Cheatsheet
Use these pages as operational reference during incidents and routine backup operations.
Pages
| Page | Use it for |
|---|---|
| Core Commands Cheatsheet | Command patterns for copy/sync/move |
| Provider Flags Cheatsheet | Concurrency, retries, and pacing |
| Safety Checklist Cheatsheet | Pre-run and post-run guardrails |
| Filtering and Selection Cheatsheet | Include/exclude, age/size/time, and files-from quick patterns |
| Performance and Transfers Cheatsheet | Throughput tuning, bandwidth shaping, and retry/timeout baselines |
| Sync Safety and Deletes Cheatsheet | Delete timing, bisync guardrails, and rollback mapping |
| Encryption and Security Cheatsheet | Crypt setup, secret hardening, and key rotation map |
| Automation and Operations Cheatsheet | Scheduling, CI safety, and robust execution controls |