Acronis® Backup & Recovery ™ 10 Server for Linux User's Guide
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware is a registered trademark of VMware, Inc. Windows and MS-DOS are registered trademarks of Microsoft Corporation.
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ......................................................... 6 1.1. Acronis Backup & Recovery 10 overview ............................................................................ 6 1.2. Getting started .................................................................................................................... 6 1.2.1. 1.3. 1.3.1. 1.3.2. 1.3.3. Using the management console .........................................................
. Vaults .................................................................................................................. 73 4.1. 4.1.1. 4.1.2. 4.2. 4.2.1. 4.2.2. 4.2.3. 4.2.4. 5. Personal vaults .................................................................................................................. 74 Working with the "Personal vault" view .................................................................................................. 74 Actions on personal vaults .......................
6.5. 6.5.1. 6.5.2. 6.5.3. 6.5.4. Mounting an image ......................................................................................................... 142 Archive selection ......................................................................................................................................143 Backup selection ......................................................................................................................................144 Access credentials ....................
1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
3. Connect the console to the machine where the agent is installed. Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the GUI elements see "Using the management console (p. 7)". 1.2.1. Using the management console As soon as the console connects to a managed machine (p. 178) or to a management server (p.
Navigation tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you perform all the operations, available on both panes. Menu items change dynamically. 1024x768 or higher display resolution is required for comfortable work with the management console. 1.2.1.1. "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar. Navigation tree The Navigation tree enables you to navigate across the program views.
1.2.1.2. "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu. Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Clicking the action opens the respective action page (p. 12).
"Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3.
1.2.1.4. Main area, views and action pages The main area is a basic place where you work with the console. Here you create, edit and manage backup plans, policies, tasks and perform other operations. The main area displays different views and action pages according the items you select in the menu, Navigation tree, or on the Actions and Tools pane. Views A view appears on the main area when clicking any item in the Navigation tree in the Navigation pane (p. 8).
Action pages An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc.
Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu. Or, if you have passed several steps forward, click the Down arrow and select the page where you started the plan creation from the list. Thus, you can perform the remaining steps and accomplish the backup plan creation.
File backup File-level data protection is based on backing up files and directories residing on the machine where the agent is installed or on a network share accessed using the smb or nfs protocol. Files can be recovered to their original location or to another place. It is possible to recover all files and directories that were backed up or select which of them to recover. 1.3.2.
These packages should be available in the repository of your Linux distribution. 1.5.
1.7. Technical support As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available, you may electronically access at no additional charge, Support services for the Software, which Acronis shall endeavor to make available twenty four (24) hours a day, seven (7) days per week.
2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1. Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. 18 Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-by-sector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2. Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: • • you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.
specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3.
Archive owner An archive owner is the user who saved the archive to the destination. To be more precise, this is the user whose account was specified when creating the backup plan in the Where to back up step. By default, the plan's credentials are used. Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When creating a plan or a task, you have the option to explicitly specify an account under which the plan or the task will run.
GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme. Tape rotation schemes, as such, do not provide automation. They just determine: • how many tapes you need to enable recovery with the desired resolution (time interval between recovery points) and roll-back period • which tapes you should overwrite with the forthcoming backup. Tape rotation schemes enable you to get by with the minimal number of cartridges and not to be buried in used tapes.
The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full. The Weekly/Monthly parameter splits the total schedule into daily, weekly and monthly schedules.
“D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M” stands for the backup that is considered Monthly. An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups will start to be deleted.
The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full backup will be deleted as soon as all differential and incremental backups based on this backup are deleted. An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months 2.6.
For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi backup scheme is based on the same patterns. It operates with Sessions instead of Moves and with Backup levels instead of Rings. Commonly an N-level scheme pattern contains (Nth power of two) sessions. So, the five-level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions (moves from 1 to 16 in the above figure).
• • differential backups on all intermediate levels (B, C and D for five-level pattern) • the scheme forces every backup level to keep only the most recent backup, other backups from the level have to be deleted; however backup deletion is postponed in cases where the backup is a base for another incremental or differential one • an old backup on a level is kept until a new backup has been successfully created on the level.
to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the archive size within This is the maximum size of the archive. Every time a retention rule is applied, the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value. The diagram below shows the archive content before and after the deletion.
Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Example Delete backups older than = 3 Months Keep the archive size within = 200GB Never delete backups younger than = 10 Days • Every time the retention rules are applied, the program will delete all backups created more than 3 months (or more exactly, 90 days) ago.
This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you specify. The consolidation, however, may take a lot of time and system resources. And you still need some extra space in the vault for temporary files created during consolidation. What you need to know about consolidation Please be aware that consolidation is just a method of deletion but not an alternative to deletion.
This will save the machine's logical volume structure to the /etc/Acronis directory. Include the volume with this directory to the list of volumes to back up. Before the recovery, use the restoreraids.sh script in bootable media to create the structure. • Alternatively, use the lvm utility to create the structure manually, and then perform the recovery. You can perform this procedure either in Linux or in bootable media.
To back up the logical DYN1 volume by using the command-line interface, run the following command (here, the name of the backup is assumed to be /home/backup.tib): trueimagecmd --partition:dyn1 --filename:/home/backup.tib --create Helpful link: • http://tldp.org/HOWTO/LVM-HOWTO/ 2.9. Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recover Linux Software RAID devices (known as multiple-disk devices or MD devices) and hardware RAID arrays.
You can back up the RAID array as follows: trueimagecmd progress:on --create --partition:DYN1 --filename:/tmp/raid.tib -- In the Graphical User Interface you can select the DYN1 check box. Recovery Parameters of software RAID arrays are not backed up, so they can only be recovered over a basic volume, to unallocated space, or to a previously configured array. Recovery can be performed in Linux or a Linux-based bootable media.
2.10.1. Tape compatibility table The following table summarizes the readability of tapes written by Acronis True Image Echo and Acronis True Image 9.1 product families in Acronis Backup & Recovery 10. The table also illustrates the compatibility of tapes written by various components of Acronis Backup & Recovery 10. ...is readable on a tape device attached to a machine with... Tape written on a locally attached tape device (tape drive or tape library) by...
Backup to a locally attached tape device When creating a backup plan, you are able to select the locally attached tape device as the backup destination. An archive name is not needed when backing up to a tape. An archive can span multiple tapes but can contain only one full backup and an unlimited number of incremental backups. Every time you create a full backup, you start with a new tape and create a new archive. As soon as the tape is full, a dialog window with a request to insert a new tape will appear.
Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
2.11.2. Acronis Startup Recovery Manager A modification of the bootable agent (p. 172) can be placed on a system disk and configured to start at boot time when F11 is pressed. This eliminates the need for rescue media or network connection to start the bootable rescue utility. This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users.
3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1. Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.1.
The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displaying of pop-up messages is disabled, you can review the task execution states and results in the Tasks view. The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3.
3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
You can further override the settings set in the default backup and recovery options, when creating a backup plan or a recovery task. The settings you obtain in this case will be plan-specific or taskspecific. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.
SNMP can be configured using the snmpconf command. The default configuration files are located in the /etc/snmp directory: • • /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd.conf - configuration file for the Net-SNMP trap daemon. 3.2.2. Log cleanup rules This option specifies how to clean up the Acronis Backup & Recovery 10 agent log.
Agent for Linux Bootable media (Linux-based) Disk backup File backup Disk backup File backup + + + + Source files exclusion (p. 48) + + + + Pre/Post backup commands (p. 49) + + - - Pre/Post data capture commands (p. 50) + + - - File-level backup snapshot (p. 52) - + - - Compression level (p. 53) + + + + + + - - HDD writing speed (p. 54) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p.
Overwrite data on a tape without prompting user for confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after backup is finished Dest: removable media Dest: removable media Dest: removable media Dest: removable media Ask for first media while creating backup archives on removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Validate backup after creation - - + + Reboot after the backup - - + + E-mail (p.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the disk or in the backup file; the password hash is used for verification purposes. With this two-level security, the backup data is protected from any unauthorized access, but recovering a lost password is not possible. 3.3.1.2. Source files exclusion This option is effective for Windows and Linux operating systems and bootable media.
Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. The above settings are not effective for the files or folders that were explicitly selected for backup. For example, assume that you selected the folder MyFolder and the file MyFile.tmp outside that folder, and selected to skip all .tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skipped. 3.3.1.3.
Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not back up until the command execution is complete Selected Selected Cleared Cleared Result Preset Perform the backup only after the command is successfully executed. Fail the task if the command execution fails. Perform the backup after the command is executed despite execution failure or success.
If the Volume Shadow Copy Service option is enabled, the commands' execution and the Microsoft VSS actions will be sequenced as follows: "Before data capture” commands -> VSS Suspend -> Data capture -> VSS Resume -> "After data capture" commands. Using the pre/post data capture commands, you can suspend and resume a database or application that is not compatible with VSS. As opposed to the Pre/Post commands (p.
Post-data capture command To specify a command/batch file to be executed after data capture 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. 4.
• Create a snapshot if it is possible Back up files directly if taking a snapshot is not possible. • Do not create a snapshot Always back up files directly. Administrator or Backup Operator privileges are not required. Trying to back up files that are opened for exclusive access will result in a read error. Files in the backup may be not time-consistent. 3.3.1.6. Compression level This option is effective for Windows and Linux operating systems and bootable media.
The preset is: Low. To specify the backup process priority Select one of the following: • Low – to minimize resources taken by the backup process, leaving more resources to other processes running on the machine • Normal – to run the backup process with normal speed, allocating resources on a par with other processes • High – to maximize the backup process speed by taking resources from other processes.
• Click Transferring speed stated as a percentage of the estimated maximum speed of the network connection, and then drag the slider or type a percentage in the box • Click Transferring speed stated in kilobytes per second, and then enter the bandwidth limit for transferring backup data in kilobytes per second. 3.3.1.8. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service.
o Select the Use the specified outgoing mail server check box to enable an SMTP server and to set up its settings: • • • Outgoing mail server (SMTP) – enter the name of the SMTP server. • Password – enter the password. Port – set the port of the SMTP server. By default, the port is set to 25. User name – enter the user name. 6. Click Send test e-mail message to check if the settings are correct.
The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.
The option defines how a backup can be split. The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis Backup & Recovery 10 will act as follows. • When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size.
you are planning to use Acronis One-Click Restore, include all the volumes in the backup. Any volumes missing from the backup will be lost. • Bootable agent is a bootable rescue utility (based on Linux kernel) that includes most of the functionality of the Acronis Backup & Recovery 10 agent. Put this component on the media if you want more functionality during recovery.
folder or network share. Managed vaults and FTP servers are not supported as secondary destinations. The preset is: Disabled. When dual destination is enabled, the agent will automatically copy each backup being created locally to the secondary destination such as a network share.
To handle the situation when the conditions are not met for too long and further delaying the backup is becoming risky, you can set the time interval after which the task will run irrespective of the condition. Select the Run the task anyway after check box and specify the time interval. The task will start as soon as the conditions are met OR the maximum time delay lapses, depending on which comes first.
The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts. The program stops trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depending on which comes first. If the task fails because of a mistake in the backup plan, you can edit the plan while the task is in the Idle state.
The preset is: Enabled. When the option is enabled, backing up to removable media may be not possible if the user is away, because the program will wait for someone to press OK in the prompt box. Hence, you should disable the prompt when scheduling a backup to removable media. Then, if the removable media is available (for example, a DVD is inserted), the task can run unattended. Reset archive bit The option is effective only for file-level backup in Windows operating systems and in bootable media.
Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node. The eventual size of the backup in the vault is independent of whether deduplication at source is turned on. Deduplication at source and deduplication at target are described in Deduplication overview. Save software RAID and LVM metadata along with backups This option is effective only for disk-level backups of machines running Linux. The preset is: Enabled.
The following table summarizes the availability of the recovery options. Agent for Linux Bootable media (Linux-based or PEbased) Disk recovery File recovery Disk recovery (also from a disk backup) File recovery (also from a disk backup) Pre/Post recovery commands (p. 66) + + PE only PE only Recovery priority (p.
3.3.2.1. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the data recovery. Example of how you can use the pre/post commands: • launch the Checkdisk command in order to find and fix logical file system errors, physical errors or bad sectors to be started before the recovery starts or after the recovery ends.
Perform the recovery only after the command is successfully executed. Fail the task if the command execution failed. the command is executed despite execution failure or success. concurrently with the command execution and irrespective of the command execution result. Post-recovery command To specify a command/executable file to be executed after the recovery is completed 1. In the Command field, type a command or browse to a batch file. 2.
3.3.2.3. File-level security This option is effective only for recovery from file-level backup of Windows files. This option defines whether to recover NTFS permissions for files along with the files. The preset is: Recover files with their security settings. If the file NTFS permissions were preserved during backup, you can choose whether to recover the permissions or let the files inherit the NTFS permissions from the folder to which they are recovered. 3.3.2.4.
• • Port – set the port of the POP server. By default, the port is set to 110. User name – enter the user name • o Password – enter the password. Select the Use the specified outgoing mail server check box to enable an SMTP server and to set up its settings: • • • • Outgoing mail server (SMTP) – enter the name of the SMTP server. Port – set the port of the SMTP server. By default, the port is set to 25. User name – enter the user name. Password – enter the password.
SNMP notifications This option is effective for both Windows and Linux operating systems. This option is not available when operating under the bootable media. The option defines whether the agent(s) operating on the managed machine have to send the log events of the recovery operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent.
Re-attempt, if an error occurs The preset is: Enabled. Number of attempts: 5. Interval between attempts: 30 seconds. When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can set the time interval and the number of attempts. The attempts will be stopped as soon as the operation succeeds OR the specified number of attempts is performed, depending on which comes first.
Reboot machine after recovery This option is effective when operating under bootable media. The preset is Disabled. This option enables booting the machine into the recovered operating system without user interaction. Change SID after the recovery is finished The preset is Disabled. Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.
4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
Click any personal vault in the vaults tree to open the detailed view of this vault (p. 74) and to take actions on the vault (p. 75), archives (p. 77) and backups (p. 78) stored in there. 4.1. Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each managed machine. Personal vaults are visible to any user that can log on to the system.
The legend displays the following information about the vault: • • full path to the vault • the ratio of the occupied space to the original data size. total number of archives and backups stored in the vault Vault content The Vault content section contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Use the archives toolbar to perform actions on the selected archives and backups.
Change user account for accessing a vault Click Change user. In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Zone Click Explore a vault's content Click Create Acronis Secure Zone. The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 152) section. Explore. In the appearing Explorer window, examine the selected vault's content. Validate a vault Click Validate.
How can I merge two vaults? Suppose you have two vaults A and B in use. Both vaults are used by backup plans. You decide to leave only vault B, moving all the archives from vault A there. To do this, proceed as follows 1. Make sure that none of the backup plans uses vault A while merging, or temporarily disable (p. 101) schedules of the given plans. 2. Move the archives to vault B manually by means of a third-party file manager. 3.
The program duplicates your selection in the new window that has check boxes for each archive and each backup. Review the selection and correct if need be, then confirm the deletion. 4.2.2. Operations with backups To perform any operation with a backup, you have to select it first. To select a backup, expand the archive, then click the backup. If the archive is protected with a password, you will be asked to provide it.
4.2.3. Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view, but with check boxes for each archive and backup. The archive or backup you have chosen to delete has the check mark. Review the archive or backup that you have selected to delete. If you need to delete other archives and backups select the respective check boxes, then click Delete selected and confirm the deletion. The filters in this window are from the archives list of the vault view.
5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
• What if the condition is not met for a very long time? If delaying a backup is getting risky, you can force the condition (tell the users to log off) or run the task manually. To automatically handle this situation, you can set the time interval after which the task will run regardless of the condition. 5.1. Daily schedule Daily schedule is effective in Windows and Linux operating systems. To specify a daily schedule In the Schedule area, select the appropriate parameter as follows: Every: <...
To: not set. The task will be performed for an indefinite number of days. "Three-hour time interval lasting for three months" schedule Run the task every three hours. The task starts on a certain date (say, September 15, 2009), and ends after three months. The schedule's parameters are thus set up as follows. 1. Every: 1 day(s). 2. Every: 3 hours From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 times a day with a 3 hour time interval.
Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. 5.2. Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...> Specify a certain number of weeks and the days of the week you want the task to be run.
2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still be available in the Tasks view after this date. (If this date were not a Friday, the task would be last performed on the last Friday preceding this date.) This schedule is widely used when creating a custom backup scheme.
First schedule 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM. 3. Effective: From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. 5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems.
From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box is cleared, the task will be started on the nearest day and time you have specified above. To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server.
To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we just define that the task must be discontinued in 2010, after autumn ends in the northern hemisphere. Several monthly schedules for one task In the case when the task needs to be run on different days or weeks with different time intervals depending on the month, consider adding a dedicated schedule to every desired month or several months. Suppose that the task goes into effect on 11/01/2009.
5.4. Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to certain conditions. Once a specified event occurs (see the Scheduling section for the list of available events), the scheduler checks the specified condition and executes the task if the condition is met. The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not met, is defined by the Task start conditions (p. 60) backup option.
5.4.2. Fits time interval Applies to: Windows, Linux Restricts a backup task's start time to a specified interval. Example A company uses different locations on the same network-attached storage for backing up users data and servers. The workday starts at 8AM and ends at 5 PM. Users' data should be backed up as soon as the users log off, but not earlier than 4:30 PM and not later than 10 PM. Every day at 11 PM the company's servers are backed up.
Example: Run the backup task after free space on the managed machine has changed by at least 1 GB, but only if more than 12 hours have passed since the last successful backup. • Event: When free space changed, Run task if free space has changed by at least: 1 GB. • • Condition: Time since last backup, Time since the last backup: 12 hour(s). Task start conditions: Wait until the conditions are met.
6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1. Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.1.
Bootable media was not created Create now To be able to recover an operating system when the machine fails to boot, you must: 1 Back up the system volume (and the boot volume, if it is different) 2 Create at least one bootable media (p. 172). Create now will launch the Bootable Media Builder (p. 179). No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time.
If you select the check box for the Do not show this window when tasks require interaction. I will see this information in the tasks' details and dashboard. parameter, the tasks will be displayed on the Dashboard among other alerts and warnings. Alternatively, you can review the task execution states in the Backup plans and tasks (p. 93) view and specify your decision on each task in the Information panel (or in the Task details (p. 101) window). 6.1.2.
1 State How it is determined How to handle Need interaction At least one task needs user interaction. Identify the tasks that need interaction (the program will display what action is needed) -> Stop the tasks or enable the tasks to run (change media; provide additional space on the vault; ignore the read error; create the missing Acronis Secure Zone). Otherwise, see 2. 2 Running At least one task is running. No action is required. Otherwise, see 3. 3 Waiting At least one task is waiting.
When creating a backup plan or policy the administrator can turn on the option to stop executing the backup plan as soon as the backup plan gets the Error status. The backup plan's execution can be resumed using the Restart button. 2 Warning At least one task has succeeded with warnings. View the log to read the warnings -> [optionally] Perform actions to prevent the future warnings or failure. Otherwise, see 3. 3 OK All the tasks are completed successfully. No action is required.
Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A task status is derived from the result of the last run of the task.
6.1.2.2. Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you to perform operations with backup plans and tasks. To Do Create a new backup plan, or a task Click View details of a plan/task New, then select one of the following: • Backup plan (p. 107) • Recovery task (p. 124) • Validation task (p. 138) Backup plan Click View details. In the Plan Details (p. 103) window, review the plan details. Task View details.
Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task over again.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 107), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1 It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2 If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? • The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. • Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. • The backup plan has a centralized origin.
Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to column headers presented in the table. 2. Click the items you want to be displayed/hidden.
Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing VM) Recovery of a virtual machine backup to an existing virtual machine Recovery (new VM) Recovery of a virtual machine b
Progress The Progress tab is available while the task is running. It is common for all types of tasks. The tab provides information about task progress, elapsed time and other parameters. Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates in four tabs all the information on the selected backup plan. The respective message will appear at the top of the tabs, if one of the plan's tasks requires user interaction.
Settings The Settings tab displays the following information: • • • Backup scheme - the selected backup scheme and all its settings with schedules. Validation (if selected) - events before or after which the validation is performed, and validation schedule. Backup options - backup options changed against the default values. 6.1.3. Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program.
Select multiple log entries • non-contiguous: hold down CTRL and click the log entries one by one • contiguous: select a single log entry, then hold down SHIFT and click another entry. All the entries between the first and last selections will be selected too. View a log entry’s details 1 Select a log entry. 2 Do one of the following • Click View Details. The log entry's details will be displayed in a separate window. • Expand the Information panel, by clicking the chevron.
Sort log entries by date and time Click the column's header to sort the log entries in ascending order. Click it once again to sort the log entries in descending order. Configuring the log table By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. To show or hide columns 1. Right-click any column header to open the context menu.
6.2. Creating a backup plan Before creating your first backup plan (p. 171), please familiarize yourself with the basic concepts (p. 17) used in Acronis Backup & Recovery 10. To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan among others. Plan's credentials (p. 108) [Optional] The backup plan will run on behalf of the user who is creating the plan.
Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view check box. How to back up Backup scheme (p. 114) Specify when and how often to back up your data; define for how long to keep the created backup archives in the selected location; set up schedule for the archive cleanup procedure. Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi; create a custom backup scheme, or back up data once.
To specify credentials 1. Select one of the following: o Run under the current user The tasks will run under the credentials with which the user who starts the tasks is logged on. If any of the tasks has to run on schedule, you will be asked for the current user's password on completing the plan creation. o Use the following credentials The tasks will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name.
6.2.4. Items to back up The items to backup depend on the source type (p. 109) selected previously. 6.2.4.1. Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks and/or volumes to back up. You can select a random set of disks and volumes. If your operating system and its loader reside on different volumes, always include both volumes in the backup.
A file-based backup is not sufficient for recovery of the operating system. In order to recover your operating system, you have to perform a disk backup. Use the table in the right part of the window to browse and select the nested items. Selecting the check box beside the Name column’s header automatically selects all items in the table. Clearing this check box automatically deselects all items. 3. Click OK. 6.2.5.
You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Exclusion examples Criterion Example Description By name File1.
• To back up data to a locally attached tape device, expand the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destination, the table displays the names of the archives contained in each location you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3.
o Use the following credentials The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK.
6.2.9.2. Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in the archive, a full backup will be created regardless of your selection. Date and time Specify when to start the backup.
Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly backups run every fourth Friday, and weekly backups run on all other Fridays. • • Monthly ("Grandfather") backups are full; • Daily ("Son") backups are incremental.
Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that many may find useful. • • • • Back up files every day, including weekends Be able to recover files as of any date over the past seven days Have access to weekly backups of the past month Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows.
With this scheme, you will have a week to recover a previous version of a damaged file from a daily backup; as well as 10-day access to weekly backups. Each monthly full backup will be available for six months since the creation date. Work schedule Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thursdays. On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop.
Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in this situation. 6.2.9.5. Tower of Hanoi scheme At a glance • • • • Up to 16 levels of full, differential, and incremental backups Next-level backups are twice as rare as previous-level backups One backup of each level is stored at a time Higher density of more recent backups Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 81), weekly (p.
A cleanup mechanism ensures that only the most recent backups of each level are kept. Here is how the archive looks on day 8, a day before creating a new full backup. 1 2 3 4 5 6 7 8 4 1 2 1 3 1 2 1 The scheme allows for efficient data storage: more backups accumulate toward the current time. Having four backups, we could recover data as of today, yesterday, half a week, or a week ago. Roll-back period The number of days we can go back in the archive is different on different days.
On day 14, the interval is five days. It increases on subsequent days before decreasing again, and so on. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back period shows how many days we are guaranteed to have even in the worst case. For a four-level scheme, it is four days. 6.2.9.6.
delete the last full backup with all dependent incremental/differential backups • If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults. This setting enables deletion of the last backup in the archive, in case your storage device cannot accommodate more than one backup.
By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it become subject to deletion too. For more information, see Retention rules (p. 30). Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates the use of all options available in the Custom scheme. Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and daily incremental backups.
In the first of the previous examples, we set up a schedule only for full backups. However, the scheme will still result in three backup tasks, enabling you to manually start a backup of any type: • • • Full backup, runs every Friday at 10:00 PM Incremental backup, runs manually Differential backup, runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans and tasks section in the left pane.
To create a recovery task, perform the following steps General Task name [Optional] Enter a unique name for the recovery task. A conscious name lets you quickly identify the task among the others. Task credentials (p. 126) [Optional] The task will run on behalf of the user who is creating the task. You can change the task account credentials if necessary. To access this option, select the Advanced view check box . What to recover Archive (p. 126) Select the archive to recover data from. Data type (p.
Recovery options Settings [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery commands, recovery priority, error handling or notification options. If you do nothing in this section, the default values (p. 64) will be used. After any of the settings is changed against the default value, a new line that displays the newly set value appears. The setting status changes from Default to Custom.
o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder. If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first one when the program prompts. o If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder.
Specify the items to recover. By default, all items of the selected backup will be selected. If you do not want to recover certain items, just uncheck them. To obtain information on a disk/volume, right-click it and then click Information. 2. Click OK.
Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.3.6.
automatically generates a new unique NT signature and assigns it to the second disk. As a result, all the volumes on the second disk will lose their letters, all paths will be invalid on the disk, and programs won't find their files. The operating system on that disk will be unbootable. To retain system bootability on the target disk volume, choose one of the following: • Select automatically A new NT signature will be created only if the existing one differs from the one in the backup.
MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. Volume destination To specify a destination volume: 1. Select a volume or unallocated space where you want the selected volume to be recovered to. The destination volume/unallocated space should be at least the same size as the uncompressed image data. 2. Click OK.
• Logical. Information about logical volumes is located not in the MBR, but in the extended partition table. The number of logical volumes on a disk is unlimited. A logical volume cannot be set as active. If you recover a system volume to another hard disk with its own volumes and operating system, you will most likely need only the data. In this case, you can recover the volume as logical to access the data only. File system Change the volume file system, if required.
Exclusions Set up exclusions for the specific types of files you do not wish to be overwritten during recovery. To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of its contents — including files that are not Hidden — will be excluded.
• Overwrite existing file if it is older - this will give priority to the most recent file modification, whether it be in the backup or on the disk. • Do not overwrite existing file - this will give the file on the hard disk priority over the file in the backup. If you allow overwriting files, you still have an option to prevent overwriting (p. 132): • • hidden files and folders • • any files you specify by name or using wildcards system files and folders any folder you specify by path. 6.3.7.
Example 2.
Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. • The system uses GRand Unified Bootloader (GRUB) and was recovered from a normal (not from a raw, that is, sector-by-sector) backup One part of the GRUB loader resides either in the first several sectors of the disk or in the first several sectors of the volume. The rest is on the file system of one of the volumes.
mount -o bind /dev/ /mnt/system/dev/ 4. Save a copy of the GRUB menu file, by running one of the following commands: cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Linux distributions) or the /mnt/system/boot/grub/grub.
umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure the bootloader by using tools and documentation from the Linux distribution that you use. For example, in Debian and Ubuntu, you may need to edit some commented lines in the /boot/grub/menu.lst file and then run the update-grub script; otherwise, the changes might not take effect. 6.4. Validating vaults, archives and backups Validation is an operation that checks the possibility of data recovery from a backup.
Credentials (p. 139) [Optional] The validation task will run on behalf of the user who is creating the task. You can change the task credentials if necessary. To access this option, select the Advanced view check box. What to validate Validate Choose an object to validate: Archive (p. 140) - in that case, you need to specify the archive. Backup (p. 140) - specify the archive first, and then select the desired backup in this archive. Vault (p.
6.4.2. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree. o If the archive is stored in a centralized vault, expand the Centralized group and click the vault. o If the archive is stored in a personal vault, expand the Personal group and click the vault. o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder.
6.4.4. Location selection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree. • • To select a centralized vault, expand the Centralized group and click the appropriate vault. • To select a local folder (CD/DVD drive, or locally attached tape device), expand the Local folders group and click the required folder.
6.4.6. When to validate As validation is a resource-intensive operation, it makes sense to schedule validation to the managed machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the data is not corrupted and can be successfully recovered, consider starting validation right after the task creation. Choose one of the following: • Now - to start the validation task right after its creation, that is, after clicking OK on the Validation page.
Backup (p. 144) Select the backup. Access credentials (p. 144) [Optional] Provide credentials for the archive location. To access this option, select the Advanced view check box. Mount settings Volumes (p. 144) Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mount point, choose the read/write or read only access mode. When you complete all the required steps, click OK to mount the volumes. 6.5.1. Archive selection Selecting the archive 1.
While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 6.5.2. Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup.
o o Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list. Mount point (in Linux) - specify the directory where you want the volume to be mounted. 3. If several volumes are selected for mounting, click on every volume to set its mounting parameters, described in the previous step. 4. Click OK. 6.6.
By exporting a managed vault to a detachable media, you obtain a portable unmanaged vault that can be used in the following scenarios: • • • • keeping an off-site copy of your vault or of the most important archives physical transportation of a vault to a distant branch office recovery without access to the storage node in case of networking problems or failure of the storage node recovery of the storage node itself.
Once the export task is completed, you can run it again at any time. Before doing so, delete the archive that resulted from the previous task run if the archive still exists in the destination vault. Otherwise the task will fail. You cannot edit an export task to specify another name for the destination archive (this is a limitation). Tip. You can implement the staging scenario manually, by regularly running the archive deletion task followed by the export task.
After you have performed all the required steps, click OK to start the export task. 6.7.1. Task credentials Provide credentials for the account under which the task will run. To specify credentials 1. Select one of the following: o Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation.
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext.
According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.7.5. Location selection Specify a destination where the exported object will be stored. Exporting backups to the same archive is not allowed. 1.
3. Naming the new archive By default, the exported archive inherits the name of the original archive.
6.8.1. Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is running or using bootable media. To create Acronis Secure Zone, perform the following steps. Space Disk (p. 152) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 152) Specify the exact size of the zone.
• Taking all free space from a system volume may cause the operating system to work unstably and even fail to start. Do not set the maximum zone size if the boot or the system volume is selected. 6.8.1.3. Password for Acronis Secure Zone Setting up a password protects the Acronis Secure Zone from unauthorized access.
6.8.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 182). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans can use Acronis Secure Zone as well as local plans. If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. The zone does not perform automatic cleanup, that is, deleting old archives, anymore.
o o dragging the slider and selecting any size between the current and minimum values. The minimum size is approximately 50MB, depending on the geometry of the hard disk; typing an exact value in the Acronis Secure Zone Size field. 4. Click OK. 6.8.2.3. Deleting Acronis Secure Zone To delete the zone without uninstalling the program, proceed as follows: 1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2.
• • boot the machine from a separate bootable rescue media use network boot from Acronis PXE Server or Microsoft Remote Installation Services (RIS). See the Bootable media (p. 156) section for details. 6.10.
• PE-based bootable media helps overcome some Linux-related bootable media issues such as support for certain RAID controllers or certain levels of RAID arrays only. Media based on PE 2.x, that is, Windows Vista or Windows Server 2008 kernel, allows for dynamic loading of the necessary device drivers. 6.10.1. Linux-based bootable media When using the media builder, you have to specify: 1. [optional] The parameters of the Linux kernel. Separate multiple parameters with spaces.
These parameters are typically used when experiencing problems while working with the bootable media. Normally, you can leave this field empty. You also can specify any of these parameters by pressing F11 while in the boot menu. Parameters When specifying multiple parameters, separate them with spaces. acpi=off Disables Advanced Configuration and Power Interface (ACPI). You may want to use this parameter when experiencing problems with a particular hardware configuration.
nofw Disables the FireWire (IEEE1394) interface support. nopcmcia Disables detection of PCMCIA hardware. nomouse Disables mouse support. module_name=off Disables the module whose name is given by module_name. For example, to disable the use of the SATA module, specify: sata_sis=off pci=bios Forces the use of PCI BIOS instead of accessing the hardware device directly. You may want to use this parameter if the machine has a non-standard PCI host bridge.
customized. When you select an existing NIC in the wizard window, its settings are selected for saving on the media. The MAC address of each existing NIC is also saved on the media. You can change the settings, except for the MAC address; or configure the settings for a non-existent NIC, if need be. Once the bootable agent starts on the server, it retrieves the list of available NICs. This list is sorted by the slots the NICs occupy: the closest to the processor on top.
Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window. 6.10.3. Working under bootable media Operations on a machine booted with bootable media are very similar to backup and recovery under the operating system. The difference is as follows: 1.
6.10.3.2. Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Computer System Interface (iSCSI) devices and Network Direct Attached Storage (NDAS) devices when working under bootable media. These devices are connected to the machine through a network interface and appear as if they were locally-attached devices. On the network, an iSCSI device is identified by its IP address, and an NDAS device is identified by its device ID.
• • • restoreraids trueimagecmd trueimagemnt Linux commands and utilities busybox ifconfig readcd cat init reboot cdrecord insmod rm chmod iscsiadm rmmod chown kill route chroot kpartx scp cp ln scsi_id dd ls sed df lspci sg_map26 dmesg lvm sh dmraid mc sleep e2fsck mdadm ssh e2label mkdir sshd echo mke2fs strace egrep mknod swapoff fdisk mkswap swapon fsck more sysinfo fxload mount tar gawk mtx tune2fs gpm mv udev grep parted udevinfo growiso
hexdump ps vi hotplug raidautorun zcat 6.10.5. Recovering MD devices and logical volumes To recover Linux Software RAID devices, known as MD devices, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery.
smb://server/backups/linux_machine_2010_01_02_12_00_00_123D.tib 5. Return to the management console by pressing CTRL+ALT+F1, or by running the command: /bin/product 6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually. 6.10.5.2.
• The first and second pairs of hard disks are configured as two MD devices, both in the RAID-1 configuration, and are mounted on /dev/md0 and /dev/md1, respectively. • A logical volume is based /dev/my_volgroup/my_logvol. on the two MD devices and is mounted on The following picture illustrates this configuration. Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the machine from a Linux-based bootable media. 2.
6. Activate the volume group by running the following command: lvm vgchange -a y my_volgroup 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the management console, click Recover. 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and then select the backup from which you want to recover data. 4. In Data type, select Volumes. 5. In Items to recover, select the check box next to my_volgroup-my_logvol. 6.
To unmount a backup volume • Use the --unmount command, specifying the volume's mount point as a parameter. For example: trueimagemnt --unmount /mnt 6.11. Collecting system information The system information collection tool gathers information about the machine to which the management console is connected, and saves it to a file. You may want to provide this file when contacting Acronis technical support. This option is available under bootable media and for machines where Agent for Linux is installed.
Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 175) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 178), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers. Agent-side cleanup Cleanup (p. 174) performed by an agent (p.
Backup options Configuration parameters of a backup operation (p. 170), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 171). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: • • • what data to back up where to store the backup archive (p. 170) (the backup archive name and location) the backup scheme (p.
3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 170) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. 5. On each machine, the agent installed on the machine creates a backup plan (p. 171) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 173). 6.
A management server has two built-in groups that contain all machines of each type: All physical machines (p. 179), All virtual machines (p. 182). Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a physical machine from the built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p.
On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user's archives will be managed by the storage node as well as other archives stored in the vault. Cleanup Deleting backups (p. 170) from a backup archive (p. 170) in order to get rid of outdated backups or prevent the archive from exceeding the desired size.
Differential backup A differential backup stores changes to the data against the latest full backup (p. 178). You need access to the corresponding full backup to recover the data from a differential backup. Direct management Any management operation that is performed on a managed machine (p. 178) using the direct console (p. 174)-agent (p. 170) connection (as opposed to centralized management (p. 173) when the operations are configured on the management server (p.
and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine. For more information about disk groups please refer to the following Microsoft knowledge base article: 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/ Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000.
• IP address range. A machine remains in a dynamic group as long as the machine meets the group's criteria. The machine is removed from the group automatically as soon as • • the machine's properties change so that the machine does not meet the criteria anymore OR the administrator changes the criteria so that the machine does not meet them anymore. There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server.
F Full backup A self-sufficient backup (p. 170) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. G GFS (Grandfather-Father-Son) A popular backup scheme (p. 172) aimed to maintain the optimal balance between a backup archive (p. 170) size and the number of recovery points (p. 180) available from the archive.
Managed vault A centralized vault (p. 173) managed by a storage node (p. 180). Archives (p. 170) in a managed vault can be accessed as follows: bsp://node_address/vault_name/archive_name/ Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 181) and storage node-side validation (p. 181) for each archive stored in the managed vault.
Plan See Backup plan (p. 171). Policy See Backup policy (p. 171). R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 178) managed by a management server (p. 179). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 180) procedure. Registration A procedure that adds a managed machine (p. 178) to a management server (p. 179).
• prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malefactor, by using encrypted vaults (p. 177). Storage node-side cleanup Cleanup (p. 174) performed by a storage node (p. 180) according to the backup plans (p. 171) that produce the archives (p. 170) stored in a managed vault (p. 178). Being an alternative to the agentside cleanup (p. 170), the cleanup on the storage node side relieves the production servers of unnecessary CPU load.
U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. The Universal Restore is not available: • • when the machine is booted with Acronis Startup Recovery Manager (p. 169) (using F11) or • when using Acronis Active Restore (p.
Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 178) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 170) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server.
Archive selection • 125, 126, 139, 140, 142, 143, 147, 148 Index Archive validation • 108, 124 A B Access credentials • 143, 144 Back up later scheme • 115 Access credentials for archive location • 107, 113 Access credentials for destination • 125, 134, 147, 151 Access credentials for location • 125, 128 Access credentials for source • 107, 111, 139, 141, 147, 149 Acronis Active Restore • 38, 169, 182 Acronis Backup & Recovery 10 components • 13 Acronis Backup & Recovery 10 overview • 6 Back up now
C Centralized backup plan • 39, 171, 172, 173 Default recovery options • 64, 126 Deleting Acronis Secure Zone • 155 Deleting archives and backups • 77, 78, 79 Centralized management • 173, 174, 175 Destination selection • 129 Centralized task • 172, 173, 175 Differential backup • 170, 175 Centralized vault • 173, 179 Direct management • 91, 169, 174, 175, 178, 179 Cleanup • 17, 170, 172, 174, 181, 182 Collecting system information • 168 Common operations • 77 Compression level • 46, 53 Conditions •
Fonts • 43 Full backup • 170, 172, 174, 175, 178 Full, incremental and differential backups • 17, 21, 114 M Machine • 170, 171, 172, 173, 175, 176, 178, 179, 180, 181, 183 Machine options • 43, 57, 70 G Main area, views and action pages • 7, 11 Getting started • 6 Managed machine • 7, 17, 42, 169, 171, 173, 175, 178, 180, 181 GFS (Grandfather-Father-Son) • 172, 178, 181 GFS backup scheme • 24, 178 Grandfather-Father-Son scheme • 115 Managed vault • 174, 177, 179, 180, 181, 182 Management Console • 14
Owners and credentials • 23, 74, 126, 139, 148 Selection rule • 171, 180 P Setting up SNMP services on the receiving machine • 44 Password for Acronis Secure Zone • 152, 153 Personal vault • 169, 175, 179 Personal vaults • 39, 74 Physical machine • 173, 179 Plan • 180 Policy • 180 Setting up a display mode • 161 Simple scheme • 115 SNMP notifications • 43, 47, 56, 65, 70 Source files exclusion • 46, 48 Source type • 103, 107, 109, 110 Startup page • 41 Static group • 173, 180 Post-backup command • 50
U Understanding Acronis Backup & Recovery 10 • 17 Understanding states and statuses • 93 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) • 38, 182 Unmanaged vault • 170, 182 User privileges on a managed machine • 23, 109, 126, 139, 148 Using a single tape drive • 37 Using the management console • 7 V Validating vaults, archives and backups • 76, 77, 78, 97, 138 Validation • 17, 170, 181, 182 Validation rules • 171, 182 Vault • 17, 39, 154, 177, 179, 182 Vaults • 33, 73, 138, 154 Views •