Comet Server usage 

First use 

Launch the Comet Server application. Once the server has started, you should be able to load the Comet Server web interface in your web browser, and then log in using your configured credentials.

Log in 

The default username and password are both admin. There is no default two-factor authentication code.

Log out 

You can log out at any time by using the "Log out" option in the user menu in the top right corner.

Web-based login sessions will expire after 30 minutes of inactivity. After this inactivity timer expires, the Comet Server will refuse any requests from the web interface.

The session timeout may become configurable in the future.

Table views 

All table views in Comet Server have the following features:


The "Show ## entries" dropdown in the top-left corner of a table allows you to choose the number of rows that are displayed in the table. By default, only the first 15 items are displayed in a table.

You can switch between pages of the table by using the page selector in the bottom-right corner of the table.

Your current page is displayed in the bottom-left corner of the table.


The "Filter..." text field allows you to enter text that will be used to filter the result set in the table. The search filter is applied in realtime as you type.


You can export the contents of any in table in Comet Server.

The following export formats are supported:

  • the clipboard, with tab-separated columns
  • a CSV (Comma Separated Values) file
  • an Excel (*.xlsx) spreadsheet.

Column selection 

You can use the column selection icon to choose individual columns to hide. It may be possible to show additional information in a table by enabling a column that was hidden by default.

User menu 

My Account 

The My Account page allows you to view and change basic details about your Comet Server administrative login account.

Configure two-factor authentication 

Two-factor authentication is an additional layer of protection for your Comet Server administrative login account. When this feature is enabled, an additional device (such as a cellphone app, or a hardware token) is also required to log in to the web interface. This means that a stolen password is insufficient to break into the web interface.

The Comet Server application supports two-factor authentication for administrator accounts in compliance with the TOTP standard. This standard describes a six-digit code that changes every 30 seconds.

You can enable two-factor authentication for your account as follows:

  1. Click the "Regenerate TOTP code" button
  2. Scan the displayed QR code with any TOTP application.
  3. Configure Comet Server so that a TOTP code is required to log in to the web interface.
    • For more information, see the "Comet Server configuration" document > "Admin accounts" section.

Advanced Options 

You can select this checkbox to enable some additional features in the Comet Server web interface.

Accounts menu 

If the Authentication role was enabled, the "Accounts" menu should appear when logged in, containing "Users" and "Job history" entries.

Users page 

Add user 

The "Add user" button allows you to create a new customer account.

On a Comet Server with the Authentication Role enabled (default), take the following steps:

  • Select the "Users" menu item > "Add user" button
  • Enter a username and password
  • click the Add User button

If the account was created successfully, it is then possible to install and log in to the client software as this user.

There are some character and length restrictions on the username and password. For details, see the "Username and Password" section in the "User configuration" document.

Modifying user account properties 

For more information about modifying an existing account, please see the "User configuration" section.

Copy and Paste 

Comet Server 17.9.0 and later allow you to copy and paste Protected Item configurations, between users or devices. To perform this action, on the user page > Protected Items tab, click the "Copy" link on the right-hand side.

A "Paste" button appears in the top bar, allowing you to paste this configuration into any device. You can also navigate to a different user and paste the protected item.

Copying and pasting a Protected Item does not copy nor share any backup data nor encryption keys between the accounts or devices.

Storage Vault analysis 

A Storage Vault can contain data from multiple Protected Items, all deduplicated together. It is possible to analyze the content of a Storage Vault to see how the data usage is distributed between different Protected Item sources and how much deduplication is being applied.

On the user page > Storage Vaults tab, the value in the "Stored" column may be a blue link. If so, clicking this link opens a dialog window displaying information about the storage breakdown.

The analysis is generated as part of a retention pass. Because retention passes only run when necessary, the analysis information may become outdated by a few jobs; or, no analysis may yet be available for a newly created Storage Vault. In this case, the "Stored" column will be black and cannot be clicked.

You can regenerate the analysis by running a Retention Pass for this Storage Vault, via the Devices tab or the "Connected Devices" page.

This feature is available as of Comet 17.6.9 or later.

Browsing log history for a customer 

No further documentation is available for this topic.

Renaming a user 

It's not currently possible to change the username for an account. However, if you have the password on file for the account, there is a workaround as follows:

  1. Create a second user, using the same password as the first user (important).
  2. Visit the first user's profile page, click 'View raw profile...' and copy the content
  3. Visit the second user's profile page, click 'View raw profile...', paste the content, change the 'Username' field, and then save the updated details
  4. Delete the first user
  5. Close and restart the client software, and log in as the second user

Send a client bulletin email 

A client bulletin is an email message sent to all customers.

You can use Comet Server to send an email message to all customers.

No further documentation is available for this topic.

Connected Devices 

The Connected Devices page shows you all the live connections made by Comet Backup.

For each connection, you can see

  • the username
  • the device name
  • the device's operating system (e.g. Windows 64-bit)
  • the device's software version

Live connection actions 

You can instruct the live connection to perform an action remotely. At the time of writing, the following actions are available:

  • Immediately run backup
  • Immediately run a scheduled backup
  • Apply retention rules now (with Comet 17.6.9 or newer)
  • Unlock / clean up lock files (only available when "Advanced Options" is selected)
  • Remote restore (with Comet 17.9.3 or newer)
  • Refresh profile
  • Update software
  • Import / scan for other installed products (with Comet 17.12.0 or newer)
  • Drop connection
  • Terminate process (only available when "Advanced Options" is selected, or if a device is double-connected)


In some cases, the same device might connect to Comet Server multiple times. This can occur if the Comet Backup software is launched multiple times on the client's device. This behavior is prevented in almost all cases, across all operating systems, but it may still occur.

If this happens,

  • the device will have two entries on the "Connected Devices" table
  • the device will show "Online (2)" on the Users page > Devices tab
  • scheduled backups might run twice
  • a "terminate" button will appear in the corresponding row on the "Connected Devices" table to allow for resolving this issue.

Bulk Update 

No further documentation is available for this topic.

Client News 

No further documentation is available for this topic.

Storage menu 

If the Storage role was enabled, the "Local storage buckets" menu option should be available when logged in.

Local Storage Buckets 

The Storage Role consists of a number of buckets. The buckets are abstracted from the underlying data storage, which could be on any supported storage platform. For more information about the available data storage locations, see the "Storage configuration" document.

Comet allows you to list and browse the buckets, as well as see the total size of data stored within the bucket.

Deleting buckets 

If you are certain that a bucket is not in use by any Comet account, it may be safe to remove a bucket. You can remove a bucket by clicking the "Delete" button on the right-hand side of this screen.

WARNING:: If you delete a bucket that is still in use by a Comet account's Storage Vault, the user's Comet Backup application will not be able to backup data to their Storage Vault nor restore data from their Storage Vault.

Because of the risk in this operation, it is recommended to leave the process of deleting unused buckets up to the Constellation role. For more information about Constellation, please see the Constellation section of the "Comet Server configuration" document.

Add a new bucket 

You can add a new bucket on the Storage Role. The new Bucket will be generated with a random name and access key.

Comet Server will display the necessary hostname, bucket name, and bucket key that can be copied into the Comet Backup Storage Vault configuration in order to store data in this bucket.

It is not normally necessary to manually add buckets in this way. You can use the "request" system to automatically create buckets and attach them to a user's account.

Server menu 

Download client software 

You can use the "Download client software" menu item to produce and download branded software client installers.

No further documentation is available for this topic.

Server logs 

No further documentation is available for this topic.


About Replication 

The replication page displays the current replication status. Comet Server supports replicating user profiles as well as stored data. Replication in Comet Server happens in one direction only from a primary to a replica Comet server.

As of Comet 17.9, server logs and job logs are not replicated.

The replication system uses a queue-and-worker model. When Comet Server starts for the first time, it will inspect all local data and remote data to determine what needs to be transmitted. Once this inspection is complete, data that needs to be updated will be queued for transfer.

Comet will replicate multiple objects simultaneously in parallel via multithreading.

Failing over (Storage role) 

A storage role server hands out chunks from the disk, to whoever has the right password. Recovering a Storage role server from your replica data, or failing over to your replica server, is therefore as simple as making sure the files are intact and all the DNS entries point to the right places. The replication system has already ensured that all the bucket names and bucket passwords are mirrored.

This simplicity allows for different approaches depending on your exact failure scenario.

Option 1: Recover files 

Get your primary storage server physically back up and running, then copy all the data from the replica back to the primary.

You could do that either by drag-and-drop, SCP, or by replicating in reverse; the transfer should run at line-speed either way.

You need to copy all the vault data as well as the cometd-buckets.db file.

Option 2: Server DNS failover 

Switch your replica to be the primary, by pointing the primary's DNS record to point to the replica. As replication is one way, the failed primary should not be brought back online without first disabling replication to avoid any data loss.

You will need to update any other servers that refer to this server by DNS, e.g. the Constellation role.

Option 3: Client address failover 

Switch your replica to be the primary, by updating all the Storage Vaults in each user's profile to point to the DNS name of the replica server.

The Comet Server interface includes a helpful tool to modify Comet Server Storage Vault URLs in bulk.

Failing over (Authentication role) 

No further documentation is available for this topic.

About this Server 

Click the "About this server" menu item, and ensure that the "Server version" and "Server started" time are correct.

The "About this server" page displays how much time is left on the serial number lease. For more information, please see the "Overview and Concepts" section.

No further documentation is available for this topic.

Cluster menu 

If the Constellation role was enabled, the "Cluster" menu option should be available when logged in.

About this Cluster 

You can use the "About this cluster" menu item to perform global operations across all your Comet Servers.

Bucket usage report 

No further documentation is available for this topic.