted network filesystem):.sp\fB/path/to/repo\fP \- filesystem path to repo directory, absolute path.sp\fBpath/to/repo\fP \- filesystem path to repo directory, relative path.spAlso, stuff like \fB~/path/to/repo\fP or \fB~other/path/to/repo\fP works (this isexpanded by your shell)..spNote: you may also prepend a \fBfile://\fP to a filesystem path to get URL style..sp\fBRemote repositories\fP accessed via ssh \fI\%user@host\fP:.sp\fBssh://user@host:port/path/to/repo\fP \- absolute path\(ga.sp\fBssh://user@host:port/./path/to/repo\fP \- path relative to current directory.sp\fBssh://user@host:port/~/path/to/repo\fP \- path relative to user\(aqs home directory.spIf you frequently need the same repo URL, it is a good idea to set the\fBBORG_REPO\fP environment variable to set a default for the repo URL:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cexport BORG_REPO=\(aqssh://user@host:port/path/to/repo\(aq.ft P.fi.UNINDENT.UNINDENT.spThen just leave away the \fB\-\-repo\fP option if you wantto use the default \- it will be read from BORG_REPO then..SS Repository Locations / Archive names.spMany commands need to know the repository location, give it via \fB\-r\fP / \fB\-\-repo\fPor use the \fBBORG_REPO\fP environment variable..spCommands needing one or two archive names usually get them as positional argument..spCommands working with an arbitrary amount of archives, usually take \fB\-a ARCH_GLOB\fP\&..spArchive names must not contain the \fB/\fP (slash) character. For simplicity,maybe also avoid blanks or other characters that have special meaning on theshell or in a filesystem (borg mount will use the archive name as directoryname)..SS Logging.spBorg writes all log output to stderr by default. But please note that somethingshowing up on stderr does \fInot\fP indicate an error condition just because it ison stderr. Please check the log levels of the messages and the return code ofborg for determining error, warning or success conditions..spIf you want to capture the log output to a file, just redirect it:.INDENT 0.0.INDENT 3.5.sp.nf.ft Cborg create repo::archive myfiles 2>> logfile.ft P.fi.UNINDENT.UNINDENT.spCustom logging configurations can be implemented via BORG_LOGGING_CONF..spThe log level of the builtin logging configuration defaults to WARNING.This is because we want Borg to be mostly silent and only outputwarnings, errors and critical messages, unless output has been requestedby supplying an option that implies output (e.g. \fB\-\-list\fP or \fB\-\-progress\fP)..spLog levels: DEBUG < INFO < WARNING < ERROR < CRITICAL.spUse \fB\-\-debug\fP to set DEBUG log level \-to get debug, info, warning, error and critical level output..spUse \fB\-\-info\fP (or \fB\-v\fP or \fB\-\-verbose\fP) to set INFO log level \-to get info, warning, error and critical level output..spUse \fB\-\-warning\fP (default) to set WARNING log level \-to get warning, error and critical level output..spUse \fB\-\-error\fP to set ERROR log level \-to get error and critical level output..spUse \fB\-\-critical\fP to set CRITICAL log level \-to get critical level output..spWhile you can set misc. log levels, do not expect that every command willgive different output on different log levels \- it\(aqs just a possibility..sp\fBWARNING:\fP.INDENT 0.0.INDENT 3.5Options \fB\-\-critical\fP and \fB\-\-error\fP are provided for completeness,their usage is not recommended as you might miss important information..UNINDENT.UNINDENT.SS Return codes.spBorg can exit with the following return codes (rc):.TScenter;|l|l|._T{Return codeT}	T{MeaningT}_T{0T}	T{success (logged as INFO)T}_T{1T}	T{warning (operation reached its normal end, but there were warnings \-\-you should check the log, logged as WARNING)T}_T{2T}	T{error (like a fatal error, a local or remote exception, the operationdid not reach its normal end, logged as ERROR)T}_T{128+NT}	T{killed by signal N (e.g. 137 == kill \-9)T}_.TE.spIf you use \fB\-\-show\-rc\fP, the return code is also logged at the indicatedlevel as the last log entry..SS Environment Variables.spBorg uses some environment variables for automation:.INDENT 0.0.TP.B General:.INDENT 7.0.TP.B BORG_REPOWhen set, use the value to give the default repository location.Use this so you do not need to type \fB\-\-repo /path/to/my/repo\fP all the time..TP.B BORG_OTHER_REPOSimilar to BORG_REPO, but gives the default for \fB\-\-other\-repo\fP\&..TP.B BORG_PASSPHRASEWhen set, use the value to answer the passphrase question for encrypted repositories.It is used when a passphrase is needed to access an encrypted repo as well as when a newpassphrase should be initially set when initializing an encrypted repo.See also BORG_NEW_PASSPHRASE..TP.B BORG_PASSCOMMANDWhen set, use the standard output of the command (trailing newlines are stripped) to answer thepassphrase question for encrypted repositories.It is used when a passphrase is needed to access an encrypted repo as well as when a newpassphrase should be initially set when initializing an encrypted repo. Note that the commandis executed without a shell. So variables, like \fB$HOME\fP will work, but \fB~\fP won\(aqt.If BORG_PASSPHRASE is also set, it takes precedence.See also BORG_NEW_PASSPHRASE..TP.B BORG_PASSPHRASE_FDWhen set, specifies a file descriptor to read a passphrasefrom. Programs starting borg may choose to open an anonymous pipeand use it to pass a passphrase. This is safer than passing viaBORG_PASSPHRASE, because on some systems (e.g. Linux) environmentcan be examined by other processes.If BORG_PASSPHRASE or BORG_PASSCOMMAND are also set, they take precedence..TP.B BORG_NEW_PASSPHRASEWhen set, use the value to answer the passphrase question when a \fBnew\fP passphrase is asked for.This variable is checked first. If it is not set, BORG_PASSPHRASE and BORG_PASSCOMMAND will alsobe checked.Main usecase for this is to automate fully \fBborg change\-passphrase\fP\&..TP.B BORG_DISPLAY_PASSPHRASEWhen set, use the value to answer the \(dqdisplay the passphrase for verification\(dq question when defining a new passphrase for encrypted repositories..TP.B BORG_HOST_IDBorg usually computes a host id from the FQDN plus the results of \fBuuid.getnode()\fP (which usually returnsa unique id based on the MAC address of the network interface. Except if that MAC happens to be all\-zero \- inthat case it returns a random value, which is not what we want (because it kills automatic stale lock removal).So, if you have a all\-zero MAC address or other reasons to control better externally the host id, just set thisenvironment variable to a unique value. If all your FQDNs are unique, you can just use the FQDN. If not,use \fI\%fqdn@uniqueid\fP\&..TP.B BORG_LOCK_WAITYou can set the default value for the \fB\-\-lock\-wait\fP option with this, soyou do not need to give it as a commandline option..TP.B BORG_LOGGING_CONFWhen set, use the given filename as \fI\%INI\fP\-style logging configuration.A basic example conf can be found at \fBdocs/misc/logging.conf\fP\&..TP.B BORG_RSHWhen set, use this command instead of \fBssh\fP\&. This can be used to specify ssh options, such asa custom identity file \fBssh \-i /path/to/private/key\fP\&. See \fBman ssh\fP for other options. Usingthe \fB\-\-rsh CMD\fP commandline option overrides the environment variable..TP.B BORG_REMOTE_PATHWhen set, use the given path as borg executable on the remote (defaults to \(dqborg\(dq if unset).Using \fB\-\-remote\-path PATH\fP commandline option overrides the environment variable..TP.B BORG_FILES_CACHE_SUFFIXWhen set to a value at least one character long, instructs borg to use a specifically named(based on the suffix) alternative files cache. This can be used to avoid loading and savingcache entries for backup sources other than the current sources..TP.B BORG_FILES_CACHE_TTLWhen set to a numeric value, this determines the maximum \(dqtime to live\(dq for the files cacheentries (default: 20). The files cache is used to determine quickly whether a file is unchanged.The FAQ explains this more detailed in: \fIalways_chunking\fP.TP.B BORG_SHOW_SYSINFOWhen set to no (default: yes), system information (like OS, Python version, ...) inexceptions is not shown.Please only use for good reasons as it makes issues harder to analyze..TP.B BORG_FUSE_IMPLChoose the lowlevel FUSE implementation borg shall use for \fBborg mount\fP\&.This is a comma\-separated list of implementation names, they are tried in thegiven order, e.g.:.INDENT 7.0.IP \(bu 2\fBpyfuse3,llfuse\fP: default, first try to load pyfuse3, then try to load llfuse..IP \(bu 2\fBllfuse,pyfuse3\fP: first try to load llfuse, then try to load pyfuse3..IP \(bu 2\fBpyfuse3\fP: only try to load pyfuse3.IP \(bu 2\fBllfuse\fP: only try to load llfuse.IP \(bu 2\fBnone\fP: do not try to load an implementation.UNINDENT.TP.B BORG_SELFTESTThis can be used to influence borg\(aqs builtin self\-tests. The default is to execute the testsat the beginning of each borg command invocation..spBORG_SELFTEST=disabled can be used to switch off the tests and rather save some time.Disabling is not recommended for normal borg users, but large scale borg storage providers canuse this to optimize production servers after at least doing a one\-time test borg (withselftests not disabled) when installing or upgrading machines / OS / borg..TP.B BORG_WORKAROUNDSA list of comma separated strings that trigger workarounds in borg,e.g. to work around bugs in other software..spCurrently known strings are:.INDENT 7.0.TP.B basesyncfileUse the more simple BaseSyncFile code to avoid issues with sync_file_range.You might need this to run borg on WSL (Windows Subsystem for Linux) orin systemd.nspawn containers on some architectures (e.g. ARM).Using this does not affect data safety, but might result in a more burstywrite to disk behaviour (not continuously streaming to disk)..TP.B retry_erofsRetry opening a file without O_NOATIME if opening a file with O_NOATIMEcaused EROFS. You will need this to make archives from volume shadow copiesin WSL1 (Windows Subsystem for Linux 1)..UNINDENT.UNINDENT.TP.B Some automatic \(dqanswerers\(dq (if set, they automatically answer confirmation questions):.INDENT 7.0.TP.B BORG_UNKNOWN_UNENCRYPTED_REPO_ACCESS_IS_OK=no (or =yes)For \(dqWarning: Attempting to access a previously unknown unencrypted repository\(dq.TP.B BORG_RELOCATED_REPO_ACCESS_IS_OK=no (or =yes)For \(dqWarning: The repository at location ... was previously located at ...\(dq.TP.B BORG_CHECK_I_KNOW_WHAT_I_AM_DOING=NO (or =YES)For \(dqThis is a potentially dangerous function...\(dq (check \-\-repair).TP.B BORG_DELETE_I_KNOW_WHAT_I_AM_DOING=NO (or =YES)For \(dqYou requested to DELETE the repository completely \fIincluding\fP all archives it contains:\(dq.UNINDENT.spNote: answers are case sensitive. setting an invalid answer value might either give the defaultanswer or ask you interactively, depending on whether retries are allowed (they by default areallowed). So please test your scripts interactively before making them a non\-interactive script..UNINDENT.INDENT 0.0.TP.B Directories and files:.INDENT 7.0.TP.B BORG_BASE_DIRDefaults to \fB$HOME\fP or \fB~$USER\fP or \fB~\fP (in that order).If you want to move all borg\-specific folders to a custom path at once, all you need to do isto modify \fBBORG_BASE_DIR\fP: the other paths for cache, config etc. will adapt accordingly(assuming you didn\(aqt set them to a different custom value)..TP.B BORG_CACHE_DIRDefaults to \fB$BORG_BASE_DIR/.cache/borg\fP\&. If \fBBORG_BASE_DIR\fP is not explicitly set while\fI\%XDG env var\fP \fBXDG_CACHE_HOME\fP is set, then \fB$XDG_CACHE_HOME/borg\fP is being used instead.This directory contains the local cache and might need a lotof space for dealing with big repositories. Make sure you\(aqre aware of the associatedsecurity aspects of the cache location: \fIcache_security\fP.TP.B BORG_CONFIG_DIRDefaults to \fB$BORG_BASE_DIR/.config/borg\fP\&. If \fBBORG_BASE_DIR\fP is not explicitly set while\fI\%XDG env var\fP \fBXDG_CONFIG_HOME\fP is set, then \fB$XDG_CONFIG_HOME/borg\fP is being used instead.This directory contains all borg configuration directories, see the FAQfor a security advisory about the data in this directory: \fIhome_config_borg\fP.TP.B BORG_SECURITY_DIRDefaults to \fB$BORG_CONFIG_DIR/security\fP\&.This directory contains information borg uses to track its usage of NONCES (\(dqnumbers usedonce\(dq \- usually in encryption context) and other security relevant data..TP.B BORG_KEYS_DIRDefaults to \fB$BORG_CONFIG_DIR/keys\fP\&.This directory contains keys for encrypted repositories..TP.B BORG_KEY_FILEWhen set, use the given filename as repository key file..TP.B TMPDIRThis is where temporary files are stored (might need a lot of temporary space for someoperations), see \fI\%tempfile\fP for details..UNINDENT.TP.B Building:.INDENT 7.0.TP.B BORG_OPENSSL_PREFIXAdds given OpenSSL header file directory to the default locations (setup.py)..TP.B BORG_LIBLZ4_PREFIXAdds given prefix directory to the default locations. If a \(aqinclude/lz4.h\(aq is found Borgwill be linked against the system liblz4 instead of a bundled implementation. (setup.py).TP.B BORG_LIBZSTD_PREFIXAdds given prefix directory to the default locations. If a \(aqinclude/zstd.h\(aq is found Borgwill be linked against the system libzstd instead of a bundled implementation. (setup.py).UNINDENT.UNINDENT.spPlease note:.INDENT 0.0.IP \(bu 2Be very careful when using the \(dqyes\(dq sayers, the warnings with prompt exist for your / your data\(aqs security/safety..IP \(bu 2Also be very careful when putting your passphrase into a script, make sure it has appropriate file permissions (e.g.mode 600, root:root)..UNINDENT.SS File systems.spWe strongly recommend against using Borg (or any other database\-likesoftware) on non\-journaling file systems like FAT, since it is notpossible to assume any consistency in case of power failures (or asudden disconnect of an external drive or similar failures)..spWhile Borg uses a data store that is resilient against these failureswhen used on journaling file systems, it is not possible to guaranteethis with some hardware \-\- independent of the software used. We don\(aqtknow a list of affected hardware..spIf you are suspicious whether your Borg repository is still consistentand readable after one of the failures mentioned above occurred, run\fBborg check \-\-verify\-data\fP to make sure it is consistent.Requirements for Borg repository file systems.INDENT 0.0.IP \(bu 2Long file names.IP \(bu 2At least three directory levels with short names.IP \(bu 2Typically, file sizes up to a few hundred MB.Large repositories may require large files (>2 GB)..IP \(bu 2Up to 1000 files per directory (10000 for repositories initialized with Borg 1.0).IP \(bu 2rename(2) / MoveFile(Ex) should work as specified, i.e. on the same file systemit should be a move (not a copy) operation, and in case of a directoryit should fail if the destination exists and is not an empty directory,since this is used for locking..IP \(bu 2Also hardlinks are used for more safe and secure file updating (e.g. of the repoconfig file), but the code tries to work also if hardlinks are not supported..UNINDENT.SS Units.spTo display quantities, Borg takes care of respecting theusual conventions of scale. Disk sizes are displayed in \fI\%decimal\fP, using powers of ten (so\fBkB\fP means 1000 bytes). For memory usage, \fI\%binary prefixes\fP are used, and areindicated using the \fI\%IEC binary prefixes\fP,using powers of two (so \fBKiB\fP means 1024 bytes)..SS Date and Time.spWe format date and time conforming to ISO\-8601, that is: YYYY\-MM\-DD andHH:MM:SS (24h clock)..spFor more information about that, see: \fI\%https://xkcd.com/1179/\fP.spUnless otherwise noted, we display local date and time.Internally, we store and process date and time as UTC..SS Resource Usage.spBorg might use a lot of resources depending on the size of the data set it is dealing with..spIf one uses Borg in a client/server way (with a ssh: repository),the resource usage occurs in part on the client and in another part on theserver..spIf one uses Borg as a single process (with a filesystem repo),all the resource usage occurs in that one process, so just add up client +server to get the approximate resource usage..INDENT 0.0.TP.B CPU client:.INDENT 7.0.IP \(bu 2\fBborg create:\fP does chunking, hashing, compression, crypto (high CPU usage).IP \(bu 2\fBchunks cache sync:\fP quite heavy on CPU, doing lots of hashtable operations..IP \(bu 2\fBborg extract:\fP crypto, decompression (medium to high CPU usage).IP \(bu 2\fBborg check:\fP similar to extract, but depends on options given..IP \(bu 2\fBborg prune / borg delete archive:\fP low to medium CPU usage.IP \(bu 2\fBborg delete repo:\fP done on the server.UNINDENT.spIt won\(aqt go beyond 100% of 1 core as the code is currently single\-threaded.Especially higher zlib and lzma compression levels use significant amountsof CPU cycles. Crypto might be cheap on the CPU (if hardware accelerated) orexpensive (if not)..TP.B CPU server:It usually doesn\(aqt need much CPU, it just deals with the key/value store(repository) and uses the repository index for that..spborg check: the repository check computes the checksums of all chunks(medium CPU usage)borg delete repo: low CPU usage.TP.B CPU (only for client/server operation):When using borg in a client/server way with a \fI\%ssh:\-type\fP repo, the sshprocesses used for the transport layer will need some CPU on the client andon the server due to the crypto they are doing \- esp. if you are pumpingbig amounts of data..TP.B Memory (RAM) client:The chunks index and the files index are read into memory for performancereasons. Might need big amounts of memory (see below).Compression, esp. lzma compression with high levels might need substantialamounts of memory..TP.B Memory (RAM) server:The server process will load the repository index into memory. Might needconsiderable amounts of memory, but less than on the client (see below)..TP.B Chunks index (client only):Proportional to the amount of data chunks in your repo. Lots of chunksin your repo imply a big chunks index.It is possible to tweak the chunker params (see create options)..TP.B Files index (client only):Proportional to the amount of files in your last backups. Can be switchedoff (see create options), but next backup might be much slower if you do.The speed benefit of using the files cache is proportional to file size..TP.B Repository index (server only):Proportional to the amount of data chunks in your repo. Lots of chunksin your repo imply a big repository index.It is possible to tweak the chunker params (see create options) toinfluence the amount of chunks being created..TP.B Temporary files (client):Reading data and metadata from a FUSE mounted repository will consume up tothe size of all deduplicated, small chunks in the repository. Big chunkswon\(aqt be locally cached..TP.B Temporary files (server):A non\-trivial amount of data will be stored on the remote temp directoryfor each client that connects to it. For some remotes, this can fill thedefault temporary directory at /tmp. This can be remediated by ensuring the$TMPDIR, $TEMP, or $TMP environment variable is properly set for the sshdprocess.For some OSes, this can be done just by setting the correct value in the\&.bashrc (or equivalent login config file for other shells), however inother cases it may be necessary to first enable \fBPermitUserEnvironment yes\fPin your \fBsshd_config\fP file, then add \fBenvironment=\(dqTMPDIR=/my/big/tmpdir\(dq\fPat the start of the public key to be used in the \fBauthorized_hosts\fP file..TP.B Cache files (client only):Contains the chunks index and files index (plus a collection of single\-archive chunk indexes which might need huge amounts of disk space,depending on archive count and size \- see FAQ about how to reduce)..TP.B Network (only for client/server operation):If your repository is remote, all deduplicated (and optionally compressed/encrypted) data of course has to go over the connection (\fBssh://\fP repo url).If you use a locally mounted network filesystem, additionally some copyoperations used for transaction support also go over the connection. Ifyou back up multiple sources to one target repository, additional traffichappens for cache resynchronization..UNINDENT.SS Support for file metadata.spBesides regular file and directory structures, Borg can preserve.INDENT 0.0.IP \(bu 2symlinks (stored as symlink, the symlink is not followed).IP \(bu 2special files:.INDENT 2.0.IP \(bu 2character and block device files (restored via mknod).IP \(bu 2FIFOs (\(dqnamed pipes\(dq).IP \(bu 2special file \fIcontents\fP can be backed up in \fB\-\-read\-special\fP mode.By default the metadata to create them with mknod(2), mkfifo(2) etc. is stored..UNINDENT.IP \(bu 2hardlinked regular files, devices, symlinks, FIFOs (considering all items in the same archive).IP \(bu 2timestamps in nanosecond precision: mtime, atime, ctime.IP \(bu 2other timestamps: birthtime (on platforms supporting it).IP \(bu 2permissions:.INDENT 2.0.IP \(bu 2IDs of owning user and owning group.IP \(bu 2names of owning user and owning group (if the IDs can be resolved).IP \(bu 2Unix Mode/Permissions (u/g/o permissions, suid, sgid, sticky).UNINDENT.UNINDENT.spOn some platforms additional features are supported:.\" Yes/No's are grouped by reason/mechanism/reference...TScenter;|l|l|l|l|._T{PlatformT}	T{ACLs[5]T}	T{xattr[6]T}	T{Flags[7]T}_T{LinuxT}	T{YesT}	T{YesT}	T{Yes [1]T}_T{Mac OS XT}	T{YesT}	T{YesT}	T{Yes (all)T}_T{FreeBSDT}	T{YesT}	T{YesT}	T{Yes (all)T}_T{OpenBSDT}	T{n/aT}	T{n/aT}	T{Yes (all)T}_T{NetBSDT}	T{n/aT}	T{No [2]T}	T{Yes (all)T}_T{Solaris and derivativesT}	T{No [3]T}	T{No [3]T}	T{n/aT}_T{Windows (cygwin)T}	T{No [4]T}	T{NoT}	T{NoT}_.TE.spOther Unix\-like operating systems may work as well, but have not been tested at all..spNote that most of the platform\-dependent features also depend on the file system.For example, ntfs\-3g on Linux isn\(aqt able to convey NTFS ACLs..IP [1] 5Only \(dqnodump\(dq, \(dqimmutable\(dq, \(dqcompressed\(dq and \(dqappend\(dq are supported.Feature request #618 for more flags..IP [2] 5Feature request #1332.IP [3] 5Feature request #1337.IP [4] 5Cygwin tries to map NTFS ACLs to permissions with varying degrees of success..IP [5] 5The native access control list mechanism of the OS. This normally limits access tonon\-native ACLs. For example, NTFS ACLs aren\(aqt completely accessible on Linux with ntfs\-3g..IP [6] 5extended attributes; key\-value pairs attached to a file, mainly used by the OS.This includes resource forks on Mac OS X..IP [7] 5aka \fIBSD flags\fP\&. The Linux set of flags [1] is portable across platforms.The BSDs define additional flags..SH SEE ALSO.sp\fIborg\-common(1)\fP for common command line options.sp\fIborg\-rcreate(1)\fP, \fIborg\-rdelete(1)\fP, \fIborg\-rlist(1)\fP, \fIborg\-rinfo(1)\fP,\fIborg\-create(1)\fP, \fIborg\-mount(1)\fP, \fIborg\-extract(1)\fP,\fIborg\-list(1)\fP, \fIborg\-info(1)\fP,\fIborg\-delete(1)\fP, \fIborg\-prune(1)\fP, \fIborg\-compact(1)\fP,\fIborg\-recreate(1)\fP.sp\fIborg\-compression(1)\fP, \fIborg\-patterns(1)\fP, \fIborg\-placeholders(1)\fP.INDENT 0.0.IP \(bu 2Main web site \fI\%https://www.borgbackup.org/\fP.IP \(bu 2Releases \fI\%https://github.com/borgbackup/borg/releases\fP.IP \(bu 2Changelog \fI\%https://github.com/borgbackup/borg/blob/master/docs/changes.rst\fP.IP \(bu 2GitHub \fI\%https://github.com/borgbackup/borg\fP.IP \(bu 2Security contact \fI\%https://borgbackup.readthedocs.io/en/latest/support.html#security\-contact\fP.UNINDENT.SH AUTHORThe Borg Collectiveorphan: .\" Generated by docutils manpage writer..
 |