Ahsay How To:
Decrypt Local Copy backup data (3142)
Product Version:
AhsayOBS / AhsayOBM: Pre-7.3.2.0
OS: All platforms
Description:
Step by step on how to decrypt Local Copy backup data.
AhsayOBM (GUI)
To decrypt data backed up by the Local Copy module:
1. Login to the AhsayOBM user interface.
2. Select the Decrypt Local Copy Wizard icon located at the bottom left corner:
Decrypt Local Copy Wizard is for user to restore / decrypt Local Copy backed up data. The Restore button (common mistake) is only for restoration of off-site backed up data (backed up data stored on AhsayOBS):
3. Select the corresponding Local Copy backup set, then press Next
4. Select the data to be decrypted, and the decrypt destination.
AhsayOBM (no GUI)
For AhsayOBM installation on operating system with no graphical user interface (Linux platforms):
Edit the Decrypt.sh script file with a text editor:
Decrypt.sh
...
# ------------------------------------------------------------------------ ID_DIR ------------------------------------------------------------------------
# | Path to the backup set ID directory
# | e.g. ID_DIR="/john/files/1119083740107"
...
# ---------------------------------------------------------------------------------------------------------------------------------------------------------
ID_DIR=""
# -------------------------------------------------------------------- DECRYPT_TO --------------------------------------------------------------------
# | Directory to where you want files to be decrypted
...
# ---------------------------------------------------------------------------------------------------------------------------------------------------------
DECRYPT_TO=""
...
Note:
The script file can be found within the installation bin directory.
Edit the ID_DIR, DECRYPT_TO, DECRYPT_FROM, POINT_IN_TIME, DECRYPT_KEY and other values in accordance to your requirement.
Decrypt.sh (Updated)
...
# ------------------------------------------------------------------------ ID_DIR ------------------------------------------------------------------------
# | Path to the backup set ID directory
# | e.g. ID_DIR="/john/files/1119083740107"
...
# ---------------------------------------------------------------------------------------------------------------------------------------------------------
ID_DIR="/LC_Destination/hostname/username/files/1384422012192"
# -------------------------------------------------------------------- DECRYPT_TO --------------------------------------------------------------------
# | Directory to where you want files to be decrypted
...
# ---------------------------------------------------------------------------------------------------------------------------------------------------------
DECRYPT_TO="/Decrypt_Destination"
...
Refer to the following table for definition of each variables:
Variable Name
Definition
ID_DIR
Path to the backup set ID directory.
Example
ID_DIR="/LC_Destination/hostname/username/files/1384422012192"
DECRYPT_TO
Directory to where you want files to be decrypted to.
Example
DECRYPT_TO=/tmp/decrypt_destination
DECRYPT_FROM
File / Directory on the backup server that you would like to decrypt (client path).
Example
If the backup source of the Local Copy backup is '/Data/folder1', to decrypt all data
under 'folder1', then specify DECRYPT_FROM="/Data/folder1"
POINT_IN_TIME
The point-in-time snapshot that you want to decrypt.
Example
POINT_IN_TIME="Current" for the latest backup snapshot.
DECRYPT_KEY
Encrypting key of the backup set.
Example
DECRYPT_KEY="abc123"
RESTORE_PERMISSION
If you would like to restore the files' permission.
Example
RESTORE_PERMISSION="Y" to restore files' permission.
SKIP_INVALID_KEY
If you want to skip decrypt file with invalid key, or prompt user to input the correct key.
Example
SKIP_INVALID_KEY="Y" to skip decrypt file with invalid key.
SYNC_OPTION
If you want to enable the Delete Extra Files option (it is recommended to disable this option).
Example
SYNC_OPTION="N"
REPLACE_EXISTING_FILE
If you want to skip or replace existing files with same file name.
Example
REPLACE_EXISTING_FILE="-all" to replace all existing files with same name.
REPLACE_EXISTING_FILE="-none" to skip decrypt of all existing files with same name.
REPLACE_EXISTING_FILE="" to prompt for selection.
FILTER
Filter what type of file to be decrypted. Refer to the script itself (open the script a text editor) for details.
Execute the script via terminal.
Comments
0 comments
Article is closed for comments.