Bupstash is a tool for encrypted backups - if you need secure backups, Bupstash is the tool for you.
Bupstash was designed to have:
Efficient deduplication - Bupstash can store hundreds of encrypted directory snapshots using a fraction of the space encrypted tarballs would require.
Strong privacy - Data is encrypted client side and the repository never needs has access to the decryption keys.
Offline decryption keys - Backups do not require the decryption key be anywhere near an at-risk server or computer.
Key/value tagging with search - all while keeping the tags fully encrypted.
Great performance on slow networks - Bupstash really strives to work well on high latency networks like cellular and connections to far-off lands.
Secure remote access controls - Ransomware, angry spouses, and disgruntled business partners will be powerless to delete your remote backups.
Efficient incremental backups - Bupstash knows what it backed up last time and skips that work.
Fantastic performance with low ram usage - Bupstash won't bog down your production servers.
Safety against malicious attacks - Bupstash is written in a memory safe language to dramatically reduce the attack surface over the network.
Stability and Backwards Compatibility
Bupstash is alpha software, while all efforts are made to keep bupstash bug free, we currently recommend using bupstash for making REDUNDANT backups where failure can be tolerated.
The repository format is approaching stability, and will not be changed in a backwards incompatible way unless there is very strong justification. Future changes will most likely be backwards compatible, or come with a migration path if it is needed at all.
Guides, documentation and support
- Visit the project website.
- Visit the quickstart guide for an introductory tutorial.
- Visit the filesystem backups guide for examples of making backups.
- Visit the man pages for more comprehensive documentation.
- Visit the community chat to ask questions.
- Introductory blog post.
- Read the technical overview to understand how it works.
Initialize a new Bupstash repository via ssh.
$ export BUPSTASH_REPOSITORY=ssh://$SERVER/home/me/backups $ bupstash init
Create a new encryption key, and tell bupstash to use it.
$ bupstash new-key -o backups.key $ export BUPSTASH_KEY="$(pwd)/backups.key"
Save a directory as a tarball snapshot.
$ bupstash put hostname="$(hostname)" ./some-data ebb66f3baa5d432e9f9a28934888a23d
Save the output of a command, checking for errors.
$ bupstash put --exec name=database.sql pgdump mydatabase 14ebd2073b258b1f55c5bbc889c49db4
List items matching a query.
$ bupstash list name="backup.tar" and hostname="server-1" id="bcb8684e6bf5cb453e77486decf61685" name="some-file.txt" hostname="server-1" timestamp="2020/07/27 11:26:16"
Get an item matching a query.
$ bupstash get id=bcb8684e6bf5cb453e77486decf61685 some data... $ bupstash get id="ebb66*" | tar -C ./restore -xf -
Remove items matching a query.
$ bupstash rm name=some-data.txt and older-than 30d
Run the garbage collector to reclaim disk space.
$ bupstash gc
First ensure you have a recent rust+cargo, pkg-config and libsodium-dev package installed.
Next clone the repository and run cargo build.
$ git clone https://github.com/andrewchambers/bupstash $ cd bupstash $ cargo build --release $ cp ./target/release/bupstash $INSTALL_DIR
Install bash automated test framework and run the following to run both the unit tests, and cli integration test suite.
$ cargo test $ cargo build --release $ export PATH=`pwd`/target/release:$PATH $ bats ./cli-tests
Head to the releases page and download for a build for your platform. Simply extract the archive and add the single bupstash binary to your PATH.
Currently we only precompile for linux (help wanted for more platforms).