Fast and easy backups with Restic and Jarg
Simplicity
Restic and the Jarg front end appeal to users who want to see quick results without too much overhead.
Restic [1] is a cross-platform backup tool that is simple, quick, and easy to learn. Versions of Restic run on macOS, Windows, and BSD, as well as Linux. A graphical front end called Jarg [2] extends Restic to users who are more comfortable in a GUI.
Restic focuses on flexibility and ease of handling. Instead of entering long lines of cryptic parameters, you can save data with just a few simple commands. But the tool still keeps all options open for you. You can preserve your data in the cloud and also on local media. If you need to, you can use SFTP to control a file server on the LAN as a storage location. Because Restic is implemented as a command-line tool, you can include it in scripts and time-control jobs with cron.
Restic automatically encrypts the backups in line with the AES-256 standard. It can handle incremental backups where it will only save the changed data after an initial full backup. Restic also offers a deduplication feature to avoid redundant data. The ability to verify backups helps users check that the data is backed up without error.
Restic is available in the software archives of all major Linux distributions. You can pick up the software for other architectures and operating systems from the project's GitHub page.
Ready to Start
Restic relies on repositories. Two commands are all it takes to back up data to your local media. The first command (Listing 1, line 2) creates the repository for the backup. Restic automatically generates the matching directory and prompts you for a password to encrypt and decrypt the backups. The second command (line 3) pushes a backup of the specified folder, including all subdirectories, into the new repository. Restic also prompts you for a password before proceeding to create the backup (Figure 1).
If necessary, you can extend the command line to include additional parameters. For example, --verbose
outputs various detailed messages during the backup. To back up multiple directories to different paths in a single pass, you need to enter the paths as a space-separated list. The --exclude
and --iexclude
parameters exclude individual directories or entire paths from the backup.
For repetitive, larger backup tasks, you can enter the list of directories or files you wish to include or exclude in a text file. To back up to a server on the LAN, you just enter the same commands as for a local backup, but add the prefixed computer name and the protocol used to the target path (Listing 1, lines 5 and 6).
Listing 1
Backing Up with Restic
01 ### local 02 $ restic init -r /path_to_repository 03 $ restic -r /path_to_repository backup /path_to_data 04 ### remote 05 $ restic init -r sftp:User@Host:/path_to_repository. 06 $ restic -r sftp:User@Host:/path_to_repository. backup /path_to_backup_data.
The --keep
and --keep-last
parameters let you define how many of the last backups are kept. Additional parameters for automated removal of backups are listed in the Restic documentation [3].
Detailed
For encrypted backups, you can't view the data inside the destination folder directly. To look inside, you need to mount the repository like a normal drive. First create a separate mount folder, and then run the command from the line 2 of Listing 2.
Listing 2
Checking Backups
01 ### Mount repository 02 $ restic -r /path_to_repository mount /path_to_mount_point 03 ### Check and compare repositories 04 $ restic -r /path_to_repository check --read-data 05 $ restic -r /path_to_repository snapshots 06 $ restic -r /path_to_repository diff Snapshot1_ID Snapshot2_ID ...
Enter the password at the prompt for Restic to mount the backup repository and decrypt the data files in the target directory. You can now view the data in the snapshots/
subdirectory of the mount folder, but editing is not allowed. Restic remains active in the terminal. The keyboard shortcut Ctrl+C lets you unmount the drive again, and the data will disappear from the target folder.
Comparing
You can also use Restic to compare data sets or check the integrity of the folders. Use the diff
and check
parameters. check
is used to check the index and contents of the specified repository (Listing 2, line 4).
To compare two or more snapshots, you need their identification numbers, which you can discover with the command from line 5 of Listing 2. The ID numbers appear in a table below each other, along with the timestamp of the backup (Figure 2). You can now identify the snapshots and compare them directly (line 6).
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.
-
Kodi 21.0 Open-Source Entertainment Hub Released
After a year of development, the award-winning Kodi cross-platform, media center software is now available with many new additions and improvements.
-
Linux Usage Increases in Two Key Areas
If market share is your thing, you'll be happy to know that Linux is on the rise in two areas that, if they keep climbing, could have serious meaning for Linux's future.
-
Vulnerability Discovered in xz Libraries
An urgent alert for Fedora 40 has been posted and users should pay attention.
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.