BORG-SERVE(1) borg backup tool BORG-SERVE(1)
NAME
borg-serve - Start in server mode. This command is usually not used
manually.
SYNOPSIS
borg [common options] serve [options]
DESCRIPTION
This command starts a repository server process. This command is usu-
ally not used manually.
OPTIONS
See borg-common(1) for common options of Borg commands.
optional arguments
--restrict-to-path PATH
restrict repository access to PATH. Can be specified multiple
times to allow the client access to several directories. Access
to all sub-directories is granted implicitly; PATH doesn't need
to directly point to a repository.
--restrict-to-repository PATH
restrict repository access. Only the repository located at PATH
(no sub-directories are considered) is accessible. Can be speci-
fied multiple times to allow the client access to several repos-
itories. Unlike --restrict-to-path sub-directories are not ac-
cessible; PATH needs to directly point at a repository location.
PATH may be an empty directory or the last element of PATH may
not exist, in which case the client may initialize a repository
there.
--append-only
only allow appending to repository segment files
--storage-quota QUOTA
Override storage quota of the repository (e.g. 5G, 1.5T). When a
new repository is initialized, sets the storage quota on the new
repository as well. Default: no quota.
EXAMPLES
borg serve has special support for ssh forced commands (see autho-
rized_keys example below): it will detect that you use such a forced
command and extract the value of the --restrict-to-path option(s).
It will then parse the original command that came from the client,
makes sure that it is also borg serve and enforce path restriction(s)
as given by the forced command. That way, other options given by the
client (like --info or --umask) are preserved (and are not fixed by the
forced command).
Environment variables (such as BORG_HOSTNAME_IS_UNIQUE) contained in
the original command sent by the client are not interpreted, but ig-
nored. If BORG_XXX environment variables should be set on the borg
serve side, then these must be set in system-specific locations like
/etc/environment or in the forced command itself (example below).
# Allow an SSH keypair to only run borg, and only have access to /path/to/repo.
# Use key options to disable unneeded and potentially dangerous SSH functionality.
# This will help to secure an automated remote backup system.
$ cat ~/.ssh/authorized_keys
command="borg serve --restrict-to-path /path/to/repo",restrict ssh-rsa AAAAB3[...]
# Set a BORG_XXX environment variable on the "borg serve" side
$ cat ~/.ssh/authorized_keys
command="export BORG_XXX=value; borg serve [...]",restrict ssh-rsa [...]
NOTE:
The examples above use the restrict directive. This does automati-
cally block potential dangerous ssh features, even when they are
added in a future update. Thus, this option should be preferred.
If you're using openssh-server < 7.2, however, you have to explic-
itly specify the ssh features to restrict and cannot simply use the
restrict option as it has been introduced in v7.2. We recommend to
use no-port-forwarding,no-X11-forwarding,no-pty,no-agent-forward-
ing,no-user-rc in this case.
SSH Configuration
borg serve's pipes (stdin/stdout/stderr) are connected to the sshd
process on the server side. In the event that the SSH connection be-
tween borg serve and the client is disconnected or stuck abnormally
(for example, due to a network outage), it can take a long time for
sshd to notice the client is disconnected. In the meantime, sshd con-
tinues running, and as a result so does the borg serve process holding
the lock on the repository. This can cause subsequent borg operations
on the remote repository to fail with the error: Failed to create/ac-
quire the lock.
In order to avoid this, it is recommended to perform the following ad-
ditional SSH configuration:
Either in the client side's ~/.ssh/config file, or in the client's
/etc/ssh/ssh_config file:
Host backupserver
ServerAliveInterval 10
ServerAliveCountMax 30
Replacing backupserver with the hostname, FQDN or IP address of the
borg server.
This will cause the client to send a keepalive to the server every 10
seconds. If 30 consecutive keepalives are sent without a response (a
time of 300 seconds), the ssh client process will be terminated, caus-
ing the borg process to terminate gracefully.
On the server side's sshd configuration file (typically
/etc/ssh/sshd_config):
ClientAliveInterval 10
ClientAliveCountMax 30
This will cause the server to send a keep alive to the client every 10
seconds. If 30 consecutive keepalives are sent without a response (a
time of 300 seconds), the server's sshd process will be terminated,
causing the borg serve process to terminate gracefully and release the
lock on the repository.
If you then run borg commands with --lock-wait 600, this gives suffi-
cient time for the borg serve processes to terminate after the SSH con-
nection is torn down after the 300 second wait for the keepalives to
fail.
You may, of course, modify the timeout values demonstrated above to
values that suit your environment and use case.
SEE ALSO
borg-common(1)
AUTHOR
The Borg Collective
2021-03-22 BORG-SERVE(1)
Czas wygenerowania: 0.00037 sek.
Created with the man page lookup class by Andrew Collington.
Based on a C man page viewer by Vadim Pavlov
Unicode soft-hyphen fix (as used by RedHat) by Dan Edwards
Some optimisations by Eli Argon
Caching idea and code contribution by James Richardson
Copyright © 2003-2025 Linux.pl
Hosted by Hosting Linux.pl