Avanquest Acronis Backup & Recovery 10 Advanced Workstation manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 389 pages
- N/A
Aller à la page of
Les manuels d’utilisation similaires
-
Thermostat
Bosch CS 200
12 pages 1.18 mb -
Vacuum Cleaner
AEG CX7-2-30DB
30 pages 2.1 mb -
Security
Bosch Easy Series
8 pages 0.72 mb -
Lighting
In Lite Sentina
14 pages 0.43 mb -
Lighting
In Lite Sentina 150X150
14 pages 0.38 mb -
Security
Bosch RADION receiver OP RFRC-OPT
56 pages 1.61 mb -
Lighting
In Lite SHUTTER 1
15 pages 0.88 mb -
Vacuum Cleaner
AEG CX8-2-75RR
30 pages 1.88 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Avanquest Acronis Backup & Recovery 10 Advanced Workstation. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Avanquest Acronis Backup & Recovery 10 Advanced Workstation ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Avanquest Acronis Backup & Recovery 10 Advanced Workstation décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Avanquest Acronis Backup & Recovery 10 Advanced Workstation devrait contenir:
- informations sur les caractéristiques techniques du dispositif Avanquest Acronis Backup & Recovery 10 Advanced Workstation
- nom du fabricant et année de fabrication Avanquest Acronis Backup & Recovery 10 Advanced Workstation
- instructions d'utilisation, de réglage et d’entretien de l'équipement Avanquest Acronis Backup & Recovery 10 Advanced Workstation
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Avanquest Acronis Backup & Recovery 10 Advanced Workstation ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Avanquest Acronis Backup & Recovery 10 Advanced Workstation et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Avanquest en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Avanquest Acronis Backup & Recovery 10 Advanced Workstation, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Avanquest Acronis Backup & Recovery 10 Advanced Workstation, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Avanquest Acronis Backup & Recovery 10 Advanced Workstation. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
User's Gui de Acronis® Backup & Recovery ™ 10 Advanced Workstation[...]
-
Page 2
Copyr ight © Acronis, Inc. , 2000 - 2009. All rights reserv ed. “Acronis” and “Acronis Sec ure Zone” are registered tr ademarks of Acronis, Inc. "Acro nis Comput e wit h Confi dence" , “Acr onis Startu p Reco very Manager” , “Acr onis Acti ve Rest ore ” and the Ac ronis logo a re trademarks of Acronis, Inc . Linux is a re[...]
-
Page 3
Table of Con tent s 1. Intro ducin g Acro nis ® Ba cku p & Re co ver y™ 10 ......................................................... 7 1.1. Acronis Ba ckup & Reco very 10 over view ............................................................................ 7 1.2. Getting st arted .........................................................[...]
-
Page 4
3.1.3 . Tim e - bas ed al ert s ...................................................................................................................................... 82 3.1.4 . Numbe r of task s ......................................................................................................................................... 82 3.1.5 . Font [...]
-
Page 5
6.2.1 . Why is the program asking for t he password? ...................................................................................... 196 6.2.2 . Backup plan 's cred entials ........................................................................................................................ 196 6.2.3 . Source type ....................[...]
-
Page 6
6.10. 6. Acronis PXE S erver ................................................................................................................................... 268 6.11. Disk management ........................................................................................................... 270 6.11. 1. Basic p reca utio ns .....................[...]
-
Page 7
Copyrig ht © A croni s, In c., 200 0 - 20 09 7 1. Introduc ing A cronis® Ba ckup & R eco very™ 10 1.1. Acronis Backup & Recovery 10 overview Based o n Acronis’ pat ented disk im aging and bare met al resto re technologies, Acronis Backu p & Recovery 10 succeeds Acr onis True I mage Ech o as th e next genera tion disaster re covery[...]
-
Page 8
8 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Enterp rise le vel of secu r ity Controlling user right s to perform oper ations and acces s backups Running ser vices with m inimal use r rights Restricted rem ote acc ess t o a backu p agen t Secure com municatio n between the pro duct compo nents Using third - party certificates for au thentica[...]
-
Page 9
Copyright © A cronis, Inc., 2000 - 2009 9 The simpli fied way of central ized manag ement • Backup Using the Back up contr o l, select th e ma chine which you want to back up and then create a backup plan ( p. 370 ) on the machine. Y ou can create bac kup plans on mult iple mac hines in turn. • Recovery Using the Reco ver contr ol, selec t the[...]
-
Page 10
10 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Creati ng a backup policy rather than bac kup plans Set up a cent ralized back up policy and appl y it to the All machines gr oup. This way yo u will deploy backup pla ns on ea ch machine wit h a single action. S elect Ac tions > Creat e backup poli cy fro m the top menu an d th en ref er to t[...]
-
Page 11
Copyright © A cronis, Inc., 2000 - 2009 11 Navig ation pane Contains the Navigation tree and the Shortc uts bar and lets you navigate to the di fferen t view s (see th e Navigation pane ( p. 11 ) section .) Actions and tools pane Contains bars with a set of actions that can be pe rform ed and tools (see the Actions and Tool s pane ( p. 12 ) sectio[...]
-
Page 12
12 Copyrig ht © A croni s, In c., 200 0 - 20 09 • [Manage ment ser ver name] . Root of the tr ee also called a Welcome view . Displays the name of the management se rver the cons ole is currently connected to. Use this view f o r quick access to the main o perations, available on the managemen t server. o Dashboard . Use this vie w to es timate [...]
-
Page 13
Copyright © A cronis, Inc., 2000 - 2009 13 actions bar will be named as 'System backup' ac tion s and will have the set of actions typical to backup pla ns. All acti ons can also be access ed in the respec tive menu items. A me nu item appears o n the menu bar when you sel ect an item in any o f the navigatio n views. Examp les of "[...]
-
Page 14
14 Copyrig ht © A croni s, In c., 200 0 - 20 09 Help Contains a list of help topics. Different views and action pages of Acr onis Backup & Recovery 10 provided with lists of specif ic help topics. 1.2.1 .3. Operatio ns wit h panes H ow to expand/minimize panes By default, the Nav igat ion pane appea rs expan ded and the Act ions and Tool s - m[...]
-
Page 15
Copyright © A cronis, Inc., 2000 - 2009 15 "Tasks " v iew Common w ay of w orking with vi ews Generally, every view cont ains a table of items, a table toolbar with buttons, and the Informat ion panel. • Use filtering and sorting ca pabilities to search the tabl e for the item in q uesti on • In the tabl e, sel ect the desi red item [...]
-
Page 16
16 Copyrig ht © A croni s, In c., 200 0 - 20 09 Action page - C reate backup pl an Using con trol s and s peci fying s ettings The action pages offer two ways of representation: basic and advanced. The basic representation hides suc h fields a s credentials , comm ents, etc . When the advanced repres en tation is enabl ed, all the available fields[...]
-
Page 17
Copyright © A cronis, Inc., 2000 - 2009 17 Navi gation b uttons 1.3. Acron is Backup & Recove ry 10 c omponents This section contains a list of Acronis B ackup & Recovery 1 0 components with a brief description of their functionality. Acronis Ba ckup & Reco very 10 inclu des thr ee main types of comp o nents. Compon ents f or a ma nage[...]
-
Page 18
18 Copyrig ht © A croni s, In c., 200 0 - 20 09 File bac kup File - level data protection is based on backing up files and folders residing on the machine where the agent is installed or on a n e twork share. Files can be recovered to th eir original location or t o another place. It is possible to rec over all files and folders that were backed u[...]
-
Page 19
Copyright © A cronis, Inc., 2000 - 2009 19 Restore handles differences in devices that are critical for Wind ows start - up, such as st orage controllers, motherboard or chipset. 1.3.3. Components for centr alized manage ment This se ction lis ts the components i ncluded in t he Acroni s Backup & Recovery 10 edition s that prov ide the central[...]
-
Page 20
20 Copyrig ht © A croni s, In c., 200 0 - 20 09 VMware vCenter i nte gration This add - o n provides the capability to v iew virtual machines managed by a VMware vCenter Server in the manage ment server GU I, view th e backup s tatus of th ese m achines i n the vCenter, and automatically register virtual machines cr eated by Acr onis Bac kup &[...]
-
Page 21
Copyright © A cronis, Inc., 2000 - 2009 21 This functionality cannot be disabled in a managed vault. The next t wo operations are optional. Deduplication A managed vault can b e configured as a deduplicati ng vault . This means that identical data will b e backed up to this v ault only o nce to minimi ze the network usage during back up and sto ra[...]
-
Page 22
22 Copyrig ht © A croni s, In c., 200 0 - 20 09 1.3.5. Acronis W ake - On - L AN Pr oxy Acronis Wake - On - LAN Proxy ena bles Acronis Backup & Recovery 10 Management Server to wake up for bac kup machine s located in a nothe r subnet . Ac roni s Wake - On - LAN Proxy installs on any server in the subnet w here the machines t o be backed up ar[...]
-
Page 23
Copyright © A cronis, Inc., 2000 - 2009 23 1.5. Suppo rted f ile systems Acronis Backup & Recovery 10 can back up and recov er the following file systems with the fo llowing limitations : • FAT1 6/32 • NTFS • Ext2/Ext3 • ReiserFS3 - particular files cannot be recovered fr om disk backups located on A cronis Backup & Recovery 10 Sto[...]
-
Page 24
24 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acro nis Backup & Recover y 10 Manageme n t Serve r Item Minimum requirements Recommended Syste m memory 512 MB 1 GB or mor e Installation disk space 25 MB Space r equir ed for Operational SQL Server and Report ing SQL Server 200 MB A cronis Ba ckup & R ecove ry 10 Stor age Nod e Item Minimum[...]
-
Page 25
Copyrig ht © A croni s, In c., 200 0 - 20 09 25 2. Understa nding Ac ronis Backup & Reco very 1 0 This se ction att empts to gi ve its readers a clear u nder standin g of th e produ ct s o that th ey can use th e product in various circumstanc es wi thout step - by - step instr uctions . 2.1. Basic conce pts Please familiarize yourself with th[...]
-
Page 26
26 Copyrig ht © A croni s, In c., 200 0 - 20 09 The following diagram illustrates the notions discussed abov e. For more definitions please refer to the Glossary.[...]
-
Page 27
Copyrig ht © A croni s, In c., 200 0 - 20 09 27 Backup using b ootable media You ca n boot t he machine using the bo otable me dia, co nfigure t he backup o peration i n the same way as a simple backup plan and execut e the operation. This will help you extrac t files and logical volumes from a system that failed to boot, take an image of the offl[...]
-
Page 28
28 Copyrig ht © A croni s, In c., 200 0 - 20 09 The following diagram illustrates data r e covery under the opera ting system (online) . No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that m achine. This ability (re[...]
-
Page 29
Copyrig ht © A croni s, In c., 200 0 - 20 09 29 If the machine fails to boot or y ou need to recover data to bare metal, you boot the machine using the bo otable media and con figure th e rec o very op eration in th e sam e way as th e recovery t ask. The following diagram illustrate s the recovery using the b oo table media. 2.2. Full , incremen [...]
-
Page 30
30 Copyrig ht © A croni s, In c., 200 0 - 20 09 It is wid ely accepted tha t a full back up is the sl owest t o do bu t the fas test to res tore. With Acr onis technologies, recovery from an incremental bac k up may be n o t slower than recovery fro m a full one. A full back up is most useful when: • you need to roll back the s y stem to its ini[...]
-
Page 31
Copyrig ht © A croni s, In c., 200 0 - 20 09 31 specificati ons of the de vices, the backu p/rec overy options y ou set, to name a fe w. Practice is the best guide to selecti ng the optimal b acku p sche me. Paramet er Full backup Dif fer en tia l b ack up Incrementa l backup Storage s pace Maximal Medium Minimal Creation tim e Maximal Medium Mini[...]
-
Page 32
32 Copyrig ht © A croni s, In c., 200 0 - 20 09 Managin g a plan (task ) o wned by an oth er us er Having Administrator privileges on the machine, a use r can modify tasks an d loc al backup plans owned by a ny user regi ster ed in the opera ting sys tem. When a user opens a plan or task for editing, which is owned by another user, all pas swords [...]
-
Page 33
Copyrig ht © A croni s, In c., 200 0 - 20 09 33 2.5. GFS ba ckup sc heme This secti on co vers imple mentation of th e Grandfather - Father - Son (GFS) backup scheme in Acro nis Backup & Recovery 10. With this b ackup schem e you are n ot allowed to ba ck up more oft en than once a day. The sch eme enables you to mark out the daily, weekly and[...]
-
Page 34
34 Copyrig ht © A croni s, In c., 200 0 - 20 09 Weekly/ Monthly This step fo rms the dail y, weekly and mo nthly c ycles in the s chedu le. Select a day o f the w eek from the days s elect ed in the previous s tep. Each 1st, 2nd and 3rd backup cr eated o n this day of the week wil l be considere d as a we ekly bac kup. Each 4t h backup creat ed on[...]
-
Page 35
Copyrig ht © A croni s, In c., 200 0 - 20 09 35 Keep backups: Mont hly This st ep defines the retention rule for monthly backups. The cleanup task w ill run after e ach monthly backup and de lete all monthly backups that are o lder than you s pecify. T he monthly backups’ retentio n period canno t be less than the weekly backups’ retention p e[...]
-
Page 36
36 Copyrig ht © A croni s, In c., 200 0 - 20 09 Starting from the third week, weekly backup s will be regularly deleted. Afte r 6 months, monthly backups w ill start t o be deleted. The diagram fo r weekly and monthly backups will look sim ilar to the week - based timescale. The r esul tin g arch iv e: re al In reality, the archive content will s [...]
-
Page 37
Copyrig ht © A croni s, In c., 200 0 - 20 09 37 2.6. Tower of Han oi backup sch eme The need to have frequent backups always conflicts with the co st of keeping such backups for a long time. The Tower of Han oi (ToH) ba ckup schem e is a u seful compr omise. Towe r of Hano i ov ervi ew The Tower of Hanoi scheme is based on a mathematical puzzle of[...]
-
Page 38
38 Copyrig ht © A croni s, In c., 200 0 - 20 09 Towe r of Hano i by Ac ron is The Tow er of Han oi backup scheme i s generally too complex to mentally cal culate the ne xt media to be used. B ut Acronis Backup & Recovery 10 provides you with automation of the scheme usage . You ca n set up the ba ckup scheme while creating a back up plan. Acro[...]
-
Page 39
Copyrig ht © A croni s, In c., 200 0 - 20 09 39 For information about using Tower of Hanoi for tape libraries, see Using the T ower of Hanoi tape rotation sch eme ( p. 148 ). 2.7. Reten tion ru les The backups p roduced by a backup pl an make an archive. The two ret ention rules described in this section en able y o u to li m it the ar chive si ze[...]
-
Page 40
40 Copyrig ht © A croni s, In c., 200 0 - 20 09 There is a certain risk tha t all but one backup will be deleted if the maximum archi v e size is set improperly (too small) or a regular backup turns out to be too large. To protect the recent backups from deleti on, select the Never delet e backups y ounger than check box a nd specify t he maximum [...]
-
Page 41
Copyrig ht © A croni s, In c., 200 0 - 20 09 41 • Retain t he backup until all dependent backups bec ome subj ect to deleti on The o utdated backup wi ll be kept un til all ba ckups t hat de pend o n it also become o utdat ed. Then all the chain will be dele ted at once during the regular cleanup. This mode helps t o avoid the potentially time -[...]
-
Page 42
42 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, wit h minor limitations, basic GPT vo lumes. Backing up dyn am ic vol umes Dynamic and basic GPT vo lumes are backe d up in the s ame w ay as basic MBR vol umes. Whe n creating a backup plan through the GUI, all types of vo[...]
-
Page 43
Copyrig ht © A croni s, In c., 200 0 - 20 09 43 o If the d ata size is less than 20 GB, then one disk can hold, say, 10G B; the other will ho ld the remaining 10GB. This way, a striped volume will be created on both disks and 20GB on the second disk will remain un allo cated. o If the data size is more t han 20GB, the dat a cannot be distr ibuted [...]
-
Page 44
44 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.9. Tape sup port Acronis Backup & Recove ry 10 supports tape librar ies, autoloaders, SCSI and USB tape drives as storage d evices. A tape d evice can be l o cally attached to a managed machine (in this case, the Acr onis Backup & Recovery 10 Ag ent writes and r eads th e tapes) or ac cesse[...]
-
Page 45
Copyrig ht © A croni s, In c., 200 0 - 20 09 45 Tape written on a tape device through... Backu p Serv er ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + Storage Node ABR10 - - - + 2.9.2. Using a sing le tape d rive A tape drive that is locally attached to a m anaged machine can be us e d by local backup plans as a storage device. The functional[...]
-
Page 46
46 Copyrig ht © A croni s, In c., 200 0 - 20 09 Recov ery f rom a loc all y attach ed tape devi ce Before crea ting a recover y task, i nsert or mount the tape co ntaini ng the backup yo u need to reco ver. When creating a recovery task, select the tape device from the list of available locations and then select the b ackup. After r ecovery is sta[...]
-
Page 47
Copyrig ht © A croni s, In c., 200 0 - 20 09 47 With the new Acronis Secu re Zone behavior, you obtain the ability to: • list arc hives loca ted in the zone and ba ckups contai ned in each arc hive • examine a b acku p's c ontent • mount a di sk backup t o copy files from the backup to a physic al disk • safely delete archives and bac[...]
-
Page 48
48 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.10.3. Univ ersal Restore (A cronis Back up & Recovery 10 Universal Rest ore) Acronis Backup & Recover y 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Res tore handles di f ferences[...]
-
Page 49
Copyrig ht © A croni s, In c., 200 0 - 20 09 49 Universal Restore relies on the built - in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system star t, such as video, au dio and USB . Window s takes co ntrol ove r this pro cess during t he logo n phase, and i f som e of th[...]
-
Page 50
50 Copyrig ht © A croni s, In c., 200 0 - 20 09 Limitat ion The only supported archive location is a local drive, or more precisely, any device available through the machi ne’s BIOS. Th is may be Acroni s Secure Zone, a U SB hard d rive, a flash drive or an y internal hard drive. How i t wo rks When configuring a r ecovery operation, you selec t[...]
-
Page 51
Copyrig ht © A croni s, In c., 200 0 - 20 09 51 4. Configur e the sy stem r ecovery: select the system disk or volume a nd s elect the Use Acr onis Active Resto re check box. Acronis Ac tive Restore w ill ch oose for t he boot - up and subs equent recover y the fir st operati ng system f o und during the backup scan. D o not try to recover more th[...]
-
Page 52
52 Copyrig ht © A croni s, In c., 200 0 - 20 09 Since you conne ct the console t o the manage ment s erver rather than to each machi ne and p erform all management operations through the central manag ement unit, this way of management is called centralized management ( p. 372 ). Centraliz ed man agement d oes not rule out th e direct m anagement [...]
-
Page 53
Copyrig ht © A croni s, In c., 200 0 - 20 09 53 You have to pro tect each server as a whole, th e users ' data on th e works tations, and the virtu al machines. Y o u want t o be abl e to track the h ealth of the data pr otecti on, be sure th at the backu p archives do not store duplicated information and that the obsolete backups are deleted[...]
-
Page 54
54 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Install Acronis Backup & Recovery 1 0 Storage Node [ASN] on one of the Windows servers (9) . T he storage node enables you to organize the infrastructure for storing backup arc hives and to use the dedup lication f unctionality . The n ode can be ins talled together with the management ser ver[...]
-
Page 55
Copyrig ht © A croni s, In c., 200 0 - 20 09 55 3. Apply the policy to the S_1 grou p. Make sure t hat the policy ha s been su ccessfully de ployed to each of th e servers. The p olicy deploymen t state h as to chan ge fr om Deploying to D eployed and its status has to be OK . T o see th e resul ting backup pla ns on each of th e ser vers: a. navi[...]
-
Page 56
56 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.2 .3 . Protecti ng the vi rtu al machi nes Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in multiple ways: • Connec t the co nsole to the virtual appliance (Agent for ES X) and create a b ackup plan that will back up all o r some of the vir[...]
-
Page 57
Copyrig ht © A croni s, In c., 200 0 - 20 09 57 Deployi ng a p olicy transfers the established c orrespondence to the machines. Physically, a bundle of tasks i s created on each machine according t o the configurat ion prov ided by the po licy. Revoki ng a policy is the reve rse action to the aggregate of applying and deploying. Revo king removes [...]
-
Page 58
58 Copyrig ht © A croni s, In c., 200 0 - 20 09 The same poli cy on a group and on a ma chine 1. The same policy can be applied t o a group and to a machine . Nothing cha nges on the machine at the seco nd applicatio n of th e same policy, but th e s erver re members tha t the p olicy has been applied twice. 2. A policy, revoked from th e group, r[...]
-
Page 59
Copyrig ht © A croni s, In c., 200 0 - 20 09 59 2.11.4 .3 . Inherit ance of policies Policy inheritance can be easily understo od if we assume that a machine can b e a member of only one group be sides the All machi nes group. Let's start from this simplified approach. In the diagram below, the container stands for a group; the tw o- color ci[...]
-
Page 60
60 Copyrig ht © A croni s, In c., 200 0 - 20 09 Besides the A ll machine s group, we have the cus tom G1 group in the r oot and t he custom G2 group, whic h is G1's child. The "green " policy, applied to the All machi nes group, is inh erited by all machine s. The "orange" policy, applied to G1, is inherited by the G1 memb[...]
-
Page 61
Copyrig ht © A croni s, In c., 200 0 - 20 09 61 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines - > #4 G1 - > G2 - > #4 G2 - > #4 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines - > #5 or [...]
-
Page 62
62 Copyrig ht © A croni s, In c., 200 0 - 20 09 You may cha nge grouping co nditio ns or the machine may change its pro perties so t hat the machine leaves o ne gro up and is inc luded int o ano ther. T his may resul t in revo king on e policy and deplo ying another policy. In this cas e, the first policy's state on the machine will be Revok [...]
-
Page 63
Copyrig ht © A croni s, In c., 200 0 - 20 09 63 Examples Assume, the sel ection rule s tates that th e polic y has to bac k up volumes D: a nd F:. The policy is applied t o bot h Linux and Windows machines. Once the first backup is started, the polic y gets the Error status on t he Linux mac hines and on t he Windows mac hines that do not have suc[...]
-
Page 64
64 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.5 .4 . Policy s tatus on a gr oup To see this p aramet er, select Machines in the tr ee, then select the g ro up, and then select the Ba ckup polic ies tab on the Infor mation pane . This st atus is de fined as the most severe status of the po licy on the machi nes included i n the gro up and it[...]
-
Page 65
Copyrig ht © A croni s, In c., 200 0 - 20 09 65 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a duplicate of an already stored one , its content is not tr ansferred over the network. Dedupli cation is perfo rmed on disk b locks (blo ck - level deduplication) and on files (file - lev el dedup[...]
-
Page 66
66 Copyrig ht © A croni s, In c., 200 0 - 20 09 Before sen ding th e item to th e vault, th e agen t queries the dedupl ication datab ase to dete rmine whether the ite m's hash va lue is the same as that of a n alread y stor ed item. If so, th e agen t sends only t he item' s hash v alue; otherwise, it sen ds th e ite m itsel f. Some ite[...]
-
Page 67
Copyrig ht © A croni s, In c., 200 0 - 20 09 67 • When per forming inc remental backups o f data that do es not change i tself, but chang es it s locat ion . Such is the case when multiple pieces of data circulat e over the net wo rk or within one system . Each time a piec e of data moves, i t is included in t he increme ntal backup whic h becom[...]
-
Page 68
68 Copyrig ht © A croni s, In c., 200 0 - 20 09 What r atio to ex pec t Although , in some situat ions, the deduplica tion ratio may be ver y high (in the previous example, increasing the number of machines would lead to ratios of 3:1, 4:1, etc.), a reasona bl e expecta tion for a typical environment is a r atio between 1.2:1 and 1.6:1. As a more [...]
-
Page 69
Copyrig ht © A croni s, In c., 200 0 - 20 09 69 File - leve l deduplication re strict i on s During a file backup to an archive in a deduplicating vault, deduplication of a file is not performed in the following cases: • If the fi le is encrypted an d the In archiv es, store encrypt ed files in decry pted state che ck bo x in the back up options[...]
-
Page 70
70 Copyrig ht © A croni s, In c., 200 0 - 20 09 3. To specify cr edentials for c o nnecti on, click Options and then t ype the user name and passw ord in the User name and Passwo rd boxes respecti v ely. In Window s, if you leave the User name box empty, t he credentia ls under whic h the console is runni ng will be used. 4. To save the pa ssword [...]
-
Page 71
Copyrig ht © A croni s, In c., 200 0 - 20 09 71 A user who is a member of this g roup is a manage ment server administrat or. Management server administrators can connect to the management server by using Acronis Backup & Recovery 1 0 Manage ment Cons ole; they ha ve th e sam e manag ement rights on the regis tered m achines as users with admi[...]
-
Page 72
72 Copyrig ht © A croni s, In c., 200 0 - 20 09 Users with these additional privileges are also called st o rage node administrators. Recommend ations on user accounts To allow users to access the centralized vaults m anaged by a st orage node, you m ust ensure tha t those user s have a right to ac cess the s torage node fr om the network. If both[...]
-
Page 73
Copyrig ht © A croni s, In c., 200 0 - 20 09 73 2.11.7 .7 . Rights fo r Acroni s servi ces The Acronis Backup & Recov ery 10 Ag ent for Windo ws, Acr onis Backup & Re covery 1 0 Manag emen t Server, and Acronis Backup & Recovery 10 Storage No de components run as services. When installing any of these com ponents, you need to specify t[...]
-
Page 74
74 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.8. Communicatio n betwe en Acronis Ba ckup & Recov ery 10 components This se ction des cribes how Acronis Backup & Rec overy 10 comp onents co mmunicate wi th each other using sec ure authent ication and enc ryption. This section also provides information on configuring communication set[...]
-
Page 75
Copyrig ht © A croni s, In c., 200 0 - 20 09 75 Acronis Backup & Recovery 1 0 Managemen t Server Yes Yes Acronis Backup & Recovery 1 0 Storage Nod e Yes Yes Acronis PXE Ser ver No Yes Acronis Backup & Recovery 1 0 Bootable Agent Yes Y es 2.11.8 .3 . Configu ring commu nicatio n setti ngs You can configure commu nication settings, such [...]
-
Page 76
76 Copyrig ht © A croni s, In c., 200 0 - 20 09 Enabled The comp onent wi ll us e the sp ecified port; type the p ort number in the Serv er TCP Po rt box . Disabl ed The same as Not config ured . For details about the network port and instructions on how t o specify it in Linux and a bootable environmen t, see Network port configuration ( p. 78 ).[...]
-
Page 77
Copyrig ht © A croni s, In c., 200 0 - 20 09 77 Always us e The use of SS L certificates is enabled. The conn ection wil l be establi shed only if th e use of SS L certificates is enabled on the ser ver application. Disabl ed The same as Not config ured . Server Enc ryption options Specifies whether to encr ypt the tran sferred data when the compo[...]
-
Page 78
78 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.8 .4 . Network po rt configura tion Acroni s Backup & Recovery 10 components use the 9876/TCP ne twork communica tion port by default. The server listens to this port for incoming connection. This port is also used as def ault by t he Acronis client. During component installation you migh t [...]
-
Page 79
Copyrig ht © A croni s, In c., 200 0 - 20 09 79 In Windows, the certificate path and the ser ver certificate's file name are specifi ed in the registry key HKEY_LOCAL_MACHINE SOFTWARE Acronis Encryption Server . The defau lt path is %System Drive% P rogram Files Common Files Acro ni s Agent. To ensure reliability, the certific[...]
-
Page 80
80 Copyrig ht © A croni s, In c., 200 0 - 20 09 Non - self - signed c ertifi cates You have the option to use trusted th ird - party certificates or certificates created by your organization's CA as an alt ernative to self - signed cert ificates, by using Acronis Certificate C ommand - line Utility. To install a third - party certi ficat e 1.[...]
-
Page 81
Copyrig ht © A croni s, In c., 200 0 - 20 09 81 3. Options This se ction cov ers Acro nis Backup & R ecovery 10 opt ions that can be conf igured using G raphical User Interf ace. Th e conten t o f this sec tion is app lica ble to both sta nd - alone and advanced e ditions o f Acroni s Backup & Recove ry 10. 3.1. Con so le op tion s The con[...]
-
Page 82
82 Copyrig ht © A croni s, In c., 200 0 - 20 09 The option d efin es whet her to display th e pop - up messa ges ab o ut task r un results: suc cessful completion, failure or success with warnings. When displaying of pop - up mes sages is dis abled, y ou can review the task executi o n state s and results in t he Tasks v iew . The pres et is: Enab[...]
-
Page 83
Copyrig ht © A croni s, In c., 200 0 - 20 09 83 3.1.5. Fo n t s This opti on is effe ctive wh en the console is c onnected to a manag ed machine or to the managemen t server. The option defines the fonts to be us ed in the Graphical User Interfac e of Acronis Backup & Re covery 10. The Menu setting affects the d rop - down and cont ext me nus.[...]
-
Page 84
84 Copyrig ht © A croni s, In c., 200 0 - 20 09 entries. Yo u can s elect the amount of log en tries t o retain. Th e defau lt 95 % setti ng will ke ep most of the log. With the minimum 1% setting, the log will be nearly cleared. Even if you r emove the log size l imit, logging events to an SQL Server Express databas e will stop aft er the log si [...]
-
Page 85
Copyrig ht © A croni s, In c., 200 0 - 20 09 85 To set up sending SNM P messages 1. Select the Send messages to SNMP server chec k box. 2. Specify the appropriate options as f ollows: o Types of events to send – choose the t ypes of e vents: A ll events , Errors and w arnings , o r Errors o nly . o Server name/I P – type the name or IP addre s[...]
-
Page 86
86 Copyrig ht © A croni s, In c., 200 0 - 20 09 b. Click Add , an d then enter the na me or IP a ddress o f t he mach ine wh ere the A cronis W OL Proxy is installed. Provide a ccess credentials for the machin e. c. Repeat th is step if th ere ar e several Acron is WO L Prox ies. 3. When sch eduling a backup pol icy, enabl e the Use Wake - On - LA[...]
-
Page 87
Copyrig ht © A croni s, In c., 200 0 - 20 09 87 On the vCent er Server side When int e gration is enabled, the vCenter Server will store and show information about w hen and how succe ssful each vir tual machi ne was backed up. The same informa tion is display ed in the Status and the L ast backup columns on the manag ement server. Backup s tatus [...]
-
Page 88
88 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.3.2. Event tracing It is po ssible to dupl icate log events gene rated by the agent( s), ope rating on the manage d machi ne , i n the Applic atio n Event Log o f Windows ; or send the events to the specif ied SNMP mana gers. If you do not modify the event tracing options a nywher e except for here[...]
-
Page 89
Copyrig ht © A croni s, In c., 200 0 - 20 09 89 The option d efin es wheth er the agent(s) operating on the man aged machi ne ha ve to sen d the l og events to th e specified Sim ple Netw o rk Manag ement Protocol (SN MP) manage rs. You can choo se the types of events to be sent. You can over ride the settin gs set here, exclusi vely for the ev en[...]
-
Page 90
90 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Click OK. You might be asked for lmm ib2.dll that can be found on the installation disc of y our operating system. Linux To rece ive SNMP messages o n a machine running Linux, the net - snmp (f o r RHEL and SUSE) or th e snmpd (fo r Debian) pa ckage has to be ins talled . SNMP ca n be co nfigured [...]
-
Page 91
Copyrig ht © A croni s, In c., 200 0 - 20 09 91 • The type o f the d ata b eing backed up (disk , file) • The back up destinat ion (netwo rked locatio n or local disk) • The back up scheme (Back up now or using the sc heduler) The following table summa rizes the availability of the back up options. Agent for Windows Bootable med ia (Linux - [...]
-
Page 92
92 Copyrig ht © A croni s, In c., 200 0 - 20 09 media media Error handli ng ( p. 107 ): Do not show messag es and dialogs whil e processing (silen t mode) + + + + Re - attempt if an e rror occurs + + + + Ignore bad sectors + + + + Dual des tinat ion ( p. 108 ) Dest: local Dest: local - - Task st art conditions ( p. 108 ) + + - - Task f ailure hand[...]
-
Page 93
Copyrig ht © A croni s, In c., 200 0 - 20 09 93 3.4.1 .1. Archive pro tection This o ption is effe ctive for Window s and Linux ope rating systems and boo table medi a. This option is effe ctive for both di sk - level and file - level backup. The pres et is: D isabled. To protect the archive from unauthorized access 1. Select the Set passw ord for[...]
-
Page 94
94 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Excl ude all system fil es and folders Select this check box to skip files and folders with the System attribute. If a folde r is System, all of its conten ts — including f iles that are not System — will be ex cluded. You can view fil e or folder attributes i n the file/folder pr op erties o[...]
-
Page 95
Copyrig ht © A croni s, In c., 200 0 - 20 09 95 The progra m does not su pport intera ctive com ma nds, i.e. commands t hat require use r input (for example, "pau se"). To sp eci fy p re /po st co mma nd s 1. Enabl e pre/ post commands execu tion by check ing the fol lowing option s: o Execute before the bac kup o Execute after the backu[...]
-
Page 96
96 Copyrig ht © A croni s, In c., 200 0 - 20 09 Post - backup co mma nd To specify a command/ex ecutable file to be executed after the ba ckup is completed 1. In the Command field, type a command or browse t o a batch file. 2. In the Wor king direct ory field, specify a path to a directory where the command/batch file will be executed. 3. In the A[...]
-
Page 97
Copyrig ht © A croni s, In c., 200 0 - 20 09 97 o Select th e existin g co mmand or the b atch fil e from the d rop - down list 3. Click OK . Pre - data c apture comma nd To specify a command/batch file to be executed before data capture 1. In the Command fie ld, type a command or browse to a batch file. The progra m does not support interac tive [...]
-
Page 98
98 Copyrig ht © A croni s, In c., 200 0 - 20 09 Check box Sele ct io n Fail the ta sk if the command execution fail s Select ed Cleared Select ed Cleared Do not ba ck up unt il t he command exec ution is complete Select ed Sele cted Cleared Cleared Result Preset Continue the backup on ly aft er the comma nd i s successfully executed . D elete the [...]
-
Page 99
Copyrig ht © A croni s, In c., 200 0 - 20 09 99 The option d etermines wh ether to tak e snapsh ots of multiple volum es at the sa me ti me or one b y one. The pres et is: Enable. When this opti on is set to Enable , snapshots of all volumes being backed up will be created simultaneously. Use this o ption to create a time - consistent ba ckup of d[...]
-
Page 100
100 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.1 .8. Compressi on leve l This o ption is effe ctive for Window s and Linux ope rating systems and boo table medi a. The o ption defines t he level of compr ession appl ied to the dat a being backed up. The pres et is: Norm al. The o ptimal dat a compression le vel depend s on the type o f data [...]
-
Page 101
Copyrig ht © A croni s, In c., 200 0 - 20 09 101 • Norm al – to run t he backup proc ess with norma l speed, allocat ing resources on a par with other processes • High – t o maxi mize the b acku p proce ss speed by taki ng resources fro m other processes . HDD wri ting sp eed This o ption is effe ctive for Windo ws and Linux operating syst[...]
-
Page 102
102 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.1 .10 . Notifica tions Acroni s Backup & Recovery 10 provides t he abilit y of no tifying use rs about bac kup co mpletion through e - mail or the messaging service. E- mai l This o ption is effe ctive for Window s and Linux ope rating systems . This option is not available when o perating u[...]
-
Page 103
Copyrig ht © A croni s, In c., 200 0 - 20 09 103 • Passwo rd – enter the pass word. 6. Click Send test e - mail m ess age to check if the s ettings are correct. Messenge r servi ce (W inPopup) This o ption is e ffect ive for Window s and Linu x operating sy stems on t he sen ding machine a nd only for Wi ndows on the receiv ing machine. This o[...]
-
Page 104
104 Copyrig ht © A croni s, In c., 200 0 - 20 09 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one of the following: • Use the sett ing set in the Machine opti ons – to use the setting speci fied f or the mach ine. F o r more information refer to Machine options ( p. 87 ). • Log th e fo[...]
-
Page 105
Copyrig ht © A croni s, In c., 200 0 - 20 09 105 • Do not send SNMP notifi cati ons – to disable sending the l og event s of the backup oper atio ns to SNMP managers. 3.4.1 .12 . Fast incremen tal/di ffere ntia l b ackup The o ption is effect ive in Windows an d Linux operat ing systems and boo table media. This option is effective for i ncrem[...]
-
Page 106
106 Copyrig ht © A croni s, In c., 200 0 - 20 09 to multiple C Ds or DVDs later on . You might als o want to spli t the backup destined to an FTP server , since data recovery directly from an FTP server requires the backup to be split in to files no more than 2G B in size. 3.4.1 .14 . File - level securit y These opti ons are effecti ve only for f[...]
-
Page 107
Copyrig ht © A croni s, In c., 200 0 - 20 09 107 Select the check boxes fo r the compone nts you want to put on the boota ble media: • One - Click Resto re is the minimal additio n to a disk backup stored on removable me dia, allowing for easy recovery from this backup. If you boot a machin e from the media and c lick Run Acroni s One - click Re[...]
-
Page 108
108 Copyrig ht © A croni s, In c., 200 0 - 20 09 the data will be ba cked up and you will be abl e to mount the re sulting di sk backup and ext ract valid files to another disk. 3.4.1 .17 . Dual destinat ion This o ption is ef fective for bot h Windows and Linux ope rating sys tems, when the primary bac kup destina tion is a local folder or Acroni[...]
-
Page 109
Copyrig ht © A croni s, In c., 200 0 - 20 09 109 The pres et is: Wait until the conditions are m et. Wait until the conditions are met With thi s setting, the scheduler sta rts monitori ng the condi tions and la unches the tas k as soon as the conditions are m et. If the cond itions ar e never met, the tas k will never sta rt. To handl e the situa[...]
-
Page 110
110 Copyrig ht © A croni s, In c., 200 0 - 20 09 The progra m will try to ex ecute the failed ta sk again if you select the Rest art a failed t ask check box and speci fy the number of attempts and the ti me inte rval between the attempts . The pr o gram s t o ps trying a s soon as an attem pt completes successfully OR the specified number of atte[...]
-
Page 111
Copyrig ht © A croni s, In c., 200 0 - 20 09 111 If the cons ole i s conn ec ted to th e mana gem ent s erve r The U se a separat e tape set o ptio n has more prec ise definit ions. So f or the backup policy to be created you can use a sepa rate tape set for all machines or for each sing le machine. The A sing le tape set for all m achines opt ion[...]
-
Page 112
112 Copyrig ht © A croni s, In c., 200 0 - 20 09 When start ing backup to a non - empty tape in a locally at tached tape device, the program will warn that you ar e about to l ose data on the t ape. To disabl e this warning , select this check b ox. Dismount m edia after backup has finish ed This o ption is effe ctive in Window s and Linux ope rat[...]
-
Page 113
Copyrig ht © A croni s, In c., 200 0 - 20 09 113 When the o ption is enabled, Ac ronis Backup & Recovery 10 will restart t he machine after the backup proce ss is completed. For example, if the machin e boots from a hard disk dr iv e by default and you sel ect this check box, the machine will be restarted and the operating system will start as[...]
-
Page 114
114 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.2. Default recovery options Each Acronis agent has its own default re covery options. Once an agent is installed, the default optio ns have pre - defined values, which are referred to as presets in the documenta tion. When cre ating a recovery task, you can either use a default option, o r overr[...]
-
Page 115
Copyrig ht © A croni s, In c., 200 0 - 20 09 115 Validate ba ckup arch ive before r ecov ery + + + + Check fil e sy stem a fter recover y + - + - Reboo t machi ne automatic ally if it is required for recovery + + - - Chan ge SID aft er reco very Windows recover y - Windows recover y - Notification s: E- mail ( p. 117 ) + + - - Win Pop - up ( p. 11[...]
-
Page 116
116 Copyrig ht © A croni s, In c., 200 0 - 20 09 Pre - recover y command To specify a command/batch file to be executed before the recov ery proc ess st art s 1. In the Command fie ld, type a command or browse to a batch file. The progra m does not support interac tive commands , i.e. command s that requir e user input ( for examp le, "pause&[...]
-
Page 117
Copyrig ht © A croni s, In c., 200 0 - 20 09 117 3.4.2 .2. Recove ry priority This o ption is effe ctive for both W indows and Linux operating sy stems. This option is not available when o perating under the bootable media. The priori ty of a process running in a system de termines the amount of CPU and sys tem resources allocated to that process.[...]
-
Page 118
118 Copyrig ht © A croni s, In c., 200 0 - 20 09 To configure e - ma il notification 1. Select the Send e - mail notifi cations check b ox to activ ate notifi cations . 2. In the E- mail addres ses fi eld, ty pe the e - mail address to which notifications will be sent. Y ou can enter several addresses se parated by semicolons. 3. Under Send noti f[...]
-
Page 119
Copyrig ht © A croni s, In c., 200 0 - 20 09 119 The Messenger service is not started by default in the M icrosoft Windows Server 2003 family. Change the servic e Startup m ode t o Automa tic and s tart the servic e. To configure WinPopup notificati ons: 1. Select the Send WinPopup not ific ations check box. 2. In the Mac hine name field, en ter t[...]
-
Page 120
120 Copyrig ht © A croni s, In c., 200 0 - 20 09 This option is not available when o perating under the bootable media. The option d efin es wheth er the agent(s) oper ating on the managed machine hav e to send the lo g events of the recovery operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose th e types [...]
-
Page 121
Copyrig ht © A croni s, In c., 200 0 - 20 09 121 When a recoverable error occurs, the program re - attempts to perform th e unsuccessful ope ration. You can set th e time in terval an d the numb er of att empts. Th e attem pts wi ll be sto pped as soon as the o peration s ucceeds OR the s pecified num ber of attem pts is pe rformed, depend ing on [...]
-
Page 122
122 Copyrig ht © A croni s, In c., 200 0 - 20 09 The pres et is Disabled . This option ena bles boot ing the machine into th e recovered operatin g syste m without user interaction. Change SID af ter the recovery is finished The pres et is Disabled . Acronis Backup & Recovery 10 can generate an unique security id entifier (S ID) for th e recov[...]
-
Page 123
Copyrig ht © A croni s, In c., 200 0 - 20 09 123 4. Vaults A vault is a location for storing backup archives. F or ease of use and admin istration, a vault is associated with the archives' metadata. Referring to this metadata m akes for fast and convenien t opera tions with ar chives and backups s tored in the vault. A vault can be organized [...]
-
Page 124
124 Copyrig ht © A croni s, In c., 200 0 - 20 09 A vault is called personal if it was crea ted using direct connec tion of the console to a man aged machine. Personal vaults ar e specific for each manag ed machine. Way of wo rki ng wit h th e "Vaul ts" view Vaults (on the navi gation pane) - top element o f the vaults tree. Click this it[...]
-
Page 125
Copyrig ht © A croni s, In c., 200 0 - 20 09 125 Acces sing managed v aults To be able t o back up to a managed v ault, a user must have an account on the mac hine where t he storage node is installed. The scope of a user's privileges in a v ault depends on the user's rights on the storage node. A user who is a m ember of the Users group[...]
-
Page 126
126 Copyrig ht © A croni s, In c., 200 0 - 20 09 • [for managed vaults only ] encryption state (Yes, No) Vault c onten t The Vault c ontent sect ion contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Us e the archives toolbar to perform actions on the selec ted archives and ba [...]
-
Page 127
Copyrig ht © A croni s, In c., 200 0 - 20 09 127 passw ord (if the vault is encrypted) and infor mation i n the Comment s field. • The Edit unma naged v au lt page lets you edit the vault's nam e and inf orma tion in the Comme nts field. Validate a vaul t 1 Select the vault. 2 Click Valida te . You will be tak en to the Valid ation ( p. 233[...]
-
Page 128
128 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.1.2 .1. Creati ng a m anag ed central i zed vault To create a managed centralized vault, perform the following steps Vault Name Spec ify a unique name for the vault. Creation of two c e ntralized vaults with the same name is prohibit ed. Comments [Optional] Enter the di stincti ve descri ption of [...]
-
Page 129
Copyrig ht © A croni s, In c., 200 0 - 20 09 129 o on the hard drives local to the storage node o on a network share o on a Storage Area N etwork (SAN) o on a Netw ork Attached Storag e (NAS) o on a tape library locally att ached to the storage node. To create a new folder for the vault in the selec ted loc ation, cli ck Create folder . 2. Click O[...]
-
Page 130
130 Copyrig ht © A croni s, In c., 200 0 - 20 09 o AES 1 28 – the vault co ntents will be encrypte d using the Adv anced St andard Encry ption ( AES) algorithm with a 128 - bit key o AES 19 2 – the vault c ontents will b e encrypted using the AES alg o rithm with a 192 - bit k ey o AES 25 6 – the vault c ontents will b e encrypted using the [...]
-
Page 131
Copyrig ht © A croni s, In c., 200 0 - 20 09 131 To create a new folder for the vault, click Creat e folder . A vault can be cr eated in an empty fol der only. 2. Click OK . 4.1.2 .3. Attachi ng a manage d vault A vault managed b y a storage n ode can b e attached to another storage n ode. You m ight need to d o so when retiring storage node hardw[...]
-
Page 132
132 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.1.3 .1. Overvie w Acroni s Backup & Recovery 10 provide s full support o f a tape li brary through Acro nis Backup & Recovery 1 0 Storag e Node. The storage no d e sho uld be installed on the machine a tape library is attached to. Storage node can simultaneously use more than o ne tape lib[...]
-
Page 133
Copyrig ht © A croni s, In c., 200 0 - 20 09 133 If all cartridges in a tape library have barcodes, the library is ready to b e automatically managed by software. Tape libraries are a cost - effective solution for data storages with huge capacit y . Moreover, tape is perfect for archiving because cartridges can be stored off - site fo r enhanced d[...]
-
Page 134
134 Copyrig ht © A croni s, In c., 200 0 - 20 09 If a tape was used previous ly, the RSM tries to det ect the registered ap plicati on the tape is concerned to. If the applica tion is n ot found, the RS M will m ove the ta pe in to the Unrecognized pool. If the applicat ion is n ot found, but the RSM database has no informa tion abou t the tape, i[...]
-
Page 135
Copyrig ht © A croni s, In c., 200 0 - 20 09 135 Fill the library slots wit h tape cartridges. If a tape does not get a barco de or its barcode is c orrupted, you can define the tape lab el for identification purpos es later. You should have Acronis Backup & Recovery 10 Man agem ent Server and Acron is Backup & Recovery 10 Managem ent Co n[...]
-
Page 136
136 Copyrig ht © A croni s, In c., 200 0 - 20 09 At the Delete operation, t he vault cont ent will be deleted f rom the stor age node dat abase w ithout acces sing th e tapes. The plans and tasks that use this vault will fail. The backup archives , belonging to a deleting centr alized vault on a tape l ibrary , will be deleted as well, but thes e [...]
-
Page 137
Copyrig ht © A croni s, In c., 200 0 - 20 09 137 The program f inds the tapes a nd inserts them au tomatical ly in the right order. The T as k N eed Inter action win dow come s up if a require d tape is not fou nd. Keep in mind that a data recover y operation may req uire access to a number of tapes. For example, data recovery from an incremental [...]
-
Page 138
138 Copyrig ht © A croni s, In c., 200 0 - 20 09 To launch th e procedu re select the tape l ibrary vault in th e Na vigat ion pane of the con sole, cl ick Mana ge tapes a nd then cl ick Start i nventory on t he Tape Management w indow. When inventorying is comp leted a user has the list o f tapes currently loaded into the library. Perform the pro[...]
-
Page 139
Copyrig ht © A croni s, In c., 200 0 - 20 09 139 Tapes fr om th e Free or the Imported poo l can be renamed on co ndition th at the user account used to run the storage node se rvice ( ASN U ser ) has wr ite permissions for th ese pools. These permissions are not assigned to ASN User during installation, so you might ne ed to add them m anually. T[...]
-
Page 140
140 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Ask for u ser int eract ion - the backup task wil l enter the Need Interacti on state and wait for the tape, with the required label, t o be loaded into the ta pe library device. • Use a free tape - the backup will be wr itten onto a fr ee tape, so the opera t io n will be pa used on ly if the[...]
-
Page 141
Copyrig ht © A croni s, In c., 200 0 - 20 09 141 Simple backup scheme is disabled, because backup co nsolidation is impossible for archives located on tapes. Acronis Backup & Recovery 10 provides automation of tape rotation for Grandfather - Father - Son , Tower of Hanoi , and Custo m back up schemes. Grandfather - Father - Son ( p. 33 ) (GFS)[...]
-
Page 142
142 Copyrig ht © A croni s, In c., 200 0 - 20 09 • the full size of the data t o protect is approximately 3 2 0 GB • the approximate size of dai ly changes of data is ab out 16 GB • the approximate size o f weekly changes of data is no more than 40 GB • tape capacity is 400 GB. Let’s analyze the results of a co mbination of GFS and ToH s[...]
-
Page 143
Copyrig ht © A croni s, In c., 200 0 - 20 09 143 • GFS Exampl e 3 ( p. 1 47 ). The Use a s eparate ta pe set option is selec ted. All the Alwa ys use a f ree tape options are s elected. It req uires 28 tapes in r o tation. These examp les dem o nstrate h ow the nu mber of tap es requir ed for automa ted rotation depend s on the tape options. If [...]
-
Page 144
144 Copyrig ht © A croni s, In c., 200 0 - 20 09 • four incre m ental b ackups on the 4 th week. The next f ull backup (320 Gb) sho uld be writt en on F riday of the 4th week. However tape 02 has o nly 104 Gb of fre e space at the mo ment. S o after the ta pe reaches th e end, the recor ding continues fro m the begin ning of fr ee tape 03. Keep [...]
-
Page 145
Copyrig ht © A croni s, In c., 200 0 - 20 09 145 The next figu re sh ows the actual u sage of th e tapes with f ree spac e instead o f the d eleted b ackups on the first Friday of the following year. At the time the diffe rential backup (blue rectangle) is written onto ta pe 24. The full b ackup stored on tape 01 is deleted a fter th e next fu ll [...]
-
Page 146
146 Copyrig ht © A croni s, In c., 200 0 - 20 09 GFS Example 2 Suppose , the backup p lan has the foll owing tape o ptions: • the Us e a separate tape s et option is sele cted • the Alw ays use a free t ape: For each full bac kup option is s elected • the A lw ay s us e a fr ee tape: For each i ncremental backup o ption is cleared • the Al[...]
-
Page 147
Copyrig ht © A croni s, In c., 200 0 - 20 09 147 As the GFS backup sc heme fo rces a utomatic de letion of the o utdated back ups, o n the firs t Friday of the secon d year the tapes keep only the backu ps disp layed in the next figu re. This figure demonstrates t hat t he GFS Example 2 tape rotati on scheme is more suitable for the case than GFS [...]
-
Page 148
148 Copyrig ht © A croni s, In c., 200 0 - 20 09 These options define the tape rotation scheme that is classical for GFS. The figu re shows the beginning o f the ro tatio n scheme that uses 8 ta pes for daily back ups, 6 tape s for weekly backups a nd 13 ta pes for mo nthly ba ckups (sinc e there are 1 3 four - week cycles in a year) for the analy[...]
-
Page 149
Copyrig ht © A croni s, In c., 200 0 - 20 09 149 go back in the archive) i s 8 wee ks. T ape rotati on for the second case includes 128 daily sessions, i.e. it allows the roll - back period equal 6 4 days. The rol l - back period is always h alf the number of sessions. Each additional level doubles not only the number of sessions b ut also the old[...]
-
Page 150
150 Copyrig ht © A croni s, In c., 200 0 - 20 09 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac kups are d eleted a utoma tically. In the n ext figure th e deleted backup s are drawn as dark - gray rectan gles. A ctu ally the delet ed backup is stil l stored on the tapes, but the inform a[...]
-
Page 151
Copyrig ht © A croni s, In c., 200 0 - 20 09 151 The first figure s hows the t apes’ usage for the ToH sc heme combined with the a bove mentioned tape optio ns. The recurr ing part o f the s cheme co ntains sixteen backup se ssions. T he figure displays the backup a rchive sta te at the m oment wh en th e 17th s ession i s finish ed. In the figu[...]
-
Page 152
152 Copyrig ht © A croni s, In c., 200 0 - 20 09 The figur e shows tape rotati on for th e ToH scheme wi th these option s. Ma xim al number of tapes used in the rotation is seven that is more than in classical five - level ToH scheme. Two additional tapes used for: 1. keeping an old full backup (postponed deletion) as it is a base for other level[...]
-
Page 153
Copyrig ht © A croni s, In c., 200 0 - 20 09 153 • tape rotati on scheme ( freq uen cy of backups, re tention rules) • tape - appe nd option s • require ments to suppo rt off - site tape cartridge archives. There is no common f ormula to calculate a number of tapes required in all p ossible combinations of above listed consid eration s. But [...]
-
Page 154
154 Copyrig ht © A croni s, In c., 200 0 - 20 09 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compre ssion leve l provides CL average reduction coefficient • selected ta pe ro tation s ch eme is Custo m with th e following s ettings: o full bac kup - every 10 days o differ ential backup - e[...]
-
Page 155
Copyrig ht © A croni s, In c., 200 0 - 20 09 155 • What if I need to us e a tape from t he tape library in the local tape de vice and vice v ersa? Acronis agents create backups on tapes in a format that differs from the format used by the storage n ode. It is the r eason wh y it is imp ossible to in terchang e tapes between ta pe devi ces attach[...]
-
Page 156
156 Copyrig ht © A croni s, In c., 200 0 - 20 09 name. I f you a cciden tally delete the .me ta fold er, it will be automa tically recr eated n ext time you access th e vault. But s ome informati on like o wner n ames and ma chine na mes may be l ost. 4.2.1. W orking w ith the "Personal v ault " vie w This sec tion bri efly d escrib es t[...]
-
Page 157
Copyrig ht © A croni s, In c., 200 0 - 20 09 157 • [Archiv e Name] The Ac tio ns bar is av ailable when you select an archive in the archives t able. Duplicates actions of the archives toolbar. • [Back up Name] The Actio ns bar is available when you expa nd the archive and click on an y of its backups. Duplicates actions of the ar chives toolb[...]
-
Page 158
158 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.2.2 .1. Creating a person al vaul t To create a personal vaul t 1. In the Nam e fie ld, type a name for the vault being cre ated. 2. [Optio nal] In the C omm ents field, add a descript ion of the vault. 3. In the Pat h field, click Change... In the opene d Pers onal Vault Path windo w, spec ify a [...]
-
Page 159
Copyrig ht © A croni s, In c., 200 0 - 20 09 159 All the operations described below are perf ormed by cl icking t he corre sponding butt ons o n the toolbar. These operations can be also accessed fr o m the [Ar c hi v e na m e] ac ti o ns bar ( on the Ac tio ns and tools pan e) and from the [Archiv e name] actions item of the main m enu respectiv [...]
-
Page 160
160 Copyrig ht © A croni s, In c., 200 0 - 20 09 Recover a disk/volume as a virtual machine Right - click t he disk backu p, then select Recover as virtual machine . The Recover data (p . 214 ) p age wi ll be o pen ed with the p re - selected backup as a source . Select the locat ion and the type of new vir tual machine and then proceed as with re[...]
-
Page 161
Copyrig ht © A croni s, In c., 200 0 - 20 09 161 There s hould be eno ugh space in t he vau lt fo r temporary files created during consolidation. Backups resulting from consolidation always have maximum compressi on. 4.3.4. Filtering and s orting archives The following is a guideline for you to filter and sort archives in the archives table. To Do[...]
-
Page 162
Copyrig ht © A croni s, In c., 200 0 - 20 09 162 5. Scheduli ng Acronis scheduler helps the administrator adapt backup plans to the com pany’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically ke eping the critical data safely protected. The schedu ler us es local ti me of the machi ne the ba ckup[...]
-
Page 163
Copyrig ht © A croni s, In c., 200 0 - 20 09 163 The schedul er behavio r, in case the event oc curs but the condi tion (or any of mult iple con ditions) i s no t met is defi ned by the T ask start conditions ( p. 108 ) backup o ptio n. What - i fs • What if an ev ent occ urs (and a conditi on, if any, is met) while the previous task r un has no[...]
-
Page 164
164 Copyrig ht © A croni s, In c., 200 0 - 20 09 Run the tas k every da y at 6PM. The schedule's paramet ers are thus set up as follows. 1. E ve ry: 1 day(s). 2. Once at: 06:00: 00 PM . 3. Effective: From: not set . The task wi ll be started on th e current day, if it has been cr eated before 6PM. If you have crea ted the task a fter 6 PM, th[...]
-
Page 165
Copyrig ht © A croni s, In c., 200 0 - 20 09 165 Firs t daily s chedule 1. Ev e ry: 3 day(s). 2. Ev ery : 4 ho u rs . From: 08:0 0:00 AM Until: 12:00: 00 PM . 3. Effective: From: 09/20 /2009 . To: not set . Second dai ly s chedule 1. E ve ry: 3 day(s). 2. Ev ery : 2 hour(s). From: 03:0 0:00 P M Until: 0 7:00:00 PM . 3. Effective: From: 09/20 /2009[...]
-
Page 166
166 Copyrig ht © A croni s, In c., 200 0 - 20 09 Examp les "One day in t he week" schedule Run the task every Friday at 10PM, starting from a certain date (say 05/14 /2009) and ending after six mo nt hs . The schedu le's p aramet ers are thus s et up as fo llo ws. 1. E ve ry: 1 week(s) o n: Fri . 2. Once at: 10:00: 00 PM . 3. Effect[...]
-
Page 167
Copyrig ht © A croni s, In c., 200 0 - 20 09 167 • Tuesday: every 3 hour s from 9 AM till 9 PM • Wednesday: every 3 hours from 9 AM till 9 PM • Thursday: every 3 hours fro m 9 AM till 9 PM • Friday: twice at 12 PM and 9 PM (i.e. same as on Monday) • Saturday: once at 9 PM • Sunday: o nce at 9 PM Combinin g the id entical times, the fol[...]
-
Page 168
168 Copyrig ht © A croni s, In c., 200 0 - 20 09 In the During the day execute the ta sk... area, select one o f th e followi ng: Once at: <...> Set up the ti me at whi ch t he task will be run once . Every: <... > From: <...> Until: <. ..> Set up how many tim e s the ta sk wi ll be r un during the specifie d time interva l[...]
-
Page 169
Copyrig ht © A croni s, In c., 200 0 - 20 09 169 3. Ev ery : 6 hou rs . From: 12:0 0:00 AM Until: 06:00: 00 PM . 4. Effective: From: 0 8/30 /2009 . Actuall y the task will be sta rted o n the firs t workd ay of September . By s etting up this d ate we just defi ne that th e task must be started in 2009 . To: 12/01/ 2010 . Actu ally the task will e[...]
-
Page 170
170 Copyrig ht © A croni s, In c., 200 0 - 20 09 From: 11/01 /2009 . To: not set . 5.4. Advance d sche duling sett ings The following advanced settings are available when setting up a daily, weekly, or monthly schedule in a backup po licy. Use W ake -On- LAN When thi s setting is enabled , Acron is Backup & R ec overy 1 0 Manage ment Ser ver w[...]
-
Page 171
Copyrig ht © A croni s, In c., 200 0 - 20 09 171 Seco nd ma chin e: Eve ry day a t 09:00 :00 AM Third machin e: Ever y da y at 0 9:59:59 AM Example 2 Suppose that you are deplo ying a backup po licy with the following s chedule to three machines: Run the tas k: Dai ly Ev ery : 2 Hour( s) F ro m: 09: 00:00 AM Until: 11:00: 00 AM Distri bute st art [...]
-
Page 172
172 Copyrig ht © A croni s, In c., 200 0 - 20 09 Event s ource Specifies the event source, which typically indicates the program or the system component that caused t he event — fo r ex am pl e: di sk Event type Specifies th e event typ e: Error , Warning , Inf ormati on , Audit succ ess , o r Audit failure . Event ID Specifies the event number,[...]
-
Page 173
Copyrig ht © A croni s, In c., 200 0 - 20 09 173 • Event type : Informati on • Event ID : 18 Tip: To set up a similar backup plan for mac hines running Micr o soft Windows XP, replace the text in E vent source with Windows Update Agent and leave the remainin g fields the same. How to vi ew even ts in Event vi ewer To ope n a log i n Ev ent Vie[...]
-
Page 174
174 Copyrig ht © A croni s, In c., 200 0 - 20 09 Example: It is require d to run the backup t ask after free space on the managed mac hine is changed by at lea st 1 GB, but only if all users ar e logged off and more than 12 hou rs have passed s ince the last backup. Set the sc hedule, condit ions and the Task st art condi tions backup o ption as f[...]
-
Page 175
Copyrig ht © A croni s, In c., 200 0 - 20 09 175 • Ev ent: Weekly , Eve ry 1 week( s) on <workd ays> ; On ce at 09:00 :00 P M . • Condition: Loc ation's host is av ailable • Task start condi tions: Skip the task execution . As a result, (1) If 9:00 PM comes and t he location's host is availab le, the backup task s tarts right[...]
-
Page 176
176 Copyrig ht © A croni s, In c., 200 0 - 20 09 • If the ta sk star t conditi ons are Skip the task e xec ution , the task will ne ver run. • If the task start conditions are Wait until t he condit ions are met a nd the Run the tas k anyway after check box is cleared , the task (s chedule d to run at 3: 00 PM) will start at 6:00 PM — the ti[...]
-
Page 177
Copyrig ht © A croni s, In c., 200 0 - 20 09 177 (2) if the free space changes by more than 1GB a fter 12 hours pa ss since the last back up successf ul completi on, th e backup ta sk will start immediately. (3) if the free spac e never changes b y more than 1GB, the t ask will ne ver start. You can start the backup m anually, if n eed be, in the [...]
-
Page 178
Copyrig ht © A croni s, In c., 200 0 - 20 09 178 6. Direct mana ge ment This sec tion co vers o peratio ns that can be per formed direct ly on a managed mach ine by using the direct console - agent conne ction. T he co ntent of this sectio n is applic able to both st and - alone and advanced editions of Acronis Backup & Recovery 10. 6.1. Admin[...]
-
Page 179
Copyrig ht © A croni s, In c., 200 0 - 20 09 179 serve r and run Acronis Licens e Ser ver to manag e licenses. Pleas e make sure yo u ha ve a valid licen se on Acronis Licens e Ser ver. license key data was not c orrupted. After a success ful license ch eck th e agent will start working. Trial version o f product expires in X day(s) Pleas e make s[...]
-
Page 180
180 Co pyright © Acr onis, Inc., 2000 - 2009 How it is determ ined Errors Highlight t he date i n red if at least one " Error" entry appear ed in the log on this date. Warni ngs Highlight th e date in yello w if no "Err or" entries appeared and at le ast one "Warni ng" entry appe ared in t he log on t his date. Inform[...]
-
Page 181
Copyrig ht © A croni s, In c., 200 0 - 20 09 181 unneeded columns a nd show the hidden o nes. See the Filtering and sorting backup plans and tasks ( p. 187 ) section for details. • In the bac kup ta ble, s elect the backu p plan ( task). • Use the to o lbar's b uttons t o take an action on th e selected plan (task). See the A c tions on b[...]
-
Page 182
182 Co pyright © Acr onis, Inc., 2000 - 2009 Backup pl an statuse s A backup pla n can have one of the following s tatuses: Err or; Warning; O K . A backup pla n status is de rived from t he results o f the last run o f the plans' tas ks. State How it is determ ined How to handle 1 Error At leas t one task has failed. Otherwi se, s ee 2 Ident[...]
-
Page 183
Copyrig ht © A croni s, In c., 200 0 - 20 09 183 Need inter action Any running t ask can p ut itself i nto the N eed interac tion state wh en it ne eds human intera ction such as changing media or ign oring a read error. The next state may be Stopping (if the us er chooses t o stop the task) or R unning (on selecting Ign ore/Retry or anothe r acti[...]
-
Page 184
184 Co pyright © Acr onis, Inc., 2000 - 2009 • Edit the bac kup policy o n the manage m ent serve r in case a centralized p lan has failed 2 Warni ng L ast r esult is "Succ eeded wi th warning" View the l og t o read the war ni ngs - > [o ption ally ] Perfo rm actions to prev ent the future warnings or fai lure. 3 OK La st resu lt i[...]
-
Page 185
Copyrig ht © A croni s, In c., 200 0 - 20 09 185 Run a plan/ta sk Click Backup pl an Run . In the Run Ba ckup P lan ( p. 188 ) window, s ele ct the t ask you need to be run. Running the backup pla n starts the se lected task of t hat plan im media tely in spite of its s chedule and c onditions . Why can't I r un the backup pl an? • Do not h[...]
-
Page 186
186 Co pyright © Acr onis, Inc., 2000 - 2009 Edit a p lan/task Click Backup pl an Edit . Backup plan e diting is per formed i n the same way as creation ( p. 194 ), excep t for the followin g lim itatio ns : It is not always possibl e to use al l schem e options , when editing a backup pla n if the cre ated archive is not empty (i.e. contai ns bac[...]
-
Page 187
Copyrig ht © A croni s, In c., 200 0 - 20 09 187 Delete a plan /task Click Backup pl an Delete . What will happen i f I delete t he backup plan? The pla n's de letion delet es all its t asks. Why can't I delete t he backup plan? • The bac kup plan is in the " Running" s tate A backup plan c annot be d el eted, i f at lea st o[...]
-
Page 188
188 Co pyright © Acr onis, Inc., 2000 - 2009 Configuring backup plans and the tasks table By default, the table has six columns that are display ed, others are hidden. If required, you can hide the displ ayed colum ns and show h idden ones. To show or hide columns 1. Right - click any column h eader to open the conte xt menu. The m enu items that [...]
-
Page 189
Copyrig ht © A croni s, In c., 200 0 - 20 09 189 Recovery (disk ) Disk backup recovery Recover y (fi le) File an d fold er rec overy Recover y (vo lume ) Recover y of vo lume s fro m a disk back up Recovery (MBR) Master boot record recovery Recovery (disk to ex isting V M) R ecovery of a disk/volume backup to an ex isting virtual machine Recovery [...]
-
Page 190
190 Co pyright © Acr onis, Inc., 2000 - 2009 Settings The Settings tab displays informati o n on scheduling and t he optio ns changed against the default values. Progre ss The Progress tab is available while the task is running. It is common f or all types of tasks. The tab provides information about task p rogress, elapsed tim e and other paramet[...]
-
Page 191
Copyrig ht © A croni s, In c., 200 0 - 20 09 191 • Archiv e name - name of the archive. • Archi ve co mments - c omments on th e archive (if provided). Settings The Settin gs tab displays th e following information: • Backup sc heme - the selec ted backup sch eme and all its settings wi th schedules. • Validati on (if sel ected) - events b[...]
-
Page 192
192 Co pyright © Acr onis, Inc., 2000 - 2009 To Do Select a single lo g entry Click on it. Select multiple lo g entries • non - contiguous : hold dow n CTRL and c lick th e log entries one b y one • contiguous : s ele ct a si ngle log e ntry, then hold dow n SHIFT an d click anot her entry . All th e entr ies bet ween th e first an d last s el[...]
-
Page 193
Copyrig ht © A croni s, In c., 200 0 - 20 09 193 Filter log entri es by task, manage d entity, machin e, cod e, own er Type the required val ue (task nam e, machine n ame, owner name, etc.) in the fi eld below t he resp ecti ve co lumn head er. As a result you will see that t he list of log ent ries fully or j ust pa rtly coincid e with the entere[...]
-
Page 194
194 Co pyright © Acr onis, Inc., 2000 - 2009 6.2. Crea ting a back up plan Before creating your first backu p plan ( p. 370 ), please familiarize yo urself with the basic con cepts ( p. 25 ) used in Acronis Backup & Recovery 10 . To create a backup plan, perfo rm the following st eps. General Plan name [Optio nal] Ente r a unique name fo r the[...]
-
Page 195
Copyrig ht © A croni s, In c., 200 0 - 20 09 195 Archi ve co mments [Optional] Enter comm ents on th e arch ive. T o acces s this option, sel ect the Advanced view check b ox. How to b ack up Backup sc heme ( p. 202 ) Specify when and how often to back up you r data; define f or how lon g to keep the created backup arc hives in the selec ted locat[...]
-
Page 196
196 Co pyright © Acr onis, Inc., 2000 - 2009 Host ( p. 213 ) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent fo r Windows, Age nt for ESX/ESXi o r Agent for Hyper - V installed. Virtual ization s erver ( p. 213 ) Here you sel ect the resulti ng virtual machi ne type a nd l ocatio[...]
-
Page 197
Copyrig ht © A croni s, In c., 200 0 - 20 09 197 6.2.3. Source type Select the type of data you want to be backed up o n the managed m achine. The list of available data types depends on the agents r unning on t he machine: Files Available if the Acronis Bac k up & Recovery 10 Ag ent for Windows (or for Linux) is installed. Select this option [...]
-
Page 198
198 Co pyright © Acr onis, Inc., 2000 - 2009 What does a disk or volume bac kup stor e? For supported file sys tems, with the sect or - by - sector o ption turne d off, a disk o r volume backup stores only th ose sectors t hat contain da ta. This reduces t he resul ting back up size and spee ds up the backup and r ecovery o perations. Windows The [...]
-
Page 199
Copyrig ht © A croni s, In c., 200 0 - 20 09 199 The program will access the source data using the credentials you specify. Use this optio n if the plan's account doe s not have access permissio ns to the data. Specify: • User nam e . When enteri ng the na me of an Activ e Direct ory user acc ount, be su re to also specify the domain name ([...]
-
Page 200
200 Co pyright © Acr onis, Inc., 2000 - 2009 6.2.7. Archive Specify where the arch ive will be s to red an d the n ame of the ar chive. 1. Selecti ng the desti nation Enter th e full pa th to the destination in the Path field, or select the de sired destina tion in the folders tree. • To back up d ata to a centralized vault, expand the Centraliz[...]
-
Page 201
Copyrig ht © A croni s, In c., 200 0 - 20 09 201 Backing up to an existi ng archive You can config ure the bac kup plan to back up to an existing arch ive. To do so, select the a rchive i n the archives table or type the archive n ame in the Name field. If the archive is prote cted with a password, the program will ask f o r it in the pop - up win[...]
-
Page 202
202 Co pyright © Acr onis, Inc., 2000 - 2009 6.2.9. Backup sche mes Choose one of th e avail able b ackup sch emes: • Back up now – to create a b ackup task for manual start and run the task immediately after its creation. • Back up later – to create a backup task fo r manual start OR schedule o ne - time t ask executi on in the futu re. ?[...]
-
Page 203
Copyrig ht © A croni s, In c., 200 0 - 20 09 203 6.2.9 .3. Simple sc heme With the simp le backup schem e you just sche dule when and how o ften to back up data a nd set the retention rule. At the first t im e a full backup will be created. The next bac kups will be incremental. To set up the simple backu p scheme, specify the app ropriate setting[...]
-
Page 204
204 Co pyright © Acr onis, Inc., 2000 - 2009 Param eters You ca n set up the foll owing parameters o f a Grandfather - Father - Son (GFS) scheme. Start bac kup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifie s the days on which t o perform a backup. The de fault val ue is Workdays. Weekly/ Monthly: Speci f[...]
-
Page 205
Copyrig ht © A croni s, In c., 200 0 - 20 09 205 • Weekly /monthly : Saturday (for e xample) • Keep ba ckups: o Daily: 1 week o Weekly: 1 mont h o Monthl y: indefin ite ly As a result, an archive of daily, weekly, and monthly backups will be created. Daily backup s will be available for seven da ys since creation. For instance , a daily backup[...]
-
Page 206
206 Co pyright © Acr onis, Inc., 2000 - 2009 Moreover, assume that you want to retain ac cess to all backups, including the daily ones, for at least six mont hs. The follow ing GFS schem e suits such purpo ses: • Start backu p at: 11:30 PM • Back up on: Tuesday , Thursday, Friday • Weekly /monthly : Friday • Keep ba ckups: o Daily: 6 month[...]
-
Page 207
Copyrig ht © A croni s, In c., 200 0 - 20 09 207 Param eters You can set up the followin g parameters of a T ower of Hanoi schem e. Schedule Set up a daily ( p . 163 ), wee kl y ( p. 16 5 ), or m onthly ( p. 1 67 ) sche dule. Sett ing up schedule parameters allows crea ting simple schedules (example of a simple daily schedule: a backup task will b[...]
-
Page 208
208 Co pyright © Acr onis, Inc., 2000 - 2009 Roll - back peri od The number of days we can go back in the archive is different on different days. The minimum number of days we are g uaranteed to have is call ed the roll - back period. The following table shows f ull backup and roll - back periods fo r schemes of various levels. Number of lev els F[...]
-
Page 209
Copyrig ht © A croni s, In c., 200 0 - 20 09 209 6.2.9 .6. Custom back up sche me At a glan ce • Custom schedule and co nditions for backups of eac h type • Custom schedule and r etention rul es Par am eter s Para met er Mean ing Full backup Specifies on what sche dule and under w hich condi tions t o per form a f ull backup. For ex ample, the[...]
-
Page 210
210 Co pyright © Acr onis, Inc., 2000 - 2009 might e nd up with no backups if the prog ram is not able to create the new backup for some rea son. Apply the rules (only if the re tention r ules are set ) Speci fies whe n to apply the retenti on ru les ( p. 39 ). For ex ample, the cleanup pr ocedure can be set up to run af ter each back up, and also[...]
-
Page 211
Copyrig ht © A croni s, In c., 200 0 - 20 09 211 Monthly full, we ekly di fferential, a nd daily incre mental backups pl us cleanup This example demonstrates the us e of all options available in the Cus tom schem e. Suppose that we need a schem e that will produ ce monthly full backups, weekly differe ntial backu ps, and daily i ncrement al backup[...]
-
Page 212
212 Co pyright © Acr onis, Inc., 2000 - 2009 • Full backu p, runs ever y Frida y at 1 0:00 PM • Increment al back up, runs manually • Differential backup, runs manually You can r un any o f these backup tasks b y selec ting i t from the list of tas ks in the Backup plans and tasks section in th e left pane. If you have also specified the re [...]
-
Page 213
Copyrig ht © A croni s, In c., 200 0 - 20 09 213 task manually after powering off the machine. Any changes made to the machine while it was powered on, will be overwri tten. 6.2.11 .2 . Selec ting a host that w ill pe rform conve rsio n Specify the machine that will perform the conversion. The machine h as to have Acronis Backup & Recovery 10 [...]
-
Page 214
214 Co pyright © Acr onis, Inc., 2000 - 2009 Virtual machines created on a Hyper - V server or w orkstati on type machines (V Mware Worksta tion, Microsoft Virtual PC o r Parallels Wo rkstation) use as much disk space as the original data oc cupies. Since t he space is not pre - allocated, the physical disk on which the virtual machine will run is[...]
-
Page 215
Copyrig ht © A croni s, In c., 200 0 - 20 09 215 Task c redenti als ( p. 217 ) [Optional] The task will run on behalf of the user wh o is creating the task. You ca n change the task accou nt cred entials if necessa ry. T o access th is op tion, sel ect the Ad vanced vie w check box . What t o re cover Archi ve ( p. 217 ) Select the archive to reco[...]
-
Page 216
216 Co pyright © Acr onis, Inc., 2000 - 2009 [Optional] Acronis U niver sal Rest ore Applies to: Windows OS and system volume recovery Univers al Rest or e ( p. 227 ) Use the A cronis Universal Restor e when you n eed to rec over and boot up Windows on dissimilar hardware. Automa tic drive rs search Specify where the program should search f or HAL[...]
-
Page 217
Copyrig ht © A croni s, In c., 200 0 - 20 09 217 2. Click OK . To learn more abo ut using credent ial s in Acronis Backu p & Recover y 10, see the Owners and credentials ( p. 31 ) section. To learn more about operations available depending o n the user privileges, see the User pri vileges on a m anaged machi ne ( p. 31 ) secti on. 6.3.2. Archi[...]
-
Page 218
218 Co pyright © Acr onis, Inc., 2000 - 2009 • Di sks - to recover d isks • Volumes - to rec over volumes • Files - to recover specific files and f o lders 6.3.4. Content se lection The rep resentatio n of this window depends on the type o f data stored i n the archive. 6.3.4 .1. Disks / volume s sele cti on To select a backup and disks/volu[...]
-
Page 219
Copyrig ht © A croni s, In c., 200 0 - 20 09 219 6.3.5. Access cred entials for location Specify th e credentials r equired for a ccess to the l ocati on where the backup ar chive is st ored. To specify credentials 1. Select one of the following : o Use the tas k credential s The program will access th e location using the cred entials of the tas [...]
-
Page 220
22 0 Co pyright © Acr onis, Inc., 2000 - 2009 The new virtual machine will be configured automatically, the source machine configuration being co pied whe re po ssible. The configu ratio n is displa yed in t he Vir tual Machi ne Setti ngs ( p. 224 ) secti on. Chec k the settings and mak e changes if necess ary. Then you p roceed to the regular dis[...]
-
Page 221
Copyrig ht © A croni s, In c., 200 0 - 20 09 221 • Create new The program will generate a new NT signature for the target hard dis k drive. • Recov er from backup The program will repla ce the NT signature of the target hard disk wit h one from the dis k backup. Recovering the disk signatu re may be desirable due t o the following reasons: o A[...]
-
Page 222
222 Co pyright © Acr onis, Inc., 2000 - 2009 Recover [Di sk #] MBR t o: [If the Mast er Boot Recor d is select ed for reco very] Disk # ( p. 222 ) Choose th e disk to reco v er the Ma ster Boot Rec o rd to. NT signatur e: ( p. 220 ) Select the wa y the disk's signatu re contained in the MBR will be hand led. The disk si gnature i s used by Wi[...]
-
Page 223
Copyrig ht © A croni s, In c., 200 0 - 20 09 223 Prope rtie s Type A basic MBR disk can contain up to four primary volumes or up to three p rimary volumes and multiple logical drives. By default, the pro gram selec ts the ori ginal vo lume's t ype. You can change this setting, if required. • Primary . Infor mation about primary volumes is c[...]
-
Page 224
224 Co pyright © Acr onis, Inc., 2000 - 2009 To select the virtualization server the new virtual machine will be creat ed o n 1. Choose the P lace on the virtualizat ion server t hat I select o ption. 2. In the left part of the window, select the virtualizati on server. Use the right part of the window to review details on the select ed server. 3.[...]
-
Page 225
Copyrig ht © A croni s, In c., 200 0 - 20 09 225 This is the number of pr ocessor s of the n ew virtual mach ine. In most cases it is set to one. The res ult of ass ignment of mo re than one pr ocessor to the machine i s not gua ranteed. The num ber of v irtual pro ce ssors may be limite d by the ho st CPU co nfiguratio n, the virtualizat ion prod[...]
-
Page 226
226 Co pyright © Acr onis, Inc., 2000 - 2009 Exclusion exampl es Criterion Example Desc r ipt ion By name File1.log Exclud es all files na med File1.l og. By path C: Finance test.log Excludes th e fil e named t est. log locat ed in t he fold er C: Finance Mask (*) *.log Excludes all fil es with th e .log extension . Mask (?) my???.l og Exclu[...]
-
Page 227
Copyrig ht © A croni s, In c., 200 0 - 20 09 227 • Passwo rd . The password for t he account. 2. Click OK . 6.3.8. When to r ecov er Select when to star t the recov ery task: • Recov er now - the recovery task will be st arted immediately after you click the final OK . • Recover l ater - the re covery task wil l be s tarted at th e date an d[...]
-
Page 228
228 Co pyright © Acr onis, Inc., 2000 - 2009 - If the driv ers are on a vendor's disc or other removable media, turn on the Search rem ovable media . - If the drivers are located in a networked folder or on the bootable media, specif y the path to the folder in the Searc h folder field. During recovery, Universal Restore will perform the recu[...]
-
Page 229
Copyrig ht © A croni s, In c., 200 0 - 20 09 229 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMwar e Workstati o n machi ne can be con verted to the open virtualiz ation f ormat (OVF ) using the VMwar e OVF t ool . With Acron is Backu p & Recove ry 10 Age nt for H yper -V or Ag ent for ESX/ESXi , you [...]
-
Page 230
230 Co pyright © Acr onis, Inc., 2000 - 2009 6.3.11. Bootability troubleshooting If a syste m was bootable a t the time of backup, you exp ect that it will boot af ter reco ver y. Howe ver , the info rmatio n the ope rating sys tem store s and uses fo r boot ing up may become out dated duri ng recovery, especially if you change volume sizes, locat[...]
-
Page 231
Copyrig ht © A croni s, In c., 200 0 - 20 09 231 • The syst em loader point s to the wrong vol ume This may h appen when system or boot volumes are n ot recovered t o their o rigina l location. Soluti on : Modification of the boot.ini or th e boot bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this aut omatical[...]
-
Page 232
232 Co pyright © Acr onis, Inc., 2000 - 2009 The lines start ing with title , root , kernel , and i nitrd res pectively d etermine: o The title of the menu ite m . o The devic e on which the Linux kernel is located — typically, this is the boo t partition or the root partition, such as ro ot (h d0,0) in this exa mple. o The path to th e kernel o[...]
-
Page 233
Copyrig ht © A croni s, In c., 200 0 - 20 09 233 multi(0)disk(0)rdis k(0)partition(1) WINDOWS= "Microsoft Windows XP Professi onal" /noexecute=optin /f astdetect Windows Vista/2008 A part of the l oader resides in the partit ion boot sect or, the rest is in the files bootmgr, b oot bcd. At starting Windows, boot bc d is mounted to [...]
-
Page 234
234 Co pyright © Acr onis, Inc., 2000 - 2009 bootable environment to a spare hard d rive can guarantee success of the recovery. At least ensure that th e backup can be succe ssfully validated usi ng the boo table media. Diffe ren t wa ys to c rea te a vali dati on tas k Using the Validation page is the most general way to create a valida tion task[...]
-
Page 235
Copyrig ht © A croni s, In c., 200 0 - 20 09 235 To specify credentials 1. Select one of the following : o Run under the c urrent us er The task wi ll run u nder the cr edentials wi th which the u ser who sta rts the tasks is logged on. If the task ha s to r u n on schedule, you wil l be asked for the current user's passwo rd on completing th[...]
-
Page 236
236 Co pyright © Acr onis, Inc., 2000 - 2009 According to the or iginal FTP specifi cation, credentials required for access to FTP servers are transf erred through a netw ork as pl aintext. This means that the user name and passwor d can be intercepted by an eavesdropper us ing a packet snif fer. o If the archive is stored on a locally attached ta[...]
-
Page 237
Copyrig ht © A croni s, In c., 200 0 - 20 09 237 6.4.5. Access cred entials for source Specify th e credentials r equired for a ccess to the l ocati on where the backup ar chive is st ored. To specify credentials 1. Select one of the following : o Use the tas k credent ials The program will access th e location using the cred entials of the tas k [...]
-
Page 238
238 Co pyright © Acr onis, Inc., 2000 - 2009 Mount ing volumes in the r ead/w rite mode e nables you to modi fy the backup cont ent, t hat is, sa ve , move, create, delete files or fo lders, and run executab le s consisting of one file. Limitati on: Mounting of volume backups stored on Acronis Backup & Recover y 10 Storage Node is not pos sibl[...]
-
Page 239
Copyrig ht © A croni s, In c., 200 0 - 20 09 239 o If the arch ive is s to red on a network shar e, expan d the Network f olders group, th en select the require d networked machine and t hen cli ck the s hared fold er. If the network share require s access credentials, the program will ask fo r them. Note for Linux us e rs: To specify a Common Int[...]
-
Page 240
240 Co pyright © Acr onis, Inc., 2000 - 2009 Specify: • User nam e . When enteri ng the na me of an Activ e Direct ory user acc ount, be sur e to also specify the domain name ( DOMAIN Username or Username@domain) • Passwo rd . The password for t he account. 2. Click OK . According to the ori ginal FTP specificati on, credenti als requi red f[...]
-
Page 241
Copyrig ht © A croni s, In c., 200 0 - 20 09 241 To unmount an image, sele ct it in the table and click Unmount . To unmo unt all the mounted vo lumes, click Unmount all . 6.7. Exp ort ing a rch ives and backups The export o perati on crea tes a copy of an arc hive or a self - sufficient part copy of an archive in the location you specify. The ori[...]
-
Page 242
242 Co pyright © Acr onis, Inc., 2000 - 2009 The res ulting archive's options The exported archive inherits th e options of the original archive, including encryption and the password. When exporting a password - protected archive, you are prompted for the pa ssword. If the original archive is encryp ted, the pass word is used to en crypt th [...]
-
Page 243
Copyrig ht © A croni s, In c., 200 0 - 20 09 243 Task c redenti als ( p. 243 ) [Optional] The export task will run on b ehalf of the u ser who is creating the task. You can change th e task cr edentia ls if necess ary. To a ccess this opti on, select th e Advanced v iew check b ox. What t o ex port Export Select an object to export: Archi ve ( p. [...]
-
Page 244
244 Co pyright © Acr onis, Inc., 2000 - 2009 To learn more about u sin g credenti als i n Acr onis Ba ckup & Rec overy 1 0, see the Owne rs and credentials ( p. 31 ) section. To learn more about operations available depending o n the user privileges, see the User pri vileges on a man aged m achine ( p. 31 ) section . 6.7.2. Archive selecti on [...]
-
Page 245
Copyrig ht © A croni s, In c., 200 0 - 20 09 245 6.7.3. Backup select ion To specify a backup(s) to export 1. At the top of the window, select the respecti ve check box(e s). To en sure that yo u choose the ri ght backup , click on the backup an d loo k at the bott om table that display s the volumes contained in t he selecte d backup. To obtain i[...]
-
Page 246
246 Co pyright © Acr onis, Inc., 2000 - 2009 • To export data to a network share, expan d the Network fol ders group, s elect t he requir ed networked machine and then click the sha red f older. I f the ne twork sh ar e requires access credentials, the program will ask f o r them. Note for Linux users : To s pecify a Common Internet Fil e System[...]
-
Page 247
Copyrig ht © A croni s, In c., 200 0 - 20 09 247 In any o f the abo ve cas es, prov ide an a rchive name that is unique to the destination folde r or vault. If you need t o redo the exp ort using the same archive name, first delete the ar chiv e that resulted from the pre vious exp ort operati on. 6.7.6. Access cred entia ls for destina tion Speci[...]
-
Page 248
248 Co pyright © Acr onis, Inc., 2000 - 2009 Size ( p. 24 8 ) Specify the exact size of th e zone. Moving or r esizing of locked volu mes, suc h as th e volum e conta ining the currently ac tive operating system, requ ires a r eboot. Settings Password ( p. 248 ) [Optional] Protect the Acronis Secure Zone from un autho rized access with a passw ord[...]
-
Page 249
Copyrig ht © A croni s, In c., 200 0 - 20 09 249 2. In the Ent er the passwor d field, type a new pass word. 3. In the C onfi rm the passwor d field, re - type the passwo rd. 4. Click OK . To disable password 1. Choose Do not use . 2. Click OK . 6.8.1 .4. Result co nfirma tion The Result c onfirmat ion window displays the expected partition layout[...]
-
Page 250
250 Co pyright © Acr onis, Inc., 2000 - 2009 • examine back up content • moun t a volume backup to copy files fro m the backup to a physical dis k • safely delete archives and backups from the archives. To learn more ab out operati ons with vaults, see the Vaults ( p. 123 ) section. 6.8.2 .1. Increa sing Acroni s Se cure Zone To increase Acr[...]
-
Page 251
Copyrig ht © A croni s, In c., 200 0 - 20 09 251 If you select several volumes, the space will b e distributed proportionally to each partition. If you do not sel ect any volume , the freed sp ace b ecomes u nal located. After you click OK , Acr onis Backup & Reco v ery 10 will start del eting the zone. When remo v ing Acr onis Backup & Re[...]
-
Page 252
252 Co pyright © Acr onis, Inc., 2000 - 2009 • recover an operating syste m that cannot start • acces s and back up the data t hat has surv ived in a corrupted sy stem • deploy an o p erating system on bare metal • create basic or dynamic vol umes on bare metal • back up se ctor - by - secto r a disk with an unsuppo rted file s ystem •[...]
-
Page 253
Copyrig ht © A croni s, In c., 200 0 - 20 09 253 Linux- based boo tabl e medi a Start th e Boota ble Medi a Builder either from th e manag ement c onsole, b y selecting Tools > Create Bootable Medi a or, as a separate co mponent. Select th e way volumes and network r esources will b e handled — called the media style: • A media with Linux -[...]
-
Page 254
254 Co pyright © Acr onis, Inc., 2000 - 2009 It is recom m ended that you famili arize you rself w ith the hel p document ation supp lied wit h Windo ws AIK. To a ccess th e documen tation, s elect Microsoft Windows AIK - > Documentat ion from the start menu. Usin g Bar t PE You can create a Bar t PE image with A cronis Plug - in using t h e Ba[...]
-
Page 255
Copyrig ht © A croni s, In c., 200 0 - 20 09 255 Kernel para meters This wi ndow lets you spec ify one or more parameters of the Linux kernel. They will be automatically applied w hen the boot able medi a starts. These parameters are typically used when experiencing problems while working with the bootable media. Normally, you can l eave this fiel[...]
-
Page 256
256 Co pyright © Acr onis, Inc., 2000 - 2009 nodma Disables direct memo ry access (DMA) for all IDE h ard disk drives. Prevents the kernel from freezing on some hardware. nofw Disables the FireWire (IEEE1394) interfac e support. nopcmci a Disables detection of PCMCIA hardware. nomouse Disabl es mouse suppor t. module_name =off Disab les the m odul[...]
-
Page 257
Copyrig ht © A croni s, In c., 200 0 - 20 09 257 Pre - confi guring mul tiple network co nnections You can pre - configure TCP/IP set tings for up t o ten n etwork i nterfac e card s. To ensure th at ea ch NIC will be assigned the appropriate settings, create the media on the server for which the media is customized . Wh en you select a n exi stin[...]
-
Page 258
258 Co pyright © Acr onis, Inc., 2000 - 2009 • to get the mass - storage drivers that you explicitly specify from the media. This is necessary when the target hardware has a specific mass storage controller (such as a SCSI, RAID, o r Fiber Channel adapter) for the hard disk. For more information pleas e refer to Univ er sa l Re st ore ( p. 227 )[...]
-
Page 259
Copyrig ht © A croni s, In c., 200 0 - 20 09 259 7. Burn the . ISO to CD or DVD using a third - party tool or copy to a flash drive. Once a machine boots into t he WinPE, Acronis Backup & Recovery 10 starts aut omat ically. 6.10.1 .3 . Adding the Acroni s Plug - in to W i nPE 2. x Bootable Media Builder provides three methods of integrating Ac[...]
-
Page 260
260 Co pyright © Acr onis, Inc., 2000 - 2009 8. Burn the . ISO to CD or DVD using a third - party tool or copy to a flash drive. Once a machi ne boots into WinPE, Acronis Backup & R ecovery 10 starts aut omatically. To create a PE im age (ISO file) from the resulting WIM file: • replace the default boot.wi m file in your Windo ws PE folder w[...]
-
Page 261
Copyrig ht © A croni s, In c., 200 0 - 20 09 261 6.10.2. Connecting to a machine boote d from me dia Once a machine b oots from bootable m edia, the machin e terminal displays a st artup window with the IP address(es) obtained fro m DHCP or set accordin g to the pre - configured v alues. Remote connec tion To connec t to the machin e remotely, s e[...]
-
Page 262
262 Co pyright © Acr onis, Inc., 2000 - 2009 1. In the boot menu, pre ss F11. 2. Add to t he command prompt the following comm and: v ga= a sk , and t hen proceed wit h booting. 3. From the list of suppo rted video modes, choo se the appropriat e one by typing it s numbe r (for example, 3 18 ) , and then press E NTER. If you do not wish to follow [...]
-
Page 263
Copyrig ht © A croni s, In c., 200 0 - 20 09 263 6.10.4. List of commands a nd utilitie s av a ila ble in Linux - based boot able medi a Linux - based bootable media contains the f ollow ing commands and comma nd line utilit ies, which you can use when running a command shell . To start the command she ll, press CTRL+AL T+F2 while in the bootable [...]
-
Page 264
264 Co pyright © Acr onis, Inc., 2000 - 2009 gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount gunzip pktsetup uuidgen hal t poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.10.5. R e covering MD device s and log ical volumes To recover Linux Software RAID devices, known as MD devices, and/or[...]
-
Page 265
Copyrig ht © A croni s, In c., 200 0 - 20 09 265 Under the arc hive conten ts, Acronis Backup & Recov ery 10 will display a message saying that it detected i nforma tion about the volume struc ture. 4. Click Det ails in t he area with that mess age. 5. Review the volu me structure, and then click Apply RAID/LVM to cre ate it. To create the vol[...]
-
Page 266
266 Co pyright © Acr onis, Inc., 2000 - 2009 8. Click Recover , the n specify the path to the archiv e and any o ther re quired par ameters, a nd then click OK . Note: This pr ocedure does not work w hen connected to A cronis Backup & Recovery 10 Bo otable Agent r emotely, because the comma nd shell is not available in t his cas e. Example Sup[...]
-
Page 267
Copyrig ht © A croni s, In c., 200 0 - 20 09 267 --- Volume group --- VG Name my_volg roup ... VG Access read/wr ite VG Status resizab le ... VG Size 1.99 GB ... VG UUID 0qoQ4l - Vk7W - yDG3 - uF1l - Q2AL - C0 z0 - vMeACu 5. Run the fol lowin g command to create the l ogical volume; in the - L paramete r, specify the siz e given by VG Size : lvm l[...]
-
Page 268
268 Co pyright © Acr onis, Inc., 2000 - 2009 ... Dynamic & GPT Volum es: DYN1 4 my_volgrou p - my_logvol 1253 3760 Ext2 You will need the volu me's i ndex, given in the Idx colu mn, in th e next step. 2. Use the -- mount command, specif ying the vol ume's index in t he -i parameter. For e xa mple: trueimagemnt -- moun t /mnt -- fi le[...]
-
Page 269
Copyrig ht © A croni s, In c., 200 0 - 20 09 269 6.10.6 .2 . Settin g up a mac hine to bo ot from PXE For bare metal, i t is enough that th e machine’s BI OS su pports ne twork booting . On a mac hine that has an operat ing system on t he hard disk, t he BIOS must be conf igured so that the network interface card is e ither the first boot device[...]
-
Page 270
270 Co pyright © Acr onis, Inc., 2000 - 2009 6.11. Disk managem ent Acronis Disk Director Lite is a tool for preparing a m achine disk/volume configuration f or recovering the volu m e images saved by the A cronis Backup & Rec overy 10 software. Someti mes after th e volume has b een backed u p and i ts image pla ced into a safe storage, th e [...]
-
Page 271
Copyrig ht © A croni s, In c., 200 0 - 20 09 271 Running Acronis Disk Di rector Lite f rom a bo otable media You can run Acronis Disk Director Lite on a bare meta l, on a machine tha t cannot boot or on a non - Window s machine. To do so, boot the machine from a bootable media ( p. 37 1 ) created wi th the Acronis Bootable Media Bu ilder; run the [...]
-
Page 272
272 Co pyright © Acr onis, Inc., 2000 - 2009 Displaying ope ration resul ts The results of any disk o r volume operation, you have just planned, are immediately displayed in the Disk m anagement vie w of the console. For e xample, if you create a volume, it will be i mm ediately shown in the table, as well as in graphical form at the bottom of the[...]
-
Page 273
Copyrig ht © A croni s, In c., 200 0 - 20 09 273 After the initialization, all the disk space remains unallocated and so still impossible to be used for program installation or file storage. To be able t o use it, proceed normally t o the Cre ate volum e opera tion. If you decide t o change the d isk settings it can be d one later using the s tand[...]
-
Page 274
274 Co pyright © Acr onis, Inc., 2000 - 2009 If the destin ation is s maller, then the As is optio n of cloning will be unavailable and proportional resizing of the sou rce disk volumes will be mandatory. The progra m analyzes the target d isk to establish whether its size will be sufficient to hold all the data from th e source di sk wit hout an [...]
-
Page 275
Copyrig ht © A croni s, In c., 200 0 - 20 09 275 If you need to leave an NT signature: 1. Click to clear the Copy NT signatur e check box, if nece ss ary. 2. Click to clear the Turn off the machine af ter the cloning oper ation check box, if necessa ry. 3. Click Finish to add the pending op eration. 4. Click Co mmit on the tool bar and then cli ck[...]
-
Page 276
276 Co pyright © Acr onis, Inc., 2000 - 2009 If you n eed t o c onv ert a GPT dis k to MBR : 1. Select a G PT disk t o convert t o MBR. 2. Right - click on the selected volume, an d then cli ck Conv ert t o MBR in the contex t menu. You will receive a warning windo w, stating that you are about to c onvert GPT into MBR. You will b e explained the [...]
-
Page 277
Copyrig ht © A croni s, In c., 200 0 - 20 09 277 In contrast to Windows Disk Manage r the program ensures bo otability of an offline operating system on the disk aft er the operati on. 6.11.5 .6 . Disk con version : dynamic to basi c You wo uld want to convert dynam ic disk s back to basi c one s, e.g. if yo u want to start usi ng an OS on your ma[...]
-
Page 278
278 Co pyright © Acr onis, Inc., 2000 - 2009 One of the following disk statuses always app ears in the graphical view of the d isk next to the disk's nam e: • Online The online s tatus means that a disk is accessible in the read - write mode. This is the normal dis k status. If you need a disk to be accessible in t he read - only mode, sele[...]
-
Page 279
Copyrig ht © A croni s, In c., 200 0 - 20 09 279 Types of dy n amic vo lumes Simple Vol ume A volume created from fre e space on a single physical disk. It c an consist of one region on the disk or several regions, virtually united by the Logical Dis k Manager (LDM). It provid es no additional reliability, no speed improve m ent, n or extra siz e.[...]
-
Page 280
280 Co pyright © Acr onis, Inc., 2000 - 2009 Create vol ume wi zard The Creat e volum e wizard lets you create any type of volume (including system and active), select a file system, label, assign a letter, and als o provides other disk manage m ent functions. Its pages wi ll enabl e you to en ter op erati on param eters, pr oceedin g step - by - [...]
-
Page 281
Copyrig ht © A croni s, In c., 200 0 - 20 09 281 o Sele ct three d estinati on dis ks to cr eate th e volu me on. After you choose the disk s, the wizard will cal culate the maximum size of t he resulting volume, depending o n the s ize of the unal located s pace on the di sks you chose and t he requireme nts of the volume typ e you have previousl[...]
-
Page 282
282 Co pyright © Acr onis, Inc., 2000 - 2009 If you are creating a basi c vo lume, which can be made into a syste m volume, this page will be different, giving you the opportun ity to sel ect the volume Type — Primary ( Ac tiv e Pri mary ) o r Logic al . Typically Pr i mar y is sel ect ed to insta ll an opera ting system to a volu me. Selec t th[...]
-
Page 283
Copyrig ht © A croni s, In c., 200 0 - 20 09 283 6.11.6 .3 . Set acti ve volume If you have several primar y volumes, you must specify one t o be the boot volume. For this, y ou can set a volu m e to beco m e active. A dis k can hav e only one a ctive volume, s o if you s et a volume as active, the volume, which was active before, will be automati[...]
-
Page 284
284 Co pyright © Acr onis, Inc., 2000 - 2009 6.11.6 .5 . Change vo lume labe l The volume label is an optional attribute. It is a name assigned to a volume for easier recogniti on. For example, on e volume could be called S YSTEM — a volume with an operating sys tem, or PROGRAM — an application volume, DATA — a data volume, etc., but i t doe[...]
-
Page 285
Copyrig ht © A croni s, In c., 200 0 - 20 09 285 The new volume structure w ill be graphically represen ted in the Disk management v iew . If you set a 64K c luster size for FAT16/FAT32 or an 8KB -6 4KB cluster si ze for NT FS, Windows can mount t he volume, but some programs (e.g. Setup programs ) might cal culate its dis k space incorrectly. 6.1[...]
-
Page 286
Copyrig ht © A croni s, In c., 200 0 - 20 09 286 7. Centralize d ma nagement This sec tion c overs op erations th at can be per for med centr ally b y using the components for centra lized manage ment. The c ontent of t his sectio n is onl y applica ble to adva nced edit ions of Acroni s Backup & Recove ry 10. 7.1. Adminis tering Acronis Backu[...]
-
Page 287
Copyrig ht © A croni s, In c., 200 0 - 20 09 287 Vaults with low free space: X View vaults The alert is displa yed if at least one ce ntralized vaul t has less th an 10% fr ee space. V ie w vau lts will take you to the Centralized vaults ( p. 125 ) view wh ere y ou ca n examine t he vault si ze, free s pace, cont ent an d ta ke the necessa ry st e[...]
-
Page 288
288 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acti vitie s The stac ked column char t lets y ou explore th e daily history o f the Ac ronis Ba ckup & Rec overy 10 agents' a ctivities . The histo ry is based on the log entri es, collected fr om the regi stered mach ines and from the management server. The chart shows th e number of log [...]
-
Page 289
Copyrig ht © A croni s, In c., 200 0 - 20 09 289 • Use the Informati on pane's tabs to view deta iled i nformati on about th e selected policy a nd perform additional operations, such as revoke the policy, v iew details of t he machine (group) the policy is appli ed to , etc. The pane l is co llapsed by default. T o ex pand the panel , clic[...]
-
Page 290
290 Copyrig ht © A croni s, In c., 200 0 - 20 09 o Select the policy and click View tas ks . Check th e tasks that hav e Faile d as t heir last result : select a task and th en cli ck Vie w log . S elect a log entry and then click Vie w details . This approach comes in handy if the policy s tate is Deployed, that is, the policies' tasks alrea[...]
-
Page 291
Copyrig ht © A croni s, In c., 200 0 - 20 09 291 To Do Create a bac kup policy Click Create backup policy . The pro cedure of creat ing a backup po licy is described in - depth in the Creating a backup policy ( p. 346 ) section . Apply polic y to machines or group s Click Apply to . In the Machines selection ( p. 291 ) window, s pecify the machine[...]
-
Page 292
292 Copyrig ht © A croni s, In c., 200 0 - 20 09 The Acronis B ackup & Recover y 10 Managem ent Ser ver will d eploy the p olicy t o the select ed machine s and machines belonging to the selecte d groups. Filtering and s orting backu p policies The following is a guideline for you to filter and sort b ackup policies. To Do Sort back up policie[...]
-
Page 293
Copyrig ht © A croni s, In c., 200 0 - 20 09 293 Settings The tab displays inform ation abou t the bac kup schem e used by the po licy and bac kup opt ions t hat were modified against the default settings. Applied to The tab displays a list of machines and groups the s elected policy is applied to. Ac tio ns To D o View d etails o f the machine (g[...]
-
Page 294
294 Copyrig ht © A croni s, In c., 200 0 - 20 09 The main goal of grouping is protecti on of multiple machines with one policy. Once a machin e appears i n a group, the policy a pplied to t he group is applie d to the machine and the new tasks are created by the policy on the machine. Once a machine is remov ed from a group, the po licy applie d t[...]
-
Page 295
Copyrig ht © A croni s, In c., 200 0 - 20 09 295 7.1.3 .1. Actions on m achine s Registering machines on the management server Once th e machin e is ad ded or imp orted t o the All phys ical mac hines gro up, it be comes registered on the management server. Registered machin es are available for deploying backup policies and for performing other c[...]
-
Page 296
296 Copyrig ht © A croni s, In c., 200 0 - 20 09 Add a machi ne to anot her static group Click Add to an other group . In the A dd to grou p ( p. 299 ) window , specif y the group to copy the sele cted machine to. The backup poli cies appli ed to the groups the machine is a member o f wil l be ap plied to th e machi n e. For machines in custom gro[...]
-
Page 297
Copyrig ht © A croni s, In c., 200 0 - 20 09 297 View tasks existin g on a machine Click View tasks . T he Tasks ( p . 318 ) view w ill displa y a list of the ta sks, existin g on the mach ine. View log entrie s of a machine Click View lo g . The Log ( p. 3 20 ) vie w will disp lay a list of th e machine's lo g en tries. Update all infor mati[...]
-
Page 298
298 Copyrig ht © A croni s, In c., 200 0 - 20 09 To perform registration through a local or rem ote console - agent connect ion, you ha ve to be connected with the mana gement server ad ministra to r's creden tials or provid e the manage ment server administrator's cr ed entials. On conn ecting , select fr om the menu Options - Machine o[...]
-
Page 299
Copyrig ht © A croni s, In c., 200 0 - 20 09 299 A regis tered machine has to be specified by its r egistration address, that i s, you need to provide exactly the same host name, ful ly qualif ied domain name (FQDN), or IP address as was specifi ed when the machine was initially added to the manage ment serv er. Otherw ise, the machine will be del[...]
-
Page 300
300 Copyrig ht © A croni s, In c., 200 0 - 20 09 The machi ne being adde d becomes a membe r of more tha n one group. As a r esult, the backup policies applied to the first group will r emain on the machine, and the backup p olicies applie d to t he seco nd, third, etc. gr oup will be depl oyed to the mac hine. Moving a machi ne to another gro up [...]
-
Page 301
Copyrig ht © A croni s, In c., 200 0 - 20 09 301 o Online - the machi ne is a vailable f or the manag ement ser v er. This m eans th at the manageme nt server's last con nection to the machine was succes sful. Conne ction is establish ed every 2 minu tes. o Offline - t he machine is u navailable for the mana gement server: it is turned off, o[...]
-
Page 302
302 Copyrig ht © A croni s, In c., 200 0 - 20 09 Filter ing and sortin g Filtering and sorting of the backup policies is performed in the same way as for the Bac kup polic ies view. See the Fil tering and sorting bac kup policies ( p. 292 ) section f o r detail s. Plans and task s Displays a list of the plans ( bo th local and centralized) and tas[...]
-
Page 303
Copyrig ht © A croni s, In c., 200 0 - 20 09 303 Stop a plan/task Click Backup pl an Stop . Stopping the running backup plan sto ps all i ts tas k s. Thus , all the tas k operations will be a bort ed. Click Task Stop . What will happen i f I stop the task? Generally, stopping the task aborts its operati on (backup, recovery, v alidation, exporti n[...]
-
Page 304
304 Copyrig ht © A croni s, In c., 200 0 - 20 09 Only tasks that do not belong to a backup plan, such as a recovery task, can be modif i ed by dire ct edit ing. When you ne ed to mo dify a tas k belonging to a local bac kup plan, edi t the bac kup plan. A tas k belonging to a c entr alized backup plan can be modified by editi ng the c entrali zed [...]
-
Page 305
Copyrig ht © A croni s, In c., 200 0 - 20 09 305 View ta sks r el ated to a group Click View tasks . You will be tak en to the Ta sks vie w with pre - filter ed task s re lated to th e selec ted backup g roup. View log related to a group Click View lo g . This op ens Lo g view with pre - fi lter ed log en trie s of th e sele cted gr oup. R emove m[...]
-
Page 306
306 Copyrig ht © A croni s, In c., 200 0 - 20 09 Configuring the machi nes table By default, the table has fi v e columns that a re displayed, others are hidd en. If require d, you ca n hide the show n columns and show the hidden one s. To show or hide columns 1. Right - click any column h eader to open the conte xt menu. The m enu items that a re[...]
-
Page 307
Copyrig ht © A croni s, In c., 200 0 - 20 09 307 Refresh a li st of gro ups Click Refresh . The mana gem ent co nsole will upd ate t he list o f group s fro m the ma nage ment server with t he most r ecent in format ion. Though the list of groups is refr eshed auto matic ally based on ev ents, the data m ay not be re trieved immedi ately fro m the[...]
-
Page 308
308 Copyrig ht © A croni s, In c., 200 0 - 20 09 For example, the following set of criteria Operating system: Windows Ser ver 2008 Operating system: Windows Ser ver 2003 Organizational unit: SERVERS IP range: 192.1 68.17.0 - 192. 168.17. 55 will add to the sa m e group all the machines wh ose operating system is Windows 2000 or Window s 2003 and b[...]
-
Page 309
Copyrig ht © A croni s, In c., 200 0 - 20 09 309 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machi ne has to be sp ecified by its regi stration add ress, th at is, you need to pr ovide exactly the same host nam e, fully qualified domain na me (FQDN), or IP address a s was specified when the machi ne was initially [...]
-
Page 310
310 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Type - type of the group (static, or dy namic) • Criteria (for dynamic group s only) - grouping criteria • Comments - the group description (if specified) Backup po l icies Displays a list of backup policies related to the group an d allows performing the following op erations: To Do View de[...]
-
Page 311
Copyrig ht © A croni s, In c., 200 0 - 20 09 311 7.1.4. Virtual ma chines You can centrally manage v irtual machines using eithe r of the following meth ods or both: Adding a virtual machi ne as a physical m achine Install Acronis Backup & Recovery 10 Agent for Wind ows or Agent for Linux on the virtual machine and register ( p. 2 97 ) it on t[...]
-
Page 312
312 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.4 .1. Virtual machines o n a manage ment se rver Availab ility of virtu al mac hines Virtual machines are displayed as available when both the agent i s available for the manag ement server and the machines are available for the ag e nt. The list of virtual machines is refreshed dynamically ever[...]
-
Page 313
Copyrig ht © A croni s, In c., 200 0 - 20 09 313 • Host /V A Using this criterion, you can create a dynamic gr oup of virtual machines hosted on a specified virtualization server or manag ed by the specified virt ual appliance. 7.1.4 .2. Deplo ying Agent fo r ESX /ESXi Acronis Backup & Recovery 10 Management Serve r provides an easy way to d[...]
-
Page 314
314 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Li c en ses Clic k Provi de licens e . When insta lling th e trial product ver sion, select Use t he followin g trial licen se k ey and ente r the trial license key. Deduplication is always enabled in the trial version. When inst alling th e purchased pr oduct, se lect Use a license fr o m th e f[...]
-
Page 315
Copyrig ht © A croni s, In c., 200 0 - 20 09 315 The group th at ha s the sa me name as the vCenter Server will be removed and the polici es applied to this group or its child groups will be r e voked. Virtual machines remain in the All vi rtual m achines group and in othe r groups if thei r host is managed by Agent for ESX/ESXi. Policies applied [...]
-
Page 316
316 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.5 .1. Action s on storage nodes All the op erations describ ed here, are perf ormed by clicki ng th e correspond ing bu ttons on th e toolbar. The operations can be also accessed from the Storag e nodes bar (on the Ac tions and tool s pane) and f rom the Stor age nodes item of the main menu. To [...]
-
Page 317
Copyrig ht © A croni s, In c., 200 0 - 20 09 317 Refresh the li st of storage nodes Click Refresh . The mana gem ent co nsole will upd ate t he list o f storag e nod es fro m the manag ement serv er with t he mo st re cent in for mation . Tho ugh t he list of storage nodes i s refr eshed autom atically based on e vents , the data m ay not be re tr[...]
-
Page 318
318 Copyrig ht © A croni s, In c., 200 0 - 20 09 o Withdraw n - the storage n ode was register ed on ano ther manag emen t server. As a result, it is not possi ble t o control the n ode fro m the cur rent management ser ver. • Arc hi v es - the total number of archives st ored in all the vaults m anaged by the st orage node • Backups - the tot[...]
-
Page 319
Copyrig ht © A croni s, In c., 200 0 - 20 09 319 or the bac kup plan wil l run. View details of a task Click View d eta ils . In the Tas ks details ( p. 18 8 ) win dow, ex amine a ll info rma tio n rela ted to the selecte d task. View a task's log Click View lo g . The Log ( p. 320 ) view will d isplay a list of the log entri es related to th[...]
-
Page 320
320 Copyrig ht © A croni s, In c., 200 0 - 20 09 tasks owned by othe r use rs. • Each storage node has a built - in service task call ed a co mpa cting task. This task ca nnot be del eted. This is a built - in compacting task Refresh tasks tabl e Click Refresh . The mana gem ent co nsole will upd ate t he list o f tasks ex isti ng o n the ma chi[...]
-
Page 321
Copyrig ht © A croni s, In c., 200 0 - 20 09 321 Local and cen tralized l ogging in Acr onis Back up & Recov ery 10 Acronis Backup & Recover y 10 has local and c entralized logs of events. Local even t log A local event log holds information about A cronis Backup & Rec overy 10 operations on a managed machine . For example, creat ing a[...]
-
Page 322
322 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.7 .1. Actions on l og entri es All the op erations desc ribed below ar e performed by cli cking the corr esponding items on the log toolbar . All these op eratio ns can a lso be perform ed with the cont ext menu (by rig ht - clicking the log entry), or with the Log actions bar (o n the A ctions [...]
-
Page 323
Copyrig ht © A croni s, In c., 200 0 - 20 09 323 To Do Display log entri es for a given time period 1 In the From field, select the d ate startin g from which t o disp lay the log en tries. 2 In the To fie ld, select the date up to whic h to displ ay the log entries . Filter log entri es by type Press o r relea se th e follo w ing toolbar buttons:[...]
-
Page 324
324 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Machine - T he name of the mac hine where the eve nt has occurred (i f any) • Code - Blank or the pro gram error code if the event type is error. Error code is an integer number that may b e used by Ac ronis support service to solve the probl em. • Module - Blank or the num ber of program mo[...]
-
Page 325
Copyrig ht © A croni s, In c., 200 0 - 20 09 325 Reports about vaults' statistics and task act ivities are interval - based and provide historical information for the spe cified time interval that can last from days to years, depending on the amount of dat a kept in the databases . Gene rati ng rep orts To start gen erati ng a rep ort, select[...]
-
Page 326
326 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.8 .2. Report abo ut the backup policies In this view, y o u can gen erate a report ab out the backup policies exis ting on the managemen t server . This repo rt consi sts of one or more tab les. Filter s Under Filters , choose which back up polic ies to include in t he repo rt. On ly the backup [...]
-
Page 327
Copyrig ht © A croni s, In c., 200 0 - 20 09 327 With the default filter setting s, the report includes all backup plans from all machines. Report view Under R ep or t vi ew , choose how the rep ort will look: • Select whether to show all it ems in a single table or to group them by a par ticular column. • Specify which table co lumns to show,[...]
-
Page 328
328 Copyrig ht © A croni s, In c., 200 0 - 20 09 Filter s Under Fi lter s , c hoo se w h ich archives to include in the report. Only the archiv es that meet all fil ter criteria are included. • Vaults : The list of centraliz ed managed vaults that st ore the archives. • Machines : The lis t of registered machin es fr om whi ch the a rchi ves w[...]
-
Page 329
Copyrig ht © A croni s, In c., 200 0 - 20 09 329 • Specify which table co lumns to show, a nd in which order . • Select which diagrams to in clude in the report. The diagrams sh ow space usage in the vaults. 7.1.8 .7. Report abo ut the task activi ties In this view, y o u can gen erate a r eport ab out the tas ks that existed on reg ister ed m[...]
-
Page 330
[...]
-
Page 331
Copyrig ht © A croni s, In c., 200 0 - 20 09 331 7.2.1 .1. How to lo ad Acronis Administ rative Template The Adm inistrative Template, provided b y Acronis, enables th e fi ne - tuning of some secu rity related feature s, including e ncrypted co mmunicat ion settings. T hrough the Mic rosoft Group Po licy mechanism, the template po licy settings c[...]
-
Page 332
332 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.2.1 .2. Acron is Backup & Recov ery 10 Storag e Node The following are the parameters of Acronis Backup & Recovery 10 Storage N ode that can be set b y using Acronis Administrative Templat e. Client C onnecti on Limi t Descriptio n: Specifies the maxi mum number of si multaneous c o nnecti[...]
-
Page 333
Copyrig ht © A croni s, In c., 200 0 - 20 09 333 Vault Free Space Warni ng Percentag e Descriptio n: Specifies the amount of free space in a managed vault, as a percentage o f its total size, below which a w arning is recorded in the st orage node's log. Possible values: Any i nteger number bet ween 0 and 100 Default v alue: 10 The total size[...]
-
Page 334
334 Copyrig ht © A croni s, In c., 200 0 - 20 09 D efault value: 10 If the amount of free spac e on the disk con taining a man aged vault's database is l ess than the value of Vault Dat abase Free Space Error Limit , an error is recorded in the st orage node's log. Backups performed to the vault will keep failing until the amo unt of fre[...]
-
Page 335
Copyrig ht © A croni s, In c., 200 0 - 20 09 335 For detail s o n ho w the centrali zed even t log is c leaned up, see Log cleanup rules ( p. 83 ). Windows Even t L og Specifies wh en to record Acronis Backup & Rec overy 1 0 Manag ement Ser ver's events i nto th e Applicat ion even t log in Windows. This parameter has tw o settings: Trace[...]
-
Page 336
336 Copyrig ht © A croni s, In c., 200 0 - 20 09 Possibl e values: Any string 0 t o 32765 characters long Default v alue: public Synchr onization Specifies h ow Acronis B ackup & Rec o very 1 0 Ma nagement Server conne cts to regist ered machines for deployment o f centralized policies, ret rie val of logs and bac k up plan states, and similar[...]
-
Page 337
Copyrig ht © A croni s, In c., 200 0 - 20 09 337 Acronis Backup & Recover y 10 Management Server t ries to perform synchronization f or each normal - priority machine once in the n umber of seco nds give n by Pe riod , by using an available worker thr ead (see Maximum Workers desc ribed previo usly). If there are fewer worker threads than nor [...]
-
Page 338
338 Copyrig ht © A croni s, In c., 200 0 - 20 09 We reco mmend settin g Sec on d C onnect ion Ate mpt to Tr ue only in networks whic h ofte n experi ence prob lems wit h their DNS s ervers, and provide d that t he machine s' IP addr esses change inf requent ly — as in cases of fi xed IP addresses or long DHC P lease times. This setting has [...]
-
Page 339
Copyrig ht © A croni s, In c., 200 0 - 20 09 339 Default v alue: 0 If this setting is 0 , th e man agement server uses the Snapshot Storage Rel ative Size setting . The initial size will not exce ed the available space mi nus 50 MB. Snapshot Storag e Relativ e Size This set ting is eff ective onl y when th e Snapshot Storage Abs olute Size setting[...]
-
Page 340
340 Copyrig ht © A croni s, In c., 200 0 - 20 09 Default v alue: 30 If Acronis License Server is unavailable, Acronis Backu p & Recovery 10 will cont inue working with full functionality for t he number o f days specif ied in Maximum Time Without Li cen se Ser v er , as counted from the moment of installation or from the las t successful c hec[...]
-
Page 341
Copyrig ht © A croni s, In c., 200 0 - 20 09 341 Default v alue: False Trace Le vel Descriptio n: Specifies th e minimu m level of severit y o f events t o be recorded into th e event log. Only events of lev els gr eater th an or eq ual t o the v alue in Tra c e Lev el will be reco rded. Possibl e values: 0 (In ternal ev ent), 1 (Debugging informa[...]
-
Page 342
342 Copyrig ht © A croni s, In c., 200 0 - 20 09 You may want to increase the initial size of the snapshot storage — or to place it on a different volu me — when experiencing pro blem s with back ing up data that changes extensive ly during backup. This parameter is used when creating a backup plan. Changes to this parameter do not affec t alr[...]
-
Page 343
Copyrig ht © A croni s, In c., 200 0 - 20 09 343 Specifies the port that the component will use for incoming an d outgoing communication with othe r Acronis compone nts. Select one of the foll owing: Not C onfigure d The com ponent will use t he default TCP po rt number 9876 . Enabled The comp onent wi ll us e the sp ecified port; type th e port n[...]
-
Page 344
344 Copyrig ht © A croni s, In c., 200 0 - 20 09 Always us e The use of SS L certificates i s enabled . The conn ection wil l be establ ished only if t he use of SS L certificates is enabled on the ser ver application. Disabl ed The same as Not config ured . Server Encrypt ion opti ons Specifies wh ether to enc rypt the transferr ed data when the [...]
-
Page 345
Copyrig ht © A croni s, In c., 200 0 - 20 09 345 Eac h event has a level fro m zero to five based on the event's severity, as shown in the f ollowing table: Level Name Descr iption 0 Unknow n Event whose l evel of severi ty is unkno wn or not applicable 1 Debug Ev ent used for de bug purposes 2 Information Inform ational event, such as one ab[...]
-
Page 346
346 Copyrig ht © A croni s, In c., 200 0 - 20 09 You will find the descripti o n of these parameters in the correspo ndent topic abou t configuratio n through th e admin istra tive template. 7.2.3. P a rameters set thr ough Wind ows registr y The following two parameters determine paths to Acronis Backup & Rec ove ry 10 S torage N ode's i[...]
-
Page 347
Copyrig ht © A croni s, In c., 200 0 - 20 09 347 General Policy name [Optio nal] Enter a unique name for the backup pol icy. A conscio us name lets you ident ify the policy among the other s. Source t ype Select the type of items to back up: Disk /volum es or F iles . Poli cy creden tia ls ( p. 349 ) [Optional] You can change the policy account cr[...]
-
Page 348
34 8 Copyright © Acr onis , In c., 200 0 - 20 09 Use well - known optimi zed backup schem es, such as Grand father - Father - Son and Tower of Hanoi, c reate a custom ba ckup scheme or back up data onc e. Archiv e validat ion When to vali date [Optio nal] Define when and how o ften to per form validatio n and whet her to valid ate the entire ar ch[...]
-
Page 349
Copyrig ht © A croni s, In c., 200 0 - 20 09 349 Storag e ( p. 213 ) Choose the storage on the virtualization server or the fo lder to place the virtual machine files in. Result ant VMs Specify a name for the virtu al machines to be created. The d efault name consists of variables that re flect the policy name and the name o f the machine t hat wi[...]
-
Page 350
350 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.2 .1. Volumes to back up se lect ion rules Define volume selection rules, according to which the volume s will be backed up on t he machines the policy will be applied to. To define volume selection rules In the first line, select the ru le from the list, or type i t manually. To add another ru [...]
-
Page 351
Copyrig ht © A croni s, In c., 200 0 - 20 09 351 First partition on the first SCSI hard disk of a Linux machi ne Type or select: /dev/sda1 s da1 is the standard de vice name fo r the firs t partit ion of the first S C SI hard dis k drive. Fo r mo re deta ils, see N ote o n Lin ux machin es. First partition on the first softwa re RAID hard disk of [...]
-
Page 352
352 Copyrig ht © A croni s, In c., 200 0 - 20 09 /dev/ hda2, and /dev/h da3, respe ctively. To perform a disk backu p of the, say, th ird partitio n, one can type /dev/ hda3 in the row of the Volumes to bac k up selecti on rules dialo g box. Furthermo re, a L inux par tition c an be mo unted anywhe re inside the tr ee. Say, /de v/hda3, can be moun[...]
-
Page 353
Copyrig ht © A croni s, In c., 200 0 - 20 09 353 Point to the folders and files to be backed up. If you specified a path to a file o r folder explicitly, the policy will back up thi s item on each machine where this e xact path will be found. To include In the Files and folders column, type or select: File Text.doc in folder D: Work D: Wor k [...]
-
Page 354
354 Copyrig ht © A croni s, In c., 200 0 - 20 09 The roo t user 's hom e directory /root Directory for all u ser - related programs /usr D irector y for syste m configuratio n files /etc 7.3.3. Access cred entials for source Specify credentials required for access to the data you are going t o back up. To specify credentials 1. Select one of [...]
-
Page 355
Copyrig ht © A croni s, In c., 200 0 - 20 09 355 You can use one or m ore wildcard characters * an d ? in a file mask: The aste risk ( *) substitutes for zero or more characters in a file name; for exa mple, the file mas k Doc*.txt yi elds files suc h as D o c.txt and Docu ment.txt The questi o n mark (? ) substitutes for e xactly one ch aracter i[...]
-
Page 356
356 Copyrig ht © A croni s, In c., 200 0 - 20 09 The program generates a common name for the new archives and d isplays it in the Name field. The name looks like [PolicyName]_[MachineNa me]_Archive1. If you are not satisfied with the automatically generated name, construct an o ther name. If y o u se lected Store all machines' archives in a s[...]
-
Page 357
Copyrig ht © A croni s, In c., 200 0 - 20 09 357 7.3.7. Backup scheme selection Choose one of th e avail able b ackup sch emes: • Back up now – to create a b ackup task for manual start and run the task immediately after its creation. • Back up later – to create a backup task fo r manual start OR schedule o ne - time t ask executi o n in t[...]
-
Page 358
358 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.7 .3. Simple sc heme With the simp le backup schem e you just sche dule when and how o ften to back up data a nd set the retention rule. At the first t im e a full backup will be created. T he next backups w ill be increme ntal. To set up the simple ba ckup scheme, sp ecify the ap propriate sett[...]
-
Page 359
Copyrig ht © A croni s, In c., 200 0 - 20 09 359 • Daily ("Son") ba ck ups are in cremental. Param eters You can set up the followin g parameters of a Grandfat her - Father - Son (GFS) scheme. Start bac kup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifie s the days on which t o perform a backup[...]
-
Page 360
360 Copyrig ht © A croni s, In c., 200 0 - 20 09 Backup s cheme parameters ca n then be set up as fo llows. • Start backu p at: 11:00 PM • Back up o n: All days • Weekly /monthly : Saturday (for e xample) • Keep ba ckups: o Daily: 1 week o Weekly: 1 mont h o Monthl y: indefin ite ly As a result, an archive of daily, weekly, and monthly bac[...]
-
Page 361
Copyrig ht © A croni s, In c., 200 0 - 20 09 361 • Track changes to the fin ancial statement s, spreadsheets, etc. per formed on Tuesd ays and Thursdays (daily increment al backup). • Have a weekly summary o f file changes since last m onth (Friday weekly differenti al backup). • Have a monthly full backup of your files. Moreover , assum e t[...]
-
Page 362
362 Copyrig ht © A croni s, In c., 200 0 - 20 09 • One backup of each level is sto red at a time • Higher density of mo re recent back ups Param eters You can set up the followin g parameters of a T ower of Hanoi schem e. Schedule Se t up a daily ( p. 163 ), wee kly ( p. 165 ), or mo nthly ( p. 1 67 ) sche dule. Setti ng up schedule parameters[...]
-
Page 363
Copyrig ht © A croni s, In c., 200 0 - 20 09 363 Roll - back peri od T he number of days we can go back in the archive is different on different days. The minimum number of days we are g uaranteed to have is call ed the roll - back period. The following table shows f ull backup and roll - back periods f or schemes of various levels. Number of lev [...]
-
Page 364
364 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.7 .6. Custom back up sche me At a glan ce • Custom schedule and co nditions for backups of eac h type • Custom schedule and r etention rul es Param eters Para met er Mean ing Fu ll bac kup Spec ifies on w hat sc hedule a nd under which c onditions to pe rform a f ull backup. For ex ample, th[...]
-
Page 365
Copyrig ht © A croni s, In c., 200 0 - 20 09 365 might e nd up with no backups if the prog ram is not able to create the new backup for some rea son. Apply the rules (only if the re tention r ules are set ) Speci fies whe n to apply the retenti on ru les ( p. 39 ). For ex ample, the cleanup pr ocedure can be set up to run af ter each back up, and [...]
-
Page 366
366 Copyrig ht © A croni s, In c., 200 0 - 20 09 Monthly full, we ekly di fferential, a nd daily incre mental backups pl us cleanup This example demonstrates the us e of all options available in the Cus tom scheme. Suppose that we need a sch eme that will produce monthly full backups, w eekly differential backups , and daily i ncrement al backups.[...]
-
Page 367
Copyrig ht © A croni s, In c., 200 0 - 20 09 367 • Full backup, runs every Frid ay at 10:00 PM • Incremen tal backup, runs manually • Differential backup, runs manually You can r un any o f these backup tasks b y selec ting i t from the list of tas ks in the Backup plans and tasks section in th e left pane. If you have also speci fied the re[...]
-
Page 368
Copyrig ht © A croni s, In c., 200 0 - 20 09 368 Glossa ry A Acronis A ctive Resto re The Acronis proprietary technology that brings a system online immediatel y after the system recover y is start ed. The sys tem boots fr om the backup ( p. 374 ) and th e machine b ecome s operat ional and ready to provide necessary services. The data required to[...]
-
Page 369
Copyrig ht © A croni s, In c., 200 0 - 20 09 369 Agent (Acro nis Bac kup & Reco very 10 Age nt) An applicat ion t hat perf orms dat a backup an d recovery and enabl es ot her manageme nt operat ions on the machi ne ( p. 377 ), such as task manage m ent and operations with hard disks. The type o f data tha t can be backed up depen ds on the age[...]
-
Page 370
370 Copyrig ht © A croni s, In c., 200 0 - 20 09 Backup o ptions Configuration parameters of a backup o peratio n ( p. 369 ) , such as pre/pos t backup co mmands, maximum ne twork bandwidth a llot ted for the backup st ream or data compressio n level. Back up options are a part of a backup plan ( p. 370 ). Back up pl an (Pl an) A set o f rules tha[...]
-
Page 371
Copyrig ht © A croni s, In c., 200 0 - 20 09 371 3. The mana gement server deploys the policy t o the ma chin es. 4. On e ach mac hine, the ag ent ( p. 3 69 ) installed on the machine finds data items using the selection rules. For example, if the s e lection rule is [All volumes ], the entire machine will b e backed up. 5. On ea ch machine, the a[...]
-
Page 372
372 Copyrig ht © A croni s, In c., 200 0 - 20 09 A management server has two built - in gr oups that contain all machines of each type: All phys ic al machine s ( p. 378 ), All virtual machines ( p. 381 ). Built - in groups cannot be delete d, moved to other groups or ma nually modif ied. Cust om gro ups cannot be created w ithin built - in gro up[...]
-
Page 373
Copyrig ht © A croni s, In c., 200 0 - 20 09 373 On a mach ine tha t is not reg istered on the man agem ent server, a user having the pri vilege to back up to the centralized vault can do so by specify ing the full path to the vault. If the vault is managed, the user's archives will be man aged by the storage node as well as other archives st[...]
-
Page 374
374 Copyrig ht © A croni s, In c., 200 0 - 20 09 Differ ential backup A differential backup stores chang es to the data ag ainst the latest full backup ( p. 377 ) . You need access to the corresponding full backup to recover the data from a differential ba c kup. Direc t manag ement Any m anagement o perat ion that is per formed on a manage d mach[...]
-
Page 375
Copyrig ht © A croni s, In c., 200 0 - 20 09 375 and the foreign disks so that they form a single entity. A foreign gr oup is imported as is (will have th e original name) if no disk gr o up exists on the machine. For more information about disk groups please refer to the following M icro soft knowl edge base article: 222189 Description of Disk Gr[...]
-
Page 376
376 Copyrig ht © A croni s, In c., 200 0 - 20 09 • IP address range. A machine remains in a d ynamic group as l ong as the mach ine mee ts the group 's criteria . The machine is removed from t he gro up automatically as s o on as • the machine' s properti es chang e so that the machine does n ot meet the criteri a anym o re OR • th[...]
-
Page 377
Copyrig ht © A croni s, In c., 200 0 - 20 09 377 F Full back up A self - sufficient backup ( p. 3 69 ) containing all data chosen for b ackup. You do not need access to any othe r backup to recove r the data from a ful l backup. G GFS (Grand fathe r - Father - Son) A popular backup sc heme ( p. 371 ) aimed to maintain the optimal balance between a[...]
-
Page 378
378 Copyrig ht © A croni s, In c., 200 0 - 20 09 Man ag ed vaul t A centralized vault ( p. 372 ) managed by a storag e node ( p. 379 ). Ar c hiv es ( p. 3 69 ) in a managed vault can be accessed as follows : bsp:// node_addres s/vault_name/ archive_ name/ Physically, managed vaults can reside on a netw ork share, SAN, NAS, on a hard drive local to[...]
-
Page 379
Copyrig ht © A croni s, In c., 200 0 - 20 09 379 Plan See Backup pla n ( p. 37 0 ). Policy See Backup policy ( p. 370 ). R Recovery point Date and t ime to which t he backed up data can be revert ed to . Regi stered machine A m achine ( p. 3 77 ) managed by a management s erver ( p. 3 78 ). A m achine can be regis tered on o nly one manag emen t s[...]
-
Page 380
380 Copyrig ht © A croni s, In c., 200 0 - 20 09 • preve nt access to the ba ckup archives , even in case the sto rage medium i s stolen or acces sed by a malefactor, by using encrypted vaul ts ( p. 37 6 ). Stora ge node - side cleanup Cleanup ( p. 373 ) pe rfo rm ed b y a storage node ( p . 379 ) accor ding to the backup plans ( p. 370 ) t hat [...]
-
Page 381
Copyrig ht © A croni s, In c., 200 0 - 20 09 381 U Univers al Resto re (A cronis B ackup & Reco very 10 Uni versal Re store) The Acro nis pro prietary techno logy that helps bo ot up Windo ws o n di ssimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start - up[...]
-
Page 382
382 Copyrig ht © A croni s, In c., 200 0 - 20 09 Virtual mach ine On Acronis Backup & Rec overy 10 Manage ment Server, a machine ( p. 377 ) is considered virtua l if it can be bac ked up from the vir tualizat ion host witho ut install ing an agent ( p. 3 69 ) o n the machine. A virtual machine appears on the management server after registratio[...]
-
Page 383
Index A A policy on a machine or a group • 57 About Windows loaders • 232 Access credentials • 238, 239 Access credentials for archive location • 194, 201 Access credentials for destination • 215, 226, 243, 247 Access credentials for location • 215, 219, 347, 356 Access credentials for source • 194, 198, 234, 237, 243, 245, 347, 354 A[...]
-
Page 384
384 Copyright © Acr onis , In c., 2000 - 2009 At W ind ows Event Log ev ent • 171 Attaching a managed vault • 127, 131 B Back up later scheme • 202, 357 Back up now scheme • 202, 357 Backing up dynamic volumes ( W i ndows) • 41, 214 Backing up to tape library • 136 Backup • 25, 29, 369, 37 3, 374, 376, 377, 381 Bac kup archive (Archi[...]
-
Page 385
Copyrig ht © A croni s, In c., 200 0 - 20 09 385 Components for centralized management • 19 Compression level • 91, 100 Condition s • 108, 173 Configuring Acronis Backup & Recov ery 10 components • 330 Configuring communication settings • 74, 75, 78 Configuring iSCSI and NDAS dev ices • 262 Connecting to a machine booted f rom medi[...]
-
Page 386
386 Copyright © Acr onis , In c., 2000 - 2009 Drivers for Universal Restore • 254, 257 Dual destination • 46, 92, 108 Dynamic disk • 41, 368, 374, 375, 376 Dynamic group • 372, 37 5 Dynamic volume • 41, 37 1, 376 E Editing custom groups • 306, 309 E- mail • 92, 102, 115, 117 Encrypted archive • 376 Encrypted vault • 315, 376, 380[...]
-
Page 387
Copyrig ht © A croni s, In c., 200 0 - 20 09 387 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 134, 137, 154 Items to back up • 194, 1 97, 347, 349 K Kernel parameters • 254, 255 L Labeling • 137, 138 License Server • 21 Limitations • 133 Linux - based bootable media • 253, 254, 262, 268 List o f commands and ut[...]
-
Page 388
388 Copyright © Acr onis , In c., 2000 - 2009 Organizational unit criterion • 85, 307, 308 Overview • 64, 113, 124, 128, 132, 315 Overwriting • 226 Owners and credentials • 31, 155, 217, 235, 244, 324 P Parameters set through administrative template • 33 0 Parameters set through GUI • 345 Parameters set through Windows re gistry • 34[...]
-
Page 389
Copyrig ht © A croni s, In c., 200 0 - 20 09 389 Running Acronis Disk Director Lite • 270 S Scheduling • 108, 162, 2 03, 212, 237, 358, 367 Secure communication • 74 Select destination disks • 280, 281 Select the type of volum e being created • 280, 281 Selecting a host that w ill perform conversion • 196, 213, 348, 349 Sel ecting disk[...]