Acronis Backup & Recovery 10 Server (Linux) manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 179 pages
- N/A
Aller à la page of
Les manuels d’utilisation similaires
-
Backup Software
Acronis Backup & Recovery 11
379 pages -
Backup Software
Acronis True Image 2013
241 pages -
Backup Software
Acronis Backup & Recovery 10 Server (Linux)
179 pages -
Backup Software
Acronis Snap Deploy 3 for Server
103 pages -
Backup Software
Acronis Backup & Recovery 10
401 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Server SBS Edition
402 pages 4.71 mb -
Backup Software
Acronis True Image Home 2011 Netbook Edition
166 pages -
Backup Software
Acronis Backup & Recovery 10 Workstation
241 pages
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Acronis Backup & Recovery 10 Server (Linux). Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Acronis Backup & Recovery 10 Server (Linux) ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Acronis Backup & Recovery 10 Server (Linux) décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Acronis Backup & Recovery 10 Server (Linux) devrait contenir:
- informations sur les caractéristiques techniques du dispositif Acronis Backup & Recovery 10 Server (Linux)
- nom du fabricant et année de fabrication Acronis Backup & Recovery 10 Server (Linux)
- instructions d'utilisation, de réglage et d’entretien de l'équipement Acronis Backup & Recovery 10 Server (Linux)
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Acronis Backup & Recovery 10 Server (Linux) ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Acronis Backup & Recovery 10 Server (Linux) et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Acronis en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Acronis Backup & Recovery 10 Server (Linux), comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Acronis Backup & Recovery 10 Server (Linux), l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Acronis Backup & Recovery 10 Server (Linux). À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
User's Guide Acronis® Bac kup & Rec overy ™ 10 Server for Linux[...]
-
Page 2
Copyright © Acronis, Inc., 2000 - 2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademark s of Acronis, Inc. "Acronis Co mpute wi th Confiden ce", “Acr onis Sta rtup Recovery Manager”, “Acronis Active Restore” and the Acro nis logo are tra demarks of Acro nis, Inc. Linux is a re gistered tr[...]
-
Page 3
Table of contents 1 Introducing Ac ronis® Backup & Rec overy™ 10 ......................................................................... 6 1.1 Acronis Backup & Recovery 10 overview .................................................................................. 6 1.2 Getting sta rted ..................................................[...]
-
Page 4
4 Vaults .................................................................................................................................... 70 4.1 Personal vaults ......................................................................................................................... 71 4.1.1 Working w ith the "Person al vault" vi ew ..[...]
-
Page 5
6.5 Mounting an image ............................................................................................................... 134 6.5.1 Archive se lection ......................................................... ................................................ ............................ 135 6.5.2 Backup se lection .......................[...]
-
Page 6
Copyright © Ac ronis, Inc., 20 00 - 2010 6 1 Introduci ng Acroni s ® Ba ckup & Re covery™ 1 0 1.1 Acronis Backu p & Recovery 10 overvie w Based on Acro nis’ patented disk imagin g and bare m etal restore techn ologies, Acro nis Backup & Recovery 10 succeeds Acron is True Image Echo as the ne xt generation dis aster recov ery solut[...]
-
Page 7
Copyright © Ac ronis, Inc., 20 00 - 2010 7 For what to do next s ee " Basic co n cepts ( p. 17 )". For understanding of t he GUI elements see " Usin g the managem ent console ( p. 7 )". 1.2.1 Using the managemen t cons ole As soon a s the conso le conne cts to a managed machi ne ( p. 169 ) or to a management server ( p. 170 ), [...]
-
Page 8
8 Copyright © Acr onis, Inc., 20 00 - 2010 1024x768 or higher display resolution is require d for comfor table work w ith the manageme nt console. 1.2.1.1 "Navigation" pane The navigatio n pane includ es the Naviga tion tree an d the Shor tcuts bar. Navigation tree The Navigati on tree enables you to naviga te across the progr am views. [...]
-
Page 9
Copyright © Ac ronis, Inc., 20 00 - 2010 9 Bars '[Item's na me]' actions Contains a set of actions that can be performe d on the items selected in any of the navigation v iews. Clicking the action opens the respective actio n page ( p. 11 ) . Items of different n avigation views have their own set of actions. T he bar's name ch[...]
-
Page 10
10 Copyright © Ac ronis, Inc., 20 00 - 2010 "Tools" bar Help Contains a lis t of help to pics. Differen t views and a ction pages of Acronis Backu p & Recovery 10 provided with lists of s pecific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navig ation pane a ppears expanded and the Ac tions[...]
-
Page 11
Copyright © Ac ronis, Inc., 20 00 - 2010 11 "Tasks" view Common way of working w ith views Generally, every view contai ns a table of items, a table toolbar with buttons, and t he Inform ation panel. Use filtering and sorting c apabilities to search the table for the item in qu estion In the table, select the desired item In [...]
-
Page 12
12 Copyright © Ac ronis, Inc., 20 00 - 2010 Action page - Create backup plan Using controls and specifying settings The action pa ges offer two ways of repres entation: bas ic and advanced . The basic repr esentation hides such fields as credentials, comments, etc. W hen the advanced represent ation is enabled, all the available fields are d ispla[...]
-
Page 13
Copyright © Ac ronis, Inc., 20 00 - 2010 13 Navigation buttons 1.3 Acronis Backu p & Recovery 10 components This section contains a list of Acronis B ackup & Reco very 10 components with a bri ef description of their functionality. Components for a managed machine (agents ) These are ap plications that per form data b ackup, reco very and [...]
-
Page 14
14 Copyright © Ac ronis, Inc., 20 00 - 2010 1.3.2 M an agement Con sole Acronis Backup & Recovery 1 0 Management Console is an administrat ive tool for local access to Acronis Backup & Recovery 10 Agent for Linu x. Remote conne ction to the agent is not po ssible. 1.3.3 Boot able Media B uild er Acronis Bootable Media Builder is a dedicate[...]
-
Page 15
Copyright © Ac ronis, Inc., 20 00 - 2010 15 The agent for L inux is in fa ct a 32 - bit ex ecutable. For authentication , the agent us es s ystem libraries, 32 - bit versions o f which are not always installed by default with 64 - bit distri butions. When using t he agent on a 64 - bit RedHat based distribution, such as RHE L, CentOS, Fedora or Sc[...]
-
Page 16
16 Copyright © Ac ronis, Inc., 20 00 - 2010 or (ii) supply code corrections to correct insubstantia l problems at the next genera l release of the Software. More informati on about co ntacting Acro nis Technical Sup port is ava ilable at t he follo wing link: http://www. acronis.eu/enter prise/suppor t/[...]
-
Page 17
Copyright © Ac ronis, Inc., 20 00 - 2010 17 2 Understan ding Acr onis Bac kup & Re covery 10 This section a ttempts to giv e its readers a cl ear understa nding of the pro duct so that they can us e the product i n various circ umstances witho ut step - by - step instructi ons. 2.1 Basic concepts Please familiarize yourself with the basic noti[...]
-
Page 18
18 Copyright © Ac ronis, Inc., 20 00 - 2010 The following diagram illus trates the notions discuss ed above. For more definiti ons please refer to the Glossary.[...]
-
Page 19
Copyright © Ac ronis, Inc., 20 00 - 2010 19 Backup using bootable media You can boot the machine using the boo table media, co nfigure the backup oper ation in the s ame way as a simple ba ckup plan and execu te the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of th e offline syst[...]
-
Page 20
20 Copyright © Ac ronis, Inc., 20 00 - 2010 The following diagram illus tr ates data re covery under the operating s ystem (online). No backup ca n proceed on th e machine while the recovery o peration is taki ng place. If req uired, you can connect the console to another machine and configu re a recover y operation on t hat machine. T his ability[...]
-
Page 21
Copyright © Ac ronis, Inc., 20 00 - 2010 21 If the machine fails to bo ot or you need to recov er data to bare metal, yo u boot the machine usi ng the bootable media and conf igure the reco very operation in the same way a s the recovery task. The following dia gram illustra tes the recove ry using the b ootable medi a. 2.2 Full, in cremental and [...]
-
Page 22
22 Copyright © Ac ronis, Inc., 20 00 - 2010 It is widely accepted that a full backup is the slowest to do bu t the fastest to restore. With Acro nis tec hnologies, recovery from a n incremental b ackup may be not slower than recovery from a full on e. A full backup is most usefu l when: you need to roll back th e system to its initial state ?[...]
-
Page 23
Copyright © Ac ronis, Inc., 20 00 - 2010 23 Paramet er Full ba cku p Differenti al backup Increme ntal ba ckup Storage spa ce Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3 User privileges on a m anaged mach ine When managing a ma ch ine running L inux, the user has or obta ins the root p rivil[...]
-
Page 24
24 Copyright © Ac ronis, Inc., 20 00 - 2010 Plan's credentials and task credentials Any task run ning on a machin e runs on behalf of a u ser. When crea ting a plan or a task, you have the option to exp licitly specify an account u nder which th e plan or th e task will ru n. Your choic e depends on whether t he plan or tas k is intended for [...]
-
Page 25
Copyright © Ac ronis, Inc., 20 00 - 2010 25 GFS by Acroni s With Acronis Backup & Reco very 10, you can easily set up a backup p lan that will regularly bac k up data and clea n up the resu lting archive accordin g to th e GFS sch eme. Create the backup plan as usual. For the backup destin ation, choos e any storage dev ice where automatic cle[...]
-
Page 26
26 Copyright © Ac ronis, Inc., 20 00 - 2010 Assume you select Friday for Weekly/Monthly backu p. Here is the real schedul e of the backup tasks that will be created. Backup tas ks crea ted accordi ng to t he GFS sche me by A cronis Back up & Rec overy 10. Schedule: Workdays at 8: 00 PM Weekly/Monthly: Friday Keep backups: Daily T his step defi[...]
-
Page 27
Copyright © Ac ronis, Inc., 20 00 - 2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8: 00 PM Weekly/Monthly: Friday Keep daily bac kups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Starting from the third we ek, weekly backups will be r egularly deleted. After 6 months , monthly ba ckups w[...]
-
Page 28
28 Copyright © Ac ronis, Inc., 20 00 - 2010 An archive cre ated accordi ng to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8: 00 PM Weekly/Monthly: Friday Keep daily bac kups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months 2.6 Tower of Hanoi backup scheme The ne ed to have f requent backups always c[...]
-
Page 29
Copyright © Ac ronis, Inc., 20 00 - 2010 29 F or example, if there are fi ve rings labeled A, B, C, D , and E in the puzzle, th e solution gives the following order of mov es: The Tower of Hanoi backup scheme is ba sed on the sa me patterns. It operates with Sess ions instead of Moves and with B ackup level s inste ad of Rings . C ommonly an N - l[...]
-
Page 30
30 Copyright © Ac ronis, Inc., 20 00 - 2010 the scheme fo rces every backup level to keep only the mos t recent ba ckup, other ba ckups from the level have to be deleted; ho wever backup deletion is postponed in cases where the backup is a base for another in cremental or differential one an old backup on a level is kept until a n ew backu[...]
-
Page 31
Copyright © Ac ronis, Inc., 20 00 - 2010 31 to this interv al and delete s all backups created before tha t moment. None of the ba ckups created a fter this moment will be deleted. 2. Keep the archive size within This is the ma ximum size o f the archive . Every time a retention rul e is applied, the program co mpares the actual arc hive size wit [...]
-
Page 32
32 Copyright © Ac ronis, Inc., 20 00 - 2010 Combination of r ules 1 and 2 You can limit both the bac kups’ lifetime a nd the archi ve size. The d iagram below ill ustrates the resulting rule. Example Delete backup s older than = 3 Months Keep the archive size with in = 200GB Never delete backups youn ger than = 10 Days Ev ery time the retent[...]
-
Page 33
Copyright © Ac ronis, Inc., 20 00 - 2010 33 Please be aware that cons olidation is just a method of deletion but no t an alternative to deletion. The resulting backup will n ot contain data that was pres ent in the delete d backup an d was absent from t he reta ined incremental or differential backup. Backups resul ting from cons olidation always [...]
-
Page 34
34 Copyright © Ac ronis, Inc., 20 00 - 2010 For detailed instructions o n how to recover logical v olumes, see Recovering MD d evices and logical volumes ( p. 155 ). You do not n eed to create the volume s tructure if it already exists on the machi ne (such is th e case when some d ata on the vo lume was lost, bu t no hard disks were rep laced). H[...]
-
Page 35
Copyright © Ac ronis, Inc., 20 00 - 2010 35 2.9 Backing up RAID array s (Linux) Acronis Backup & Recovery 10 Agent for Linu x can back up and recover Linux Softwa re RAID devices (known as mu ltiple - disk devices or MD devices) and hardware RAID arrays. Software RAID arrays Software RAID arrays, o r MD devices, combin e several volumes and ma[...]
-
Page 36
36 Copyright © Ac ronis, Inc., 20 00 - 2010 Recovery Parameters of software RAID arrays are not backed up, so th ey can only be recovered over a basic volume, to unallocate d space, or to a previously configured ar ray. Recovery can be performed in Linux or a Linux - bas ed bootable med ia. When started from bootable m edia, the bootable agent tri[...]
-
Page 37
Copyright © Ac ronis, Inc., 20 00 - 2010 37 a locally attache d tap e device (t ape drive or tape library) by... ATIE 9.7 + + + + ABR10 + + + + Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 + + + + ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Tape writt en on a tape devic e through..[...]
-
Page 38
38 Copyright © Ac ronis, Inc., 20 00 - 2010 5. Because the pr esence of an o perating sys tem cannot be d etected in a b ackup loca ted on a tape, Acronis Universal Restore ( p. 172 ) is proposed at ev ery disk or volume recovery , even when recovering a Linux or non - system Windows volume. 6. Acronis Ac tive Resto re ( p. 160 ) is not ava ilable[...]
-
Page 39
Copyright © Ac ronis, Inc., 20 00 - 2010 39 With the new Acronis Secu re Zone behavior, yo u obtain the ability to: list archives l ocated in the zone and ba ckups contain ed in each ar chive examine a backup's co ntent mount a disk backup to co py files from the backup to a p hysical disk safely delete archiv es and backups f[...]
-
Page 40
Copyright © Ac ronis, Inc., 20 00 - 2010 40 3 Options This section covers Acronis Backup & Recov ery 10 options that can be co nfigured usin g Graphical Use r Interfac e. The conten t of this secti on is applica ble to both s tand - alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console op tions The console options defin [...]
-
Page 41
Copyright © Ac ronis, Inc., 20 00 - 2010 41 The preset is: Enabled fo r all results. To make a setting for each result ( successful completion, failure or success with warnings) individually, select or clear the respective check box . 3.1.3 Time - based alerts Last backup This option is effective w hen the console is con nected to a manag ed machi[...]
-
Page 42
42 Copyright © Ac ronis, Inc., 20 00 - 2010 The option d efines the fo nts to be use d in the Gr aphical User Inter face of Acr onis Ba ckup & Re covery 10. The Menu se tting aff ects the d rop - down a nd context menus. The Appl ication se tting aff ects the other GUI el ements. The preset is: System Def ault font for b oth the menu s and the[...]
-
Page 43
Copyright © Ac ronis, Inc., 20 00 - 2010 43 1.3.6.1.4.1.24769.100.200.2.0 - string containing t he text descri ption of t he event (it loo ks identical to messages pub lished by Acronis Backup & Recovery 10 i n its log). The preset is: Disable d . To set up sending SNMP messages 1. Select the Send messages to SNMP ser ver check box. 2. Specify[...]
-
Page 44
44 Copyright © Ac ronis, Inc., 20 00 - 2010 The preset is: Maximum log size: 1 GB . On cleanup , keep 95% of the maximu m log size . When the op tion is enable d, the progra m compares th e actual log size with the maximum siz e after every 100 log entries. Onc e the maximum log size is e xceeded, the program del etes the oldes t log entries. You [...]
-
Page 45
Copyright © Ac ronis, Inc., 20 00 - 2010 45 Compression level ( p. 51) + + + + Backup perfor mance: Backup prior ity ( p. 51 ) + + - - HDD wri ting speed ( p. 52 ) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed ( p. 52 ) Dest: network share Dest: network share Dest: network share Dest: network share Fast incremental/dif ferential[...]
-
Page 46
46 Copyright © Ac ronis, Inc., 20 00 - 2010 3.3.1.1 Archive protection This option is effective for Windows and Linux operati ng systems and bo otable media . This option is effective fo r both disk - level and file - level ba ckup. The preset is: Disable d. To protect the archive from unauthorized access 1. Select the Set password for the archive[...]
-
Page 47
Copyright © Ac ronis, Inc., 20 00 - 2010 47 Exclude files matching the foll owing criteria Select this check box to s kip files wh ose n ames match any o f the criteria — called file masks — in the list; use the Add , Edit , Rem ove and Remove All buttons to create the lis t of file masks. You can use one or more wildcard char acters * and[...]
-
Page 48
48 Copyright © Ac ronis, Inc., 20 00 - 2010 Select the existing command or the batch file f rom the drop - down list 3. Click OK . Pre - backu p comma nd To specify a command/batch file to be executed before the backup process sta rts 1. In the Comm and field, typ e a command or browse to a b atch file. The p rogram does not sup port interacti[...]
-
Page 49
Copyright © Ac ronis, Inc., 20 00 - 2010 49 The option ena bles you to defin e the comma nds to be auto matically exe cuted before a nd after data capture (that is, taking the data snapsho t) performed by Acronis Ba ckup & Recover y 10 at the beginning of the back up procedure. The following s cheme illustr ates when the pre/ post data cap tur[...]
-
Page 50
50 Copyright © Ac ronis, Inc., 20 00 - 2010 Preset Perform the data capture o nly afte r the command is successful ly execute d. Fail the task if the command execution fails. Perform the data capture after the command is executed de spite execution failure or success. N/A Perform the data capture con currently with the com mand and irrespective o [...]
-
Page 51
Copyright © Ac ronis, Inc., 20 00 - 2010 51 Always creat e a snapshot The snapshot enables bac king up of all files incl uding files o pened for excl usive access. The file s will be backed up at the same point in ti me. Choose this setting on ly if these factors are crit ical, that is, backi ng up files wi thout a snaps hot does no t make sen[...]
-
Page 52
52 Copyright © Ac ronis, Inc., 20 00 - 2010 operating sys tem to allocate more resour ces like the CPU to the ba ckup application. However, the resulting effect will depend o n the overall CPU usage a nd other factors like disk in/ out speed or network traffic. The preset is: Low. To specify the backup process priority S elect one of the followin [...]
-
Page 53
Copyright © Ac ronis, Inc., 20 00 - 2010 53 Click Transfer ring speed stated as a per centage of the estimated m aximum speed of the ne twork co nnection , a nd then drag the slider or type a percenta ge in the box Click Transfer ring speed st ated in kilobytes per second , and then enter the bandwidth limit for transferring b ackup data i[...]
-
Page 54
54 Copyright © Ac ronis, Inc., 20 00 - 2010 User na me – enter the user name. Password – e nter the passwo rd. 6. Click Send test e - mail message to check if the s ettings are correct. Messenger service (WinPopup) This option is effective fo r Windows and Lin u x operating syste ms on the sen ding machine a nd only for Windows on the [...]
-
Page 55
Copyright © Ac ronis, Inc., 20 00 - 2010 55 1.3.6.1.4.1.24769.100.200.2.0 - string containing t he text descri ption of t he event (it loo ks identical to messages pub lished by Acroni s Back up & Recov ery 10 in i ts log). The preset is: Use the setting set in the M achine options. To select whether to send the backup operations events to the[...]
-
Page 56
56 Copyright © Ac ronis, Inc., 20 00 - 2010 A single backup file wil l be created if the desti nation disk's file system allo ws the estimated fi le size. The backup will automati cally be split into severa l files if the destination dis k's file system does not allow the estimated f ile size. Such migh t be the case when the bac kup is [...]
-
Page 57
Copyright © Ac ronis, Inc., 20 00 - 2010 57 Do not sho w messages and dialogs while processing (silent mode) The preset is: Disable d . With the sile nt mode ena bled, the progra m will auto matically handle si tuations requ iring user interaction (except for ha ndling bad sectors, which is defined as a s eparate option ). If an o peration cannot [...]
-
Page 58
58 Copyright © Ac ronis, Inc., 20 00 - 2010 Roaming user s can back up their portable co mputers to Acronis Secur e Zone while o n the road. When the po rtable computer i s connected to the corpo rate network, all c hanges made to the archive will be transferred to its stationary copy after the first backup oper ation. If you select the passwo[...]
-
Page 59
Copyright © Ac ronis, Inc., 20 00 - 2010 59 Time diagram: W ait until conditi ons are met Skip the task execution Delaying a ba ckup might be u nacceptable, f or example, w hen you need to back up da ta strictly at the specified tim e. Then it ma kes sense to s kip the backu p rather than wait for the conditions, e specially if the events occur re[...]
-
Page 60
60 Copyright © Ac ronis, Inc., 20 00 - 2010 The program w ill try to exe cute the failed ta sk again if y ou select the Res tart a failed task ch eck box and specify the number o f attempts an d the time in terval betwee n the attemp ts. The progra m stops t rying as soon a s an attem pt completes s uccessfully OR the specifi ed number o f attempt[...]
-
Page 61
Copyright © Ac ronis, Inc., 20 00 - 2010 61 When the op tion is enable d, backing up to removable me dia may b e not possib le if the user i s away, because the program will wait for som eone to press OK in the pro mpt box. Hen ce, you should d isable the prompt when schedu ling a backup to removable media. Then, if the remova ble media is av aila[...]
-
Page 62
62 Copyright © Ac ronis, Inc., 20 00 - 2010 Save software RAID and LVM metadata along with backups This option is effective o nly for disk - level backups of machines runni ng Linux. The preset is: Enabled. When this op tion is enable d, Acronis Back up & Recovery 10 will save information about the structure of logical vo lumes (known as LVM v[...]
-
Page 63
Copyright © Ac ronis, Inc., 20 00 - 2010 63 commands ( p. 63 ) Recovery priority ( p. 65 ) + + - - File - level security ( p. 65): Recover files with their security settings - + - + Error handling ( p. 68): Do not show messages and dialogs while proc essing (silent mode) + + + + Re - attempt if an error occurs + + + + Additional s ettings ( p. 68 [...]
-
Page 64
64 Copyright © Ac ronis, Inc., 20 00 - 2010 To specify pre/post commands 1. Enable pre/po st commands execution by che cking the follo wing options : Execute befo re the recove ry Execute after the recovery 2. Do any of the following: Click Edit to specify a new comman d or a batch f ile Select the existing c ommand or the batch fi[...]
-
Page 65
Copyright © Ac ronis, Inc., 20 00 - 2010 65 When the ch eck box is no t selected, the command execut ion result does not affect the task execution fail ure or success . You can track the command e xecution resu lt by explo ring the log or the errors and warnin gs displayed o n the Dash board . 5. Click Test co mmand to ch eck if the command is cor[...]
-
Page 66
66 Copyright © Ac ronis, Inc., 20 00 - 2010 The preset is: Disable d . To configure e - mai l notification 1. Select the Send e - mail n otifications check bo x to activ ate notifi cations. 2. In the E- mail addr esses field, type the e - mail a ddress to whi ch notificatio ns will be s ent. You can enter several addresses se parated by semicolons[...]
-
Page 67
Copyright © Ac ronis, Inc., 20 00 - 2010 67 The Messenger service is not started by default in the Micro soft Windows Serve r 2003 family. Change the service Star tup mode to Automatic and start the se rvice. To configure WinPopup notifications: 1. Select the Send WinPop up notific ations che ck box. 2. In the Machine n ame field, enter the name o[...]
-
Page 68
68 Copyright © Ac ronis, Inc., 20 00 - 2010 Community – type the na me of SNMP co mmunity to whi ch both the h ost running S NMP management app lication and t he sending ma chine belong. T he typical co mmunity is "p ublic". Click Send tes t message t o check if the setti ngs are co rrect. Do not sen d SNMP notif ications – to di[...]
-
Page 69
Copyright © Ac ronis, Inc., 20 00 - 2010 69 Check file system after recovery This option is effective o nly when recovering disks or volu mes. When operating under bootable media, this op tion is not effective for th e NTFS file system. The preset is Disabled . This option defines wheth er to check the integrity of the file system after a disk or [...]
-
Page 70
C opyright © Acr onis, Inc., 20 00 - 2010 70 4 Vaults A vault is a location for storing b ackup archives. For ease of use and administration , a vault is associated with the archi ves' metadata. Referr ing to this metadata makes for fast and conveni ent operation s with ar chives and ba ckups stor ed in the vau lt. A vault can b e organized o[...]
-
Page 71
Copyright © Ac ronis, Inc., 20 00 - 2010 71 4.1 Pers onal vaul ts A vault is called perso nal if it was created using dire ct connection of the cons ole to a managed machine. Personal vaults ar e specific for each managed m achine. Personal vaults are vi sible to any user that can log o n to th e system. A use r's right to ba ck up to a p ers[...]
-
Page 72
72 Copyright © Ac ronis, Inc., 20 00 - 2010 Vault content The Vault conte nt section contains the archives t able and toolbar. The archives t able displays archives and backups that are st ored in the vault. Use the archives toolbar to perf orm actions on the selected arch ives and back ups. The list of backups is expanded by clicking the " p[...]
-
Page 73
Copyright © Ac ronis, Inc., 20 00 - 2010 73 Explore a vault's content Click Explore . In the appe aring Expl orer wi ndow, exam ine the se lected vault's co ntent. Validate a vault Click Validate . You will be taken to the Validation ( p. 130 ) page, where this va ult is alre ady pre - selected as a source. T he vault validation checks a[...]
-
Page 74
74 Copyright © Ac ronis, Inc., 20 00 - 2010 3. Edit the back up plans that use vault A : r edirect their destination to vault B . 4. In the vaults tree, select va ult B to check whether the archives are d isplayed. If no t, click Refresh . 5. Delete vault A . 4.2 Common opera tions 4.2.1 Op e rat i ons with arc hives stored in a vault To perform a[...]
-
Page 75
Copyright © Ac ronis, Inc., 20 00 - 2010 75 All the operations described belo w are performed b y clicking the c orresponding buttons on t he toolbar. These operations can be also accessed fro m the '[Backup name]' actions bar (on the Acti ons and tools pa ne) and from the '[Backup name]' actio ns item of the ma in menu. The fo[...]
-
Page 76
76 Copyright © Ac ronis, Inc., 20 00 - 2010 full backup w hich will be dated the incr emental backu p date. When y ou delete a n incremental or differential b ackup from t he middle of the chain, th e resulting ba ckup type wil l be incremen tal. Please be aware that cons olidation is just a method of deletion but no t an alternative to deletion. [...]
-
Page 77
Copyright © Ac ronis, Inc., 20 00 - 2010 77 5 Schedul ing Acronis scheduler helps the a dministrator a dapt backup plans to the company’s daily routine an d each employee’s work style. T he plans’ tasks will be l aunched systematically keeping the critical data safely protected. The schedule r uses local ti me of the machin e the bac kup pla[...]
-
Page 78
78 Copyright © Ac ronis, Inc., 20 00 - 2010 5.1 Daily schedu le Daily schedul e is effective in Windows and Linux op erating systems . To specify a daily sch edul e In the Sched ule area, select the appropriate parameter as follows: Every: <...> day(s) Set up the certain n umber of days you w ant the ta sk to be run. For e xample, i f you se[...]
-
Page 79
Copyright © Ac ronis, Inc., 20 00 - 2010 79 From: 12:00:00 AM (midnight ) Until: 09:00:00 PM - thus, the task will be perfo rmed 8 times a day with a 3 hour time i nterval. After the last daily r ecurrence at 9 PM, the ne xt day comes and the task starts over again f rom midnight. 3. Effectiv e: From: 09/15/2009 . If September 15, 2009 is the curr[...]
-
Page 80
80 Copyright © Ac ronis, Inc., 20 00 - 2010 To specify a weekly s chedule In the Sched ule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...> Specif y a certa in number of weeks and the da ys of the we ek you wa nt the task to be run. For ex ample, with the Every 2 week(s) o n Mon setting, the task will b[...]
-
Page 81
Copyright © Ac ronis, Inc., 20 00 - 2010 81 1. Every: 1 week(s) on: < Workdays> - selecting the <Workdays> ch eck box auto matically select s the correspondin g check boxe s ( Mon , Tue , Wed , Thu , and Fri ), and lea ves the remai ning ones unchanged. 2. Once at: 09:0 0:00 PM . 3. Effective: From: empty . If yo u have crea ted the ta[...]
-
Page 82
82 Copyright © Ac ronis, Inc., 20 00 - 2010 2. Once at: 09:0 0:00 PM . 3. Effective: From: not set . To: not set . 5.3 Monthly s chedule Monthly sche dule is effecti ve in Window s and Linux operating syst ems. To specify a m onthly schedule In the Sched ule area, select the appropriate parameter as follows: Months: <.. .> Select a cer tain [...]
-
Page 83
Copyright © Ac ronis, Inc., 20 00 - 2010 83 This schedule is widely use d when creati ng a custom backup sche me. The "Last da y of every mo nth" schedule is a dded to the fu ll backups, whi le the differen tial backups a re scheduled to be performed once a week and increm ental on workdays. For mo re details, see the Mon thly full, week[...]
-
Page 84
84 Copyright © Ac ronis, Inc., 20 00 - 2010 From: 11/01/2009 . To: not set . Third schedule 1. Months: June , July , August . 2. Days: 1 , 15 . 3. Once at: 10:0 0:00 PM . 4. Effective: From: 11/01/2009 . To : not set . 5.4 Conditions Conditions add more fl exibility to the scheduler, ena bling to execute backup ta sks with respect to certain condi[...]
-
Page 85
Copyright © Ac ronis, Inc., 20 00 - 2010 85 (1) If 9:00 PM comes and the location's host is availabl e, the backup task starts right on time. (2) If 9:00 PM comes but the host is unavailabl e at the momen t, the backup tas k will start o n the next workday if the location 's host is available. (3) If the location's hos t will never [...]
-
Page 86
86 Copyright © Ac ronis, Inc., 20 00 - 2010 5.4.3 Time since las t backup Applies to: Windows, Linux Enables to pu t a backup task run on hol d until the specified time i nterva l since the las t successful backup completio n passes. Example: Run the backup task at system start up, but only if more than 12 hours have passed since the l ast success[...]
-
Page 87
Copyright © Ac ronis, Inc., 20 00 - 2010 87 6 Direct mana gement This section covers operatio ns that can be performed d irectly on a managed machine by using t he direct cons ole - agent con nection. The content of this section is applicable to both stand - alon e and advanced edi tions of Acro nis Backup & Recovery 10. 6.1 Administering a ma[...]
-
Page 88
88 Copyright © Acronis, Inc. , 2000 - 2010 Please make sure you have a valid license on Acronis License Server. working. Trial version of product expires in X day(s) Please make sure you have a valid license on Acronis License Serve r. Connect Once the tr ial ver sion of the product is installe d, the program sta rts the countdown of days rem aini[...]
-
Page 89
Copyright © Ac ronis, Inc., 20 00 - 2010 89 Warnings Highlight the date in yellow if no "Error" ent ries appeared and at least o ne "Warning" entry appeared in the log on t his date. Information Highlig ht the date in green if only "I nformation" log entries appeared on this date (nor mal activity.) The Select c urren[...]
-
Page 90
90 Copyright © Acronis, Inc. , 2000 - 2010 Use the Informati on panel to review detailed i nformatio n on the select ed plan (tas k). The panel is collapsed by default. To expand the panel, click the chevron. The content of t he panel is also duplicated in t he Plan details ( p. 99 ) and T ask detail s ( p. 97 ) windows respectively. 6.1.2.1 U[...]
-
Page 91
Copyright © Ac ronis, Inc., 20 00 - 2010 91 Otherwise, see 2 following: Remove the reason of the failure - > [optionally] Start the failed task manually Edit the local plan to prevent its future failure in c ase a local plan has failed Edit the ba ckup polic y on the manageme nt serve r in case a centralized plan has failed When cre[...]
-
Page 92
92 Copyright © Acronis, Inc. , 2000 - 2010 The user can stop a runnin g task or a ta sk that needs interaction. The task chan ges to the Stopping sta te and th en to the Idle state. A waiting task can also be stopp ed. In this case, since the task is not running, "st op" means re moving it fro m the queue . Task state diagram Task status[...]
-
Page 93
Copyright © Ac ronis, Inc., 20 00 - 2010 93 6.1.2.2 Working with backup plan s and tasks Actions on backup plans and tasks The following i s a guideline for you to pe rform operati ons with ba ckup plans and tasks. To Do Create a new backup plan, or a task Click New , then s elect one of the f ollowing: Backup plan ( p. 102 ) Recovery tas [...]
-
Page 94
94 Copyright © Acronis, Inc. , 2000 - 2010 Stop a plan/task Backup plan Click Stop . Stopping the running backup plan stops al l its tas ks. Thus , all the tas k oper ations will be aborted. Click Task Stop . What will hap pen if I stop t he task? Generally, stoppin g the task aborts its operation (ba ckup, recovery, validation, exporting , conver[...]
-
Page 95
Copyright © Ac ronis, Inc., 20 00 - 2010 95 Edit a plan/ task Backup plan Click Edit . Backup plan editing is perfor med in the s ame way as creation ( p. 102 ), except for the following limitations : It is not always possible to use all sch eme opt ions, w hen editi ng a backu p plan if the create d archive is not em pty (i.e. contains ba ckups).[...]
-
Page 96
96 Copyright © Acronis, Inc. , 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will hap pen if I delete the backup pl an ? The plan's deletion delet es all its tasks. Why can't I d elete the bac kup plan? The backup plan is i n the "Ru nning" stat e A backup pl an cannot be delete d, if at lea st one of its t[...]
-
Page 97
Copyright © Ac ronis, Inc., 20 00 - 2010 97 Configuring backup plans and the tasks table By default, th e table has si x columns tha t are displayed, others are hid den. If required, you can hid e the displayed co lumns and s how hidden on es. To show or hide columns 1. Right - click a ny column h eader to open the context menu. The m enu items th[...]
-
Page 98
98 Copyright © Acronis, Inc. , 2000 - 2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fr om a disk backu p Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an exis ting virtual machine Recovery (di sk to new VM) Recovery of a disk/volume backup to a ne[...]
-
Page 99
Copyright © Ac ronis, Inc., 20 00 - 2010 99 Backup plan details The Backup pl an details wi ndow (also du plicated on the I nforma tion panel) aggregates in f our tabs all the inform ation on the selected backup pla n. The respective message will appear a t the top of t he tabs, if one of the plan 's tasks requires user interaction. It contai[...]
-
Page 100
100 Copyright © Acronis, Inc. , 2000 - 2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or a ctions a user takes on the machine usin g the program. F or instance, when a user edits a task, the resp ective entry is added to the lo g. When the pro gram executes a task, it adds mult[...]
-
Page 101
Copyright © Ac ronis, Inc., 20 00 - 2010 101 Save the selected log entries to a file 1. Select a single log entry or multip le log entries. 2. Click Save Selected to File . 3. In the opened window, s pecify a path and a name fo r the fil e. Save all the log entries to a file 1. Make sure, that the filt ers are not set. 2. Click Save All to File . [...]
-
Page 102
102 Copyright © Acronis, Inc. , 2000 - 2010 6.1.3.3 Log entry details Displays deta iled informati on on the log entry you ha ve selected and le ts you co py the details to the clip board. To copy the details , click the Copy to clipboard button . Log entry da ta fields A local log entry contains t he following data fields: Type - type of even[...]
-
Page 103
Copyright © Ac ronis, Inc., 20 00 - 2010 103 [Optional] Typ e a descripti on of the bac kup plan. To access this o ption, select the Advance d view check b ox. What to backup Source type ( p. 104 ) Select the type o f data to ba ck up. The type o f data depends on the a gents installed o n the machine. Items to b ackup ( p. 105 ) Specify the da ta[...]
-
Page 104
1 04 Copyright © Acronis, Inc. , 2000 - 2010 Afte r any of the s ettings is cha nged against t he default va lue, a new li ne that disp lays the newly set val ue appears. T he setting sta tus changes fro m Default to Custom . Sh ould you modify the setting again, t he line will display the new value unless the new val ue is the default one. When t[...]
-
Page 105
Copyright © Ac ronis, Inc., 20 00 - 2010 105 If you are no t concerned a bout recovery of the opera ting system a long with all the settings a nd applications, but plan to k eep safe only cer tain data (the c urrent proj ect, for ex ample), cho ose file backup. This will reduce t he archive size, thus saving storage space. Disks/volumes Available [...]
-
Page 106
106 Copyright © Acronis, Inc. , 2000 - 2010 Linux A volume backup stores a ll files and folders of the selected volume indepen dent of their attributes, a boot record and the file sys tem super bl ock. A disk ba ckup s tores all disk volumes as well as the zero track with the master boot record. 6.2.4.2 Selecting files and folders To select files [...]
-
Page 107
Copyright © Ac ronis, Inc., 20 00 - 2010 107 Exclude all system files and folders Select this check box to s kip files and folders with the System attribute. If a folder is System, all of its contents — includi ng files that are not Syste m — will be exclud ed. You can v iew file or f older att ributes in the fi le/folder pr operties or by[...]
-
Page 108
108 Copyright © Acronis, Inc. , 2000 - 2010 After entering acce ss credentials, the folders o n the server become av ailable. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. T o do so, click Use anonym ous access instead of e ntering crede ntials. According t o the orig [...]
-
Page 109
Copyright © Ac ronis, Inc., 20 00 - 2010 109 Use the plan's c redentials The program w ill access the so urce data using the credentia ls of the bac kup plan ac count specified in the General s ection. Use the following credentials The program will access th e source data using the cr edentials you specify. Use this option if the plan[...]
-
Page 110
110 Copyright © Acronis, Inc. , 2000 - 2010 6.2.9.2 Back up later scheme With the B ac k up later scheme, the ba ckup will be p erformed onl y once, at the date and tim e you specify. Specify the appropriate se ttings as follows Backup ty pe Select the type of b ackup: ful l, increm ental, or differe ntial. If there is no full back up in the archi[...]
-
Page 111
Copyright © Ac ronis, Inc., 20 00 - 2010 111 Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly back ups run every fourth Friday , and weekly ba ckups run o n all other Fr idays. Monthly ("Gr andfather") b ackups are ful l; Weekly ("Father") backup s are differential; ?[...]
-
Page 112
112 Copyright © Acronis, Inc. , 2000 - 2010 Daily: 1 week Weekly: 1 month Monthly: ind efinitely As a result, an archive of d aily, weekly, and monthly backups will be created. D aily backups will be ava ilable for seven days since creation . For instance, a da ily backup of Sunday, Januar y 1, will be available thro ugh next Sun day, [...]
-
Page 113
Copyright © Ac ronis, Inc., 20 00 - 2010 113 Weekly/monthly: Friday Keep backups: Daily: 6 months Weekly: 6 months Monthly: 5 y ears Here, daily in cremental backups will be created on Tuesday s and Thursday s, with weekly and monthly back ups performed on Fridays. Note that, in order to choo se Friday in the Weekly/month ly fi[...]
-
Page 114
114 Copyright © Acronis, Inc. , 2000 - 2010 Roll- back period The guarante ed number of ses sions that on e can go ba ck in the archive at any time. Calculated a utomati cally, depe nding on t he schedul e param eters and t he number s of levels you select. See the example below f or details. Example Schedule parameters are set as follows Recu[...]
-
Page 115
Copyright © Ac ronis, Inc., 20 00 - 2010 115 Here are the backups we h ave on day 12 (n umbers in gra y denote dele ted backups) . 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential b ackup has not yet been created, so the backup of da y five is still sto red. Since it depe nds on the f ull backup o f day one, tha t back[...]
-
Page 116
116 Copyright © Acronis, Inc. , 2000 - 2010 This setting is recommend ed for backup destinations such as shared folders or centralized vaults. When there is insufficien t space while back ing up The archive wi ll be cleaned up only d uring backu p and only if there is not enou gh space to create a new backup. In this case, the program will act as [...]
-
Page 117
Copyright © Ac ronis, Inc., 20 00 - 2010 117 Also, let all backups ol der than one year be dele ted from the archive, a nd let the cleanup be performed upo n creating a new backu p. Retention rules: De lete backups older than 12 months Apply the rules: After backi ng up By default, a one -year- old f ull backup wil l not be dele ted until all i nc[...]
-
Page 118
118 Copyright © Acronis, Inc. , 2000 - 2010 You can manu ally run any backup task or clea nup task at a ny time, r egardless of whether it has a schedule. In the first o f the previou s examples, we set up a sche dule only for full backups. However, the scheme will s till result in t hree backup tas ks, enabling you to manually s tart a backup of [...]
-
Page 119
Copyright © Ac ronis, Inc., 20 00 - 2010 119 [Optional] Enter a un ique name for the reco very task. A cons cious name lets you quickly identify the t ask among th e others. Task cred entials ( p. 120 ) [Optional] Th e task will ru n on behalf o f the user wh o is creating the task. You can change th e task account credentials if necessary. To a c[...]
-
Page 120
120 Copyright © Acronis, Inc. , 2000 - 2010 After you complete all the required steps, click OK to create the commit creating of the rec overy task. 6.3.1 T ask crede ntials Provide credentials for th e account under which the task will run. To specify credentials 1. Select one of the follow ing: Run under the c urrent user The task will run u[...]
-
Page 121
Copyright © Ac ronis, Inc., 20 00 - 2010 121 If the port nu mber is not s pecified, port 21 is used fo r FTP and po rt 22 is used for SFTP. After entering access credentials, t he folders on the s erver become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. T [...]
-
Page 122
122 Copyright © Acronis, Inc. , 2000 - 2010 When recover ing the MBR o f one disk to another Acro nis Backup & Recovery 10 r e covers Track 0, which does n ot affect the t arget disk’s p artition table and partition layout. Acron is Backup & Recovery 10 automatically upda tes Windows loaders after re covery, so there is no need to recove[...]
-
Page 123
Copyright © Ac ronis, Inc., 20 00 - 2010 123 Recover to: Physical m achine The selected disks will be r ecovered to the physical di sks of the machi ne the con sole is connected to. On selecti ng this, you p roceed to the regular disk ma pping procedur e described below. Disk #: Disk # (MODEL) ( p. 124 ) Select the destination disk for each of the[...]
-
Page 124
124 Copyright © Acronis, Inc. , 2000 - 2010 6.3.6.2 Volumes Available volu me destinatio ns depend on the agents o perating on the machine. Recover to: Physical m achine The sele cted volumes will be recovered to the phys ical disks of the machine the console is connected to . On selecting this, you proceed to the regul ar volume map ping procedur[...]
-
Page 125
Copyright © Ac ronis, Inc., 20 00 - 2010 125 Volume properties Resizing and relocating When recover ing a volume to a basic M BR disk, you ca n resize and r elocate the vo lume by dragging it or its borders with a mous e or by enter ing correspo nding values in the appropri ate fields. Usi ng this feature, you ca n redistribute the disk space betw[...]
-
Page 126
126 Copyright © Acronis, Inc. , 2000 - 2010 6.3.6.3 File destination To specify a d estination: 1. Select a location to re cover the backed up files to: Original location - files and folders will be recovered t o the same path(s) as they are in the backup. For e xample, if yo u have backe d up all fil es and folders in C: Documents Fina nc[...]
-
Page 127
Copyright © Ac ronis, Inc., 20 00 - 2010 127 Do not overwrite existing file - this will give the file on the hard disk prio rity over the file i n the backup. If you allow files to be overwritten, you still hav e an option to prev ent overwriting of specific files by excluding ( p. 126 ) them from the recovery operation. 6.3.7 Access credentia[...]
-
Page 128
128 Copyright © Acronis, Inc. , 2000 - 2010 hexadecimal co de of this partition typ e is 0xFD. This will guaran tee that the device will be automatically a ssembled fo llowing the rebo ot. To view or c hange the par tition type, use a disk partitioning utility such as f disk . Otherwise (such as in the secon d example), recover the device from[...]
-
Page 129
Copyright © Ac ronis, Inc., 20 00 - 2010 129 The system uses Linu x Loader ( LILO) an d was rec overed from a normal (not from a raw, that is, sector - by - sec tor) bac kup LILO contains numerous re ferences to ab solute sector numbers and so cannot be repaired automatically except for th e case when all data is r ecovered to the sectors that[...]
-
Page 130
130 Copyright © Acronis, Inc. , 2000 - 2010 title Red Hat E nterprise L inux Server ( 2.6.24.4) root (hd0 ,0) kerne l /vmlinuz - 2.6. 24.4 ro roo t=/dev/sda2 r hgb quiet initr d /initrd - 2.6.2 4.4.img The lines starting with ti tle , root , kernel , and initrd res pecti vely determine: The title of t he menu ite m. The device o n which th[...]
-
Page 131
Copyright © Ac ronis, Inc., 20 00 - 2010 131 While successful validatio n means high probability of successful recovery, it does not check all fa ctors that influenc e the recovery pr ocess. If yo u back up th e operating s ystem, only a test recovery in bootable envi ronment to a spare hard drive can guarantee success of the recovery. At least en[...]
-
Page 132
132 Copyright © Acronis, Inc. , 2000 - 2010 Run under the curren t user The task will run under th e credentials with which th e user who st arts the tasks is logged on . If the task ha s to run on s chedule, you will be asked for the curren t user's passwo rd on completing the task creatio n. Use the following credentials The t ask w[...]
-
Page 133
Copyright © Ac ronis, Inc., 20 00 - 2010 133 If the archive is stored on a locally attac hed tape devi ce, expand the Ta pe drives gro up, then click the required device. 2. In the table t o the right o f the tree, sele ct the archive . The table di splays the na mes of the archives contained in ea ch vault/folder you select. While you are rev[...]
-
Page 134
134 Copyright © Acronis, Inc. , 2000 - 2010 The program will access th e location using the cred entials of the tas k account specified in th e General section. Use the f ollowi ng crede ntials The program w ill access the lo cation using t he credentia ls you specify. Use this optio n if the task account does not hav e access permiss ions to [...]
-
Page 135
Copyright © Ac ronis, Inc., 20 00 - 2010 135 "Band aid" dat abase recov ery solution : moun t up an image t hat contains a n SQL data base from a recently failed machine. This will give access to the database until the failed machine is recovered. Offline virus clean : if a machine is at tacked, the ad ministrator shu ts it down,[...]
-
Page 136
136 Copyright © Acronis, Inc. , 2000 - 2010 After entering access credentials, t he folders on the s erver become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. T o do so, click Use anonymous acce ss instead of entering credentials . According t o the orig in[...]
-
Page 137
Copyright © Ac ronis, Inc., 20 00 - 2010 137 6.5.4 V olume se lection Select the volumes to mou nt and configure the mo unting parameters for each o f the selected volumes as follows: 1. Select the c heck box for each volum e you need to mount. 2. Click on the selected volu me to set its mounting pa rameters. Access mode - choose the mo de you[...]
-
Page 138
138 Copyright © Acronis, Inc. , 2000 - 2010 a single back up - an archive co nsisting o f a single full backup will be created. Th e export of a n incremental or a diff erential backup is performed using cons olidation of the pr eceding backups up to the nea rest full back up your choice o f backups belo nging to the s ame archive - the r [...]
-
Page 139
Copyright © Ac ronis, Inc., 20 00 - 2010 139 export from a n unmanaged ce ntralized vault . The export is performed b y the agent ins talled on the managed machin e you specify. The destination can be any location accessible to th e agent, including a m anaged vault. Tip. When configur ing export to a deduplicating m anaged vault , choose a ma[...]
-
Page 140
140 Copyright © Acronis, Inc. , 2000 - 2010 Enter the pat h to the locatio n where the new archive will be created. Be sure to pr ovide a disti nct name and comment for the new archi ve. Access crede ntials ( p. 143 ) [Optional] Provide creden tials for the destination if the task cred entials do no t have enough privileges to access it. To access[...]
-
Page 141
Copyright © Ac ronis, Inc., 20 00 - 2010 141 Note for L inux users: To speci fy a Common Internet File Sys tem (CIFS) network sh a re which is mount ed on a mount poi nt such as /mnt/sha re, selec t this m ount point i nstead of the ne twork share itself. If the archive is stored on a n FTP or SFTP serv er, type the server name or ad dress in [...]
-
Page 142
142 Copyright © Acronis, Inc. , 2000 - 2010 User na me . When entering the name of an A ctive Directory u ser account, b e sure to also specify the d omain name (D OMAIN Us ername o r Username@ domain) Password . Th e password f or the accou nt. 2. Click OK . According t o the orig inal FTP s pecification , creden tials req uired for a c[...]
-
Page 143
Copyright © Ac ronis, Inc., 20 00 - 2010 143 3. Naming the new archive By default, the exported ar chive inherits the name of the original archive. Becaus e having multiple archives of the same name s in the same location is not advisa ble, the following a ctions are disabled with the defa ult archive name: exporting par t of an archiv e to th[...]
-
Page 144
144 Copyright © Acronis, Inc. , 2000 - 2010 To create Acronis Secure Zone, perform the following steps. Space Disk ( p. 144 ) Choose a hard disk (if several) on which to create the zone. Acronis Sec ure Zone is created using unallocated spa ce, if available, or at the e xpense of the volume's free s pace. Size ( p. 144 ) Specify the exa ct si[...]
-
Page 145
Copyright © Ac ronis, Inc., 20 00 - 2010 145 6.8.1.3 Password for Acronis Secure Zone Setting up a passw or d protects th e Acronis Secur e Zone from u nauthorize d access. The pr ogram will ask for the pa ssword at an y operation r elating to the zone and the archives located there, such as data backup and recovery, validating ar chives, resizing[...]
-
Page 146
146 Copyright © Acronis, Inc. , 2000 - 2010 Use backup s chemes with a utomatic clean up to back up to the zone, o r delete outdate d archives manually usin g the vault ma nagement functio nality. With the new Acronis Secu re Zone behavior, yo u obtain the ab ility to: list archives l ocated in the zone and ba ckups inclu ded in each a rchive [...]
-
Page 147
Copyright © Ac ronis, Inc., 20 00 - 2010 147 If you select several volum es, the space will be distributed prop ortionally to each partition. If you do not select any volume, the freed spac e becomes u nallocated. After you click OK , Acronis Backup & Recovery 10 will star t deletin g the zone. When removi ng Acronis Ba ckup & Recovery 1 0[...]
-
Page 148
148 Copyright © Acronis, Inc. , 2000 - 2010 deploy an op erating system o n bare metal create basic o r dynamic vo lumes on bare me tal back up s ector - by - sector a disk with an unsuppo rted file system back up offl ine any data t hat cannot b e backed up o nline because of restricte d access, being permanently lo cked by the ru[...]
-
Page 149
Copyright © Ac ronis, Inc., 20 00 - 2010 149 If not configured, the A cronis loader waits for s omeone to select whether to b oot the operating sys tem (if present) or the Acr onis compone n t. If you set, say, 10 sec. for the bootable agent, the ag ent will launc h 10 seconds after th e menu is displ ayed. This ena bles unattended on site[...]
-
Page 150
150 Copyright © Acronis, Inc. , 2000 - 2010 Specifies the video mode t o be used by the bootable media's graphi cal user int erface. The mo de number is giv en by mode_number in the hexadecim al format — for exam ple: vga=0x318 Screen resolution and t he number of colo rs corresponding to a mode nu mber may be different on different machine[...]
-
Page 151
Copyright © Ac ronis, Inc., 20 00 - 2010 151 6.10.1.2 Netw ork set tings While creati ng Acronis bootabl e media, you have an op tion to pre - configure network conn ections that will be u sed by the bo otable agent. Th e followin g parameters can be pre - co nfigured: IP address Subnet mask Gateway DNS server WINS server. Once[...]
-
Page 152
152 Copyright © Acronis, Inc. , 2000 - 2010 If the port ha s not been pr e - configured, the agent us es the default po rt number (98 76.) This po rt is also used as default by th e Acronis Backup & Recovery 1 0 Management C onsole. 6.10.2 Connec ting to a m achine b ooted from me dia Once a machi ne boots from b ootable media , the machine te[...]
-
Page 153
Copyright © Ac ronis, Inc., 20 00 - 2010 153 1. In the boot m enu, press F11 . 2. Add to the command prom pt the following co mmand: vga=ask , and then pro ceed with bo oting. 3. From the list of suppo rted vid eo modes , choose the a ppropriate o ne by typing its number (for example, 318 ), and th en press ENT ER. If you do no t wish to follo w t[...]
-
Page 154
154 Copyright © Acronis, Inc. , 2000 - 2010 Acronis command line utilities acronis asamb a lash restoreraids trueimagecmd trueimagemnt Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm[...]
-
Page 155
Copyright © Ac ronis, Inc., 20 00 - 2010 155 hexdump readcd hotplug reboot 6.10.5 R eco v ering MD devi ces an d logi cal v olu mes To recover Linux Software RA ID devices, known as MD device s, and/or devices create d b y Logical Volume Mana ger (LVM), kno wn as logical vo lumes, you nee d to create the correspondin g volume structure before star[...]
-
Page 156
156 Copyright © Acronis, Inc. , 2000 - 2010 6. Click Recover , then specify the path to the a rchive and a ny other requi red parameters , and then click OK . If Acronis Bac kup & Recover y 10 could no t create the v o lume structure (or if it is no t present in the archive), create the structur e manually. 6.10.5.2 Creating the volume stru ct[...]
-
Page 157
Copyright © Ac ronis, Inc., 20 00 - 2010 157 The following picture illust rates this configuration. Do the following to recov er data from this archive. Step 1: Creati ng the volume s tructure 1. Boot the mach ine from a Li nux - based bo otable media. 2. In the manag ement console, p ress CTRL+ALT+F2 . 3. Run the following comma nds to create the[...]
-
Page 158
158 Copyright © Acronis, Inc. , 2000 - 2010 3. In Backup , click Chang e and then sel ect the backup fr om which yo u want to re cover data. 4. In Data type , select Volumes . 5. In Items to recover , s elect the check bo x next to m y_volgrou p - my_logvol . 6. Under Where t o recover , click Change , and then s elect the logical volume tha t you[...]
-
Page 159
Copyright © Ac ronis, Inc., 20 00 - 2010 159 To collect system information 1. In the manag ement console, s elect from the to p menu Hel p > Collec t system in formation fr om 'machine na me'. 2. Speci fy where to save the file with system informa tion.[...]
-
Page 160
Copyright © Acronis, In c., 2000 - 2010 160 7 Glossary A Acronis A ctive Rest ore The Acronis p roprietary tech nology that br ings a system on line immediate ly after the s ystem recovery is st arted. The sys tem boots from th e b ackup ( p. 166 ) and the machi ne becomes operational and ready to provide necessary s ervices. The data required to [...]
-
Page 161
Copyright © Ac ronis, Inc., 20 00 - 2010 161 Agent (Acronis Backup & R ecovery 10 Age nt) An applicatio n that perfor ms data backup a nd recovery a nd enables o ther managemen t operations o n the machi ne ( p. 169 ), such as task managemen t and operatio ns with hard disks. The type of d ata that can be backed up depends on t he agent typ e.[...]
-
Page 162
162 Copyright © Ac ronis, Inc., 20 00 - 2010 Backup options Configuration parameter s of a backup o peration ( p. 1 61 ), such as pre/post bac kup commands, maximum netw ork bandwidth allotted fo r the backup s tream or data compression l evel. Backup options are a part of a backup plan ( p. 1 62 ). Backup plan (Plan) A set of rules that specify h[...]
-
Page 163
Copyright © Ac ronis, Inc., 20 00 - 2010 163 5. On each machi ne, the agent i nstalled on th e machine crea tes a backup pla n ( p. 162 ) usi ng other rules specifi ed by the policy. Su ch backup pl an is calle d a central ized plan ( p. 164 ). 6. On each machi ne, the agent i nstalled on th e machine crea tes a set of c entralize d tasks ( p. 164[...]
-
Page 164
164 Copyright © Ac ronis, Inc., 20 00 - 2010 built - in group except for deleting the m achine from the managem ent server. Virtual machines a re deleted as a result of their host server deletion. A backup poli cy ( p. 162 ) can be a pplied to a built - in gr oup. C Centralized backup plan A backup plan ( p. 162 ) that app ears on the ma naged mac[...]
-
Page 165
Copyright © Ac ronis, Inc., 20 00 - 2010 165 Cleanup consists in applyin g to an archive the reten tion rules set by the ba ckup plan ( p. 162 ) that produces the archive. This operation ch ecks if the archive has exceeded its maximu m size and/o r for expired back ups. This may or may not r esult in deleti ng backups depen ding on w hether the re[...]
-
Page 166
166 Copyright © Ac ronis, Inc., 20 00 - 2010 operations ar e configured on the managemen t server ( p. 170 ) and propagated by the server to the managed machin es). The direct m anagement opera tions inc lu de: creating and managing loc al backup pla ns ( p. 169 ) creating and managing local tasks ( p. 169 ), such as recovery tasks cre[...]
-
Page 167
Copyright © Ac ronis, Inc., 20 00 - 2010 167 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for bett er fault tolerance, better perfor mance or larger vo lume size. A dynamic di sk can use eit her the mast er boot recor [...]
-
Page 168
168 Copyright © Ac ronis, Inc., 20 00 - 2010 Dynamic volume Any volume l ocated on dy namic disks ( p. 166 ), or more precisely, on a d isk group ( p. 166 ). Dynamic volumes can span multipl e disks. Dynam ic volumes ar e usually conf igured depend ing on the d esired goal: to increase the volume size (a s panned volume) to reduce the acce[...]
-
Page 169
Copyright © Ac ronis, Inc., 20 00 - 2010 169 G GFS (Grandfather - Fat her - Son) A popular ba ckup scheme ( p. 163 ) aimed to maintain the o ptimal bal ance between a backup archiv e ( p. 161 ) size and t he number o f recovery points ( p. 1 70 ) available from the archive. GFS enables recovering with daily reso lution for the last sev eral days, [...]
-
Page 170
170 Copyright © Ac ronis, Inc., 20 00 - 2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node o r on a tape l ibrary locally attached to t he storage node. The storage nod e performs storage node - side cleanup ( p. 171 ) and stora ge no de - side validation ( p . 172 ) for each archive [...]
-
Page 171
Copyright © Ac ronis, Inc., 20 00 - 2010 171 R Recovery point Date and time to which th e backed up data can be reverted to. Registered machine A machine ( p. 169 ) ma naged by a ma nagement server ( p. 170 ). A machin e can be regis tered on only one management server at a time. A machine beco mes registered as a result of the registration ( p. 1[...]
-
Page 172
172 Copyright © Ac ronis, Inc., 20 00 - 2010 Since the clea nup schedule exists on the machine ( p. 169 ) t he agent ( p. 160 ) resides on, and therefore use s the machin e’s time and ev ents, the agent has to initia te the stora ge node -side cleanup every tim e the schedul ed time or even t comes. To d o so, the ag ent must be on line. T he fo[...]
-
Page 173
Copyright © Ac ronis, Inc., 20 00 - 2010 173 the image b eing re covered is located in Acronis Secur e Zone ( p. 160 ) o r when using Acro nis Active Restore ( p. 160 ), because these features are primar ily meant for instant d a ta recovery on t he same machi ne. Universal Restore is not ava ilable when recovering Linux. Unmanaged vault A[...]
-
Page 174
174 Copyright © Ac ronis, Inc., 20 00 - 2010 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1). WinPE is com monly used by OE Ms and co rporations fo r deployment, tes t, diagnostic an d system repair purpo ses. A machin e can be boot ed into WinP E via PXE, CD - [...]
-
Page 175
8 Index A Access credentials • 135, 136 Access credentials for archive location • 103, 108 Access credentials for destination • 119, 127, 140, 143 Access credentials for location • 119, 122 Access credentials for source • 103, 106, 131, 133, 139, 141 Acronis Active Restore • 38, 160, 173 Acronis Backup & Recovery 10 components • 1[...]
-
Page 176
176 Copyright © Ac ronis, Inc., 20 00 - 2010 C Centralized backup plan • 38, 162, 163, 164 Centralized management • 164, 165 Centralized task • 163, 164, 166 Centralized vault • 164, 169, 170 Cleanup • 17, 161, 163, 164, 165, 171, 173 Collecting system information • 158 Common operations • 74 Compression level • 45, 51 C onditions [...]
-
Page 177
Copyright © Ac ronis, Inc., 20 00 - 2010 177 Fits time interval • 85 Fonts • 41 Full backup • 161, 163, 165, 168 Full, incremental and differential backups • 17, 21, 109 G Getting started • 6 GFS (Grandfather - Father - Son) • 163, 169, 172 GFS backup scheme • 24, 169 Grandfather - Father - Son scheme • 110 H HDD writing speed • [...]
-
Page 178
178 Copyright © Ac ronis, Inc., 20 00 - 2010 Owners and credentials • 23, 71, 120, 132, 140 P Password for Acronis Secure Zone • 144, 145 Personal vault • 160, 166, 170 Personal vaults • 39, 71 Physical machine • 163, 170 Plan • 170 Policy • 170 Pop- up messages • 40 Post- backup command • 48 Post- data capture command • 50 Pos[...]
-
Page 179
Copyright © Ac ronis, Inc., 20 00 - 2010 179 Tower of Hanoi scheme • 113 U Understanding Acronis Backup & Recovery 10 • 17 Understanding states and statuses • 90 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) • 38, 172 Unmanaged vault • 161, 173 User privileges on a managed machine • 23, 104, 120, 132, 140 U[...]