background image

122 

Copyright © Acronis, Inc., 2000-2010 

 

 

4.

 

Depending on the result you want to obtain, select the appropriate options as described in the 
table below. 

5.

 

Click 

Test command

 to check if the command is correct. 

Check box 

Selection 

Fail the task if the command 
execution fails

 

Selected 

Cleared 

Selected 

Cleared 

Do not recover until the 
command execution is 
complete

 

Selected 

Selected 

Cleared 

Cleared 

Result 

 

Preset

 

Perform the recovery 
only after the 
command is 
successfully executed. 
Fail the task if the 
command execution 
failed. 

Perform the 
recovery after the 
command is 
executed despite 
execution failure 
or success. 

N/A 

Perform the 
recovery 
concurrently with 
the command 
execution and 
irrespective of the 
command execution 
result. 

 

Post-recovery command 

To specify a command/executable file to be executed after the recovery is completed 

1.

 

In the 

Command

 field, type a command or browse to a batch file. 

2.

 

In the 

Working

 directory field, specify a path to a directory where the command/batch file will be 

executed. 

3.

 

In the 

Arguments

 field, specify the command execution arguments, if required. 

4.

 

If successful execution of the command is critical for you, select the 

Fail the task if the command 

execution fails 

check box. In case the command execution fails, the task run result will be set to 

Failed. 
When the check box is not selected, the command execution result does not affect the task 
execution failure or success. You can track the command execution result by exploring the log or 
the errors and warnings displayed on the 

Dashboard

5.

 

Click 

Test command

 to check if the command is correct. 

A post-recovery command will not be executed if the recovery proceeds with reboot. 

 

3.4.2.2

 

Recovery priority 

This option is effective for both Windows and Linux operating systems. 

This option is not available when operating under the bootable media. 

The priority of a process running in a system determines the amount of CPU and system resources 
allocated to that process. Decreasing the recovery priority will free more resources for other 
applications. Increasing the recovery priority might speed up the recovery process by requesting the 
operating system to allocate more resources to the application that will perform the recovery. 
However, the resulting effect will depend on the overall CPU usage and other factors like disk I/O 
speed or network traffic. 

The preset is: 

Normal.

 

Содержание BACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION

Страница 1: ...User s Guide Acronis Backup Recovery 10 Advanced Server Virtual Edition...

Страница 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Страница 3: ...backups 33 2 5 GFS backup scheme 35 2 6 Tower of Hanoi backup scheme 38 2 7 Retention rules 40 2 8 Backing up dynamic volumes Windows 43 2 9 Backing up LVM volumes Linux 45 2 10 Backing up RAID array...

Страница 4: ...p and recovery options 98 3 4 1 Default backup options 98 3 4 2 Default recovery options 120 4 Vaults 129 4 1 Centralized vaults 130 4 1 1 Working with the Centralized vault view 131 4 1 2 Actions on...

Страница 5: ...221 6 3 7 Access credentials for destination 228 6 3 8 When to recover 228 6 3 9 Universal Restore 228 6 3 10 How to convert a disk backup to a virtual machine 230 6 3 11 Bootability troubleshooting...

Страница 6: ...ions 272 6 11 6 Volume operations 277 6 11 7 Pending operations 284 6 12 Collecting system information 284 7 Centralized management 285 7 1 Administering Acronis Backup Recovery 10 Management Server 2...

Страница 7: ...g both capital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication me...

Страница 8: ...3 Connect the console to the machine where the agent is installed Where to go from here For what to do next see Basic concepts p 27 For understanding of the GUI elements see Using the management conso...

Страница 9: ...ables you to start stop edit and delete the plans and tasks You can also use the Tasks view that displays all tasks existing on the registered machines The tasks can be filtered by machines backup pla...

Страница 10: ...ers create several policies and apply each policy to the appropriate group of machines For more information please refer to Grouping the registered machines p 62 The comprehensive example of advanced...

Страница 11: ...ws depend on whether the console is connected to a managed machine or to the management server Views for a managed machine When the console is connected to a managed machine the following views are av...

Страница 12: ...anaging a centralized vault as well as the history of operations logged in the local logs of the registered machines and the storage nodes Shortcuts bar The Shortcuts bar appears under the navigation...

Страница 13: ...e actions bars Actions Contains a list of common operations that can be performed on a managed machine or on a management server Always the same for all views Clicking the operation opens the respecti...

Страница 14: ...pane How to change the panes borders 1 Point to the pane s border 2 When the pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the pan...

Страница 15: ...lected item There are several ways of performing the same action on selected items By clicking the buttons on the table toolbar By clicking in the items in the Item s name Actions bar on the Actions a...

Страница 16: ...nfigured by clicking the respective Change links to the right Others are selected from the drop down list or typed manually in the page s fields Action page Controls Acronis Backup Recovery 10 remembe...

Страница 17: ...le provides Graphical User Interface and remote connection to the agents and other Acronis Backup Recovery 10 components Usage of the console is not licensed Bootable media builder With bootable media...

Страница 18: ...ng style between MBR and GPT or changing a disk label can be performed either in the operating system or using bootable media 1 3 1 1 Universal Restore The Universal Restore add on enables you to use...

Страница 19: ...s the components included in the Acronis Backup Recovery 10 editions that provide the centralized management capability Besides these components Acronis Backup Recovery 10 Agents have to be installed...

Страница 20: ...re installation is required on the vCenter Server This feature also enables automatic deployment and configuration of Agent for ESX ESXi to any ESX ESXi server that is not necessarily managed by the v...

Страница 21: ...the User Guide Encryption A managed vault can be configured so that anything written to it is encrypted and anything read from it is decrypted transparently by the storage node using a vault specific...

Страница 22: ...installs on Linux creates bootable media based on Linux kernel The Deduplication p 18 add on enables you to create bootable media with the back up to a deduplicating vault functionality This add on c...

Страница 23: ...2008 x64 Editions Windows Vista all editions except for Vista Home Basic and Vista Home Premium Windows 7 all editions except for the Starter and Home editions Acronis Backup Recovery 10 Storage Node...

Страница 24: ...ns of the above Linux distributions and other Linux distributions are also supported The agent for Linux is in fact a 32 bit executable For authentication the agent uses system libraries 32 bit versio...

Страница 25: ...installation 160 MB 400 MB 250 MB Agent for Linux 65 MB 150 MB 70 MB Bootable Media Builder 70 MB 240 MB 140 MB Management Console 25 MB 100 MB 40 MB The components installed on VMware ESX i server A...

Страница 26: ...lying patches updates and other changes that Acronis at its sole discretion makes or adds to the Software and which Acronis makes generally available without additional charge to other licensees of th...

Страница 27: ...ate bootable media p 371 4 Connect the console to the managed machine 5 Create a backup plan p 370 To do so you have to specify at the very least the data to be protected and the location where the ba...

Страница 28: ...28 Copyright Acronis Inc 2000 2010 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Страница 29: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Страница 30: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Страница 31: ...ar user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but without using a file lev...

Страница 32: ...the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local backup plans owned by any...

Страница 33: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Страница 34: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Страница 35: ...cheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acronis With Acronis Backup Recovery 10 you can easily set up a backup plan that will regularly...

Страница 36: ...sume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be created Backup tasks created according to the GFS scheme by Acronis Backup Recovery 10 Sched...

Страница 37: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Страница 38: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Страница 39: ...tern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table shows the patte...

Страница 40: ...vel backup scheme The pattern consists of 16 sessions As a result of using incremental and differential backups the situation may arise when an old backup deletion must be postponed as it still is a b...

Страница 41: ...date and time in the past corresponding to this interval and deletes all backups created before that moment None of the backups created after this moment will be deleted 2 Keep the archive size withi...

Страница 42: ...ther backups one of the following rules is applied Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also be...

Страница 43: ...me If the free space which in fact is the storage device free space approaches zero you might need to toughen the restrictions for some or all archives residing in this vault 2 8 Backing up dynamic vo...

Страница 44: ...pace The total size of unallocated space is 40GB The recovery will always result in a striped volume if the unallocated space is distributed evenly among the disks 20GB and 20GB If one of the disks ha...

Страница 45: ...n running in Linux with 2 6 x kernel or a Linux based bootable media You can back up data of one or more logical volumes and recover it to a previously created logical volume or a basic MBR disk or vo...

Страница 46: ...GUI displays a similar table Num Partition Flags Start Size Type _________________________________________________________________ Disk 1 1 1 hda1 boot Pri Act 63 208782 Ext3 1 2 hda2 Pri 208845 8177...

Страница 47: ...ing up such volumes does not make sense when a software array is mounted as it won t be possible to recover them Example Here is an example of a volumes list obtained with the list command The GUI dis...

Страница 48: ...nary hard disks Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a bad partition table or no partition table at all Backing up such disks does n...

Страница 49: ...Hyper V virtual machine that uses at least one pass through disk a physical disk either local or SAN LUN attached to the virtual machine cannot be backed up from the host To back up such machine or i...

Страница 50: ...s because there is no registry key HKEY_CLASSES_ROOT Wow6432Node CLSID F2C2787D 95AB 40D4 942D 298F5F757874 Solution Add this key to the registry To do so create and run the following script xxx reg H...

Страница 51: ...perating system 2 12 1 Tape compatibility table The following table summarizes the readability of tapes written by Acronis True Image Echo and Acronis True Image 9 1 product families in Acronis Backup...

Страница 52: ...ot be recovered from a disk backup 3 Backups cannot be deleted from a tape either manually or automatically during cleanup Retention rules and backup schemes that use automatic cleanup GFS Tower of Ha...

Страница 53: ...lans p 372 can use Acronis Secure Zone as well as local plans p 377 If you have used Acronis Secure Zone before please note a radical change in the zone functionality The zone does not perform automat...

Страница 54: ...before the upgrade You can activate Acronis Startup Recovery Manager again at any time 2 13 3 Universal Restore Acronis Backup Recovery 10 Universal Restore Acronis Backup Recovery 10 Universal Resto...

Страница 55: ...the built in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system start such as video audio and USB Windows takes control ov...

Страница 56: ...s in the backup If this scan finds a supported operating system the Acronis Active Restore option becomes available If you do not enable the option the system recovery will proceed in the usual way an...

Страница 57: ...he system tray The machine becomes operational and ready to provide necessary services The immediate user sees the drive tree and icons and can open files or launch applications even though they were...

Страница 58: ...the management server only since a well thought out policy functions automatically and rarely requires human intervention Using the management server you can create one or more centralized archive sto...

Страница 59: ...ole Console on the machine which you prefer to operate from 3 The console enables you to access and manage other Acronis components through Graphical User Interface 2 Install Acronis Backup Recovery 1...

Страница 60: ...to the management server 2 Create a managed vault as described in Operations with centralized vaults p 132 Enable deduplication when creating a managed vault Setting up groups and policies The detail...

Страница 61: ...rules In Apply retention rules set After backup 2 Create a dynamic group named say W_1 Specify Windows XP and Windows Vista as the criteria This way any workstation that will be registered on the mana...

Страница 62: ...various policies applicable to different sets of machines In this case consider creating custom groups 2 14 3 1 Static and dynamic groups You can explicitly specify which machines the custom group has...

Страница 63: ...e than one group Besides physical machines you can group virtual machines p 310 hosted on registered virtualization servers Virtual machines have their own grouping criteria depending on their propert...

Страница 64: ...ups You create empty groups in the generic root Physical machines or Virtual machines or within existing groups and populate them by manual adding machines static groups or by adding criteria of dynam...

Страница 65: ...the reverse action to the aggregate of applying and deploying Revoking removes the correspondence between the policy and one or more machines and then removes the tasks from the machines If a machine...

Страница 66: ...ine when the machine is moved copied or deleted from a group In the diagram below the container stands for a group the one color circle stands for a machine with one applied policy the two color circl...

Страница 67: ...that a machine can be a member of only one group besides the All machines group Let s start from this simplified approach In the diagram below the container stands for a group the two color circle sta...

Страница 68: ...both orange and green policies in spite of the fact that G3 has nothing to do with the orange policy That s why it is difficult to track the policies inheritance from the top of the hierarchy if the s...

Страница 69: ...te on the machine is Deploying Once the backup plan is successfully created the policy state on the machine becomes Deployed You may need to modify the policy for some reason Once you confirm the chan...

Страница 70: ...changed to Deployed If no data to back up is found at the time when the backup task starts the task will fail and the policy status will turn to Error If at least one of the data items is found the ba...

Страница 71: ...e and status as related to a specific machine the backup policy has the deployment state and status on a group of machines and the cumulative deployment state and status of the policy 2 14 5 3 Policy...

Страница 72: ...lays the cumulative status for each policy This status is defined as the most severe status of the policy on all machines the policy is applied to If the policy is not applied to any machine its statu...

Страница 73: ...10 GB to the database In case the database is corrupted or the storage node is lost while the vault retains archives and the service folder containing metadata the new storage node rescans the vault...

Страница 74: ...sources Such is the case when you back up operating systems and applications deployed from a single source over the network When performing incremental backups of similar data from different sources p...

Страница 75: ...size will be just about 1 GB in a deduplicating vault This gives a deduplication ratio of 2 1 or 50 Conversely if the two files had different content the backup sizes in non deduplicating and duplica...

Страница 76: ...s is cleared it is cleared by default If the file is less than 4 KB in size If you protected the archive with a password Files that were not deduplicated are stored in the archive as they would be in...

Страница 77: ...nsole is running 2 14 7 2 Privileges for local connection Windows Local connection on a machine running Windows can be established by any user who has the Log on locally user right on the machine Linu...

Страница 78: ...latest version of Linux PAM for your Linux distribution The latest stable source code of Linux PAM is available at Linux PAM source code Web page Remote connection as the root user Remote connections...

Страница 79: ...d the following three lines to the file user_a user_b user_c If necessary also add the root user to the file 3 Create the file etc pam d Acronisagent trusted with the following content PAM 1 0 auth re...

Страница 80: ...rent Instead of Acronis Remote Users and Acronis Centralized Admins the groups are named DCNAME Acronis Remote Users and DCNAME Acronis Centralized Admins respectively here DCNAME stands for the NetBI...

Страница 81: ...perform any further steps all users are typically members of the Domain Users group and so can access the storage node Otherwise you need to create user accounts on the machine where the storage node...

Страница 82: ...ts to any existing account you specify for a corresponding service If you choose to specify an existing user account for the agent service or the storage node service make sure that this account is a...

Страница 83: ...communication options p 84 For instructions on how to manage SSL certificates used for secure authentication see SSL certificates p 87 Note The components of earlier Acronis products including those...

Страница 84: ...tion option that you want to configure The Administrative Template contains the following options each option is explained later in this topic Remote Agent ports Client Encryption options Server Encry...

Страница 85: ...lf signed certificates check box allows the client to connect to the server applications that use self signed SSL certificates such as certificates created during the installation of Acronis Backup Re...

Страница 86: ...is enabled The connection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured 2 14 8 4 Network port configuration Acronis B...

Страница 87: ...erver application use an SSL certificate called the server certificate In Windows the certificate path and the server certificate s file name are specified in the registry key HKEY_LOCAL_MACHINE SOFTW...

Страница 88: ...md 3 Run the following command note quotation marks CommonProgramFiles Acronis Utils acroniscert reinstall 4 Restart Windows or restart the running Acronis services Non self signed certificates You ha...

Страница 89: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Страница 90: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Страница 91: ...the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all the machines registered on the manageme...

Страница 92: ...nt server has to send its own log events to the specified Simple Network Management Protocol SNMP managers You can choose the types of events to be sent Acronis Backup Recovery 10 provides the followi...

Страница 93: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Страница 94: ...312 to the virtual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Serv...

Страница 95: ...nagement Server IP Name 3 Specify the user name and password of the management server administrator on prompt 4 In the Machine s registration address select how the machine will be registered on the m...

Страница 96: ...fective for both Windows and Linux operating systems This option is not available when operating under the bootable media The option defines whether the agent s operating on the managed machine have t...

Страница 97: ...the installation disc of your operating system Linux To receive SNMP messages on a machine running Linux the net snmp for RHEL and SUSE or the snmpd for Debian package has to be installed SNMP can be...

Страница 98: ...d recovery options 3 4 1 Default backup options Each Acronis agent has its own default backup options Once an agent is installed the default options have pre defined values which are referred to as pr...

Страница 99: ...1 Backup splitting p 111 File level security p 112 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 113 Dest removable media Dest re...

Страница 100: ...p The preset is Disabled To protect the archive from unauthorized access 1 Select the Set password for the archive check box 2 In the Enter the password field type a password 3 In the Confirm the pass...

Страница 101: ...by using the attrib command For more information refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files whose names match any...

Страница 102: ...Do any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file from the drop down list 3 Click OK Pre backup command To specify a command bat...

Страница 103: ...This option is effective for both Windows and Linux operating systems The option enables you to define the commands to be automatically executed before and after data capture that is taking the data...

Страница 104: ...Selected Selected Cleared Cleared Result Preset Perform the data capture only after the command is successfully executed Fail the task if the command execution fails Perform the data capture after th...

Страница 105: ...up at the same point in time Choose this setting only if these factors are critical that is backing up files without a snapshot does not make sense To use a snapshot the backup plan has to run under...

Страница 106: ...taken by Acronis Backup Recovery 10 Backup process is fastest but data consistency of the applications whose transactions are not completed at the time of taking a snapshot cannot be guaranteed You m...

Страница 107: ...r to Backup priority This option is effective for both Windows and Linux operating systems The priority of a process running in a system determines the amount of CPU and system resources allocated to...

Страница 108: ...up data By default the speed is set to maximum i e the software uses all the network bandwidth it can get when transferring the backup data Use this option to reserve a part of the network bandwidth t...

Страница 109: ...server check box to enable a POP server and to set up its settings Incoming mail server POP enter the name of the POP server Port set the port of the POP server By default the port is set to 110 User...

Страница 110: ...chine have to log events of the backup operations in the Application Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the...

Страница 111: ...will be sent to Community type the name of the SNMP community to which both the host running the SNMP management application and the sending machine belong The typical community is public Click Send...

Страница 112: ...ined to an FTP server since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size 3 4 1 14 File level security These options are effective only...

Страница 113: ...the one click approach does not presume user selections such as selecting volumes to recover Acronis One Click Restore always recovers the entire disk If your disk contains several volumes and you are...

Страница 114: ...or network share Managed vaults and FTP servers are not supported as secondary destinations The preset is Disabled When dual destination is enabled the agent will automatically copy each backup being...

Страница 115: ...please see Scheduling p 166 and Conditions p 176 The preset is Wait until the conditions are met Wait until the conditions are met With this setting the scheduler starts monitoring the conditions and...

Страница 116: ...n as an attempt completes successfully OR the specified number of attempts is performed depending on which comes first If the task fails because of a mistake in the backup plan you can edit the plan w...

Страница 117: ...ific machine off site When the Use a separate tape set option is enabled there might be a case when the backup has to be written onto a tape that is currently out of the tape library device Define wha...

Страница 118: ...en the option is enabled backing up to removable media may be not possible if the user is away because the program will wait for someone to press OK in the prompt box Hence you should disable the prom...

Страница 119: ...led deduplication at target Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node The eventual size of the backup in...

Страница 120: ...very options from the top menu Availability of the recovery options The set of available recovery options depends on The environment the agent operates in Windows Linux bootable media The type of data...

Страница 121: ...he program does not support interactive commands i e commands that require user input for example pause A post recovery command will not be executed if the recovery proceeds with reboot To specify pre...

Страница 122: ...d 4 If successful execution of the command is critical for you select the Fail the task if the command execution fails check box In case the command execution fails the task run result will be set to...

Страница 123: ...and Linux operating systems This option is not available when operating under the bootable media The option enables you to receive e mail notifications about the recovery task s successful completion...

Страница 124: ...WinPopup notifications about about the recovery task s successful completion failure or need for interaction The preset is Disabled Before configuring WinPopup notifications make sure the Messenger se...

Страница 125: ...ry operations in the Application Event Log SNMP notifications This option is effective for both Windows and Linux operating systems This option is not available when operating under the bootable media...

Страница 126: ...eraction it will fail Details of the operation including errors if any can be found in the operation log Re attempt if an error occurs The preset is Enabled Number of attempts 5 Interval between attem...

Страница 127: ...option enables booting the machine into the recovered operating system without user interaction Change SID after the recovery is finished This option is not effective when recovery to a virtual machin...

Страница 128: ...option if you prefer to power off virtual machines manually before the recovery Power on the target virtual machine when recovery is completed The preset is Off After a machine is recovered from a bac...

Страница 129: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Страница 130: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Страница 131: ...the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space is free space of the ap...

Страница 132: ...the vault type Managed or Unmanaged The procedure of creating centralized vaults is described in depth in the following sections Create a managed centralized vault p 133 Create an unmanaged centraliz...

Страница 133: ...a tape library on a managed vault Click Manage tapes In the Tape Management window define labels for tapes and refresh the inventory For more details see the Managing tape library p 142 section Resca...

Страница 134: ...aged vault will be created 1 Enter the full path to the folder in the Path field or select the desired folder in the folders tree Managed vaults can be organized on the hard drives local to the storag...

Страница 135: ...password field re type the password 4 Select one of the following AES 128 the vault contents will be encrypted using the Advanced Standard Encryption AES algorithm with a 128 bit key AES 192 the vaul...

Страница 136: ...ncing loads between storage nodes As a result the first node stops managing the vault The second node scans archives in the vault creates and fills up the database corresponding to the vault and start...

Страница 137: ...oading mounting rewinding and reading a tape with the full data backup However a tape should be read for example to validate p 381 a backup or to recover data from a backup A tape library can be local...

Страница 138: ...on a tape However after this operation all the incremental and differential backups stored on other tapes and based on the deleted backups cannot be used for data recovery In a Custom backup plan s re...

Страница 139: ...storage snap in Control panel Administrative tools Computer management Removable storage Media pools If a tape has moved into the Free pool it is considered as free and will be accessible to write by...

Страница 140: ...eating only one vault per tape device If all cartridges in a tape library have barcodes and the RSM Free pool contains enough tapes for a chosen backup scheme the library is ready to fully work automa...

Страница 141: ...same way as with other storage devices The only difference is the additional Tape support p 116 options that can be set up during the backup policy plan creation These options enable you to specify h...

Страница 142: ...3 6 Managing a tape library To manage a tape library the following tasks procedures are in the product Inventory p 142 Rescan p 143 Labeling p 143 Any user with access to a managed vault on a tape lib...

Страница 143: ...es need a barcode or other readable labels If a tape does not get a label you should define it before the tape will be used If you need to apply a specific label for a tape for example MyWork label fo...

Страница 144: ...ith such tapes as the program manages all the tapes automatically When this option is enabled the backups belonging to the policy or plan being created will be located on a separate tape set Other bac...

Страница 145: ...Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries This section provides you with useful information to choose a backup scheme and tape options fo...

Страница 146: ...backups minimal maximal period of backup keeping need to store tape cartridges off site capability of the tape library number of drives loaders slots and available tapes capacity of tapes requirements...

Страница 147: ...use a free tape For each full backup option is selected Other Always use a free tape options are cleared It requires 16 tapes in rotation GFS Example 3 p 152 The Use a separate tape set option is sel...

Страница 148: ...ive and mounted and then the backup last 24 Gb is continued onto the beginning of the new tape The next figure demonstrates the data backup archive at the moment The differential backup is drawn as a...

Страница 149: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Страница 150: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Страница 151: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Страница 152: ...ted the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define the tape rotation scheme t...

Страница 153: ...5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbers from 1 to 5 by letters A B C D and E respectively Then t...

Страница 154: ...ept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and incremental A backups stored on tape 02 The full backup deletion is postponed until all the above...

Страница 155: ...E because at the moment the first full backup is a base for differential backups D C and B are a base for incremental backup A So the full backup deletion is postponed until all the D C B and A backup...

Страница 156: ...vel The example demonstrates that the tapes usage efficiency is reduced Moreover the data recovery requires access to the backups kept on one full backups 6 two differential backups 44 or three increm...

Страница 157: ...se a separate tape set option is selected the Always use a free tape For each full backup option is cleared the Always use a free tape For each incremental backup option is cleared the Always use a fr...

Страница 158: ...number of the tapes that will be free after the deletion So the calculation ignores this probability Tape set 01 should contain round up F_GB 4 D_GB 5 7 I_GB CL T_GB tapes to store the backups Tape s...

Страница 159: ...direct connection of the console to a managed machine Personal vaults are specific for each managed machine Personal vaults are visible to any user that can log on to the system A user s right to bac...

Страница 160: ...n the selected archives and backups The list of backups is expanded by clicking the plus sign to the left of the archive s name All the archives are grouped by type on the following tabs The Disk arch...

Страница 161: ...n to the Validation p 235 page where this vault is already pre selected as a source The vault validation checks all the archives stored in the vault Delete a vault Click Delete The deleting operation...

Страница 162: ...r destination to vault B 4 In the vaults tree select vault B to check whether the archives are displayed If not click Refresh 5 Delete vault A 4 3 Common operations 4 3 1 Operations with archives stor...

Страница 163: ...ons item of the main menu The following is a guideline for you to perform operations with backups To Do View backup content in a separate window Click View content In the Backup Content window examine...

Страница 164: ...kup To preserve archive consistency the program will consolidate the two backups For example you delete a full backup but retain the next incremental one The backups will be combined into a single ful...

Страница 165: ...10 165 To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you...

Страница 166: ...current user specify the user s account User logoff any user current user specify the user s account System startup Free space change specify the amount of free space change on any volume selected fo...

Страница 167: ...ample if you set Every 2 day s the task will be started on every other day In the During the day execute the task area select one of the following Once at Set up the time at which the task will be run...

Страница 168: ...ion and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00 PM in our example To 12 15 2009 On this date the task will be performed for the...

Страница 169: ...the task frequency to Every 1 hour From 10 00 00 AM until 10 00 00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day In the Effective area set the following settings From Set up...

Страница 170: ...the task say on Monday at 11 30 AM the task will be started on the same day at 9 PM If the task was created say on Friday after 9 PM then it will be started for the first time on the nearest workday M...

Страница 171: ...the last day of the month irrespective of its actual date On Select specific days of the weeks to run the task on In the During the day execute the task area select one of the following Once at Set up...

Страница 172: ...stom backup scheme p 211 section Season schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010 During a workday the task is performed every 6 hours from 12 AM midnig...

Страница 173: ...o not set 5 4 At Windows Event Log event This type of schedule is effective only in Windows operating systems You can schedule a backup task to start when a certain Windows event has been recorded in...

Страница 174: ...D 7 Important To ensure that such a task will complete despite the presence of bad blocks you must make the task ignore bad blocks To do this in Backup options go to Error handling and then select the...

Страница 175: ...anup or validation is scheduled to start If the backup task on each machine starts with a delay see the next setting the management server will wake up the machines according to those delays Before us...

Страница 176: ...ackup plan 2 In How to back up select the Simple Tower of Hanoi or Custom scheme and then click Change to specify a schedule for the scheme 3 Under Run the task select Daily Weekly or Monthly 4 In the...

Страница 177: ...ly if all users are logged off Condition Time since last backup Value Time since the last backup 12 hour s Task start conditions Wait until the conditions are met If the free space changes by more tha...

Страница 178: ...ge for backing up users data and servers The workday starts at 8AM and ends at 5 PM Users data should be backed up as soon as the users log off but not earlier than 4 30 PM and not later than 10 PM Ev...

Страница 179: ...ged on at 11 PM run the task anyway Event Monthly Months All On First Third Friday Once at 08 00 00 PM Condition User logged off Task start conditions Wait until the conditions are met Run the task an...

Страница 180: ...ed after 12 hours have passed since the completion of the latest successful backup the backup task will start immediately 3 if the machine is never restarted the task will never start You can start th...

Страница 181: ...ou can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what action has to be performed for exam...

Страница 182: ...will launch the Bootable Media Builder p 378 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time...

Страница 183: ...ecution states in the Backup plans and tasks p 183 view and specify your decision on each task in the Information panel or in the Task details p 191 window 6 1 2 Backup plans and tasks The Backup plan...

Страница 184: ...Otherwise see 4 Waiting for condition This situation is quite normal but delaying a backup for too long is risky The solution may be to set the maximum delay or force the condition tell the user to l...

Страница 185: ...started manually or the event specified by the schedule occurs the task enters either the Running state or the Waiting state Running A task changes to the Running state when the event specified by th...

Страница 186: ...task Check the task log to find out the reason of the failure then do one or more of the following Remove the reason of the failure optionally Start the failed task manually Edit the failed task to p...

Страница 187: ...ls View plan s task s log Backup plan Click View log You will be taken to the Log p 194 view containing the list of the plan related log entries Task Click View log You will be taken to the Log p 194...

Страница 188: ...The task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unalloc...

Страница 189: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Страница 190: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Страница 191: ...an Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backup schemes only To...

Страница 192: ...ment operations Compacting Service task performed on a storage node Indexing Deduplication task performed by the storage node in the vault after a backup is completed Depending on the type of task and...

Страница 193: ...der which the plan runs Owner the name of the user who created or last modified the plan State execution state p 184 of the backup plan Status status p 184 of the backup plan Schedule whether the task...

Страница 194: ...n the Log view with pre filtered log entries for the item in question Thus you do not have to configure filters in the log table yourself View Action Dashboard In the calendar right click on any highl...

Страница 195: ...e log entries 2 In the To field select the date up to which to display the log entries Filter log entries by type Press or release the following toolbar buttons to filter error messages to filter warn...

Страница 196: ...er user name of the backup plan owner only under operating system Message a text description of the event The log entry s details that you copy will have the appearance as follows Log Entry Details Ty...

Страница 197: ...s the sequence number of the archive in the location you have selected Access credentials p 205 Optional Provide credentials for the location if the plan account does not have access permissions to th...

Страница 198: ...l Specify whether to convert every full every incremental or every differential backup or convert the last created backup on schedule Specify the conversion schedule if required Host p 215 Specify the...

Страница 199: ...back up specific files and folders If you are not concerned about recovery of the operating system along with all the settings and applications but plan to keep safe only certain data the current proj...

Страница 200: ...on different volumes always include both volumes in the backup The volumes must also be recovered together otherwise there is a high risk that the operating system will not start 2 Optional To create...

Страница 201: ...machine configuration To back up one or more virtual machines residing on a virtualization server 1 Select the check boxes next to virtual machines that you want to back up Selecting the check box fo...

Страница 202: ...rtual machine cannot be backed up from the host To back up such machine or its disks install Agent for Windows or Agent for Linux on the machine A SAN LUN disk attached to an ESX ESXi virtual machine...

Страница 203: ...xt yields files such as Doc txt and Document txt The question mark substitutes for exactly one character in a file name for example the file mask Doc txt yields files such as Doc1 txt and Docs txt but...

Страница 204: ...e and displays it in the Name field The name commonly looks like Archive 1 The generated name is unique within the selected location If you are satisfied with the automatically generated name click OK...

Страница 205: ...rd for the account 2 Click OK Warning According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means that the user...

Страница 206: ...en to start the backup The task will be started manually Select this check box if you do not need to put the backup task on a schedule and wish to start it manually afterwards 6 2 9 3 Simple scheme Wi...

Страница 207: ...on field you want to reserve for weekly and monthly backups A monthly backup will be performed every fourth such day The default value is Friday Keep backups Specifies how long you want the backups to...

Страница 208: ...stored on the system until February 7 Monthly backups will never be deleted Limited storage If you do not want to arrange a vast amount of space to store a huge archive you may set up a GFS scheme so...

Страница 209: ...ps Daily 6 months Weekly 6 months Monthly 5 years Here daily incremental backups will be created on Tuesdays and Thursdays with weekly and monthly backups performed on Fridays Note that in order to ch...

Страница 210: ...elect from 2 to 16 backup levels See the example stated below for details Roll back period The guaranteed number of sessions that one can go back in the archive at any time Calculated automatically de...

Страница 211: ...10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been created so the backup of day five is still stored Since it depends on the full backup of day one that backup is avai...

Страница 212: ...ackup destinations such as shared folders or centralized vaults When there is insufficient space while backing up The archive will be cleaned up only during backup and only if there is not enough spac...

Страница 213: ...all backups older than one year be deleted from the archive and let the cleanup be performed upon creating a new backup Retention rules Delete backups older than 12 months Apply the rules After backi...

Страница 214: ...f the schedule has not been set up You can manually run any backup task or cleanup task at any time regardless of whether it has a schedule In the first of the previous examples we set up a schedule o...

Страница 215: ...ne is created If this operation succeeds the old machine is replaced If an error occurs during creation of the temporary machine the temporary machine is deleted This way the task always ends up with...

Страница 216: ...k space On VMware ESX ESXi new machines are created with pre allocated disks This means that virtual disk size is always equal to the original disk capacity Assuming that the original disk size is 100...

Страница 217: ...ut Acronis Disk Director LV see the Disk management p 269 section To create a recovery task perform the following steps General Task name Optional Enter a unique name for the recovery task A conscious...

Страница 218: ...k adapter drivers Acronis Universal Restore will install drivers that better fit the target hardware Mass storage drivers to install anyway Optional Specify the mass storage drivers manually if the au...

Страница 219: ...on the machine expand the Local folders group and click the required folder If the archive is located on removable media e g DVDs first insert the last DVD and then insert the discs in order starting...

Страница 220: ...disk data to a certain moment in time Specify the items to recover By default all items of the selected backup will be selected If you do not want to recover certain items just uncheck them To obtain...

Страница 221: ...ess permissions to the location You might need to provide special credentials for a network share or a storage node vault Specify User name When entering the name of an Active Directory user account b...

Страница 222: ...ource disks NT signature p 222 Select the way the recovered disk s signature will be handled The disk signature is used by Windows and the Linux kernel version 2 6 and later Disk destination To specif...

Страница 223: ...e physical disks of the machine the console is connected to On selecting this you proceed to the regular volume mapping procedure described below New virtual machine p 225 If Acronis Backup Recovery 1...

Страница 224: ...ll the data stored on the target volume will be replaced by the backed up data so be careful and watch out for non backed up data that you might need When using bootable media Disk letters seen under...

Страница 225: ...option is not available Assume you are going to recover a volume from an old low capacity FAT16 disk to a newer disk FAT16 would not be effective and might even be impossible to set on the high capac...

Страница 226: ...on the host hardware the host operating system and the virtualization product settings For example virtual machines may be allowed to use no more than 30 of memory Disks Initial setting the number an...

Страница 227: ...xt and Document txt The question mark substitutes for exactly one character in a file name for example the file mask Doc txt yields files such as Doc1 txt and Docs txt but not the files Doc txt or Doc...

Страница 228: ...the final OK Recover later the recovery task will be started at the date and time you specify If you do not need to schedule the task and wish to start it manually afterwards select the Task will be s...

Страница 229: ...erating system If the hardware has multiple network interface cards Universal Restore will try to configure all the cards drivers In case Universal Restore cannot find a compatible driver in the speci...

Страница 230: ...g a recovery task as described in Recovering data p 216 Select the archive and then select the disk or volume backup you want to convert Use the Navigation pane to navigate to the vault where the arch...

Страница 231: ...dows Recover the volume once again When configuring recovery opt for using Acronis Universal Restore and specify the appropriate HAL and mass storage drivers Windows was recovered to a dynamic volume...

Страница 232: ...n Change the loader configuration and etc fstab so that the LVM is not used and reactivate the boot loader 6 3 11 1 How to reactivate GRUB and change its configuration Generally you should refer to th...

Страница 233: ...chroot mnt system usr sbin grub 9 Specify the disk on which GRUB is located typically the boot or root partition root hd0 0 10 Install GRUB For example to install GRUB in the master boot record MBR o...

Страница 234: ...e that the device will be automatically assembled following the reboot To view or change the partition type use a disk partitioning utility such as fdisk Otherwise such as in the second example recove...

Страница 235: ...e node registered on the management server in case the storage node and the management server are installed on different machines if they are installed on the same machine simply recover that machine...

Страница 236: ...plan p 196 section You can access the Validation page from the Vaults p 129 view Right click the object to validate archive backup or vault and select Validate from the context menu The Validation pa...

Страница 237: ...desired folder in the folders tree If the archive is stored in a centralized vault expand the Centralized group and click the vault If the archive is stored in a personal vault expand the Personal gro...

Страница 238: ...lection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree To select a centralized vault expand the Centralized group and cli...

Страница 239: ...t makes sense to schedule validation to the managed machine s off peak period On the other hand if you prefer to be immediately informed whether the data is not corrupted and can be successfully recov...

Страница 240: ...ced view check box Mount settings Volumes p 242 Select volumes to mount and configure the mount settings for every volume assign a letter or enter the mount point choose the read write or read only ac...

Страница 241: ...by another user or by the program itself according to scheduled operations Use the Refresh button to refresh the list of archives 3 Click OK 6 5 2 Backup selection To select a backup 1 Select one of t...

Страница 242: ...me is mounted you can browse files and folders contained in the backup using a file manager and copy the desired files to any destination Thus if you need to take out only a few files and folders from...

Страница 243: ...dered as simple on demand archive staging The resulting archive s name By default the exported archive inherits the name of the original archive Because having multiple archives of the same names in t...

Страница 244: ...ly running the archive deletion task followed by the export task Different ways to create an export task Using the Export page is the most general way to create an export task Here you can export any...

Страница 245: ...als you specify whether started manually or executed on schedule Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or...

Страница 246: ...pted by an eavesdropper using a packet sniffer If the archive is stored on a locally attached tape device expand the Tape drives group then click the required device For the management server in the f...

Страница 247: ...folders group and click the required folder To export data to a network share expand the Network folders group select the required networked machine and then click the shared folder If the network sh...

Страница 248: ...of an archive to the same location twice In any of the above cases provide an archive name that is unique to the destination folder or vault If you need to redo the export using the same archive name...

Страница 249: ...nal Protect the Acronis Secure Zone from unauthorized access with a password The prompt for the password appear at any operation relating to the zone After you configure the required settings click OK...

Страница 250: ...field re type the password 4 Click OK To disable password 1 Choose Do not use 2 Click OK 6 8 1 4 Result confirmation The Result confirmation window displays the expected partition layout according to...

Страница 251: ...archives To learn more about operations with vaults see the Vaults p 129 section 6 8 2 1 Increasing Acronis Secure Zone To increase Acronis Secure Zone 1 On the Manage Acronis Secure Zone page click...

Страница 252: ...ates the need for a separate media or network connection to start the bootable rescue utility Activate Enables the boot time prompt Press F11 for Acronis Startup Recovery Manager if you do not have th...

Страница 253: ...server or WDS RIS using the same wizard Linux based bootable media Linux based media contains Acronis Backup Recovery 10 Bootable Agent based on Linux kernel The agent can boot and perform operations...

Страница 254: ...rver 2003 with Service Pack 1 PE 1 6 Windows Vista PE 2 0 Windows Vista SP1 and Windows Server 2008 PE 2 1 Windows 7 PE 3 0 If you already have media with PE1 x distribution unpack the media ISO to a...

Страница 255: ...e enabled if Acronis Backup Recovery 10 Universal Restore is installed on the machine where the media is created 3 optional The timeout interval for the boot menu plus the component that will automati...

Страница 256: ...a particular hardware configuration vga ask Prompts for the video mode to be used by the bootable media s graphical user interface Without the vga parameter the video mode is detected automatically v...

Страница 257: ...ay want to use this parameter if the kernel is unable to allocate interrupt requests IRQs or discover secondary PCI buses on the motherboard These calls might not work properly on some machines But th...

Страница 258: ...the network adapters for communication with the management console through the production network Automatic configuration could be done for this connection Sizeable data for recovery could be transfe...

Страница 259: ...move 6 10 1 2 Adding the Acronis Plug in to WinPE 1 x Acronis Plug in for WinPE can be added to Windows PE 2004 1 5 Windows XP Professional with Service Pack 2 Windows PE 2005 1 6 Windows Server 2003...

Страница 260: ...Select Use WinPE files located in the folder I specify Specify path to the folder where the WinPE files are located 4 optional Specify Windows drivers to be added to Windows PE Once you boot a machine...

Страница 261: ...e media to create 11 Build the Bart PE 12 Burn the ISO to CD or DVD if this has not been done yet or copy to a flash drive Once the machine boots into the Bart PE and you configure the network connect...

Страница 262: ...nfiguration monitor and graphics card specifications If for some reason the video mode is detected incorrectly do the following 1 In the boot menu press F11 2 Add to the command prompt the following c...

Страница 263: ...es click Add device 4 Specify the 20 character device ID 5 If you want to allow writing data onto the device specify the five character write key Without this key the device will be available in the r...

Страница 264: ...e the volume structure in either of the following ways Automatically in Linux based bootable media by using the management console or a script see Creating the volume structure automatically p 264 Man...

Страница 265: ...Return to the management console by pressing CTRL ALT F1 or by running the command bin product 6 Click Recover then specify the path to the archive and any other required parameters and then click OK...

Страница 266: ...owing disk configuration The machine has two 1 gigabyte and two 2 gigabyte SCSI hard disks mounted on dev sda dev sdb dev sdc and dev sdd respectively The first and second pairs of hard disks are conf...

Страница 267: ...the backup from which you want to recover data 4 In Data type select Volumes 5 In Items to recover select the check box next to my_volgroup my_logvol 6 Under Where to recover click Change and then se...

Страница 268: ...reduces the time required for booting multiple machines as compared to using physical bootable media Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder To uplo...

Страница 269: ...and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine add to the DHCP server option 60 Client Identifier with string value PXE Client This can be done as follow...

Страница 270: ...mple rules 1 Create a disk image of the disk on which volumes will be created or managed Having your most important data backed up to another hard disk or CD will allow you to work on disk volumes bei...

Страница 271: ...rough the Disk management view of the console The top part of the view contains a disks and volumes table enabling data sorting and columns customization and toolbar The table presents the numbers of...

Страница 272: ...nd you will not be able to store any files there Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be initialized The Disk management view will show the newly...

Страница 273: ...ably Cloning method and advanced options The Clone basic disk operation usually means that the information from the source disk is transferred to the target As is So if the destination disk is the sam...

Страница 274: ...target disk signature and update the operating system according to the signature If you need to copy the NT signature 1 Select the Copy NT signature check box You receive the warning If there is an op...

Страница 275: ...to basic operation 2 Basic disk conversion MBR to GPT using the Convert to GPT operation 3 GPT disk conversion basic to dynamic p 275 using the Convert to dynamic operation 6 11 5 4 Disk conversion G...

Страница 276: ...volumes takes a certain amount of time and any power loss unintentional turning off of the machine or accidental pressing of the Reset button during the procedure could result in bootability loss In...

Страница 277: ...ys appears in the graphical view of the disk next to the disk s name Online The online status means that a disk is accessible in the read write mode This is the normal disk status If you need a disk t...

Страница 278: ...linked together by the LDM from several physical disks Up to 32 disks can be included into one volume thus overcoming the hardware size limitations but if at least one disk fails all data will be lost...

Страница 279: ...rovides other disk management functions Its pages will enable you to enter operation parameters proceeding step by step further on and return to any previous step if necessary to change any previously...

Страница 280: ...ill proceed to the next page Set the volume size p 280 Set the volume size On the third wizard page you will be able to define the size of the future volume according to the previously made selections...

Страница 281: ...button will be disabled You will have to change the label to proceed with the creation of the new volume If you click the Back button you will be returned to the previous page Set the volume size p 2...

Страница 282: ...ou will have to confirm your decision to set the new volume as active To finish the added operation you will have to commit p 284 it Exiting the program without committing the pending operations will...

Страница 283: ...g operations will effectively cancel them The new label will be graphically represented in the Disk Management view of the console immediately 6 11 6 6 Format volume You might want to format a volume...

Страница 284: ...Undo action lets you undo the latest operation in the list While the list is not empty this action is available The Redo action lets you reinstate the last pending operation that was undone The Commi...

Страница 285: ...moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer Comment Failed tasks X View the tasks View the tas...

Страница 286: ...ered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is recommended to back up the management server to protec...

Страница 287: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Страница 288: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Страница 289: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Страница 290: ...console will update the list of backup policies from the management server with the most recent information Though the list of policies is refreshed automatically based on events the data may not be...

Страница 291: ...7 1 2 4 Policy details The Policy details window accumulates in five tabs all information on the selected backup policy and lets you perform operations with the machines and groups of machines the pol...

Страница 292: ...e or more nested groups can be created inside any group created by the administrator Grouping helps organize data protection by the company departments by the Active Directory domains or organizationa...

Страница 293: ...view select the group Use the toolbar s operational buttons to perform actions on the selected group p 305 Use the Information panel s tabs to view detailed information about the selected group and pe...

Страница 294: ...cal machines group Add a machine to another static group Click Add to another group In the Add to group p 298 window specify the group to copy the selected machine to The backup policies applied to th...

Страница 295: ...ine s log entries Update all information related to the machine Click Synchronize The management server will query the machine and update the database with the most recent information Along with synch...

Страница 296: ...details Importing machines from Active Directory To import machines from Active Directory 1 In the Navigation tree select Physical machines or All physical machines 2 Click Import machines from Activ...

Страница 297: ...initially import the machines from a text file Modify this file later as required by adding and removing machines but do not change the names addresses of the machines that have to remain registered T...

Страница 298: ...import Adding a machine to another group To add the selected machine to another group 1 Select the group the machine will be added to 2 Click OK The machine being added becomes a member of more than...

Страница 299: ...essful backup Availability Online the machine is available for the management server This means that the management server s last connection to the machine was successful Connection is established eve...

Страница 300: ...the machine is a member of a group and the policy is applied to the group you cannot revoke the policy from a single machine without firstly removing the machine from the group Examine where the appli...

Страница 301: ...ckup plan stops all its tasks Thus all the task operations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validati...

Страница 302: ...if the existing archives were created by a new scheme For empty archives all changes are possible Why can t I edit the backup plan The backup plan is currently running Editing of the currently runnin...

Страница 303: ...t information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manual refresh guarantees that the most...

Страница 304: ...t and applies the policy to Machine1 respectively The machine or group to which the policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a m...

Страница 305: ...umn type a new name for the selected group Built in groups cannot be renamed Edit a custom group Click Edit In the Edit group p 308 window change the required parameters of the group Move one custom g...

Страница 306: ...ording to the following rules a All the entries of the same criteria are combined by logical addition OR For example the following set of criteria Operating system Windows Server 2008 Operating system...

Страница 307: ...de machines from the list given in the specified txt or csv file If you later modify the file the contents of the group will change accordingly The file is checked every 15 minutes If you later delete...

Страница 308: ...roup Group details Aggregates in two tabs all information on the selected group Allows performing operations with the policies applied to the group This information is also duplicated in the Informati...

Страница 309: ...e policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a group its parent group view will be opened 7 1 4 Virtual machines You can centrally...

Страница 310: ...tion tree This section describes available operations with these machines 7 1 4 1 Virtual machines on a management server Availability of virtual machines Virtual machines are displayed as available w...

Страница 311: ...VA Using this criterion you can create a dynamic group of virtual machines hosted on a specified virtualization server or managed by the specified virtual appliance 7 1 4 2 VMware vCenter integration...

Страница 312: ...eck box In a vCenter cluster a single Agent for ESX ESXi backs up virtual machines hosted on all the cluster s hosts For more information please see Support for vCenter clusters p 313 You can add a si...

Страница 313: ...s for Acronis Backup Recovery 10 Advanced Server Virtual Edition You need one license for every host you selected To be able to deduplicate backups an agent needs a separately sold license for dedupli...

Страница 314: ...vailable operations depends on the privileges a user has on the vCenter Server Only those actions are available that the user has permission to perform The below tables contain the privileges required...

Страница 315: ...urce pool Virtual machine Configuration Add existing disk Add new disk Add or remove device Change CPU count Memory Remove disk Rename Settings Virtual machine Interaction Configure CD media Console i...

Страница 316: ...up a VM s disk Recover to an existing VM Datastore Allocate space Global Licenses Network Assign network Resource Assign VM to resource pool Virtual machine Configuration Add existing disk Add new di...

Страница 317: ...ise data protection This goal is achieved through organizing managed vaults p 377 that serve as dedicated storages of the enterprise backup archives Storage node enables you to relieve managed machine...

Страница 318: ...To Do Add a storage node to the management server Click Add In the Add storage node p 319 window specify the machine the storage node is installed on Adding a storage node establishes a trusted relat...

Страница 319: ...some latency Manual refresh guarantees that the most recent data is displayed Adding a storage node To add a storage node 1 In the IP Name field enter the name or the IP address of the machine the st...

Страница 320: ...the archives in all the vaults managed by the storage node Vaults This tab displays a list of the vaults managed by the storage node To open a managed vault for detailed examination and to perform ope...

Страница 321: ...task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unallocate...

Страница 322: ...Select Options Console options Number of tasks p 90 and set the desired value The maximum number of tasks that can be displayed is 500 If the number of tasks exceeds the specified value use filters t...

Страница 323: ...entries The maximum number of entries stored in the centralized log is 50000 The maximum number of entries that can be displayed is 10000 In case the number of log entries is greater than 10000 use fi...

Страница 324: ...on Save the selected log entries to a file 1 Select a single log entry or multiple log entries 2 Click Save Selected to File 3 In the opened window specify a path and a name for the file Save all the...

Страница 325: ...and show the hidden ones To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 C...

Страница 326: ...d are stored in the dedicated databases Reports are generated based on report templates The templates define the information to be included in the report and the way the information is represented Acr...

Страница 327: ...ch the last connection between the machines and the management server occurred Last successful backup The period within which the last successful backup finished on each of the machines Next backup Th...

Страница 328: ...lter criteria are included Origin The types of origin of the backup plans Local and or Centralized Backup policies available only for centralized backup plans The backup policies on which the centrali...

Страница 329: ...ll look Select whether to show all items in a single table or to group them by a particular column Specify which table columns to show and in which order Specify how to sort the table 7 1 8 5 Report a...

Страница 330: ...nd backups and average ratios across the selected vaults With the default filter settings the report includes information about all centralized managed vaults plus the combined total Report view Under...

Страница 331: ...ome columns such as Machine name in a report about machines cannot be excluded from the list or moved up or down in it 7 1 8 9 Report view In order for your web browser to correctly display dates and...

Страница 332: ...Recovery 10 Storage Node as described in the correspondent subtopics of this topic 7 2 1 1 How to load Acronis Administrative Template The Administrative Template provided by Acronis enables the fine...

Страница 333: ...multaneously When this limit is reached the storage node will use the backup queue see the next parameter for the agents that are awaiting connection Backup Queue Limit Description Specifies the maxim...

Страница 334: ...e Suppose further that the size of the archives in Vault A is 20 GB and the size of the archives in Vault B is 45 GB If the volume has 5 GB of free space then the total size of Vault A is 20 GB 5 GB 2...

Страница 335: ...d vault s database is less than the value of Vault Database Free Space Error Limit an error is recorded in the storage node s log Backups performed to the vault will keep failing until the amount of f...

Страница 336: ...efault value False Trace Level Description Specifies the minimum level of severity of events to be recorded into the event log Only events of levels greater than or equal to the value in Trace Level w...

Страница 337: ...on for a machine is complete the management server may disconnect from that machine and use the free connection for synchronization with another machine and so on Note Connections to machines with hig...

Страница 338: ...to provide new data whenever it will appear and then enters a listening mode This approach is called real time monitoring Real time monitoring may reduce network traffic for example when centralized...

Страница 339: ...the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that changes extensively during backup This parameter is used when creati...

Страница 340: ...recorded into the agent s log You can view this warning in the Dashboard If the value is 0 no license check will be performed without a license Acronis Backup Recovery 10 s functionality will be disa...

Страница 341: ...is cleaned up see Log cleanup rules p 97 Windows Event Log Specifies when to record Acronis Backup Recovery 10 Agent s events into the Application event log in Windows This parameter has two settings...

Страница 342: ...if more space is needed for the snapshot You may want to increase the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that ch...

Страница 343: ...of the following Not Configured The component will use the default TCP port number 9876 Enabled The component will use the specified port type the port number in the Server TCP Port box Disabled The...

Страница 344: ...sabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application Select one of the following Not Configured...

Страница 345: ...termination of a process such as the agent s process Event tracing parameters are specified as the following settings in the administrative template File Trace Minimal Level Description Specifies the...

Страница 346: ...mmunity For Acronis Backup Recovery 10 Agent Windows Event Log SNMP SNMP Address SNMP Community and Customer Experience Program You will find the description of these parameters in the correspondent t...

Страница 347: ...applied to both Windows and Linux machines To create a backup policy perform the following steps General Policy name Optional Enter a unique name for the backup policy A conscious name lets you ident...

Страница 348: ...he backup operation such as pre post backup commands maximum network bandwidth allocated for the backup stream or the backup archive compression level If you do nothing in this section the default val...

Страница 349: ...que name Folder on VMware vCenter If the management server is integrated with vCenter Server the resultant virtual machines will appear in the Acronis Backups folder on the vCenter You can specify a s...

Страница 350: ...In the Volumes column Comments Windows and Linux volumes All volumes Type or select All Volumes Refers to all volumes on machines running Windows and all mounted volumes on machines running Linux Win...

Страница 351: ...d speeds up the backup and recovery operations Windows The swap file pagefile sys and the file that keeps the RAM content when the machine goes into hibernation hiberfil sys are not backed up After re...

Страница 352: ...rd partition one can type dev hda3 in the row of the Volumes to back up selection rules dialog box Furthermore a Linux partition can be mounted anywhere inside the tree Say dev hda3 can be mounted as...

Страница 353: ...d folders column type or select File Text doc in folder D Work D Work Text doc Folder C Windows C Windows Environment variables Some environment variables point to Windows folders Using such variables...

Страница 354: ...irectory of the common users home The root user s home directory root Directory for all user related programs usr Directory for system configuration files etc 7 3 3 Access credentials for source Speci...

Страница 355: ...o skip files whose names match any of the criteria called file masks in the list use the Add Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard charac...

Страница 356: ...ify names for the archives The program generates a common name for the new archives and displays it in the Name field The name looks like PolicyName _ MachineName _Archive1 If you are not satisfied wi...

Страница 357: ...he Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these days...

Страница 358: ...set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule when and how often to back up the data To learn more about setting up the schedule see the...

Страница 359: ...t in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup type are as follows Daily 7 days...

Страница 360: ...ups more short lived at the same time ensuring that your information can be recovered in case of an accidental data loss Suppose that you need to Perform backups at the end of each working day Be able...

Страница 361: ...lect it in the Back up on field Such an archive would allow you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily...

Страница 362: ...schedule parameters and the numbers of levels you select See the example below for details Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 Th...

Страница 363: ...as well This enables us to go as far back as 11 days which is the best case scenario The following day however a new third level differential backup is created and the old full backup is deleted 1 2...

Страница 364: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Страница 365: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 40 Monthly full weekly differential and daily incremental backups plus c...

Страница 366: ...ckup runs every Friday at 10 00 PM Incremental backup runs manually Differential backup runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans a...

Страница 367: ...opyright Acronis Inc 2000 2010 367 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule of validation For more information see the Scheduling p 166 sectio...

Страница 368: ...nis Secure Zone A secure volume for storing backup archives p 369 within a managed machine p 377 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost ef...

Страница 369: ...is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TIB extension The TIB files resulting from...

Страница 370: ...his is an option Physically a backup plan is a bundle of tasks p 380 configured for execution on a managed machine p 377 A backup plan can be created directly on the machine local plan or appears on t...

Страница 371: ...locally through the GUI or remotely using the console p 373 Bootable media A physical media CD DVD USB flash drive or other media supported by a machine p 377 BIOS as a boot device that contains the...

Страница 372: ...ckup plan p 372 Such task appears on the managed machine p 377 as a result of deploying a backup policy p 370 from the management server p 378 and can be modified only by editing the backup policy Cen...

Страница 373: ...For example the retention rules require to delete a full backup p 376 that has expired but retain the next incremental p 377 one The backups will be combined into a single full backup which will be da...

Страница 374: ...er of dynamic disks p 374 that store the common configuration data in their LDM databases and therefore can be managed as a whole Normally all dynamic disks created within the same machine p 377 are m...

Страница 375: ...Dynamic disks organized on MBR Disk 1 and GPT Disk 2 disks For more information about dynamic disks please refer to the following Microsoft knowledge base articles Disk Management Windows XP Professio...

Страница 376: ...ed anywhere on the disk or in the backup file the password hash is used for verification purposes With this two level security the backup data is protected from any unauthorized access but recovering...

Страница 377: ...incremental backup L Local backup plan A backup plan p 370 created on a managed machine p 377 using direct management p 373 Local task A task p 380 belonging to a local backup plan p 377 or a task tha...

Страница 378: ...try point to the Acronis Backup Recovery 10 infrastructure an easy way to protect data on numerous machines p 377 using backup policies p 370 and grouping enterprise wide monitoring functionality the...

Страница 379: ...ic group A group of machines which a management server p 378 administrator populates by manually adding machines to the group A machine remains in a static group until the administrator removes it fro...

Страница 380: ...to be performed on a managed machine p 377 when a certain time comes or a certain event occurs The actions are described in an xml script file The start condition schedule exists in the protected reg...

Страница 381: ...ry under the bootable media to a spare hard drive can guarantee successful recovery in the future Validation rules A part of the backup plan p 370 Rules that define when and how often to perform valid...

Страница 382: ...Server 2008 PE 2 1 WinPE is commonly used by OEMs and corporations for deployment test diagnostic and system repair purposes A machine can be booted into WinPE via PXE CD ROM USB flash drive or hard d...

Страница 383: ...Wake On LAN Proxy 22 Acronis WOL Proxy 93 Action pages 12 13 15 Actions on a tape library vault 140 Actions on backup plans and tasks 183 187 Actions on backup policies 287 289 Actions on centralized...

Страница 384: ...287 Backup policy Policy 19 58 370 372 373 378 379 Backup policy deployment states 287 288 Backup policy statuses 287 288 292 299 Backup policy s state and statuses 69 288 Backup priority 99 107 Backu...

Страница 385: ...vault 161 Creating a volume 277 278 Creating Acronis Secure Zone 161 249 356 Creating an unmanaged centralized vault 132 135 Creating the volume structure automatically 264 Creating the volume struct...

Страница 386: ...99 112 113 120 123 Files selection 220 Files to back up selection rules 350 353 Filtering and sorting archives 132 160 164 Filtering and sorting backup plans and tasks 183 190 303 Filtering and sortin...

Страница 387: ...og 187 194 290 292 295 300 301 308 321 323 Log cleanup rules 91 97 336 341 Log entry details 194 196 Logging level 91 324 M Machine 19 369 370 371 372 374 375 377 378 379 380 381 Machine details 291 2...

Страница 388: ...cal machines 292 Plan 378 Policies on machines and groups 64 293 Policy 378 Policy credentials 347 349 Policy deployment state on a group 71 Policy deployment state on a machine 69 Policy details 287...

Страница 389: ...of volume being created 279 280 Selecting a host that will perform conversion 198 215 349 Selecting a virtual machine s disks and volumes 202 Selecting disks and volumes 200 202 Selecting entire virtu...

Страница 390: ...er of Hanoi backup scheme 38 137 145 380 Tower of Hanoi scheme 210 361 Types of connection to a managed machine 76 Types of dynamic volumes 278 U Understanding Acronis Backup Recovery 10 27 Understand...

Страница 391: ...277 Volume properties 224 Volume selection 240 242 Volume Shadow Copy Service 99 103 106 Volumes 217 223 Volumes to back up selection rules 350 W Weekly schedule 169 210 319 362 What if 158 When dedup...

Отзывы: