quickstart.rst 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. .. include:: global.rst.inc
  2. .. _quickstart:
  3. Quick Start
  4. ===========
  5. This chapter will get you started with |project_name|. The first section
  6. presents a simple step by step example that uses |project_name| to backup data.
  7. The next section continues by showing how backups can be automated.
  8. A step by step example
  9. ----------------------
  10. 1. Before a backup can be made a repository has to be initialized::
  11. $ borg init /mnt/backup
  12. 2. Backup the ``~/src`` and ``~/Documents`` directories into an archive called
  13. *Monday*::
  14. $ borg create /mnt/backup::Monday ~/src ~/Documents
  15. 3. The next day create a new archive called *Tuesday*::
  16. $ borg create --stats /mnt/backup::Tuesday ~/src ~/Documents
  17. This backup will be a lot quicker and a lot smaller since only new never
  18. before seen data is stored. The ``--stats`` option causes |project_name| to
  19. output statistics about the newly created archive such as the amount of unique
  20. data (not shared with other archives)::
  21. Archive name: Tuesday
  22. Archive fingerprint: 387a5e3f9b0e792e91ce87134b0f4bfe17677d9248cb5337f3fbf3a8e157942a
  23. Start time: Tue Mar 25 12:00:10 2014
  24. End time: Tue Mar 25 12:00:10 2014
  25. Duration: 0.08 seconds
  26. Number of files: 358
  27. Original size Compressed size Deduplicated size
  28. This archive: 57.16 MB 46.78 MB 151.67 kB
  29. All archives: 114.02 MB 93.46 MB 44.81 MB
  30. 4. List all archives in the repository::
  31. $ borg list /mnt/backup
  32. Monday Mon Mar 24 11:59:35 2014
  33. Tuesday Tue Mar 25 12:00:10 2014
  34. 5. List the contents of the *Monday* archive::
  35. $ borg list /mnt/backup::Monday
  36. drwxr-xr-x user group 0 Jan 06 15:22 home/user/Documents
  37. -rw-r--r-- user group 7961 Nov 17 2012 home/user/Documents/Important.doc
  38. ...
  39. 6. Restore the *Monday* archive::
  40. $ borg extract /mnt/backup::Monday
  41. 7. Recover disk space by manually deleting the *Monday* archive::
  42. $ borg delete /mnt/backup::Monday
  43. .. Note::
  44. Borg is quiet by default. Add the ``-v`` or ``--verbose`` option to
  45. get progress reporting during command execution.
  46. Automating backups
  47. ------------------
  48. The following example script backs up ``/home`` and ``/var/www`` to a remote
  49. server. The script also uses the :ref:`borg_prune` subcommand to maintain a
  50. certain number of old archives::
  51. #!/bin/sh
  52. REPOSITORY=username@remoteserver.com:backup
  53. # Backup all of /home and /var/www except a few
  54. # excluded directories
  55. borg create --stats \
  56. $REPOSITORY::`hostname`-`date +%Y-%m-%d` \
  57. /home \
  58. /var/www \
  59. --exclude /home/*/.cache \
  60. --exclude /home/Ben/Music/Justin\ Bieber \
  61. --exclude '*.pyc'
  62. # Use the `prune` subcommand to maintain 7 daily, 4 weekly
  63. # and 6 monthly archives.
  64. borg prune -v $REPOSITORY --keep-daily=7 --keep-weekly=4 --keep-monthly=6
  65. .. _encrypted_repos:
  66. Repository encryption
  67. ---------------------
  68. Repository encryption is enabled at repository creation time::
  69. $ borg init --encryption=passphrase|keyfile PATH
  70. When repository encryption is enabled all data is encrypted using 256-bit AES_
  71. encryption and the integrity and authenticity is verified using `HMAC-SHA256`_.
  72. All data is encrypted before being written to the repository. This means that
  73. an attacker who manages to compromise the host containing an encrypted
  74. archive will not be able to access any of the data.
  75. |project_name| supports two different methods to derive the AES and HMAC keys.
  76. Passphrase based encryption
  77. This method uses a user supplied passphrase to derive the keys using the
  78. PBKDF2_ key derivation function. This method is convenient to use since
  79. there is no key file to keep track of and secure as long as a *strong*
  80. passphrase is used.
  81. .. Note::
  82. For automated backups the passphrase can be specified using the
  83. `BORG_PASSPHRASE` environment variable.
  84. Key file based encryption
  85. This method generates random keys at repository initialization time that
  86. are stored in a password protected file in the ``~/.borg/keys/`` directory.
  87. The key file is a printable text file. This method is secure and suitable
  88. for automated backups.
  89. .. Note::
  90. The repository data is totally inaccessible without the key file
  91. so it must be kept **safe**.
  92. .. _remote_repos:
  93. Remote repositories
  94. -------------------
  95. |project_name| can initialize and access repositories on remote hosts if the
  96. host is accessible using SSH. This is fastest and easiest when |project_name|
  97. is installed on the remote host, in which case the following syntax is used::
  98. $ borg init user@hostname:/mnt/backup
  99. or::
  100. $ borg init ssh://user@hostname:port//mnt/backup
  101. Remote operations over SSH can be automated with SSH keys. You can restrict the
  102. use of the SSH keypair by prepending a forced command to the SSH public key in
  103. the remote server's authorized_keys file. Only the forced command will be run
  104. when the key authenticates a connection. This example will start attic in server
  105. mode, and limit the attic server to a specific filesystem path::
  106. command="attic serve --restrict-to-path /mnt/backup" ssh-rsa AAAAB3[...]
  107. If it is not possible to install |project_name| on the remote host,
  108. it is still possible to use the remote host to store a repository by
  109. mounting the remote filesystem, for example, using sshfs::
  110. $ sshfs user@hostname:/mnt /mnt
  111. $ borg init /mnt/backup
  112. $ fusermount -u /mnt
  113. However, be aware that sshfs doesn't fully implement POSIX locks, so
  114. you must be sure to not have two processes trying to access the same
  115. repository at the same time.