Acronis® Backup & Recovery™ 10 Server for Linux User's Guide
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ......................................................................... 6 1.1 Acronis Backup & Recovery 10 overview .................................................................................. 6 1.2 Getting started ........................................................................................................................... 6 1.2.1 1.3 Acronis Backup & Recovery 10 components ...........................................
Vaults .................................................................................................................................... 70 4.1 Personal vaults .........................................................................................................................71 4.1.1 4.1.2 4.2 Common operations ................................................................................................................74 4.2.1 4.2.2 4.2.3 4.2.
6.5 Mounting an image ............................................................................................................... 134 6.5.1 6.5.2 6.5.3 6.5.4 Archive selection ..................................................................................................................................... 135 Backup selection ...................................................................................................................................... 136 Access credentials ................
1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
For what to do next see "Basic concepts (p. 17)". For understanding of the GUI elements see "Using the management console (p. 7)". 1.2.1 Using the management console As soon as the console connects to a managed machine (p. 169) or to a management server (p. 170), the respective items appear across the console's workspace (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agentspecific or server-specific operations.
1024x768 or higher display resolution is required for comfortable work with the management console. 1.2.1.1 "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar. Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on whether the console is connected to a managed machine or to the management server.
Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Clicking the action opens the respective action page (p. 11). Items of different navigation views have their own set of actions. The bar's name changes in accordance with the item you select.
"Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( - for the Navigation pane; - for the Actions and tools pane).
"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Information panel. Use filtering and sorting capabilities to search the table for the item in question In the table, select the desired item In the Information panel (collapsed by default), view the item's details Perform actions on the selected item.
Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc. When the advanced representation is enabled, all the available fields are displayed. You can switch between the views by selecting the Advanced view check box at the top of the action page. Most settings are configured by clicking the respective Change… links to the right.
Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Components for a managed machine (agents) These are applications that perform data backup, recovery and other operations on the machines managed with Acronis Backup & Recovery 10. Agents require a license to perform operations on each managed machine.
1.3.2 Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for local access to Acronis Backup & Recovery 10 Agent for Linux. Remote connection to the agent is not possible. 1.3.3 Bootable Media Builder Acronis Bootable Media Builder is a dedicated tool for creating bootable media (p. 163). The media builder that installs on Linux creates bootable media based on Linux kernel. 1.
The agent for Linux is in fact a 32-bit executable. For authentication, the agent uses system libraries, 32-bit versions of which are not always installed by default with 64-bit distributions. When using the agent on a 64-bit RedHat based distribution, such as RHEL, CentOS, Fedora or Scientific Linux, make sure that the following 32-bit packages are installed in the system: pam.i386 libselinux.i386 libsepol.i386 These packages should be available in the repository of your Linux distribution. 1.
or (ii) supply code corrections to correct insubstantial problems at the next general release of the Software. More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.eu/enterprise/support/ 16 Copyright © Acronis, Inc.
2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1 Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. 18 Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-bysector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2 Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.
Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3 User privileges on a managed machine When managing a machine running Linux, the user has or obtains the root privileges, and so can: Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine.
Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When creating a plan or a task, you have the option to explicitly specify an account under which the plan or the task will run. Your choice depends on whether the plan or task is intended for manual start or for executing on schedule. Manual start You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run under the credentials with which you are currently logged on.
GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme. Create the backup plan as usual. For the backup destination, choose any storage device where automatic cleanup can be performed, such as an HDD-based storage device or robotic tape library.
Assume you select Friday for Weekly/Monthly backup. Here is the real schedule of the backup tasks that will be created. Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep backups: Daily This step defines the retention rule for daily backups. The cleanup task will run after each daily backup and delete all daily backups that are older than you specify.
An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups will start to be deleted. The diagram for weekly and monthly backups will look similar to the week-based timescale.
An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months 2.6 Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keeping such backups for a long time. The Tower of Hanoi (ToH) backup scheme is a useful compromise.
For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi backup scheme is based on the same patterns. It operates with Sessions instead of Moves and with Backup levels instead of Rings. Commonly an N-level scheme pattern contains (Nth power of two) sessions. So, the five-level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions (moves from 1 to 16 in the above figure).
the scheme forces every backup level to keep only the most recent backup, other backups from the level have to be deleted; however backup deletion is postponed in cases where the backup is a base for another incremental or differential one an old backup on a level is kept until a new backup has been successfully created on the level. The table shows the pattern for the five-level backup scheme. The pattern consists of 16 sessions.
to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the archive size within This is the maximum size of the archive. Every time a retention rule is applied, the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value. The diagram below shows the archive content before and after the deletion.
Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Example Delete backups older than = 3 Months Keep the archive size within = 200GB Never delete backups younger than = 10 Days Every time the retention rules are applied, the program will delete all backups created more than 3 months (or more exactly, 90 days) ago.
Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. Backups resulting from consolidation always have maximum compression. This means that all backups in an archive may acquire the maximum compression as a result of repeated cleanup with consolidation.
For detailed instructions on how to recover logical volumes, see Recovering MD devices and logical volumes (p. 155). You do not need to create the volume structure if it already exists on the machine (such is the case when some data on the volume was lost, but no hard disks were replaced). How to select logical volumes to back up Logical volumes appear at the end of the list of volumes available for backup. Basic volumes included in logical volumes are also shown in the list with None in the Type column.
2.9 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recover Linux Software RAID devices (known as multiple-disk devices or MD devices) and hardware RAID arrays. Software RAID arrays Software RAID arrays, or MD devices, combine several volumes and make solid block devices (/dev/md0, /dev/md1, ..., /dev/md31), information of which is stored in /etc/raidtab or in dedicated areas of those volumes.
Recovery Parameters of software RAID arrays are not backed up, so they can only be recovered over a basic volume, to unallocated space, or to a previously configured array. Recovery can be performed in Linux or a Linux-based bootable media. When started from bootable media, the bootable agent tries to access parameters of a software disk array and configure it. However, if the necessary information is lost, the array cannot be configured automatically.
a locally attached tape device (tape drive or tape library) by... Agent for Windows Agent for Linux Tape written on a tape device through... Backup Server Storage Node ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 + + + + + + + + + - + + + + + + + + + - + + + + + + + + + - + + + + + + + + + + + + + + 2.10.
5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 172) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume. 6. Acronis Active Restore (p. 160) is not available when recovering from a tape. Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape containing the backup you need to recover.
With the new Acronis Secure Zone behavior, you obtain the ability to: list archives located in the zone and backups contained in each archive examine a backup's content mount a disk backup to copy files from the backup to a physical disk safely delete archives and backups from the archives. For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 71) section.
3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.
The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3 Time-based alerts Last backup This option is effective when the console is connected to a managed machine (p. 169) or to the management server (p. 170). The option defines whether to alert if no backup was performed on a given machine for a period of time.
The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items. To make a selection, choose the font from the respective combo-box and set the font's properties. You can preview the font's appearance by clicking the button to the right. 3.
1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup & Recovery 10 in its log). The preset is: Disabled. To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appropriate options as follows: Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only.
The preset is: Maximum log size: 1 GB. On cleanup, keep 95% of the maximum log size. When the option is enabled, the program compares the actual log size with the maximum size after every 100 log entries. Once the maximum log size is exceeded, the program deletes the oldest log entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the log. With the minimum 1% setting, the log will be nearly cleared.
+ + + + + + - - Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p. 52) Dest: network share Dest: network share Dest: network share Dest: network share Fast incremental/differential backup (p. 55) + - + - Backup splitting (p.
3.3.1.1 Archive protection This option is effective for Windows and Linux operating systems and bootable media. This option is effective for both disk-level and file-level backup. The preset is: Disabled. To protect the archive from unauthorized access 1. 2. 3. 4. Select the Set password for the archive check box. In the Enter the password field, type a password. In the Confirm the password field, re-type the password.
Exclude files matching the following criteria Select this check box to skip files whose names match any of the criteria — called file masks — in the list; use the Add, Edit, Remove and Remove All buttons to create the list of file masks. You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.txt yields files such as Doc.txt and Document.
Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-backup command To specify a command/batch file to be executed before the backup process starts 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3.
The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure. The following scheme illustrates when the pre/post data capture commands are executed.
Preset N/A Perform the data capture after the Perform the data command is capture only after the executed despite command is execution failure successfully executed. or success. Fail the task if the command execution fails. Perform the data capture concurrently with the command and irrespective of the command execution result. Post-data capture command To specify a command/batch file to be executed after data capture 1. In the Command field, type a command or browse to a batch file.
Always create a snapshot The snapshot enables backing up of all files including files opened for exclusive access. The files will be backed up at the same point in time. Choose this setting only if these factors are critical, that is, backing up files without a snapshot does not make sense. To use a snapshot, the backup plan has to run under the account with the Administrator or Backup Operator privileges. If a snapshot cannot be taken, the backup will fail.
operating system to allocate more resources like the CPU to the backup application. However, the resulting effect will depend on the overall CPU usage and other factors like disk in/out speed or network traffic. The preset is: Low.
Click Transferring speed stated as a percentage of the estimated maximum speed of the network connection, and then drag the slider or type a percentage in the box Click Transferring speed stated in kilobytes per second, and then enter the bandwidth limit for transferring backup data in kilobytes per second. 3.3.1.8 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service.
User name – enter the user name. Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct. Messenger service (WinPopup) This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine. This option is not available when operating under bootable media. The option enables you to receive WinPopup notifications about the backup task's successful completion, failure or need for interaction.
1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup & Recovery 10 in its log). The preset is: Use the setting set in the Machine options. To select whether to send the backup operations events to the SNMP managers: Choose one of the following: Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 42).
A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size. Such might be the case when the backup is placed on FAT16 and FAT32 file systems that have a 4GB file size limit. If the destination disk runs out of free space while creating the backup, the task enters the Need interaction state.
Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mode enabled, the program will automatically handle situations requiring user interaction (except for handling bad sectors, which is defined as a separate option). If an operation cannot continue without user interaction, it will fail. Details of the operation, including errors, if any, can be found in the operation log. Re-attempt, if an error occurs The preset is: Enabled. Number of attempts: 5.
Roaming users can back up their portable computers to Acronis Secure Zone while on the road. When the portable computer is connected to the corporate network, all changes made to the archive will be transferred to its stationary copy after the first backup operation. If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password. To use Dual destination: 1.
Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up data strictly at the specified time. Then it makes sense to skip the backup rather than wait for the conditions, especially if the events occur relatively often. 3.3.1.16 Task failure handling This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media.
The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts. The program stops trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depending on which comes first. If the task fails because of a mistake in the backup plan, you can edit the plan while the task is in the Idle state.
When the option is enabled, backing up to removable media may be not possible if the user is away, because the program will wait for someone to press OK in the prompt box. Hence, you should disable the prompt when scheduling a backup to removable media. Then, if the removable media is available (for example, a DVD is inserted), the task can run unattended. Reset archive bit The option is effective only for file-level backup in Windows operating systems and in bootable media. The preset is: Disabled.
Save software RAID and LVM metadata along with backups This option is effective only for disk-level backups of machines running Linux. The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information about the structure of logical volumes (known as LVM volumes) and of Linux Software RAID devices (known as MD devices) to the /etc/Acronis directory before creating the backup.
commands (p. 63) + + - - - + - + Do not show messages and dialogs while processing (silent mode) + + + + Re-attempt if an error occurs + + + + Set current date and time for recovered files - + - + Validate backup archive before recovery + + + + Check file system after recovery + - + - Reboot machine automatically if it is required for recovery + + - - Windows recovery - Windows recovery - E-mail (p. 65) + + - - Win Pop-up (p.
To specify pre/post commands 1. Enable pre/post commands execution by checking the following options: Execute before the recovery Click Edit to specify a new command or a batch file Execute after the recovery 2. Do any of the following: Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1. In the Command field, type a command or browse to a batch file.
When the check box is not selected, the command execution result does not affect the task execution failure or success. You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard. 5. Click Test command to check if the command is correct. A post-recovery command will not be executed if the recovery proceeds with reboot. 3.3.2.2 Recovery priority This option is effective for both Windows and Linux operating systems.
The preset is: Disabled. To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notifications. 2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can enter several addresses separated by semicolons. 3.
The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported. 3.
Community – type the name of SNMP community to which both the host running SNMP management application and the sending machine belong. The typical community is "public". Click Send test message to check if the settings are correct. Do not send SNMP notifications – to disable sending the log events of the recovery operations to SNMP managers. 3.3.2.6 Error handling These options are effective for Windows and Linux operating systems and bootable media.
Check file system after recovery This option is effective only when recovering disks or volumes. When operating under bootable media, this option is not effective for the NTFS file system. The preset is Disabled. This option defines whether to check the integrity of the file system after a disk or volume recovery. Restart machine automatically if it is required for recovery This option is effective when recovery takes place on a machine running an operating system. The preset is Disabled.
4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each managed machine. Personal vaults are visible to any user that can log on to the system. A user's right to back up to a personal vault is defined by the user's permission for the folder or device where the vault is located. A personal vault can be organized on detachable or removable media.
Vault content The Vault content section contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Use the archives toolbar to perform actions on the selected archives and backups. The list of backups is expanded by clicking the "plus" sign to the left of the archive's name. All the archives are grouped by type on the following tabs: The Disk archives tab lists all the archives that contain disk or volume backups (images).
Explore a vault's content Click Validate a vault Click Explore. In the appearing Explorer window, examine the selected vault's content. Validate. You will be taken to the Validation (p. 130) page, where this vault is already preselected as a source. The vault validation checks all the archives stored in the vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut to the folder from the Vaults view. The folder itself remains untouched.
3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree, select vault B to check whether the archives are displayed. If not, click Refresh. 5. Delete vault A. 4.2 4.2.1 Common operations Operations with archives stored in a vault To perform any operation with an archive, you have to select it first. If the archive is protected with a password, you will be asked to provide it.
All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the '[Backup name]' actions bar (on the Actions and tools pane) and from the '[Backup name]' actions item of the main menu. The following is a guideline for you to perform operations with backups. To Do View backup content in a separate window Click Recover Click View content. In the Backup Content window, examine the backup content. Recover.
full backup which will be dated the incremental backup date. When you delete an incremental or differential backup from the middle of the chain, the resulting backup type will be incremental. Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup.
5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
5.1 Daily schedule Daily schedule is effective in Windows and Linux operating systems. To specify a daily schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> day(s) Set up the certain number of days you want the task to be run. For example, if you set Every 2 day(s), the task will be started on every other day. In the During the day execute the task... area, select one of the following: Once at: <...> Set up the time at which the task will be run once. Every: <...
From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 times a day with a 3 hour time interval. After the last daily recurrence at 9 PM, the next day comes and the task starts over again from midnight. 3. Effective: From: 09/15/2009. If September 15, 2009 is the current date of the task's creation and, say, 01:15 PM is the task's creation time, the task will be started when the nearest time interval comes: at 03:00 PM in our example. To: 12/15/2009.
To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...> Specify a certain number of weeks and the days of the week you want the task to be run. For example, with the Every 2 week(s) on Mon setting, the task will be performed on Monday of every other week. In the During the day execute the task... area, select one of the following: Once at: <...> Set up the time at which the task will be run once. Every: <...
1. Every: 1 week(s) on: - selecting the check box automatically selects the corresponding check boxes (Mon, Tue, Wed, Thu, and Fri), and leaves the remaining ones unchanged. 2. Once at: 09:00:00 PM. 3. Effective: From: empty. If you have created the task, say on Monday at 11:30 AM, the task will be started on the same day at 9 PM. If the task was created, say on Friday after 9 PM, then it will be started for the first time on the nearest workday (Monday in our example) at 9 PM.
2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. 5.3 Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a monthly schedule In the Schedule area, select the appropriate parameter as follows: Months: <...> Select a certain month(s) you want to run the task in. Days: <...> Select specific days of the month to run the task on. You can also select the last day of the month, irrespective of its actual date. On: <...> <...
This schedule is widely used when creating a custom backup scheme. The "Last day of every month" schedule is added to the full backups, while the differential backups are scheduled to be performed once a week and incremental on workdays. For more details, see the Monthly full, weekly differential, and daily incremental backups plus cleanup example in the Custom backup scheme (p. 115) section. "Season" schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010.
From: 11/01/2009. To: not set. Third schedule 1. 2. 3. 4. Months: June, July, August. Days: 1, 15. Once at: 10:00:00 PM. Effective: From: 11/01/2009. To: not set. 5.4 Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to certain conditions. Once a specified event occurs (see the Scheduling section for the list of available events), the scheduler checks the specified condition and executes the task if the condition is met.
(1) If 9:00 PM comes and the location's host is available, the backup task starts right on time. (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available. (3) If the location's host will never be available on workdays at 9:00 PM, the task never starts. 5.4.2 Fits time interval Applies to: Windows, Linux Restricts a backup task's start time to a specified interval.
5.4.3 Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until the specified time interval since the last successful backup completion passes. Example: Run the backup task at system startup, but only if more than 12 hours have passed since the last successful backup. Event: At startup, Start the task on machine startup. Condition: Time since last backup, Time since the last backup: 12 hour(s). Task start conditions: Wait until the conditions are met.
6 Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1 Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.
working. Please make sure you have a valid license on Acronis License Server. Trial version of product expires in X day(s) Connect Once the trial version of the product is installed, the program starts the countdown of days remaining until the trial period expires. Connect 15 day trial period has expired. Enter a full license key.
Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on this date. Information Highlight the date in green if only "Information" log entries appeared on this date (normal activity.) The Select current date link focuses selection to the current date. System view Shows summarized statistics of backup plans, tasks, and brief information on the last backup. Click the items in this section to obtain the relevant information.
Use the Information panel to review detailed information on the selected plan (task). The panel chevron. The content of the panel is is collapsed by default. To expand the panel, click the also duplicated in the Plan details (p. 99) and Task details (p. 97) windows respectively. 6.1.2.1 Understanding states and statuses Backup plan execution states A backup plan can be in one of the following execution states: Idle; Waiting; Running; Stopping; Need Interaction.
Otherwise, see 2 following: Remove the reason of the failure -> [optionally] Start the failed task manually Edit the local plan to prevent its future failure in case a local plan has failed Edit the backup policy on the management server in case a centralized plan has failed When creating a backup plan or policy the administrator can turn on the option to stop executing the backup plan as soon as the backup plan gets the Error status.
The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state. A waiting task can also be stopped. In this case, since the task is not running, "stop" means removing it from the queue . Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A task status is derived from the result of the last run of the task.
6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you to perform operations with backup plans and tasks. To Do Create a new backup plan, or a task Click New, then select one of the following: Backup plan (p. 102) Recovery task (p. 118) Validation task (p. 130) View details of a plan/task Backup plan View details. Click In the Plan Details (p. 99) window, review the plan details. Task View details. Click In the Task Details (p.
Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task over again.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 102), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1. It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2. If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. The backup plan has a centralized origin.
Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden.
Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing VM) Recovery of a virtual machine backup to an existing virtual machine Recovery (new VM) Recovery of a virtual machine backup to a new virtual machine Validat
Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates in four tabs all the information on the selected backup plan. The respective message will appear at the top of the tabs, if one of the plan's tasks requires user interaction. It contains a brief description of the problem and action buttons that let you select the appropriate action or stop the plan.
6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log. When the program executes a task, it adds multiple entries. With the log, you can examine operations, results of tasks' execution including reasons for failure, if any. Way of working with log entries Use filters to display the desired log entries.
Save the selected log entries to a file 1. Select a single log entry or multiple log entries. Save Selected to File. 2. Click 3. In the opened window, specify a path and a name for the file. Save all the log entries to a file 1. Make sure, that the filters are not set. Save All to File. 2. Click 3. In the opened window, specify a path and a name for the file. Save all the filtered log entries to a file 1. Set filters to get a list of the log entries that satisfy the filtering criteria.
6.1.3.3 Log entry details Displays detailed information on the log entry you have selected and lets you copy the details to the clipboard. To copy the details, click the Copy to clipboard button. Log entry data fields A local log entry contains the following data fields: Type - type of event (Error; Warning; Information) Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
[Optional] Type a description of the backup plan. To access this option, select the Advanced view check box. What to backup Source type (p. 104) Select the type of data to back up. The type of data depends on the agents installed on the machine. Items to backup (p. 105) Specify the data items to back up. A list of items to backup depends on the data type, specified previously. Access credentials (p.
After any of the settings is changed against the default value, a new line that displays the newly set value appears. The setting status changes from Default to Custom. Should you modify the setting again, the line will display the new value unless the new value is the default one. When the default value is set, the line disappears and so you always see only the settings that differ from the default values in this section of the Create backup plan page.
If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup. This will reduce the archive size, thus saving storage space. Disks/volumes Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up disks and/or volumes.
Linux A volume backup stores all files and folders of the selected volume independent of their attributes, a boot record and the file system super block. A disk backup stores all disk volumes as well as the zero track with the master boot record. 6.2.4.2 Selecting files and folders To select files and/or folders for backing up 1. Expand the local folders tree items in order to view its nested folders and files. 2. Select an item by checking the corresponding check box in the tree.
Exclude all system files and folders Select this check box to skip files and folders with the System attribute. If a folder is System, all of its contents — including files that are not System — will be excluded. You can view file or folder attributes in the file/folder properties or by using the attrib command. For more information, refer to the Help and Support Center in Windows.
After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext.
Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section. Use the following credentials The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: User name.
6.2.9.2 Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in the archive, a full backup will be created regardless of your selection. Date and time Specify when to start the backup.
Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly backups run every fourth Friday, and weekly backups run on all other Fridays. Monthly ("Grandfather") backups are full; Weekly ("Father") backups are differential; Daily ("Son") backups are incremental. Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup. The default value is 12:00 PM.
Daily: 1 week Weekly: 1 month Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be available for seven days since creation. For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted.
Weekly/monthly: Friday Keep backups: Daily: 6 months Weekly: 6 months Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups performed on Fridays. Note that, in order to choose Friday in the Weekly/monthly field, you need to first select it in the Back up on field. Such an archive would allow you to compare your financial documents as of the first and the last day of work, and have a five-year history of all documents, etc.
Roll-back period The guaranteed number of sessions that one can go back in the archive at any time. Calculated automatically, depending on the schedule parameters and the numbers of levels you select. See the example below for details. Example Schedule parameters are set as follows Recur: Every 1 day Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14 sessions) of this scheme's schedule look. Shaded numbers denote backup levels.
Here are the backups we have on day 12 (numbers in gray denote deleted backups). 1 4 2 1 3 2 4 1 5 3 6 1 7 2 8 1 9 4 10 1 11 2 12 1 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Since it depends on the full backup of day one, that backup is available as well. This enables us to go as far back as 11 days, which is the best-case scenario.
This setting is recommended for backup destinations such as shared folders or centralized vaults. When there is insufficient space while backing up The archive will be cleaned up only during backup and only if there is not enough space to create a new backup.
Also, let all backups older than one year be deleted from the archive, and let the cleanup be performed upon creating a new backup. Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it become subject to deletion too. For more information, see Retention rules (p. 30).
You can manually run any backup task or cleanup task at any time, regardless of whether it has a schedule. In the first of the previous examples, we set up a schedule only for full backups.
[Optional] Enter a unique name for the recovery task. A conscious name lets you quickly identify the task among the others. Task credentials (p. 120) [Optional] The task will run on behalf of the user who is creating the task. You can change the task account credentials if necessary. To access this option, select the Advanced view check box . What to recover Archive (p. 120) Select the archive to recover data from. Data type (p.
After you complete all the required steps, click OK to create the commit creating of the recovery task. 6.3.1 Task credentials Provide credentials for the account under which the task will run. To specify credentials 1. Select one of the following: Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation.
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext.
When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery, so there is no need to recover the MBR and Track 0 for Windows systems, unless the MBR is damaged. 6.3.4.2 Files selection To select a backup and files to recover: 1. Select one of the successive backups by its creation date/time.
Recover to: Physical machine The selected disks will be recovered to the physical disks of the machine the console is connected to. On selecting this, you proceed to the regular disk mapping procedure described below. Disk #: Disk # (MODEL) (p. 124) Select the destination disk for each of the source disks. NT signature (p. 123) Select the way the recovered disk's signature will be handled. The disk signature is used by Windows and the Linux kernel version 2.6 and later.
6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine The selected volumes will be recovered to the physical disks of the machine the console is connected to. On selecting this, you proceed to the regular volume mapping procedure described below. Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 124) Choose the disk to recover the Master Boot Record to. NT signature: (p.
Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and relocate the volume by dragging it or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this feature, you can redistribute the disk space between the volumes being recovered. In this case, you will have to recover the volume to be reduced first. Tip: A volume cannot be resized when being recovered from a backup split into multiple removable media.
6.3.6.3 File destination To specify a destination: 1. Select a location to recover the backed up files to: Original location - files and folders will be recovered to the same path(s) as they are in the backup. For example, if you have backed up all files and folders in C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist, it will be created automatically. New location - files will be recovered to the location that you specify in the tree.
Do not overwrite existing file - this will give the file on the hard disk priority over the file in the backup. If you allow files to be overwritten, you still have an option to prevent overwriting of specific files by excluding (p. 126) them from the recovery operation. 6.3.7 Access credentials for destination To specify credentials 1.
hexadecimal code of this partition type is 0xFD. This will guarantee that the device will be automatically assembled following the reboot. To view or change the partition type, use a disk partitioning utility such as fdisk. Otherwise (such as in the second example), recover the device from bootable media—no reboot is required in this case. Use the mdadm utility for assembly. In bootable media, you may need to create the MD device manually, as described in Recovering MD devices and logical volumes (p.
The system uses Linux Loader (LILO) and was recovered from a normal (not from a raw, that is, sector-by-sector) backup LILO contains numerous references to absolute sector numbers and so cannot be repaired automatically except for the case when all data is recovered to the sectors that have the same absolute numbers as on the source disk. Solution: Reactivate the boot loader. You might also need to fix the loader configuration file for the reason described in the previous item.
title Red Hat Enterprise Linux Server (2.6.24.4) root (hd0,0) kernel /vmlinuz-2.6.24.4 ro root=/dev/sda2 rhgb quiet initrd /initrd-2.6.24.4.img The lines starting with title, root, kernel, and initrd respectively determine: The title of the menu item. The path to the kernel on that device and the root partition—in this example, the path is /vmlinuz-2.6.24.4 and the root partition is /dev/sda2.
While successful validation means high probability of successful recovery, it does not check all factors that influence the recovery process. If you back up the operating system, only a test recovery in bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the backup can be successfully validated using the bootable media. Different ways to create a validation task Using the Validation page is the most general way to create a validation task.
Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: User name.
If the archive is stored on a locally attached tape device, expand the Tape drives group, then click the required device. 2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 6.
The program will access the location using the credentials of the task account specified in the General section. Use the following credentials The program will access the location using the credentials you specify. Use this option if the task account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: User name.
"Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine. This will give access to the database until the failed machine is recovered. Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable media and creates an image. Then, the administrator mounts this image in read/write mode, scans and cleans it with an antivirus program, and finally recovers the machine.
After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext.
6.5.4 Volume selection Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows: 1. Select the check box for each volume you need to mount. 2. Click on the selected volume to set its mounting parameters. Access mode - choose the mode you want the volume to be mounted in: Read only - enables exploring and opening files within the backup without committing any changes.
a single backup - an archive consisting of a single full backup will be created. The export of an incremental or a differential backup is performed using consolidation of the preceding backups up to the nearest full backup your choice of backups belonging to the same archive - the resulting archive will contain only the specified backups. Consolidation is performed as required, so the resulting archive may contain full, incremental and differential backups.
export from an unmanaged centralized vault. The export is performed by the agent installed on the managed machine you specify. The destination can be any location accessible to the agent, including a managed vault. Tip. When configuring export to a deduplicating managed vault, choose a machine where the deduplication add-on to the agent is installed. Otherwise the export task will fail. Operations with an export task An export task starts immediately after you complete its configuration.
Enter the path to the location where the new archive will be created. Be sure to provide a distinct name and comment for the new archive. Access credentials (p. 143) [Optional] Provide credentials for the destination if the task credentials do not have enough privileges to access it. To access this option, select the Advanced view check box. After you have performed all the required steps, click OK to start the export task. 6.7.
Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself. If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Password. The password for the account. 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.7.
3. Naming the new archive By default, the exported archive inherits the name of the original archive.
To create Acronis Secure Zone, perform the following steps. Space Disk (p. 144) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 144) Specify the exact size of the zone. Moving or resizing of locked volumes, such as the volume containing the currently active operating system, requires a reboot. Settings Password (p.
6.8.1.3 Password for Acronis Secure Zone Setting up a password protects the Acronis Secure Zone from unauthorized access. The program will ask for the password at any operation relating to the zone and the archives located there, such as data backup and recovery, validating archives, resizing and deleting the zone. To set up a password 1. 2. 3. 4. Choose Use password. In the Enter the password field, type a new password. In the Confirm the password field, re-type the password. Click OK.
Use backup schemes with automatic cleanup to back up to the zone, or delete outdated archives manually using the vault management functionality. With the new Acronis Secure Zone behavior, you obtain the ability to: list archives located in the zone and backups included in each archive examine backup content mount a volume backup to copy files from the backup to a physical disk safely delete archives and backups from the archives. To learn more about operations with vaults, see the Vaults (p.
If you select several volumes, the space will be distributed proportionally to each partition. If you do not select any volume, the freed space becomes unallocated. After you click OK, Acronis Backup & Recovery 10 will start deleting the zone. When removing Acronis Backup & Recovery 10 agent from the system, you have two options: to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone. 6.
deploy an operating system on bare metal create basic or dynamic volumes on bare metal back up sector-by-sector a disk with an unsupported file system back up offline any data that cannot be backed up online because of restricted access, being permanently locked by the running applications or for any other reason.
If not configured, the Acronis loader waits for someone to select whether to boot the operating system (if present) or the Acronis component. If you set, say, 10 sec. for the bootable agent, the agent will launch 10 seconds after the menu is displayed. This enables unattended onsite operation when booting from a PXE server or WDS/RIS. 4. [optional] Remote logon settings: user name and password to be entered on the console side at connection to the agent.
Specifies the video mode to be used by the bootable media's graphical user interface. The mode number is given by mode_number in the hexadecimal format—for example: vga=0x318 Screen resolution and the number of colors corresponding to a mode number may be different on different machines. We recommend using the vga=ask parameter first to choose a value for mode_number. quiet Disables displaying of startup messages when the Linux kernel is loading, and starts the management console after the kernel is loaded.
6.10.1.2 Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: IP address Subnet mask Gateway DNS server WINS server. Once the bootable agent starts on a machine, the configuration is applied to the machine’s network interface card (NIC.) If the settings have not been pre-configured, the agent uses DHCP auto configuration.
If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console. 6.10.2 Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the IP address(es) obtained from DHCP or set according to the pre-configured values.
1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then proceed with booting. 3. From the list of supported video modes, choose the appropriate one by typing its number (for example, 318), and then press ENTER.
Acronis command line utilities acronis asamba lash restoreraids trueimagecmd trueimagemnt Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv
hexdump readcd hotplug reboot 6.10.5 Recovering MD devices and logical volumes To recover Linux Software RAID devices, known as MD devices, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery.
6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually. 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical volumes by using a Linux-based bootable media, and an example of such recovery. You can use a similar procedure in Linux.
The following picture illustrates this configuration. Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the machine from a Linux-based bootable media. 2. In the management console, press CTRL+ALT+F2. 3. Run the following commands to create the MD devices: mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/sd[ab] mdadm --create /dev/md1 --level=1 --raid-devices=2 /dev/sd[cd] 4.
3. 4. 5. 6. In Backup, click Change and then select the backup from which you want to recover data. In Data type, select Volumes. In Items to recover, select the check box next to my_volgroup-my_logvol. Under Where to recover, click Change, and then select the logical volume that you created in Step 1. Click the chevron buttons to expand the list of disks. 7. Click OK to start the recovery.
To collect system information 1. In the management console, select from the top menu Help > Collect system information from 'machine name'. 2. Specify where to save the file with system information. Copyright © Acronis, Inc.
7 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 166) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 169), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers. Agent-side cleanup Cleanup (p. 164) performed by an agent (p.
Backup options Configuration parameters of a backup operation (p. 161), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 162). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: what data to back up where to store the backup archive (p. 161) (the backup archive name and location) the backup scheme (p.
5. On each machine, the agent installed on the machine creates a backup plan (p. 162) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 164). 6. On each machine, the agent installed on the machine creates a set of centralized tasks (p. 164) that will carry out the plan. Backup scheme A part of the backup plan (p. 162) that includes the backup schedule and [optionally] the retention rules and the cleanup (p. 164) schedule. For example: perform full backup (p.
built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p. 162) can be applied to a built-in group. C Centralized backup plan A backup plan (p. 162) that appears on the managed machine (p. 169) as a result of deploying a backup policy (p. 162) from the management server (p. 170). Such plan can be modified only by editing the backup policy.
Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 162) that produces the archive. This operation checks if the archive has exceeded its maximum size and/or for expired backups. This may or may not result in deleting backups depending on whether the retention rules are violated or not. For more information please refer to Retention rules (p. 30). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p.
operations are configured on the management server (p. 170) and propagated by the server to the managed machines). The direct management operations include: creating and managing local backup plans (p. 169) creating and managing local tasks (p. 169), such as recovery tasks creating and managing personal vaults (p. 170) and archives stored there viewing the state, progress and properties of the centralized tasks (p.
Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, better performance or larger volume size. A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the dynamic volumes' configuration.
Dynamic volume Any volume located on dynamic disks (p. 166), or more precisely, on a disk group (p. 166). Dynamic volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired goal: to increase the volume size (a spanned volume) to reduce the access time (a striped volume) to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.) E Encrypted archive A backup archive (p. 161) encrypted according to the Advanced Encryption Standard (AES).
G GFS (Grandfather-Father-Son) A popular backup scheme (p. 163) aimed to maintain the optimal balance between a backup archive (p. 161) size and the number of recovery points (p. 170) available from the archive. GFS enables recovering with daily resolution for the last several days, weekly resolution for the last several weeks and monthly resolution for any time in the past. For more information please refer to GFS backup scheme (p. 24). I Image The same as Disk backup (p. 166).
Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 171) and storage node-side validation (p. 172) for each archive stored in the managed vault. An administrator can specify additional operations that the storage node will perform (deduplication (p. 165), encryption).
R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 169) managed by a management server (p. 170). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 171) procedure. Registration A procedure that adds a managed machine (p. 169) to a management server (p. 170). Registration sets up a trust relationship between the agent (p.
Since the cleanup schedule exists on the machine (p. 169) the agent (p. 160) resides on, and therefore uses the machine’s time and events, the agent has to initiate the storage node-side cleanup every time the scheduled time or event comes. To do so, the agent must be online. The following table summarizes the cleanup types used in Acronis Backup & Recovery 10.
the image being recovered is located in Acronis Secure Zone (p. 160) or when using Acronis Active Restore (p. 160), because these features are primarily meant for instant data recovery on the same machine. Universal Restore is not available when recovering Linux. Unmanaged vault Any vault (p. 173) that is not a managed vault (p. 169). V Validation An operation that checks the possibility of data recovery from a backup (p. 161).
Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1). WinPE is commonly used by OEMs and corporations for deployment, test, diagnostic and system repair purposes. A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. The Acronis Plug-in for WinPE (p. 160) enables running the Acronis Backup & Recovery 10 Agent (p. 160) in the preinstallation environment. 174 Copyright © Acronis, Inc.
8 Index Archive selection • 119, 120, 131, 132, 135, 139, 140 Archive validation • 103, 118 A B Access credentials • 135, 136 Back up later scheme • 110 Access credentials for archive location • 103, 108 Back up now scheme • 109 Access credentials for destination • 119, 127, 140, 143 Backing up RAID arrays (Linux) • 35 Access credentials for location • 119, 122 Backup • 17, 21, 161, 164, 165, 166, 168, 169, 173 Access credentials for source • 103, 106, 131, 133, 139, 141 Acronis Active Restore •
C Centralized backup plan • 38, 162, 163, 164 Default backup options • 44, 103 Default recovery options • 62, 119 Deleting Acronis Secure Zone • 146 Centralized management • 164, 165 Deleting archives and backups • 74, 75 Centralized task • 163, 164, 166 Destination selection • 122 Centralized vault • 164, 169, 170 Differential backup • 161, 165 Cleanup • 17, 161, 163, 164, 165, 171, 173 Direct management • 87, 160, 165, 169, 170 Collecting system information • 158 Disk backup (Image) • 160, 166,
Fits time interval • 85 Fonts • 41 M Full backup • 161, 163, 165, 168 Machine • 161, 162, 163, 164, 166, 167, 169, 170, 171, 172, 173 Full, incremental and differential backups • 17, 21, 109 Machine options • 42, 55, 67 G Getting started • 6 GFS (Grandfather-Father-Son) • 163, 169, 172 GFS backup scheme • 24, 169 Main area, views and action pages • 7, 10 Managed machine • 7, 17, 41, 160, 162, 164, 165, 169, 171, 172 Managed vault • 165, 168, 169, 171, 172, 173 Management Console • 14 H Management s
Owners and credentials • 23, 71, 120, 132, 140 Selecting files and folders • 106 P Setting up a display mode • 152 Password for Acronis Secure Zone • 144, 145 Setting up SNMP services on the receiving machine • 43 Personal vault • 160, 166, 170 Simple scheme • 110 Personal vaults • 39, 71 SNMP notifications • 42, 45, 54, 63, 67 Physical machine • 163, 170 Source files exclusion • 44, 46 Plan • 170 Source type • 99, 103, 104, 105 Policy • 170 Startup page • 40 Pop-up messages • 40 Static gro
Tower of Hanoi scheme • 113 U Understanding Acronis Backup & Recovery 10 • 17 Understanding states and statuses • 90 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) • 38, 172 Unmanaged vault • 161, 173 User privileges on a managed machine • 23, 104, 120, 132, 140 Using a single tape drive • 37 Using the management console • 7 V Validating vaults, archives and backups • 73, 74, 75, 93, 130 Validation • 17, 161, 172, 173 Validation rules • 162, 173 Vault • 17, 38, 145, 168, 170, 173 Vault