Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ricsanfre/ansible-role-backup
Role for automating backup of linux filesystems to different backends using restic
https://github.com/ricsanfre/ansible-role-backup
ansible ansible-role backup gdrive rclone restic s3
Last synced: about 1 month ago
JSON representation
Role for automating backup of linux filesystems to different backends using restic
- Host: GitHub
- URL: https://github.com/ricsanfre/ansible-role-backup
- Owner: ricsanfre
- License: mit
- Created: 2021-12-22T09:13:07.000Z (almost 3 years ago)
- Default Branch: master
- Last Pushed: 2024-06-07T15:33:37.000Z (5 months ago)
- Last Synced: 2024-06-07T17:07:06.740Z (5 months ago)
- Topics: ansible, ansible-role, backup, gdrive, rclone, restic, s3
- Language: Shell
- Homepage: https://galaxy.ansible.com/ricsanfre/backup
- Size: 59.6 KB
- Stars: 6
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Ansible Role: Automate backup to different backends using restic
=========This role install and configure [restic] (https://restic.net/) in a linux server using as storage backend any of the supported by restic (Local file system, SFTP server, REST Server, S3 object storage server (i.e. Minio), and cloud storage services (Google Cloud Storage, Microsoft Azure Blob, Amazon S3).
Additional cloud storage backends, such as Google Drive, are supported through [rclone](https://rclone.org/) integration. rclone is also installed and configured by this role.
The role install restic and rclone, configure the repository in the selected backend, configure the directories to backup and schedule backup tasks.
The backup procedure is scheduled using a systemd service and timer (instead of cron)
> Important NOTE: This role does not configure the reoisitory backend (Minio/AWS Server user credentials and buckets, Google Drive API access and service accout, etc.). Backend need to be configured before applying this role.
Requirements
------------None
Role Variables
--------------Available variables are listed below along with default values (see `defaults\main.yaml`)
- Restic version to be installed and wheter to force the installation in case that a previous installation is found
```yml
# force restic install even when it is already installed
restic_force_install: false
# restic version
restic_version: 0.12.1
```
- Restic installation detailsRestic UNIX user/group
```yml
restic_group: root
restic_user: root
```
Restic binary location
```yml
restic_path: /usr/local/bin/restic
```
Restic installation directories to place backup service configuration (`restic_etc_dir`), and CA TLS certificates (`restic_cert_dir`)
```yml
restic_etc_dir: /etc/minio
minio_ca_dir: "{{ restic_etc_dir }}/ssl"
```
- Restic repository configurationRestic backend repository details (`restic_repository`) and repository passwod used for encryption (`restic_password`).
```yml
restic_repository: "/restic-repo"
restic_password: mysupers1cret0
```
Restic backend additional environment variables (`restic_environment`). Needed for connecting to different backends. Check out [restic documentation: preparing new repo](https://restic.readthedocs.io/en/stable/030_preparing_a_new_repo.html) to see which environment variables are needed for each backend.`restic_respository` name format depends on the repository type
As an example to connect to Minio S3 server, it is needed to configure the following
```yml
restic_repository: "s3:https://10.11.0.1:9091/restic"
restic_environment:
- name: AWS_ACCESS_KEY_ID
value: "restic"
- name: AWS_SECRET_ACCESS_KEY
value: "supers1cret0"
```
and access credentials (`restic_aws_access_key_id` and `restic_aws_secret_access_key`)- Rclone installation and configuration
In case of selecting a rclone based repository. rclone need to be installed and optionally configured
Indicate whether rclone should be installed (`rclone_install`) and configure (`rclone_configure`)
```yml
rclone_install: false
rclone_configure: false
```
rclone configuration is done by creating automatically a rclone configuration file `$HOME/.config/rclone/rclone.conf` based on the content of `rclone_config_file`This automatic configuration is optional, if `rclone_configuration` is set to false, then you need to manual configure rclone remote repository (`rclone config` command).
For example to configure restic to use Google Drive as backend repository the following configuration can be provided.
```yml
restic_repository: "rclone:gdrive:backup"
rclone_install: true
rclone_configure: true
rclone_config_file: |
[gdrive]
type = drive
scope = drive
service_account_file =
team_drive =
```
> Google API service account file (json file) should be present in the server or uploaded to it before applying the role. See example playbook below.- Restic TLS configuration
In case of connecting to a backend through TLS, such as Minio S3 service, restic need to validate the credentials. CA certificate can be added during the installation so restic can validate the TLs communication.
Whether to use CA SSL certificate to validate connection to S3 storage (`restic_use_ca_cert`) or not. Needed when self-signed certificates or custom CA certificates are used in S3 server. CA certificate content must be loaded into variable `restic_ca_cert`.
```yml
restic_use_ca_cert: false
# custom CA certificate content
restic_ca_cert: ""
```
This can be done using `set_fact` ansible task with a lookup filter. See playbook example below
```yml
- name: Load tls key and cert
set_fact:
restic_ca_cert: "{{ lookup('file','certificates/CA.pem') }}"
```- Pre-backup scripts
In the scheduled backup, scripts can be executed just before restic backup commands. This is useful to schedule manual task like generating the backup files of database (i.e.: mysqldump command).
`restic_enable_pre_backup_scripts` enable the execution of those scripts
`restic_pre_backup_script` contains the list of scripts (name + content) to be executed
This is an example of script to be executed before applying restic backup commands
```yml
restic_enable_pre_backup_scripts: false
restic_pre_backup_script:
- name: myprebackup.sh
content: |
#!/bin/bash
echo "This is a script executed before making the backup"
```
- Directories list to be backed up`restic_backup_dirs` is a list of dictionaries. Each item of the list is a directory to include in the backup
Each dictionary item has a `path` and an `exclude` (which defaults to nothing). The `exclude` property is a list of exclude patterns to be passed as `--exclude` argument passed to restic when executing the backup (example: `restic backup /root --exclude .cache --exclude .ignore`).```yml
# restic backup directories
restic_backups_dirs:
- path: '/etc'
- path: '/var/log'
- path: '/root'
exclude:
- pattern: '.cache'
- pattern: '.ignore'
```- Restic additional flags
`restic_flags` additional restic commands flags to be included in the execution of all commands. Playbook automatically add --cacert flag if `restic_use_ca_cert` is set to true.
```yml
restic_flags: ""
```- Restic logs
`restic_logs` restic scripts log file.
```yml
restic_log: /var/log/restic.log
```
### Restic repository cleaning tasksA specific systemd service will be configured to execute checking and purging activities. This service will be independent from the backup service, since it is only needed to be executed from one server and to avoid mutual locking it need to be scheduled differently.
Cleaning systemd service will execute a script containing the following restic commands
- `restic check`
- `restic forget --keep-within `
- `restic prune``restic_clean_service` indicates whether to install or not the restic cleaning service and `restic_forget_keep_within` retention data polocy (`--keep-within` forget parameter)
```yml
restic_clean_service: true
et as post backup task (restic forget --keep-within )
restic_forget_keep_within: 30d
```### Sytemd services and timers
Two systemd services of type `oneshot` will be created that will be triggered periodically with its corresponding systemd timers.
For executing backup process: `restic-backup.service` and `restic-backup.timer` are created.
For executing cleaning process: `restic-clean.service` and `restic-clean.timer` are createdThe timers are configurable as follows:
- `restic_backup_systemd_timer_on_calender` and `restic_clean_systemd_timer_on_calender`: defines the `OnCalendar` directive (`*-*-* 03:00:00`)
- `restic_backup_systemd_timer_randomized_delay_sec` and `restic_clean_systemd_timer_randomized_delay_sec`: Delay the timer by a random amount of time between 0 and the specified time value. (`0`)See the [systemd.timer](https://www.freedesktop.org/software/systemd/man/systemd.timer.html) documentation for more information.
You can see the logs of the backup/cleaning with `journalctl`.
journalctl -xefu restic-backup
journalctl -xefu restic-cleanLogs are also stored in a file indicated by `restic_log`
The backup/cleaning process can be also triggered manually running the command
systemctl start restic-backup
systemctl start restic-cleanTesting
--------Ansible Playbook based on the configuration creates the scripts that are launched by the systemd services. Those scripts are stored in `restic_etc_dir` (/etc/restic)
- `restic-repo-init.sh`: Script for initializing the restic repo. Executed by ansible playbook once
- `restic-backup.sh`: script executed by `restic-backup` systemd service
- `restic-clean.sh`: script executed by `restic-clean` systemd service
- `restic-wrapper.sh`: restic wrapper script used by the rest of the scripts. This script load the repository variables stored in `/etc/restic/restic.conf` and if necessary pass the '--cacert' parameter to all restic commands.After installation the backup process can be tested following this procedure:
1) Trigger manually the backup process
systemctl start restic-backup
Or/etc/restic/restic-backup.sh
2) Check logs restic-backup service
journalctl -u restic-backup
Ortail -f /var/log/restic.log
Output should be like:```
-- Logs begin at Tue 2021-12-28 10:38:54 UTC, end at Tue 2021-12-28 10:53:57 UTC. --
Dec 28 10:50:01 server systemd[1]: Starting Restic backup...
Dec 28 10:50:01 server restic-backup.sh[2751]: Dec 28 2021 10:50:01 UTC: restic-backup started
Dec 28 10:50:01 server restic-backup.sh[2755]: -------------------------------------------------------------------
------------
Dec 28 10:50:02 server restic-backup.sh[2757]: no parent snapshot found, will read all files
Dec 28 10:50:02 server restic-backup.sh[2757]: Files: 219 new, 0 changed, 0 unmodified
Dec 28 10:50:02 server restic-backup.sh[2757]: Dirs: 105 new, 0 changed, 0 unmodified
Dec 28 10:50:02 server restic-backup.sh[2757]: Added to the repo: 730.675 KiB
Dec 28 10:50:02 server restic-backup.sh[2757]: processed 219 files, 538.536 KiB in 0:00
Dec 28 10:50:02 server restic-backup.sh[2757]: snapshot 8bc0e3ea saved
Dec 28 10:50:03 server restic-backup.sh[2769]: no parent snapshot found, will read all files
Dec 28 10:50:03 server restic-backup.sh[2769]: Files: 11 new, 0 changed, 0 unmodified
Dec 28 10:50:03 server restic-backup.sh[2769]: Dirs: 5 new, 0 changed, 0 unmodified
Dec 28 10:50:03 server restic-backup.sh[2769]: Added to the repo: 351.917 KiB
Dec 28 10:50:03 server restic-backup.sh[2769]: processed 11 files, 346.573 KiB in 0:00
Dec 28 10:50:03 server restic-backup.sh[2769]: snapshot bd7c3e4f saved
Dec 28 10:50:03 server restic-backup.sh[2781]: no parent snapshot found, will read all files
Dec 28 10:50:03 server restic-backup.sh[2781]: Files: 2 new, 0 changed, 0 unmodified
Dec 28 10:50:03 server restic-backup.sh[2781]: Dirs: 3 new, 0 changed, 0 unmodified
Dec 28 10:50:03 server restic-backup.sh[2781]: Added to the repo: 4.852 KiB
Dec 28 10:50:03 server restic-backup.sh[2781]: processed 2 files, 3.190 KiB in 0:00
Dec 28 10:50:03 server restic-backup.sh[2781]: snapshot dc362721 saved
Dec 28 10:50:03 server restic-backup.sh[2792]: -------------------------------------------------------------------
------------
Dec 28 10:50:03 server restic-backup.sh[2794]: Dec 28 2021 10:50:03 UTC: restic.sh finished
Dec 28 10:50:03 server systemd[1]: restic-backup.service: Succeeded.
Dec 28 10:50:03 server systemd[1]: Finished Restic backup.
```
3) Check the restic snapshots- List backup snapshots
/etc/restic/restic_wrapper.sh snapshots
Output should be like:
```
repository df54412d opened successfully, password is correct
ID Time Host Tags Paths
---------------------------------------------------------------
0047e386 2021-12-22 17:02:02 server /etc
285d0864 2021-12-22 17:02:03 server /var/log
7d55b179 2021-12-22 17:02:03 server /root
---------------------------------------------------------------
3 snapshots
```
4) Trigger manually the clean processsystemctl start restic-clean
Or/etc/restic/restic-repo-clean.sh
5) Check logs restic-clean service
journalctl -u restic-clean
Ortail -f /var/log/restic.log
Output is like:```
-- Logs begin at Tue 2021-12-28 10:38:54 UTC, end at Tue 2021-12-28 10:53:57 UTC. --
Dec 28 10:52:20 server systemd[1]: Starting Restic check and purge...
Dec 28 10:52:20 server restic-repo-clean.sh[2807]: Dec 28 2021 10:52:20 UTC: restic-repo-clean started
Dec 28 10:52:20 server restic-repo-clean.sh[2811]: ---------------------------------------------------------------
----------------
Dec 28 10:52:20 server restic-repo-clean.sh[2813]: using temporary cache in /tmp/restic-check-cache-652678859
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: create exclusive lock for repository
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: load indexes
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: check all packs
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: check snapshots, trees and blobs
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: no errors were found
Dec 28 10:52:21 server restic-repo-clean.sh[2813]: [0:00] 100.00% 3 / 3 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: Applying Policy: keep all snapshots within 30d of the newest
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: keep 1 snapshots:
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ID Time Host Tags Reasons
Paths
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
---------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: dc362721 2021-12-28 10:50:03 server within 3
0d /root
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
---------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: 1 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: keep 1 snapshots:
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ID Time Host Tags Reasons
Paths
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
---------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: 8bc0e3ea 2021-12-28 10:50:01 server within 3
0d /etc
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
---------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: 1 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: keep 1 snapshots:
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ID Time Host Tags Reasons
Paths
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
------------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: bd7c3e4f 2021-12-28 10:50:02 server within 3
0d /var/log
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: ---------------------------------------------------------------
------------
Dec 28 10:52:22 server restic-repo-clean.sh[2825]: 1 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: loading indexes...
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: loading all snapshots...
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: finding data that is still in use for 3 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: [0:00] 100.00% 3 / 3 snapshots
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: searching used packs...
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: collecting packs for deletion and repacking
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: [0:00] 100.00% 8 / 8 packs processed
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: to repack: 0 blobs / 0 B
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: this removes 0 blobs / 0 B
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: to delete: 0 blobs / 0 B
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: total prune: 0 blobs / 0 B
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: remaining: 301 blobs / 1.071 MiB
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: unused size after prune: 0 B (0.00% of remaining size)
Dec 28 10:52:22 server restic-repo-clean.sh[2836]: done
Dec 28 10:52:22 server restic-repo-clean.sh[2847]: ---------------------------------------------------------------
----------------
Dec 28 10:52:22 server restic-repo-clean.sh[2849]: Dec 28 2021 10:52:22 UTC: restic-repo-clean finished
Dec 28 10:52:22 server systemd[1]: restic-clean.service: Succeeded.
Dec 28 10:52:22 server systemd[1]: Finished Restic check and purge.
```
Dependencies
------------None
Example Playbook
----------------The following playbook install restic, and schedule backup of `/etc`, `/var/log` and `/root` directories.
As backend uses a S3 repository (`s3:https://10.11.0.1:9091/restic`) and to validate SSL certificates from S3 server installs a CA cert load from `certicates/CA.pem`.
```yml
- name: Configure backup
hosts: server
become: true
gather_facts: true
pre_tasks:
- name: Load tls key and cert
set_fact:
restic_ca_cert: "{{ lookup('file','certificates/CA.pem') }}"
roles:
- role: ricsanfre.backup
restic_repository: "s3:https://10.11.0.1:9091/restic"
restic_aws_access_key_id: restic
restic_aws_secret_access_key: supers1cret0
restic_use_ca_cert: true
restic_backups_dirs:
- path: '/etc'
- path: '/var/log'
- path: '/root'
exclude:
- pattern: '.cache'
- pattern: '.ignore'
```The configure restic to perform the backup of the same directories but using Google Drive as backend.
```yml
- name: Configure backup
hosts: instance
become: true
gather_facts: true
vars:
- restic_user: "root"
- restic_group: "root"
- google_service_account: ""
- restic_user_home: ""
pre_tasks:
- name: Load service account json file
set_fact:
google_service_account: "{{ lookup('file','files/google_service_account.json') | from_json }}"
- name: Get Home directory of restic_user
getent:
database: passwd
key: "{{ restic_user }}"
split: ":"
- name: Set restic user home directory
set_fact:
restic_user_home: "{{ getent_passwd[restic_user][4] }}"
- name: Create gdrive config directory
file:
path: "{{ restic_user_home }}/.gdrive"
state: directory
owner: "{{ restic_user }}"
group: "{{ restic_group }}"
mode: 0750
- name: Copy service account json file to rclone config directory
copy:
dest: "{{ restic_user_home }}/.gdrive/google_service_account.json"
content: "{{ google_service_account | to_nice_json }}"
owner: "{{ restic_user }}"
group: "{{ restic_user }}"
mode: 0644
roles:
- role: ricsanfre.backup
restic_repository: "rclone:gdrive:backup"
restic_aws_access_key_id: restic
restic_aws_secret_access_key: supers1cret0
rclone_install: true
rclone_configure: true
rclone_config_file: |
[gdrive]
type = drive
scope = drive
service_account_file = {{ restic_user_home }}/.gdrive/google_service_account.json
team_drive =
restic_backups_dirs:
- path: '/etc'
- path: '/var/log'
- path: '/root'
exclude:
- pattern: '.cache'
- pattern: '.ignore
```
This playbook expects to find google's service account in json format in `files/google_service_account.json`License
-------MIT
Author Information
------------------Created by Ricardo Sanchez (ricsanfre) highly inspired by this [project](https://github.com/angristan/ansible-restic) by [angristan](https://github.com/angristan).
Code completely refactored and updated to work properly with S3 repository (i.e. Minio) and with ARM architecture. Also added rclone's backends support.
Changes and improvements:
- Restic backup and purge activities are splitted into two different systemd services that can be scheduled independetly to avoid locking issues.
- S3 backend issues solved: repo initialization and the use of custom CA/selfsigned certificates in the communication.
- Restic installation installation process is architecture agnostic (supporting x86 and ARM architectures). Original code supported only x86 architectures.
- Adding support to rclone's backends