Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u manual
- Read online or download the manual
- 410 pages
- N/A
Go to page of
Similar user manuals
-
Backup Software
Acronis True Image Unlimited 2015
19 pages -
Backup Software
Acronis True Image 2015
19 pages -
Backup Software
Acronis True Image 2016
161 pages -
Backup Software
Acronis True Image Home 2011 Netbook Edition
166 pages -
Backup Software
Acronis Backup & Recovery 10 Workstation
241 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Workstation Universal Restore
241 pages -
Backup Software
Acronis Backup & Recovery 10
401 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u
410 pages
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u should contain:
- informations concerning technical data of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u
- name of the manufacturer and a year of construction of the Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u item
- rules of operation, control and maintenance of the Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Acronis service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 A d v a n c e d S e r v e r User's Guide[...]
-
Page 2
Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc. Linux is a registered[...]
-
Page 3
Table of contents 1 Introducing Acro nis® Back up & Recover y™ 10 ........................................................................ 8 1.1 Acronis Backup & Rec overy 10 overview .................................................................................. 8 1.2 Getting started ..................................................[...]
-
Page 4
2. 14 .4 Po li cie s o n m ac hin es and gr oup s ................................................................................................................. 64 2. 14 .5 B ac kup po li cy's st ate an d s ta tuse s ............................................................................................................... 68 2. 14 .6 D[...]
-
Page 5
5.7 Conditions ................................................................ .............................................................. 179 5. 7. 1 Us er is i dle ................................ .................................................................................................................... 180 5. 7. 2 Lo ca ti on' [...]
-
Page 6
6. 7. 1 T ask c re dent ia ls ........................................................................................................................................... 25 4 6. 7. 2 Ar ch ive se lec ti on ......................................................................................................................................... 25 5 6[...]
-
Page 7
8. 1. 1 Wh at is Ac ron is Ba c ku p & Re cov er y 10 O nli ne? ....................................................................................... 379 8. 1. 2 Wh at da ta ca n I b ack up a nd r ec ov er? ...................................................................................................... 380 8. 1. 3 Ho w lon g w ill my b [...]
-
Page 8
8 Copyright © Acronis, Inc., 2000 - 2010 1 I ntr od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba cku p & R eco ve ry 10 o ver vie w Based on Acronis’ paten ted disk imaging and bare metal restore techn o logies, Acr o nis Backup & Recovery 10 succe eds Acronis True Image Echo as th e next generation disast er re[...]
-
Page 9
9 Copyright © Acronis, Inc., 2000 - 2010 Controlling user righ ts to p erform operations and access backups Running services wi th minimal user rights Restricted rem ote access t o a backup agen t Secure communica tio n bet ween the product components Using third-party c ertificates for authenticati on of the compon ents Data encryption options fo[...]
-
Page 10
10 Copyright © Acronis, Inc., 2000 - 2010 4. Start the consol e. Create the bootable media. 5. Connect the cons ole to the manage m ent ser v er. The simplified w ay of cent ralized management Backup Using the Back up c o ntrol, select the ma chine which y o u want t o back up and then create a backup plan (p. 400) on th e machine. You can cre[...]
-
Page 11
11 Copyright © Acronis, Inc., 2000 - 2010 Creating a backup policy rather than ba c kup plans Set up a centralized bac kup policy and apply it to th e All machines group . This way you will deploy backup plans on each machine with a single action. S elec t Actions > Create b ackup po li cy from the top menu and then ref er to the context he[...]
-
Page 12
12 Copyright © Acronis, Inc., 2000 - 2010 Key elements of the console wo rkspace Na me D esc rip tio n Navigation pane Contains the Navigation tree and th e Shortcuts bar and lets you navigate to the different views (see the Navigation pan e (p. 12 ) section. ) Actions and tools pane Contains bars with a s et of actions that can be performed and t[...]
-
Page 13
13 Copyright © Acronis, Inc., 2000 - 2010 [Management ser v er nam e] . Root of the tree also called a Welcome view. Displays th e name of the manage m ent server the console is currently c onnected to. Use this view f or quick access to the main operati ons, available on the manage ment server. Dashboard . Use this v iew to estimate at a [...]
-
Page 14
14 Copyright © Acronis, Inc., 2000 - 2010 actions bar will b e named a s 'System ba c kup' action s and will hav e the set of actions typical t o backup plans. All actions can als o be acc essed in the respective men u items. A menu item appe ars o n the m enu bar when you select an it em in any of the navigati o n views . Examples of &q[...]
-
Page 15
15 Copyright © Acronis, Inc., 2000 - 2010 Help Contains a list of help to pics. Differ ent views and action pag es of Acronis Bac kup & Recovery 10 provided with lis ts of specif ic help topics. 1. 2. 1.3 Op er at io ns wi th pa ne s H ow t o e xp and /m inim iz e p an es By default, the Na vigation pane appears expanded an d the Actions and T[...]
-
Page 16
16 Copyright © Acronis, Inc., 2000 - 2010 "Tasks" view Common way of worki ng with views Generally, ever y view con tains a table of items, a tabl e toolbar with buttons, and the Information panel. Use filtering and sorting cap abilities to search the table for t he ite m in ques tio n In the table, sel ect the de sired item [...]
-
Page 17
17 Copyright © Acronis, Inc., 2000 - 2010 Action page - Create backup plan Using controls and specifying s ettings The action pages off er tw o ways of r epresentation: ba sic and advanced. The basic repr esentation hides such fields as cr edentials, comments, etc. When the advanced representa tion is enabled, all the available fields are disp lay[...]
-
Page 18
18 Copyright © Acronis, Inc., 2000 - 2010 Navigation butto ns 1. 3 Ac ron is Ba cku p & R eco ve ry 1 0 c om po ne nt s This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionali ty . Acronis Backup & Rec overy 10 includes the f o llowing main types of components. Componen[...]
-
Page 19
19 Copyright © Acronis, Inc., 2000 - 2010 File backup File -level data protecti o n is based on backing up files and folders r esiding on the machine wher e the agent is installed or o n a ne tw ork shar e. Files can be recovered to their o riginal l ocation or to another place. It is possible to recover all files and folders t hat wer e backed up[...]
-
Page 20
20 Copyright © Acronis, Inc., 2000 - 2010 recovered to th eir original location or to another place. It is possible to recover all files and directories that w ere backed up or select which of them to recover. 1. 3. 2.1 D edu pl ic at ion This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery[...]
-
Page 21
21 Copyright © Acronis, Inc., 2000 - 2010 VMware vCenter integ ration This feature provides the capability to view vir tual machines managed by a VMware vCenter Server in the manage m ent ser v er GUI, vi ew the backup statu s of these machines in the vCenter, and automatically regis ter virtual machines cr eated by Acronis Bac kup & Recovery [...]
-
Page 22
22 Copyright © Acronis, Inc., 2000 - 2010 Deduplication A managed vault can be configured as a deduplicating vault. This means that iden tical data will be backed up to this vault o nl y once to min imize th e network usage durin g backup and storage space taken by the archiv es. For more information, please see the "Deduplication (p. 71 )&qu[...]
-
Page 23
23 Copyright © Acronis, Inc., 2000 - 2010 The media builder that installs on Windows can creat e bootable media based o n either Windows Preinstallation Envir onment, or Linux kernel. The Univ ersal Restore (p. 19 ) add-on enables you to create bootable m edia with t he restore to dissi milar hardware functionalit y. Universal Restore handles diff[...]
-
Page 24
24 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 - the Stand ard, Enterprise, Small Busin ess Server , Fo undati o n editions (x86, x64) Windows Server 2 008 R2 - the Standard, Enterprise, S mall Business Ser v er, Datac enter, Foundation editions Windows MultiP o int Server 20 10 Acronis Backup & Recove ry 10 Managem[...]
-
Page 25
25 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 - the Stand ard, Enterprise, Small Busin ess Server , Fo undati o n editions (x86, x64) Windows Server 2 008 R2 - the Standard, Enterprise, S mall Business Ser v er, Datac enter, Foundation editions Windows MultiP o int Serve r 2 010 Acronis Backup & Recove ry 10 Agent [...]
-
Page 26
26 Copyright © Acronis, Inc., 2000 - 2010 Management Console 30 MB 950 MB 450 MB Screen resolution 1024*768 pixels or higher Management Server 40 MB 250 MB 400 MB for SQL Express Server 250 MB 400 MB for SQL Express Server Wake- on -LAN Proxy Negligible 30 MB 5 MB Storage Node 100 MB 150 MB 150 MB When using a tap e library, space required for tap[...]
-
Page 27
27 Copyright © Acronis, Inc., 2000 - 2010 2 Un de rs ta n din g Acr on is B ack up & Re co ver y 10 This section attempts to give its readers a clear under standing of the product so that t hey can use the product in vari ous circumstanc es without step- by -step instructions. 2. 1 Ba sic co nc ept s Please familiariz e yo urs elf with the bas[...]
-
Page 28
28 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates the notions discuss ed above. For more definiti ons please refer to the Glossary.[...]
-
Page 29
29 Copyright © Acronis, Inc., 2000 - 2010 Backup using bootable media You can boot the m achine u sing the bootable media, configure the backup operation in the same way as a simple backup plan and execute the o peratio n. This will help you extract files and l ogical volumes from a sy stem that failed to boot, take an image of the offline syste m[...]
-
Page 30
30 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates data recovery und er the operating system (online). No bac kup can proceed on the machin e while the recovery opera tion is taking place. If requ ired, you can connect the console to an o ther ma chine and configure a recover y o perati o n on that m achin e. T his abilit[...]
-
Page 31
31 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to rec ov er dat a to bare metal, you boot th e machine using the bootable media and config ure the recovery operation in the sa me way as the recovery task . The following diagram illustrates the recovery using the bootable media. 2. 2 Us er pri vi leg es on a ma [...]
-
Page 32
32 Copyright © Acronis, Inc., 2000 - 2010 Members of the Ad ministrators group also can : View and manage ba ckup plans and tasks owned b y any user o n the m achine. Linux When managing a machine running Linux, the user ha s o r obtains the r oot privileges, and so can : Back up and recover any data or the entire machine, having full cont[...]
-
Page 33
33 Copyright © Acronis, Inc., 2000 - 2010 Manual start You can skip the P l an's (Ta sk) cr edentia ls step. Every time you start th e task, th e task will run under the credentials with which you are currently l o gged on. Any person that has ad ministrative privil eges on the machine can al so start the task. The task will run under this pe[...]
-
Page 34
34 Copyright © Acronis, Inc., 2000 - 2010 you need to roll bac k the system to its initial st ate this initial state d o es not c hange often, so there is no n ee d for regular backup. Example: An Internet cafe, school or university lab where the administrat or often undoes change s made by the student s o r g uests but rarely updates the [...]
-
Page 35
35 Copyright © Acronis, Inc., 2000 - 2010 Recovery time Minimal Medium Maximal 2. 5 GF S b ac ku p s ch eme This section covers im plem entation of the Grandfather-Father-Son (GFS) backup scheme in Acronis Backup & Recover y 10. With this backup sche me you are not allowed to ba ck up more often than once a day. The scheme enables you to mar k[...]
-
Page 36
36 Copyright © Acronis, Inc., 2000 - 2010 Weekly/Monthl y This step forms the dail y, weekly and monthly c y cles in the schedule. Select a day of the we ek fr o m the da y s selec ted in the previous ste p. Each 1 st, 2nd and 3rd backup created o n this day o f the week will be considered as a we ek ly backup . Each 4th backup created on this day[...]
-
Page 37
37 Copyright © Acronis, Inc., 2000 - 2010 backups’ retenti o n peri od cannot be less than the weekly backups’ retenti o n peri od. It is usually set several time s lo nger. You have the o ption t o keep th e monthly backups ind efinitely. The resulting archive: i deal Assume you sel ect to keep daily backups for 7 days, weekly backup s for 2 [...]
-
Page 38
38 Copyright © Acronis, Inc., 2000 - 2010 The resulting archive: real In reality, the arch ive content will somewhat diff er from the ideal sche me. When using the incre mental and differential backup methods, you cannot delet e a backup as soon as the scheme requires if later backups are based o n this backup . Regular consolidation is unacc epta[...]
-
Page 39
39 Copyright © Acronis, Inc., 2000 - 2010 2. 6 To wer o f H ano i bac ku p s ch em e The need to have frequ ent backups always conflicts wi th the cost of keeping such backups for a long time. The Tower o f Hanoi ( To H) backup sche me is a useful compr o mise. Tower of Hanoi overvi ew The Tower of Hanoi scheme is based on a mathe matical puzzle o[...]
-
Page 40
40 Copyright © Acronis, Inc., 2000 - 2010 Tower of Hanoi by Acroni s The Tower of Hanoi backup scheme is generall y too complex to mentall y calculate the next medi a to be used. But Acronis Backup & Recovery 10 pro v ides y o u with automa tion of the scheme usage. You can set up the backup scheme while creating a backup plan. Acronis imple m[...]
-
Page 41
41 Copyright © Acronis, Inc., 2000 - 2010 For information ab out using Tower of Hanoi f o r tape li braries, see Using the Tower of Hanoi tape rotation scheme (p. 1 55 ). 2. 7 Re ten tio n rul es The backups produced b y a backup plan make an archi v e. The t wo retention rules described in this section enable y o u to li m it the archi v e size a[...]
-
Page 42
42 Copyright © Acronis, Inc., 2000 - 2010 There is a certain ris k that all but one backup will be deleted if the maximu m archive size is set improperly (too small) or a regular backup turns o ut to be t o o large. To pr otect the recent backups from deletion, sele ct the Never delete ba c kups young er than check box and specify the maximu m age[...]
-
Page 43
43 Copyright © Acronis, Inc., 2000 - 2010 Retain the backup until all dependent backups become sub j ect to de letion The outdated backup w ill b e kept until all bac kups that depend on it also b ecome outdated. Then all the chain will be d eleted at once during the reg ular cleanup . This mode helps to avoid the potentially time-consu ming c[...]
-
Page 44
44 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 can back up and recover dynami c volumes and, with min o r limitati o ns, basic GPT volumes. Backing up dynamic v olumes Dynamic and basi c GPT v o lumes are bac ked up in the same way as basic MBR v olumes. When creating a backup pla n through the GUI, all typ es of volum[...]
-
Page 45
45 Copyright © Acronis, Inc., 2000 - 2010 Ba ck ed up (so ur ce) : Re cov er ed to: Dy na mic vo lu me Ba si c M BR vol um e Ba si c G PT vol um e Dy na mic vo lu me Dynamic volume Type as of the target Dynamic volume Type as of the target Dynamic volume Type as of the target U na ll oc ate d s pa ce (d is k g ro up ) Dynamic volume Type as of th [...]
-
Page 46
46 Copyright © Acronis, Inc., 2000 - 2010 Backup (GUI) In Acronis Backup & Re cov ery 10 GUI, logical volume s appear under Dynamic & GPT Vo l umes at th e end of the list of v o lumes a v ailable for bac kup. To back up all availab le disks, specif y all logical volumes plus basic volumes not belonging to them. This is the default choic e[...]
-
Page 47
47 Copyright © Acronis, Inc., 2000 - 2010 When recovering MD devices under bootab le media, t he structure of MD devices c an be automatically cr eat ed if it h as been saved in the backup (p. 47 ). For detailed infor mation about recovering MD de vices under bootable media, s ee Recovering MD de v ices and logical volumes (p. 274 ). For informati[...]
-
Page 48
48 Copyright © Acronis, Inc., 2000 - 2010 Num Partition Fla gs Start Size Ty pe ---- -------------------- -------- --- ---------- ---------- -------- --- Disk 1 (sda): 1-1 sd a1 Pri,Act 63 208813 E xt2 1-2 sd a2 Pri 417690 1228972 5 ReiserFS 1-3 sd a3 Pri 24997140 1 052257 Linux Swap Unallocated 27101655 26 98920 Unallocated 1-4 Ac ronis Secure Zo[...]
-
Page 49
49 Copyright © Acronis, Inc., 2000 - 2010 2. 11 Ta pe s upp or t Acronis Backup & Rec overy 10 supports tape libraries, autoload ers, SCSI and USB tape drives as storage devices. A t ape dev ice can be locall y attach ed to a managed machine (in this case, the Acronis Backup & Rec overy 10 Agent writes and re ads the tapes) o r access ed t[...]
-
Page 50
50 Copyright © Acronis, Inc., 2000 - 2010 Backup to a locally attached tape device When creating a bac kup plan, you are able to selec t the locally attached tape d evice as the backup destination. An arch ive name i s not needed when backing up to a tape. An archive can span multiple tapes but can contain only one full backup and an unlimited num[...]
-
Page 51
51 Copyright © Acronis, Inc., 2000 - 2010 The value may be "In forma tio n", "Warnin g", 'Error" and "Unkno wn". "Unknown" is sent only in the test message. Text description o f the e vent Object identifier (OID): 1.3.6.1.4. 1 .24769. 100.200.2.0 Syntax: OctetString The value contains the text [...]
-
Page 52
52 Copyright © Acronis, Inc., 2000 - 2010 Should the disk exp erience a physical failur e, the zone and the archives located th ere will be lost. That's why Acr onis Secure Zone sh ould not be the only locati on w here a ba ckup is stored. In enterprise envir o nments, Acronis Secure Zone can be thought of as an inter m ediate l o cation used[...]
-
Page 53
53 Copyright © Acronis, Inc., 2000 - 2010 to start the bootabl e rescue utili ty . This f eature has the trade name "Acr onis Startup Recovery Manager". Acronis Startup Rec overy Manager is especially us eful for mobile users. If a failur e occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup R eco[...]
-
Page 54
54 Copyright © Acronis, Inc., 2000 - 2010 The Universal Rest o re techn o logy provid es an efficient soluti on for hardware-independent s y stem recovery by replacing t he c rucial Hardware Abstractio n Layer (HAL) and mass storage device drivers. Universal Restor e is applica ble for: 1. Instant recover y of a fail ed syst em on diff erent hardw[...]
-
Page 55
55 Copyright © Acronis, Inc., 2000 - 2010 Getting Universal Restore Universal Restor e comes fr ee with Acronis Backup & R e covery 10 Ad v anced Serv er SBS Edition and Acronis Backup & Rec overy 10 Advanced Ser v er Virtual Edition. Universal Restor e for the other product editions is purchased separa tely, has its own license , and is i[...]
-
Page 56
56 Copyright © Acronis, Inc., 2000 - 2010 multimedia files. So me of these storage volu mes can be extremely large a s compared to the system and so practicall y all the recovery tim e will be dedicated to recovering th e files, which might be used m uch later on, if in any near future at al l. If you opt for Acronis Active Restore, the s y stem w[...]
-
Page 57
57 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 4 . 1 B a s i c c o nc e p t s Applying backup policies and tracking their execution To protect data o n a single machine, you install on the machine an agent (p. 399) or multiple agents for various data types you want to protect. You c o nnect the co nsole to t he machine and create a backup plan (p[...]
-
Page 58
58 Copyright © Acronis, Inc., 2000 - 2010 More than one st orage node, each managing a nu mber of vaults, can b e set up and controlled centrally from the Acr onis Backup & Recovery 10 M anag em ent Ser v er. For more detailed in formation about storage n odes please refer to Acronis Backup & Reco v ery 10 Storage Node (p. 21 ). 2 . 1 4 . [...]
-
Page 59
59 Copyright © Acronis, Inc., 2000 - 2010 When installing the agents, register each of the m achin es on the management server. To do so, enter the server's n ame or IP address and the ser ver's administrator credentials in the appropriate wind ow of the installation wizard. Or, alternativel y, add the machines to the management ser v er[...]
-
Page 60
60 Copyright © Acronis, Inc., 2000 - 2010 2. Create a static gr o up name d, say, S_1. Add all the servers t o this group . (A storage node can be added in case the m anaged v ault is not on the local n ode's drives. Otherwise the arch ive st o rage will be backed up t o itself). 3. Apply the policy t o the S_1 group. Make sure that the po li[...]
-
Page 61
61 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 2. 3 P rot ec tin g th e vir tu al ma ch in es Acronis Backup & Rec overy 10 Agent for ESX/ES Xi prov ides the flexibilit y to protect virtual machines in multiple ways: Connect the cons ole to the virtual applian ce (Agent for ESX/ESXi) and create a backup pla n that will back up all or som[...]
-
Page 62
62 Copyright © Acronis, Inc., 2000 - 2010 IP address range. Multiple criteria can be specified for a dyna m ic group . For example, a set o f criteri a "OS equals Windows 2000, OS equals Windows 2003, OU equals Accounting” is interpreted as "all machines running Wind o ws 2000 or Win do ws 200 3 and bel o ngi ng to the Acc o unting[...]
-
Page 63
63 Copyright © Acronis, Inc., 2000 - 2010 3, 4, 5, 6 - the sales men's machines (Windows XP) from the "Sales depart m ent" AD organization unit. An example of group hierarchy The backup policy on the server has to differ fr om that on the wo rkstati ons. The administrat or creates the G1 dyna mic group that contains machines with th[...]
-
Page 64
64 Copyright © Acronis, Inc., 2000 - 2010 edit a group, that is: change the group nam e change the group descrip tion change the dynami c membership criteria transform a stati c group into a d ynamic one by adding membership c riteria transform a dyna mic group into a static one with two optio ns: keep the group m em be[...]
-
Page 65
65 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 1 A po li cy o n a ma chi ne or a g rou p In the diagrams bel ow, each numbered scheme illus trates the result of the respe ctively numbered action. The container stand s for a group; the colored circle stands for a ma chine with applied policy; th e dark colored circle s tands fo r a m achine wi[...]
-
Page 66
66 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 2 Op er at io ns wi th a ma ch in e This section is a si m plified i llustration of what happens with the policies on a machine when the machine is mo ved, copied, or del eted from a group. In the diagram bel ow, the container stands for a gr oup; the one-color cir cle stands for a machine with o[...]
-
Page 67
67 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 3 In he ri ta nc e o f pol ic ies Policy inheritance can be easily understood if w e assume that a machine can be a memb er of only one group besides t he All machines group. Let's s tart from this simplified app roach. In the diagram bel ow, the container stands for a gr oup; the tw o-color[...]
-
Page 68
68 Copyright © Acronis, Inc., 2000 - 2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1 -> G2 -> #4 G2 -> #4 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines -> #5 o r #6 G1 ->[...]
-
Page 69
69 Copyright © Acronis, Inc., 2000 - 2010 another policy. In this c ase, the first policy's state o n t he m achi ne will be Revoki ng and the sec o nd policy's state will b e Deplo yi ng . The p o licies can app ear in the GUI simultane o usly or on e after another. Backup policy state diagram 2. 14. 5. 2 P oli cy st at us o n a ma ch i[...]
-
Page 70
70 Copyright © Acronis, Inc., 2000 - 2010 The policy gets th e Warnin g status on Windo ws machines that have eithe r a D: or F: volume, unless an event that will r esult in an error occurs. The policy that has to back up the [System] and the / dev/sda1 volumes, will get the Warning status on the Windows machines (sin ce /de v/sda is no t found) a[...]
-
Page 71
71 Copyright © Acronis, Inc., 2000 - 2010 This status is defined as the most severe status o f the policy on the machines inc luded in the group and its child groups. If the policy is currently not appli ed to any machine, its status is "O K". 2. 14. 5. 5 C umu la ti ve st at e a nd st at us o f a po lic y In addition to the depl oyment [...]
-
Page 72
72 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at s our ce Performed on a m anaged m achine during backup. Acronis Backup & Recovery 1 0 Agent uses th e storage node t o determine what data can be deduplicated, and d o es not transfer the data whose duplicates are alread y present in the vault. Deduplication at targ et Performed in th[...]
-
Page 73
73 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at target After backup to a dedu plicating vault is compl et ed, th e storage node runs the inde xing task to deduplicate data in the vault as follows: 1. It moves the items (disk blocks or files) from the archi v es to a spe cial file within the vault, storing duplicate items there o nl y on[...]
-
Page 74
74 Copyright © Acronis, Inc., 2000 - 2010 The deduplicated items tha t have changed ar e not identical anymore and therefore will not be deduplicated. 2. 14. 6. 4 D edu pl ic at ion b est p ra ct ice s Follow these recom mendations when using deduplicat ion: When creating a dedu plicating vault, place the vau l t an d its dedup lication da[...]
-
Page 75
75 Copyright © Acronis, Inc., 2000 - 2010 Similarly, in case o f thre e machines, the ratio beco mes 1.5:1; for four machine s, it is 1.6:1. It approaches 2:1 as more su ch machines are backed up to the sam e vault. This means that you can buy, say, a 10-TB st o rage devic e instead of a 20-TB one. The actual amount o f capa city reduction is infl[...]
-
Page 76
76 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 4 . 7 P r i v i l e g e s f o r c e n t r a l i z e d m a n a ge m e n t This section describes the users' privileges that are required to manage a machin e locally and remotely, to manag e a machine registered o n Acronis Backup & Recovery 10 Man ageme nt Server, and to access and manage Ac[...]
-
Page 77
77 Copyright © Acronis, Inc., 2000 - 2010 2. Click Manage thi s m achine . To a llo w a n on- ro ot us er to st ar t the c on so le As a root user, add t he name o f the n o n-root user w hom you want to allow to s tart the c o nsole, to the file /etc /sudoers — for exa m ple, by usin g the visudo command. Caution: As a result of th is proce[...]
-
Page 78
78 Copyright © Acronis, Inc., 2000 - 2010 Remote connection as a non-root user Since accessing the sy ste m as the r oot user should be restricted, th e root user can create an authentication poli cy to en able remote management under non-root credentials. The following are two examples of such polici es. Note: As a result, the sp ecified non -roo[...]
-
Page 79
79 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 7. 5 A cro ni s s ec ur it y gr ou ps On a machine runnin g Windows, Acronis securi ty gro ups determine who can ma nage the machine remotely and act as Acronis Backup & Recovery 1 0 Man agement Server ad ministrator. These groups are cre ated when Acronis Backup & Recovery 10 Agent s o r Ac[...]
-
Page 80
80 Copyright © Acronis, Inc., 2000 - 2010 Tip: To ensure proper g roup names, you should install Acronis compon ents in a domain controller after you have set up the d omain controller itself. If the compon ents were installed before you se t up the domain c ontroller, create the g roups DCNAME $ Acron is Remote Users and DCNAME $ Acronis Centrali[...]
-
Page 81
81 Copyright © Acronis, Inc., 2000 - 2010 For users whom y o u want t o act as stor age node administrators, add t heir accounts to the Administrators gr o up. For other users, add their user accounts to the Users g roup. Additional right of machine administrators A user who is a m ember of the Administrat ors group on a machine can vie w [...]
-
Page 82
82 Copyright © Acronis, Inc., 2000 - 2010 If you choose t o specify an existin g user acc ount for the man agement server service, this account will be added to the Acron is Centrali zed Admins group au tomatically. If the machine is part of an Active Directory domain, make s ure that the domain's security polici es do not prevent the acc oun[...]
-
Page 83
83 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 8. 2 C lie nt an d s er ve r a ppl ic at ion s There are two sta ke holders of the secure communicati o n process : Client appli cation , or client , is an application that tries to establish connection. Server applicat ion , o r ser ver, is an application to which t he client tri es to conn[...]
-
Page 84
84 Copyright © Acronis, Inc., 2000 - 2010 4. For the new com m unicati on settings to tak e effect, restart all running Acr onis components — preferably, by r est arting Windows. If restart is not p o ssible, m ake sure you do the foll owing: If Acronis Backup & Recove ry 10 Manag ement Console is running , c lose i t and start it again [...]
-
Page 85
85 Copyright © Acronis, Inc., 2000 - 2010 Authentication pa r ameters Selecting the Trust s elf-sig ned certificates check box allows the client to connect to the ser ver applications that use self -sig ned SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 co m ponents — see SSL certificate[...]
-
Page 86
86 Copyright © Acronis, Inc., 2000 - 2010 The use of SSL certificat es is enabled. The server will use SSL certificates if their use is enabled on the cli ent application, and will not us e them otherwise. Always use The use of SSL certificat es is enabled. The connecti o n will b e established o nly if t he use of SSL certificates is enab led on [...]
-
Page 87
87 Copyright © Acronis, Inc., 2000 - 2010 Self-signed cert i ficates , such as ce rtificates auto m atically genera ted during the installation of an Acronis componen t. Non-self-signed c ertificates , such as c ertificat es issued by a third-party Certificat e Authori ty (CA) — for example, by a public CA such as VeriSign ® or Thawte?[...]
-
Page 88
88 Copyright © Acronis, Inc., 2000 - 2010 4. Restart Windows, or restart the runnin g Acronis services. Non -self-signed certificates You have the option to use trusted third-party certificates o r certifica tes created by your organization's CA as an alte rnative to self-signed certificates, by using Acr onis Certificate Command- line Utilit[...]
-
Page 89
89 Copyright © Acronis, Inc., 2000 - 2010 3 O p ti on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is app licable to both stand-alone and a dv anced edi tio ns of Acronis Backup & Rec overy 10. 3. 1 Co nso le op tio ns The console optio[...]
-
Page 90
90 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for all results. To make a settin g fo r each result (successful completion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box. 3 . 1 . 3 T i m e - b as e d al e r t s Last backup This option is effec tive whe n the console is connected to [...]
-
Page 91
91 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backup & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents. The preset is: Sy stem Default font f o r both the menus and the application i[...]
-
Page 92
92 Copyright © Acronis, Inc., 2000 - 2010 This parameter can als o be set by using Acronis Admini strative Template (p. 344 ). 3 . 2 . 3 E v en t t r a c i n g You can configure t he man agement server to log even ts in the Application Event Log of Window s, besides the manag ement server's own log. You can configure t he man agement server t[...]
-
Page 93
93 Copyright © Acronis, Inc., 2000 - 2010 3 . 2 . 4 D o m a i n a c c e s s c r e de n t i a l s This option deter m ines the user name and password th at the managemen t server will use to access the domain. The preset is: N o credential s The management server needs domain access creden tials when working with a dynamic group that is based on th[...]
-
Page 94
94 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 6.1 VM wa re v Cen te r int egr at io n This option defines wh ether to show virtual machines managed by a V M ware vCenter Server in t he management ser v er and show the backup status o f th ese machines in the vCente r. Integration is avail able in all Acronis Backup & Re covery 10 advanced ed[...]
-
Page 95
95 Copyright © Acronis, Inc., 2000 - 2010 Note: Acronis Backup & Recovery 10 Online supports o nly HTTP and HTTPS proxy serve rs. Proxy settings for the agent an d the manage ment ser v er are c o nfigured s eparately, even if both are installed on the s ame mach ine. To s et up pr oxy s er ver se tti ng s 1. Select the Use a pro xy serve r ch[...]
-
Page 96
96 Copyright © Acronis, Inc., 2000 - 2010 3 . 3 . 2 E v en t t r a c i n g It is possible to dupli cate lo g ev ents gene rated by the agent(s), opera ting on the managed machine, in the Applicati o n Event Log o f Windows; o r send the ev ents t o the specified SN MP managers. If you do not modify the event tracing options anywhere except for her[...]
-
Page 97
97 Copyright © Acronis, Inc., 2000 - 2010 You can override the settings set here, exclusivel y for the events that occur du ring backup or during recovery, in the D efault backup and recovery options (p. 99 ). In this ca se, the settings set here will be effective for oper atio ns o ther than backup and recovery, such as archive v alidati o n or c[...]
-
Page 98
98 Copyright © Acronis, Inc., 2000 - 2010 /etc/snmp/snmpd .conf - config uration file for the Ne t -SNMP SN M P agent /etc/snmp/snmptrap d.conf - configuration file fo r the Net -SNMP trap da emon. 3 . 3 . 3 L o g c l e a n u p r u l e s This option specifies h ow to clean up the Acronis Backup & Recovery 10 agent log . This option def[...]
-
Page 99
99 Copyright © Acronis, Inc., 2000 - 2010 If you choose Yes, I want t o participate in the ACEP , informa tio n about the hardware configuration, the most and lea st used features and about any problems will be automatically collected fr om the machine and sent to Acronis on a regular basis. The end results are intended t o provide softwar e impro[...]
-
Page 100
100 Copyright © Acronis, Inc., 2000 - 2010 Pre/Post backup comman ds (p. 103 ) + + + + PE only PE only Pre/Post data capture commands (p. 105 ) + + + + - - Multi-volume snapshot (p. 107 ) + + - - - - File -level backup snap shot (p. 107 ) - + - + - - Use VSS (p. 107) + + - - - - Compression level (p. 108 ) + + + + + + Backup performanc e: Backup p[...]
-
Page 101
101 Copyright © Acronis, Inc., 2000 - 2010 Overwrite data on a t ape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after backup has finished Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media A[...]
-
Page 102
102 Copyright © Acronis, Inc., 2000 - 2010 The AES cryptograp hic algorithm operates in the Ciph er -block chain ing (CBC) mode and uses a randomly generated key with a user-defin ed size of 128, 192 or 256 bits. The larger the key size, the longer it will take fo r the pr ogram to encrypt the archi v e and the more secure your data will b e. The [...]
-
Page 103
103 Copyright © Acronis, Inc., 2000 - 2010 Exclusion examples Cr it eri on Ex am ple D esc rip tio n Wi nd ows an d L in ux By name F.log F Excludes all files named "F.lo g" Excludes all folders nam ed "F" By mask (*) *.log F* Excludes all files with th e .log extension Excludes all files and folder s with names starting w ith [...]
-
Page 104
104 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y p re/ po st co mma nds 1. Enable pre/post c o mmand s execution by checking the foll owing options: Execute before the ba c kup Execute after the backup 2. Do any of the f ollowing: Click Edit to specify a new command or a batch fil e Select the existing c ommand or the batch[...]
-
Page 105
105 Copyright © Acronis, Inc., 2000 - 2010 4. If successful execution of the command is critical f or your backup strategy, sel ect the Fail the task if the comman d execution fails check box. In case the command execution fa ils, the program will rem ove the resulting TIB file and temporary files if possible, and the task will fail. When the chec[...]
-
Page 106
106 Copyright © Acronis, Inc., 2000 - 2010 4. Depending on the r esult you want to obtain, select th e appropriate options as d escribed in the table below. 5. Click Test command t o che ck if the command is corre ct. Ch ec k b ox S ele cti on Fail the backup t ask if the command e xecution fails Selected Cleared Selected Cleared Do not perform th[...]
-
Page 107
107 Copyright © Acronis, Inc., 2000 - 2010 fails. 3. 4. 1.5 Fi le -le ve l b ac ku p sn ap sh ot This option is effec tive only for fil e -level bac kup in Windows and Linux operating systems. This option defines wh ether to back up files one by o ne or by taking an instant data snapshot. Note: Files that are stored o n network shares are al ways [...]
-
Page 108
108 Copyright © Acronis, Inc., 2000 - 2010 transactions, at the moment of taking the data snaps hot by Acronis Backup & Recover y 10. Data consistency, in turn, ensur es that the application will be recovered in the correct state and become operational im m ediately af ter recovery. The preset is: Crea te snapsh ots using VSS Acronis Backup &a[...]
-
Page 109
109 Copyright © Acronis, Inc., 2000 - 2010 Maximum – the da ta will be c om pressed a s much as possible. The backup duration will be maximal. You ma y w ant t o select maximum co mpression when backing up to removable m edia to reduce the numb er of blank disks required. 3. 4. 1.9 Ba cku p per fo rm an ce Use this group of options to spe ci[...]
-
Page 110
110 Copyright © Acronis, Inc., 2000 - 2010 Click Writing speed stated in kilobytes per s econ d , and then enter the w ritin g speed in kilobytes per second. Ne tw or k co nn ec ti on s pe ed This option is effec tive for Win do ws and Linu x operating sy stems and bootable media. This option is available when a location on the n et work (net [...]
-
Page 111
111 Copyright © Acronis, Inc., 2000 - 2010 4. For the e-mail message to inclu de the log entries related to the backup, s elect the Add full log to the notification chec k box. 5. Click Additional e-ma il parameters , to configure add itional e-mail parameters as follows, then click OK : From - type the e-mail address of the user from who m th[...]
-
Page 112
112 Copyright © Acronis, Inc., 2000 - 2010 The When user intera ction is required check box – to send notific atio n du ring the operation when user interac tio n is re quired – is always selected. Click Send test W inPopup message to check if the s ettings are correct. 3. 4. 1.1 1 Ev en t tra cin g It is possible to dupli cate lo g ev ents o [...]
-
Page 113
113 Copyright © Acronis, Inc., 2000 - 2010 Use the setting set in the Machine options – to use the setting specified for the machin e. For more information refer to Machine options (p. 95 ). Send SNMP no tifi cation s individua lly for backup operation even ts – to send the ev ents of the backup operations to t he s pecified SNMP manag[...]
-
Page 114
114 Copyright © Acronis, Inc., 2000 - 2010 If the destination disk ru ns out of free space while cr eating the backup, the task enters the Need interaction state. Y o u have t he abilit y to free additi onal space and retry the o per ation. If you do so, the resulting backup will be split into the parts created before and after the retry. When[...]
-
Page 115
115 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 1.1 5 M edi a com po ne nt s This option is effec tive for b oth Windows and Linux o perating systems, when the backup destination is removable m edia. When backing up to r emovable media, you can m ake this media work as regular Linux-based bootable media (p. 401) by w riting additi onal components[...]
-
Page 116
116 Copyright © Acronis, Inc., 2000 - 2010 Ignore bad sectors The preset is: Disab l ed . When the option is disab led , t he program will display a pop-up window each ti me it comes across a bad sector and ask f or a user decisi on as to whether to c ontinue or stop the bac kup procedure. In order to back up th e valid information on a rapi dly d[...]
-
Page 117
117 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior in case a backup task is about to st art ( the scheduled time comes or th e event specified in th e schedule occurs), but the c ondition (or any of multiple conditions) is not me t. Fo r mo re inf orm ation o n condi tions please see Scheduling (p. 168) and Co[...]
-
Page 118
118 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior when an y of the ba ckup plan's tasks fails. The preset is no t to restart a fa i led task . The program will tr y to execute the failed task again if you select the Restart a fa iled task check b o x and specify the nu m ber of attempts and the ti me int[...]
-
Page 119
119 Copyright © Acronis, Inc., 2000 - 2010 When this option is enabled, the backups, bel o nging to the policy or plan being created, will be located on a separa te tape set . Other bac kups will not be written to this tape set. If the console is connected to the management serve r The Use a separate ta pe s e t option has more pr ecise definition[...]
-
Page 120
120 Copyright © Acronis, Inc., 2000 - 2010 When starting backup to a non-empty tape in a loc ally attached tape device, the program will warn that you are abou t to lose d ata o n the tape. To disab le this warni ng, select this check b ox. Dismount media after backup has finished This option is effec tive in Wind o ws and Linux o perati ng system[...]
-
Page 121
121 Copyright © Acronis, Inc., 2000 - 2010 For example, if the machine boots from a hard disk drive by default and y o u select this check bo x, the machine will be re started a nd the operating system wi ll start as soon as the bootable agent has finished creating the backup. Deduplicate backup o nly after transferring it to the vault (do not ded[...]
-
Page 122
122 Copyright © Acronis, Inc., 2000 - 2010 You can also cust omize a default option itself by chan ging its value against th e pre-defined one. The new value will be us ed by default in all rec overy tasks you will cr eate later on this machine. To view and change the default recovery options, co nnect th e console to the man aged m achine and the[...]
-
Page 123
123 Copyright © Acronis, Inc., 2000 - 2010 Change SID after reco very Windows recovery - Windows recovery - Windows recovery - Notifications: E-mail (p. 125 ) + + + + - - Win Pop- up (p. 126 ) + + + + - - Event tracing: Windows events log (p. 127 ) + + - - - - SNMP (p. 127 ) + + + + - - 3. 4. 2.1 P re/ Po st c om ma nd s This option is effec tive [...]
-
Page 124
124 Copyright © Acronis, Inc., 2000 - 2010 Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails Selected Cleared Selected Cleared Do not reco ver until the command e xecution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery only after the command is successfully executed. Fail the task if the co[...]
-
Page 125
125 Copyright © Acronis, Inc., 2000 - 2010 Low – to minimize resources taken by the rec overy process, leaving mor e resources to o ther processes running o n the machin e Normal – to run the r ecovery process with n o rmal spe ed, allocating resources on a par with other processes High – to maximiz e the rec o very proc ess spee[...]
-
Page 126
126 Copyright © Acronis, Inc., 2000 - 2010 Some Internet s ervice provid ers require authentication on the incoming mail ser ver before being allowed t o send something . If this is your case, select the Log on to incoming mail server check box to enable a POP s erver and to set up its settings: Incoming mail ser ver (POP) – enter t he n[...]
-
Page 127
127 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ow s e ve nt lo g This option is effec tive only in Win dows operating systems. This option is not avail able when o perating under the bootable media. This option defines wh ether the agent(s) operatin g o n the m anaged m achine ha v e to log events o f the recovery o perations in the Application [...]
-
Page 128
128 Copyright © Acronis, Inc., 2000 - 2010 Community – type th e name of SNMP commun ity to which both the host run ning SNMP management app licatio n a nd the sending machine belong. The typical communit y is "public". Click Send test message to check if t he settings are correct. Do not send S NMP notifica ti ons – to disab[...]
-
Page 129
129 Copyright © Acronis, Inc., 2000 - 2010 Check file system after recovery This option is effec tive only when r ecovering disks or volum es. When operating und er bootabl e media, this option is n ot effective for the N TFS file system. The preset is Disa bled . This option defines wh ether to check the integrit y of th e file system after a dis[...]
-
Page 130
130 Copyright © Acron is, Inc., 2000- 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ea se of use and administra tion, a vault is associated with the archives' metadata. Referring to this metadata ma kes for fas t and convenient operations with archi ves and backups stored in the vault. A vault can be organ ized on [...]
-
Page 131
131 Copyright © Acronis, Inc., 2000 - 2010 Way of working with the "Vaults" view Vaults (on the na v igation p ane) - top elem ent of the vaults t ree. Click this item to display groups of centralized and pers onal vaults. Centralized . This group is available when the c o nsole is connected to a managed machine or to a management s erve[...]
-
Page 132
132 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out privileges depending on the user rights, see the User privileg es o n a st o rage node (p. 80 ) sec tio n. Unmanaged vaults An unmanaged vau lt is a centrali zed vault that is no t managed by a storag e node. To access an unmanaged vault, a us er has to have access pri v ileges for th[...]
-
Page 133
133 Copyright © Acronis, Inc., 2000 - 2010 Related sections: Operations with arch ives st o red in a vault (p. 1 64) Operations with ba ckups (p. 165) Filtering and sortin g archives (p. 167) Bars of the "Actions and tools" pane [Vault Name] The Actions bar is available when clicki ng the vault in the v aults tr ee. Duplicates action[...]
-
Page 134
134 Copyright © Acronis, Inc., 2000 - 2010 Delete a vault 1. Select the vault. 2. Click Delete . You'll be asked whether to ke ep the archives stored in t he vault, or d elete the vault along with all the arch ives. The plans and tasks that use this vault will fail. If you choose to keep th e archives for a managed vault, the vault will be d [...]
-
Page 135
135 Copyright © Acronis, Inc., 2000 - 2010 Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vaul t. Yo u ma y need to enter ac cess crede ntials for the storage node. Path (p. 135) Specify where the v ault will be created. Managed cent ralized vaults can reside o n a network share, SAN, NAS, o r on a ha[...]
-
Page 136
136 Copyright © Acronis, Inc., 2000 - 2010 Va ult d at aba se p ath To s pec if y t he pa th wh ere th e va ult 's d at ab as e w ill be c re ate d 1. In the Local folder s of the s to rage node, select the desired folder o r ent er the full path to the folder in the Path fi eld. To create a new f o lder for the database, click Create fo l de[...]
-
Page 137
137 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 2.2 C rea ti ng a n u nm an age d c en tr al iz ed va ult To c re ate a n unm an age d c en tra li ze d v aul t, pe rfo rm th e fo llo win g s te ps . Vault Name Specify a unique na me for the vault. The creati o n of two centralized v aults with the same name is prohibit ed. Comments Enter the dist[...]
-
Page 138
138 Copyright © Acronis, Inc., 2000 - 2010 To a tta ch a ma nag ed va ult to a s tor ag e no de, p erfo rm t he fo ll ow in g ste ps . Vault Storage node Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vault. Path Specify the path to the loca tio n where the archives are stored. Database pa th Specify a local fold e[...]
-
Page 139
139 Copyright © Acronis, Inc., 2000 - 2010 by different comp o nents of o ther versi o ns of the prod uct by means of Acronis Ba ckup & Recovery 10, see the Tape co m patibility table (p. 49 ) section. Acronis Backup & Rec overy 10 enables you t o set up di stribution of backups by medi a. For example, a separate tape set can be used to b [...]
-
Page 140
140 Copyright © Acronis, Inc., 2000 - 2010 4. A tape with backups w ritte n by the storage node cannot be read on a tape device, locall y attached to a machin e, the agent is installed on, becau se of a difference in tape fo rmat. To g et information about the readability of the archiv es on tapes, written by differ ent components of other version[...]
-
Page 141
141 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 3.5 Ge tt in g sta rt ed wi th a ta pe li br ar y If you have a tap e library devic e attached to a machine with A cro nis Backup & Recovery 10 Storage Node installed, all yo u nee d to do to bac k up onto the tape library is to crea te an archive vault on the device under storage node managemen[...]
-
Page 142
142 Copyright © Acronis, Inc., 2000 - 2010 If the tape barc ode cannot be read, an other T ask s Need I nteraction window as ks you to label a tape. A cti on s on a ta pe li br ary v au lt If a tape library vault is selected o n the Navi gation pane of the console, the Cen tralized vaults page toolbar will contain t he foll owing two actions that [...]
-
Page 143
143 Copyright © Acronis, Inc., 2000 - 2010 To change the set tings of the backup policy/plan to be created click Change… in the Backup options section on the Create b ackup po li cy/plan page. It opens the Backu p options win dow where the Tape support page is contained with the pre-defined values. When backing up to a t ape and the end of the t[...]
-
Page 144
144 Copyright © Acronis, Inc., 2000 - 2010 Any user with access to a managed vault on a tape li brary is able to perform these operati ons. However two or more user s cannot manage a tape lib rary drive simultaneously, because some operations can tak e minutes, hours or even da ys. For example, if a user laun ches a tape library Rescan task, all o[...]
-
Page 145
145 Copyright © Acronis, Inc., 2000 - 2010 L ab el in g When a tape requir ed for data recovery is not found , the Task Need Interaction window will ask the user to bring the tape and insert it into a tape librar y s lo t. So, all the t ape car tridges need a barcode or other readable lab els. If a tape does no t get a label, y o u should define i[...]
-
Page 146
146 Copyright © Acronis, Inc., 2000 - 2010 If you leave this option unchan ged, then the backups, belonging to the p olicy or plan being created, might be written onto tapes containing backups wri tt en by diff erent backup p o lici es and comprising of data from diff erent machines. Similarl y, backups from other policies m ight be written onto t[...]
-
Page 147
147 Copyright © Acronis, Inc., 2000 - 2010 cycle. The same tap e rotation enables you to ge t by wi th the minimum number of c artridges and not to be buried in used tapes. Acronis Backup & Rec overy 10 enables you t o achieve full automation of tape rot atio n whil e backing up onto tape libraries. This section provid es you with useful infor[...]
-
Page 148
148 Copyright © Acronis, Inc., 2000 - 2010 capability of the tape library (number of driv es, loader s, slots and available tapes; capacity of tapes) requirements for perf orming data recovery ( maximal duration) You need to anal y ze every argument that is relevant for y our case and sele ct the main criteria for th e choice. Then choose [...]
-
Page 149
149 Copyright © Acronis, Inc., 2000 - 2010 backup policy/plan s tarts on Wednesday and full back ups should be created on ever y fo urth Frid ay, on Wednesday the firs t backup will be full instead o f an increm enta l one. There are anal y zed exampl es showing how the GFS scheme can be combined with different t ape options in the foll o wing sec[...]
-
Page 150
150 Copyright © Acronis, Inc., 2000 - 2010 The next figure d emonstrates the data backup archive at the moment. The differ ential backup is drawn as a blue rec tangle in the figure. Number 1 in the green rectangle ma rks the incre mental backup created o n Monday of the 1st week of the year. Then the following bac kups are written onto tape 02 : ?[...]
-
Page 151
151 Copyright © Acronis, Inc., 2000 - 2010 Below, the figure sh ows the deleted backup s as actual, bu t demons trate s tape usage during the whole year for the GFS backup scheme in combin ation with the specified tape options. A number in the green rectang le marks an incremental bac kup created on Monday of the c o rrespondin g week of the year.[...]
-
Page 152
152 Copyright © Acronis, Inc., 2000 - 2010 The full backup stor ed on tape 0 1 is deleted afte r the next full backup is cr eated onto both tapes 23 and 24 on Friday of t he 5 2nd week. As all backups of tape 01 have been deleted, the tap e is considered as fr ee and can be reused. Further analysis of t he exa m ple pr oves that the maxi m al nu m[...]
-
Page 153
153 Copyright © Acronis, Inc., 2000 - 2010 If all the backups hav e to be kept during the year, the archive will requir e 28 tapes. As the GFS backup sche me forces automatic del etion of the outdated backup s, on the first Friday of the second year the tapes keep only the backups disp layed in the next figure.[...]
-
Page 154
154 Copyright © Acronis, Inc., 2000 - 2010 This figure dem o nstrates th at the GFS Example 2 tap e rotation scheme is m o re suitable fo r t he case than GFS Example 1 . The a dvantages of the GFS Example 2 tape r o tation s cheme for the anal yzed case are the foll o wing: it uses 16 tapes instead of 25 a data recovery ta sk requ ires o [...]
-
Page 155
155 Copyright © Acronis, Inc., 2000 - 2010 backup deletion fre es a tap e so it can be reused. The main drawbac k is the l arge number of required ta pes that is used 5-10%. If we have to keep a dail y backup for a week ( 4 backups) and a weekly backup fo r a month (4 backups), the total nu mber of required tapes will b e equal to 4+4+13+1 = 2[...]
-
Page 156
156 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 1 Suppose, the backup plan has the following tape opti o ns: the Use a separate ta pe set option is selected the Always use a free tape : For each full backup option is cleared the Always use a free tape : For each incremental bac kup option is cleared the Always use a free [...]
-
Page 157
157 Copyright © Acronis, Inc., 2000 - 2010 five-level sche m e requires up to five tapes for this case. T oH Ex am ple 2 Suppose, the backup plan has the following tape opti o ns: the Use a separate ta pe set option is selected the Always use a free tape : For each full backup option is selected the Always use a free tape : For eac[...]
-
Page 158
158 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 3 Imagine the backup pla n has the following tap e options: the Use a separate ta pe set option is selected the Always use a free tape : For each full backup option is selected the Always use a free tape : For each incremental backup option is sel ected the Always use a free[...]
-
Page 159
159 Copyright © Acronis, Inc., 2000 - 2010 To simplify the tape pla nning lets discard the possibili ty that the calculated tape s might contain backups of other data. I t is implied that the Use a sepa r ate tape set option is enab led. To calculate the nu mber of tapes you should take in to account the following c o nsid erations: full backu[...]
-
Page 160
160 Copyright © Acronis, Inc., 2000 - 2010 Total number of req uired tapes = r ound up ((2*F_GB + 12*I_GB + 11*D_GB) * C L / T_GB) + 1 = ro und up ( (2*320 + 12*16 + 11*4 0 ) * 1 / 40 0 ) + 1 = ro und u p ( 3 .18 ) + 1 = 5 (tape s). T ap e p la nn in g: E xam pl e 2 Imagine the cas e with the f o llowing featur es: full backup size is F _GB ?[...]
-
Page 161
161 Copyright © Acronis, Inc., 2000 - 2010 node database has all the required information ab o ut the c o ntent of the moved tapes. So all you need to do is to perform th e inventory (p. 144) procedure for t he manag ed vault on the library where th e tapes we re placed to. 2. If you move tapes t o a tape library managed by anothe r storage node, [...]
-
Page 162
162 Copyright © Acronis, Inc., 2000 - 2010 Metadata The .meta folder is created during backup in every personal vault. This folder con tains additional information about a rchives and backups stored in the vault, such as archive o wners or the machine name. If you acciden tally delete the .meta f older, it will be au tomatically recr eated next ti[...]
-
Page 163
163 Copyright © Acronis, Inc., 2000 - 2010 [Archive Name] The Actions bar is availab le when you select an arch ive in the archives tab le. Duplicates acti ons of the archi v es toolbar. [Backup Name] The Ac tion s bar is available when you expand the archive and clic k o n an y of its backups. Duplicates ac tions of the archives toolbar. [...]
-
Page 164
164 Copyright © Acronis, Inc., 2000 - 2010 4. 2. 2.1 C rea ti ng a pe rs ona l v a ult To c re ate a p ers on al v au lt 1. In the Name field, ty pe a n ame for the vault being cre ated. 2. [Optional] In the Com ments field, add a description o f the v ault. 3. In the Path field, cli ck Change... In the opened Person al Vault Path window, specify [...]
-
Page 165
165 Copyright © Acronis, Inc., 2000 - 2010 To Do Validate an archive Click Validate . The Validation (p. 244 ) page will be opened with the pre-s elected archive as a source. Validation of an a rchive will check all the archive's backu ps. Export an a rchive Click Export . The Export (p. 252 ) page will be opened with the pre-select ed archiv[...]
-
Page 166
166 Copyright © Acronis, Inc., 2000 - 2010 Validate a backup Click Validate . The Validation (p. 244 ) page will be opened with the pre-s elected backup a s a source. Validation of a fil e backup imitates recov ering of all files from the b ackup to a dummy destination. Valid ation of a d isk backup calculates a checksum for e very data block save[...]
-
Page 167
167 Copyright © Acronis, Inc., 2000 - 2010 4 . 3 . 4 F i lt e r i n g a n d s o rt i n g a r c h i v e s The following is a guid eline for you to filter and s ort archi v es in the ar chives table. To Do Sort backup a rchives by any column Click the column's header to sort the archives in a scending order. Click it once again to sort th e arc[...]
-
Page 168
168 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aun ched sy ste m atically k eeping the critical data safely protected. The scheduler uses lo cal ti m e of the m achine t he[...]
-
Page 169
169 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last success ful backup completed + + The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multip le conditions) is not met is defin ed by the Task start conditions (p. 116) backup option. What-ifs What if an event o c[...]
-
Page 170
170 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily sche dule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 day(s). 2. Once at: 06:00:0 0 PM . 3. Effective: From: not set . The t ask will be started on the current day, if it has been created b efo re 6PM. If you h[...]
-
Page 171
171 Copyright © Acronis, Inc., 2000 - 2010 task's recurrence s is 4 hours, and bet ween the third, fourth and fifth is 2 hours. In this case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM . 3. Effective: From: 09/20/2 0 09 . To: not set [...]
-
Page 172
172 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Frida y at 10PM, s tarting from a certain date (say 05/14/2009) an d ending after six months. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 we ek (s) on: Fr i . 2. Once at: 10:00:0 0 PM . 3. Effective: From: [...]
-
Page 173
173 Copyright © Acronis, Inc., 2000 - 2010 Thursday: every 3 h o urs fro m 9 AM till 9 PM Friday: twice at 1 2 PM and 9 PM (i.e. sa me as on Mon day) Saturday: once at 9 PM Sunday: once at 9 PM Combining the identical times, the following thr ee schedules can be add ed to the task: First schedule 1. Every: 1 week(s) on : Mon , Fri [...]
-
Page 174
174 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run du ring the specified time inter val. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be ru n 12 times from 10 AM to 10 PM during one day . I[...]
-
Page 175
175 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of Novemb er. By setting up this date we just define that the tas k must be discontinued in 20 1 0, aft er autu mn ends in the northern hemispher e. Several monthl y schedu les for one task In the case when the task needs to be run on differ[...]
-
Page 176
176 Copyright © Acronis, Inc., 2000 - 2010 For example, you may want to set up a backup plan that will aut omatically perform an em ergency full backup of your data a s soon as Windows discovers that your hard disk drive is abo ut to fail. Parameters Log name Specifies the na me of t he l og. Select the name of a standard log ( Application , S ecu[...]
-
Page 177
177 Copyright © Acronis, Inc., 2000 - 2010 WindowsUpdateCl ient and event number 18 in to the System log; the type o f this event is Information . When creating the plan, type or select the follo wing in the Schedule area: Log name : S y stem Event source : Microsoft-W indows-Window sUpdateClient Event type : Information Event ID :[...]
-
Page 178
178 Copyright © Acronis, Inc., 2000 - 2010 Distribute start time w ithin the time window When this setting is enabled, the backup task on each registered machine will start wit h a specific delay from the start time set in the polic y. This distrib utes t he tas ks' actual start times wi thin a time interval. You may want t o use this s et ti[...]
-
Page 179
179 Copyright © Acronis, Inc., 2000 - 2010 2. In How to back up , select t he Simple, Tower of Hanoi, or Cus t om scheme, an d then click Change to specify a schedu le for the scheme. 3. Under Run the task , se lect Da i ly , Weekl y , or Month l y . 4. In the Advanced set tings area, click Change . 5. To enable the use o f the W ake - On -LAN fun[...]
-
Page 180
180 Copyright © Acronis, Inc., 2000 - 2010 Adding multiple condi tions Multiple conditi o ns must b e met simultan eously to enable task executi on. Ex ample: It is required to run t he bac kup task after free space o n the managed machine is changed by at least 1 GB, but only if all users are logged off and more than 12 hours ha ve passed since t[...]
-
Page 181
181 Copyright © Acronis, Inc., 2000 - 2010 Event: Weekly , Ever y 1 we ek (s) on <workda ys> ; Once at 09:00:00 PM . Condition: Location 's host is available Task start conditi o ns: Skip the task execution . As a result, (1) If 9:00 PM co mes and the loca tio n's h o st is a vailable, the backup task starts right on ti[...]
-
Page 182
182 Copyright © Acronis, Inc., 2000 - 2010 If the task start c onditions are Wait un til the cond i tio ns are met and the Run the ta s k any way after check box is clea red , the task (scheduled to run at 3:00 PM) w ill start at 6:00 PM — the tim e when the condition is met. If the task start c onditions are Wait un til the cond i tio n[...]
-
Page 183
183 Copyright © Acronis, Inc., 2000 - 2010 (3) if the machine is never restarted, the task will neve r start. You can start the ba ckup manually, if need be, in the Ba ckup plan s and tasks view.[...]
-
Page 184
18 4 Copyright © Acronis, Inc., 2000 - 2010 6 D i rec t ma nag em en t This section covers o perati o ns that can be performed directly on a m anag ed machin e by using the direct console-agent co nne ction. The content of this secti o n is applicable to both stand-alone and advanced editions o f Acron is Backup & Recovery 10. 6. 1 Ad mi nist [...]
-
Page 185
185 Copyright © Acronis, Inc., 2000 - 2010 licenses. Please make sure you h ave a valid license on Acroni s License Server. After a successful licen se check the agent will start working. Trial version of prod uct expires in X day (s) Please make sure you h ave a valid license on Acroni s License Server. Connect Once the trial version of the p rod[...]
-
Page 186
186 Copyright © Acronis, Inc., 2000 - 2010 H ow it i s d ete rmi ned Errors Highlight the date in red if at least one "Error" entry a ppeared in the log on t his date. Warnings Highlight the date in yellow if no "Error" entries appear ed and at least one "Warn ing" entry appeared in the log o n this date. Information [...]
-
Page 187
187 Copyright © Acronis, Inc., 2000 - 2010 In the backup tabl e, select the backup plan (task). Use the toolbar's but to ns t o take an action on the selected plan (task). See t he Actions on bac kup plans and tasks (p. 1 9 0) section f or details. You can ru n, edit, stop and delete the creat ed plans and tasks. Use the Informati[...]
-
Page 188
188 Copyright © Acronis, Inc., 2000 - 2010 A backup plan status is derived fr om the results of the last run of the plans' tasks. S tat us H ow it i s d ete rmi ned H ow to han dle 1 Error At least one task has failed. Otherwise, see 2 Identify the failed task s -> Check the tasks log t o find o ut the reason of the failure, t hen do one o[...]
-
Page 189
189 Copyright © Acronis, Inc., 2000 - 2010 Need interaction Any running task can put itself into the Need interact ion state when it needs human inter action such as changing m edia or ignoring a read error. The next state may be Stopping (if the us er chooses to stop the t ask) or Running ( on selecting Ig nore/Retry or an o ther acti on, such as[...]
-
Page 190
190 Copyright © Acronis, Inc., 2000 - 2010 centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to read th e warnings - > [optionally] Perform actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" No action is required. [...]
-
Page 191
191 Copyright © Acronis, Inc., 2000 - 2010 Run a plan/ta sk Backup plan Click Run . In the Run Backup Plan (p. 194 ) windo w, select the task you n eed to be run. Running the back up plan starts the selected task of th at plan immediately in spite of its schedule an d conditions. Why can't I run th e backup plan? Do not have the appro pri[...]
-
Page 192
192 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 199 ), except for the following limitat ions : It is not always possible to u se all scheme options, when editing a backu p plan if the created archive is not e mpty (i.e. contains b ackups). 1. I[...]
-
Page 193
193 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks. Why can't I de lete the backup plan? The backup plan is in t he "Running" state A backup plan cannot be deleted, if at least one of it s tasks is [...]
-
Page 194
194 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If req uired, you can hide the displayed c o lumns and show hid den ones. To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items th[...]
-
Page 195
195 Copyright © Acronis, Inc., 2000 - 2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Master boot record recov ery Recovery (disk to existing V M) Recovery of a disk/volum e backup to an existing virtual machine Recovery (disk to new VM) Rec[...]
-
Page 196
196 Copyright © Acronis, Inc., 2000 - 2010 Progress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progress, elapsed time and other parame te rs. Ba cku p pla n d et ai ls The Backup plan de tails window (also duplicat ed on the Information panel) aggr ega[...]
-
Page 197
197 Copyright © Acronis, Inc., 2000 - 2010 Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule. Backup options - backup options changed against the default values. 6 . 1 . 3 Log The Log stores th e history of operations performed b y Acronis Bac kup & Recovery 10 on the mach[...]
-
Page 198
198 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry . 2. Do one of the follow ing Click View Details . Th e log entry's details will be di splayed in a separate window. Expand th e Information panel, by clicking the chevron. Save the selected log entries to a file 1. Select a single lo g entry[...]
-
Page 199
199 Copyright © Acronis, Inc., 2000 - 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items that are ticked off co[...]
-
Page 200
200 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g ste ps . General Plan name [Optional] Enter a uniq ue name for the backup pla n. A consci o us name let s you id entify the plan among others. Plan's credentials (p. 202) [Optional] The backup plan will run on behalf of the us er who is creat[...]
-
Page 201
201 Copyright © Acronis, Inc., 2000 - 2010 [Optional] Provide credentials for the location if the pl an account does not have access permissions to the l ocation. To access this opti o n, sele ct the Advanced v i ew check box. Archive comments [Optional] Enter c omments on the archive. To a ccess this opti o n, select t he Advanced view check box.[...]
-
Page 202
202 Copyright © Acronis, Inc., 2000 - 2010 Virtualization server (p. 222) Here you select the resulting virtual machine type an d location. Available options depen d o n the host you selec te d in the pre vious step. Storage (p. 222) Choose the storage o n the virtualization server or the folder to place th e virtual machine files in. Resultant VM[...]
-
Page 203
203 Copyright © Acronis, Inc., 2000 - 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed. Select this option to back up specific files and folders. If you are not conc erned about recovery of the op erating system along with all the settings and applications, but pla n to keep safe only [...]
-
Page 204
204 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the ma chine goes into hibernation (hiberfil.s ys) are not backed up. After rec overy, the files will be re-cre ate d in the appropriate place with t he zero size. A volume backup s to res all o ther files and f olders of t[...]
-
Page 205
205 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 6 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folder s, as well as files with specific extensions, to be stored in the archiv e. To s pec if y w hi ch f il es a nd fol de rs t[...]
-
Page 206
206 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes th[...]
-
Page 207
207 Copyright © Acronis, Inc., 2000 - 2010 To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you s elect. While you are rev[...]
-
Page 208
208 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 211) to the arc hive name. If you do not select the Name ba c kup files us ing the archive name. .. check box: Each backup will hav e a unique file name with th e exact time stamp and the backup type; for example: MyData_ 2010_03_26_1[...]
-
Page 209
209 Copyright © Acronis, Inc., 2000 - 2010 Your script can m o ve older backups based on the date stamp. See also “The *Dat e+ variable” (p. 211 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hi n a da y Consider the follo wing scenario: You want to perfor m hourl y backups of your server's c ritical files every day. You want the [...]
-
Page 210
210 Copyright © Acronis, Inc., 2000 - 2010 You want to swap th e drive s each Monday, so that on e drive contains backups of the current week (Monda y through Sund ay), and the other dri ve those of the previous wee k. In this scenario, y ou need to create two backup plans as follows: a) When creating the first bac kup plan, specify MyMachin e[...]
-
Page 211
211 Copyright © Acronis, Inc., 2000 - 2010 6. 2. 8.2 T he [D AT E] va ri ab le If you specify the [DATE] variable in the arch ive name, the file name of each backup will include that backup’s creation da te. When using this variable, th e first backup o f a ne w day will b e a full backup. Before crea ting the next full backup, the sof tware del[...]
-
Page 212
212 Copyright © Acronis, Inc., 2000 - 2010 The program will ac ces s th e so urce dat a using the credentials of the backup plan account specified in the Gen eral section. Use the followin g creden tials The program will ac cess the source data usi ng the cre dentials you specify. Use this opti on if the plan account d o es not have access per[...]
-
Page 213
213 Copyright © Acronis, Inc., 2000 - 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 33 ). 6. 2. 10. 2 Ba ck u p la t er s ch eme With the Back up later scheme, the backup will b e performed only once, at the da te and time you specify. Specify the appropria te settings as follows [...]
-
Page 214
214 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups. Monthly backups run every fourth Frida y, and weekly backups run on all other Friday[...]
-
Page 215
215 Copyright © Acronis, Inc., 2000 - 2010 Keep monthly ba ckups indefinitely. Backup scheme para meters can then be s et up as foll o ws. Start backup at: 11: 00 PM Back up on: All days Weekly/monthly : Saturday (for example) Keep backups: Daily: 1 week Weekly: 1 month Monthly: indefinite ly As a result, an archi v[...]
-
Page 216
216 Copyright © Acronis, Inc., 2000 - 2010 Have a weekl y summary o f file chan ges since las t mo nth (Fri day weekly differential backup ). Have a monthly ful l backup of your f iles. Moreover, assu m e that yo u w ant to r etain access t o all backup s, including the daily ones, f or at least six months. The following GFS sch eme suits [...]
-
Page 217
217 Copyright © Acronis, Inc., 2000 - 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p. 169 ), weekly (p. 171 ), or monthly (p . 173 ) schedule. Setting u p schedule parameter s allows creating simple sch edules (example of a simple daily schedule: a backup task will be run every 1[...]
-
Page 218
218 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an go ba ck Ro ll - bac k pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level d oubles the full backup and roll-back per[...]
-
Page 219
219 Copyright © Acronis, Inc., 2000 - 2010 Incremental Specifies on what schedule an d under which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full backup is created instead of the in cremental backup . Differential Specifies on what schedule an d under which conditions to perfo[...]
-
Page 220
220 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche me yields a full backup perfor m ed e v ery Friday nig ht. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param et ers excep t Schedu l e in Full ba c kup a re left e mpty. All backups i n the archive are kept indefinitely (no archi ve[...]
-
Page 221
221 Copyright © Acronis, Inc., 2000 - 2010 Finally, we create r etention rules for the archive: let us retain only backups that ar e no older than six months, and let the cleanup be performed after ea ch backup task and also on the last day of every month. Retention rules : Delete ba ckups o lde r than 6 months Apply the rule s : After ba cking up[...]
-
Page 222
222 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 1 1 A r c h i v e v al i da t i o n Set up the validati o n task to check if the bac ked up data is recoverabl e. If t he bac kup could not pass the validation successfull y, the validation task fail s and the backup plan gets the Error status. To set up validati o n, specif y the following parame[...]
-
Page 223
223 Copyright © Acronis, Inc., 2000 - 2010 Which agent is installed on the host? The resulting virtual machine type and locati on depend on the agen t that resides o n the sele cte d host. Agent for Windo ws is installed on the ho st You have a choi ce of virtual machine types: VMware Workstati on, Microsoft Virtual PC, or Parallels Workstatio[...]
-
Page 224
224 Copyright © Acronis, Inc., 2000 - 2010 If the managed machin e's operating system fails to start or you ne ed to r ecove r data to bare metal , boot the machin e from the bootable media (p. 401) or using Acronis Startup Recover y Manager (p. 52 ). Then, creat e a recovery task. Acronis Universal Re store ( p. 53 ) lets y ou recover and bo[...]
-
Page 225
225 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 228) [Optional] Provide credentials for the archive lo cation if the ta sk account does not have the right to access it. To access this option, select th e Adva nced view check box. Where to recover This section appears aft er the required backup is sel ected and the type of data to[...]
-
Page 226
226 Copyright © Acronis, Inc., 2000 - 2010 After any of the settings is cha nged against the default value , a new line that displays the newly set value appears. T he setting status changes from Default to Cu stom . Sho uld you modify the settin g again, the lin e will disp lay the new value unless th e new value is the default one. When the defa[...]
-
Page 227
227 Copyright © Acronis, Inc., 2000 - 2010 If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last D VD an d then insert the d iscs in order starting from the first o ne when the p rogram prompts. If the archive is st o red on a network share, expand the Network folder s group, th en select the required netw o rked mac[...]
-
Page 228
228 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 4.1 D isk s/ vo lu m es sel ect io n To s el ect a b ac ku p an d dis ks/ vol ume s to re cov er : 1. Select one of the su ccessive backups by its crea tio n d ate and time. Thu s, you ca n revert the disk data to a certain moment in tim e. Specify the items to recover. By default, all ite ms of the[...]
-
Page 229
229 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the location using t he creden tials you specify. Use this op tio n if the task account does no t have acces s permissions to the l ocation. You might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault. Specify: User name . When ent ering the[...]
-
Page 230
230 Copyright © Acronis, Inc., 2000 - 2010 Disk #: Disk # (MODEL ) (p. 232 ) Select the destinati on disk for each of the source disk s. NT signature (p. 23 0 ) Select the way the r ecovered disk's signature w ill be h andled. The disk signature i s used by Windows and the Lin ux kernel version 2.6 and later. D isk d es tin at ion To s pec if[...]
-
Page 231
231 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 6.2 Vo lu me s Available volume destinations depend on the agents o perating o n the machine. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows or Agent for Linux is installed. The selected volu mes will be recovered to the physical disks of the m[...]
-
Page 232
232 Copyright © Acronis, Inc., 2000 - 2010 M BR de s tin at io n To s pec if y a de s ti na tio n dis k: 1. Select the disk t o recover t he MBR to. 2. Click OK . Vo lu me de st in at ion To s pec if y a de s ti na tio n v ol um e: 1. Select a volume o r unalloca ted space where you want the sel ected volume to be recover ed to. The destination v [...]
-
Page 233
233 Copyright © Acronis, Inc., 2000 - 2010 set as active. If you recover a sys tem volume to anoth er hard disk with its own volumes and operating system , you will most likely need o nly the d ata. In this case, you can re co ver the volume as logical to access the data only. File system Change the volu m e file syst em, if required. B y default,[...]
-
Page 234
234 Copyright © Acronis, Inc., 2000 - 2010 Storage Initial settin g : the default s to rage of t he virtualiz ation server if the new m achine i s c reated o n the virtualization ser v er. Other wise the current user's documents folder. This is the place wher e the new virtual machin e will be creat ed. Whether you can chan ge the storage on [...]
-
Page 235
235 Copyright © Acronis, Inc., 2000 - 2010 Re co ver y ex cl u sio ns Set up exclusions fo r the sp ecific files you do not wish to recover. Use the Add , Edit , Remove and Remove All buttons t o create t he list o f file ma sks. Files whose names match any of the masks will be skipped du ring recove ry. You can use one or more wildcard characters[...]
-
Page 236
236 Copyright © Acronis, Inc., 2000 - 2010 Do not overwrite ex isting file - this will give the fil e on the hard disk priority o ver the file in t he backup. If you allow files to be overwritten, you still have an op tion to prevent over writing of specific files by excluding (p. 235) the m from the recovery o peration. 6 . 3 . 7 A c c e s s [...]
-
Page 237
237 Copyright © Acronis, Inc., 2000 - 2010 DVD supplied by th e hardware vendor o r downl o ad th e drivers from the v endor’s Web site. The driver files sh ould have the *.inf, *.s ys or *.oem extensions. If you d ownload the drivers in the *. exe, *.cab or *.zip forma t, extract them using a third-party application, such as WinRA R (http://www[...]
-
Page 238
238 Copyright © Acronis, Inc., 2000 - 2010 Drivers for a virtual m achine When recovering a system to a new virtual ma chine, the Universal Restore te chnolog y is applied in the background, becaus e the program knows what drivers are required for the s upported virtual machines. When recovering th e system to an existing virtual m achi ne that us[...]
-
Page 239
239 Copyright © Acronis, Inc., 2000 - 2010 8. [Optionally] Re view the Virtua l machine settin gs (p. 233 ) and m ake changes if necessary. Here you can change the path to the ne w virtual machine. The same type o f machines with the sam e name cannot be created in the same folder. Change either the VM name, or the path if you get an error message[...]
-
Page 240
240 Copyright © Acronis, Inc., 2000 - 2010 Windows was r ecovered to a dynamic volume that cannot be boota ble Solution : Reco v er Windo ws to a basic, simple or mirr o red volu m e. A system volume w as rec overed to a disk t hat do es not ha v e an MBR When you configure r ecovery of a system volu me to a disk that does not ha ve an MBR[...]
-
Page 241
2 41 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 11. 1 Ho w to r ea ct iva te GR UB a nd ch an ge it s con fi gu ra ti on Generally, you sh o uld refer t o the boot l oader manual pages for the appr opriate procedure. Ther e is also the corresp o nding Kno wledge Base article on the Acronis Web site. The following is an e xample of how to reactiv[...]
-
Page 242
242 Copyright © Acronis, Inc., 2000 - 2010 9. Specify the disk on which GRUB is l ocated — typically, the bo ot or root partition : root (hd0,0) 10. Install GRUB. For example, to inst all GRUB in the master bo o t record ( MBR) of the first disk, run the following com m and: setup (hd0) 11. Exit the GRUB shell: quit 12. Unmo unt the mounted fil [...]
-
Page 243
243 Copyright © Acronis, Inc., 2000 - 2010 If the recovery r equires the machine to be r ebooted (usually, when the v o lumes t o recover incl ude the boot partiti on), follow these guid elines: If all parts of the MD devic e are volumes (a t ypical cas e, such as in the first exam ple), make sure that the type o f each volu me — called part[...]
-
Page 244
244 Copyright © Acronis, Inc., 2000 - 2010 6 . 3 . 1 4 R e c o v e r i n g t h e s t or a ge n o d e In addition to backing up data to centralized vaults managed by Acronis Backup & Recover y 10 Storage Node, y o u may wa nt to perform a disk backup of the machine where the storage n ode itself is installed. This section describes how to recov[...]
-
Page 245
245 Copyright © Acronis, Inc., 2000 - 2010 You can access th e Validat ion page from the Vaults (p . 1 30) view. Rig ht-click the object to v alidate (archive, backup o r vault) a nd select Validate from the context m enu. The Va lida tion page will be opened with the pre-s elected object as a source. All you need to do is to select when to valida[...]
-
Page 246
246 Copyright © Acronis, Inc., 2000 - 2010 User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain) Password . The passw ord for the account. 2. Click OK . To learn more ab out using credentials in Acronis Backup & Recovery 10, see the Owner[...]
-
Page 247
247 Copyright © Acronis, Inc., 2000 - 2010 To access a managed vault, type the following string in the Path fi eld: bsp://node_ad dress/vault_name/ To access an unmanag ed centralized vault, type the f ull path to the vault's folde r. 2. In the table to the right of the tree, select the archive. The table displays the names of the arc[...]
-
Page 248
248 Copyright © Acronis, Inc., 2000 - 2010 Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section. Use the followin g creden tials The program will ac cess the location using t he creden tials you specify. Use this op tio n if the task account does no t [...]
-
Page 249
249 Copyright © Acronis, Inc., 2000 - 2010 "Band aid" da tabase recovery solution : mount up an i m age that c o ntains an SQL databa se fro m a recently failed machine. This will give access to the database until the failed machine is recovered. Offline virus c lean : if a mac hine is attacked, the admin istrator shuts it down, [...]
-
Page 250
250 Copyright © Acronis, Inc., 2000 - 2010 If the archive is st o red on a n FTP or SFTP ser v er, t ype the server na m e or add ress in the Path field as follows: ftp://ftp_server:p ort _number or sftp://sftp_ server:port number If the port number is n ot specified, port 21 is used for FTP and port 22 is used for SF TP. After entering acc es[...]
-
Page 251
251 Copyright © Acronis, Inc., 2000 - 2010 User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain) Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, crede ntials required for access to FTP ser[...]
-
Page 252
252 Copyright © Acronis, Inc., 2000 - 2010 6. 7 Ex por tin g arc hiv es a nd b ack ups The export operati on creates a copy of an archi v e or a self-sufficient part copy of an archive in the location you specify. The original archive re m ains untouched . The export operati on can be applied to: a single archi v e - an exact archive copy will[...]
-
Page 253
253 Copyright © Acronis, Inc., 2000 - 2010 The resulting ar chive's options The exported archi ve inher its t he opti o ns of th e original archive , i ncluding encryp tio n and th e password. When exporting a password-protected arch ive, you are prompted for the password. If the original archive is encrypted, the password is used to encrypt [...]
-
Page 254
254 Copyright © Acronis, Inc., 2000 - 2010 [Optional] The exp o rt task will run on behalf of the us er who is creating the ta sk. You can change the task credentia ls if necessary. To acc ess this option, select the Advanced v iew check box. Wh at to export Export Select an object to e xport : Archive (p. 226 ) - in tha t case, you need to specif[...]
-
Page 255
[...]
-
Page 256
256 Copyright © Acronis, Inc., 2000 - 2010 6 . 7 . 3 B a c k u p s e l e c t i o n To s pec if y a b ack up( s) t o e xpo rt 1. At the top of the window, select t he respec tive check box(es). To ensure that you ch oose the right backup, click on the backup and look at the bo ttom table that displays the volumes contained in the selected backup. T[...]
-
Page 257
257 Copyright © Acronis, Inc., 2000 - 2010 To export data t o a networ k share, expand the Network folde rs group, select the required networked machi ne and then click the shared folder. If the ne twork share requires access credentials, the pr o gra m will ask f or them. Note for Linux users : To specify a Comm on Internet File System (CIFS)[...]
-
Page 258
258 Copyright © Acronis, Inc., 2000 - 2010 6 . 7 . 6 A c c e s s c r e d e n t i al s f o r d e s t i n a t i o n Specify credentials required for access to the lo cation where the resulting archi ve will be stored. The user whose nam e is specifi ed will be considered as th e archive owner. To s pec if y c re den ti als 1. Select one of the f oll[...]
-
Page 259
259 Copyright © Acronis, Inc., 2000 - 2010 [Optional] Protec t the Acronis Secur e Zone fro m unauthorized access with a password. The prompt for the pa ssword appear at any operati o n relatin g to the zone. After you configure the required settings, click OK. In the Result confirmation (p. 260) wind o w, review the expect ed layout and click OK [...]
-
Page 260
260 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.4 Re su lt c onf ir ma t io n The Result confir mation window displays the expecte d partition layout accordin g to the settings y ou have chosen. Click OK , if you are satisfied with the lay o ut and th e Acronis Secure Zone crea tio n wil l start. How the settings you make will be processed This[...]
-
Page 261
261 Copyright © Acronis, Inc., 2000 - 2010 2. Select volumes fr om which free space will be us ed to increase the Acronis Secure Zone. 3. Specify the ne w size of the z o ne by: dragging the slid er and s electing any size between the current and maxi mum values. The maximum size is e qual to the disk’s unallocated space plus the total free [...]
-
Page 262
262 Copyright © Acronis, Inc., 2000 - 2010 Activate Enables the boot tim e prompt "Press F11 for Acronis Startup Recovery Manager … " (if you do not have the GRUB bo o t load er) or adds the "Acronis Startup Recovery Manag er" item to GRUB' s menu (if you have GRUB). If th e system fails to boot, y ou will be abl e to st[...]
-
Page 263
263 Copyright © Acronis, Inc., 2000 - 2010 Linux-based bootable media Linux-based media c o ntains Acronis Backup & Recovery 10 Bo o table Ag ent based on Linux kernel. The agent can boot and perform operations on any PC -compatible hard ware, including bare metal and machines with co rrupted or n on -supported fil e systems. The operations ca[...]
-
Page 264
264 Copyright © Acronis, Inc., 2000 - 2010 Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2 .1) Windows 7 (PE 3. 0) If you already hav e media with PE1.x distribution, unpack the media ISO to a loc al fo lder and st art the Bootable Media Bui lder either from the manag ement console, by selecting Tools > Create[...]
-
Page 265
265 Copyright © Acronis, Inc., 2000 - 2010 Universal Restor e can be e nabled if Acronis Backup & Rec ov ery 10 Universal Restore is installed on the machin e where the media is creat ed. 3. [optional] The tim eo ut inte rval for the boot menu plus the c omponent that will automatically start on timeout. If not configured, the Acronis [...]
-
Page 266
266 Copyright © Acronis, Inc., 2000 - 2010 noapic Disables Advanced P rogra mmable Interrupt Controller (A PIC). You may want to u se this parameter when e xperiencing problems with a particu lar hardware configuratio n. vga=ask Prompts for the video mode t o be used by the bootabl e media's grap hical user interface. Without the vga param et[...]
-
Page 267
267 Copyright © Acronis, Inc., 2000 - 2010 pci=nobios Disables the use of P CI BIOS; only direct hardwar e access meth ods will be allowed. You m ay want to use this param et er whe n the bootable media fails t o start, which m ay be caus ed by the BIOS . pci=biosirq Uses PCI BIOS calls to get the interrupt routing tabl e. You may want to use this[...]
-
Page 268
268 Copyright © Acronis, Inc., 2000 - 2010 Example The bootable agent co uld u se one of the network adapters for co m munication with the management console through the production network. Auto m atic c o nfiguration co uld be done for this c onnection. Sizeable data for r ecovery could be transferred thr ough the second NIC, included in the dedi[...]
-
Page 269
269 Copyright © Acronis, Inc., 2000 - 2010 To r emo ve dr ive rs : 1. Select the INF file. 2. Click Remove . 6. 10. 1. 2 A ddi ng t he Ac ro nis P lu g-i n to Wi nP E 1.x Acronis Plug-in for WinPE can be added to: Windows PE 200 4 (1.5) (Wind ows XP Professional wit h Service Pack 2) Windows PE 200 5 (1.6) (Wind ows Server 2003 with Servic[...]
-
Page 270
270 Copyright © Acronis, Inc., 2000 - 2010 2. Start the Bootabl e Media Buil der either from the management console, by select ing T ools > Create Bootable Med i a or, as a separate c o mponent. 3. Select Bootable med i a typ e: Windows PE . When creating a ne w PE ISO: Select Create W indows PE 2.x or 3.0 automatically The software run[...]
-
Page 271
271 Copyright © Acronis, Inc., 2000 - 2010 5. Run the following c omman d: export_license.bat 6. Copy the contents o f the c urrent folder — by default: C:Program Fil es Acronis Bootable ComponentsWinPE — to th e %BartPE f older%pluginsAcronis. 7. Insert your Wind ows distribu tion CD if you do not ha ve a copy of Windows install ation [...]
-
Page 272
272 Copyright © Acronis, Inc., 2000 - 2010 5. There is no Navigat ion tree in the media GUI. Us e the Navigation menu ite m to navig ate between views. 6. Backup to Acronis Se cure Zone is not possible. 7. Tasks cannot be sch eduled; in fact, tasks are not created at all. If you need to repeat the operation, configure i t from scratch. 8. The log [...]
-
Page 273
273 Copyright © Acronis, Inc., 2000 - 2010 7. If prompted, specify the user name and password to access the iSCSI d evice. To a dd an ND AS de vic e 1. In a Lin ux -based bootable m edia, run the management console. 2. Click Configure iSCSI/NDAS devices . 3. In NDAS devices , click Add device . 4. Specify the 20-charac ter device ID. 5. If you wan[...]
-
Page 274
274 Copyright © Acronis, Inc., 2000 - 2010 echo mknod swapon egrep mkswap s ysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 . 1 0 . 5 R e c o v e r i n g M D de v i c[...]
-
Page 275
275 Copyright © Acronis, Inc., 2000 - 2010 To c re ate t he vo lu me st ruc tu re by us ing t he ma nag eme nt c ons ol e 1. Boot the machine fr om a Linux-based bootable medi a. 2. Click Acronis Bo otable Agent . Then, click Run man agement console . 3. In the manage m ent consol e, click Recover . Under the archive contents, Acronis Backup &[...]
-
Page 276
276 Copyright © Acronis, Inc., 2000 - 2010 7. Return to the m anagement co nsole b y pressing CTRL+ALT+F1, o r by runnin g the command: /bin/product (Do not reboot the machine at this point. Otherwise, you will hav e to creat e the volume structure again.) 8. Click Recover , then specify the path to the archi v e and any o ther required parameters[...]
-
Page 277
277 Copyright © Acronis, Inc., 2000 - 2010 lvm pvcreate /dev/m d0 /dev/md1 lvm vgcreate my_vol group /dev/md0 /dev/md 1 lvm vgdisplay The output of the lvm vgdisplay co mmand will cont ain lines similar to the follow ing: --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk[...]
-
Page 278
278 Copyright © Acronis, Inc., 2000 - 2010 Num Idx Partition F lags Start Size T ype ---- --- --------- ----- ----- --------- ------ Disk 1: Table 0 Ta ble Disk 2: Table 0 Ta ble ... Dynamic & GPT Volum es: DYN1 4 my_volgroup -my_logvol 12 533760 Ext2 You will need the v olume's index, given in the Idx colu m n, in the nex t step. 2. Use [...]
-
Page 279
279 Copyright © Acronis, Inc., 2000 - 2010 6. 10. 6. 2 S ett in g up a ma ch ine to b oot f ro m P XE For bare metal, i t is enough that the machine’s BIOS su pports network booting. On a machine tha t has an operating sys tem on the hard disk, the BIOS must be configu red so that the network interfac e card is ei ther the first boot device, or [...]
-
Page 280
280 Copyright © Acronis, Inc., 2000 - 2010 6. 11 Di sk ma na gem ent Acronis Disk Dire ctor L ite is a tool for preparing a mac hine disk/volume configuration for recovering the volume images saved by the Acronis Backup & Recovery 10 software. Sometimes after the volume has been backed up and its image placed into a saf e storage, the machine [...]
-
Page 281
281 Copyright © Acronis, Inc., 2000 - 2010 Running Acronis Disk Director Lite from a bootable m edia You can run Acronis D isk Director Lite on a bar e metal, on a machine that cannot boot or on a non- Windows machine. T o do so, b oo t the ma chine from a bootable media (p. 4 01) created with th e Acronis Bootable Media Bu ilder; run the manageme[...]
-
Page 282
282 Copyright © Acronis, Inc., 2000 - 2010 Displaying operation r esults The results of any disk or volume operation, yo u have just plann ed, are immediately displa yed in the Disk management v iew of the console. For example, i f yo u crea te a volume, it will be im mediately shown in the tabl e, as well as in graphical form at the b o ttom of t[...]
-
Page 283
283 Copyright © Acronis, Inc., 2000 - 2010 If you decide to change the disk settings it can be don e later using the standa rd Acronis Disk Director Lite disk tools. 6. 11. 5. 2 Ba sic d isk c lo nin g Sometimes it is n ecessary to transfer all the disk data onto a ne w disk. It can be a case of ex pandin g the system v olume, startin g a new syst[...]
-
Page 284
284 Copyright © Acronis, Inc., 2000 - 2010 data loss , then the user will be allowed to proc ee d. If d ue to the size limitations safe transf er of all the source disk data t o the target disk is impossible e ven with the pr o portional r esizing of the volumes, then the C lone b asic disk operation will be i m possible and the user will not be a[...]
-
Page 285
285 Copyright © Acronis, Inc., 2000 - 2010 5. Wait until the task is finished. 6. 11. 5. 3 D isk c on v ers io n: MB R t o GP T You would want to co nvert an MBR basic disk to a GPT basic disk in the f o llowing cases: If you need m ore than 4 primary volumes on one disk. If you need additi o nal disk reliability against any possible data [...]
-
Page 286
286 Copyright © Acronis, Inc., 2000 - 2010 Please note, a volume, belonging to a GPT disk to c onvert, will be a logical on e after the operation and is irreversible. 3. By clicking OK , you'll add a pending operation of G P T to MBR disk conversion. (To finish the added o perat ion you will have to commit (p. 294) it. Exitin g the program wi[...]
-
Page 287
287 Copyright © Acronis, Inc., 2000 - 2010 You will be advised ab out the changes that will happen to the system if the chosen disk is converted from d y namic in to basic. E.g. if such a conv ersio n will stop th e disk fro m being accessed by the s ystem, the op erating system will stop loadin g after such conversion, o r if the disk you want to[...]
-
Page 288
288 Copyright © Acronis, Inc., 2000 - 2010 the following Micr o soft kn owledge base article: http: // technet. microsoft.com/en- us/library/cc73 2026.aspx. 6 . 1 1 . 6 V o l u m e o p e r a t i o n s Acronis Disk Dire ctor L ite i ncludes the following oper ations that can be perf ormed on volumes: Create Volume (p. 2 88 ) - Creates a new vol[...]
-
Page 289
289 Copyright © Acronis, Inc., 2000 - 2010 A volume, als o someti mes called RAID 0 , c o nsisting of equal sized stripes of data, written across each disk in the volume; it m eans that to create a striped volume, a us er will need two or mor e dynamic disks. Th e disks in a strip ed volu me don’t have to be id entical, but there must be un used[...]
-
Page 290
290 Copyright © Acronis, Inc., 2000 - 2010 Striped Mirrored RAID-5 You will obtain a brief description of every type o f volume for better underst anding of the advantages and limit ations of each possible v olume ar chitecture. If the current ope rating system, installed on this machine, does no t support the selected type of vo lume [...]
-
Page 291
291 Copyright © Acronis, Inc., 2000 - 2010 minimum and the maximum values or click o n the sp ecial handle, and hold and drag the borders of the disk's picture with t he cursor. The maximum value normally includes the most p o ssible un allo cated spac e. But in some cases the possible unallocat ed space and the proposed ma ximum volume size [...]
-
Page 292
292 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 2 D ele te vo lu me This version of Ac r onis Disk Director Lite has reduced functionality because it is ma inly a tool for preparing bare-metal systems for recovering p r eviousl y s aved volum e images. The features of re sizing the existing volume s and cr eating the new volumes, using free s[...]
-
Page 293
293 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 4 C han ge v olu me l ett er Windows operating systems assign letters (C:, D:, et c) to hard disk v o lumes at startup . These lett ers are used by applicati ons and operating systems t o locate files and folders in th e volumes. Connecting an add itio nal di sk, as well as creating or deleting [...]
-
Page 294
294 Copyright © Acronis, Inc., 2000 - 2010 to save additional space which is being lost due to the cluster size on the FA T16 or FAT32 file sy stems as a quick and m ore or less reliab le way of destr oy ing data, residing in this volume If y ou wa nt to fo rm at a vo lum e: 1. Select a volume to format. 2. Right-click on the se lected vol[...]
-
Page 295
295 Copyright © Acronis, Inc., 2000 - 2010 Quitting Acronis Dis k Director Lite with o ut commi tt ing the pending operations effectively cancels them, so if you try to exit Disk management without committing t he pend ing operations, you will receive the appr opriate warning. 6. 12 C ol le cti ng sys tem i nfo rm ati on The system infor mation co[...]
-
Page 296
296 Copyright © Acronis, Inc., 2000 - 2010 7 C ent ra li zed ma na ge me nt This section covers o perati o ns that can be performed centrally by usin g the components for centralized manage ment. The content of this se ctio n i s o nly app licable to advanced editions o f Acronis Backup & Rec overy 10. 7. 1 Ad mi nist er in g Ac ro nis B ac ku[...]
-
Page 297
297 Copyright © Acronis, Inc., 2000 - 2010 Vaults with low free space : X View vaults The alert is displayed if at lea st one centralized vault has less than 10% free space. View vaults will take you to t he Centralized vaults (p. 132 ) view where you ca n examine the vault size, free space, con tent and tak e the necessary st eps to increas e the[...]
-
Page 298
298 Copyright © Acronis, Inc., 2000 - 2010 Statistics for the s elected date are displayed t o t he rig ht of the chart. All the sta tis tics fields are interactive, i.e. if yo u click any field, the Log view will be open ed with the log entries pre-filt ered by this field. At the top of the char t, you can select the activi ties to display depend[...]
-
Page 299
299 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 2.1 Ba cku p pol ic y dep lo ym en t sta te s A backup policy depl oyment state is a combination of the policy deployment state s on all machines the policy is appli ed to. For example, if the polic y is app lied to three machines an d has the "Deploying" stat e on the 1st machine, the &qu[...]
-
Page 300
300 Copyright © Acronis, Inc., 2000 - 2010 In the Log view, apply the Error filter i f there are too many log e ntries. You can also sort the "e rror" entries by backu p plans, managed entities o r machines. 2. Once the reason o f the fail ure is clear, do one or more of t he foll owing: Remove the reason o f the f ailure. After that[...]
-
Page 301
301 Copyright © Acronis, Inc., 2000 - 2010 Edit a policy Click Edit . Editing policies is perfor med in the same way a s creating (p . 357 ). Once the policy i s edited, the management s erver updates the policy on a ll machines the policy was deployed to. Delete a policy Click Delete . As a result, the policy will b e revoked from the mach ines i[...]
-
Page 302
302 Copyright © Acronis, Inc., 2000 - 2010 To Do Sort backup p olicies by any column Click the column's header to sort the back up policies in ascending ord er. Click it once again to sort th e backup po licies in descending order. Filter backup policies by name/owner Type a policy's name / owner 's name in t he fields below the cor[...]
-
Page 303
303 Copyright © Acronis, Inc., 2000 - 2010 Actions To Do View details of the machine (group). Click View details . In the Machine d etails (p. 310 )/ Group d etails (p. 319) windo w, examine all information on the selected machine (or th e selected group ). View tasks of the machine (group). Click View tasks . The Tasks (p. 329) view will display [...]
-
Page 304
304 Copyright © Acronis, Inc., 2000 - 2010 Static groups Static groups contain machines manually added t o the gro up by the admin istrator. A static member re mains in the grou p until the administrator removes the member from the group or deletes the corr esponding manag ed machine from the managem ent server. Dynamic groups Dynamic grou[...]
-
Page 305
305 Copyright © Acronis, Inc., 2000 - 2010 In the Add m achine (p. 307 ) window, se lect the machine th at needs to be added to the man agement server. Import machines from Active Directory Click Impor t machines from Active Directory . In the Impo rt machines from Active Director y (p. 307 ) w indow, specify the machines or organizational u nits [...]
-
Page 306
306 Copyright © Acronis, Inc., 2000 - 2010 Remove a machine fro m the current static group Click Remove fr om group . The backup policies applied to the group will be re voked from the machine automatically. Deleting the selected machine from the manag ement server To Do Delete a machine from the management server Click Delete mach ine from AMS . [...]
-
Page 307
307 Copyright © Acronis, Inc., 2000 - 2010 A ddi ng a m ach in e to th e m an ag em en t s er ver To be able to deplo y backup policies from Acronis Backup & Recovery 10 Manag ement Server to a managed machine and perform other centralized management operations, y ou need t o register the machine on the m anage m ent ser v er. To a dd a mac hi[...]
-
Page 308
[...]
-
Page 309
309 Copyright © Acronis, Inc., 2000 - 2010 Synchronization com mand line tool Acronis Backup & Rec overy 10 Management Ser ver has a command line too l that enables you to create a batch file and schedule the synchronizati o n task usin g Windows scheduler. To s ync hr on ize ma ch ine s w ith a te xt f il e usi ng co mma nd li ne 1. Log on as[...]
-
Page 310
310 Copyright © Acronis, Inc., 2000 - 2010 M ovi ng a ma ch in e t o an ot he r g ro up To m ov e t he se lec te d m ac hi ne to a not her gr ou p 1. In the group tree , se lect the group th e machine will be moved t o . 2. Click OK . The machine being moved leaves one gr o up and bec omes a member of another group. As a result, the backup policie[...]
-
Page 311
311 Copyright © Acronis, Inc., 2000 - 2010 Unknown - this sta tus is displayed until the first c onnection between the management se rver and the machine is established after adding the m achi ne or starting the management server's servic e. Withdrawn - the m achine was registered on another management server, or the Stand- alone mana[...]
-
Page 312
312 Copyright © Acronis, Inc., 2000 - 2010 Plans and tasks Displays a list of the plan s (both local and centraliz ed) and tasks existing on the se lected machine. Operations The following is a guid eline for you to perfor m operati o ns with backup plans and tasks. To Do View details of a plan/task Backup plan Click View details . In the Pl an De[...]
-
Page 313
313 Copyright © Acronis, Inc., 2000 - 2010 recovery task (from the disk b ackup): The target volum e will be deleted and its space unallocated – y ou will get the same result if th e recovery is unsuccessful. To recov er the "lost" volume, you will hav e to r un the task once again. recovery task (from the file b ackup): The ab[...]
-
Page 314
314 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks. Why can't I de lete the backup plan? The backup plan is i n the "Running" state A backup plan cannot be deleted, if at least one of it s tasks is [...]
-
Page 315
315 Copyright © Acronis, Inc., 2000 - 2010 This opens Log view with pre-filtered log ent ries of the selected group. Remove machine from a group. Click Remove . The centralized plans, which were dep loyed to the parent grou p, will no longer affect this machine. Hosted virtual machines The tab displays a lis t of the machines hosted on the selecte[...]
-
Page 316
316 Copyright © Acronis, Inc., 2000 - 2010 To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items that are tic ke d off correspond to the c olumn headers presented in the table. 2. Click the items y o u want t o be displayed/hidden. 7. 1. 3.2 A cti on s on gr ou ps Actions are availab le when you [...]
-
Page 317
317 Copyright © Acronis, Inc., 2000 - 2010 Refresh a list of groups Click Refresh . The management con sole will update the list of grou ps from the management server with the most recent in formation. Though th e list of groups is refreshed automatically based on events, the data may not be retrieved immediately from the management ser ver due to[...]
-
Page 318
318 Copyright © Acronis, Inc., 2000 - 2010 IP range: 192.168.17.0 - 192.168.1 7.55 will add to the sa me group all the machin es whose operating syste m is Windo ws 2000 or Windows 2003 and bel ong to the SERVERS organ izational unit and w hose I P addr esses are within the rang e 192.168.17.0 - 192.1 68.17.55. How long does a dynami c group membe[...]
-
Page 319
319 Copyright © Acronis, Inc., 2000 - 2010 when the machine w as initially added to the manag ement server. Otherwise, the machine will n o t be added to the group. The r egistration address of e ach machine can be found in th e Registration address column in an y ma nagement server view that co ntains the machine (the column is hidden by default)[...]
-
Page 320
320 Copyright © Acronis, Inc., 2000 - 2010 To Do View details of a policy Click View details . In the Policy d etails (p. 302 ) windo w, examine all information related t o the selected backup policy . View tasks of a policy Click View tasks . The Tasks (p. 329) view will display a list of the tasks r elated to the selected backup policy. View log[...]
-
Page 321
321 Copyright © Acronis, Inc., 2000 - 2010 Adding a virtua l machine a s a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on th e virtual machine and register (p. 3 0 7) it on th e managem ent server. The machine will be treated as a physical on e. You will be able t o apply any backup po licy t o th[...]
-
Page 322
322 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 4.1 Vi rt ua l m ach in es on a m ana gem en t se rv er Availability of virtual machines Virtual machines are displayed as available when both the agent is available f o r t he m anag ement server and the mach ines are available for the agen t. The list of virtual machin es is refreshed dynamically [...]
-
Page 323
323 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 4.2 VM wa re v Cen te r int egr at io n If you are using V M ware v Sphere, it is rec ommended that you integrate the management server with your vCenter S erver. To i nt eg ra te the m ana gem en t s er ver w ith a VM war e vCe nte r Ser ve r: 1. In the Navigation tr ee, right click Virtual ma c hi[...]
-
Page 324
324 Copyright © Acronis, Inc., 2000 - 2010 For a vCenter Server , a list of ESX/ESXi hosts and clus ters obtained from the v Cen ter Server will be displayed. Select the hosts and clusters to d eploy the agent to, or check the Select all check box. In a vCenter cluste r, a single Agent for ESX/E SXi backs up virtual mac hine s hosted on all the cl[...]
-
Page 325
325 Copyright © Acronis, Inc., 2000 - 2010 To be able to dedup licate backups, an agent needs a s eparately sold license for d eduplication. If you have imp o rted such lic enses into the license serv er, you can select the Enable deduplication. . . check box to let th e agents acqu ire these licenses. When installing the product for online backup[...]
-
Page 326
326 Copyright © Acronis, Inc., 2000 - 2010 Creating a cluster of serve rs that already have agents It is recommended that you remove Agents f o r ESX/ESXi fro m all bu t one of the servers. Retain t he agent whose VA resid es on the shared storage. Restar t the VA so that it becomes aw are of the cluster. 7 . 1 . 5 S t o r a g e n o d e s Acronis [...]
-
Page 327
327 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 5.1 A cti on s on st or ag e n ode s All the operations des cribed here, are perfor m ed by cl icking the corresponding b utto ns on th e toolbar. The opera tions can be also accessed from the Storage nodes bar ( o n the Actions and tools pane) and from the Sto r a ge node s item of the main m enu. [...]
-
Page 328
328 Copyright © Acronis, Inc., 2000 - 2010 storage nodes The management con sole will update the list of storage nod es from the management server with th e most recent information . Though the list of storage nodes is refreshed automatic ally based on events , th e data may not be retrieved immediately from the manag ement server due to some lat [...]
-
Page 329
329 Copyright © Acronis, Inc., 2000 - 2010 Archives - the total number of archives stored in all th e vaults managed by the storage node Backups - the total nu m ber of backups stored within th e archives in all the vaults managed by the storage node. Vaults This tab displays a lis t o f th e v aults, managed by the storage n ode. To open [...]
-
Page 330
330 Copyright © Acronis, Inc., 2000 - 2010 View a task's log Click View log . The Log (p. 331 ) vi ew will display a list of th e log entries related to the selected task. Run a task Click Run . The task will be executed i mmediately in spit e of its schedu le. Stop a task Click Stop . What will happen if I stop the task? Generally, stopping [...]
-
Page 331
331 Copyright © Acronis, Inc., 2000 - 2010 Refresh tasks table Click Refresh . The management con sole will update the l ist of tasks existing on the machines with the most recent infor mation. Though th e list of tasks is refreshed automatically based on events, the data may no t be retrieved immediately from the managed machine due to some laten[...]
-
Page 332
332 Copyright © Acronis, Inc., 2000 - 2010 personal vaults, ex ecuting a recovery task, will g enerate events logged in t he loca l event log. Physically, a loc al event log is a collection o f XML fil es stored on the machine. Th e managed machine local event log is ac cessible when the console is co nnected t o the machine. Local ev ent loggin g[...]
-
Page 333
333 Copyright © Acronis, Inc., 2000 - 2010 To Do Select a single log entry Click on it. Select multiple log entries non -contiguous : hold down CTRL and click the log entries one by on e contiguou s : select a single log entry, th en hold down SHIFT and click another entry. All the entries b etween the first and last s elections will be se[...]
-
Page 334
334 Copyright © Acronis, Inc., 2000 - 2010 Filter log entries by the original backup p lan or managed entity typ e Under the Backu p plan (or Managed en tity type ) column h eader, select the backup plan or the type of managed entity from the list. Filter log entries by task, managed entity, machine, code, owner Type the required value (task name,[...]
-
Page 335
335 Copyright © Acronis, Inc., 2000 - 2010 ------------------- -------- Log Entry Details ------------- -------------- Type: Information Date and time: DD.MM.YYYY HH:MM:SS Backup plan: Backup plan name Task: Task name Managed entity type : Machine Managed entity: ENTITY_NAME Machine: MACHINE_NAME Message: Description of the operation Code: 12(3x45[...]
-
Page 336
336 Copyright © Acronis, Inc., 2000 - 2010 the tables. You can expo rt the re port to an XML file and open it later using Microsoft Excel or Microsoft Access. 7. 1. 8.1 Re po r t a bo ut t he ma ch in es In this view, you c an gener ate a report about the m achines that ar e regis te red o n the manage ment server. This repor t consists of one or [...]
-
Page 337
337 Copyright © Acronis, Inc., 2000 - 2010 Schedule : The type s of the backup policies' schedules — Manual and/or Schedule d . Manual schedule means that th e corresponding centralized b ackup plan runs only when y ou start i t manually. Owner : The list o f users wh o created the backup policies. With the default fil ter settings,[...]
-
Page 338
338 Copyright © Acronis, Inc., 2000 - 2010 Filters Under Filters , choos e which tasks to include in th e report. Onl y t he task s t hat m eet all filter crite ria are included. Origin : The types of origin of the tasks — Centralized , Local , and/or Local without ba c kup plan . A centralized task bel o ngs to a centralized backup plan. A [...]
-
Page 339
339 Copyright © Acronis, Inc., 2000 - 2010 Report view Under Report vie w , choos e how the report will look: Select whether t o show all items in a single table or to group them by a par ticular column. Specify which table co lu mns to show, and in which order. Specify how to sor t the tab le. 7. 1. 8.6 Re po r t a bo ut t he va ul ts[...]
-
Page 340
340 Copyright © Acronis, Inc., 2000 - 2010 Backup policie s (centralize d tasks only): The backup policies o n which the tasks are based. The default setting means all backup policies that ever exi sted during the report peri od. Machines : The lis t of machi nes on which the tasks exis t. Type : The task typ es — for e xample, disk [...]
-
Page 341
341 Copyright © Acronis, Inc., 2000 - 2010 By using the grap hical user interface (GUI) By modifying the Windows registry In Linux, instead of using the administrati ve template and m odifying the registry, parameters are configured by editing t he c o rrespondin g configuration files. If the values of an y of thes e parameters set through[...]
-
Page 342
342 Copyright © Acronis, Inc., 2000 - 2010 http://msdn2.micr oso ft.com/ en-us/library/aa3741 77.aspx 7. 2. 1.2 A cro ni s Bac ku p & R ec ov er y 10 S tor ag e N od e The following are the parameters of Acronis Backup & Recover y 10 Storage Nod e that can be set by using Acronis Ad m inistrati ve Template. Client Connectio n Limit Descrip[...]
-
Page 343
343 Copyright © Acronis, Inc., 2000 - 2010 In this case, the co m ponen t's connection to the storag e no de will fail. If the component is an Acronis Backup & Rec overy 10 Agent, the corre sponding backup or recov ery task will stop with the Failed status. Vault Warnings and Limits Specifies the a m ount of fre e space in a vault (both a[...]
-
Page 344
344 Copyright © Acronis, Inc., 2000 - 2010 When the amount o f free s pace in a vault is equal to the value in Vault Free Spa ce Error Limit or less, an erro r is re co rded in t he storag e node's l og. Backups performed to the v ault will keep failing until the vault' s free space is above the limit. Vault Databa se Free Space Warning [...]
-
Page 345
345 Copyright © Acronis, Inc., 2000 - 2010 Possible values: 0 (Internal event), 1 (Debuggin g information), 2 (Information) , 3 (Warni ng), 4 (Error), or 5 (Critic al error) Default value: 0 (all entries will be collected) Log Cleanup Ru les Specifies how to clean up the centralized e v ent log s tored in the management server's rep orting da[...]
-
Page 346
346 Copyright © Acronis, Inc., 2000 - 2010 Trace Level Description: Specifi es the minimu m level of se v erity o f events f o r sending SN MP notifications about them. Only n otifications about events of levels greater than or equal t o Trace Level will be sent. Possible values: 0 (Internal event), 1 (Debuggin g information), 2 (Information) , 3 [...]
-
Page 347
347 Copyright © Acronis, Inc., 2000 - 2010 Each worker perf o rms sync hronization for exactly one m achine a t a time. A connected machine to be synchronized waits f or an available worker. For this reason, the actual number of w o rkers will never exceed the maxi m um number o f conn ections (see Maximum Connect ions described pre v iously). Per[...]
-
Page 348
348 Copyright © Acronis, Inc., 2000 - 2010 When connecting t o a regis tered machine, Acronis Backup & Rec overy 10 Manag ement Server first uses th e machine's network nam e — provided that the machine was added to the management ser v er by na me. If Second Conn ec tion Attempt is s et to True and a connection to the machine by using [...]
-
Page 349
349 Copyright © Acronis, Inc., 2000 - 2010 Snapsho t Storage Absolute Size Description: Specifi es the initial size of the snapsho t storage, in megabytes. Possible values: An y intege r number between 0 and 214 7 483647 Default value: 0 If this setting is 0 , th e management server uses the Snap shot Storage Relati v e S i ze setting. The initial[...]
-
Page 350
350 Copyright © Acronis, Inc., 2000 - 2010 If Acronis License Ser ver is unavailable, Acronis Ba ckup & Recovery 10 will c ontinue working with full functionality fo r th e number of days specified in Maximum Time Witho ut License Server , as counted fr om the moment of installat ion o r fro m the last successful chec k. License Server Conn ec[...]
-
Page 351
351 Copyright © Acronis, Inc., 2000 - 2010 Default value: 4 ( o nly error s and critical errors will be record ed — if Trace State is set to True ) SNMP Specifies the types o f the a gent's events to send notifications about by means of Simple Network Management Pr o tocol (SN MP). This parameter has th e following settings: Trace State Des[...]
-
Page 352
352 Copyright © Acronis, Inc., 2000 - 2010 You can specify a l o cal fold er o n an y volume, inclu ding a volume you are bac king up. Snapsho t Storage Absolute Size De scription: Spe cifies the initial size of the snap shot storage, in megaby te s. Possible values: An y intege r number between 0 and 214 7 483647 Default value: 0 If this setting [...]
-
Page 353
353 Copyright © Acronis, Inc., 2000 - 2010 The component will us e the default settings, which is to use encryption if po ssible and to trust self-signed SS L certificates (see the following option). Enabled Encryption is enabl ed. I n Encryptio n , se lect o ne of th e following: Enabled Data transfer will be encrypted if encrypti o n is enable d[...]
-
Page 354
354 Copyright © Acronis, Inc., 2000 - 2010 Disabled Encryption is disabled ; any connection to a client application which requires encryption will not be establish ed. Required Data transfer will be performed only if encr y ption is e nabled on the client applic atio n (see "Client Encrypti o n options"); it will be encrypted. Authentica[...]
-
Page 355
355 Copyright © Acronis, Inc., 2000 - 2010 File Trace Mini mal Level Description: Specifi es the minimum severity le v el of event s to be recorded in the file. Only even ts of levels greater than or eq ual to File Tra c e Minimal Level will be r ecorded. Possible values: An y severit y level from Unknown throug h C ritical , or B locked to not re[...]
-
Page 356
356 Copyright © Acronis, Inc., 2000 - 2010 7 . 2 . 3 P a r a m e t e r s s e t t h r o u gh W i n d o ws r e g i s t r y The following are the parameters of Acronis Backup & Recover y 10 Storag e Node that can be set only by editing the regist ry. Parameter related to dedupli cation CompactingTrigge rT h reshold Description: Specifi es the per[...]
-
Page 357
357 Copyright © Acronis, Inc., 2000 - 2010 Registry key: HKEY_LOCAL_MACHINE SOFTWARE Acronis ASN ConfigurationStorageN ode Databas ePath TapesDataba sePath Description: Specifi es the folder where Acronis Backu p & Recovery 10 Storage N ode stores its tape vaults database. This database con tains a list of tape vaults that a re managed [...]
-
Page 358
358 Copyright © Acronis, Inc., 2000 - 2010 Exclusions (p. 365) [Optional] Set up ex clusions for the specific types o f fil es you do not wish to back up. To access this option, se lect the Advanced view check box. Where to back up Archive (p. 366) Specify the path to the loca tio n, where the backup archive will be stored, and t he archive name. [...]
-
Page 359
359 Copyright © Acronis, Inc., 2000 - 2010 By setting up regular conversion, you obtain a copy of your server or workstati on on a virtual machine which can b e readily powered on in case the o riginal ma chine fails. The conversion can be performed by any m achine that is registered on the m anagement server and has Acr onis Backup & Recovery[...]
-
Page 360
360 Copyright © Acronis, Inc., 2000 - 2010 2. Click OK . To learn more ab out Acronis service credential s, see the Rights for Acronis servi ces (p. 81 ) sec tio n. To learn more ab out operations available depend ing on the user privileges, s ee the User privileges o n a managed machi ne (p. 31 ) se ction. 7 . 3 . 2 I t e m s t o b a c k u p Spec[...]
-
Page 361
361 Copyright © Acronis, Inc., 2000 - 2010 Boot volume Type or select: [BO OT] Refers to the registered ma chine's boot volume. The boot volume contain s the Windows folder and the suppo rting files for the Windows operating sy stem (typically located in the Windo wsSystem32 fold er). It may or may no t be the same as the system volume. If m[...]
-
Page 362
362 Copyright © Acronis, Inc., 2000 - 2010 Linux A volume backup s to res all files a nd folders o f the sel ected volume independent o f their attributes, a boot re cord a nd the file system super block. A disk backup stor es all disk volumes as well as the zero track with th e master boot record. Volumes with unsup ported file systems will be ba[...]
-
Page 363
363 Copyright © Acronis, Inc., 2000 - 2010 In general, the standard name for a Linux partition c onsists of three components : Disk type; hd f or IDE drives, sd for SCSI drives, md for software RAID drives (for example, dyna mic volumes); Disk number; a f o r the first disk, b for the second disk, etc.; Partition number o n the disk; 1[...]
-
Page 364
364 Copyright © Acronis, Inc., 2000 - 2010 Windows Full path Point to the folders an d files to be bac ked up. If you specified a path t o a file or folder explicitl y, the policy will back up t his ite m on each machine where this e xact path will be found. To i ncl ude I n th e Fi les a nd fol ders co lu mn, ty pe or sel ec t: File Text.doc in f[...]
-
Page 365
365 Copyright © Acronis, Inc., 2000 - 2010 Linux To i ncl ude I n th e Fi les a nd fol ders co lu mn, ty pe or sel ec t: Text file file.txt on the volume /dev/hda3 mounted on /home/usr/docs /dev/hda3/file.txt or /home/usr/do cs/file.txt Home directory of the common users /home The root user's home directory /root Directory for all user- relat[...]
-
Page 366
366 Copyright © Acronis, Inc., 2000 - 2010 Exclude all system f il es an d folders This option is effec tive only for fil e systems that are sup po rted by Wind ows. Select this check box to skip files and folder s with the System attribute. If a folder is System , all of its c o ntents — including files that ar e not System — will be excl[...]
-
Page 367
367 Copyright © Acronis, Inc., 2000 - 2010 1. Selecting the archiv es destination Choose where to st o re ma chines' archives: Store all machines' arch ives in a single location To back up data to Acr onis Online Backup Storage , c lick Log in and spe cify the credentials t o log in to the online st o rage . Then, expand the On l[...]
-
Page 368
368 Copyright © Acronis, Inc., 2000 - 2010 FINDEPT2_SYSTE M _BACKU P_Archive1 FINDEPT3_SYSTE M _BACKU P_Archive1 2. Click OK. The name looks lik e ArchiveN, where N is a sequen ce number. If the program fin ds that the archive Archive1 is alr eady stored i n the location, it w ill auto m atically sugg est the name Archive2. 7 . 3 . 6 A c c e s s c[...]
-
Page 369
369 Copyright © Acronis, Inc., 2000 - 2010 backup levels, you automatically obtain the rollba ck period – the guaranteed nu m ber of sessi ons that you can go bac k at any t ime. The aut o matic cl eanup mechanism maintains the required rollback period b y deleting the expired backups and ke eping the most recent back ups of each level. Cust[...]
-
Page 370
370 Copyright © Acronis, Inc., 2000 - 2010 Custom retention peri ods for backups of each type Description Let us suppose that w e wa nt to set up a backup plan that will r egularly produce a series o f daily ( D ), weekly (W), and monthly (M) backups. Here is a natur al way to do this: the follo wing table shows a sample two-month p erio d for[...]
-
Page 371
371 Copyright © Acronis, Inc., 2000 - 2010 Keep backup s: Specifies how long you want the backups to be stored in the archi ve. A term can be set in ho urs, d ays, weeks, months, or yea rs. For monthly backups, you can al so select Keep indefinitely if you want them t o be saved forever. The default value s for each backup t ype are as follows. Da[...]
-
Page 372
372 Copyright © Acronis, Inc., 2000 - 2010 Limited storage If you do not want to arran ge a vast amount of space t o store a hug e archive, y o u ma y set up a GFS scheme so as t o make y our backups m ore short-lived, at the same time ensuring that your information can be r ecovered in case of an accid ental data loss. Suppose that you ne ed to: [...]
-
Page 373
373 Copyright © Acronis, Inc., 2000 - 2010 Here, daily incre m ental bac kups will be created on Tue sdays and Thursdays, with wee kly and monthly backups perf ormed on Fridays. Note that , in order to choose Friday in the Wee kly/monthly field, you need t o first sele ct it in the Back up on field. Such an archive w o uld allow y ou to compare yo[...]
-
Page 374
374 Copyright © Acronis, Inc., 2000 - 2010 Recur: Every 1 da y Frequency: Once at 6 PM Number of levels : 4 This is how the first 14 days (or 14 sessions) of this s cheme's schedule look. Sha ded numbers denote backup levels. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of differen t levels have different types[...]
-
Page 375
375 Copyright © Acronis, Inc., 2000 - 2010 A new level 3 differential backup has not yet been cr eated, so the backup of da y five is st ill stor ed. Since it depends on the full backup of day one, that ba ckup is available as well. This enables us to go as far back as 11 days, which is the best-case scenario. The following day, h owever, a new th[...]
-
Page 376
376 Copyright © Acronis, Inc., 2000 - 2010 The archive will be clean ed up only du ring backup and only if there is not eno ugh space to create a n ew backup. In this case, the program will act as follows: Delete the oldest full backu p with all dependent incre mental/differential backups If there is only one full b ackup left and a full b[...]
-
Page 377
377 Copyright © Acronis, Inc., 2000 - 2010 Retention rules: D elete backups older than 12 mo nths Apply the rule s: After backing up By default, a one-y ear-old fu ll backup will not be delet ed until all increm ental backups that depend on it become subjec t to deletion too. For more inf ormation, see Retention rules (p. 41 ). Monthly full, weekl[...]
-
Page 378
378 Copyright © Acronis, Inc., 2000 - 2010 In the first of the pr ev ious examples, we set up a sched ule o nly for full backups. H ow ever , the scheme will still r esult in three backup tasks, enablin g you to manually start a bac kup of any type: Full backup, runs e v ery Frid ay at 10:00 PM Incremental backup, runs manually Differe[...]
-
Page 379
379 Copyright © Acronis, Inc., 2000 - 2010 8 O n lin e bac ku p This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Onli ne Backup Storage. Acronis Backup & Re covery 10 Online might b e unav ailable in your region. To find more informatio [...]
-
Page 380
380 Copyright © Acronis, Inc., 2000 - 2010 8 . 1 . 2 W h a t d at a c a n I b a c k u p a n d r e c o v er ? You can back up fil es, vo lu m es, disks, o r the entire ph ysical machine as often as you wish. Unlike most online backup so lutio ns, Acronis Backup & Recovery 10 Onli ne enables bare metal recovery directly from the online storage. [...]
-
Page 381
381 Copyright © Acronis, Inc., 2000 - 2010 Host-based bac kup is available only for paid lice nses of VMware ESXi. Choose the below approach if yo ur ESXi Server uses a free license. Install Acronis software into the guest system The machine will be treated as a physical one. Y o u will need a s eparate server or work stat ion subscription for thi[...]
-
Page 382
382 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 6.4 Wh at i f a n et wo rk con n ect io n is lo st du rin g on lin e ba ck up or r ec ov er y? The software will tr y to reach the online storag e every 30 seconds. Aft er five unsuccessful attempts the backup or rec o very tas k will fail. You can change th e number of attempts and the in terval be[...]
-
Page 383
383 Copyright © Acronis, Inc., 2000 - 2010 The hard disk drive is sent back to you but it is not possib le to recover from it. How ev er, reco v ery from a locally att ached device is possible with the Large scale recovery (p. 38 7 ) option. 8. 1. 7.2 Wh y wo ul d I w an t to us e I ni ti al Se ed in g? This service helps yo u save time and networ[...]
-
Page 384
384 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 7.8 Ho w to p er fo r m in it ia l s ee din g? 1. Decide on the media (p. 383 ) that you will send . 2. Attach the media t o the m achine you are going to back up . Alternatively, you can back up to a local or network f o lder and t hen copy /move the backu p to the media. 3. Start Acronis Backup &a[...]
-
Page 385
385 Copyright © Acronis, Inc., 2000 - 2010 St ep 1 Delicately rem o ve your har d disk drive from the machi ne. St ep 2 Place the hard dri v e into a n anti-static bag to protect the drive from electrostatic discharge. If you do not have an anti-stati c bag, simply wrap the hard dri ve into aluminum foil. St ep 3 Use a sturdy box that is at least [...]
-
Page 386
386 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this company's web site, prepare and print two prepaid ship ping labels: 1. Shipping label for sending your hard drive. This lab el is placed on the top of the box. You sh o uld send your packag e to one of the Acr onis data [...]
-
Page 387
387 Copyright © Acronis, Inc., 2000 - 2010 An order was created – The first ba ckup is about to start and the license cannot be used for any other machine. Fro m this p oint on, you can cancel the order if somethin g goes wrong. This will return the license to the pool of available licenses. A full backup ha s started – This sta tus is[...]
-
Page 388
388 Copyright © Acronis, Inc., 2000 - 2010 Once you order Large Scale Recovery for a particular machine, Acronis send s you a USB hard disk drive with all of th e backup s m ade fro m this machine. Yo u can recover data dir ectly from the disk or copy the backups t o a local or ne twork folder. 8. 1. 8.2 Wh y wo ul d I u se La rg e S ca le R ec ov[...]
-
Page 389
389 Copyright © Acronis, Inc., 2000 - 2010 can cancel the order if something goes wrong. This will return the license t o the p o ol of availab le licenses. The order is bein g processed - Order processing in th e datacenter started. Writing data – Y o ur backu ps are being writt en o nto t he media. From this point o n, you cann ot canc[...]
-
Page 390
390 Copyright © Acronis, Inc., 2000 - 2010 If you purchased your sub scriptions online using th e Acronis Web sit e, they are available im m ediately on your account manag ement Web page. The ne wly obtained subscriptions are listed at the Manage Subscriptions tab. 8. 1. 9.3 Wh en d oes m y su bsc ri pt ion b eg in? Your subscription begins when y[...]
-
Page 391
391 Copyright © Acronis, Inc., 2000 - 2010 Wh at d oes " Au to -r en ew " me an ? Auto-renewal means that when the current subscrip tion expires, th e next subscription will be automatically select ed from the available sub scription s. The next subscrip tion must be identical t o the current subscripti on. If an identical subscrip tion [...]
-
Page 392
392 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 R2 - the Standard, Enterprise, S mall Business Ser v er, Datac enter, Foundation editio ns Windows MultiP o int Serve r 2 010 Workstation ope rating systems supported by Acronis Backup & Recovery 10 Onl i ne: Windows 2000 P rofessi o nal SP4 Windows XP Prof essiona[...]
-
Page 393
393 Copyright © Acronis, Inc., 2000 - 2010 As soon as a subscripti on is activated, its subscripti o n period st arts. To avoid losing sub scription time, activate th e subscription only when you ar e ready to back up the ma chine. If a machine alre ady has a subscription, the new sub scription will replace the old one. You can reassign th[...]
-
Page 394
394 Copyright © Acronis, Inc., 2000 - 2010 Depending on y our settings, this ba ckup will be e ither full or incremental. But its size is not likely to be less than a full bac kup size. Therefore, it is not prac tical to reassign a subscript io n to a machin e whose first backup wa s done as an initial seeding. Yo u will need to either redo th e i[...]
-
Page 395
395 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure p rox y s et ti ng s for an a gen t 1. Connect the cons ole to the machine fo r which yo u wa nt to configure proxy setting s. 2. In the Options m enu, located on the toolbar, click Machine option s . 3. Click Online ba ckup proxy . 4. Enter the proxy ser ver settings. For detailed informa[...]
-
Page 396
396 Copyright © Acronis, Inc., 2000 - 2010 Dual destinat i on (p. 116) By using the Ba c kup perfo rmance > Network connection speed option, you can vary the transferring speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up. 8. 7 Te[...]
-
Page 397
397 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration code A character string f o r regist ering a subscription or lice nse that was bough t from an Acronis partner. When you purchase such subscriptions o r licenses, you receive a confirma tio n e[...]
-
Page 398
398 Copyright © Acronis, Inc., 2000 - 2010 9 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af te r the s y stem recovery is start ed. The system boots from the backup (p. 404) and the machin e become s operational and r eady to provide necessary services. The data require[...]
-
Page 399
399 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation of loaders other tha n Windows loaders and GR UB. A gen t (A cr on is B ack up & Re cov er y 10 A ge nt ) An application that perf orms data backup and rec o very and enables other m ana gement operati o ns on the machine (p. 4 07), such as tas k management and op[...]
-
Page 400
400 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati on (p. 399), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup strea m or data compression level. Back up options are a part of a backup plan (p. 400 ). Ba cku p pla n ( Pl an ) A set of rules that speci[...]
-
Page 401
401 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 399 ) installed o n the m achine finds da ta items using the selecti on rules. For example, if the selection rule is [A ll volumes], the entire machin e will be backed up. 5. On each machine, the agen t installed on th e machine create s a backup plan (p. 400) using other[...]
-
Page 402
402 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is n o way to remove a physical machine from th e built-in group exc ept for re m oving the machine from the managem ent server. Virtual machin es are removed as a [...]
-
Page 403
403 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 3 99) from a backup archive (p. 399) in order to get rid o f outdated backups o r prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p. 40 0) that produces the archi v e. This o per[...]
-
Page 404
404 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma nag em en t Any management o peratio n that is performed on a managed machine (p. 407 ) using the direc t console (p. 403)-agen t (p. 399) connection (as oppose d to centralized manageme nt (p. 402) when the operations are c o nfigured o n the manag ement server (p. 408) and propagat ed by the[...]
-
Page 405
405 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Man agem ent http://support.micr o soft.c o m/kb/222 1 89/EN-US/ D yna mi c di sk A hard disk manag ed by Log ical D isk Manag er (LDM) that is availab le in Windows starting with Windows 2000. L DM helps flexibly all ocate volumes on a storage de vice [...]
-
Page 406
406 Copyright © Acronis, Inc., 2000 - 2010 the administrator chang es the criteria so tha t the mac hine does not meet them a nymore. There is no way t o remove a m achine from a dynamic group manuall y e xcept fo r deleting the machine from th e management server. D yna mi c v ol um e Any volume l ocated on dynamic dis ks (p. 40 5 ), or mor e[...]
-
Page 407
407 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 399) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecove r th e data from a full backup. G GF S ( Gr and fa th er -Fa t h er-S on ) A popular backup sche me (p. 40 1) aimed to main tain the optimal balance betwe e[...]
-
Page 408
408 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d va ult A centralized vault (p. 402) managed by a storag e no de (p. 409 ). Archiv es (p. 399) in a man aged vault can be accessed as f o llows : bsp:// node _address/vault_name/archiv e_name/ Physically, managed vaults can reside on a network share, SAN, NAS, o n a hard dr ive local to the stor[...]
-
Page 409
409 Copyright © Acronis, Inc., 2000 - 2010 P lan Se e Backup plan (p. 4 0 0 ). P oli cy See Backup policy (p. 400 ). R Re co ver y po in t Date and time to w hich th e backed up data can be rev erte d to. Re gi st ere d ma ch in e A machine (p. 407) managed by a manage ment server (p. 408). A machine can be registered on o nly one management se rv[...]
-
Page 410
410 Copyright © Acronis, Inc., 2000 - 2010 prevent access to the backup archives, even in c ase the storage medium is stolen or access ed by a malefactor, by usi ng encr y pted vaults (p. 406 ). S tor ag e nod e- sid e cl ea nu p Cleanup (p. 402) perf ormed by a storage node (p. 409) according t o the backup p lans (p. 400) that produce the ar[...]