quickstart.rst 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560
  1. .. include:: global.rst.inc
  2. .. highlight:: bash
  3. .. _quickstart:
  4. Quick Start
  5. ===========
  6. This chapter will get you started with Borg and covers various use cases.
  7. A step by step example
  8. ----------------------
  9. .. include:: quickstart_example.rst.inc
  10. Archives and repositories
  11. -------------------------
  12. A *Borg archive* is the result of a single backup (``borg create``). An archive
  13. stores a snapshot of the data of the files "inside" it. One can later extract or
  14. mount an archive to restore from a backup.
  15. *Repositories* are filesystem directories acting as self-contained stores of archives.
  16. Repositories can be accessed locally via path or remotely via ssh. Under the hood,
  17. repositories contain data blocks and a manifest that tracks which blocks are in each
  18. archive. If some data hasn't changed between backups, Borg simply
  19. references an already uploaded data chunk (deduplication).
  20. .. _about_free_space:
  21. Important note about free space
  22. -------------------------------
  23. Before you start creating backups, ensure that there is *always* plenty
  24. of free space on the destination filesystem that has your backup repository
  25. (and also on ~/.cache). A few GB should suffice for most hard-drive sized
  26. repositories. See also :ref:`cache-memory-usage`.
  27. If you do run out of disk space, it can be hard or impossible to free space,
  28. because Borg needs free space to operate - even to delete backup archives.
  29. You can use some monitoring process or just include the free space information
  30. in your backup log files (you check them regularly anyway, right?).
  31. Also helpful:
  32. - use `borg repo-space` to reserve some disk space that can be freed when the fs
  33. does not have free space any more.
  34. - if you use LVM: use a LV + a filesystem that you can resize later and have
  35. some unallocated PEs you can add to the LV.
  36. - consider using quotas (e.g. fs quota, quota settings of storage provider)
  37. - use `prune` and `compact` regularly
  38. Important note about permissions
  39. --------------------------------
  40. To avoid permission issues (in your borg repository or borg cache), **always
  41. access the repository using the same user account**.
  42. If you want to back up files of other users or the operating system, running
  43. borg as root likely will be required (otherwise you get `Permission denied`
  44. errors).
  45. If you only back up your own files, run it as your normal user (i.e. not root).
  46. For a local repository always use the same user to invoke borg.
  47. For a remote repository: always use e.g. ssh://borg@remote_host. You can use this
  48. from different local users, the remote user running borg and accessing the
  49. repo will always be `borg`.
  50. If you need to access a local repository from different users, you can use the
  51. same method by using ssh to borg@localhost.
  52. Important note about files changing during the backup process
  53. -------------------------------------------------------------
  54. Borg does not do anything about the internal consistency of the data
  55. it backs up. It just reads and backs up each file in whatever state
  56. that file is when Borg gets to it. On an active system, this can lead
  57. to two kinds of inconsistency:
  58. - By the time Borg backs up a file, it might have changed since the backup process was initiated
  59. - A file could change while Borg is backing it up, making the file internally inconsistent
  60. If you have a set of files and want to ensure that they are backed up
  61. in a specific or consistent state, you must take steps to prevent
  62. changes to those files during the backup process. There are a few
  63. common techniques to achieve this.
  64. - Avoid running any programs that might change the files.
  65. - Snapshot files, filesystems, container storage volumes, or logical volumes.
  66. LVM or ZFS might be useful here.
  67. - Dump databases or stop the database servers.
  68. - Shut down virtual machines before backing up their disk image files.
  69. - Shut down containers before backing up their storage volumes.
  70. For some systems, Borg might work well enough without these
  71. precautions. If you are simply backing up the files on a system that
  72. isn't very active (e.g. in a typical home directory), Borg usually
  73. works well enough without further care for consistency. Log files and
  74. caches might not be in a perfect state, but this is rarely a problem.
  75. For databases, virtual machines, and containers, there are specific
  76. techniques for backing them up that do not simply use Borg to back up
  77. the underlying filesystem. For databases, check your database
  78. documentation for techniques that will save the database state between
  79. transactions. For virtual machines, consider running the backup on
  80. the VM itself or mounting the filesystem while the VM is shut down.
  81. For Docker containers, perhaps docker's "save" command can help.
  82. Automating backups
  83. ------------------
  84. The following example script is meant to be run daily by the ``root`` user on
  85. different local machines. It backs up a machine's important files (but not the
  86. complete operating system) to a repository ``~/backup/main`` on a remote server.
  87. Some files which aren't necessarily needed in this backup are excluded. See
  88. :ref:`borg_patterns` on how to add more exclude options.
  89. After the backup, this script also uses the :ref:`borg_prune` subcommand to keep
  90. a certain number of old archives and deletes the others.
  91. Finally, it uses the :ref:`borg_compact` subcommand to remove deleted objects
  92. from the segment files in the repository to free disk space.
  93. Before running, make sure that the repository is initialized as documented in
  94. :ref:`remote_repos` and that the script has the correct permissions to be executable
  95. by the root user, but not executable or readable by anyone else, i.e. root:root 0700.
  96. You can use this script as a starting point and modify it where it's necessary to fit
  97. your setup.
  98. Do not forget to test your created backups to make sure everything you need is
  99. backed up and that the ``prune`` command keeps and deletes the correct backups.
  100. ::
  101. #!/bin/sh
  102. # Setting this, so the repo does not need to be given on the commandline:
  103. export BORG_REPO=ssh://username@example.com:2022/~/backup/main
  104. # See the section "Passphrase notes" for more infos.
  105. export BORG_PASSPHRASE='XYZl0ngandsecurepa_55_phrasea&&123'
  106. # some helpers and error handling:
  107. info() { printf "\n%s %s\n\n" "$( date )" "$*" >&2; }
  108. trap 'echo $( date ) Backup interrupted >&2; exit 2' INT TERM
  109. info "Starting backup"
  110. # Back up the most important directories into an archive named after
  111. # the machine this script is currently running on:
  112. borg create \
  113. --verbose \
  114. --filter AME \
  115. --list \
  116. --stats \
  117. --show-rc \
  118. --compression lz4 \
  119. --exclude-caches \
  120. --exclude 'home/*/.cache/*' \
  121. --exclude 'var/tmp/*' \
  122. \
  123. '{hostname}' \
  124. /etc \
  125. /home \
  126. /root \
  127. /var
  128. backup_exit=$?
  129. info "Pruning repository"
  130. # Use the `prune` subcommand to maintain 7 daily, 4 weekly and 6 monthly
  131. # archives of THIS machine. The '{hostname}' matching is very important to
  132. # limit prune's operation to archives with exactly that name and not apply
  133. # to archives with other names also:
  134. borg prune \
  135. '{hostname}' \
  136. --list \
  137. --show-rc \
  138. --keep-daily 7 \
  139. --keep-weekly 4 \
  140. --keep-monthly 6
  141. prune_exit=$?
  142. # actually free repo disk space by compacting segments
  143. info "Compacting repository"
  144. borg compact -v
  145. compact_exit=$?
  146. # use highest exit code as global exit code
  147. global_exit=$(( backup_exit > prune_exit ? backup_exit : prune_exit ))
  148. global_exit=$(( compact_exit > global_exit ? compact_exit : global_exit ))
  149. if [ ${global_exit} -eq 0 ]; then
  150. info "Backup, Prune, and Compact finished successfully"
  151. elif [ ${global_exit} -eq 1 ]; then
  152. info "Backup, Prune, and/or Compact finished with warnings"
  153. else
  154. info "Backup, Prune, and/or Compact finished with errors"
  155. fi
  156. exit ${global_exit}
  157. Pitfalls with shell variables and environment variables
  158. -------------------------------------------------------
  159. This applies to all environment variables you want Borg to see, not just
  160. ``BORG_PASSPHRASE``. TL;DR: always ``export`` your variable,
  161. and use single quotes if you're unsure of the details of your shell's expansion
  162. behavior. E.g.::
  163. export BORG_PASSPHRASE='complicated & long'
  164. This is because ``export`` exposes variables to subprocesses, which Borg may be
  165. one of. More on ``export`` can be found in the "ENVIRONMENT" section of the
  166. bash(1) man page.
  167. Beware of how ``sudo`` interacts with environment variables. For example, you
  168. may be surprised that the following ``export`` has no effect on your command::
  169. export BORG_PASSPHRASE='complicated & long'
  170. sudo ./yourborgwrapper.sh # still prompts for password
  171. For more information, refer to the sudo(8) man page and ``env_keep`` in
  172. the sudoers(5) man page.
  173. .. Tip::
  174. To debug what your borg process sees, find its PID
  175. (``ps aux|grep borg``) and then look into ``/proc/<PID>/environ``.
  176. .. passphrase_notes:
  177. Passphrase notes
  178. ----------------
  179. If you use encryption (or authentication), Borg will ask you interactively
  180. for a passphrase to encrypt/decrypt the keyfile / repokey.
  181. A passphrase should be a single line of text. Any trailing linefeed will be
  182. stripped.
  183. Do not use empty passphrases, as these can be trivially guessed, which does not
  184. leave any encrypted data secure.
  185. Avoid passphrases containing non-ASCII characters.
  186. Borg can process any unicode text, but problems may arise at input due to text
  187. encoding or differing keyboard layouts, so best just avoid non-ASCII stuff.
  188. See: https://xkcd.com/936/
  189. If you want to automate, you can supply the passphrase
  190. directly or indirectly with the use of environment variables.
  191. Supply a passphrase directly::
  192. # use this passphrase (use safe permissions on the script!):
  193. export BORG_PASSPHRASE='my super secret passphrase'
  194. Or delegate to an external program to supply the passphrase::
  195. # use the "pass" password manager to get the passphrase:
  196. export BORG_PASSCOMMAND='pass show backup'
  197. # use GPG to get the passphrase contained in a gpg-encrypted file:
  198. export BORG_PASSCOMMAND='gpg --decrypt borg-passphrase.gpg'
  199. Or read the passphrase from an open file descriptor::
  200. export BORG_PASSPHRASE_FD=42
  201. Using hardware crypto devices (like Nitrokey, Yubikey and others) is not
  202. directly supported by borg, but you can use these indirectly.
  203. E.g. if your crypto device supports GPG and borg calls ``gpg`` via
  204. ``BORG_PASSCOMMAND``, it should just work.
  205. .. backup_compression:
  206. Backup compression
  207. ------------------
  208. The default is lz4 (very fast, but low compression ratio), but other methods are
  209. supported for different situations. Compression not only helps you save disk space,
  210. but will especially speed up remote backups since less data needs to be transferred.
  211. zstd is a modern compression algorithm which can be parametrized to anything between
  212. N=1 for highest speed (and relatively low compression) to N=22 for highest compression
  213. (and lower speed)::
  214. $ borg create --compression zstd,N arch ~
  215. If you have a fast repo storage and you want minimum CPU usage you can disable
  216. compression::
  217. $ borg create --compression none arch ~
  218. You can also use zlib and lzma instead of zstd, although zstd usually provides the
  219. the best compression for a given resource consumption. Please see :ref:`borg_compression`
  220. for all options.
  221. An interesting alternative is ``auto``, which first checks with lz4 whether a chunk is
  222. compressible (that check is very fast), and only if it is, compresses it with the
  223. specified algorithm::
  224. $ borg create --compression auto,zstd,7 arch ~
  225. You'll need to experiment a bit to find the best compression for your use case.
  226. Keep an eye on CPU load and throughput.
  227. .. _encrypted_repos:
  228. Repository encryption
  229. ---------------------
  230. You can choose the repository encryption mode at repository creation time::
  231. $ borg repo-create --encryption=MODE
  232. For a list of available encryption MODEs and their descriptions, please refer
  233. to :ref:`borg_repo-create`.
  234. If you use encryption, all data is encrypted on the client before being written
  235. to the repository.
  236. This means that an attacker who manages to compromise the host containing an
  237. encrypted repository will not be able to access any of the data, even while the
  238. backup is being made.
  239. Key material is stored in encrypted form and can be only decrypted by providing
  240. the correct passphrase.
  241. For automated backups the passphrase can be specified using the
  242. `BORG_PASSPHRASE` environment variable.
  243. .. note:: Be careful about how you set that environment, see
  244. :ref:`this note about password environments <password_env>`
  245. for more information.
  246. .. warning:: The repository data is totally inaccessible without the key
  247. and the key passphrase.
  248. Make a backup copy of the key file (``keyfile`` mode) or repo config
  249. file (``repokey`` mode) and keep it at a safe place, so you still have
  250. the key in case it gets corrupted or lost. Also keep your passphrase
  251. at a safe place. You can make backups using :ref:`borg_key_export`
  252. subcommand.
  253. If you want to print a backup of your key to paper use the ``--paper``
  254. option of this command and print the result, or print this `template`_
  255. if you need a version with QR-Code.
  256. A backup inside of the backup that is encrypted with that key/passphrase
  257. won't help you with that, of course.
  258. .. _template: paperkey.html
  259. .. _remote_repos:
  260. Remote repositories
  261. -------------------
  262. Borg can initialize and access repositories on remote hosts if the
  263. host is accessible using SSH. This is fastest and easiest when Borg
  264. is installed on the remote host, in which case the following syntax is used::
  265. $ borg -r ssh://user@hostname:port/path/to/repo repo-create ...
  266. Note: Please see the usage chapter for a full documentation of repo URLs. Also
  267. see :ref:`ssh_configuration` for recommended settings to avoid disconnects and hangs.
  268. Remote operations over SSH can be automated with SSH keys. You can restrict the
  269. use of the SSH keypair by prepending a forced command to the SSH public key in
  270. the remote server's `authorized_keys` file. This example will start Borg
  271. in server mode and limit it to a specific filesystem path::
  272. command="borg serve --restrict-to-path /path/to/repo",restrict ssh-rsa AAAAB3[...]
  273. If it is not possible to install Borg on the remote host,
  274. it is still possible to use the remote host to store a repository by
  275. mounting the remote filesystem, for example, using sshfs::
  276. $ sshfs user@hostname:/path/to /path/to
  277. $ borg -r /path/to/repo repo-create ...
  278. $ fusermount -u /path/to
  279. You can also use other remote filesystems in a similar way. Just be careful,
  280. not all filesystems out there are really stable and working good enough to
  281. be acceptable for backup usage.
  282. Other kinds of repositories
  283. ---------------------------
  284. Due to using the `borgstore` project, borg now also supports other kinds of
  285. (remote) repositories besides `file:` and `ssh:`:
  286. - sftp: the borg client will directly talk to an sftp server.
  287. This does not require borg being installed on the sftp server.
  288. - rclone: the borg client will talk via rclone to cloud storage.
  289. - Others may come in the future, adding backends to `borgstore` is rather simple.
  290. Restoring a backup
  291. ------------------
  292. Please note that we describe only the most basic commands and options
  293. here. Refer to the command reference to see more.
  294. To restore, work **on the same machine as the same user**
  295. that was used to create the backups of the wanted files. Doing so
  296. avoids issues such as:
  297. - confusion relating to paths
  298. - mapping of user/group names to user/group IDs
  299. - permissions
  300. You likely already have a working borg setup there, including perhaps:
  301. - an environment variable for the key passphrase (for encrypted repos),
  302. - a keyfile for the repo (not needed for repokey mode),
  303. - a ssh key for the repo server (not needed for locally mounted repos),
  304. - a valid borg cache for that repo (quicker than cache rebuild).
  305. The **user** might be:
  306. - root (if full backups, backups including system stuff or multiple
  307. users' files were made)
  308. - some specific user using sudo to execute borg as root
  309. - some specific user (if backups of that user's files were made)
  310. A borg **backup repository** can be either:
  311. - in a local directory (like e.g. a locally mounted USB disk)
  312. - on a remote backup server machine that is reachable via ssh (client/server)
  313. If the repository is encrypted, you will also need the **key** and the **passphrase**
  314. (which is protecting the key).
  315. The **key** can be located:
  316. - in the repository (**repokey** mode).
  317. Easy, this will usually "just work".
  318. - in the home directory of the user who made the backup (**keyfile** mode).
  319. This may cause a bit more effort:
  320. - if you have just lost that home directory and you first need to restore the
  321. borg key (e.g. from the separate backup you made of it or from another
  322. user or machine accessing the same repository).
  323. - if you first must find out the correct machine / user / home directory
  324. (where the borg client was run to make the backups).
  325. The **passphrase** for the key has been either:
  326. - entered interactively at backup time
  327. (not practical if backup is automated / unattended).
  328. - acquired via some environment variable driven mechanism in the backup script
  329. (look there for BORG_PASSPHRASE, BORG_PASSCOMMAND, etc. and just do it like
  330. that).
  331. There are **2 ways to restore** files from a borg backup repository:
  332. - **borg mount** - use this if:
  333. - you don't know exactly which files you want to restore
  334. - you don't know which archive contains the files (in the state) you want
  335. - you need to look into files / directories before deciding what you want
  336. - you need a relatively low volume of data restored
  337. - you don't care for restoring stuff that FUSE mount does not implement yet
  338. (like special fs flags, ACLs)
  339. - you have a client with good resources (RAM, CPU, temporary disk space)
  340. - you would rather use some filemanager to restore (copy) files than borg
  341. extract shell commands
  342. - **borg extract** - use this if:
  343. - you know precisely what you want (repo, archive, path)
  344. - you need a high volume of files restored (best speed)
  345. - you want a as-complete-as-it-gets reproduction of file metadata
  346. (like special fs flags, ACLs)
  347. - you have a client with low resources (RAM, CPU, temp. disk space)
  348. Example with **borg mount**:
  349. ::
  350. # open a new, separate terminal (this terminal will be blocked until umount)
  351. # now we find out the archive ID of the archive we want to mount:
  352. borg repo-list
  353. # mount one archive giving its archive ID prefix:
  354. borg mount -a aid:d34db33f /mnt/borg
  355. # alternatively, mount all archives from a borg repo (slower):
  356. borg mount /mnt/borg
  357. # it may take a while until you will see stuff in /mnt/borg.
  358. # now use another terminal or file browser and look into /mnt/borg.
  359. # when finished, umount to unlock the repo and unblock the terminal:
  360. borg umount /mnt/borg
  361. Example with **borg extract**:
  362. ::
  363. # borg extract always extracts into current directory and that directory
  364. # should be empty (borg does not support transforming a non-empty dir to
  365. # the state as present in your backup archive).
  366. mkdir borg_restore
  367. cd borg_restore
  368. # now we find out the archive ID of the archive we want to extract:
  369. borg repo-list
  370. # find out how the paths stored in the the archive look like:
  371. borg list aid:d34db33f
  372. # we extract only some specific path (note: no leading / !):
  373. borg extract aid:d34db33f path/to/extract
  374. # alternatively, we could fully extract the archive:
  375. borg extract aid:d34db33f
  376. # now move the files to the correct place...
  377. Difference when using a **remote borg backup server**:
  378. It is basically all the same as with the local repository, but you need to
  379. refer to the repo using a ``ssh://`` URL.
  380. In the given example, ``borg`` is the user name used to log into the machine
  381. ``backup.example.org`` which runs ssh on port ``2222`` and has the borg repo
  382. in ``/path/to/repo``.
  383. Instead of giving a FQDN or a hostname, you can also give an IP address.
  384. As usual, you either need a password to log in or the backup server might
  385. have authentication set up via ssh ``authorized_keys`` (which is likely the
  386. case if unattended, automated backups were done).
  387. ::
  388. borg -r ssh://borg@backup.example.org:2222/path/to/repo mount /mnt/borg
  389. # or
  390. borg -r ssh://borg@backup.example.org:2222/path/to/repo extract archive