2012-05-14 09:53:16 -04:00
---
2015-04-10 16:17:45 -04:00
layout: doc
2015-10-13 23:31:03 -04:00
title: qvm-backup-restore
2018-02-04 18:32:30 -05:00
permalink: /doc/tools/3.2/dom0/qvm-backup-restore/
2015-10-11 03:04:59 -04:00
redirect_from:
2018-02-04 18:32:30 -05:00
- /doc/dom0-tools/qvm-backup-restore/
2015-10-28 18:14:40 -04:00
- /en/doc/dom0-tools/qvm-backup-restore/
2015-10-11 03:04:59 -04:00
- /doc/Dom0Tools/QvmBackupRestore/
- /wiki/Dom0Tools/QvmBackupRestore/
2012-05-14 09:53:16 -04:00
---
2018-02-11 20:15:10 -05:00
```
==================
2015-05-05 13:24:29 -04:00
qvm-backup-restore
==================
NAME
2018-02-11 20:15:10 -05:00
====
2015-05-05 13:24:29 -04:00
qvm-backup-restore - restores Qubes VMs from backup
SYNOPSIS
2018-02-11 20:15:10 -05:00
========
| qvm-backup-restore [options] < backup-dir >
2015-05-05 13:24:29 -04:00
OPTIONS
2018-02-11 20:15:10 -05:00
=======
-h, --help
Show this help message and exit
--verify-only
Do not restore the data, only verify backup integrity
--skip-broken
Do not restore VMs that have missing templates or netvms
--ignore-missing
Ignore missing templates and netvms, and restore the VMs anyway
--skip-conflicting
Do not restore VMs that are already present on the host
--force-root
Force to run with root privileges
--replace-template=REPLACE_TEMPLATE
Restore VMs using another template, syntax: old-template-name:new-template-name (can be repeated)
-x EXCLUDE, --exclude=EXCLUDE
Skip restore of specified VM (can be repeated)
--skip-dom0-home
Do not restore dom0's user home directory
--ignore-username-mismatch
Ignore dom0 username mismatch when restoring dom0's user home directory
-d APPVM, --dest-vm=APPVM
Restore from a backup located in a specific AppVM
-e, --encrypted
The backup is encrypted
-p, --passphrase-file
Read passphrase from file, or use '-' to read from stdin
-z, --compressed
The backup is compressed
--paranoid-mode, --plan-b
Treat the backup as untrusted, disable restoring things potentially
compromising security of dom0/other VMs, even when such data is properly
authenticated. This may be used to restore a backup made on compromissed
system. Things currently affected by this option:
- disable dom0 home restore
- reject compressed backups
- reject old backup formats (Qubes R2 and older)
- more strict validation of VM names (for example don't allow '..' in it)
- do not restore firewall rules, attached PCI devices, attached block
devices, menu entries
--debug
Enable (a lot of) debug output
2016-03-29 19:25:57 -04:00
2015-05-05 13:24:29 -04:00
AUTHORS
2018-02-11 20:15:10 -05:00
=======
| Joanna Rutkowska < joanna at invisiblethingslab dot com >
| Rafal Wojtczuk < rafal at invisiblethingslab dot com >
| Marek Marczykowski < marmarek at invisiblethingslab dot com >
```
2018-02-12 00:37:47 -05:00
-----
2018-03-18 17:04:33 -04:00
**Note:** The Markdown source of this page in [`qubes-doc`] was generated by running the [`update-manpages-3-2`] script on `qubes-core-admin/doc/qvm-tools/` .
If you wish to update the contents of this page as it appears on the Qubes OS website, please submit a pull request to change the appropriate file in `qubes-core-admin/doc/qvm-tools/` .
Do not attempt to change the Markdown source of this page in [`qubes-doc`] directly.
All direct changes to the Markdown file will be overwritten the next time this page is regenerated.
2018-02-12 00:37:47 -05:00
[`qubes-doc`]: https://github.com/QubesOS/qubes-doc/
2018-03-18 17:04:33 -04:00
[`update-manpages-3-2`]: https://github.com/QubesOS/qubesos.github.io/blob/master/_utils/update-manpages-3-2
2018-02-12 00:37:47 -05:00