Skip to main content

Comet Client Overview

Application structure

The client software is split into two components; backup-tool is a command-line tool which implements all the software functionality. The graphical user interface is backup-interface, which wraps this command-line tool. Backup schedules will still run even if logged out of the GUI, as the background service will still be logged in.

Additionally, clients can remotely control their installed software by logging in to the Comet Server web interface as a user.

On platforms without a desktop interface available (e.g. Linux server), only the backup-tool part is used, and you should control the application via the web interface.

Device registration

Each Comet user can be used by multiple devices. This allows you to deduplicate backups from multiple users, since backups can be targeted to the same Storage Vault.

When you log in to the same Comet user from another device, such as a laptop or tablet, you will see a private view of Protected Items but a public view of Storage Vaults.

  • You can view, edit, and use Storage Vaults configured by other devices
  • You cannot view, edit, nor use Protected Items configured by other devices
  • You can restore data from any device's Protected Item (hidden by default)
  • You can view job logs from any device (hidden by default)

Customer Web Portal

You can log into the web interface with a user account to run backups and restores remotely. You can also edit Protected Item and Storage Vault settings, and view job history.