You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ By default, the script searches the following locations for a partition to use a
95
95
1. The first partition labeled `pve_backup_usb` listed under `/dev/disk/by-label/`.
96
96
2. The first partition on the first USB disk found via `/dev/disk/by-path/`.
97
97
98
-
No need to worry: existing partitions or drives not [intended](#preparation-of-an-external-usb-drive) for backups will not be destroyed, as decryption will simply fail, and the script will stop. If this automated behavior does not match your environment, you can provide a custom list of disk labels or UUIDs to search before the default locations are checked (cf. `-d` parameter).
98
+
No need to worry: existing partitions or drives not [intended](#preparation-of-an-external-usb-drive) for backups will not be destroyed, as decryption will simply fail, and the script will stop. If this automated behavior does not match your environment, you can provide a custom list of partition labels or UUIDs to search before the default locations are checked (cf. `-d` parameter).
99
99
100
100
101
101
### Parameters
@@ -116,7 +116,7 @@ No need to worry: existing partitions or drives not [intended](#preparation-of-a
116
116
117
117
**Miscellaneous, optional**
118
118
119
-
*`-d`: A UUID of the target partition to decrypt. Will be used to search it in `/dev/disk/by-uuid/` (you might use `blkid /dev/sdX1` to determine the UUID). By default, the script is simply using the first partition on the first USB disk it is able to find via `/dev/disk/by-path/`. No worries: existing drives not used for backups won't be destroyed as the decryption will fail. But this automatism presumes that only one USB disk is connected during the script run. Defining a UUID will work if there are more than one (e.g. when it is not feasible in your environment to just have one disk connected simultaneously).
119
+
* `-d`: List of partition labels or UUIDs to search before the default locations are checked for the backup target partion. By default, the script searches the following locations for a partition to use as the backup target for decryption and mounting:<br>1. The first partition labeled `pve_backup_usb` listed under `/dev/disk/by-label/`.<br>2. The first partition on the first USB disk found via `/dev/disk/by-path/`.<br>If this automated behavior does not match your environment, you can provide a custom list of partition labels or UUIDs to search before using this parameter. Separate multiple targets with commas (CSV format). Any given UUID will be searched under `/dev/disk/by-uuid/` (you might use `blkid /dev/sdX1` to determine a UUID), while any other string matching the pattern `^[0-9a-zA-Z_ \-]{1,16}$` will be searched under `/dev/disk/by-label/`. The search will be performed in the exact order the items appear in the list.<br>No need to worry: existing partitions or drives not [intended](#preparation-of-an-external-usb-drive) for backups will not be destroyed, as decryption will simply fail, and the script will stop.
120
120
*`-h`: Flag to print help.
121
121
*`-j`: Flag to enable the continuation of the backup process in case of an error during the copying and/or verification of files. If this flag is not set, the script will immediately halt the entire backup process and display an error if any file to be backed up cannot be copied (or verified, cf. `-c`). If the flag is set, the backup will continue with the remaining files to be backed up (if any). Activating this feature requires careful review of the backup logs and emails/messages, as a quick inspection of the backup media might incorrectly suggest that all PVE sources were successfully backed up, even though some files may be missing or damaged. However, this allows for the possibility that at least some partially useful backup data will be available.
122
122
*`-k`: Path to a keyfile containing a passphrase to unlock the target device. Defaults to `/etc/credentials/luks/pve_backup_usb`. There must be no other chars beside the passphrase, including no trailing new line or [`EOF`](https://en.wikipedia.org/wiki/End-of-file). You might use `perl -pi -e 'chomp if eof' /etc/credentials/luks/pve_backup_usb` to get rid of an invisible, unwanted `EOF`.
0 commit comments