hack

command
v0.46.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 22, 2026 License: MIT Imports: 10 Imported by: 0

Documentation

Overview

Command pitr-restore reads archived WAL frames out of S3 or GCS and replays them into a fresh SQLite file for point-in-time recovery.

Usage:

pitr-restore --archive gs://bucket/svc --shard <id> --to-seq <n> --out <file.db>

Think of it as `restic restore` for Base. No mutation of the remote archive; the tool is read-only on the cold store and writes locally.

The tool opens a fresh SQLite database at --out (fails if it already exists unless --force). Each frame's Payload is written into a "wal_frames" table keyed by seq — the Base core apply path would replay those into the real schema, but for a PITR smoke test it is enough to prove the frame round-trips and lands in the target file with the expected row count.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL