Backups Done Right with Restic

... or at least good enough!
Restic (https://restic.net/ ) is a modern backup program designed to back up your files. Written in Go, it can be compiled and used on Linux, Windows, macOS, and BSD systems. Restic features end-to-end encryption, supports a wide range of storage backends, and includes deduplication for backed-up files.
I use Restic nightly to back up my cloud servers, ensuring that the last 30 days' worth of data is always accessible in case of data loss. Here’s how I set it up and why I believe it's secure and reliable enough for most normal use cases. My setup includes multiple cloud servers hosted by Netcup (https://www.netcup.com ) and a small homelab with several terabytes of storage.
On the homelab server, I run Restic’s REST server (https://github.com/restic/rest-server ), which offers an HTTP API for the Restic client to upload data.
Why Use the Restic REST Server?
The primary advantage of using Restic's REST server over other backends is its support for append-only mode. This feature ensures that once data is uploaded, it cannot be deleted or altered, minimizing risks associated with potential security breaches.
Restic Rest-Server setup
I use Docker and Docker Compose on all my servers to orchestrate and install software. Here’s my docker-compose.yml
file for setting up the Restic REST server:
version: "2"
services:
restic-server:
image: restic/rest-server:latest
restart: unless-stopped
environment:
- OPTIONS=--append-only --private-repos
volumes:
- /mnt/raid/restic-server:/data:rw
networks:
- frp
networks:
frp:
external: true
By default, the Restic REST server uses a .htaccess
file in the /data
directory to enable basic authentication for API endpoints.
Making It Available from Outside
To make my homelab services accessible from outside, I use FRP (https://github.com/fatedier/frp ) as a reverse proxy. On the homelab side, I run an FRP client inside a Docker container:
version: "3"
services:
frp:
image: snowdreamtech/frpc:latest
restart: "unless-stopped"
volumes:
- "./frpc.toml:/etc/frp/frpc.toml:ro"
networks:
- frp
networks:
frp:
name: frp
external: true
The frpc.toml
configuration file lists the endpoints to be proxied:
serverAddr = "example.com"
serverPort = 1234
auth.method = "token"
auth.token = "abc123"
[[proxies]]
name = "restic"
type = "tcp"
remotePort = 3078
localPort = 8000
localIp = "restic-server"
transport.useEncryption = true
transport.useCompression = true
On one of the cloud servers, I run an FRP server that exposes services via Traefik (a reverse proxy). Here’s a Docker Compose file for setting up the FRP server:
version: '2'
services:
frps:
image: snowdreamtech/frps:latest
ports:
- "1234:1234/tcp"
- "1234:1234/udp"
restart: "unless-stopped"
user: 1001:1001
labels:
- "traefik.enable=true"
- "traefik.http.routers.relay-restic.rule=Host(`restic.example.com`)"
- "traefik.http.routers.relay-restic.entrypoints=websecure"
- "traefik.http.routers.relay-restic.tls.certresolver=le"
- "traefik.http.routers.relay-restic.service=relay-restic"
- "traefik.http.services.relay-restic.loadbalancer.server.port=3078"
- "traefik.docker.network=traefik-pub"
volumes:
- "./frps.toml:/frps.toml:ro"
command: "-c /frps.toml"
networks:
- traefik-pub
networks:
traefik-pub:
external: true
The traefik-pub
network is configured within the Traefik Docker Compose stack and encapsulates all web services made available by Traefik. I'll not go into detail here on how to configure traefik with lets encrypt and https.
The corresponding frps.toml looks like this:
bindPort = 1234
auth.method = "token"
auth.token = "abc123"
transport.tls.force = true
Setting Up the Restic Client
To perform backups, I use the Restic CLI. A cron job invokes the backup script nightly:
#!/bin/bash
source ./homelab.env
## Backing up basic configs
restic backup /srv
restic backup /etc
...
The homelab.env
file contains the endpoint and credentials for the reverse-proxied Restic REST server:
#!/bin/bash
export RESTIC_REPOSITORY=rest:https://user:pass@restic.example.com/server1/
export RESTIC_PASSWORD="encryption-key"
The RESTIC_PASSWORD
is used to end-to-end encrypt backup data.
Managing Backup Retention
To manage retention policies, I run a cron job nightly on the homelab server that uses --keep-within 30d
to remove snapshots older than 30 days:
export RESTIC_REPOSITORY="/mnt/raid/restic-server/server1"
export RESTIC_PASSWORD="encryption-key"
restic forget --keep-within 30d --prune
This setup ensures that my backups are both secure and reliable, providing peace of mind for data protection.