gpo.zugaina.org

Search Portage & Overlays:

app-backup/bareos

Featureful client/server network backup suite

Screenshots

  • bareos-9999
    X acl ceph clientonly cpu_flags_x86_avx +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: gentoo
  • bareos-23.0.2
    ~amd64 ~x86
    X acl ceph clientonly cpu_flags_x86_avx +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: gentoo
  • bareos-23.0.1
    ~amd64 ~x86
    X acl ceph clientonly cpu_flags_x86_avx +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: gentoo
  • bareos-22.1.2-r1
    ~amd64 ~x86
    X acl ceph clientonly +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: gentoo
  • bareos-22.0.3-r1
    ~amd64 ~x86
    X acl ceph clientonly +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: mschiff
  • bareos-21.1.8-r1
    ~amd64 ~x86
    X acl ceph clientonly +director glusterfs ipv6 lmdb logwatch ndmp readline scsi-crypto split-usr static +storage-daemon systemd tcpd test vim-syntax vmware xattr

    View      Download      Browse     License: AGPL-3   
    Overlay: gentoo

Bugs

Bug # Severity Platform Status Description
These bugs were grabbed from http://bugs.gentoo.org and have only passed a preliminary search using the package title, to do a more through search please visit: http://bugs.gentoo.org.