mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-26 15:59:24 -05:00
parent
71536acdfe
commit
2a418896d9
@ -1,6 +1,6 @@
|
||||
---
|
||||
layout: doc
|
||||
title: Backup, Restoration, and Migration
|
||||
title: Backup, restoration, and migration
|
||||
permalink: /doc/backup-restore/
|
||||
redirect_from:
|
||||
- /en/doc/backup-restore/
|
||||
@ -8,8 +8,8 @@ redirect_from:
|
||||
- /wiki/BackupRestore/
|
||||
---
|
||||
|
||||
Qubes Backup, Restoration, and Migration
|
||||
========================================
|
||||
Backup, restoration, and migration
|
||||
==================================
|
||||
|
||||
With Qubes, it's easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.
|
||||
|
||||
@ -21,25 +21,23 @@ This is true of all computing, not just the use of Qubes.
|
||||
Data loss can and does occur in myriad and unexpected ways.
|
||||
A standard recommendation is to make backups at least weekly: three copies in two different formats, one off-site.
|
||||
|
||||
Backing up changes to Dom0
|
||||
Backing up changes to dom0
|
||||
--------------------------
|
||||
NOTE: If you use the Backup Qubes tool to backup Dom0, it only backs up files in the home directory.
|
||||
If you have files in Dom0 that you want to save, you should put copies of them in your home directory before running Backup Qubes per the instructions below.
|
||||
An example of how to back up files from /etc/ if you created qrexec policies (named *local.mysql*, *local.ssh*) and altered *guid.conf* would look like the following:
|
||||
|
||||
yourname@dom0 ~]$mkdir ~/systemfiles
|
||||
yourname@dom0 ~]$mkdir ~/systemfiles/etc
|
||||
yourname@dom0 ~]$mkdir ~/systemfiles/etc/qubes-rpc
|
||||
yourname@dom0 ~]$mkdir ~/systemfiles/etc/qubes-rpc/policy
|
||||
yourname@dom0 ~]$cp /etc/qubes-rpc/policy/local.* ~/systemfiles/etc/qubes-rpc/policy/
|
||||
yourname@dom0 ~]$mkdir systemfiles/etc/qubes
|
||||
yourname@dom0 ~]$cp /etc/qubes/guid.conf ~/systemfiles/etc/qubes/guid.conf
|
||||
When backing up dom0 using the Qubes backup tool (explained below), only the home directory is backed up.
|
||||
Therefore, if there are files outside of the home directory you wish to save, you should copy them into the home directory prior to creating a backup.
|
||||
Here is an example of how to back up Qubes config files and RPC policies:
|
||||
|
||||
To restore these files you would have to move them from the restored directory in your home back to their appropriate locations in /etc/ after the restore as described below.
|
||||
$ mkdir -p ~/backup/etc/qubes/
|
||||
$ cp -a /etc/qubes/* ~/backup/etc/qubes/
|
||||
$ mkdir ~/backup/etc/qubes-rpc/
|
||||
$ cp -a /etc/qubes-rpc/* ~/systemfiles/etc/qubes-rpc/
|
||||
|
||||
If you are rebuilding your system from a fresh install and you had installed additional packages in your dom0 you will need to reinstall the packages into your new dom0.
|
||||
To restore these files, move them from the restored directory in dom0's home back to their appropriate locations in `/etc/`.
|
||||
Please note that any packages installed via the package manager in dom0 will not be backed up.
|
||||
Such packages will have to be reinstalled through the package manager when restoring on a fresh installation.
|
||||
|
||||
Creating a Backup
|
||||
Creating a backup
|
||||
-----------------
|
||||
|
||||
1. Go to **Applications menu -> System Tools -> Backup Qubes**.
|
||||
@ -86,7 +84,7 @@ Creating a Backup
|
||||
A backup is useless if you can't restore your data from it, and you can't be sure that your backup is good until you try to restore.
|
||||
|
||||
|
||||
Restoring from a Backup
|
||||
Restoring from a backup
|
||||
-----------------------
|
||||
|
||||
1. Go to **Applications menu -> System Tools -> Restore Backup**.
|
||||
@ -131,7 +129,7 @@ However, if you do wish to move all files from the dom0 backup out of the subdir
|
||||
Just remember that this can cause unexpected and desired configuration changes in dom0, depending on exactly which files you're adding and replacing.
|
||||
|
||||
|
||||
Emergency Backup Recovery without Qubes
|
||||
Emergency backup recovery without Qubes
|
||||
---------------------------------------
|
||||
|
||||
The Qubes backup system has been designed with emergency disaster recovery in mind.
|
||||
@ -145,13 +143,13 @@ Refer to the following for emergency restore of a backup created on:
|
||||
* [Qubes R2 or older](/doc/backup-emergency-restore-v2/)
|
||||
|
||||
|
||||
Migrating Between Two Physical Machines
|
||||
Migrating between two physical machines
|
||||
---------------------------------------
|
||||
|
||||
In order to migrate your Qubes system from one physical machine to another, simply follow the backup procedure on the old machine, [install Qubes](/downloads/) on the new machine, and follow the restoration procedure on the new machine.
|
||||
All of your settings and data will be preserved!
|
||||
|
||||
Choosing a Backup Passphrase
|
||||
Choosing a backup passphrase
|
||||
----------------------------
|
||||
|
||||
Here are some things to consider when selecting a passphrase for your backups:
|
||||
|
Loading…
Reference in New Issue
Block a user