Microsoft Azureįor the Azure storage, enter the container name and the access key. Granting Duplicacy the required permissions to access your Google Cloud Storage files, orīy downloading a service account credential file directly from Google. Google Cloud StorageĪn access token file issued by Google is needed to access Google Cloud Storage. The access key and the secret key must also be provided. To use the Amazon S3 storage, you must first specify the bucket name. The Keep prior versions for this number of days option will work too if the number of days is more than 7. Lifecyle rules of the bucket is recommended to be set to Keep all versions of the file which is the default one. Please note that if you back up multiple repositories to the same B2 bucket, the Once the storage is chosen, a combobox on theĬonfiguration page will become visible to allow you to select the number of uploading threads. The Backblaze B2 storage is currently the only storage that supports multithreaded uploading. Backblaze B2įor the Backblaze B2 storage, the bucket name, the account id, and the application key must be provided. Required, you can click the button next to the private key file text field to select the private key file (which cannot have a blank passphrase due toĪ limitation of the underlying go SSH library). #Duplicacy change encryption password passwordIf the SFTP server supports password login, the password used to log into the server must be supplied. If a customer port other than the default 22 is used, enter the server address in the format of host:port. SFTPįor the SFTP storage, the server address, the username, and the remote directory must be specified. If you decide to use a local disk for the storage, you just need to select a directory using the system default dialog. #Duplicacy change encryption password macBeing a cloud backup tool, Duplicacy supports many majorĬloud storage providers (and even more are coming), but you can also use local disks or any SFTP servers (such as a Mac or Linux computer, or a NAS box): Local disk Storage SelectionĪfter selecting the repository to be backed up, you need to decide where the backup should be stored. Therefore, the order in which patterns are added is significantįor instance, if you want to exclude all *.log files except the ones under the dir1 directory, the patterns shouldīe dir1/*.log and -*.log, in that order. If a match is found, the corresponding include or exclude action is taken, For each file or directory, the list of supplied patterns are checked one by one in the given order.So -path1/ will exclude the directory named path1, but not the file with the same name Patterns ending with / are applied to directories only,. #Duplicacy change encryption password windows
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |