| .github/workflows | ||
| defaults | ||
| files | ||
| meta | ||
| molecule/default | ||
| tasks | ||
| templates | ||
| vars | ||
| .ansible-lint | ||
| .gitignore | ||
| .yamllint | ||
| LICENSE | ||
| README.md | ||
| requirements-dev.txt | ||
Ansible Role: BorgBackup Client
Set up encrypted, compressed and deduplicated backups using BorgBackup and Borgmatic. Currently supports Debian/Ubuntu, CentOS/Red Hat/Fedora, Archlinux and Manjaro.
Works great with BorgBase.com - Simple and Secure Hosting for your Borg Repositories. To manage BorgBase repos via Ansible, also see Andy Hawkins' BorgBase Collection.
Main features:
- Set up Borg and Borgmatic
- Add systemd timer random time
- Provision new remote BorgBase.com repo for storing backups (optional)
Example Playbook with root as backup user
- hosts: webservers
  roles:
  - role: m3nu.ansible_role_borgbackup
    borg_encryption_passphrase: CHANGEME
    borg_repository: m5vz9gp4@m5vz9gp4.repo.borgbase.com:repo
    borgmatic_timer: systemd
    borg_source_directories:
      - /srv/www
      - /var/lib/automysqlbackup
    borg_exclude_patterns:
      - /srv/www/old-sites
    borg_retention_policy:
      keep_hourly: 3
      keep_daily: 7
      keep_weekly: 4
      keep_monthly: 6
    borgmatic_hooks:
      before_backup:
      - echo "`date` - Starting backup."
      postgresql_databases:
      - name: users
        hostname: database1.example.org
        port: 5433
Example Playbook with service user
- hosts: webservers
  roles:
  - role: m3nu.ansible_role_borgbackup
    borg_encryption_passphrase: CHANGEME
    borg_repository: m5vz9gp4@m5vz9gp4.repo.borgbase.com:repo
    borgmatic_timer: systemd
    borg_ssh_key_file: "{{ backup_user_info.home }}/.ssh/backup"
    borg_ssh_command: "ssh -i {{ borg_ssh_key_file }} -o StrictHostKeyChecking=no"
    borgmatic_timer: systemd
    borgbackup_user: "srv_backup"
    borgbackup_group: "srv_backup"
    borg_source_directories:
      - /srv/www
      - /var/lib/automysqlbackup
    borg_exclude_patterns:
      - /srv/www/old-sites
    borg_retention_policy:
      keep_hourly: 3
      keep_daily: 7
      keep_weekly: 4
      keep_monthly: 6
    borgmatic_hooks:
      before_backup:
      - echo "`date` - Starting backup."
      postgresql_databases:
      - name: users
        hostname: database1.example.org
        port: 5433
Fullautomated Playbook with service user -> this has sudo power
- name: Configure backup
  hosts: test.lab
  pre_tasks:
  - name: Get home of {{ borgbackup_user }}
    ansible.builtin.user:
      name: "{{ borgbackup_user }}"
      state: present
    register: user_info
    changed_when: false
    check_mode: true  # Important, otherwise user will be created
  - name: Save the user_info, we need them for the home_dir
    ansible.builtin.set_fact:
      backup_user_info: "{{ user_info }}"
  vars_files: []
  vars:
    borg_encryption_passphrase: "CHANGEME"
    borg_repository: "USER@TARGET_SERVER:/PATH/TO/BACKUP"
    borgbackup_user: "srv_backup"
    borgbackup_group: "srv_backup"
    borg_repository: "{{ vault_borg.backup_user }}@{{ backup_server }}:{{ backup_path }}/{{ ansible_host }}"
    borg_ssh_key_file: "{{ backup_user_info.home }}/.ssh/backup"
    borg_ssh_command: "ssh -i {{ borg_ssh_key_file }} -o StrictHostKeyChecking=no"
    borgmatic_timer: systemd
    borg_source_directories:
      - /srv/www
      - /var/lib/automysqlbackup
    borg_exclude_patterns:
      - /srv/www/old-sites
    borg_retention_policy:
      keep_hourly: 3
      keep_daily: 7
      keep_weekly: 4
      keep_monthly: 6
    borgmatic_hooks:
      before_backup:
      - echo "`date` - Starting backup."
  tasks:
    - name: Configure Borg Backup and Backupmatic
      tags:
        - always
        - install_backup
      ansible.builtin.include_role:
        name: ansible_role_borgbackup
        apply:
          tags:
            - always
    - name: Copy SSH-Key to Target {{ borg_repository }} and Init Repo
      tags:
        - never
        - backup_init_repo
      block:
        - name: Read ssh key
          ansible.builtin.slurp:
            src: "{{ backup_user_info.home }}/.ssh/backup.pub"
          register: backup_local_ssh_key
        - name: Set authorized key taken from file
          ansible.posix.authorized_key:
            # example:
            #   borg_repository: m5vz9gp4@m5vz9gp4.repo.borgbase.com:repo
            #   have three parts: "username"@"FQDN":"path/to/store/backup", specific:
            #     a) user: m5vz9gp4
            #     b) fqdn: m5vz9gp4.repo.borgbase.co
            #     c) dir: repo
            user: "{{ borg_repository | regex_search('(.*)@', '\\1') | first }}" # part a)
            state: present
            key: "{{ backup_local_ssh_key['content'] | b64decode }}"
          delegate_to: "{{ borg_repository | regex_search('@(.*):', '\\1') | first }}" # part b)
        - name: Init repository
          ansible.builtin.command:
            cmd: "su - {{ borgbackup_user }} -c '/usr/local/bin/borgmatic rcreate --encryption keyfile --append-only'"
    - name: Activate systemd service and timer
      when:
        - borgmatic_timer is defined and borgmatic_timer == "systemd"
      tags:
        - never
        - backup_init_repo
      block:
        - name: Populate service facts
          ansible.builtin.service_facts:
        - name: Start borgmatic services
          ansible.builtin.systemd:
            name: "{{ item }}"
            state: started
            enabled: true
            masked: false
            daemon_reload: true
          when: "item in services"
          with_items:
            - borgmatic.service
        
        # bug: Need own section without masked else the timer are skipped
        - name: Start borgmatic timers
          ansible.builtin.systemd:
            name: "{{ item }}"
            state: started
            enabled: true
            daemon_reload: true
          with_items:
            - "borgmatic.timer"
Installation
Download from Ansible Galaxy
$ ansible-galaxy install m3nu.ansible_role_borgbackup
Clone latest version from Github
$ git clone https://github.com/borgbase/ansible-role-borgbackup.git roles/ansible_role_borgbackup
Tags:
This Role supports the following ansible tags:
- install_backup: Tag for only run that part.
- backup_install_helperTag to additionally install the backup helper skripts. Currently only docker.
Example
To install the helper scrit.
$ ANSIBLE_STDOUT_CALLBACK=yaml ansible-playbook test.example.com -t backup_install_helper
Role Variables
Required Arguments
- borg_repository: Full path to repository. Your own server or BorgBase.com repo. Not required when using auto creation of repositories. Can be a list if you want to backup to multiple repositories.
Optional Arguments
- 
borg_dep_packages: Dependancy Packages to installborg(backup)andborgmatic.
- 
borg_distro_packages: contains the names of distributions packages forborg(backup)andborgmatic, only used ifborg_install_methodis set topackage.
- 
borg_encryption_passcommand: The standard output of this command is used to unlock the encryption key.
- 
borg_encryption_passphrase: Password to use for repokey or keyfile. Empty if repo is unencrypted.
- 
borg_exclude_from: Read exclude patterns from one or more separate named files, one pattern per line.
- 
borg_exclude_patterns: Paths or patterns to exclude from backup. See official documentation for more.
- 
borg_install_method: By defaultpipis used to install borgmatic. To install via your distributions package manager set this topackageand (if needed) overwrite theborg_distro_packagesvariable to contain your distributions package names required to install borgmatic. Note that many distributions ship outdated versions of borgbackup and borgmatic; use at your own risk.
- 
borg_lock_wait_time: Config maximum seconds to wait for acquiring a repository/cache lock. Defaults to 5 seconds.
- 
borg_one_file_system: Don't cross file-system boundaries. Defaults totrue
- 
borg_pip_packages: Dependancy Packages (pip) to installborg(backup)andborgmatic.
- 
borg_remote_path: Path to the borg executable on the remote. It will default toborg.
- 
borg_remote_rate_limit: Remote network upload rate limit in kiBytes/second.
- 
borg_retention_policy: Retention policy for how many backups to keep in each category (daily, weekly, monthly, etc).
- 
borg_source_directories: List of local folders to back up. Default is/etc/hostnameto prevent an empty backup.
- 
borg_ssh_key_file: SSH-key to be used. Default~/.ssh/backup
- 
borg_ssh_command: Command to use instead of just "ssh". This can be used to specify ssh options.
- 
borg_ssh_key_type: The algorithm used to generate the SSH private key. Choose:rsa,dsa,rsa1,ecdsa,ed25519. Default:rsa
- 
borg_version: Force a specific borg version to be installed
- 
borg_venv_path: Path to store the venv forborg(backup)andborgmatic
- 
borgmatic_check_last: Number of archives to check. Defaults to3
- 
borgmatic_checks: List of consistency checks. Defaults to['repository']
- 
borgmatic_config_name: Name to use for the borgmatic config file. Defaults toconfig.yaml
- 
borgmatic_timer_hour: Hour when regular create and prune cron/systemd-timer job will run. Defaults to{{ 6 | random }}
- 
borgmatic_timer_minute: Minute when regular create and prune cron/systemd-timer job will run. Defaults to{{ 59 | random }}
- 
borgmatic_hooks: Hooks to monitor your backups e.g. with Healthchecks. See official documentation for more.
- 
borgmatic_timer: If the variable is set, a timer is installed. A choice must be made betweencronandsystemd.
- 
borgmatic_relocated_repo_access_is_ok: Bypass Borg error about a repository that has been moved. Defaults tofalse
- 
borgmatic_store_atime: Store atime into archive. Defaults totrue
- 
borgmatic_store_ctime: Store ctime into archive. Defaults totrue
- 
borgmatic_version: Force a specific borgmatic version to be installed
- 
borgbackup_user: Name of the User to create Backups (Service Account)
- 
borgbackup_group: Name of the Group to create Backups (Service Account)
Contributing
Pull requests (PR) are welcome, as long as they add features that are relevant for a meaningful number of users. All PRs are tested for style and functionality. To run tests locally (needs Docker):
$ pip install -r requirements-dev.txt
$ molecule test
License
MIT/BSD
Author
© 2018-2023 Manuel Riel and contributors.