Backups are only as good as the confidence that they actually work. Restic Explorer 1.0 is now available — a focused, self-hosted web dashboard that provides exactly that confidence for all restic repositories in one place.

Restic Explorer Dashboard

The Problem

Restic is an outstanding backup tool. Fast, encrypted, deduplicated — it has become the go-to choice for backing up servers, NAS devices, and cloud workloads. But restic is a CLI tool by design. When running multiple repositories across different backends — S3 buckets, Azure Blob, SFTP servers — keeping track of “is everything still running?” becomes a chore. It often means writing shell scripts, parsing JSON output, wiring up cron jobs, and hoping someone notices when something breaks.

Existing monitoring solutions are excellent pieces of software, but they tend to come with far more complexity than many use cases require: agent-based architectures, extensive plugin systems, or dashboards designed for hundreds of repositories across large teams. For operators who simply need a single pane of glass that answers are the backups running, are they healthy, and do they meet retention requirements? — a lighter approach is needed.

The Solution

Restic Explorer is that single pane of glass. It connects directly to restic repositories — wherever they live — and provides:

  • Multi-Repository Dashboard — status of all repos at a glance with color-coded badges (green/red/amber)
  • Automated Scanning — scheduled restic snapshots calls cache metadata for fast browsing without CLI round-trips
  • Integrity Checks — scheduled restic check --read-data runs with configurable intervals per repository
  • Retention Policy Monitoring — daily/weekly/monthly/yearly rules with soft warnings when snapshots fall short
  • Health Endpoint/actuator/health JSON endpoint reporting per-repo status, ready for Uptime Kuma, Prometheus, or any HTTP health checker
  • Snapshot Browser — paginated, sortable snapshot list with a dedicated detail page showing paths, tags, hostname, and size
  • Lock Detection — automatic stale lock detection with one-click unlock
  • Encrypted Credentials — AES-256-GCM encryption at rest for repository passwords and backend keys

Five Backends, One UI

Backend What it covers
S3 / S3-Compatible AWS S3, MinIO, Wasabi, Backblaze B2 (S3 API)
Azure Blob Storage Native Azure integration
SFTP Any SSH-accessible server, key-based auth
REST Server Restic’s own REST backend with optional HTTP auth
Rclone Google Drive, Dropbox, OneDrive, B2, and 40+ more via rclone

Getting Started in 60 Seconds

The fastest way to get running is Docker Compose:

services:
  app:
    image: tmseidel/restic-explorer:latest
    ports:
      - "8080:8080"
    environment:
      SPRING_PROFILES_ACTIVE: docker
      DB_HOST: db
      DB_PORT: 5432
      DB_NAME: resticexplorer
      DB_USER: resticexplorer
      DB_PASSWORD: resticexplorer
    depends_on:
      db:
        condition: service_healthy
    restart: unless-stopped

  db:
    image: postgres:16-alpine
    environment:
      POSTGRES_DB: resticexplorer
      POSTGRES_USER: resticexplorer
      POSTGRES_PASSWORD: resticexplorer
    volumes:
      - db-data:/var/lib/postgresql/data
    healthcheck:
      test: ["CMD-SHELL", "pg_isready -U resticexplorer"]
      interval: 10s
      timeout: 5s
      retries: 5
    restart: unless-stopped

volumes:
  db-data:
docker compose up -d

Open http://localhost:8080, create the admin account, and start adding repositories. That’s it.

The image ships with restic, rclone, and openssh-client pre-installed — no additional setup required for any backend type.

Why Restic is a Great Fit for Cloud & Infrastructure-as-Code

For teams managing cloud infrastructure through Terraform, Ansible, Pulumi, or similar tools, restic fits naturally into the workflow:

Stateless by Design

Restic repositories are self-contained. There is no central server, no daemon, no database to maintain. A repository is just a structured set of encrypted blobs in any storage backend. This makes restic trivially reproducible — IaC can provision the storage bucket and the backup job in the same run.

Backend Agnostic

Moving from AWS to Azure? Migrating from on-prem to cloud? Restic’s backend abstraction means the backup strategy isn’t tied to a vendor. A Terraform module provisions an S3 bucket today; tomorrow it provisions Azure Blob Storage. The restic commands stay the same.

Encryption Without Infrastructure

Restic encrypts everything client-side. There is no need for a KMS, a Vault instance, or an HSM for backup encryption. One password, stored in the secrets manager of choice, and data is encrypted at rest regardless of the storage backend’s capabilities.

Deduplication Saves Cloud Storage Costs

Restic’s content-defined chunking and deduplication means incremental backups are genuinely incremental — even across different source machines backing up to the same repository. In cloud environments where storage is metered, this translates directly to lower costs.

Scriptable and Composable

Restic is a CLI tool that outputs JSON. It composes perfectly with cron, systemd timers, CI/CD pipelines, and container sidecars. No agents to install, no ports to open, no protocols to configure — just a binary and a repository URL.

Restic Explorer adds the monitoring layer on top: existing restic workflows remain untouched, and Restic Explorer watches the repositories and surfaces issues when they need attention.

What’s in 1.0

This release marks the point where the feature set is stable, tested, and production-ready:

  • Five backend types — S3, Azure, SFTP, REST, Rclone
  • Repository groups — organize repos by team, environment, or purpose
  • Configurable scan and check intervals per repository
  • Retention policy monitoring with violation warnings
  • Error log with date filtering and auto-cleanup
  • Dark mode with automatic theme detection
  • Health & info endpoints for external monitoring integration
  • Admin-only download of snapshots as .tar archives
  • Encrypted credential storage (AES-256-GCM)
  • Docker image running as non-root user with built-in healthcheck
Snapshots Snapshot Detail
Snapshots Detail

Get It

Licensed under MIT. Contributions, issues, and feedback welcome.


Restic Explorer is built with Spring Boot 4, Thymeleaf, and Bootstrap 5. It runs as a single container alongside PostgreSQL and requires no additional infrastructure beyond what is already in place.