Bare Metal Recovery
Bare Metal Recovery (BMR) lets you restore a complete system — OS, drivers, configuration, and data — to new or replacement hardware. Unlike a standard restore that requires an enrolled agent, BMR uses a one-time recovery token so you can recover to a machine that has never been enrolled in Breeze.
How It Works
Section titled “How It Works”- You generate a recovery token from a backup snapshot
- Boot the target hardware from recovery media
- The recovery agent authenticates with the token (no enrollment needed)
- System state and data are downloaded and restored
- Post-restore validation checks confirm success
Generating a Recovery Token
Section titled “Generating a Recovery Token”- Find the snapshot you want to recover from (via the Backup dashboard or device backup tab).
- Select Bare Metal Recovery from the restore options.
- Configure the recovery:
- Snapshot — the backup to recover from
- Token lifetime — how long the token remains valid (in hours)
- Restore type — Full, Selective, or Bare Metal
- Target configuration — optional hardware configuration hints
- Click Generate Token.
- The token is displayed once. Copy it immediately — it’s stored as a SHA-256 hash and cannot be retrieved later.
Running the Recovery
Section titled “Running the Recovery”- Boot the target machine from Breeze recovery media.
- When prompted, enter the recovery token.
- The recovery agent connects to Breeze and authenticates with the token.
- The recovery process begins:
- System state is restored first (OS configuration, drivers, registry on Windows;
/etc, boot config on Linux) - Data files are restored next
- System state is restored first (OS configuration, drivers, registry on Windows;
- Post-restore validation runs automatically:
- Service status checks
- Network connectivity verification
- Critical file presence confirmation
- The machine reboots into the restored OS.
When to Use BMR
Section titled “When to Use BMR”| Scenario | Approach |
|---|---|
| Hard drive failure | BMR to new disk in same hardware |
| Machine replacement | BMR to new hardware of similar specification |
| Disaster recovery | BMR as part of a DR plan |
| Migration | System image restore to different hardware (may need driver updates) |
For recovering individual files or databases, use the standard restore workflow instead — it’s faster and doesn’t require recovery media.
Recovery Token Security
Section titled “Recovery Token Security”- Tokens authenticate recovery agents the same way JWT authenticates regular users — they grant time-limited access to a specific snapshot
- Tokens are hashed (SHA-256) at rest and cannot be retrieved after creation
- Each token is scoped to a single snapshot and organization
- Expired tokens are automatically invalidated