background image

 

 

Update 3 

Acronis® Backup & Recovery 10™ 
Advanced Server Virtual Edition 

User's Guide 

  

 

  
 

Summary of Contents for BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3

Page 1: ...Update 3 Acronis Backup Recovery 10 Advanced Server Virtual Edition User s Guide...

Page 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Page 3: ...ental and differential backups 34 2 5 GFS backup scheme 36 2 6 Tower of Hanoi backup scheme 39 2 7 Retention rules 42 2 8 Backing up dynamic volumes Windows 44 2 9 Backing up LVM volumes and MD device...

Page 4: ...5 Acronis WOL Proxy 97 3 2 6 VM protection options 97 3 2 7 Online backup proxy 98 3 3 Machine options 99 3 3 1 Machine management 99 3 3 2 Event tracing 100 3 3 3 Log cleanup rules 102 3 3 4 Online...

Page 5: ...ials for archive location 218 6 2 11 Backup schemes 219 6 2 12 Archive validation 228 6 2 13 Setting up regular conversion to a virtual machine 229 6 3 Recovering data 230 6 3 1 Task credentials 233 6...

Page 6: ...6 10 6 Acronis PXE Server 285 6 11 Disk management 287 6 11 1 Basic precautions 287 6 11 2 Running Acronis Disk Director Lite 287 6 11 3 Choosing the operating system for disk management 288 6 11 4 Di...

Page 7: ...90 8 1 4 How to secure my data 390 8 1 5 How to back up virtual machines to the online storage 390 8 1 6 Backup and recovery FAQ 391 8 1 7 Initial Seeding FAQ 392 8 1 8 Large Scale Recovery FAQ 397 8...

Page 8: ...g both capital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication me...

Page 9: ...then switch user as required Start the console with the command usr sbin acronis_console 3 Connect the console to the machine where the agent is installed Where to go from here For what to do next se...

Page 10: ...ee and then select each machine in turn The Information pane below shows the state and the details of plans and tasks existing on each machine and enables you to start stop edit and delete the plans a...

Page 11: ...server Group the registered machines by appropriate parameters create several policies and apply each policy to the appropriate group of machines For more information please refer to Grouping the regi...

Page 12: ...ws depend on whether the console is connected to a managed machine or to the management server Views for a managed machine When the console is connected to a managed machine the following views are av...

Page 13: ...anaging a centralized vault as well as the history of operations logged in the local logs of the registered machines and the storage nodes Shortcuts bar The Shortcuts bar appears under the navigation...

Page 14: ...e actions bars Actions Contains a list of common operations that can be performed on a managed machine or on a management server Always the same for all views Clicking the operation opens the respecti...

Page 15: ...pane How to change the panes borders 1 Point to the pane s border 2 When the pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the pan...

Page 16: ...lected item There are several ways of performing the same action on selected items By clicking the buttons on the table toolbar By clicking in the items in the Item s name Actions bar on the Actions a...

Page 17: ...nfigured by clicking the respective Change links to the right Others are selected from the drop down list or typed manually in the page s fields Action page Controls Acronis Backup Recovery 10 remembe...

Page 18: ...le provides Graphical User Interface and remote connection to the agents and other Acronis Backup Recovery 10 components Usage of the console is not licensed Bootable media builder With bootable media...

Page 19: ...tions such as cloning disks converting disks creating formatting and deleting volumes changing a disk partitioning style between MBR and GPT or changing a disk label can be performed either in the ope...

Page 20: ...iding on a VMware ESX or ESXi virtualization server The agent allows for backing up virtual machines from the host without having to install agents on each virtual machine The agent is delivered as a...

Page 21: ...of these machines in the vCenter and automatically register virtual machines created by Acronis Backup Recovery 10 in the vCenter Integration is available in all Acronis Backup Recovery 10 advanced ed...

Page 22: ...A managed vault can be configured as a deduplicating vault This means that identical data will be backed up to this vault only once to minimize the network usage during backup and storage space taken...

Page 23: ...ls on Windows can create bootable media based on either Windows Preinstallation Environment or Linux kernel The Universal Restore p 19 add on enables you to create bootable media with the restore to d...

Page 24: ...undation editions x86 x64 Windows Server 2008 R2 the Standard Enterprise Small Business Server Datacenter Foundation editions Windows MultiPoint Server 2010 Acronis Backup Recovery 10 Management Conso...

Page 25: ...entered the Agent for ESX ESXi will stop functioning Acronis Backup Recovery 10 Agent for Hyper V Windows Server 2008 2008 R2 x64 with Hyper V Microsoft Hyper V Server 2008 2008 R2 This agent installs...

Page 26: ...e Manager such as an Ubuntu system you need to install this manager manually for example by running the following command as the root user apt get install rpm 1 6 System requirements The components in...

Page 27: ...5 GB CPU reservation minimum 300 MHz recommended In a vCenter cluster a shared storage is required Network interface card or virtual network adapter is a common requirement for all the components Boo...

Page 28: ...ate bootable media p 411 4 Connect the console to the managed machine 5 Create a backup plan p 410 To do so you have to specify at the very least the data to be protected and the location where the ba...

Page 29: ...29 Copyright Acronis Inc 2000 2010 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Page 30: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Page 31: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Page 32: ...e Regular users A regular user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but w...

Page 33: ...ery task are owned by the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local bac...

Page 34: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Page 35: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Page 36: ...buried in used tapes A lot of Internet sources describe varieties of the GFS tape rotation scheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acro...

Page 37: ...ekly Monthly parameter splits the total schedule into daily weekly and monthly schedules Assume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be c...

Page 38: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Page 39: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Page 40: ...scheme pattern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table show...

Page 41: ...evel is kept until a new backup has been successfully created on the level The table shows the pattern for the five level backup scheme The pattern consists of 16 sessions As a result of using increme...

Page 42: ...rchive When there is insufficient space while backing up p 225 if you accept the risk of losing the last backup 1 Delete backups older than This is a time interval counted back from the moment when th...

Page 43: ...ention rules are applied the program will delete all backups created more than 3 months or more exactly 90 days ago If after the deletion the archive size is more than 200GB and the oldest backup is o...

Page 44: ...from consolidation always have maximum compression This means that all backups in an archive may acquire the maximum compression as a result of repeated cleanup with consolidation Best practices Maint...

Page 45: ...content Recovery to disk group unallocated space When a dynamic volume is recovered to disk group unallocated space both the type and the content of the resulting volume are recovered The unallocated...

Page 46: ...need to create or increase unallocated space on an existing disk group This can be done by deleting volumes or converting basic disks to dynamic You might want to change the target volume type basic s...

Page 47: ...a previously created logical volume Such is the case when you create the structure of logical volumes manually by using the lvm utility Recovering both the structure of logical volumes and their cont...

Page 48: ...with backups check box It is selected by default Before performing the first disk backup on a source machine run the following command trueimagecmd dumpraidinfo Either operation saves the machine s l...

Page 49: ...l DYN1 volume run the following command here the name of the backup is assumed to be home backup tib trueimagecmd partition dyn1 filename home backup tib create To back up the RAID 1 volume DYN2 run t...

Page 50: ...pended or switch between the three states during backup A virtual machine has to be offline stopped during the recovery to this machine The machine will be automatically stopped before recovery You ca...

Page 51: ...available Guest operating systems The following guest operating systems are supported Microsoft Windows platform Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Wi...

Page 52: ...Tools To install the VMware Tools 1 Run the VMware Infrastructure vSphere Client 2 Connect to the ESX server 3 Select the virtual machine and run the guest operating system 4 Right click the virtual...

Page 53: ...ty of a locally attached autoloader or tape library is limited to the ordinary tape drive This means that the program can only work with the currently mounted tape and you have to mount tapes manually...

Page 54: ...task insert or mount the tape containing the backup you need to recover When creating a recovery task select the tape device from the list of available locations and then select the backup After reco...

Page 55: ...backup archives on a managed machine disk space and therefore recovery of a disk to the same disk where the backup resides Certain Windows applications such as Acronis disk management tools can acces...

Page 56: ...will appear in the list of personal vaults and the old archives will be available for recovery 2 14 2 Acronis Startup Recovery Manager A modification of the bootable agent p 411 can be placed on a sys...

Page 57: ...aration Tool Sysprep does not solve this problem because Sysprep permits installing drivers only for Plug and Play devices sound cards network adapters video cards etc As for system Hardware Abstracti...

Page 58: ...repare the system with Sysprep image it and recover if need be using the Universal Restore Limitations Universal Restore is not available when a computer is booted with Acronis Startup Recovery Manage...

Page 59: ...amples Client oriented online services Web retailers polling stations 2 The system storage space ratio is heavily biased toward storage Some machines are being used as storage facilities where the ope...

Page 60: ...Recovery 10 Please be sure you have an understanding of how data is protected on a single machine p 28 before reading this section 2 15 1 Basic concepts Applying backup policies and tracking their ex...

Page 61: ...otection you install Acronis Backup Recovery 10 Storage Node p 419 and configure it to manage a centralized vault or multiple centralized vaults Such vaults are called managed vaults p 417 The storage...

Page 62: ...s your single entry point to the Acronis infrastructure 3 Install Acronis Backup Recovery 10 Agent on each of the machines to back up the machine s disks volumes or files Agent W Agent for Windows Age...

Page 63: ...tailed explanation of when and why you need to organize groups of machines can be found in the Grouping the registered machines p 65 section Here are some scenarios supported by the aforementioned Acr...

Page 64: ...be registered on the management server later will be added to this group and protected by the same policy 3 Apply the policy to the W_1 group Make sure that the policy has been successfully deployed...

Page 65: ...h of the accountants machines Once you apply the accounting department policy to the group the accountants machines become protected If a new accountant is hired you will have to add the new machine t...

Page 66: ...15 3 4 Example The diagram below presents an example of group hierarchy Six machines are registered on the management server 1 the international sales manager s laptop Windows Vista 2 the server that...

Page 67: ...in existing groups and populate them by manual adding machines static groups or by adding criteria of dynamic group membership You can also edit a group that is change the group name change the group...

Page 68: ...evoking a policy is the reverse action to the aggregate of applying and deploying Revoking removes the correspondence between the policy and one or more machines and then removes the tasks from the ma...

Page 69: ...policies on a machine when the machine is moved copied or deleted from a group In the diagram below the container stands for a group the one color circle stands for a machine with one applied policy...

Page 70: ...that a machine can be a member of only one group besides the All machines group Let s start from this simplified approach In the diagram below the container stands for a group the two color circle sta...

Page 71: ...both orange and green policies in spite of the fact that G3 has nothing to do with the orange policy That s why it is difficult to track the policies inheritance from the top of the hierarchy if the s...

Page 72: ...te on the machine is Deploying Once the backup plan is successfully created the policy state on the machine becomes Deployed You may need to modify the policy for some reason Once you confirm the chan...

Page 73: ...the data may appear in the future A backup plan is created as usual and the policy state is changed to Deployed If no data to back up is found at the time when the backup task starts the task will fa...

Page 74: ...ings OK The revoking log does not have errors and warnings In addition to the deployment state and status as related to a specific machine the backup policy has the deployment state and status on a gr...

Page 75: ...column displays the cumulative status for each policy This status is defined as the most severe status of the policy on all machines the policy is applied to If the policy is not applied to any machi...

Page 76: ...tabase In case the database is corrupted or the storage node is lost while the vault retains archives and the service folder containing metadata the new storage node rescans the vault and re creates t...

Page 77: ...2 15 6 3 When deduplication is most effective The following are cases when deduplication produces the maximum effect When backing up in the full backup mode similar data from different sources Such is...

Page 78: ...ample suppose that you are backing up two files with identical content from two machines If the size of each file is one gigabyte then the size of the backups in a non deduplicating vault will be appr...

Page 79: ...n restrictions During a file backup to an archive in a deduplicating vault deduplication of a file is not performed in the following cases If the file is encrypted and the In archives store encrypted...

Page 80: ...Windows if you leave the User name box empty the credentials under which the console is running will be used 4 To save the password for the specified user name select the Save password check box the p...

Page 81: ...in Linux Remote connections to a machine running Linux including those performed by the root user are established according to authentication policies which are set up by using Pluggable Authenticatio...

Page 82: ...Linux and VMware ESX 3 5 Upgrade 2 because the pam_succeed_if so module is not supported there In this case you can use the following authentication policy 1 As the root user create the file etc pam...

Page 83: ...trator of the management server without being a member of the Acronis Centralized Admins group By default this group includes all members of the Administrators group Acronis Remote Users A user who is...

Page 84: ...who is a member of the Administrators group on the storage node can additionally View and manage any archive in any centralized vault managed by the storage node Create centralized vaults to be manage...

Page 85: ...rvice you can either create a dedicated user account recommended in most cases or specify an existing account of a local or domain user for example LocalUser or DomainName DomainUser If you choose to...

Page 86: ...ate with each other using secure authentication and encryption This section also provides information on configuring communication settings selecting a network port for communication and managing secu...

Page 87: ...figuring communication settings You can configure communication settings such as whether to encrypt transferred data for Acronis Backup Recovery 10 components installed on one or more machines by usin...

Page 88: ...rt box Disabled The same as Not configured For details about the network port and instructions on how to specify it in Linux and a bootable environment see Network port configuration p 90 Client Encry...

Page 89: ...he use of SSL certificates is enabled on the server application Disabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts...

Page 90: ...nis_agent in Linux service After the port is changed on the server side connect to the server using the Server IP port or the Server hostname port URL notation Note If you use network address translat...

Page 91: ...the list of certificates for the local machine is not displayed in the Certificates console you can use the following procedure To open the list of a machine s certificates 1 Click Start then click Ru...

Page 92: ...type certmgr msc 2 In the Certificates console double click the name of the certificate that you want to install 3 In the Details tab in the list of fields click Thumbprint 4 Select and copy the field...

Page 93: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Page 94: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Page 95: ...set is Collect logs for All events Use the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all...

Page 96: ...s and warnings Errors only To disable this option clear the Log events check box 3 2 3 2 SNMP notifications This option defines whether the management server has to send its own log events to the spec...

Page 97: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Page 98: ...ual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Server Virtual Editi...

Page 99: ...Server To be able to use this option you must be logged on as a member of the Administrators group on the machine You have the opportunity to register the machine on the management server when install...

Page 100: ...ication Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the events to be logged You can override the settings set here ex...

Page 101: ...pplication the messages will be sent to Community type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong The typical community is...

Page 102: ...fines whether the Acronis agent will connect to the Internet through a proxy server Note Acronis Backup Recovery 10 Online supports only HTTP and HTTPS proxy servers To set up proxy server settings 1...

Page 103: ...lt backup options Once an agent is installed the default options have pre defined values which are referred to as presets in the documentation When creating a backup plan you can either use a default...

Page 104: ...le level security p 118 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 118 Dest removable media Dest removable media Dest removabl...

Page 105: ...er Dest FTP server Dest FTP server Dest FTP server Dest FTP server Save software RAID and LVM metadata along with backups Notifications E mail p 114 Win Pop up p 115 Event tracing Windows events log p...

Page 106: ...for file systems that are supported by Windows Select this check box to skip files and folders with the Hidden attribute If a folder is Hidden all of its contents including files that are not Hidden...

Page 107: ...you selected the folder MyFolder and the file MyFile tmp outside that folder and selected to skip all tmp files In this case all tmp files in the folder MyFolder will be skipped during the backup proc...

Page 108: ...ared Result Preset Perform the backup only after the command is successfully executed Fail the task if the command execution fails Perform the backup after the command is executed despite execution fa...

Page 109: ...efore and after the data capture process which takes seconds while the entire backup procedure may take much longer depending on the amount of data to be backed up Therefore the database or applicatio...

Page 110: ...path to a directory where the command batch file will be executed 3 In the Arguments field specify the command s execution arguments if required 4 Depending on the result you want to obtain select the...

Page 111: ...p This option also applies to file level backup when the file level backup is performed by taking a snapshot The File level backup snapshot p 110 option determines whether a snapshot will be taken dur...

Page 112: ...of writers that are present in the operating system To view this list run the following command vssadmin list writers Note In Microsoft Windows Small Business Server 2003 the writer for Microsoft Exc...

Page 113: ...the backup process priority Select one of the following Low to minimize resources taken by the backup process leaving more resources to other processes running on the machine Normal to run the backup...

Page 114: ...overy 10 provides the ability of notifying users about backup completion through e mail or the messaging service E mail This option is effective for Windows and Linux operating systems This option is...

Page 115: ...pup This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine This option is not available when operating under bootable med...

Page 116: ...log events of the backup operations in the Application Event Log Specify the types of events to be logged All events log all events information warnings and errors Errors and warnings Errors only Do...

Page 117: ...rogram determines whether a file has changed or not by the file size and the date time when the file was last modified Disabling this feature will make the program compare the entire file contents to...

Page 118: ...a different machine File encryption is available in Windows using the NTFS file system with the Encrypting File System EFS To access a file or folder encryption setting select Properties General Advan...

Page 119: ...e Restore or Universal Restore If the media is being created in Windows the disk management functionality will also be available 3 4 1 16 Error handling These options are effective for Windows and Lin...

Page 120: ...ady backup on the network This comes in handy in cases of slow or busy networks and time consuming backup procedures Disconnection during the copy transfer will not affect the backup operation as oppo...

Page 121: ...box and specify the time interval The task will start as soon as the conditions are met OR the maximum time delay lapses depending on which comes first Time diagram Wait until conditions are met Skip...

Page 122: ...by some specific needs leave them unchanged An archive can occupy several tapes In such cases a so called tape set is used for keeping the data backups Tape set is a logical group of one or more tape...

Page 123: ...a separate tape set option With some of the options below enabled the program will add new tapes to the tape set every time when a full incremental or differential backup is created For each full bac...

Page 124: ...abled In Windows operating systems each file has the File is ready for archiving attribute available by selecting File Properties General Advanced Archive and Index attributes This attribute also know...

Page 125: ...n this option is enabled Acronis Backup Recovery 10 will save information about the structure of logical volumes known as LVM volumes and of Linux Software RAID devices known as MD devices to the etc...

Page 126: ...for Windows Agent for Linux Bootable media Linux based or PE based Disk recovery File recovery also from a disk backup Disk recovery File recovery also from a disk backup Disk recovery File recovery...

Page 127: ...the following options Execute before the recovery Execute after the recovery 2 Do any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file...

Page 128: ...ccess You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard 5 Click Test command to check if the command is correct A post recovery comm...

Page 129: ...check box to activate notifications 2 In the E mail addresses field type the e mail address to which notifications will be sent You can enter several addresses separated by semicolons 3 Under Send no...

Page 130: ...e messages The Messenger service is not started by default in the Microsoft Windows Server 2003 family Change the service Startup mode to Automatic and start the service To configure WinPopup notifica...

Page 131: ...nes whether the agent s operating on the managed machine have to send the log events of the recovery operations to the specified Simple Network Management Protocol SNMP managers You can choose the typ...

Page 132: ...s first For example if the network location becomes unavailable or not reachable the program will attempt to reach the location every 30 seconds but no more than 5 times The attempts will be stopped a...

Page 133: ...You do not need a new SID when recovering a system over itself or when creating a system replica that will replace the original system Generate a new SID if the original and the recovered systems will...

Page 134: ...achine there is a chance the existing machine s replica will appear on the network To be on the safe side power on the recovered virtual machine manually after you take the necessary precautions Selec...

Page 135: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Page 136: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Page 137: ...art is not available if the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space...

Page 138: ...the Vault name actions item of the main menu The following is a guideline for you to perform operations with centralized vaults To Do Create a managed or an unmanaged vault 1 Click Create 2 In the Typ...

Page 139: ...vaults that reside on shared storages only Refresh a vault s information Click Refresh While you are reviewing the vault content archives can be added to the vault deleted or modified Click Refresh to...

Page 140: ...cryption Anything written to the vault will be encrypted and anything read from it will be decrypted transparently by the storage node using a vault specific encryption key stored on the storage node...

Page 141: ...to the storage node This encryption has nothing to do with the archive encryption specified by the backup plan and performed by an agent If the archive is already encrypted the storage node side encr...

Page 142: ...cording to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by...

Page 143: ...verview Acronis Backup Recovery 10 provides full support of a tape library through Acronis Backup Recovery 10 Storage Node The storage node should be installed on the machine a tape library is attache...

Page 144: ...ble barcode digital value Such labels are used for tape identification in a tape library or especially in off site storage If all cartridges in a tape library have barcodes the library is ready to be...

Page 145: ...l If you fill tape library slots with unused tapes all the tapes will be included into the Free pool automatically If a tape was used previously the RSM tries to detect the registered application the...

Page 146: ...covery 10 Management Server and Acronis Backup Recovery 10 Management Console installed on local or remote machines as well as Acronis Backup Recovery 10 Storage Node installed on the machine with the...

Page 147: ...and tasks that use this vault will fail The backup archives belonging to a deleting centralized vault on a tape library will be deleted as well but these archives might be recovered by any storage nod...

Page 148: ...more tapes so it might be durational The program finds the tapes and inserts them automatically in the right order The Task Need Interaction window comes up if a required tape is not found Keep in min...

Page 149: ...igation pane of the console click Manage tapes and then click Start inventory on the Tape Management window When inventorying is completed a user has the list of tapes currently loaded into the librar...

Page 150: ...or the Imported pool can be renamed on condition that the user account used to run the storage node service ASN User has write permissions for these pools These permissions are not assigned to ASN Us...

Page 151: ...user interaction the backup task will enter the Need Interaction state and wait for the tape with the required label to be loaded into the tape library device Use a free tape the backup will be writt...

Page 152: ...ed tapes for archiving If your backup archive must provide recovery with daily resolution for the last several days weekly resolution for the last several weeks and monthly resolution for any time in...

Page 153: ...e options for the case All the below analyzed examples are a simplistic approach to a real case but provide you with a general conception of backup distribution onto tapes Legend for the case example...

Page 154: ...e For each differential backup option is cleared Imagine the first backup operation is scheduled on Friday 1st of January On that day at 11 00 PM the first full backup 320 Gb on the tape whose size is...

Page 155: ...third week four incremental backups on the 4th week The next full backup 320 Gb should be written on Friday of the 4th week However tape 02 has only 104 Gb of free space at the moment So after the tap...

Page 156: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Page 157: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Page 158: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Page 159: ...l backup option is selected the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define th...

Page 160: ...task every 1 day at 11 00 PM Repeat once Number of levels 5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbe...

Page 161: ...information about it is deleted from the storage node database The figure shows the full backup kept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and...

Page 162: ...ups deleted at the moment are drawn as dark gray rectangles The figure indicates that there are two full backups on level E because at the moment the first full backup is a base for differential backu...

Page 163: ...assical five level ToH scheme Two additional tapes used for 1 keeping an old full backup postponed deletion as it is a base for other level backups 2 keeping an old backup on a level until a new backu...

Page 164: ...e planning Example 1 Imagine the case with the following features full backup size is F_GB average size of incremental backups is I_GB average size of differential backups is D_GB compression level pr...

Page 165: ...the line of backups that consists of two sections The figure below shows the sections at the moment before the first backup will be deleted In the figure the full differential and incremental backups...

Page 166: ...vaults view of the console select the vault rescan the tape select the archive and the backup to recover data from and create the recovery task If you don t know which tape has the data to recover yo...

Page 167: ...free space of the appropriate volume occupied space total size of backup archives and their metadata if it is located in the vault Other files that may be put to this folder by a user are not counted...

Page 168: ...The Edit personal vault page lets you edit the vault s name and information in the Comments field Change user account for accessing a vault Click Change user In the appearing dialog box provide the c...

Page 169: ...t 5 Delete the old vault How can I merge two vaults Suppose you have two vaults A and B in use Both vaults are used by backup plans You decide to leave only vault B moving all the archives from vault...

Page 170: ...program duplicates your selection in the new window that has check boxes for each archive and each backup Review the selection and correct if need be then confirm the deletion 4 3 2 Operations with ba...

Page 171: ...eletion 4 3 3 Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view but with check boxes for each archive and backup The archive or backup you have cho...

Page 172: ...mn s header type the archive name the owner name or the machine name As a result you will see the list of the archives whose names owner names or machine names fully or just partly coincide with the e...

Page 173: ...rrent user specify the user s account User logoff any user current user specify the user s account Shutting down is not the same as logging off The task will not run at a system shutdown System startu...

Page 174: ...ws Every day s Set up the certain number of days you want the task to be run For example if you set Every 2 day s the task will be started on every other day In the During the day execute the task are...

Page 175: ...tive From 09 15 2009 If September 15 2009 is the current date of the task s creation and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00...

Page 176: ...the task will be run once Every From Until Set up how many times the task will be run during the specified time interval For example setting the task frequency to Every 1 hour From 10 00 00 AM until...

Page 177: ...ox automatically selects the corresponding check boxes Mon Tue Wed Thu and Fri and leaves the remaining ones unchanged 2 Once at 09 00 00 PM 3 Effective From empty If you have created the task say on...

Page 178: ...systems To specify a monthly schedule In the Schedule area select the appropriate parameter as follows Months Select a certain month s you want to run the task in Days Select specific days of the mont...

Page 179: ...empty This schedule is widely used when creating a custom backup scheme The Last day of every month schedule is added to the full backups while the differential backups are scheduled to be performed...

Page 180: ...2 On All All workdays 3 Once at 10 00 00 PM 4 Effective From 11 01 2009 To not set Second schedule 1 Months March April May September October November 2 On All All workdays 3 Every 12 hours From 12 0...

Page 181: ...a backup plan that will back up hard disk data as soon as such a situation occurs When Windows detects a bad block on a hard disk it records an event with the event source disk and the event number 7...

Page 182: ...in the Source field and the event number shown in the Event ID field When you are finished click OK to close the Event Properties dialog box 5 5 Advanced scheduling settings The following advanced se...

Page 183: ...schedule to three machines Run the task Daily Every 2 Hour s From 09 00 00 AM Until 11 00 00 AM Distribute start time within the time window Maximum delay 1 Hour s Distribution method Random Then the...

Page 184: ...is defined by the Task start conditions p 120 backup option There you can specify how important the conditions are for the backup strategy conditions are obligatory put the backup task run on hold un...

Page 185: ...start immediately after the user becomes idle 3 If the user is still active at 11PM the backup task starts anyway 5 7 2 Location s host is available Applies to Windows Linux Location s host is availab...

Page 186: ...a result 1 if the user logs off between 04 30 00 PM and 10 00 00 PM the backup task will start immediately following the logging off 2 if the user logs off at any other time the task will be skipped W...

Page 187: ...es to Windows Linux Enables to put a backup task run on hold until the specified time interval since the last successful backup completion passes Example Run the backup task at system startup but only...

Page 188: ...s view with failed tasks where you can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what act...

Page 189: ...olume if it is different 2 Create at least one bootable media p 411 Create now will launch the Bootable Media Builder p 418 No backups have been created for X days Back up now The Dashboard warns you...

Page 190: ...ails and dashboard parameter the tasks will be displayed on the Dashboard among other alerts and warnings Alternatively you can review the task execution states in the Backup plans and tasks p 190 vie...

Page 191: ...pace on the vault ignore the read error create the missing Acronis Secure Zone 2 Running At least one task is running Otherwise see 3 No action is required 3 Waiting At least one task is waiting Other...

Page 192: ...s been started yet or some of the tasks are stopped or being stopped These situations are considered as normal Task states A task can be in one of the following states Idle Waiting Running Stopping Ne...

Page 193: ...ed In this case since the task is not running stop means removing it from the queue Task state diagram Task statuses A task can have one of the following statuses Error Warning OK A task status is der...

Page 194: ...ing is a guideline for you to perform operations with backup plans and tasks To Do Create a new backup plan or a task Click New then select one of the following Backup plan p 203 Recovery task p 230 V...

Page 195: ...rations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validation exporting conversion migration The task enters t...

Page 196: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Page 197: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Page 198: ...abling a backup plan Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backu...

Page 199: ...ecure Zone ASZ management Resizing changing password deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing Deduplication...

Page 200: ...t server centralized origin Policy for backup plans with centralized origin name of the backup policy whose deployment created the backup plan Account the name of the account under which the plan runs...

Page 201: ...plicated in the Log entry details p 203 window Opening the Log with pre filtered log entries Having selected items in other administration views Dashboard Backup plans and tasks you can open the Log v...

Page 202: ...ted It will contain information about who deleted the entries and when 6 1 3 2 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries To Do Display log e...

Page 203: ...t relates to if any Task the task the event relates to if any Code the program code of the event Every type of event in the program has its own code A code is an integer number that may be used by Acr...

Page 204: ...ify the data items to back up A list of items to backup depends on the data type specified previously Access credentials p 211 Optional Provide credentials for the source data if the plan s account do...

Page 205: ...e appears The setting status changes from Default to Custom Should you modify the setting again the line will display the new value unless the new value is the default one When the default value is se...

Page 206: ...account under which the plan s tasks will run To specify credentials 1 Select one of the following Run under the current user The tasks will run under the credentials with which the user who starts t...

Page 207: ...w check box 2 In Label enter the text label or select it from the drop down menu Parameters specification Parameter Value Description acronisTag label string A user defined label The label can be set...

Page 208: ...lan to keep safe only certain data the current project for example choose file backup This will reduce the archive size thus saving storage space Disks volumes Available if the Acronis Backup Recovery...

Page 209: ...d volumes If your operating system and its loader reside on different volumes always include both volumes in the backup The volumes must also be recovered together otherwise there is a high risk that...

Page 210: ...eselects all items 3 Click OK 6 2 5 3 Selecting entire virtual machines Backing up a virtual machine means backing up all the machine s disks plus the machine configuration To back up one or more virt...

Page 211: ...rtual machine cannot be backed up from the host To back up such machine or its disks install Agent for Windows or Agent for Linux on the machine A SAN LUN disk attached to an ESX ESXi virtual machine...

Page 212: ...Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard characters and in a file mask The asterisk substitutes for zero or more characters in a file name f...

Page 213: ...required networked machine and then click the shared folder If the network share requires access credentials the program will ask for them Note for Linux users To specify a Common Internet File Syste...

Page 214: ...ses Why two or more plans should not back up to the same archive 1 Backing up different sources to the same archive makes using the archive difficult from the usability standpoint When it comes to rec...

Page 215: ...ed file naming Example 1 Daily backup replacing the old one Consider the following scenario You want to perform a daily full backup of your machine You want to store the backup locally in the file MyM...

Page 216: ...to the file MyMachine tib on an external hard disk drive You have two such drives Either of them has the drive letter D when attached to the machine You want to swap the drives before each backup so...

Page 217: ...d to run every hour from 8 00 AM through 5 00 PM You want to include a creation date in the name of each backup file In this scenario you need to create two backup plans as follows a When creating the...

Page 218: ...on February 1 at noon Example 2 Suppose that you perform full backups with the same schedule and archive name as in the previous example Then the list of backup files after day two is the following My...

Page 219: ...of week when the daily backup will be performed and select from these days the day of weekly monthly backup Then you set the retention periods for the daily referred to as sons weekly referred to as f...

Page 220: ...remental To set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule when and how often to back up the data To learn more about setting up the sche...

Page 221: ...rs For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup type are as follows Daily 7 days recommended minimum Weekly 4 weeks...

Page 222: ...y deleted or inadvertently modified file if this has been discovered relatively quickly Have access to a weekly backup for 10 days after it was created Keep monthly backups for half a year Backup sche...

Page 223: ...ups Consider a more exotic GFS scheme Start backup at 12 00 PM Back up on Friday Weekly monthly Friday Keep backups Daily 1 week Weekly 1 month Monthly indefinitely Backup is thus performed only on Fr...

Page 224: ...els 4 This is how the first 14 days or 14 sessions of this scheme s schedule look Shaded numbers denote backup levels 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different...

Page 225: ...4 1 2 1 3 1 2 1 4 1 2 1 3 This gives us only a four day recovery interval which turns out to be the worst case scenario On day 14 the interval is five days It increases on subsequent days before decr...

Page 226: ...ll backup is in progress then delete the last full backup with all dependent incremental differential backups If there is only one full backup left and an incremental or differential backup is in prog...

Page 227: ...eanup This example demonstrates the use of all options available in the Custom scheme Suppose that we need a scheme that will produce monthly full backups weekly differential backups and daily increme...

Page 228: ...t from the list of tasks in the Backup plans and tasks section in the left pane If you have also specified the retention rules in your backup scheme the scheme will result in four tasks three backup t...

Page 229: ...l be created on the machine being backed up and will use this machine s date and time As a result of the first conversion a new virtual machine will be created Every subsequent conversion will re crea...

Page 230: ...the host that performs conversion is the best choice from the network usage standpoint A local disk is not an option though if the conversion is performed by the same machine that is backed up Using a...

Page 231: ...nt utility which enables you to create or delete volumes change a disk partitioning style create a disk group and perform other disk management operations on the target hardware both under the operati...

Page 232: ...store p 243 Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware Automatic drivers search Specify where the program should search for HAL mass storage...

Page 233: ...the location in the Path field or select the desired folder in the folders tree If the archive is stored in Acronis Online Backup Storage click Log in and specify the credentials to log in to the onli...

Page 234: ...he Path field bsp node_address vault_name To access an unmanaged centralized vault type the full path to the vault s folder 2 In the table to the right of the tree select the archive The table display...

Page 235: ...by selecting the corresponding check boxes in the archives tree Selecting a folder automatically selects all its nested folders and files Use the table to the right of the archives tree to select the...

Page 236: ...The virtual machine files will be saved to the destination you specify If Acronis Backup Recovery 10 Agent for Hyper V or Agent for ESX ESXi is installed These agents enable creating a new virtual mac...

Page 237: ...on the disk and programs won t find their files The operating system on that disk will be unbootable To retain system bootability on the target disk volume choose one of the following Select automati...

Page 238: ...ke changes if necessary Then you proceed to the regular volume mapping procedure described below Existing virtual machine Available when the Acronis Backup Recovery 10 Agent for Hyper V or Agent for E...

Page 239: ...ecover the volume to be reduced first Tip A volume cannot be resized when being recovered from a backup split into multiple removable media To be able to resize the volume copy all parts of the backup...

Page 240: ...letters to volumes that are inaccessible to Windows such as to those other than FAT and NTFS 6 3 6 3 Virtual machine type virtualization server selection The new virtual machine can be created either...

Page 241: ...tion server the default server s setting This is the number of processors of the new virtual machine In most cases it is set to one The result of assignment of more than one processor to the machine i...

Page 242: ...es folders named F from all folders with the name Finance Linux By file path home user Finance F log Excludes the file named F log located in the folder home user Finance The above settings are not ef...

Page 243: ...iversal Restore Use Acronis Backup Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware Universal Restore handles differences in devices that are critical...

Page 244: ...es for the network adapter driver the path to the found driver is then transmitted by Universal Restore to the operating system If the hardware has multiple network interface cards Universal Restore w...

Page 245: ...osoft Virtual PC does not support disks that are larger than 127 GB Acronis enables you to create a Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper V virtual...

Page 246: ...it using bootable media and perform recovery just like you do on a physical machine The LVM structure can be automatically recreated p 281 during recovery if it has been saved p 48 in the backup 6 3 1...

Page 247: ...om a normal not from a raw that is sector by sector backup LILO contains numerous references to absolute sector numbers and so cannot be repaired automatically except for the case when all data is rec...

Page 248: ...wing form title Red Hat Enterprise Linux Server 2 6 24 4 root hd0 0 kernel vmlinuz 2 6 24 4 ro root dev sda2 rhgb quiet initrd initrd 2 6 24 4 img The lines starting with title root kernel and initrd...

Page 249: ...At starting Windows boot bcd is mounted to the registry key HKLM BCD00000000 6 3 12 Assembling MD devices for recovery Linux In Linux when performing recovery from a disk backup to an existing MD dev...

Page 250: ...the problem occurs when recovering 1 million files try recovering the first 500 000 of them and then the remaining 500 000 Modify the registry as follows Note This procedure requires restarting the m...

Page 251: ...from a backup Validation of a file backup imitates recovery of all files from the backup to a dummy destination Validation of a disk or volume backup calculates a checksum for every data block saved...

Page 252: ...task account does not have enough privileges to access it To access this option select the check box for Advanced view When to validate Validate p 255 Specify when and how often to perform validation...

Page 253: ...then select the required networked machine and then click the shared folder If the network share requires access credentials the program will ask for them Note for Linux users To specify a Common Int...

Page 254: ...click the required folder To select a network share expand the Network folders group select the required networked machine and then click the shared folder If the network share requires access credent...

Page 255: ...on that is after clicking OK on the Validation page Later to start the one time validation task at the date and time you specify Specify the appropriate parameters as follows Date and time the date an...

Page 256: ...lect the desired folder in the folders tree If the archive is stored in Acronis Online Backup Storage click Log in and specify the credentials to log in to the online storage Then expand the Online ba...

Page 257: ...ct the archive The table displays the names of the archives contained in each vault folder you select While you are reviewing the location content archives can be added deleted or modified by another...

Page 258: ...wn list Mount point in Linux specify the directory where you want the volume to be mounted 3 If several volumes are selected for mounting click on every volume to set its mounting parameters described...

Page 259: ...to save the initial full backup to a detachable media Then send the media to the remote location There the backup will be exported from the media to the target storage Subsequent incremental backups...

Page 260: ...a machine where the deduplication add on to the agent is installed Otherwise the export task will fail Operations with an export task An export task starts immediately after you complete its configur...

Page 261: ...eges to access it To access this option select the Advanced view check box After you have performed all the required steps click OK to start the export task 6 7 1 Task credentials Provide credentials...

Page 262: ...a mount point such as mnt share select this mount point instead of the network share itself If the archive is stored on an FTP or SFTP server type the server name or address in the Path field as follo...

Page 263: ...ght need to provide special credentials for a network share or a storage node vault Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name...

Page 264: ...folders tree contains Local folders group to export data onto the hard drives that are local to the storage node Network folders group to export data to a network share If the network share requires a...

Page 265: ...FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer 6 8 Acronis Secure Zone Acronis Secur...

Page 266: ...your selection You will be able to set the exact zone size in the Acronis Secure Zone Size p 266 window 3 Click OK 6 8 1 2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slid...

Page 267: ...olume size Only when all volumes on the disk have 25 or less free space will the program continue decreasing the volumes proportionally As is apparent from the above setting the maximum possible zone...

Page 268: ...age click Decrease 2 Select volumes that will receive free space after the zone is decreased 3 Specify the new size of the zone by dragging the slider and selecting any size between the current and mi...

Page 269: ...system when it fails to boot boot the machine from a separate bootable rescue media use network boot from Acronis PXE Server or Microsoft Remote Installation Services RIS See the Bootable media p 269...

Page 270: ...D controllers or certain levels of RAID arrays only Media based on PE 2 x that is Windows Vista or Windows Server 2008 kernel allows for dynamic loading of the necessary device drivers 6 10 1 How to c...

Page 271: ...890 4932 81a5 5b50c657de08 DisplayLang en Automated Installation Kit AIK for Windows 7 PE 3 0 http www microsoft com downloads details aspx familyid 696DD665 9F76 4177 A811 39C26D3B3B34 displaylang en...

Page 272: ...f media to create You can create CD DVD or other bootable media such as removable USB flash drives if the hardware BIOS allows for boot from such media build an ISO image of a bootable disc to burn it...

Page 273: ...ly specified when creating the bootable media but you can remove this parameter while in the boot menu Without this parameter all startup messages will be displayed followed by a command prompt To sta...

Page 274: ...IC will be assigned the appropriate settings create the media on the server for which the media is customized When you select an existing NIC in the wizard window its settings are selected for saving...

Page 275: ...tly specify from the media This is necessary when the target hardware has a specific mass storage controller such as a SCSI RAID or Fiber Channel adapter for the hard disk For more information please...

Page 276: ...e Media Builder provides three methods of integrating Acronis Backup Recovery 10 with WinPE 2 x or 3 0 Adding the Acronis Plug in to the existing PE ISO This comes in handy when you have to add the pl...

Page 277: ...sword to access it 8 Check your settings in the summary screen and click Proceed 9 Burn the ISO to CD or DVD using a third party tool or copy to a flash drive Once a machine boots into WinPE Acronis B...

Page 278: ...onsole menu and specify one of the machine s IP addresses Provide the user name and password if these have been configured when creating the bootable media Local connection Acronis Backup Recovery 10...

Page 279: ...reate the bootable media with the appropriate mode number in our example vga 0x318 typed in the Kernel parameters window see the Bootable Media Builder p 271 section for details 6 10 3 2 Configuring i...

Page 280: ...s available in Linux based bootable media Linux based bootable media contains the following commands and command line utilities which you can use when running a command shell To start the command shel...

Page 281: ...adm and lvm utilities see Creating the volume structure manually p 282 6 10 5 1 Creating the volume structure automatically Let s assume that you saved p 48 the volume structure to the etc Acronis dir...

Page 282: ...ructure or if it is not present in the archive create the structure manually 6 10 5 2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical...

Page 283: ...d disks mounted on dev sda dev sdb dev sdc and dev sdd respectively The first and second pairs of hard disks are configured as two MD devices both in the RAID 1 configuration and are mounted on dev md...

Page 284: ...the backup from which you want to recover data 4 In Data type select Volumes 5 In Items to recover select the check box next to my_volgroup my_logvol 6 Under Where to recover click Change and then se...

Page 285: ...reduces the time required for booting multiple machines as compared to using physical bootable media Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder To uplo...

Page 286: ...ds make sure that the card supported by the BIOS has the network cable plugged in 6 10 6 3 PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine add to the...

Page 287: ...n account with administrator s rights Please take all necessary precautions p 287 to avoid possible data loss 6 11 1 Basic precautions To avoid any possible disk and volume structure damage or data lo...

Page 288: ...nsole toolbar after The current disk layout is for Click the OS name to select another operating system in the Operating System Selection window Under bootable media this window appears after clicking...

Page 289: ...the disk close them all 6 11 5 1 Disk initialization If you add any new disk to your machine Acronis Disk Director Lite will notice the configuration change and scan the added disk to include it to th...

Page 290: ...peration The program enables the user to select a disk if its size will be sufficient to hold all the data from the source disk without any loss If there is some data on the disk that was chosen as th...

Page 291: ...sk will lose their letters all paths will be invalid on the disk and programs won t find their files The operating system on that disk will be unbootable You have the following two alternatives to ret...

Page 292: ...lume If you plan to install an OS that does not support GPT disks the reverse conversion of the disk to MBR is also possible through the same menu items the name of the operation will be listed as Con...

Page 293: ...full and the size of its volumes cannot be decreased automatically the basic disk to dynamic conversion operation will fail Should you decide to revert your dynamic disks back to basic ones e g if you...

Page 294: ...erating system Dynamic to basic conversion of the disk comprising of system volumes takes a certain amount of time and any power loss unintentional turning off of the machine or accidental pressing of...

Page 295: ...ume and start again If you can not determine which applications use the volume close them all 6 11 6 1 Creating a volume You might need a new volume to Recover a previously saved backup copy in the ex...

Page 296: ...ntage remains inherent with the mirror architecture a low disk to volume size ratio RAID 5 A fault tolerant volume whose data is striped across an array of three or more disks The disks do not need to...

Page 297: ...te a Striped volume Select two or more destination disks to create the volume on To create a RAID 5 volume Select three destination disks to create the volume on After you choose the disks the wizard...

Page 298: ...ster size best suited to the volume with the chosen file system If you are creating a basic volume which can be made into a system volume this page will be different giving you the opportunity to sele...

Page 299: ...ill effectively cancel them 6 11 6 3 Set active volume If you have several primary volumes you must specify one to be the boot volume For this you can set a volume to become active A disk can have onl...

Page 300: ...ume label is an optional attribute It is a name assigned to a volume for easier recognition For example one volume could be called SYSTEM a volume with an operating system or PROGRAM an application vo...

Page 301: ...ome programs e g Setup programs might calculate its disk space incorrectly 6 11 7 Pending operations All operations which were prepared by the user in manual mode or with the aid of a wizard are consi...

Page 302: ...athers information about the machine to which the management console is connected and saves it to a file You may want to provide this file when contacting Acronis technical support This option is avai...

Page 303: ...t the top If there are no alerts or warnings at the moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer...

Page 304: ...en the Machines view with the list of machines filtered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is rec...

Page 305: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Page 306: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Page 307: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Page 308: ...s related to the selected policy Refresh a list of policies Click Refresh The management console will update the list of backup policies from the management server with the most recent information Tho...

Page 309: ...needs and preferences To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Clic...

Page 310: ...administrator checks its status A machine s status is defined as the most severe status of all backup plans p 191 both local and centralized existing on the machine and all backup policies p 306 appl...

Page 311: ...ations such as start stop tasks revoke policies explore the policy inheritance etc The panel is collapsed by default To expand the panel click the chevron The content of the panel is also duplicated i...

Page 312: ...lick Apply backup policy In the Policy selection window specify the backup policy you need to apply to the selected machine Grouping actions To Do Create a custom static or dynamic group Click Create...

Page 313: ...anaged machine Enables to administer a managed machine and perform all the direct management operations Other operations View detailed information on a machine Click View details In the Machine detail...

Page 314: ...nt Select the Save password check box to store the password for future connections 5 Click OK Initiating registration on the machine side The registration procedure can be initiated on the machine sid...

Page 315: ...the management server A registered machine has to be specified by its registration address that is you need to provide exactly the same host name fully qualified domain name FQDN or IP address as was...

Page 316: ...mechanism is used to operate on all the machines Importing machines from a text file To import machines from a file 1 In the Navigation tree select Physical machines or All physical machines 2 Click I...

Page 317: ...oon as the machine becomes available to the server Machine details Accumulates in four tabs all information on the selected machine Lets the management server administrator perform operations with the...

Page 318: ...n in Windows Backup policies Displays a list of backup policies applied to the selected machine and lets the management server administrator perform the following operations To Do View details of a po...

Page 319: ...og p 201 view containing the list of the task related log entries Run a plan task Backup plan Click Run In the Run Backup Plan p 198 window select the task you need to run Running the backup plan star...

Page 320: ...e to change the scheme to Grandfather Father Son or Tower of Hanoi 2 If the Tower of Hanoi scheme is used it is not possible to change the number of levels In all other cases the scheme can be changed...

Page 321: ...g on the machine with the most recent information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manu...

Page 322: ...p1 in the root contains Group2 to which the policy is applied directly Group2 in turn contains child Group3 that inherits the policy from the parent and applies the policy to Machine1 respectively The...

Page 323: ...window specify the backup policy you need to apply to the selected group If there are child groups in the selected group the backup policy will be applied to them as well View detailed information on...

Page 324: ...f the dynamic group Organizational unit p 325 All the machines belonging to the specified organizational unit OU will be members of the dynamic group IP address range All the machines whose IP address...

Page 325: ...d in the management server options the program will ask you to provide them The credentials will be saved in the Domain access credentials p 97 option For example suppose that the domain us corp examp...

Page 326: ...he same way as creating p 324 one Changing the type of group will result in its conversion Any custom group can be converted to a dynamic group if it was static and vice versa When converting a static...

Page 327: ...way as for the Backup policies view See the Filtering and sorting backup policies p 308 section for details Inheritance order The Inheritance order window lets you examine where the policy applied to...

Page 328: ...n the management server If the machine is already registered skip this step 4 The virtual machines hosted on the Hyper V server appear in the All virtual machines group Adding ESX ESXi virtual machine...

Page 329: ...rage vault Grouping of virtual machines The Virtual machines section of the navigation tree contains one built in group called All virtual machines You cannot modify this group manually delete or move...

Page 330: ...and registered on the management server Virtual machines dynamically grouped by their hosts will appear on the management server and you will be able to apply backup policies to the virtual machines o...

Page 331: ...on Centralized backup plans and recovery tasks originating from the management server will run under this account by default This means the account must have the necessary privileges p 333 on the vCen...

Page 332: ...t virtual appliance VA is deployed to a storage shared by all the cluster s hosts Normally this is an NFS share or a SAN LUN attached to each of the hosts Let s assume that the cluster contains three...

Page 333: ...Xi Virtual Appliance be hosted on a host for which all shared storages of the cluster are accessible In this case backup performance remains optimal wherever within the shared storages a virtual machi...

Page 334: ...se datastore Low level file operations Global Licenses required on ESX host only required on ESX host only Network Assign network Resource Assign VM to resource pool Virtual machine Configuration Add...

Page 335: ...hin a specific vCenter folder assign the user the following privileges on the folder Operation Object Privilege Back up a VM Back up a VM s disk Recover to an existing VM Datastore Allocate space Glob...

Page 336: ...nt server or become unavailable for backup and restore if integration with the vCenter is still enabled The Virtual Edition license on the license server will not be freed up automatically Revoke it m...

Page 337: ...the managed vault 7 1 5 1 Actions on storage nodes All the operations described here are performed by clicking the corresponding buttons on the toolbar The operations can be also accessed from the St...

Page 338: ...nodes from the management server with the most recent information Though the list of storage nodes is refreshed automatically based on events the data may not be retrieved immediately from the manage...

Page 339: ...the node from the current management server Archives the total number of archives stored in all the vaults managed by the storage node Backups the total number of backups stored within the archives i...

Page 340: ...ist of the log entries related to the selected task Run a task Click Run The task will be executed immediately in spite of its schedule Stop a task Click Stop What will happen if I stop the task Gener...

Page 341: ...orage node has a built in service task called a compacting task This task cannot be deleted Refresh tasks table Click Refresh The management console will update the list of tasks existing on the machi...

Page 342: ...A local event log holds information about Acronis Backup Recovery 10 operations on a managed machine For example creating a backup plan executing a backup plan managing archives in personal vaults ex...

Page 343: ...will display a list of the log entries related to the selected policy Tasks Select a task and then click View log The Log view appears with the log entries belonging to the selected task 7 1 7 1 Actio...

Page 344: ...which to display the log entries Filter log entries by type Press or release the following toolbar buttons to filter error messages to filter warning messages to filter information messages Filter log...

Page 345: ...to solve the problem Module Blank or the number of program module where an error was occurred It is an integer number that may be used by Acronis support service to solve the problem Owner User name...

Page 346: ...ates customizable and predefined In a customizable report template you can specify which entries to include in the report by using filters A predefined report template is preset so that you can genera...

Page 347: ...urce type The type of data backed up under the backup policies Disks volumes and or Files Deployment state The deployment states of the backup policies for example Deployed Status The statuses of the...

Page 348: ...machines This report consists of one or more tables Filters Under Filters choose which tasks to include in the report Only the tasks that meet all filter criteria are included Origin The types of ori...

Page 349: ...ves contains With the default filter settings the report includes all archives that are stored in the centralized managed vaults Report view Under Report view choose how the report will look Select wh...

Page 350: ...ich the tasks are based The default setting means all backup policies that ever existed during the report period Machines The list of machines on which the tasks exist Type The task types for example...

Page 351: ...nistrative template differ from those set through the graphical user interface the template based parameters take precedence and are effective immediately the parameters shown in the GUI will be chang...

Page 352: ...red settings After loading the template or editing its settings you should restart the configured component s or some of their services For detailed information about Windows GPO Editor please see htt...

Page 353: ...ith the Failed status Vault Warnings and Limits Specifies the amount of free space in a vault both as an absolute value and as a percentage below which a warning or error is recorded in the log This p...

Page 354: ...ing until the vault s free space is above the limit Vault Database Free Space Warning Limit Description Specifies the amount of free space in megabytes on the volume containing a managed vault s datab...

Page 355: ...or 5 Critical error Default value 0 all entries will be collected Log Cleanup Rules Specifies how to clean up the centralized event log stored in the management server s reporting database This parame...

Page 356: ...gging information 2 Information 3 Warning 4 Error or 5 Critical error Default value 4 only errors and critical errors will be sent if Trace State is set to True SNMP Address Description Specifies the...

Page 357: ...Period in seconds Description Specifies how often in seconds to perform synchronization for machines that have a normal synchronization priority typically the machines without currently running centra...

Page 358: ...nection Atempt to True only in networks which often experience problems with their DNS servers and provided that the machines IP addresses change infrequently as in cases of fixed IP addresses or long...

Page 359: ...f this setting is 0 the management server uses the Snapshot Storage Relative Size setting The initial size will not exceed the available space minus 50 MB Snapshot Storage Relative Size This setting i...

Page 360: ...License Server as counted from the moment of installation or from the last successful check License Server Connection Retry Interval in hours Description Specifies the interval in hours between conne...

Page 361: ...ement Protocol SNMP This parameter has the following settings Trace State Description Specifies whether to send the SNMP notifications Possible values True or False Default value False Trace Level Des...

Page 362: ...n Specifies the initial size of the snapshot storage in megabytes Possible values Any integer number between 0 and 2147483647 Default value 0 If this setting is 0 the management server uses the Snapsh...

Page 363: ...ection to a server application which requires encryption will not be established Required Data transfer will be performed only if encryption is enabled on the server application see Server Encryption...

Page 364: ...options it will be encrypted Authentication parameters In Use Agent Certificate Authentication select one of the following Do not use The use of SSL certificates is disabled Any connection to a clien...

Page 365: ...e particular component Win32 Trace Minimal Level Description Specifies the minimum severity level of events to be recorded in the System event log Only events of levels greater than or equal to Win32...

Page 366: ...pactingTrigge rThreshold As backups are deleted from a deduplicating vault its deduplication data stores p 76 may contain unused items files or disk blocks that are no longer referred to from any back...

Page 367: ...OCAL_MACHINE SOFTWARE Acronis ASN Configuration StorageNode DatabasePath TapesDatabasePath Description Specifies the folder where Acronis Backup Recovery 10 Storage Node stores its tape vaults databas...

Page 368: ...h to the location where the backup archive will be stored and the archive name It is advisable that the archive name be unique within the location The location must be available at the time when the m...

Page 369: ...shared location such as a network folder or a managed vault so that the selected machine can access the archive When to convert p 229 Optional Specify whether to convert every full every incremental...

Page 370: ...on a managed machine p 32 section 7 3 2 Items to back up Specify selection rules for backing up items selected in the Source type field of the General section Volumes to back up selection rules p 370...

Page 371: ...Refers to all volumes other than removable media Fixed volumes include volumes on SCSI ATAPI ATA SSA SAS and SATA devices and on RAID arrays Linux volumes First partition on the first IDE hard disk o...

Page 372: ...both SYSTEM and BOOT Operating systems starting from Windows 7 and Windows Server 2008 R2 create a dedicated system volume called System Reserved If you select SYSTEM only this dedicated volume will...

Page 373: ...their type consider including three entries in the Volumes to back up selection rules dialog box one for each possible type For example to back up the first hard disk of each Linux machine under a ce...

Page 374: ...der C Windows C Windows Environment variables Some environment variables point to Windows folders Using such variables instead of full folder and file paths ensures that proper Windows folders are bac...

Page 375: ...ecify credentials required for access to the data you are going to back up To specify credentials 1 Select one of the following Use the policy credentials The program will access the source data using...

Page 376: ...Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard characters and in a file mask The asterisk substitutes for zero or more characters in a file name f...

Page 377: ...requires access credentials the program will ask for them To store archives on an FTP or SFTP server expand the corresponding group and reach the appropriate server then select the folder that will b...

Page 378: ...e program will access the location using the credentials of the backup policy specified in the General section Use the following credentials The program will access the location using the credentials...

Page 379: ...p types add conditions and specify the retention rules Initial seeding to save locally a full backup whose final destination is Acronis Online Backup Storage 7 3 7 1 Back up now scheme With the Back u...

Page 380: ...Jan 22 Jan 28 D D D D M Jan 29 Feb 4 D D D D W Feb 5 Feb 11 D D D D W Feb 12 Feb 18 D D D D W Feb 19 Feb 25 D D D D M Feb 26 Mar 4 D D D D W Daily backups run every workday except Friday which is left...

Page 381: ...ght see a weekly or a monthly backup remain in the archive for a few days past its expected expiration date If the schedule starts with a daily or a weekly backup a full backup is created instead Exam...

Page 382: ...to recover a previous version of a damaged file from a daily backup as well as 10 day access to weekly backups Each monthly full backup will be available for six months since the creation date Work sc...

Page 383: ...ce Up to 16 levels of full differential and incremental backups Next level backups are twice as rare as previous level backups One backup of each level is stored at a time Higher density of more recen...

Page 384: ...ackups accumulate toward the current time Having four backups we could recover data as of today yesterday half a week or a week ago Roll back period The number of days we can go back in the archive is...

Page 385: ...s Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup For example the full backup can be set up to run every Sunday at 1 00 AM as soon as all u...

Page 386: ...ules p 42 For example the cleanup procedure can be set up to run after each backup and also on schedule This option is available only if you have set at least one retention rule in Retention rules Cle...

Page 387: ...heduled at 9 00 PM may actually start later as soon as the backup location becomes available Likewise backup tasks for incremental and differential backups will wait until all users are logged off and...

Page 388: ...ails 7 3 8 Archive validation Set up the validation task to check if the backed up data is recoverable If the backup could not pass the validation successfully the validation task fails and the backup...

Page 389: ...Storage To use this service you need to buy a subscription that determines the amount of storage space reserved for your backups storage quota and how long the online service will be available to you...

Page 390: ...cronis software onto the virtualization host This approach comes in handy when the virtualization product installed on the host server is VMware ESX i or Windows Server 2008 with Hyper V or Microsoft...

Page 391: ...available only for online storage is Initial seeding This is the Back up now scheme using local destination and full backup method To use this scheme you need a license for the Initial Seeding p 392 s...

Page 392: ...ore the machine is not able to back up to the subscription it used before recovery This happens regardless of recovery to new or to different hardware To continue backing up the machine to the same su...

Page 393: ...one per machine 8 1 7 7 How to buy an Initial Seeding license You can buy an Initial Seeding license from an Acronis partner or in Acronis online store Follow the link www acronis eu my backup recove...

Page 394: ...kup plan to do incremental backups In Backup scheme select Back up now Back up later for manual backups or Simple for scheduled backups For Simple specify the schedule and optionally the retention rul...

Page 395: ...company s web site prepare and print two prepaid shipping labels 1 Shipping label for sending your hard drive This label is placed on the top of the box You should send your package to one of the Acr...

Page 396: ...the license cannot be used for any other machine From this point on you can cancel the order if something goes wrong This will return the license to the pool of available licenses A full backup has st...

Page 397: ...these issues Occasional The order has been cancelled The order had been cancelled before the media was shipped so returning the media is not required Occasional The order has been cancelled The media...

Page 398: ...le on the Initial Seeding Recovery tab A license purchased in Acronis online store becomes available immediately after the payment is processed 8 1 8 8 How do I track a Large Scale Recovery order stat...

Page 399: ...ate online backup subscriptions in the Actions menu 2 Click Go to account management Web page 3 Log in to your account create one if you are not registered yet 8 1 9 2 Where do I find the subscription...

Page 400: ...on appears in the Next subscription column for the selected machine Renewing a number of activated subscriptions at once This operation is possible if the appropriate number of new subscriptions are i...

Page 401: ...des come with the purchase confirmation e mail Next install Acronis software if not yet installed and assign p 402 each subscription to a machine The subscriptions become activated After that you can...

Page 402: ...long with paid ones The same expiration rules apply to trial and paid subscriptions To continue using the service after the trial subscription expires buy the same type subscription and renew the tria...

Page 403: ...ther machine You reinstalled Acronis Backup Recovery 10 on a machine and want to resume its online backups You recovered a machine to bare metal or to a state when it did not yet have an activated sub...

Page 404: ...have the following options Before reassigning Delete backups from Subscription 1 using Machine 1 if it is available and turned on Delete backups from Subscription 2 using Machine 2 After reassigning...

Page 405: ...s please refer to the context sensitive help 8 6 Limitations of the online storage Unlike other types of storage available in Acronis Backup Recovery 10 the online storage has the following limitation...

Page 406: ...od does not start counting down until the subscription is activated Assigned subscription A subscription that has been assigned to a machine Available subscription A subscription that is not assigned...

Page 407: ...ption Assign a subscription that has the same storage quota as the current activated subscription This subscription will become activated as soon as the current subscription expires Storage quota The...

Page 408: ...secure volume for storing backup archives p 409 within a managed machine p 417 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost effective and handy...

Page 409: ...gle backup operation p 409 Physically it is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TI...

Page 410: ...immediately after its creation this is a validation rule protect the archive with a password this is an option Physically a backup plan is a bundle of tasks p 420 configured for execution on a managed...

Page 411: ...ent is based on Linux kernel A machine p 417 can be booted into a bootable agent using either bootable media p 411 or Acronis PXE Server Operations can be configured and controlled either locally thro...

Page 412: ...p 419 monitoring activities of the Acronis Backup Recovery 10 components viewing the centralized log and more Centralized task A task p 420 belonging to a centralized backup plan p 412 Such task appea...

Page 413: ...subsequent backups p 409 belonging to the same archive p 409 into a single backup Consolidation might be needed when deleting backups either manually or during cleanup p 412 For example the retention...

Page 414: ...overy 10 provides an option to take a raw image that is copy all the disk sectors which enables imaging of unsupported file systems Disk group A number of dynamic disks p 415 that store the common con...

Page 415: ...Reserved Partition MSR Disk 1 MBR LDM database 1 MB Disk 2 Protec tive MBR GPT Microsoft Reserved Partition MSR LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR Disk 1 and...

Page 416: ...enerated key with a user defined size of 128 192 or 256 bits The encryption key is then encrypted with AES 256 using a SHA 256 hash of the password as a key The password itself is not stored anywhere...

Page 417: ...ntal backup A backup p 409 that stores changes to the data against the latest backup You need access to other backups from the same archive p 409 to restore data from an incremental backup L Local bac...

Page 418: ...thin the enterprise network Acronis Backup Recovery 10 Management Server provides the administrator with a single entry point to the Acronis Backup Recovery 10 infrastructure an easy way to protect da...

Page 419: ...twork attackers from establishing a fake connection on behalf of a trusted principal the management server S Selection rule A part of the backup policy p 410 Enables the management server p 418 admini...

Page 420: ...etention rules set by Backup plan Backup plan Storage node side validation Validation p 421 performed by a storage node p 419 according to the backup plans p 410 that produce the archives p 409 stored...

Page 421: ...n The previous product versions considered a file backup valid when the metadata contained in its header was consistent The current method is time consuming but much more reliable Validation of a volu...

Page 422: ...hines is installed on that server W WinPE Windows Preinstallation Environment A minimal Windows system based on any of the following kernels Windows XP Professional with Service Pack 2 PE 1 5 Windows...

Reviews: