Fast and easy backups with Restic and Jarg
Simplicity
Restic and the Jarg front end appeal to users who want to see quick results without too much overhead.
Restic [1] is a cross-platform backup tool that is simple, quick, and easy to learn. Versions of Restic run on macOS, Windows, and BSD, as well as Linux. A graphical front end called Jarg [2] extends Restic to users who are more comfortable in a GUI.
Restic focuses on flexibility and ease of handling. Instead of entering long lines of cryptic parameters, you can save data with just a few simple commands. But the tool still keeps all options open for you. You can preserve your data in the cloud and also on local media. If you need to, you can use SFTP to control a file server on the LAN as a storage location. Because Restic is implemented as a command-line tool, you can include it in scripts and time-control jobs with cron.
Restic automatically encrypts the backups in line with the AES-256 standard. It can handle incremental backups where it will only save the changed data after an initial full backup. Restic also offers a deduplication feature to avoid redundant data. The ability to verify backups helps users check that the data is backed up without error.
Restic is available in the software archives of all major Linux distributions. You can pick up the software for other architectures and operating systems from the project's GitHub page.
Ready to Start
Restic relies on repositories. Two commands are all it takes to back up data to your local media. The first command (Listing 1, line 2) creates the repository for the backup. Restic automatically generates the matching directory and prompts you for a password to encrypt and decrypt the backups. The second command (line 3) pushes a backup of the specified folder, including all subdirectories, into the new repository. Restic also prompts you for a password before proceeding to create the backup (Figure 1).
If necessary, you can extend the command line to include additional parameters. For example, --verbose
outputs various detailed messages during the backup. To back up multiple directories to different paths in a single pass, you need to enter the paths as a space-separated list. The --exclude
and --iexclude
parameters exclude individual directories or entire paths from the backup.
For repetitive, larger backup tasks, you can enter the list of directories or files you wish to include or exclude in a text file. To back up to a server on the LAN, you just enter the same commands as for a local backup, but add the prefixed computer name and the protocol used to the target path (Listing 1, lines 5 and 6).
Listing 1
Backing Up with Restic
01 ### local 02 $ restic init -r /path_to_repository 03 $ restic -r /path_to_repository backup /path_to_data 04 ### remote 05 $ restic init -r sftp:User@Host:/path_to_repository. 06 $ restic -r sftp:User@Host:/path_to_repository. backup /path_to_backup_data.
The --keep
and --keep-last
parameters let you define how many of the last backups are kept. Additional parameters for automated removal of backups are listed in the Restic documentation [3].
Detailed
For encrypted backups, you can't view the data inside the destination folder directly. To look inside, you need to mount the repository like a normal drive. First create a separate mount folder, and then run the command from the line 2 of Listing 2.
Listing 2
Checking Backups
01 ### Mount repository 02 $ restic -r /path_to_repository mount /path_to_mount_point 03 ### Check and compare repositories 04 $ restic -r /path_to_repository check --read-data 05 $ restic -r /path_to_repository snapshots 06 $ restic -r /path_to_repository diff Snapshot1_ID Snapshot2_ID ...
Enter the password at the prompt for Restic to mount the backup repository and decrypt the data files in the target directory. You can now view the data in the snapshots/
subdirectory of the mount folder, but editing is not allowed. Restic remains active in the terminal. The keyboard shortcut Ctrl+C lets you unmount the drive again, and the data will disappear from the target folder.
Comparing
You can also use Restic to compare data sets or check the integrity of the folders. Use the diff
and check
parameters. check
is used to check the index and contents of the specified repository (Listing 2, line 4).
To compare two or more snapshots, you need their identification numbers, which you can discover with the command from line 5 of Listing 2. The ID numbers appear in a table below each other, along with the timestamp of the backup (Figure 2). You can now identify the snapshots and compare them directly (line 6).
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.