You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+27-1Lines changed: 27 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,10 +30,36 @@
30
30
# Basics
31
31
32
32
The idea is that you use BackupDrop to upload your backups, which (after upload) cannot be changed by the device you backed up. Some crypto lockers are actively looking for backup devices like NAS or backup drives and delete or encrypt them too.
33
-
Using BackupDrop the machine you backed up cannot delete or modify or even access past backups.
33
+
Using BackupDrop the machine you backed up cannot delete or modify or even access past backups. It's meant to be a push-only system so you can upload backups via CURL from any device you want to back up from.
34
34
35
35
Also BackupDrop can handle multiple external [storage providers](/rtfm/storage.md) and save the backups on `S3`, `FTP` or `NFS`.
For every identifier there will be a directory created in the `data/` folder. It makes sense to use the hostname of the server of name of a specific application you're backing up.
44
+
45
+
## Example upload script
46
+
47
+
```bash
48
+
#!/bin/bash
49
+
set -e
50
+
51
+
mysqldump --all-databases > db.sql
52
+
53
+
paths="/etc/nginx/ /var/www/ /home/myuser db.sql"
54
+
echo"[i] Starting compression"
55
+
tar --exclude-vcs --exclude="backup.tar.gz" -c -v -z -f backup.tar.gz $paths
You can and should encrypt files before uploading them (especially if you're using cloud endpoints) but if you can't, BackupDrop can handle it for you using public key or password encryption. [Read more](/rtfm/encryption.md)
0 commit comments