BACKUPPC DOCUMENTATION PDF

BackupPC acts as a server and is installed on a Linux system, and from there . Documentation contains the whole BackupPC documentation. Adding a CGI Administrator to BackupPC; Modifying the etc. can be found in the BackupPC Documentation: Step 9 CGI Interface. As BackupPC operates on services running on a remote host, I will call Please read BackupPC documentation: step 5 of client setup for a full.

Author: Fekus Zushakar
Country: Paraguay
Language: English (Spanish)
Genre: Education
Published (Last): 14 March 2017
Pages: 361
PDF File Size: 10.44 Mb
ePub File Size: 17.40 Mb
ISBN: 451-7-74425-378-1
Downloads: 69985
Price: Free* [*Free Regsitration Required]
Uploader: Mikakasa

This is likely the problem if dofumentation get an error saying such as “Wrong user: Four methods for getting backup data from a client are supported: Rsync is more clever: In the case of NFS or rsh you need to make sure BackupPC’s privileges are sufficient to read all the files you want to backup. Hit the “Code” button, then select the “backuppc” or “backuppc-beta” package and download the latest version. This allows multiple clients to all refer to the same physical host.

A new incremental of level N will backup all files that have changed since the most recent backup of a lower level. These appear for both regular bac,uppc and administrators.

Administrator Guide: BMS 2.0

To maintain backward compatibility where the exit status in early versions was docmuentation ignoredthis flag defaults to 0. The CGI script undoes the mangling, so it is invisible to the user. The following programs can be used:. That script could do all sorts of bad things. You will also need to specify a password for the administration of BackupPC.

  BTICINO CATALOGO MAGIC PDF

Then add the new backup user to the built in “Backup Operators” group. If the filenames dicumentation in the browser eg: First off, there are five perl modules you should install. A hash is used to give a list of directories or files to backup for each share the share name is the key.

DRD_BMS_2_0_AdminGuide

Several variables are substituted at run-time. User names that are rendered by the CGI interface can be turned into links into their home page or other information about the user.

You need to decide where to put the data directory, below which all the BackupPC data is stored. The backup data directories contain large numbers of hardlinks. BackupPC pools identical files using hardlinks.

BackupPC Documentation

Output from archive nnn. You can manually see whether a given host have a DNS entry according to perl’s gethostbyname function with this command: Depending upon your mail handler this is either a plain name eg: Times are measured in hours since midnight. For each file name argument it inflates uncompresses the file and writes it to stdout. In all cases, the original file type is stored in the attrib file so it can be correctly restored.

On a given week the spacing might be less than shown as each backup ages through each expiry period. To further customise the archive’s parameters you can adding the changed parameters in the host’s config. When there have been no backups in this number of days the user is sent an email.

  EVERYTHING FOREVER GEVIN GIORBRAN PDF

Any files whose attributes have changed ie: Although configurable, the default settings leave group read permission on pool files, so make sure the BackupPC user’s group is chosen restrictively. However, a mention that a zip file was downloaded by a particular user, and a list of the files, does appear in BackupPC’s log file. You can run “perldoc Archive:: BackupPC, and the cgi interface in particular, do the right dcumentation on un-filled incremental backups. In particular, you should specify which users or groups have administrator privileged access: In versions prior to 3.

The setuid script won’t work unless perl on your backuppcc was installed with setuid emulation. The combination of pooling common files and compression can yield a factor of 8 or more overall saving in backup storage. The partial backup is removed when the next successful backup completes, or if another full backup fails resulting in a newer partial backup.

If you want encryption of network data you can use ssh to create a tunnel, or use a documentatoin like stunnel.