Skip to content

Latest commit

 

History

History
40 lines (23 loc) · 3.58 KB

README.md

File metadata and controls

40 lines (23 loc) · 3.58 KB

Duply

Duply is a backup tool based on duplicity. It uses GnuPG to encrypt backups and can connect to multiple backends.

Building the image

Building the image should be easy. You can use the following command: docker build -t duply <path to the Dockerfile> or fetch thelibrarycode/duply from Docker Hub.

Using the image

The docker iamge expects three volumes. One to store duply's configuration, at least one for the data to backup, and another one for duply's archive directory. As you will need to edit the configuration, you should use a bind mount or a named volume for it. Add all data that shall be backuped as named volume or bind mount. We created an empty directory /backup as place to mount those. You can use an unamed volume for the archive directory. The archive directory stores unencrypted metadata of backups to make incremental backpus easier. This data is not absolutely necessary, but it help to avoid to have to load and unencrypt parts of backups, when creating new incremental ones. In duply's configuration template, you can find more details about the archive directory and possible backup targets.

Duply uses profiles to store different backup jobs. Almost every duply command names the profile that shall be used. Mount a volume to persist duply's configuration into the container as /etc/duply. Within the contain Duply runs as root, so that unix file permissions and ownership do not prohibit to access the files to backup. As duply runs as root user, it checks /etc/duply to find its configuration an the profiles.

Create a new profile

To create your configuration you must run duply <profile-name> create within the container. You can use the following command to spin up the container and run that command: docker run --rm -it -v "$(pwd)"/volumes/duply_config:/etc/duply:cached duply kosmos_docker_volumes create. This would put duply's configuration into a folder volumes/duply_config in your current working directory and mount that into the container. Please change this accordingly to your needs. After creating the profile edit its configuration. It will be in the volume or directory in a subfolder named as you named your profile. The configuration you just created contains a lot of helpful information and documentation about what and how to configure.

Use duply

Once you created the configuration and edited it, you should be good to go for your first backup. Run docker run --rm -it -v "$(pwd)"/volumes/duply_config:/etc/duply:cached duply kosmos_docker_volumes backup. To see usage information of duply run docker run --rm -it -v "$(pwd)"/volumes/duply_config:/etc/duply:cached duply usage.

Caveats

Different docker containers might have different hostnames. Therefore, you should run duply with the option --allow-source-mismatch.

If you use duplicities ssh, sftp, scp backends with paramiko, you might run into a situation, where your backup aborts, as paramiko tries to get a confirmation for the server's ssh key fingerprint. To avoid this, you can add a pre script to duply like the following one:

#!/bin/bash

TARGET_HOST=$( echo $TARGET_URL_HOSTPATH | cut -d '/' -f 1 )
TARGET_HOST=$( echo ${TARGET_HOST} | cut -d ':' -f 1 )

if [ -d /root/.ssh ]; then
  ssh-keyscan -H $TARGET_HOST >> /root/.ssh/known_hosts
fi

This pre script puts the ssh-key to /root/.ssh/known_hosts. Please be aware that this blindly accepts the ssh fingerprint. It would be much safer to create a volume with the known_host file and to load the fingerprint manually once into it.