Storing a Local Backup File

This page describes how to manually store a backup file in case a local copy is needed.

Create and Download Backup File

By default, backup files are encrypted with a secret key generated by the a9s Backup Manager. To be able to download the backup, the user has to set up an encryption key.

To know how to create an encryption key and how to download it on the Download a Backup page.

Decrypting Backup Files

With the file downloaded, you can decrypt it with the following command:

$ cat <encrypted-backup-file> | openssl enc -aes256 -d -pass 'pass:<encryption-key>' > <decrypted-backup-file>.gz

The file will still be compressed, so you will need to decompress it:

$ cat <decrypted-backup-file>.gz | gunzip -c > <backup-file-name>

Every service creates the backup according to its architecture (single vs cluster) and backup type (logical, continuous archiving etc).

Each service provides tools that handle the data by itself. For this reason, the output of this command can be a still zipped file, POSIX tar archive, a binary file, or a plain text file.

To know how to proceed, click the service below for more details:

You can also check the header of the file to decide how to decompress it.

$ file <backup-file-name>
  • POSIX tar archive (GNU): A tar archive. Use tar -xvf <backup-file-name> to extract the content
  • gzip compressed data: A gzip file. Use gunzip <backup-file-name> to extract the content
  • data: Binary or plain text data ready for use.

Be careful here, since the output of this command can be multiple files.

At this point, you will have your local backup ready to be manually restored in another place.