The script provides a convenient way to load environment config, deal
with profiles and act as a pass-through to restic. The overall thing is
to improve the UX when running restic, integrating the features this
project provides.
## Note
The script itself is a very simple thing.
The command line parser is auto-generated using docopt.sh driven from
the script's DOC. It can be refreshed upon DOC changes with:
`docopt.sh path/to/resticw`.
## How to use it
### Examples
```console
sudo resticw stats latest
sudo resticw -p profileA snapshots
```
### Help
```console
❯ resticw --help
A little wrapper over restic just to handle profiles and environment loading.
It loads the backup profile/environment in a subshell to avoid any credential leak (Note: Run it with sudo so it can load the environment).
Usage:
resticw [options] <restic_arguments>
The restic_arguments is just the regular unwrapped restic arguments, e.g. stats latest
Options:
-p --profile=<name> Specify the profile to load or use default [default: default].
Examples:
sudo resticw --profile profileA snapshots
sudo resticw stats latest # this will use the profile: default
```
Co-authored-by: Erik Westrup <erik.westrup@gmail.com>
Automatic restic backups using systemd services and timers
including these top contributors:
Intro
restic is a command-line tool for making backups, the right way. Check the official website for a feature explanation. As a storage backend, I recommend Backblaze B2 as restic works well with it, and it is (at the time of writing) very affordable for the hobbyist hacker! (anecdotal: I pay for my full-systems backups each month typically < 1 USD).
Unfortunately restic does not come pre-configured with a way to run automated backups, say every day. However it's possible to set this up yourself using systemd/cron and some wrappers. This example also features email notifications when a backup fails to complete.
Here follows a step-by step tutorial on how to set it up, with my sample script and configurations that you can modify to suit your needs.
Note, you can use any of the supported storage backends. The setup should be similar but you will have to use other configuration variables to match your backend of choice.
Project Scope
The scope for this is not to be a full-fledged super solution that solves all the problems and all possible setups. The aim is to be a hackable code base for you to start sewing up the perfect backup solution that fits your requirements!
Nevertheless the project should work out of the box, be minimal but still open the doors for configuration and extensions by users.
Requirements
restic >=v0.9.6- (recommended)
makeif you want an automated install- Arch: part of the
base-develmeta package, Debian/Ubuntu: part of thebuild-essentialmeta package, macOS: preinstalled make works)
- Arch: part of the
TL;DR Setup
- Create B2 credentials as instructed below
- Install config and scripts:
☝ Note:
$ sudo make installsudois required here, as some files are installed into system directories (/etc/and/usr/sbin). Have a look to theMakefileto know more. - Fill out configuration values (edit with sudo):
/etc/restic/pw.txt- Contains the password (single line) to be used by restic to encrypt the repository files. Should be different than your B2 password!/etc/restic/_global.env- Global environment variables./etc/restic/default.env- Profile specific environment variables (multiple profiles can be defined by copying to/etc/restic/something.env)./etc/restic/backup_exclude.txt- List of file patterns to ignore. This will trim down your backup size and the speed of the backup a lot when done properly!
- Initialize remote repo as described below
- Configure how often back up should be made.
- Edit if needed
OnCalendarin/etc/systemd/system/restic-check@.timer.
- Edit if needed
- Enable automated backup for starting with the system (
enablecreates symlinks):$ sudo systemctl start restic-backup@default.timer $ sudo systemctl enable restic-backup@default.timer - And run an immediate backup if you want (if not, it will run on daily basis):
$ sudo systemctl start restic-backup@default - Watch its progress with Systemd journal:
$ journalctl -f --lines=50 -u restic-backup@default - Verify the backup
$ sudo -i $ source /etc/restic/default.env $ restic snapshots - (optional) Define multiple profiles: just make a copy of the
default.envand use the defined profile name in place ofdefaultto run backups or enable timers. Notice that the value after@works as a parameter. - (optional) Enable the check job that verifies that the backups for the profile are all intact.
$ sudo systemctl start restic-check@default.timer $ sudo systemctl enable restic-check@default.timer - (optional) Setup email on failure as described here
Step-by-step and manual setup
This is a more detailed explanation than the TL;DR section that will give you more understanding in the setup, and maybe inspire you to develop your own setup based on this one even!
Tip: The steps in this section will instruct you to copy files from this repo to system directories. If you don't want to do this manually, you can use the Makefile:
$ git clone https://github.com/erikw/restic-systemd-automatic-backup.git && cd $(basename "$_" .git)
$ sudo make install
Arch Linux users can install the aur package restic-systemd-automatic-backup e.g.:
$ yaourt -S restic-systemd-automatic-backup
1. Create Backblaze B2 Account, Bucket and keys
First, see this official Backblaze tutorial on restic, and follow the instructions ("Create Backblaze account with B2 enabled") there on how to create a new B2 bucket. In general, you'd want a private bucket, without B2 encryption (restic does the encryption client side for us) and without the object lock feature.
For restic to be able to connect to your bucket, you want to in the B2 settings create a pair of keyID and applicationKey. It's a good idea to create a separate pair of ID and Key with for each bucket that you will use, with limited read&write access to only that bucket.
2. Configure your B2 credentials locally
Attention! Going the manual way requires that most of the following commands are run as root.
Put these files in /etc/restic/:
_global.env: Fill this file out with your global settings including B2 keyID & applicationKey. A global exclude list is set here (explained in section below).default.env: This is the default profile. Fill this out with bucket name, backup paths and retention policy. This file sources_global.envand is thus self-contained and can be sourced in the shell when you want to issue some manual restic commands. For example:$ source /etc/restic/default.env $ restic snapshots # You don't have to supply all parameters like --repo, as they are now in your environment!pw.txt: This file should contain the restic password used to encrypt the repository. This is a new password what soon will be used when initializing the new repository. It should be unique to this restic backup repository and is needed for restoring from it. Don't re-use your B2 login password, this should be different. For example you can generate a 128 character password (must all be on one line) with:$ openssl rand -base64 128 | tr -d '\n' > /etc/restic/pw.txt
3. Initialize remote repo
Now we must initialize the repository on the remote end:
$ sudo -i
$ source /etc/restic/default.env
$ restic init
4. Script for doing the backup
Put this file in /usr/local/sbin:
restic_backup.sh: A script that defines how to run the backup. The intention is that you should not need to edit this script yourself, but be able to control everything from the*.envprofiles.
Restic support exclude files. They list file pattern paths to exclude from you backups, files that just occupy storage space, backup-time, network and money. restic_backup.sh allows for a few different exclude files.
/etc/restic/backup_exclude.txt- global exclude list. You can use only this one if your setup is easy. This is set in_global.env. If you need a different file for another profile, you can override the envvarRESTIC_BACKUP_EXCLUDE_FILEin this profile..backup_exclude.txtper backup path. If you have e.g. an USB disk mounted at /mnt/media and this path is included in the$RESTIC_BACKUP_PATHS, you can place a file/mnt/media/.backup_exclude.txtand it will automatically picked up. The nice thing about this is that the backup paths are self-contained in terms of what they shoud exclude!
5. Make first backup
Now see if the backup itself works, by running as root
$ sudo -i
$ source /etc/restic/default.env
$ /usr/local/sbin/restic_backup.sh
6. Verify the backup
As the default.env is already sourced in your root shell, you can now just list the snapshos
$ sudo -i
$ source /etc/restic/default.env
$ restic snapshots
Alternatively you can mount the restic snapshots to a directory set /mnt/restic
$ restic mount /mnt/restic
$ ls /mnt/restic
7. Backup automatically; systemd service + timer
Now we can do the modern version of a cron-job, a systemd service + timer, to run the backup every day!
Put these files in /etc/systemd/system/:
restic-backup@.service: A service that calls the backup script with the specified profile. The profile is specified by the value after@when running it (see below).restic-backup@.timer: A timer that starts the former backup every day (same thing about profile here).- If needed, edit this file to configure how often back up should be made. See the
OnCalendarkey in the file.
- If needed, edit this file to configure how often back up should be made. See the
Now simply enable the timer with:
$ systemctl start restic-backup@default.timer
$ systemctl enable restic-backup@default.timer
☝ Note: You can run it with different values instead of default if you use multiple profiles.
You can see when your next backup is scheduled to run with
$ systemctl list-timers | grep restic
and see the status of a currently running backup with
$ systemctl status restic-backup
or start a backup manually
$ systemctl start restic-backup@default
You can follow the backup stdout output live as backup is running with:
$ journalctl -f -u restic-backup@default.service
(skip -f to see all backups that has run)
8. Email notification on failure
We want to be aware when the automatic backup fails, so we can fix it. Since my laptop does not run a mail server, I went for a solution to set up my laptop to be able to send emails with postfix via my Gmail. Follow the instructions over there.
Put this file in /usr/local/sbin:
systemd-email: Sends email using sendmail(1). This script also features time-out for not spamming Gmail servers and getting my account blocked.
Put this files in /etc/systemd/system/:
status-email-user@.service: A service that can notify you via email when a systemd service fails. Edit the target email address in this file.
As you maybe noticed already before, restic-backup.service is configured to start status-email-user.service on failure.
9. Optional: automated backup checks
Once in a while it can be good to do a health check of the remote repository, to make sure it's not getting corrupt. This can be done with $ restic check.
There is companion scripts, service and timer (*check*) to restic-backup.sh that checks the restic backup for errors; look in the repo in etc/systemd/system and usr/local/sbin and copy what you need over to their corresponding locations.
$ sudo -i
$ systemctl start restic-check@default.timer
$ systemctl enable restic-check@default.timer
10. Optional: 🏃 Restic wrapper
For convenience there's a restic wrapper script that makes loading profiles and running restic
straightforward (it needs to run with sudo to read environment). Just run:
sudo resticw WHATEVER(e.g.sudo resticw snapshots) to use the default profile.- You can run the wrapper by passing a specific profile:
resticw -p anotherprofile snapshots.
Useful commands
| Command | Description |
|---|---|
resticw snapshots |
List backup snapshots |
resticw diff <snapshot-id> latest |
Show the changes from the latest backup |
resticw stats / resticw stats snapshot-id ... |
Show the statistics for the whole repo or the specified snapshots |
resticw mount /mnt/restic |
Mount your remote repository |
Cron?
If you want to run an all-classic cron job instead, do like this:
etc/cron.d/restic: Depending on your system's cron, put this in/etc/cron.d/or similar, or copy the contents to $(sudo crontab -e). The format of this file is tested under FreeBSD, and might need adaptions depending on your cron.usr/local/sbin/cron_mail: A wrapper for running cron jobs, that sends output of the job as an email using the mail(1) command.
Uninstall
There is a make target to remove all files (scripts and configs) that were installed by sudo make install. Just run:
$ sudo make uninstall
Variations
A list of variations of this setup:
- Using
--files-from#44
Development
- To not mess up your real installation when changing the
Makefilesimply install to a$PREFIXlike$ PREFIX=/tmp/restic-test make install - Updating the
resticwparser: If you ever update the usageDOC, you will need to refresh the auto-generated parser:$ pip install doctopt.sh $ doctopt.sh usr/local/sbin/resticw
Releasing
To make a new release: 1.
$ vi CHANGELOG.md && git commit -am "Update CHANGELOG.md"
$ git tag vX.Y.Z
$ git push && git push --tags
- Test and update the AUR PKGBUILD if needed.