Display Duplicati 2.0.2.1 beta command line help

Duplicati includes build in help with the command-line tool. While it can be viewed in the web interface using the “Commandline…” feature, that’s not always the best place to see the results (sometimes they scroll off the screen).

So if you want to see them yourself, you’ll need to open a command prompt / shell / terminal windows and run the commands manually. For example, in a standard Windows install you’d likely want to run:

“C:\Program Files\Duplicati 2\Duplicati.CommandLine.exe” help

For specifics on a particular command, such as backup, you’d run:

“C:\Program Files\Duplicati 2\Duplicati.CommandLine.exe” help backup


For those that aren’t comfortable with command lines, here’s the output of a few of the calls…


Duplicati.CommandLine.exe help

Duplicati 2.0.2.1_beta options
See duplicati.commandline.exe help <topic> for more information.
  General: example, changelog
  Commands: backup, find, restore, delete, compact, test, compare, purge
  Reparing: repair, affected, list-broken-files, purge-broken-files
  Debugging: debug, logging, create-report, test-filters, system-info,
  send-mail
  Targets: aftp, amzcd, azure, b2, box, cloudfiles, dropbox, file, ftp,
  googledrive, gcs, hubic, jottacloud, mega, onedrive, openstack, s3, od4b,
  mssp, ssh, tahoe, webdav
  Modules: aes, gpg, zip, 7z, console-password-input, mssql-options,
  hyperv-options, http-options, sendhttp, sendmail, runscript, sendxmpp,
  check-mono-ssl
  Formats: date, time, size, encryption, compression
  Advanced: mail, advanced, returncodes, filter, <option>

http://www.duplicati.com/              Version:  - 2.0.2.1_beta_2017-08-01

Duplicati.CommandLine.exe example

Duplicati 2.0.2.1_beta example
Make an encrypted backup
========================
  The following command will make an encrypted backup and store it on an FTP
  server. As no passphrase is specified, the user is prompted for a password.
  The upload speed is throttled to 500kB/s. Backups older than one month are
  considered old. Old backups are deleted automatically. The maximum file
  size is limited to 50MB (default).

  "Duplicati.CommandLine.exe" backup
  ftp://me:example.com@ftp.example.com/target "D:\source" --throttle=500kB

Search for files in a backup
============================
  The backup can be searched for specific files. The following command returns
  all files "D:\source\file.txt" of the last backup. File names can also
  contain the wildcards * and ?.

  "Duplicati.CommandLine.exe" find ftp://me:example.com@ftp.example.com/target
  "D:\source\file.txt"

Restore a specific file
=======================
  The following command will restore "D:\source\file.txt" from the backup in
  the latest version to its original destination and overwrite an existing
  file.

  "Duplicati.CommandLine.exe" restore
  ftp://me:example.com@ftp.example.com/target "D:\source\file.txt"
  --overwrite~~~

Duplicati.CommandLine.exe help options

Duplicati 2.0.2.1_beta parameters
Duplicati offers more options than listed in the other topics. Those
additional options should only be used with care. For normal operation none
of them should ever be required. Here is a complete list of options supported
by Duplicati:


  --allow-full-removal = false
    By default, the last fileset cannot be removed. This is a safeguard to
    make sure that all remote data is not deleted by a configuration mistake.
    Use this flag to disable that protection, such that all filesets can be
    deleted.

  --allow-missing-source = false
    Use this option to continue even if some source entries are missing.

  --allow-passphrase-change = false
    Use this option to allow the passphrase to change, note that this option
    is not permitted for a backup or repair operation

  --allow-sleep = false
    Allow system to enter sleep power modes for inactivity during
    backup/restore operations (Windows/OSX only)

  --all-versions = false
    When searching for files, only the most recent backup is searched. Use
    this option to show all previous versions too.

  --asynchronous-upload-folder = C:\Users\jmv\AppData\Local\Temp\
    The pre-generated volumes will be placed into the temporary folder by
    default, this option can set a different folder for placing the temporary
    volumes, despite the name, this also works for synchronous runs

  --asynchronous-upload-limit = 4
    When performing asynchronous uploads, Duplicati will create volumes that
    can be uploaded. To prevent Duplicati from generating too many volumes,
    this option limits the number of pending uploads. Set to zero to disable
    the limit

  --auto-cleanup = false
    If a backup is interrupted there will likely be partial files present on
    the backend. Using this flag, Duplicati will automatically remove such
    files when encountered.

  --auto-update = false
    Set this option if you prefer to have the commandline version
    automatically update

  --backup-name = Duplicati.CommandLine
    A display name that is attached to this backup. Can be used to identify
    the backup when sending mail or running scripts.

  --backup-test-samples = 1
    After a backup is completed, some files are selected for verification on
    the remote backend. Use this option to change how many. If this value is
    set to 0 or the option --no-backend-verification is set, no remote files
    are verified

  --block-hash-algorithm = SHA256
    This is a very advanced option! This option can be used to select a block
    hash algorithm with smaller or larger hash size, for performance or
    storage space reasons.

  --blocksize = 100kb
    The block size determines how files are fragmented. Choosing a large value
    will cause a larger overhead on file changes, choosing a small value will
    cause a large overhead on storage of file lists. Note that the value
    cannot be changed after remote files are created.

  --changed-files
    This option can be used to limit the scan to only files that are known to
    have changed. This is usually only activated in combination with a
    filesystem watcher that keeps track of file changes.

  --check-filetime-only = false
    This flag instructs Duplicati to not look at metadata or filesize when
    deciding to scan a file for changes. Use this option if you have a large
    number of files and notice that the scanning takes a long time with
    unmodified files.

  --compression-extension-file =
    J:\PortableApps\Duplicati\default_compressed_extensions.txt
    This property can be used to point to a text file where each line contains
    a file extension that indicates a non-compressible file. Files that have
    an extension found in the file will not be compressed, but simply stored
    in the archive. The file format ignores any lines that do not start with
    a period, and considers a space to indicate the end of the extension. A
    default file is supplied, that also serves as an example. The default
    file is placed in
    J:\PortableApps\Duplicati\default_compressed_extensions.txt.

  --compression-module = zip
    Duplicati supports pluggable compression modules. Use this option to
    select a module to use for compression. This is only applied when
    creating new volumes, when reading an existing file, the filename is used
    to select the compression module.

  --control-files = false
    Use control files

  --dblock-size = 50mb
    This option can change the maximum size of dblock files. Changing the size
    can be useful if the backend has a limit on the size of each individual
    file

  --dbpath
    Path to the file containing the local cache of the remote file database

  --debug-output = false
    Activating this option will make some error messages more verbose, which
    may help you track down a particular issue

  --debug-retry-errors = false
    When an error occurs, Duplicati will silently retry, and only report the
    number of retries. Enable this option to have the error messages
    displayed when a retry is performed.

  --deleted-files
    This option can be used to supply a list of deleted files. This option
    will be ignored unless the option --changed-files is also set.

  --disable-autocreate-folder = false
    If Duplicati detects that the target folder is missing, it will create it
    automatically. Activate this option to prevent automatic folder creation.

  --disable-filepath-cache = true
    Reduce memory footprint by disabling in-memory lookups

  --disable-filetime-check = false
    The operating system keeps track of the last time a file was written.
    Using this information, Duplicati can quickly determine if the file has
    been modified. If some application deliberately modifies this
    information, Duplicati won't work correctly unless this flag is set.

  --disable-module
    Supply one or more module names, separated by commas to unload them

  --disable-piped-streaming = false
    Use this option to disable multithreaded handling of up- and downloads,
    that can significantly speed up backend operations depending on the
    hardware you're running on and the transfer rate of your backend.

  --disable-streaming-transfers = false
    Enabling this option will disallow usage of the streaming interface, which
    means that transfer progress bars will not show, and bandwidth throttle
    settings will be ignored.

  --disable-synthetic-filelist = false
    If Duplicati detects that the previous backup did not complete, it will
    generate a filelist that is a merge of the last completed backup and the
    contents that were uploaded in the incomplete backup session.

  --disable-time-tolerance = false
    When matching timestamps, Duplicati will adjust the times by a small
    fraction to ensure that minor time differences do not cause unexpected
    updates. If the option ----keep-time is set to keep a week of backups,
    and the backup is made the same time each week, it is possible that the
    clock drifts slightly, such that full week has just passed, causing
    Duplicati to delete the older backup earlier than expected. To avoid
    this, Duplicati inserts a 1% tolerance (max 1 hour). Use this option to
    disable the tolerance, and use strict time checking

  --dont-compress-restore-paths = false
    When restore a subset of a backup into a new folder, the shortest possible
    path is used to avoid generating deep paths with empty folders. Use this
    flag to skip this compression, such that the entire original folder
    structure is preserved, including upper level empty folders.

  --dont-read-manifests = false
    This option will make sure the contents of the manifest file are not read.
    This also implies that file hashes are not checked either. Use only for
    disaster recovery.

  --dry-run = false
    This option can be used to experiment with different settings and observe
    the outcome without changing actual files.

  --enable-module
    Supply one or more module names, separated by commas to load them

  --encryption-module = aes
    Duplicati supports pluggable encryption modules. Use this option to select
    a module to use for encryption. This is only applied when creating new
    volumes, when reading an existing file, the filename is used to select
    the encryption module.

  --exclude
    Exclude files that match this filter. The special character * means any
    number of character, and the special character ? means any single
    character, use *.txt to exclude all files with a txt extension. Regular
    expressions are also supported and can be supplied by using hard braces,
    i.e. [.*\.txt].

  --exclude-files-attributes
    Use this option to exclude files with certain attributes. Use a comma
    separated list of attribute names to specify more than one. Possible
    values are: ReadOnly, Hidden, System, Directory, Archive, Device, Normal,
    Temporary, SparseFile, ReparsePoint, Compressed, Offline,
    NotContentIndexed, Encrypted, IntegrityStream, NoScrubData

  --file-hash-algorithm = SHA256
    This is a very advanced option! This option can be used to select a file
    hash algorithm with smaller or larger hash size, for performance or
    storage space reasons.

  --file-read-buffer-size = 0kb
    Use this size to control how many bytes a read from a file before
    processing

  --force-locale
    By default, your system locale and culture settings will be used. In some
    cases you may prefer to run with another locale, for example to get
    messages in another language. This option can be used to set the locale.
    Supply a blank string to choose the "Invariant Culture".

  --full-block-verification = false
    Use this option to increase verification by checking the hash of blocks
    read from a volume before patching restored files with the data.

  --full-remote-verification = false
    After a backup is completed, some files are selected for verification on
    the remote backend. Use this option to turn on full verification, which
    will decrypt the files and examine the insides of each volume, instead of
    simply verifying the external hash, If the option
    --no-backend-verification is set, no remote files are verified. This
    option is automatically set when then verification is performed directly.

  --full-result = false
    Use this option to increase the amount of output generated as the result
    of the operation, including all filenames.

  --hardlink-policy = All
    Use this option to handle hardlinks (only works on Linux/OSX). The "first"
    option will record a hardlink ID for each hardlink to avoid storing
    hardlinked paths multiple times. The option "all" will ignore hardlink
    information, and treat each hardlink as a unique path. The option "none"
    will ignore all hardlinks with more than one link.

  --include
    Include files that match this filter. The special character * means any
    number of character, and the special character ? means any single
    character, use *.txt to include all files with a txt extension. Regular
    expressions are also supported and can be supplied by using hard braces,
    i.e. [.*\.txt].

  --index-file-policy = Full
    The index files are used to limit the need for downloading dblock files
    when there is no local database present. The more information is recorded
    in the index files, the faster operations can proceed without the
    database. The tradeoff is that larger index files take up more remote
    space and which may never be used.

  --keep-time
    Use this option to set the timespan in which backups are kept.

  --keep-versions = 0
    Use this option to set number of versions to keep, supply -1 to keep all
    versions

  --list-folder-contents = false
    When searching for files, all matching files are returned. Use this option
    to return only the entries found in the folder specified as filter.

  --list-prefix-only = false
    When searching for files, all matching files are returned. Use this option
    to return only the largest common prefix path.

  --list-sets-only = false
    Use this option to only list filesets and avoid traversing file names and
    other metadata which slows down the process

  --list-verify-uploads = false
    Verify uploads by listing contents

  --log-file
    Log internal information

  --log-level = Warning
    Specifies the amount of log information to write into the file specified
    by --log-file

  --log-retention = 30D
    Set the time after which log data will be purged from the database.

  --no-auto-compact = false
    If a large number of small files are detected during a backup, or wasted
    space is found after deleting backups, the remote data will be compacted.
    Use this option to disable such automatic compacting and only compact
    when running the compact command.

  --no-backend-verification = false
    If this flag is set, the local database is not compared to the remote
    filelist on startup. The intended usage for this option is to work
    correctly in cases where the filelisting is broken or unavailable.

  --no-connection-reuse = false
    Duplicati will attempt to perform multiple operations on a single
    connection, as this avoids repeated login attempts, and thus speeds up
    the process. This option can be used to ensure that each operation is
    performed on a seperate connection

  --no-encryption = false
    If you store the backups on a local disk, and prefer that they are kept
    unencrypted, you can turn of encryption completely by using this switch.

  --no-local-blocks = false
    Duplicati will attempt to use data from source files to minimize the
    amount of downloaded data. Use this option to skip this optimization and
    only use remote data.

  --no-local-db = false
    When listing contents or when restoring files, the local database can be
    skipped. This is usually slower, but can be used to verify the actual
    contents of the remote store

  --number-of-retries = 5
    If an upload or download fails, Duplicati will retry a number of times
    before failing. Use this to handle unstable network connections better.

  --overwrite = false
    Use this option to overwrite target files when restoring, if this option
    is not set the files will be restored with a timestamp and a number
    appended.

  --parameters-file
    This option can be used to store some or all of the options given to the
    commandline client. The file must be a plain text file, UTF-8 encoding is
    preferred. Each line in the file should be of the format --option=value.
    The special options --source and --target can be used to override the
    localpath and the remote destination uri, respectively. The options in
    this file take precedence over the options provided on the commandline.
    You cannot specify filters in both the file and on the commandline.
    Instead, you can use the special --replace-filter, --append-filter, or
    --prepend-filter options to specify filters inside the parameter file.
    Each filter must be prefixed with either a + or a -, and multiple filters
    must be joined with ;

  --passphrase
    Supply a passphrase that Duplicati will use to encrypt the backup volumes,
    making them unreadable without the passphrase. This variable can also be
    supplied through the environment variable PASSPHRASE.

  --patch-with-local-blocks = false
    Enable this option to look into other files on this machine to find
    existing blocks. This is a fairly slow operation but can limit the size
    of downloads.

  --prefix = duplicati
    A string used to prefix the filenames of the remote volumes, can be used
    to store multiple backups in the same remote folder. The prefix cannot
    contain a hyphen (-), but can contain all other characters allowed by the
    remote storage.

  --quiet-console = false
    If this option is set, progress reports and other messages that would
    normally go to the console will be redirected to the log.

  --quota-size
    This value can be used to set a known upper limit on the amount of space a
    backend has. If the backend reports the size itself, this value is
    ignored

  --repair-only-paths = false
    Use this option to build a searchable local database which only contains
    path information. This option is usable for quickly building a database
    to locate certain content without needing to reconstruct all information.
    The resulting database can be searched, but cannot be used to restore
    data with.

  --restore-path
    By default, files will be restored in the source folders, use this option
    to restore to another folder

  --restore-permissions = false
    By default permissions are not restored as they might prevent you from
    accessing your files. Use this option to restore the permissions as well.

  --retry-delay = 10s
    After a failed transmission, Duplicati will wait a short period before
    attempting again. This is useful if the network drops out occasionally
    during transmissions.

  --skip-file-hash-checks = false
    If the hash for the volume does not match, Duplicati will refuse to use
    the backup. Supply this flag to allow Duplicati to proceed anyway.

  --skip-files-larger-than
    This option allows you to exclude files that are larger than the given
    value. Use this to prevent backups becoming extremely large.

  --skip-metadata = false
    Use this option to disable the storage of metadata, such as file
    timestamps. Disabling metadata storage will speed up the backup and
    restore operations, but does not affect file size much.

  --skip-restore-verification = false
    After restoring files, the file hash of all restored files are checked to
    verify that the restore was successful. Use this option to disable the
    check and avoid waiting for the verification.

  --small-file-max-count = 20
    To avoid filling the remote storage with small files, this value can force
    grouping small files. The small volumes will always be combined when they
    can fill an entire volume.

  --small-file-size
    When examining the size of a volume in consideration for compacting, a
    small tolerance value is used, by default 20 percent of the volume size.
    This ensures that large volumes which may have a few bytes wasted space
    are not downloaded and rewritten.

  --snapshot-policy = off
    This setting controls the usage of snapshots, which allows Duplicati to
    backup files that are locked by other programs. If this is set to "off",
    Duplicati will not attempt to create a disk snapshot. Setting this to
    "auto" makes Duplicati attempt to create a snapshot, and fail silently if
    that was not allowed or supported. A setting of "on" will also make
    Duplicati attempt to create a snapshot, but will produce a warning
    message in the log if it fails. Setting it to "required" will make
    Duplicati abort the backup if the snapshot creation fails. On windows
    this uses the Volume Shadow Copy Services (VSS) and requires
    administrative privileges. On Linux this uses Logical Volume Management
    (LVM) and requires root privileges.

  --store-metadata = true
    Stores metadata, such as file timestamps and attributes. This increases
    the required storage space as well as the processing time.

  --symlink-policy = Store
    Use this option to handle symlinks differently. The "store" option will
    simply record a symlink with its name and destination, and a restore will
    recreate the symlink as a link. Use the option "ignore" to ignore all
    symlinks and not store any information about them. Previous versions of
    Duplicati used the setting "follow", which will cause symlinked files to
    be included and restore as normal files.

  --synchronous-upload = false
    Duplicati will upload files while scanning the disk and producing volumes,
    which usually makes the backup faster. Use this flag to turn the behavior
    off, so that Duplicati will wait for each volume to complete.

  --tempdir = C:\Users\jmv\AppData\Local\Temp\
    Duplicati will use the system default temporary folder. This option can be
    used to supply an alternative folder for temporary storage. Note that
    SQLite will always put temporary files in the system default temporary
    folder. Consider using the TMPDIR environment variable on Linux to set
    the temporary folder for both Duplicati and SQLite.

  --thread-priority = normal
    Selects another thread priority for the process. Use this to set Duplicati
    to be more or less CPU intensive.

  --threshold = 25
    As files are changed, some data stored at the remote destination may not
    be required. This option controls how much wasted space the destination
    can contain before being reclaimed. This value is a percentage used on
    each volume and the total storage.

  --throttle-download = 0kb
    By setting this value you can limit how much bandwidth Duplicati consumes
    for downloads. Setting this limit can make the backups take longer, but
    will make Duplicati less intrusive.

  --throttle-upload = 0kb
    By setting this value you can limit how much bandwidth Duplicati consumes
    for uploads. Setting this limit can make the backups take longer, but
    will make Duplicati less intrusive.

  --time = now
    By default, Duplicati will list and restore files from the most recent
    backup, use this option to select another item. You may use relative
    times, like "-2M" for a backup from two months ago.

  --upload-unchanged-backups = false
    If no files have changed, Duplicati will not upload a backup set. If the
    backup data is used to verify that a backup was executed, this option
    will make Duplicati upload a backupset even if it is empty

  --upload-verification-file = false
    Use this option to upload a verification file after changing the remote
    storage. The file is not encrypted and contains the size and SHA256
    hashes of all the remote files and can be used to verify the integrity of
    the files.

  --usn-policy = off
    This setting controls the usage of NTFS USN numbers, which allows
    Duplicati to obtain a list of files and folders much faster. If this is
    set to "off", Duplicati will not attempt to use USN. Setting this to
    "auto" makes Duplicati attempt to use USN, and fail silently if that was
    not allowed or supported. A setting of "on" will also make Duplicati
    attempt to use USN, but will produce a warning message in the log if it
    fails. Setting it to "required" will make Duplicati abort the backup if
    the USN usage fails. This feature is only supported on Windows and
    requires administrative privileges.

  --verbose = false
    Use this option to increase the amount of output generated when running an
    option. Generally this option will produce a line for each file
    processed.

  --version
    By default, Duplicati will list and restore files from the most recent
    backup, use this option to select another item. You may enter multiple
    values separated with comma, and ranges using -, e.g. "0,2-4,7" .

  --vss-exclude-writers
    Use this option to exclude faulty writers from a snapshot. This is
    equivalent to the -wx flag of the vshadow.exe tool, except that it only
    accepts writer class GUIDs, and not component names or instance GUIDs.
    Multiple GUIDs must be separated with a semicolon, and most forms of
    GUIDs are allowed, including with and without curly braces.

  --vss-use-mapping = false
    Activate this option to map VSS snapshots to a drive (similar to SUBST,
    using Win32 DefineDosDevice). This will create temporary drives that are
    then used to access the contents of a snapshot. This workaround can speed
    up file access on Windows XP.
1 Like

Well, it turns out all of 2.0.2.1_beta’s built in help is 3x larger than allowed content on a Topic…and a .txt file isn’t an allowed uploadable format (for now)…so I’ll try putting this stuff here as 3 separate Topics.

If this works out and people are happy with it I’ll try to do the same for the latest canary version as well.

Duplicati v2.0.2.1_beta Part 1/4

Duplicati command line help summary.

Duplicati.CommandLine.exe help help


See duplicati.commandline.exe help <topic> for more information.
  General: example, changelog
  Commands: backup, find, restore, delete, compact, test, compare, purge
  Reparing: repair, affected, list-broken-files, purge-broken-files
  Debugging: debug, logging, create-report, test-filters, system-info,
  send-mail
  Targets: aftp, amzcd, azure, b2, box, cloudfiles, dropbox, file, ftp,
  googledrive, gcs, hubic, jottacloud, mega, onedrive, openstack, s3, od4b,
  mssp, ssh, tahoe, webdav
  Modules: aes, gpg, zip, 7z, console-password-input, mssql-options,
  hyperv-options, http-options, sendhttp, sendmail, runscript, sendxmpp,
  check-mono-ssl
  Formats: date, time, size, encryption, compression
  Advanced: mail, advanced, returncodes, filter, <option>

http://www.duplicati.com/              Version:  - 2.0.2.1_beta_2017-08-01




Duplicati.CommandLine.exe help 7z

7z Archive (.7z):
 7z Archive with LZMA2 support.
 Supported options:
  --lzma-thread-count (Integer): Number of threads used in compression
    The number of threads used in LZMA 2 compression. Defaults to the number
    of processor cores.
    * default value: 2
  --7z-compression-level (Enumeration): Sets the 7z compression level
    This option controls the compression level used. A setting of zero gives
    no compression, and a setting of 9 gives maximum compression.
    * values: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
    * default value: 5
  --7z-compression-fast-algorithm (Boolean): Sets the 7z fast algorithm usage
    This option controls the compression algorithm used. Enabling this option
    will cause 7z to use the fast algorithm, which produces slightly less
    compression.
    * default value: False

Duplicati.CommandLine.exe help advanced


Duplicati offers more options than listed in the other topics. Those
additional options should only be used with care. For normal operation none
of them should ever be required. Here is a complete list of options supported
by Duplicati:

  --allow-full-removal = false
    By default, the last fileset cannot be removed. This is a safeguard to
    make sure that all remote data is not deleted by a configuration mistake.
    Use this flag to disable that protection, such that all filesets can be
    deleted.
  --allow-missing-source = false
    Use this option to continue even if some source entries are missing.
  --allow-passphrase-change = false
    Use this option to allow the passphrase to change, note that this option
    is not permitted for a backup or repair operation
  --allow-sleep = false
    Allow system to enter sleep power modes for inactivity during
    backup/restore operations (Windows/OSX only)
  --all-versions = false
    When searching for files, only the most recent backup is searched. Use
    this option to show all previous versions too.
  --asynchronous-upload-folder = C:\Users\JMVDW\AppData\Local\Temp\
    The pre-generated volumes will be placed into the temporary folder by
    default, this option can set a different folder for placing the temporary
    volumes, despite the name, this also works for synchronous runs
  --asynchronous-upload-limit = 4
    When performing asynchronous uploads, Duplicati will create volumes that
    can be uploaded. To prevent Duplicati from generating too many volumes,
    this option limits the number of pending uploads. Set to zero to disable
    the limit
  --auto-cleanup = false
    If a backup is interrupted there will likely be partial files present on
    the backend. Using this flag, Duplicati will automatically remove such
    files when encountered.
  --auto-update = false
    Set this option if you prefer to have the commandline version
    automatically update
  --backup-name = Duplicati.CommandLine
    A display name that is attached to this backup. Can be used to identify
    the backup when sending mail or running scripts.
  --backup-test-samples = 1
    After a backup is completed, some files are selected for verification on
    the remote backend. Use this option to change how many. If this value is
    set to 0 or the option --no-backend-verification is set, no remote files
    are verified
  --block-hash-algorithm = SHA256
    This is a very advanced option! This option can be used to select a block
    hash algorithm with smaller or larger hash size, for performance or
    storage space reasons.
  --blocksize = 100kb
    The block size determines how files are fragmented. Choosing a large value
    will cause a larger overhead on file changes, choosing a small value will
    cause a large overhead on storage of file lists. Note that the value
    cannot be changed after remote files are created.
  --changed-files
    This option can be used to limit the scan to only files that are known to
    have changed. This is usually only activated in combination with a
    filesystem watcher that keeps track of file changes.
  --check-filetime-only = false
    This flag instructs Duplicati to not look at metadata or filesize when
    deciding to scan a file for changes. Use this option if you have a large
    number of files and notice that the scanning takes a long time with
    unmodified files.
  --compression-extension-file = C:\Program Files\Duplicati
    2\default_compressed_extensions.txt
    This property can be used to point to a text file where each line contains
    a file extension that indicates a non-compressible file. Files that have
    an extension found in the file will not be compressed, but simply stored
    in the archive. The file format ignores any lines that do not start with
    a period, and considers a space to indicate the end of the extension. A
    default file is supplied, that also serves as an example. The default
    file is placed in C:\Program Files\Duplicati
    2\default_compressed_extensions.txt.
  --compression-module = zip
    Duplicati supports pluggable compression modules. Use this option to
    select a module to use for compression. This is only applied when
    creating new volumes, when reading an existing file, the filename is used
    to select the compression module.
  --control-files = false
    Use control files
  --dblock-size = 50mb
    This option can change the maximum size of dblock files. Changing the size
    can be useful if the backend has a limit on the size of each individual
    file
  --dbpath
    Path to the file containing the local cache of the remote file database
  --debug-output = false
    Activating this option will make some error messages more verbose, which
    may help you track down a particular issue
  --debug-retry-errors = false
    When an error occurs, Duplicati will silently retry, and only report the
    number of retries. Enable this option to have the error messages
    displayed when a retry is performed.
  --deleted-files
    This option can be used to supply a list of deleted files. This option
    will be ignored unless the option --changed-files is also set.
  --disable-autocreate-folder = false
    If Duplicati detects that the target folder is missing, it will create it
    automatically. Activate this option to prevent automatic folder creation.
  --disable-filepath-cache = true
    Reduce memory footprint by disabling in-memory lookups
  --disable-filetime-check = false
    The operating system keeps track of the last time a file was written.
    Using this information, Duplicati can quickly determine if the file has
    been modified. If some application deliberately modifies this
    information, Duplicati won't work correctly unless this flag is set.
  --disable-module
    Supply one or more module names, separated by commas to unload them
  --disable-piped-streaming = false
    Use this option to disable multithreaded handling of up- and downloads,
    that can significantly speed up backend operations depending on the
    hardware you're running on and the transfer rate of your backend.
  --disable-streaming-transfers = false
    Enabling this option will disallow usage of the streaming interface, which
    means that transfer progress bars will not show, and bandwidth throttle
    settings will be ignored.
  --disable-synthetic-filelist = false
    If Duplicati detects that the previous backup did not complete, it will
    generate a filelist that is a merge of the last completed backup and the
    contents that were uploaded in the incomplete backup session.
  --disable-time-tolerance = false
    When matching timestamps, Duplicati will adjust the times by a small
    fraction to ensure that minor time differences do not cause unexpected
    updates. If the option ----keep-time is set to keep a week of backups,
    and the backup is made the same time each week, it is possible that the
    clock drifts slightly, such that full week has just passed, causing
    Duplicati to delete the older backup earlier than expected. To avoid
    this, Duplicati inserts a 1% tolerance (max 1 hour). Use this option to
    disable the tolerance, and use strict time checking
  --dont-compress-restore-paths = false
    When restore a subset of a backup into a new folder, the shortest possible
    path is used to avoid generating deep paths with empty folders. Use this
    flag to skip this compression, such that the entire original folder
    structure is preserved, including upper level empty folders.
  --dont-read-manifests = false
    This option will make sure the contents of the manifest file are not read.
    This also implies that file hashes are not checked either. Use only for
    disaster recovery.
  --dry-run = false
    This option can be used to experiment with different settings and observe
    the outcome without changing actual files.
  --enable-module
    Supply one or more module names, separated by commas to load them
  --encryption-module = aes
    Duplicati supports pluggable encryption modules. Use this option to select
    a module to use for encryption. This is only applied when creating new
    volumes, when reading an existing file, the filename is used to select
    the encryption module.
  --exclude
    Exclude files that match this filter. The special character * means any
    number of character, and the special character ? means any single
    character, use *.txt to exclude all files with a txt extension. Regular
    expressions are also supported and can be supplied by using hard braces,
    i.e. [.*\.txt].
  --exclude-files-attributes
    Use this option to exclude files with certain attributes. Use a comma
    separated list of attribute names to specify more than one. Possible
    values are: ReadOnly, Hidden, System, Directory, Archive, Device, Normal,
    Temporary, SparseFile, ReparsePoint, Compressed, Offline,
    NotContentIndexed, Encrypted, IntegrityStream, NoScrubData
  --file-hash-algorithm = SHA256
    This is a very advanced option! This option can be used to select a file
    hash algorithm with smaller or larger hash size, for performance or
    storage space reasons.
  --file-read-buffer-size = 0kb
    Use this size to control how many bytes a read from a file before
    processing
  --force-locale
    By default, your system locale and culture settings will be used. In some
    cases you may prefer to run with another locale, for example to get
    messages in another language. This option can be used to set the locale.
    Supply a blank string to choose the "Invariant Culture".
  --full-block-verification = false
    Use this option to increase verification by checking the hash of blocks
    read from a volume before patching restored files with the data.
  --full-remote-verification = false
    After a backup is completed, some files are selected for verification on
    the remote backend. Use this option to turn on full verification, which
    will decrypt the files and examine the insides of each volume, instead of
    simply verifying the external hash, If the option
    --no-backend-verification is set, no remote files are verified. This
    option is automatically set when then verification is performed directly.
  --full-result = false
    Use this option to increase the amount of output generated as the result
    of the operation, including all filenames.
  --hardlink-policy = All
    Use this option to handle hardlinks (only works on Linux/OSX). The "first"
    option will record a hardlink ID for each hardlink to avoid storing
    hardlinked paths multiple times. The option "all" will ignore hardlink
    information, and treat each hardlink as a unique path. The option "none"
    will ignore all hardlinks with more than one link.
  --include
    Include files that match this filter. The special character * means any
    number of character, and the special character ? means any single
    character, use *.txt to include all files with a txt extension. Regular
    expressions are also supported and can be supplied by using hard braces,
    i.e. [.*\.txt].
  --index-file-policy = Full
    The index files are used to limit the need for downloading dblock files
    when there is no local database present. The more information is recorded
    in the index files, the faster operations can proceed without the
    database. The tradeoff is that larger index files take up more remote
    space and which may never be used.
  --keep-time
    Use this option to set the timespan in which backups are kept.
  --keep-versions = 0
    Use this option to set number of versions to keep, supply -1 to keep all
    versions
  --list-folder-contents = false
    When searching for files, all matching files are returned. Use this option
    to return only the entries found in the folder specified as filter.
  --list-prefix-only = false
    When searching for files, all matching files are returned. Use this option
    to return only the largest common prefix path.
  --list-sets-only = false
    Use this option to only list filesets and avoid traversing file names and
    other metadata which slows down the process
  --list-verify-uploads = false
    Verify uploads by listing contents
  --log-file
    Log internal information
  --log-level = Warning
    Specifies the amount of log information to write into the file specified
    by --log-file
  --log-retention = 30D
    Set the time after which log data will be purged from the database.
  --no-auto-compact = false
    If a large number of small files are detected during a backup, or wasted
    space is found after deleting backups, the remote data will be compacted.
    Use this option to disable such automatic compacting and only compact
    when running the compact command.
  --no-backend-verification = false
    If this flag is set, the local database is not compared to the remote
    filelist on startup. The intended usage for this option is to work
    correctly in cases where the filelisting is broken or unavailable.
  --no-connection-reuse = false
    Duplicati will attempt to perform multiple operations on a single
    connection, as this avoids repeated login attempts, and thus speeds up
    the process. This option can be used to ensure that each operation is
    performed on a seperate connection
  --no-encryption = false
    If you store the backups on a local disk, and prefer that they are kept
    unencrypted, you can turn of encryption completely by using this switch.
  --no-local-blocks = false
    Duplicati will attempt to use data from source files to minimize the
    amount of downloaded data. Use this option to skip this optimization and
    only use remote data.
  --no-local-db = false
    When listing contents or when restoring files, the local database can be
    skipped. This is usually slower, but can be used to verify the actual
    contents of the remote store
  --number-of-retries = 5
    If an upload or download fails, Duplicati will retry a number of times
    before failing. Use this to handle unstable network connections better.
  --overwrite = false
    Use this option to overwrite target files when restoring, if this option
    is not set the files will be restored with a timestamp and a number
    appended.
  --parameters-file
    This option can be used to store some or all of the options given to the
    commandline client. The file must be a plain text file, UTF-8 encoding is
    preferred. Each line in the file should be of the format --option=value.
    The special options --source and --target can be used to override the
    localpath and the remote destination uri, respectively. The options in
    this file take precedence over the options provided on the commandline.
    You cannot specify filters in both the file and on the commandline.
    Instead, you can use the special --replace-filter, --append-filter, or
    --prepend-filter options to specify filters inside the parameter file.
    Each filter must be prefixed with either a + or a -, and multiple filters
    must be joined with ;
  --passphrase
    Supply a passphrase that Duplicati will use to encrypt the backup volumes,
    making them unreadable without the passphrase. This variable can also be
    supplied through the environment variable PASSPHRASE.
  --patch-with-local-blocks = false
    Enable this option to look into other files on this machine to find
    existing blocks. This is a fairly slow operation but can limit the size
    of downloads.
  --prefix = duplicati
    A string used to prefix the filenames of the remote volumes, can be used
    to store multiple backups in the same remote folder. The prefix cannot
    contain a hyphen (-), but can contain all other characters allowed by the
    remote storage.
  --quiet-console = false
    If this option is set, progress reports and other messages that would
    normally go to the console will be redirected to the log.
  --quota-size
    This value can be used to set a known upper limit on the amount of space a
    backend has. If the backend reports the size itself, this value is
    ignored
  --repair-only-paths = false
    Use this option to build a searchable local database which only contains
    path information. This option is usable for quickly building a database
    to locate certain content without needing to reconstruct all information.
    The resulting database can be searched, but cannot be used to restore
    data with.
  --restore-path
    By default, files will be restored in the source folders, use this option
    to restore to another folder
  --restore-permissions = false
    By default permissions are not restored as they might prevent you from
    accessing your files. Use this option to restore the permissions as well.
  --retry-delay = 10s
    After a failed transmission, Duplicati will wait a short period before
    attempting again. This is useful if the network drops out occasionally
    during transmissions.
  --skip-file-hash-checks = false
    If the hash for the volume does not match, Duplicati will refuse to use
    the backup. Supply this flag to allow Duplicati to proceed anyway.
  --skip-files-larger-than
    This option allows you to exclude files that are larger than the given
    value. Use this to prevent backups becoming extremely large.
  --skip-metadata = false
    Use this option to disable the storage of metadata, such as file
    timestamps. Disabling metadata storage will speed up the backup and
    restore operations, but does not affect file size much.
  --skip-restore-verification = false
    After restoring files, the file hash of all restored files are checked to
    verify that the restore was successful. Use this option to disable the
    check and avoid waiting for the verification.
  --small-file-max-count = 20
    To avoid filling the remote storage with small files, this value can force
    grouping small files. The small volumes will always be combined when they
    can fill an entire volume.
  --small-file-size
    When examining the size of a volume in consideration for compacting, a
    small tolerance value is used, by default 20 percent of the volume size.
    This ensures that large volumes which may have a few bytes wasted space
    are not downloaded and rewritten.
  --snapshot-policy = off
    This setting controls the usage of snapshots, which allows Duplicati to
    backup files that are locked by other programs. If this is set to "off",
    Duplicati will not attempt to create a disk snapshot. Setting this to
    "auto" makes Duplicati attempt to create a snapshot, and fail silently if
    that was not allowed or supported. A setting of "on" will also make
    Duplicati attempt to create a snapshot, but will produce a warning
    message in the log if it fails. Setting it to "required" will make
    Duplicati abort the backup if the snapshot creation fails. On windows
    this uses the Volume Shadow Copy Services (VSS) and requires
    administrative privileges. On Linux this uses Logical Volume Management
    (LVM) and requires root privileges.
  --store-metadata = true
    Stores metadata, such as file timestamps and attributes. This increases
    the required storage space as well as the processing time.
  --symlink-policy = Store
    Use this option to handle symlinks differently. The "store" option will
    simply record a symlink with its name and destination, and a restore will
    recreate the symlink as a link. Use the option "ignore" to ignore all
    symlinks and not store any information about them. Previous versions of
    Duplicati used the setting "follow", which will cause symlinked files to
    be included and restore as normal files.
  --synchronous-upload = false
    Duplicati will upload files while scanning the disk and producing volumes,
    which usually makes the backup faster. Use this flag to turn the behavior
    off, so that Duplicati will wait for each volume to complete.
  --tempdir = C:\Users\JMVDW\AppData\Local\Temp\
    Duplicati will use the system default temporary folder. This option can be
    used to supply an alternative folder for temporary storage. Note that
    SQLite will always put temporary files in the system default temporary
    folder. Consider using the TMPDIR environment variable on Linux to set
    the temporary folder for both Duplicati and SQLite.
  --thread-priority = normal
    Selects another thread priority for the process. Use this to set Duplicati
    to be more or less CPU intensive.
  --threshold = 25
    As files are changed, some data stored at the remote destination may not
    be required. This option controls how much wasted space the destination
    can contain before being reclaimed. This value is a percentage used on
    each volume and the total storage.
  --throttle-download = 0kb
    By setting this value you can limit how much bandwidth Duplicati consumes
    for downloads. Setting this limit can make the backups take longer, but
    will make Duplicati less intrusive.
  --throttle-upload = 0kb
    By setting this value you can limit how much bandwidth Duplicati consumes
    for uploads. Setting this limit can make the backups take longer, but
    will make Duplicati less intrusive.
  --time = now
    By default, Duplicati will list and restore files from the most recent
    backup, use this option to select another item. You may use relative
    times, like "-2M" for a backup from two months ago.
  --upload-unchanged-backups = false
    If no files have changed, Duplicati will not upload a backup set. If the
    backup data is used to verify that a backup was executed, this option
    will make Duplicati upload a backupset even if it is empty
  --upload-verification-file = false
    Use this option to upload a verification file after changing the remote
    storage. The file is not encrypted and contains the size and SHA256
    hashes of all the remote files and can be used to verify the integrity of
    the files.
  --usn-policy = off
    This setting controls the usage of NTFS USN numbers, which allows
    Duplicati to obtain a list of files and folders much faster. If this is
    set to "off", Duplicati will not attempt to use USN. Setting this to
    "auto" makes Duplicati attempt to use USN, and fail silently if that was
    not allowed or supported. A setting of "on" will also make Duplicati
    attempt to use USN, but will produce a warning message in the log if it
    fails. Setting it to "required" will make Duplicati abort the backup if
    the USN usage fails. This feature is only supported on Windows and
    requires administrative privileges.
  --verbose = false
    Use this option to increase the amount of output generated when running an
    option. Generally this option will produce a line for each file
    processed.
  --version
    By default, Duplicati will list and restore files from the most recent
    backup, use this option to select another item. You may enter multiple
    values separated with comma, and ranges using -, e.g. "0,2-4,7" .
  --vss-exclude-writers
    Use this option to exclude faulty writers from a snapshot. This is
    equivalent to the -wx flag of the vshadow.exe tool, except that it only
    accepts writer class GUIDs, and not component names or instance GUIDs.
    Multiple GUIDs must be separated with a semicolon, and most forms of
    GUIDs are allowed, including with and without curly braces.
  --vss-use-mapping = false
    Activate this option to map VSS snapshots to a drive (similar to SUBST,
    using Win32 DefineDosDevice). This will create temporary drives that are
    then used to access the contents of a snapshot. This workaround can speed
    up file access on Windows XP.


Duplicati.CommandLine.exe help aes

AES-256 encryption, built in (.aes):
 This module encrypts all files in the same way that AESCrypt does, using 256
 bit AES encryption.
 Supported options:
  --aes-set-threadlevel (Enumeration): Set thread level utilized for crypting
    (0-4)
    Use this option to set the thread level allowed for AES crypt operations.
    Valid values are 0 (uses default), or from 1 (no multithreading) to 4
    (max. multithreading)
    * values: 0, 1, 2, 3, 4
    * default value: 2

Duplicati.CommandLine.exe help affected


Usage: affected <storage-URL> <remote-filename> [<remote-filenames>]
[<options>]

  Returns a report explaining what backup sets and files are affected by a
  remote file. You can use this option to see what source files are affected
  if one or more remote files are damaged or deleted.



Duplicati.CommandLine.exe help aftp

Alternative FTP (aftp):
 This backend can read and write data to an FTP based backend using an
 alternative FTP client. Allowed formats are "aftp://hostname/folder" or
 "aftp://username:password@hostname/folder"
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --disable-upload-verify (Boolean): Disable upload verification
    To protect against network or server failures, every upload will be
    attempted to be verified. Use this option to disable this verification to
    make the upload faster but less reliable.
  --aftp-data-connection-type (Enumeration): Configure the FTP data connection
    type
    If this flag is set, the FTP data connection type will be changed to the
    selected option.
    * values: AutoPassive, PASV, PASVEX, EPSV, AutoActive, PORT, EPRT
    * default value: AutoPassive
  --aftp-encryption-mode (Enumeration): Configure the FTP encryption mode
    If this flag is set, the FTP encryption mode will be changed to the
    selected option.
    * values: None, Implicit, Explicit
    * default value: None
  --aftp-ssl-protocols (Flags): Configure the SSL policy to use when
    encryption is enabled
    This flag controls the SSL policy to use when encryption is enabled.
    * values: None, Ssl2, Ssl3, Tls, Default, Tls11, Tls12
    * default value: Default

Duplicati.CommandLine.exe help amzcd

Amazon Cloud Drive (amzcd):
 This backend can read and write data to Amazon Cloud Drive. Supported format
 is "amzcd://folder/subfolder".
 Supported options:
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=amzcd
  --amzcd-labels (String): The labels to set
    Use this option to set labels on the files and folders created
    * default value: duplicati,backup
  --amzcd-consistency-delay (Timespan): The consistency delay
    Amazon Cloud drive needs a small delay for results to stay consistent.
    * default value: 15s

Duplicati v2.0.2.1_beta Part 2/4

Duplicati.CommandLine.exe help azure

Azure blob (azure):
 This backend can read and write data to Azure blob storage.  Allowed formats
 are: "azure://bucketname"
 Supported options:
  --azure_account_name (String): The storage account name
    The Azure storage account name which can be obtained by clicking the
    "Manage Access Keys" button on the storage account dashboard
  --azure_access_key (Password): The access key
    The Azure access key which can be obtained by clicking the "Manage Access
    Keys" button on the storage account dashboard
  --azure_blob_container_name (String): The name of the storage container
    All files will be written to the container specified
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".

Duplicati.CommandLine.exe help b2

B2 Cloud Storage (b2):
 This backend can read and write data to the Backblaze B2 Cloud Storage.
 Allowed formats are: "b2://bucketname/prefix"
 Supported options:
  --b2-accountid (String): The "B2 Cloud Storage Account ID"
    The "B2 Cloud Storage Account ID" can be obtained after logging into your
    Backblaze account, this can also be supplied through the "auth-username"
    property
    * aliases: --auth-password
  --b2-applicationkey (Password): The "B2 Cloud Storage Application Key" can
    be obtained after logging into your Backblaze account, this can also be
    supplied through the "auth-password" property
    The "B2 Cloud Storage Application Key"
    * aliases: --auth-username
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --b2-create-bucket-type (String): The bucket type used when creating a
    bucket
    By default, a private bucket is created. Use this option to set the bucket
    type. Refer to the B2 documentation for allowed types
    * default value: allPrivate

Duplicati.CommandLine.exe help backup


Usage: backup <storage-URL> "<source-path>" [<options>]

  Makes a backup of <source-path> and stores it in <storage-URL>. The format
  for <storage-URL> is
    protocol://username:password@hostname:port/path?backend_option1=value1&bac
    kend_option2=value2.
  Multiple source paths can be specified if they are separated by a space.

  <username> must not contain : and <password> must not contain @. If they do,
  specify username and password using --auth-username and --auth-password, or
  url-encode them.

  --auth-password=<string>
    The password that is required to authenticate with the server the backup
    is stored on.
  --auth-username=<string>
    The username that is required to authenticate with the server the backup
    is stored on.
  --no-encryption=<boolean>
    Use this to make an unencrypted backup.
  --passphrase
    This is the passphrase that is used to encrypt all data before it is
    uploaded. If an empty passphrase is specified, the backup will not be
    encrypted. This is the same as using --no-encryption.
  --prefix=<string>
    Replaces the default "duplicati" with <string> in the file names of the
    backup files. It is required to specify different prefixes if multiple
    backups are stored in the same target folder.



Duplicati.CommandLine.exe help box

Box.com (box):
 This backend can read and write data to Box.com. Supported format is
 "box://folder/subfolder".
 Supported options:
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=box.com
  --box-delete-from-trash (Boolean): Force delete files
    After deleting a file, it may end up in the trash folder where it will be
    deleted after a grace period. Use this command to force immediate removal
    of delete files.

Duplicati.CommandLine.exe help changelog


Show the last changes to Duplicati
==================================
  Duplicati updates automatically when a newer version is available. The
  following command will show a list of versions and changes.

  "Duplicati.CommandLine.exe" changelog


Duplicati.CommandLine.exe help check-mono-ssl

Check for SSL certificates (check-mono-ssl):
 When running with Mono, this module will check if any certificates are
 installed and suggest installing them otherwise
 Module is loaded automatically, use --disable-module to prevent this

Duplicati.CommandLine.exe help cloudfiles

Rackspace CloudFiles (cloudfiles):
 Supports connections to the CloudFiles backend. Allowed formats is
 "cloudfiles://container/folder".
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --cloudfiles-username (String): Supplies the username used to authenticate
    with CloudFiles
    Supplies the username used to authenticate with CloudFiles.
    * aliases: --auth-username
  --cloudfiles-accesskey (Password): Supplies the access key used to connect
    to the server
    Supplies the API Access Key used to authenticate with CloudFiles.
    * aliases: --auth-password
  --cloudfiles-uk-account (Boolean): Use a UK account
    Duplicati will assume that the credentials given are for a US account, use
    this option if the account is a UK based account. Note that this is
    equivalent to setting
    --cloudfiles-authentication-url=https://lon.auth.api.rackspacecloud.com/v
    1.0.
  --cloudfiles-authentication-url (String): Provide another authentication URL
    CloudFiles use different servers for authentication based on where the
    account resides, use this option to set an alternate authentication URL.
    This option overrides --cloudfiles-uk-account.
    * default value: https://identity.api.rackspacecloud.com/auth

Duplicati.CommandLine.exe help compression


Duplicati offers various options for the used compression and encryption
modules.

  --encryption-module = aes, gpg
    The encryption module that is used to encrypt backups. Default is aes.
  --compression-module = zip, 7z
    The compression module that is used. Default is zip.
  --enable-module = console-password-input, mssql-options, hyperv-options,
    http-options, sendhttp, sendmail, runscript, sendxmpp, check-mono-ssl
    Enable a built-in generic module that is not enabled by default
  --disable-module = console-password-input, mssql-options, hyperv-options,
    http-options, sendhttp, sendmail, runscript, sendxmpp, check-mono-ssl
    Disable a built-in generic module that is enabled by default
  --passphrase
    Supply a passphrase that Duplicati will use to encrypt the backup volumes,
    making them unreadable without the passphrase. This variable can also be
    supplied through the environment variable PASSPHRASE.
  --no-encryption = false
    If you store the backups on a local disk, and prefer that they are kept
    unencrypted, you can turn of encryption completely by using this switch.


Duplicati.CommandLine.exe help console-password-input

Password prompt (console-password-input):
 This module will ask the user for an encryption password on the command line
 unless encryption is disabled or the password is supplied by other means
 Module is loaded automatically, use --disable-module to prevent this

Duplicati.CommandLine.exe help create-report


Usage: create-report <storage-URL> <output-file> [<options>]

  Analyses the backup and prepares a report with anonymous information. This
  report can be sent to the developers for a better analysis in case
  something went wrong.





Duplicati.CommandLine.exe help date


Duplicati supports absolute and relative dates and times:

  now --> The current time

  1234567890 --> A timestamp, seconds since 1970.

  "2009-03-26T08:30:00+01:00" --> An absolute date and time. You can also use
  the local date and time format of your system like e.g. "01-14-2000" or "01
  jan. 2004".

  Y, M, D, W, h, m, s --> Relative date and time: year, month, day, week,
  hour, minute, second. Example: 2M10D5h is now + 2 months + 10 days + 5
  hours.


Duplicati.CommandLine.exe help debug


Duplicati provides information for debugging and logging purposes. By default,
all debugging and logging is turned off.

  --debug-output
    Error messages are more verbose.
  --debug-retry-errors
    If something needs to be retried (e.g. upload failed) this will cause an
    entry in the log file.
  --log-file = <path>
    The path to the log file e.g. "D:\duplicati\log.txt".
  --log-level = Profiling | Information | Warning | Error
    Specifies the log level.



Duplicati.CommandLine.exe help delete


Usage: delete <storage-URL> [<options>]

  Marks old data deleted and removes outdated dlist files. A backup is deleted
  when it is older than <keep-time> or when there are more newer versions
  than <keep-versions>. Data is considered old, when it is not required from
  any existing backup anymore.

  --keep-time=<time>
    Marks data outdated that is older than <time>.
  --keep-versions=<int>
    Marks data outdated that is older than <int> versions.
  --version=<int>
    Deletes all files that belong to the specified version(s).
  --allow-full-removal
    Disables the protection against removing the final fileset




Duplicati.CommandLine.exe help dropbox

Dropbox (dropbox):
 This backend can read and write data to Dropbox. Supported format is
 "dropbox://folder/subfolder".
 Supported options:
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=dropbox

Duplicati.CommandLine.exe help encryption


Duplicati offers various options for the used compression and encryption
modules.

  --encryption-module = aes, gpg
    The encryption module that is used to encrypt backups. Default is aes.
  --compression-module = zip, 7z
    The compression module that is used. Default is zip.
  --enable-module = console-password-input, mssql-options, hyperv-options,
    http-options, sendhttp, sendmail, runscript, sendxmpp, check-mono-ssl
    Enable a built-in generic module that is not enabled by default
  --disable-module = console-password-input, mssql-options, hyperv-options,
    http-options, sendhttp, sendmail, runscript, sendxmpp, check-mono-ssl
    Disable a built-in generic module that is enabled by default
  --passphrase
    Supply a passphrase that Duplicati will use to encrypt the backup volumes,
    making them unreadable without the passphrase. This variable can also be
    supplied through the environment variable PASSPHRASE.
  --no-encryption = false
    If you store the backups on a local disk, and prefer that they are kept
    unencrypted, you can turn of encryption completely by using this switch.


Duplicati.CommandLine.exe help example


Make an encrypted backup
========================
  The following command will make an encrypted backup and store it on an FTP
  server. As no passphrase is specified, the user is prompted for a password.
  The upload speed is throttled to 500kB/s. Backups older than one month are
  considered old. Old backups are deleted automatically. The maximum file
  size is limited to 50MB (default).

  "Duplicati.CommandLine.exe" backup
  ftp://me:example.com@ftp.example.com/target "D:\source" --throttle=500kB

Search for files in a backup
============================
  The backup can be searched for specific files. The following command returns
  all files "D:\source\file.txt" of the last backup. File names can also
  contain the wildcards * and ?.

  "Duplicati.CommandLine.exe" find ftp://me:example.com@ftp.example.com/target
  "D:\source\file.txt"

Restore a specific file
=======================
  The following command will restore "D:\source\file.txt" from the backup in
  the latest version to its original destination and overwrite an existing
  file.

  "Duplicati.CommandLine.exe" restore
  ftp://me:example.com@ftp.example.com/target "D:\source\file.txt"
  --overwrite



Duplicati.CommandLine.exe help file


Duplicati can use the local file system to store backups. The following target
URL formats can be used:

  file://hostname/folder%20for%20backup
  file://\\server\folder%20for%20backup (UNC path)
  "C:\folder for backup"
  file://c:\folder%20for%20backup (Windows)
  file:///usr/pub/folder%20for%20backup (Linux)

Options:
  --auth-password
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --alternate-destination-marker
    This option only works when the --alternate-target-paths option is also
    specified. If there are alternate paths specified, this option indicates
    the name of a marker file that must be present in the folder. This can be
    used to handle situations where an external drive changes drive letter or
    mount point. By ensuring that a certain file exists, it is possible to
    prevent writing data to an unwanted external drive. The contents of the
    file are never examined, only file existence.
  --alternate-target-paths
    This option allows multiple targets to be specified. The primary target
    path is placed before the list of paths supplied with this option. Before
    starting the backup, each folder in the list is checked for existence and
    optionally the presence of the marker file supplied by
    --alternate-destination-marker. The first existing path that optionally
    contains the marker file is then used as the destination. Multiple
    destinations are separated with a ";". On Windows, the path may be a UNC
    path, and the drive letter may be substituted with an asterisk (*), eg.:
    "*:\backup", which will examine all drive letters. If a username and
    password is supplied, the same credentials are used for all destinations.
  --use-move-for-put
    When storing the file, the standard operation is to copy the file and
    delete the original. This sequence ensures that the operation can be
    retried if something goes wrong. Activating this option may cause the
    retry operation to fail.  This option has no effect unless the
    --disable-streaming-transfers options is activated.
  --force-smb-authentication
    If this option is set, any existing authentication against the remote
    share is dropped before attempting to authenticate



Duplicati.CommandLine.exe help filter


Duplicati can apply globbing and regex filter rules to backup and restore
specific files only. Globbing filters can be used in file names. To specify a
regex filter put the file name in [brackets].
  Globbing: *.txt
  Regex: [.*test\.txt]

Inside scripts and the commandline --parameters-file, where multiple filters
are supplied with a single option, filters must be prefixed with either a
plus (+) or a (-), for include and exclude respectively. Example:
  +*.txt;-[.*\.xyz];+*



Duplicati.CommandLine.exe help find


Usage: find <storage-URL> ["<filename>"] [<options>]

  Finds specific files in specific backups. If <filename> is specified, all
  occurrences of <filename> in the backup are listed. <filename> can contain
  * and ? as wildcards. File names in [brackets] are interpreted as regular
  expression. Latest backup is searched by default. If entire path is
  specified, all available versions of the file are listed. If no <filename>
  is specified, a list of all available backups is shown.

  --time=<time>
    Shows what the files looked like at a specific time. Absolute and relative
    times can be specified.
  --version=<int>
    Shows what the files looked like in a specific backup. If no version is
    specified the latest backup (version=0) will be used. If nothing is
    found, older backups will be searched automatically.
  --include=<string>
    Reduces the list of files in a backup to those that match the provided
    string. This is applied before the search is executed.
  --exclude=<string>
    Removes matching files from the list of files in a backup. This is applied
    before the search is executed.
  --all-versions=<boolean>
    Searches in all backup sets, instead of just searching the latest



Duplicati.CommandLine.exe help ftp


Duplicati can use FTP servers to store backups. The following target URL
formats can be used:
  ftp://hostname/folder

Options:
  --ftp-passive = false
    If this flag is set, the FTP connection is made in passive mode, which
    works better with some firewalls. If the "ftp-regular" flag is also set,
    this flag is ignored
  --ftp-regular = true
    If this flag is set, the FTP connection is made in active mode. Even if
    the "ftp-passive" flag is also set, the connection will be made in active
    mode
  --auth-password
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --use-ssl
    Use this flag to communicate using Secure Socket Layer (SSL) over ftp
    (ftps).
  --disable-upload-verify
    To protect against network failures, every upload will be attempted
    verified. Use this option to disable this verification to make the upload
    faster but less reliable.



Duplicati.CommandLine.exe help gcs

Google Cloud Storage (gcs):
 This backend can read and write data to Google Cloud Storage. Supported
 format is "googlecloudstore://bucket/folder".
 Supported options:
  --gcs-location (String): Specifies location option for creating a bucket
    This option is only used when creating new buckets. Use this option to
    change what region the data is stored in. Charges vary with bucket
    location. Known bucket locations:
(default): 
Europe: EU
United
    States: US
Asia: ASIA
Eastern Asia-Pacific: ASIA-EAST1
Central United
    States 1: US-CENTRAL1
Central United States 2: US-CENTRAL2
Eastern
    United States 1: US-EAST1
Eastern United States 2: US-EAST2
Eastern
    United States 3: US-EAST3
Western United States: US-WEST1
  --gcs-storage-class (String): Specifies storage class for creating a bucket
    This option is only used when creating new buckets. Use this option to
    change what storage type the bucket has. Charges and functionality vary
    with bucket storage class. Known storage classes:
(default): 
Europe:
    EU
United States: US
Asia: ASIA
Eastern Asia-Pacific:
    ASIA-EAST1
Central United States 1: US-CENTRAL1
Central United States
    2: US-CENTRAL2
Eastern United States 1: US-EAST1
Eastern United States
    2: US-EAST2
Eastern United States 3: US-EAST3
Western United States:
    US-WEST1
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=gcs
  --gcs-project (String): Specifies project for creating a bucket
    This option is only used when creating new buckets. Use this option to
    supply the project ID that the bucket is attached to. The project
    determines where usage charges are applied

Duplicati.CommandLine.exe help googledrive

Google Drive (googledrive):
 This backend can read and write data to Google Drive. Supported format is
 "googledrive://folder/subfolder".
 Supported options:
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=googledrive

Duplicati.CommandLine.exe help gpg


Duplicati is shipped with an interface to GNU Privacy Guard. It requires that
the gpg executable is available on the system. On Windows it is assumed that
this is in the default installation folder under program files, under Linux
and OSX it is assumed that the program is available via the PATH environment
variable. It is possible to supply the path to GPG using the
--gpg-program-path switch.

Options:
  --gpg-encryption-disable-armor = true
    The GPG encryption/decryption will use the --armor option for GPG to
    protect the files with armor. Specify this switch to remove the --armor
    option.
  --gpg-encryption-enable-armor = false
    Use this option to supply the --armor option to GPG. The files will be
    larger but can be sent as pure text files.
  --gpg-encryption-command = --symmetric
    Overrides the default GPG encryption command "--symmetric", normal usage
    is to request asymetric encryption with the setting --encrypt
  --gpg-decryption-command = --decrypt
    Overrides the GPG command supplied for decryption
  --gpg-encryption-switches
    Use this switch to specify any extra options to GPG. You cannot specify
    the --passphrase-fd option here. The --encrypt option is always
    specified.
  --gpg-decryption-switches
    Use this switch to specify any extra options to GPG. You cannot specify
    the --passphrase-fd option here. The --decrypt option is always
    specified.
  --gpg-program-path
    The path to the GNU Privacy Guard program. If not supplied, Duplicati will
    assume that the program "gpg" is available in the system path.



Duplicati.CommandLine.exe help http-options

Configure http requests (http-options):
 This module exposes a number of properties that can be used to change the way
 http requests are issued
 Module is loaded automatically, use --disable-module to prevent this
 Supported options:
  --disable-expect100-continue (Boolean): Disable the expect header
    The default HTTP request has the header "Expect: 100-Continue" attached,
    which allows some optimizations when authenticating, but also breaks some
    web servers, causing them to report "417 - Expectation failed"
    * default value: false
  --disable-nagling (Boolean): Disable nagling
    By default the http requests use the RFC 896 nagling algorithm to support
    transfer of small packages more efficiently.
    * default value: false
  --accept-specified-ssl-hash (String): Optionally accept a known SSL
    certificate
    If your server certificate is reported as invalid (eg. with self-signed
    certificates), you can supply the certificate hash to approve it anyway.
    The hash value must be entered in hex format without spaces. You can
    enter multiple hashes separated by commas.
  --accept-any-ssl-certificate (Boolean): Accept any server certificate
    Use this option to accept any server certificate, regardless of what
    errors it may have. Please use --accept-specified-ssl-hash instead,
    whenever possible.
  --oauth-url (String): Alternate OAuth URL
    Duplicati uses an external server to support the OAuth authentication
    flow. If you have set up your own Duplicati OAuth server, you can supply
    the refresh url.
    * default value: https://duplicati-oauth-handler.appspot.com/refresh
  --allowed-ssl-versions (Flags): Sets allowed SSL versions
    This option changes the default SSL versions allowed. This is an advanced
    option and should only be used if you want to enhance security or work
    around an issue with a particular SSL protocol.
    * values: Ssl3, Tls, Tls11, Tls12, SystemDefault
    * default value: SystemDefault,Ssl3,Tls

Duplicati.CommandLine.exe help hubic

HubiC (hubic):
 This backend can read and write data to HubiC. Supported format is
 "hubic://container/folder".
 Supported options:
  --authid (Password): The authorization code
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=hubic

Duplicati.CommandLine.exe help hyperv-options

Configure Hyper-V module (hyperv-options):
 This module works internaly to parse source parameters to backup Hyper-V
 virtual machines
 Module is loaded automatically, use --disable-module to prevent this

Duplicati.CommandLine.exe help jottacloud

Jottacloud (jottacloud):
 This backend can read and write data to Jottacloud using it's REST protocol.
 Allowed format is "jottacloud://folder/subfolder".
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --jottacloud-device (String): Supplies the backup device to use
    The backup device to use. Will be created if not already exists. You can
    manage your devices from the backup panel in the Jottacloud web
    interface. When you specify a custom device you should also specify the
    mount point to use on this device with the "jottacloud-mountpoint"
    option.
  --jottacloud-mountpoint (String): Supplies the mount point to use on the
    server
    The mount point to use on the server. The default is "Archive" for using
    the built-in archive mount point. Set this option to "Sync" to use the
    built-in synchronization mount point instead, or if you have specified a
    custom device with option "jottacloud-device" you are free to name the
    mount point as you like.

Duplicati.CommandLine.exe help list-broken-files


Usage: list-broken-files <storage-URL> [<options>]

  Checks the database for missing data that cause files not not be
  restoreable. Files can become unrestoreable if remote data files are defect
  or missing. Use the list-broken-files command to see what the
  purge-broken-files command will remove.

Usage: purge-broken-files <storage-URL> [<options>]

  Removes all files from the database and remote storage that are no longer
  restoreable. Use this operation with caution, and only if you cannot
  recover the missing remote files, but want to continue a backup. Even with
  missing remote files, it may be possible to restore parts of the files that
  will be removed with this command.

  --dry-run
    Performs the operation, but does not write changes to the local database
    or the remote storage



Duplicati.CommandLine.exe help logging


Duplicati provides information for debugging and logging purposes. By default,
all debugging and logging is turned off.

  --debug-output
    Error messages are more verbose.
  --debug-retry-errors
    If something needs to be retried (e.g. upload failed) this will cause an
    entry in the log file.
  --log-file = <path>
    The path to the log file e.g. "D:\duplicati\log.txt".
  --log-level = Profiling | Information | Warning | Error
    Specifies the log level.

Duplicati v2.0.2.1_beta 3/4

Duplicati.CommandLine.exe help mail


Duplicati can send email notifications after each operation. Use the send-mail
command to test this:

  "Duplicati.CommandLine.exe" send-mail --send-mail-to=<email-address>


  --send-mail-to=<email-address>
    Send an email to <email-address> after a backup. Valid formats are "Name
    <test@example.com>, Other <test2@example.com>, test3@example.com".
    Multiple addresses must be separated with a comma.
  --send-mail-from=<email-address>
    This is the sender address of the email that is sent.
  --send-mail-subject=<subject>
    This is the subject line of the email that is sent. E.g. this can be
    "Duplicati %OPERATIONNAME% Report"
  --send-mail-body=<body>
    The content of the email message. This should contain "%RESULT%".
  --send-mail-url=<smtp-url>
    A URL to connect to an SMTP server to send out an email. Example:
    "tls://smtp.example.com:587", "smtps://smtp.example.com:465" or
    "smtp://smtp.example.com:25"
  --send-mail-username=<username>
    Required username to authenticate with SMTP server.
  --send-mail-password=<password>
    Required password to authenticate with SMTP server.
  --send-mail-level=<level>
    When email messages are sent: "Success", "Warning", "Error" are possible.
  --send-mail-any-operation=true
    Also send emails after other operations like restore etc.

  Allowed placeholders are:
    %PARSEDRESULT%
      The parsed result op the operation: Success, Warning, Error
    %RESULT%
When used in the body, this is the result/log of the backup,
      When used in the subject line, this is the same as %PARSEDRESULT%
    %OPERATIONNAME%
The name of the operation, usually "backup", but could also be "restore"
etc.
    %REMOTEURL%
The backend url
    %LOCALPATH%
The path to the local folders involved (i.e. the folders being backed up)




Duplicati.CommandLine.exe help mega

mega.nz (mega):
 This backend can read and write data to Mega.co.nz. Allowed formats are:
 "mega://folder/subfolder"
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".

Duplicati.CommandLine.exe help mssp

Microsoft SharePoint (mssp):
 Supports connections to a SharePoint server (including OneDrive for
 Business). Allowed formats are
 "mssp://tennant.sharepoint.com/PathToWeb//BaseDocLibrary/subfolder" or
 "mssp://username:password@tennant.sharepoint.com/PathToWeb//BaseDocLibrary/s
 ubfolder". Use a double slash '//' in the path to denote the web from the
 documents library.
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --integrated-authentication (Boolean): Use windows integrated authentication
    to connect to the server
    If the server and client both supports integrated authentication, this
    option enables that authentication method. This is likely only available
    with windows servers and clients.
  --delete-to-recycler (Boolean): Move deleted files to the recycle bin
    Use this option to have files moved to the recycle bin folder instead of
    removing them permanently when compacting or deleting backups.
  --binary-direct-mode (Boolean): Upload files using binary direct mode.
    Use this option to upload files to SharePoint as a whole with BinaryDirect
    mode. This is the most efficient way of uploading, but can cause
    non-recoverable timeouts under certain conditions. Use this option only
    with very fast and stable internet connections.
    * default value: false
  --web-timeout (Timespan): Set timeout for SharePoint web operations.
    Use this option to specify a custom value for timeouts of web operation
    when communicating with SharePoint Server. Recommended value is 180s.
  --chunk-size (Size): Set block size for chunked uploads to SharePoint.
    Use this option to specify the size of each chunk when uploading to
    SharePoint Server. Recommended value is 4MB.
    * default value: 4mb

Duplicati.CommandLine.exe help mssql-options

Configure Microsoft SQL Server module (mssql-options):
 This module works internaly to parse source parameters to backup Microsoft
 SQL Server databases
 Module is loaded automatically, use --disable-module to prevent this

Duplicati.CommandLine.exe help od4b

Microsoft OneDrive for Business (od4b):
 Supports connections to Microsoft OneDrive for Business. Allowed formats are
 "od4b://tennant.sharepoint.com/personal/username_domain/Documents/subfolder"
 or
 "od4b://username:password@tennant.sharepoint.com/personal/username_domain/Do
 cuments/folder". You can use a double slash '//' in the path to denote the
 base path from the documents folder.
 Supported options:
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --integrated-authentication (Boolean): Use windows integrated authentication
    to connect to the server
    If the server and client both supports integrated authentication, this
    option enables that authentication method. This is likely only available
    with windows servers and clients.
  --delete-to-recycler (Boolean): Move deleted files to the recycle bin
    Use this option to have files moved to the recycle bin folder instead of
    removing them permanently when compacting or deleting backups.
  --binary-direct-mode (Boolean): Upload files using binary direct mode.
    Use this option to upload files to SharePoint as a whole with BinaryDirect
    mode. This is the most efficient way of uploading, but can cause
    non-recoverable timeouts under certain conditions. Use this option only
    with very fast and stable internet connections.
    * default value: false
  --web-timeout (Timespan): Set timeout for SharePoint web operations.
    Use this option to specify a custom value for timeouts of web operation
    when communicating with SharePoint Server. Recommended value is 180s.
  --chunk-size (Size): Set block size for chunked uploads to SharePoint.
    Use this option to specify the size of each chunk when uploading to
    SharePoint Server. Recommended value is 4MB.
    * default value: 4mb

Duplicati.CommandLine.exe help onedrive


Duplicati can use Microsoft Onedrive to store backups. The following target
URL format is used:
  onedrive://folder/subfolder

Options:
  --authid
    The authorization token retrieved from
    https://duplicati-oauth-handler.appspot.com?type=onedrive


Duplicati.CommandLine.exe help openstack

OpenStack Simple Storage (openstack):
 This backend can read and write data to Swift (OpenStack Object Storage).
 Supported format is "openstack://container/folder".
 Supported options:
  --auth-username (String): Supplies the username used to connect to the
    server
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --auth-password (Password): Supplies the password used to connect to the
    server
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD". If the password is supplied,
    --openstack-tenant-name must also be set
  --openstack-tenant-name (String): Supplies the Tenant Name used to connect
    to the server
    The Tenant Name is commonly the paying user account name. This option must
    be supplied when authenticating with a password, but is not required when
    using an API key.
  --openstack-apikey (Password): Supplies the API key used to connect to the
    server
    The API key can be used to connect without supplying a password and tenant
    ID with some providers.
  --openstack-authuri (String): Supplies the authentication URL
    The authentication URL is used to authenticate the user and find the
    storage service. The URL commonly ends with "/v2.0". Known providers are:
    Rackspace US: https://identity.api.rackspacecloud.com/v2.0
Rackspace
    UK: https://lon.identity.api.rackspacecloud.com/v2.0
OVH Cloud Storage:
    https://auth.cloud.ovh.net/v2.0
  --openstack-region (String): Supplies the region used for creating a
    container
    This option is only used when creating a container, and is used to
    indicate where the container should be placed. Consult your provider for
    a list of valid regions, or leave empty for the default region.

Duplicati.CommandLine.exe help purge


Usage: purge <storage-URL> <filenames> [<options>]

  Purges (removes) files from remote backup data. This command can either take
  a list of filenames or use the filters to choose which files to purge. The
  purge process creates new filesets on the remote destination with the
  purged files removed, and will start the compacting process after a purge.
  By default, the matching files are purged in all versions, but this can be
  limited by choosing one or more versions. To test what will happen, use the
  --dry-run flag.

  --dry-run
    Performs the operation, but does not write changes to the local database
    or the remote storage
  --version=<int>
    Selects specific versions to purge from, multiple versions can be
    specified with commas
  --time=<time>
    Selects a specific version to purge from
  --no-auto-compact
    Performs a compact process after purging files
  --include=<filter>
    Selects files to purge, using filter syntax



Duplicati.CommandLine.exe help purge-broken-files


Usage: list-broken-files <storage-URL> [<options>]

  Checks the database for missing data that cause files not not be
  restoreable. Files can become unrestoreable if remote data files are defect
  or missing. Use the list-broken-files command to see what the
  purge-broken-files command will remove.

Usage: purge-broken-files <storage-URL> [<options>]

  Removes all files from the database and remote storage that are no longer
  restoreable. Use this operation with caution, and only if you cannot
  recover the missing remote files, but want to continue a backup. Even with
  missing remote files, it may be possible to restore parts of the files that
  will be removed with this command.

  --dry-run
    Performs the operation, but does not write changes to the local database
    or the remote storage



Duplicati.CommandLine.exe help repair


Usage: repair <storage-URL> [<options>]

  Tries to repair the backup. If no local db is found or the db is empty, the
  db is re-created with data from the storage. If the db is in place but the
  remote storage is corrupt, the remote storage gets repaired with local data
  (if available).




Duplicati.CommandLine.exe help restore


Usage: restore <storage-URL> ["<filename>"] [<options>]

  Restores <filename> to its original destination. If <filename> exists
  already, <filename> is changed to <filename-timestamp.extension>. To
  restore all files use "*" or leave empty.

  --overwrite=<boolean>
    Overwrites existing files.
  --restore-path=<string>
    Restores files to <restore-path> instead of their original destination.
    Top folders are removed if possible.
  --time=<time>
    Restore files that are older than the specified time.
  --version=<int>
    Restore files from a specific backup.




Duplicati.CommandLine.exe help returncodes


Duplicati reports the following return/exit codes:
  0 - Success
  1 - Successful operation, but no files were changed
  2 - Successful operation, but with warnings
  50 - Backup uploaded some files, but did not finish
  100 - An error occurred
  200 - Invalid commandline arguments found


Duplicati.CommandLine.exe help runscript

Run script (runscript):
 Executes a script before starting an operation, and again on completion
 Module is loaded automatically, use --disable-module to prevent this
 Supported options:
  --run-script-before (Path): Run a script on startup
    Executes a script before performing an operation. The operation will block
    until the script has completed or timed out.
  --run-script-after (Path): Run a script on exit
    Executes a script after performing an operation. The script will receive
    the operation results written to stdout.
  --run-script-before-required (Path): Run a required script on startup
    Executes a script before performing an operation. The operation will block
    until the script has completed or timed out. If the script returns a
    non-zero error code or times out, the operation will be aborted.
  --run-script-timeout (Timespan): Sets the script timeout
    Sets the maximum time a script is allowed to execute. If the script has
    not completed within this time, it will continue to execute but the
    operation will continue too, and no script output will be processed.
    * default value: 60s

Duplicati.CommandLine.exe help s3


Duplicati can use S3-compatible servers to store backups. The following target
URL format is used:
  s3://bucketname/prefix

Options:
  --aws_secret_access_key
    The AWS "Secret Access Key" can be obtained after logging into your AWS
    account, this can also be supplied through the "auth-password" property
  --aws_access_key_id
    The AWS "Access Key ID" can be obtained after logging into your AWS
    account, this can also be supplied through the "auth-username" property
  --s3-european-buckets = false
    This flag is only used when creating new buckets. If the flag is set, the
    bucket is created on a European server. This flag forces the
    "s3-use-new-style" flag. Amazon charges slightly more for European
    buckets.
  --s3-use-rrs = false
    This flag toggles the use of the special RRS header. Files stored using
    RRS are more likely to disappear than those stored normally, but also
    costs less to store. See the full description here:
    http://aws.amazon.com/about-aws/whats-new/2010/05/19/announcing-amazon-s3
    -reduced-redundancy-storage/
  --s3-storage-class
    Use this option to specify a storage class. If this option is not used,
    the server will choose a default storage class.
  --s3-server-name = s3.amazonaws.com
    Companies other than Amazon are now supporting the S3 API, meaning that
    this backend can read and write data to those providers as well. Use this
    option to set the hostname. Currently known providers are:
Amazon S3: s3.amazonaws.com
Hosteurope: cs.hosteurope.de
Dunkel: dcs.dunkel.de
DreamHost: objects.dreamhost.com
dinCloud - Chicago: d3-ord.dincloud.com
dinCloud - Los Angeles: d3-lax.dincloud.com
IBM COS (S3) Public US: s3-api.us-geo.objectstorage.softlayer.net

  --s3-location-constraint
    This option is only used when creating new buckets. Use this option to
    change what region the data is stored in. Amazon charges slightly more
    for non-US buckets. Known bucket locations:
(default):
Europe (EU): EU
Europe (EU, Frankfurt): eu-central-1
Europe (EU, Ireland): eu-west-1
Europe (EU, London): eu-west-2
US East (Northern Virginia): us-east-1
US East (Ohio): us-east-2
US West (Northern California): us-west-1
US West (Oregon): us-west-2
Canada (Central): ca-central-1
Asia Pacific (Mumbai): ap-south-1
Asia Pacific (Singapore): ap-southeast-1
Asia Pacific (Sydney): ap-southeast-2
Asia Pacific (Tokyo): ap-northeast-1
Asia Pacific (Seoul): ap-northeast-2
South America (Sao Paulo): sa-east-1

  --use-ssl
    Use this flag to communicate using Secure Socket Layer (SSL) over http
    (https). Note that bucket names containing a period has problems with SSL
    connections.
  --auth-password
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --s3-ext-forcepathstyle = False
    Extended option ForcePathStyle
  --s3-ext-useaccelerateendpoint = False
    Extended option UseAccelerateEndpoint
  --s3-ext-signaturemethod = HmacSHA256
    Extended option SignatureMethod
  --s3-ext-signatureversion = 4
    Extended option SignatureVersion
  --s3-ext-serviceurl
    Extended option ServiceURL
  --s3-ext-usehttp = False
    Extended option UseHttp
  --s3-ext-authenticationregion
    Extended option AuthenticationRegion
  --s3-ext-authenticationservicename = s3
    Extended option AuthenticationServiceName
  --s3-ext-maxerrorretry = 4
    Extended option MaxErrorRetry
  --s3-ext-logresponse = False
    Extended option LogResponse
  --s3-ext-readentireresponse = False
    Extended option ReadEntireResponse
  --s3-ext-buffersize = 8192
    Extended option BufferSize
  --s3-ext-progressupdateinterval = 102400
    Extended option ProgressUpdateInterval
  --s3-ext-resignretries = False
    Extended option ResignRetries
  --s3-ext-allowautoredirect = False
    Extended option AllowAutoRedirect
  --s3-ext-logmetrics = False
    Extended option LogMetrics
  --s3-ext-disablelogging = False
    Extended option DisableLogging
  --s3-ext-usedualstackendpoint = False
    Extended option UseDualstackEndpoint
  --s3-ext-throttleretries = True
    Extended option ThrottleRetries
  --s3-ext-proxyhost
    Extended option ProxyHost
  --s3-ext-proxyport = 0
    Extended option ProxyPort
  --s3-ext-proxybypassonlocal = False
    Extended option ProxyBypassOnLocal
  --s3-ext-maxidletime = 50000
    Extended option MaxIdleTime
  --s3-ext-connectionlimit = 50
    Extended option ConnectionLimit
  --s3-ext-usenaglealgorithm = False
    Extended option UseNagleAlgorithm



Duplicati.CommandLine.exe help send-mail


Duplicati can send email notifications after each operation. Use the send-mail
command to test this:

  "Duplicati.CommandLine.exe" send-mail --send-mail-to=<email-address>


  --send-mail-to=<email-address>
    Send an email to <email-address> after a backup. Valid formats are "Name
    <test@example.com>, Other <test2@example.com>, test3@example.com".
    Multiple addresses must be separated with a comma.
  --send-mail-from=<email-address>
    This is the sender address of the email that is sent.
  --send-mail-subject=<subject>
    This is the subject line of the email that is sent. E.g. this can be
    "Duplicati %OPERATIONNAME% Report"
  --send-mail-body=<body>
    The content of the email message. This should contain "%RESULT%".
  --send-mail-url=<smtp-url>
    A URL to connect to an SMTP server to send out an email. Example:
    "tls://smtp.example.com:587", "smtps://smtp.example.com:465" or
    "smtp://smtp.example.com:25"
  --send-mail-username=<username>
    Required username to authenticate with SMTP server.
  --send-mail-password=<password>
    Required password to authenticate with SMTP server.
  --send-mail-level=<level>
    When email messages are sent: "Success", "Warning", "Error" are possible.
  --send-mail-any-operation=true
    Also send emails after other operations like restore etc.

  Allowed placeholders are:
    %PARSEDRESULT%
      The parsed result op the operation: Success, Warning, Error
    %RESULT%
When used in the body, this is the result/log of the backup,
      When used in the subject line, this is the same as %PARSEDRESULT%
    %OPERATIONNAME%
The name of the operation, usually "backup", but could also be "restore"
etc.
    %REMOTEURL%
The backend url
    %LOCALPATH%
The path to the local folders involved (i.e. the folders being backed up)




Duplicati.CommandLine.exe help sendhttp

HTTP report module (sendhttp):
 This module provides support for sending status reports via HTTP messages
 Module is loaded automatically, use --disable-module to prevent this
 Supported options:
  --send-http-url (String): HTTP report url
    HTTP report url
  --send-http-message (String): The message template
    This value can be a filename. If the file exists, the file contents will
    be used as the message.

In the message, certain tokens are
    replaced:
%OPERATIONNAME% - The name of the operation, normally
    "Backup"
%REMOTEURL% - Remote server url
%LOCALPATH% - The path to the
    local files or folders involved in the operation (if any)
%PARSEDRESULT%
    - The parsed result, if the operation is a backup. Possible values are:
    Error, Warning, Success

All command line options are also reported
    within %value%, e.g. %volsize%. Any unknown/unset value is removed.
    * default value: Duplicati %OPERATIONNAME% report for
    %backup-name%

%RESULT%
  --send-http-message-parameter-name (String): The name of the parameter to
    send the message as
    The name of the parameter to send the message as.
    * default value: message
  --send-http-extra-parameters (String): Extra parameters to add to the http
    message
    Extra parameters to add to the http message. I.e.
    "parameter1=value1&parameter2=value2"
  --send-http-level (Enumeration): The messages to send
    You can specify one of "Success", "Warning", "Error", "Fatal". 
You can
    supply multiple options with a comma separator, e.g. "Success,Warning".
    The special value "All" is a shorthand for "Success,Warning,Error,Fatal"
    and will cause all backup operations to send a message.
    * values: Unknown, Success, Warning, Error, Fatal, All
    * default value: all
  --send-http-any-operation (Boolean): Send messages for all operations
    By default, messages will only be sent after a Backup operation. Use this
    option to send messages for all operations

Duplicati.CommandLine.exe help sendmail

Send mail (sendmail):
 This module can send email after an operation completes
 Module is loaded automatically, use --disable-module to prevent this
 Supported options:
  --send-mail-to (String): Email recipient(s)
    This setting is required if mail should be sent, all other settings have
    default values. You can supply multiple email addresses separated with
    commas, and you can use the normal address format as specified by RFC2822
    section 3.4.
Example with 3 recipients: 

Peter Sample
    <peter@example.com>, John Sample <john@example.com>, admin@example.com
  --send-mail-from (String): Email sender
    Address of the email sender. If no host is supplied, the hostname of the
    first recipient is used. Examples of allowed
    formats:

sender
sender@example.com
Mail Sender <sender>
Mail Sender
    <sender@example.com>
    * default value: no-reply
  --send-mail-subject (String): The email subject
    This setting supplies the email subject. Values are replaced as described
    in the description for --send-mail-body.
    * default value: Duplicati %OPERATIONNAME% report for %backup-name%
  --send-mail-body (String): The message body
    This value can be a filename. If the file exists, the file contents will
    be used as the message body.

In the message body, certain tokens are
    replaced:
%OPERATIONNAME% - The name of the operation, normally
    "Backup"
%REMOTEURL% - Remote server url
%LOCALPATH% - The path to the
    local files or folders involved in the operation (if any)
%PARSEDRESULT%
    - The parsed result, if the operation is a backup. Possible values are:
    Error, Warning, Success

All command line options are also reported
    within %value%, e.g. %volsize%. Any unknown/unset value is removed.
    * default value: %RESULT%
  --send-mail-url (String): SMTP Url
    A url for the SMTP server, e.g. smtp://example.com:25. Multiple servers
    can be supplied in a prioritized list, separated with semicolon. If a
    server fails, the next server in the list is tried, until the message has
    been sent.
If no server is supplied, a DNS lookup is performed to find
    the first recipient's MX record, and all SMTP servers are tried in their
    priority order until the message is sent.

To enable SMTP over SSL, use
    the format smtps://example.com. To enable SMTP STARTTLS, use the format
    smtp://example.com:25/?starttls=when-available or
    smtp://example.com:25/?starttls=always. If no port is specified, port 25
    is used for non-ssl, and 465 for SSL connections. To force not to use
    STARTTLS use smtp://example.com:25/?starttls=never.
  --send-mail-username (String): SMTP Username
    The username used to authenticate with the SMTP server if required.
  --send-mail-password (String): SMTP Password
    The password used to authenticate with the SMTP server if required.
  --send-mail-level (String): The messages to send
    You can specify one of "Success", "Warning", "Error", "Fatal". You can
    supply multiple options with a comma separator, e.g. "Success,Warning".
    The special value "All" is a shorthand for "Success,Warning,Error,Fatal"
    and will cause all backup operations to send an email.
    * values: Unknown, Success, Warning, Error, Fatal, All
    * default value: all
  --send-mail-any-operation (Boolean): Send email for all operations
    By default, mail will only be sent after a Backup operation. Use this
    option to send mail for all operations.

Duplicati.CommandLine.exe help sendxmpp

XMPP report module (sendxmpp):
 This module provides support for sending status reports via XMPP messages
 Module is loaded automatically, use --disable-module to prevent this
 Supported options:
  --send-xmpp-to (String): XMPP recipient email
    The users who should have the messages sent, specify multiple users
    separated with commas
  --send-xmpp-message (String): The message template
    This value can be a filename. If the file exists, the file contents will
    be used as the message.

In the message, certain tokens are
    replaced:
%OPERATIONNAME% - The name of the operation, normally
    "Backup"
%REMOTEURL% - Remote server url
%LOCALPATH% - The path to the
    local files or folders involved in the operation (if any)
%PARSEDRESULT%
    - The parsed result, if the operation is a backup. Possible values are:
    Error, Warning, Success

All command line options are also reported
    within %value%, e.g. %volsize%. Any unknown/unset value is removed.
    * default value: Duplicati %OPERATIONNAME% report for
    %backup-name%

%RESULT%
  --send-xmpp-username (String): The XMPP username
    The username for the account that will send the message, including the
    hostname. I.e. "account@jabber.org/Home"
  --send-xmpp-password (String): The XMPP password
    The password for the account that will send the message
  --send-xmpp-level (Enumeration): The messages to send
    You can specify one of "Success", "Warning", "Error", "Fatal". 
You can
    supply multiple options with a comma separator, e.g. "Success,Warning".
    The special value "All" is a shorthand for "Success,Warning,Error,Fatal"
    and will cause all backup operations to send a message.
    * values: Unknown, Success, Warning, Error, Fatal, All
    * default value: all
  --send-xmpp-any-operation (Boolean): Send messages for all operations
    By default, messages will only be sent after a Backup operation. Use this
    option to send messages for all operations

Duplicati.CommandLine.exe help size


Whenever a size is required, you can use any of the following suffixes:

  B - Bytes
  kB - Kilobytes
  MB - Megabytes
  GB - Gigabytes

For speed limits, use the same format. If you enter 1MB this will be 1MB/sec.


Duplicati v2.0.2.1_beta 4/4

Duplicati.CommandLine.exe help ssh


Duplicati can use SSH servers to store backups. The following target URL
formats can be used:
  ssh://hostname/folder

Options:
  --auth-password
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --ssh-fingerprint
    The server fingerprint used for validation of server identity. Format is
    eg. "ssh-rsa 4096 11:22:33:44:55:66:77:88:99:00:11:22:33:44:55:66".
  --ssh-accept-any-fingerprints
    To guard against man-in-the-middle attacks, the server fingerprint is
    verified on connection. Use this option to disable host-key fingerprint
    verification. You should only use this option for testing.
  --ssh-keyfile
    Points to a valid OpenSSH keyfile. If the file is encrypted, the password
    supplied is used to decrypt the keyfile.  If this option is supplied, the
    password is not used to authenticate. This option only works when using
    the managed SSH client.
  --ssh-key
    An url-encoded SSH private key. The private key must be prefixed with
    sshkey://. If the file is encrypted, the password supplied is used to
    decrypt the keyfile.  If this option is supplied, the password is not
    used to authenticate. This option only works when using the managed SSH
    client.



Duplicati.CommandLine.exe help system-info


Show system information as seen by Duplicati
============================================
  Issue the following command to see a variety of system information relevant
  to Duplicati.

  "Duplicati.CommandLine.exe" system-info


Duplicati.CommandLine.exe help tahoe


Duplicati can use the TahoeLAFS to store backups. The following target URL
format is used:
  tahoe://hostname:port/uri/$DIRCAP

Options:
  --use-ssl
    Use this flag to communicate using Secure Socket Layer (SSL) over http
    (https).


Duplicati.CommandLine.exe help test


Usage: test <storage-URL> <samples> [<options>]

  Verifies integrity of a backup. A random sample of dlist, dindex, dblock
  files is downloaded, decrypted and the content is checked against recorded
  size values and data hashes. <samples> specifies the number of samples to
  be tested. If "all" is specified, all files in the backup will be tested.
  This is a rolling check, i.e. when executed another time different samples
  are verified than in the first run. A sample consists of 1 dlist, 1 dindex,
  1 dblock.

  --time=<time>
    Checks samples from a specific time.
  --version=<int>
    Checks samples from specific versions. Delimiters are , -
  --full-remote-verification
    Checks the internal structure of each file instead of just verifying the
    file hash





Duplicati.CommandLine.exe help test-filters


Usage: test-filters <source-path> [<options>]

  Scans the source files and tests against the filters specified, the console
  output shows which files and folders are examined and the result.


Duplicati.CommandLine.exe help time


Duplicati supports absolute and relative dates and times:

  now --> The current time

  1234567890 --> A timestamp, seconds since 1970.

  "2009-03-26T08:30:00+01:00" --> An absolute date and time. You can also use
  the local date and time format of your system like e.g. "01-14-2000" or "01
  jan. 2004".

  Y, M, D, W, h, m, s --> Relative date and time: year, month, day, week,
  hour, minute, second. Example: 2M10D5h is now + 2 months + 10 days + 5
  hours.


Duplicati.CommandLine.exe help webdav


Duplicati can use WebDAV servers to store backups. The following target URL
formats can be used:
  webdav://hostname/folder"

Options:
  --auth-password
    The password used to connect to the server. This may also be supplied as
    the environment variable "AUTH_PASSWORD".
  --auth-username
    The username used to connect to the server. This may also be supplied as
    the environment variable "AUTH_USERNAME".
  --integrated-authentication
    If the server and client both supports integrated authentication, this
    option enables that authentication method. This is likely only available
    with windows servers and clients.
  --force-digest-authentication
    Using the HTTP Digest authentication method allows the user to
    authenticate with the server, without sending the password in clear.
    However, a man-in-the-middle attack is easy, because the HTTP protocol
    specifies a fallback to Basic authentication, which will make the client
    send the password to the attacker. Using this flag, the client does not
    accept this, and always uses Digest authentication or fails to connect.
  --use-ssl
    Use this flag to communicate using Secure Socket Layer (SSL) over http
    (https).
  --debug-propfind-file
    To aid in debugging issues, it is possible to set a path to a file that
    will be overwritten with the PROPFIND response



Duplicati.CommandLine.exe help zip

Zip compression (.zip):
 This module provides the industry standard Zip compression. Files created
 with this module can be read by any standard-compliant zip application.
 Supported options:
  --zip-compression-level (Enumeration): Sets the Zip compression level
    This option controls the compression level used. A setting of zero gives
    no compression, and a setting of 9 gives maximum compression.
    * values: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
    * default value: BestCompression
  --compression-level (Enumeration): Sets the Zip compression level
    [DEPRECATED]: Please use the zip-compression-level option instead
    This option controls the compression level used. A setting of zero gives
    no compression, and a setting of 9 gives maximum compression.
    * values: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
    * default value: BestCompression
  --zip-compression-method (Enumeration): Sets the Zip compression method
    This option can be used to set an alternative compressor method, such as
    LZMA. Note that using another value than Deflate will cause the
    zip-compression-level option to be ignored.
    * values: None, GZip, BZip2, PPMd, Deflate, Rar, LZMA, BCJ, BCJ2, LZip,
    Unknown
    * default value: Deflate
  --zip-compression-zip64 (Boolean): Toggles Zip64 support
    The zip64 format is required for files larger than 4GiB, use this flag to
    toggle it
    * default value: False