Spot on
The new system is incapable of tracking these backups for cleanup and it was feared that people would not realise their disk was filling up.
So, instead of introducing a simple system to monitor disk space and warn accordingly, it was arbitrarily decided that itâs better for the user not to backup before a (major) update and risk losing months (or even years) of work? How does this even make any sense?
Thatâs exactly what I donât understand, why would the system be incapable to track these backups if they are put in the âautomaticâ category ?
Because they would not be âmanualâ as they would be âautomaticallyâ be done before any update without any âmanualâ user intervention, right ?
Youâre asking the wrong person. I have no idea what motivated the design choices.
I suggest to move database and logs to cloud in order to definitively resource no disk space issue
I think a simple disclaimer from the team on turning encyption off will cover themâŚ
Warning! Turning off encryption will remove the function of being able to upload a backup to nabucasa.
this way nabucasa is fully covering themselves, why its a great feature for most as Bob mentioned Some of us backup to system and to nas, then nas files are encrypted and sent to a off site nas. I back up every few days but I do like to backup addons esecially with zigbee2mqttâŚ
not sure maybe a way to be selective with what addons have the choice of backups (i mean in general most addon updates are not potention system breaking and only thing that has ever broken for me in addons even before the 2.0 update was zigbee2mqtt)
have you ever looked at how many files are in a back up and how compressed it is I think they are pretty quick considering the amount of files inside, its not just fresh install moment on windows type of scenario lol.
Iâve been holding off upgrading for this exact reason and any other unexpected breaking changesâŚ
There would be errors in your logs letting you know why this happened. If you create a separate post, youâll likely get help fixing the issues.
This type of issue rarely happens unless you have an invalid configuration. Are you sure there hasnât been warnings in your logs prior to this update, telling you that you need to fix something?
Which log file should I check for this??? I have never encountered issues at least for my sensors (but also did not check the log files as it is working)
homeassistant.log, in your configuration folder.
Thanks - will check it!
Actually, the encryption in HA uses Securetar , which uses pythonâs cryptography library. Cryptography is not rolled by the community or the HA developers. Many people use this and itâs a proven library that works, they arenât rolling their own encryption. This quite simply is a bug in securetar that needs to be fixed, nothing more.
Just wanted to chime in a bit later. After it was confirmed that custom backup solutions were untouched by the new mandatory encryption I took the plunge with 2025.1.1.
What can I say - it is all working. My first autobackup went smooth as well. Unencrypted.
I think in our first shock (not reading the small print) we might have overreacted a bit.
I really hope:
- that encryption can be optional within the inbuilt backup tool
- that schedules can be more flexible
- that an optional (not default) backup before update system could be reimplemented
- that custom backup tools keep working
Many thanks in advance!
You donât run Frigate, do you?
If it does contain any sensitive or private information it should be encrypted. This could be for example passwords/secrets like mentioned in the blog post.
Your backups not only contain the access credentials to your smart home devices but also the history of your home, and no one should be able to access information that sensitive! Ever!
You will find that any modern OS will (mostly by default) offer you an encrypted installation - and this is what one should do in 2025. Having for example a laptop, phone or usb sticks containing private without encryption is something negligent because they can easily disappear (and appear again?). For companies based in the EU encryption is mostly mandatory if they process any personal data.
Also talking flash here you might want to use encryption actually for the pure reason not being able to (really) delete data (contained in flash cells) anymore like we could do in the old times on hard disks due to the nature how flash storage works.
Beside you might think the controller in the SSD that is âgood enoughâ for the encryption - but we know better today: Self-Encrypting Solid-State Drive Vulnerabilities | CISA (most serious OSes actually also disable this hardware ssd encryption function by default).
Yes, itâs a abstract thing. I know people that used unencrypted/open WIFI and said itâs all they need and itâs easier for them because they donât need to remember a password.
Itâs very difficult to argue to people that only see the hassles (need to remember a password) and donât see anything visible improved (an encrypted WIFI doesnât have visible benefits to a open WIFI for a user till the momentâŚ)
Sigh. We are not over reacting. And Iâm betting you would be a bit more annoyed if you understood the actual issues, Read this for quick summary: 2025.1: Backing Up into 2025! - #568 by tom_l
Sure you can use your existing backup method - for now. It will eventually be depreciated though and we would like to see this dogs breakfast fixed before that happens.
Tom, I think youâre still taking that out of context.
The exact quote that you keep going back to that started the âdeprecation of addonsâ, mentions having a replacement before that happens. I.e. Moving from the supervisor to being in core, which still supports unencrypted backups.
Not speaking about overreaction, only about the âdeprecation of the handlersâ that custom addons use.