Publishers of technology books, eBooks, and videos for creative people

Home > Articles > Apple > Operating Systems

This chapter is from the book

Managing Time Machine

Several mature and relatively easy-to-use backup solutions are available for the Mac, so you may be wondering why the folks at Apple chose to invent a new backup architecture for Mac OS v10.5. They did a little research and discovered that, prior to Time Machine’s introduction, only 4 percent of Mac users were backing up their data on a regular basis. This was an unacceptable number, so Apple decided that the only way to convince users to do so on a regular basis was to create a new backup process that would be as easy as possible and also surprisingly fun to use. Apple’s solution was Time Machine.

Aside from being built into the operating system, Time Machine has two features that make it fundamentally different from any other solution currently out there. First, configuring Time Machine is so easy it’s nearly automatic. The system practically begs you to set up Time Machine if you haven’t done so already, and with as little as one click it’s configured.

The second, more significant feature is that Time Machine is so tightly integrated with the operating system that users don’t even have to exit the application they are currently using to recover data. Applications, both built in and third party, can tie directly into the Time Machine backup system. From applications supporting Time Machine, a user can activate the visually striking Time Machine interface and travel back through time to see the application’s data as it was in the past. If an application doesn’t yet support Time Machine, you can use the Finder while in Time Machine’s interface to browse the entire file system through time.

ch4-050.jpg

Understanding Time Machine Backups

Time Machine can save backup archives to any locally connected Mac OS Extended volume that is not the startup volume. You are allowed to select a backup destination volume that resides as another partition on the system disk drive, but this is an incredibly bad idea—if the system drive dies, so does your backup. New in Lion is support for an encrypted local backup destination. This option automatically reformats the backup drive as Mac OS Extended (Journaled, Encrypted). If you don’t have a local volume suited for backup, you can also select a shared network volume as your backup destination. Time Machine supports network shares by creating a disk image on the share to store the backups. Time Machine currently only supports backing up to Apple Filing Protocol (AFP) network shares hosted from Mac OS X Servers or Time Capsule wireless base stations.

Logistically, Time Machine uses a sophisticated background process, named backupd, to automatically create new backups of the entire file system every hour. This only works, though, if the backup destination is readily available. As more users go for portable Macs, it’s becoming increasingly possible that a user may be away from his backup destination for quite a while. New with Time Machine in Lion is support for local snapshots. As the name implies, Time Machine will take local snapshots if the backup destination is unavailable. Even if the user is away from the backup destination, he will at least have access to restore from the local snapshots. This feature is only enabled on Mac portables with Time Machine left in the “on” state. Once the Mac can locate the backup destination again, the local snapshots will be converted to traditional backups and saved to the destination.

While Time Machine’s local snapshots are a convenient new feature, they certainly aren’t true backups, as they are located on the same drive they are backing up. If the system drive fails, then the local snapshots are lost as well. This is why, after not backing up to the backup destination for ten days, the system will warn the user on a regular basis to reconnect that destination. Users should be trained to ensure their Mac is connected to the Time Machine destination on a regular basis. Again, as long as the Mac can connect to the destination, Time Machine will automatically handle the backup maintenance.

Obviously, Time Machine must employ some tricks to keep backups as small as possible so that you can maintain a deep history. The initial Time Machine backup will copy almost the entire contents of your file system to the specified backup volume. In order to provide fast backups and convenient restores, Time Machine does not use a compressed archive format common to many other backup systems. Instead, Time Machine simply copies the items as is to the backup destination. As you’ll see later, this allows for easy access to those items.

The space saving comes into play with each subsequent backup. Between backups, a background process, similar to the one used by the Spotlight search service, will automatically track any changes to the file system. When the next scheduled backup occurs, only the items that have changed will be copied to the backup volume. Time Machine will then combine this new content with hard link file system pointers (which occupy nearly zero disk space) to the previous backup content, and create a simulated view of the entire file system at that point in time.

Time Machine also saves space by ignoring files that do not need to be backed up, as they can be re-created after a restoration. Generally speaking, Time Machine ignores temporary files, Spotlight indexes, items in the Trash, and anything that can be considered a cache. Of particular note, Time Machine will not back up system log files, which you could need for later troubleshooting. Software developers can also tell Time Machine to ignore specific application data that does not need to be backed up.

Eventually, so as not to waste space on your backup volume with historical data that has outlived its usefulness, Time Machine will start “aging out” backups. Time Machine will only keep hourly backups for a day, daily backups for a week, and weekly backups until your backup volume is full. After your backup volume is full, Time Machine will start deleting the oldest items first. However, Time Machine will always keep at least one copy of every item that is still also on your current file system.

Configuring Time Machine

Despite the rather complex process going on behind the scenes to make Time Machine possible, configuration couldn’t be easier. In fact, Time Machine is enabled by default and simply waiting for you to pick a backup destination. If you haven’t configured a Time Machine backup destination, the system will automatically scan the network for a Time Machine network share or wait for you to attach an external drive. If the system locates either, you will be prompted to select it as your backup destination. If you select your backup destination with this method, after you click the Use as Backup Disk button, Time Machine is fully configured. It’s just that easy.

ch4-051.jpg

On the other hand, you can choose to manually configure Time Machine settings to better suit your needs:

  1. Open the Time Machine preferences by choosing Apple menu > System Preferences, and then click the Time Machine icon.

  2. Enable Time Machine by sliding the switch to the On position, and then click the Choose Backup Disk button.

    ch4-052.jpg

    This will reveal a dialog allowing you to select a backup destination. Once you have selected an appropriate volume, click the Use Backup Disk button.

    ch4-053.jpg

    Depending on the Time Machine destination you chose, you may be presented with an additional dialog:

    • If you selected a locally connected external drive and the encryption option, you will need to specify a password to protect the encryption. Enter a strong password twice, followed by a password hint, and then click the Encrypt Disk button to continue. This password will be saved to the local Mac’s System keychain so backups can occur unattended.
    ch4-054.jpg
    • If you selected a network share or Time Capsule as the destination, you will need to specify an authentication that allows you to access the share. Enter the appropriate account information and then click the Connect button to set the network backup destination. This authentication information will be saved to the local Mac’s System keychain so backups can occur unattended.
    ch4-055.jpg

    At this point Time Machine will wait two minutes, allowing you to make further configuration changes, before it starts the first backup.

    ch4-056.jpg
  3. Click the Options button to reveal a dialog allowing you to adjust a few Time Machine settings.

  4. The most important configuration choice you can make with Time Machine is to exclude items from the backup. Excluding items will obviously reduce the amount of space required to maintain your backups. It’s not uncommon for users to leave only the /Users folder as the single item to back up; after all, that’s where all the important user items reside.

    You can drag and drop items into the list field, or you can click the small plus button at the bottom of the list to reveal a file browser, allowing you to select specific folders or volumes to exclude.

    ch4-057.jpg
  5. Click the Save button when you are ready to commence with the backup.

The two-minute timer will reset every time you make a Time Machine configuration change. Once you are done, simply wait two minutes, and the initial Time Machine backup will begin.

Depending on the amount of data that has to be backed up, it can take from minutes to hours for the initial backup to complete. Time Machine will open a small progress dialog that will also allow you to cancel the backup by clicking the small “X” button to the right of the progress bar. The Time Machine preferences have a similar progress bar.

ch4-058.jpg

Subsequent backups will occur automatically in the background. Revisiting the Time Machine preferences will show you the time and date of the oldest, last, and next backup. You can also verify the last backup and force an immediate backup from the Time Machine menu extra (or icon) near the clock in the menu bar.

ch4-059.jpg

Restore from Time Machine

Using Time Machine to restore data is what many will consider the best part because of the dynamic interface Apple has created to “look through time.” Opening the Time Machine application or using the Time Machine menu extra will take you into the Time Machine history browser. Few applications currently support the Time Machine interface, so in most cases you will be presented with a historical view in the Finder.

ch4-060.jpg

The Finder windows will let you browse as usual, with one significant addition. You can use the navigation arrows on the bottom right, or the navigation timeline on the right side, to view Finder contents as they change through time. New in Lion is support for local Time Machine snapshots. If this feature is enabled, the local non-backed-up snapshots will show as purple tick marks in the navigation timeline. Normal snapshots, which are backed up to the Time Machine destination, will show as white tick marks in this timeline.

To aid in your search through time, the Spotlight search field remains active, and you can quickly preview any item using the Finder’s Quick Look feature. Once you have found the item you were looking for, simply click the Restore button at the bottom-right corner and the Finder will return to “the present” with your recovered file intact where it once was.

ch4-061.jpg

Restoring with Migration Assistant

You can also restore a complete user home folder or other non-system data from a Time Machine archive using the Migration Assistant. You can use this technique if you choose not to perform full system backups, if your system is already running and you want to migrate specific information from a backup. First, make sure the Time Machine backup volume is available to the destination Mac, then open /Applications/Utilities/Migration Assistant. When the Migration Assistant opens, simply choose to restore from a Time Machine backup. The remainder of the Migration Assistant process is similar to the standard migration process covered in Chapter 1, “Installation and Configuration,” for system items, or Chapter 2, “User Accounts,” for user home folders.

ch4-062.jpg

Restoring an Entire System

You can restore an entire system volume when started up from Lion Restore. This technique assumes you did not exclude any items from your system volume; thus, you have backed up the entire system volume. When started up from Lion Restore, as covered in Chapter 1, “Installation and Configuration,” choose Restore From Time Machine backup from the Mac OS X Utilities window. This will open the Time Machine System Restore Assistant. The assistant will first scan for local and network Time Machine backup volumes. Once you have selected the Time Machine volume, you can restore the entire system from any backup instance on that volume to your new system drive.

ch4-063.jpg

Manually Restoring from Time Machine

If you are experiencing problems using one of the Time Machine restoration interfaces, you can always browse the backup from the Finder. Time Machine’s backup technology uses file system features that are part of standard Mac OS Extended volumes, so no special software is needed to browse through backup contents.

If you’re accessing a locally attached drive for Time Machine, then the backups are located on the root of your backup volume in a folder named Backups.backupdb. Once inside the backup database folder, you will see folders with the name of each computer that is backed up to that volume. Inside each computer folder you will see folders named with a date and time indicating each backup. Finally, inside each dated folder you will see folders representing each volume that was backed up.

ch4-064.jpg

If you’re accessing Time Machine over a network, you will need to manually connect to the Time Machine share first. Connecting to shares is covered in Chapter 7, “Network Services.” Once connected, you will need to locate the Time Machine backup disk images. They will be at the root of the Time Machine share and named with the computer’s name followed by the .sparsebundle extension. Double-click to mount the Time Machine backup disk image volume, which will be named “Backup of” followed by the computer’s name. Inside this volume you will find the same Backups.backupdb folder and contents that you would find on a directly connected Time Machine backup.

ch4-065.jpg

Time Machine Caveats

Though Time Machine is supported by Apple, it is not without flaws. Time Machine’s backup architecture does not lend itself well to large files that change often. For example, many database files appear as large, single files to the file system. While the database application may be able to change just a few bytes of the large file as a user edits the database, Time Machine will not recognize this, and it will have to create another copy of the entire database file during the next backup. This will obviously fill your backup volume much quicker than if the database had been stored as many smaller files.

This leads to the next Time Machine issue: running out of backup space. Once Time Machine fills up the backup volume, it will begin deleting older items to make room for newer ones. Therefore, the depth of your backup history will vary based not only on the size of your backup volume, but also on how often you change your files and how Time Machine recognizes those changes. Because you cannot change how Time Machine chooses to delete older items, you may discover that items you thought would still be on the backup volume have already been deleted.

One final issue is that Time Machine can only back up Legacy FileVault accounts when the user is logged out of the system. The solution to this problem is to simply stop using Legacy FileVault in favor of Lion’s FileVault2, as covered in Chapter 3, “File Systems.”

Peachpit Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Peachpit and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Peachpit products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email ask@peachpit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.peachpit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020