04. Automating Backups to External Storage (Google Drive/Dropbox) Print

  • 0

Automating Backups to External Storage via JetBackup 5

1. Using the JetBackup 5 "Destinations" Feature

  1. Log in to cPanel: Click the JetBackup 5 icon.
  2. Open Destinations: Click the Destinations icon in the left sidebar.
  3. Create New Destination: Click + Create New Destination.
  4. Choose Your Provider: Select your preferred service (e.g., Google Drive, Dropbox, Amazon S3).
  5. Authenticate: Click Authenticate or Get Authorization Code. Log in to your account and allow JetBackup access. Copy the code provided and paste it back into cPanel.
  6. Save: Click Save Destination.

2. Creating a Backup Job (Schedule)

  1. Open Backup Jobs: In JetBackup 5, click Backup Jobs.
  2. Create New Job: Click + Create New Backup Job.
  3. Name & Type: Enter a name (e.g., "Weekly Cloud Backup") and select Account as the backup type.
  4. Destination: Choose the cloud storage destination you created.
  5. Schedule: Set frequency (Daily, Weekly, or Monthly). Recommendation: Weekly for most sites; Daily for high-traffic stores.
  6. Retain: Decide how many old backups to keep (e.g., "4" keeps the last 4 backups).
  7. Filters: Optionally exclude large folders (like tmp or logs) to save space.
  8. Save & Run: Click Save. You can click Run Now to test the connection immediately.

3. Alternative: WordPress Plugins

If you prefer managing backups within WordPress:

  • UpdraftPlus: Free, supports Google Drive, Dropbox, Amazon S3, handles files & databases.
  • All-in-One WP Migration: Manual backups, drag-and-drop restore.
  • Duplicator: Ideal for migrating from a local dev environment to Jiinubi.

Pro Tips & Best Practices

  • Use a Dedicated Account: Create a separate Google/Dropbox account just for backups to avoid filling personal storage.
  • Check the Logs: Periodically visit the JetBackup Queue to ensure remote uploads aren't failing due to "Full Storage" errors.
  • Encrypt Your Backups: If supported, enable encryption. This protects database credentials and sensitive files even if cloud storage is compromised.

Was this answer helpful?

« Back