qubes-doc/reference/tools/3.2/dom0/qvm-backup-restore.md

3.0 KiB

layout title permalink redirect_from
doc qvm-backup-restore /doc/tools/3.2/dom0/qvm-backup-restore/
/doc/dom0-tools/qvm-backup-restore/
/en/doc/dom0-tools/qvm-backup-restore/
/doc/Dom0Tools/QvmBackupRestore/
/wiki/Dom0Tools/QvmBackupRestore/
==================
qvm-backup-restore
==================

NAME
====
qvm-backup-restore - restores Qubes VMs from backup

SYNOPSIS
========
| qvm-backup-restore [options] <backup-dir>

OPTIONS
=======
-h, --help
    Show this help message and exit
--verify-only
    Do not restore the data, only verify backup integrity
--skip-broken
    Do not restore VMs that have missing templates or netvms
--ignore-missing
    Ignore missing templates and netvms, and restore the VMs anyway
--skip-conflicting
    Do not restore VMs that are already present on the host
--force-root
    Force to run with root privileges
--replace-template=REPLACE_TEMPLATE
    Restore VMs using another template, syntax: old-template-name:new-template-name (can be repeated)
-x EXCLUDE, --exclude=EXCLUDE
    Skip restore of specified VM (can be repeated)
--skip-dom0-home
    Do not restore dom0's user home directory
--ignore-username-mismatch
    Ignore dom0 username mismatch when restoring dom0's user home directory
-d APPVM, --dest-vm=APPVM
    Restore from a backup located in a specific AppVM
-e, --encrypted
    The backup is encrypted
-p, --passphrase-file
    Read passphrase from file, or use '-' to read from stdin
-z, --compressed
    The backup is compressed
--paranoid-mode, --plan-b
    Treat the backup as untrusted, disable restoring things potentially
    compromising security of dom0/other VMs, even when such data is properly
    authenticated. This may be used to restore a backup made on compromissed
    system. Things currently affected by this option:
      - disable dom0 home restore
      - reject compressed backups
      - reject old backup formats (Qubes R2 and older)
      - more strict validation of VM names (for example don't allow '..' in it)
      - do not restore firewall rules, attached PCI devices, attached block
        devices, menu entries
--debug
    Enable (a lot of) debug output

AUTHORS
=======
| Joanna Rutkowska <joanna at invisiblethingslab dot com>
| Rafal Wojtczuk <rafal at invisiblethingslab dot com>
| Marek Marczykowski <marmarek at invisiblethingslab dot com>

Note: The Markdown source of this page in qubes-doc was generated by running the update-manpages-3-2 script on qubes-core-admin/doc/qvm-tools/. If you wish to update the contents of this page as it appears on the Qubes OS website, please submit a pull request to change the appropriate file in qubes-core-admin/doc/qvm-tools/. Do not attempt to change the Markdown source of this page in qubes-doc directly. All direct changes to the Markdown file will be overwritten the next time this page is regenerated.