*_secret flags for credentials whenever possible. They store secret references (env://, keychain://, wincred://, secret-service://) instead of secret values.
Usage
Options
Store reference name. Used to link profiles to this store.
Store URI. Formats:
local:<path>, s3:<bucket>[/<prefix>], b2:<bucket>[/<prefix>], sftp://[user@]host[:port]/<path>.S3/S3-Compatible Options
S3 region (e.g.,
us-east-1, eu-west-1).AWS shared config profile name.
S3-compatible endpoint URL (for MinIO, Cloudflare R2, etc.).
S3 static access key (stored directly in YAML).
S3 static secret key (stored directly in YAML).
Secret reference for S3 access key (for example
env://AWS_ACCESS_KEY_ID, keychain://cloudstic/prod/s3-access-key).Secret reference for S3 secret key (for example
env://AWS_SECRET_ACCESS_KEY, keychain://cloudstic/prod/s3-secret-key).Environment variable name for S3 access key. The env var is resolved at backup time.
Environment variable name for S3 secret key. The env var is resolved at backup time.
Environment variable name for AWS profile. The env var is resolved at backup time.
SFTP Store Options
SFTP password (stored in YAML; prefer
-store-sftp-password-env).Path to SFTP private key (stored directly in YAML).
Secret reference for SFTP password.
Secret reference for SFTP private key path.
Environment variable name for SFTP password.
Environment variable name for SFTP private key path.
Path to custom
known_hosts file for host key validation.Skip host key validation (INSECURE).
Encryption Options
Secret reference for repository password.
Secret reference for platform key (64-char hex).
Secret reference for recovery key mnemonic.
Legacy env-var shortcut for repository password. Converted to
password_secret: env://... when saved.Legacy env-var shortcut for platform key. Converted to
encryption_key_secret: env://... when saved.Legacy env-var shortcut for recovery key. Converted to
recovery_key_secret: env://... when saved.AWS KMS key ARN for envelope encryption. Stored directly (not a secret).
AWS KMS region.
Custom AWS KMS endpoint URL.
General Options
Path to the profiles YAML file.
Disable interactive prompts. Missing required fields cause an error instead of prompting.
Examples
Interactive Store Initialization
In interactive mode (the default), after saving the basic store config, Cloudstic guides you through encryption configuration and store initialization.Store names must match
^[a-zA-Z0-9][a-zA-Z0-9._-]*$ (start with an alphanumeric character, then alphanumerics, dots, underscores, or hyphens). Store URIs must use a valid scheme: local, s3, b2, or sftp.Step 1: Encryption Configuration
If no encryption flags are provided on the command line, you are prompted to choose an encryption method:- Password and Platform key prompt where to store the secret:
- Environment variable reference (
env://...) - Native secret store reference:
- macOS:
keychain://service/account - Windows:
wincred://target - Linux:
secret-service://collection/item
- macOS:
- Environment variable reference (
- AWS KMS key: prompts for the KMS key ARN and AWS region.
- No encryption: skips encryption setup. Data is stored unencrypted.
profiles.yaml stores only the
reference.
The encryption configuration is saved to profiles.yaml alongside the store entry.
Step 2: Connectivity Check and Init
After saving, Cloudstic checks whether the store is accessible and initialized:cloudstic store verify to run this configuration/
access validation on demand. Use cloudstic check for full
repository integrity verification.
Full interactive example (macOS Keychain)
Secret references
Stores should use secret references for credentials and encryption material:env://VAR_NAMEkeychain://service/accountwincred://targetsecret-service://collection/item
profiles.yamlstays free of raw secret values- You can move secrets between env vars and native secret stores without changing command flows
- Secret rotation can happen in your secret backend without rewriting profile structure
See Also
- cloudstic store list: List configured stores
- cloudstic store show: Show store details
- cloudstic store verify: Validate store credentials and access
- cloudstic store init: Initialize a configured store by reference
- cloudstic profile new: Create a profile that references a store
- Using Profiles: Complete profiles guide