Configure repository

This software has not been stabilized yet and must not be used as your primary backup tool. You've been warned!

S3 storage

To create a repository stored on an S3-compatible server, create an INI file (name it how you want) with the following configuration:

[Repository]
URL = https://<endpoint>/<bucket>

[S3]
AccessKeyID = <AWS access key ID>
SecretKey = <AWS secret key>

To help you form a valid URL, here are a few examples for common S3 providers:

Provider URL Conditional writes
Amazon S3 (virtual-host style) https://<bucket>.s3.<region>.amazonaws.com Yes
Amazon S3 (path style) https://s3.<region>.amazonaws.com/<bucket> Yes
Backblaze B2 https://s3.<region>.backblazeb2.com/<bucket> No
Cloudflare R2 https://<userid>.r2.cloudflarestorage.com/<bucket> Yes
Exoscale Object Storage https://sos-<region>.exo.io/<bucket> Yes
Scaleway Object Storage https://<bucket>.s3.<region>.scw.cloud No

Rekkord tries to use conditional PutObject operations (If-None-Match=* header) which is not supported by all providers.

Some will ignore the header (such as Scaleway Object Storage), some will refuse to run (such as Backblaze B2). In the latter case, set ConditionalWrites = No as shown below:

# ...

[S3]
KeyID = <AWS access key ID>
SecretKey = <AWS secret key>
ConditionalWrites = No

However, it is better to use a provider with conditional write support.

You can omit the SecretKey value, in which case a prompt will ask you the access key.

Once this is done, use rekkord init to create the repository.

SFTP server

To create a repository stored on an SFTP host, create an INI file (name it how you want) with the following configuration:

[Repository]
URL = <user>@<host>:/path/to/repository

[SFTP]
Password = <SSH password>
KeyFile = <SSH keyfile>

Use either a password or a key file. If you omit both, a prompt will ask you for a password.

Just like with ssh, you will need to validate the host fingerprint the first time you connect to it. However, you can instead directly provide the correct host fingerprint as the Fingerprint to avoid this, as shown in the example below:

[Repository]
URL = foo@example.com:/backup

[SFTP]
KeyFile = /home/bar/.ssh/id_ed25519
Fingerprint = SHA256:Y9pmJfkaok8t0dFJrfi8/LLUNhOYwAZGHUNGsYAiJUM

Once this is done, use rekkord init to create the repository.

Local filesystem

To create a repository in a local directory, create an INI file (name it how you want) with the following configuration:

[Repository]
URL = /path/to/repository

Once this is done, use rekkord init to create the repository.

Initialize repository

Once you have configured your repository, through a configuration file or with environment variables, you can initialize it with the following command:

export REKKORD_CONFIG_FILE=/path/to/config.ini
rekkord init

# Alternative: rekkord init -C /path/to/config.ini

This command will initialize the repository with a random 256-bit master key.

After initialization, the master key is exported to a binary file, named master.key by default (in the current directory). You can change the export file with the --key_file <file> option.

You should store this master key in a secure place, it can be used to reset user accounts and passwords (see below). It cannot be recreated if you lose the file. However, if it leaks, everyone will be able to decrypt your snapshots!

Rekkord uses multiple encryption keys which are derived from this master key:

Rekkord repositories support multiple user accounts. By default, four user accounts are created:

You will need one or the other to use other rekkord commands. Please store these passwords securely.

You can reset any account or password (including the default one) as long as you have the master key file. As mentioned previously, this one, you must not lose or leak!

You can skip the creation of these two default users with rekkord init --skip_users, in which case you will have to create at least one user yourself with the help of the master key.

Repository users

As stated before, by default Rekkord creates four users named admin, data, write and log. These are enough for simple needs.

Repository users contain the necessary encryption keys for a given role, protected by a password.

These have nothing to do with the SSH login name or the S3 access keys (or any other backend that may appear one day), which you have to manage yourself!

Use the following commands to manage repository users:

To create a new user, you must either use an existing user with the necessary keys (a user with write-only role cannot create a user with read-write role), or use the master key file created by rekkord init.

export REKKORD_CONFIG_FILE=/path/to/config.ini

# Use existing user to create new user
export REKKORD_USER=full
rekkord add_user joe -r ReadWrite

# Or use the master key file
rekkord add_user -K master.key john -r ReadWrite

Most Rekkord commands require you to specify the user, you can do this in one of two ways:

[Repository]
URL = ssh://foo@example.com/backup
User = joe
# Password = Set the password here to avoid password prompt on each command

[SFTP]
KeyFile = <SSH keyfile>
Fingerprint = SHA256:<fingerprint>