Manuel d'utilisation / d'entretien du produit Backup & Recovery 10 Server (Linux) du fabricant Acronis
Aller à la page of 179
User's Guide Acronis® Bac kup & Rec overy ™ 10 Server for Linux.
Copyright © Acronis, Inc., 2000 - 2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademark s of Acronis, Inc. "Acronis Co mpute wi th Confiden ce", “Acr onis Sta rtup Recovery Manager”, “Acronis Active Restore” and the Acro nis logo are tra demarks of Acro nis, Inc.
Table of contents 1 Introducing Ac ronis® Backup & Rec overy™ 10 ......................................................................... 6 1.1 Acronis Backup & Recovery 10 overview .........................................................
4 Vaults .................................................................................................................................... 70 4.1 Personal vaults ......................................................................................
6.5 Mounting an image ............................................................................................................... 134 6.5.1 Archive se lection ......................................................... ..............................
Copyright © Ac ronis, Inc., 20 00 - 2010 6 1 Introduci ng Acroni s ® Ba ckup & Re covery™ 1 0 1.1 Acronis Backu p & Recovery 10 overvie w Based on Acro nis’ patented disk imagin g and ba.
Copyright © Ac ronis, Inc., 20 00 - 2010 7 For what to do next s ee " Basic co n cepts ( p. 17 )". For understanding of t he GUI elements see " Usin g the managem ent console ( p. 7 )". 1.2.1 Using the managemen t cons ole As soon a s the conso le conne cts to a managed machi ne ( p.
8 Copyright © Acr onis, Inc., 20 00 - 2010 1024x768 or higher display resolution is require d for comfor table work w ith the manageme nt console. 1.2.1.1 "Navigation" pane The navigatio n pane includ es the Naviga tion tree an d the Shor tcuts bar.
Copyright © Ac ronis, Inc., 20 00 - 2010 9 Bars '[Item's na me]' actions Contains a set of actions that can be performe d on the items selected in any of the navigation v iews. Clicking the action opens the respective actio n page ( p.
10 Copyright © Ac ronis, Inc., 20 00 - 2010 "Tools" bar Help Contains a lis t of help to pics. Differen t views and a ction pages of Acronis Backu p & Recovery 10 provided with lists of s pecific help topics.
Copyright © Ac ronis, Inc., 20 00 - 2010 11 "Tasks" view Common way of working w ith views Generally, every view contai ns a table of items, a table toolbar with buttons, and t he Inform ation panel.
12 Copyright © Ac ronis, Inc., 20 00 - 2010 Action page - Create backup plan Using controls and specifying settings The action pa ges offer two ways of repres entation: bas ic and advanced . The basic repr esentation hides such fields as credentials, comments, etc.
Copyright © Ac ronis, Inc., 20 00 - 2010 13 Navigation buttons 1.3 Acronis Backu p & Recovery 10 components This section contains a list of Acronis B ackup & Reco very 10 components with a bri ef description of their functionality.
14 Copyright © Ac ronis, Inc., 20 00 - 2010 1.3.2 M an agement Con sole Acronis Backup & Recovery 1 0 Management Console is an administrat ive tool for local access to Acronis Backup & Recovery 10 Agent for Linu x. Remote conne ction to the agent is not po ssible.
Copyright © Ac ronis, Inc., 20 00 - 2010 15 The agent for L inux is in fa ct a 32 - bit ex ecutable. For authentication , the agent us es s ystem libraries, 32 - bit versions o f which are not always installed by default with 64 - bit distri butions.
16 Copyright © Ac ronis, Inc., 20 00 - 2010 or (ii) supply code corrections to correct insubstantia l problems at the next genera l release of the Software. More informati on about co ntacting Acro nis Technical Sup port is ava ilable at t he follo wing link: http://www.
Copyright © Ac ronis, Inc., 20 00 - 2010 17 2 Understan ding Acr onis Bac kup & Re covery 10 This section a ttempts to giv e its readers a cl ear understa nding of the pro duct so that they can us e the product i n various circ umstances witho ut step - by - step instructi ons.
18 Copyright © Ac ronis, Inc., 20 00 - 2010 The following diagram illus trates the notions discuss ed above. For more definiti ons please refer to the Glossary.
Copyright © Ac ronis, Inc., 20 00 - 2010 19 Backup using bootable media You can boot the machine using the boo table media, co nfigure the backup oper ation in the s ame way as a simple ba ckup plan and execu te the operation.
20 Copyright © Ac ronis, Inc., 20 00 - 2010 The following diagram illus tr ates data re covery under the operating s ystem (online). No backup ca n proceed on th e machine while the recovery o peration is taki ng place. If req uired, you can connect the console to another machine and configu re a recover y operation on t hat machine.
Copyright © Ac ronis, Inc., 20 00 - 2010 21 If the machine fails to bo ot or you need to recov er data to bare metal, yo u boot the machine usi ng the bootable media and conf igure the reco very operation in the same way a s the recovery task. The following dia gram illustra tes the recove ry using the b ootable medi a.
22 Copyright © Ac ronis, Inc., 20 00 - 2010 It is widely accepted that a full backup is the slowest to do bu t the fastest to restore. With Acro nis tec hnologies, recovery from a n incremental b ackup may be not slower than recovery from a full on e.
Copyright © Ac ronis, Inc., 20 00 - 2010 23 Paramet er Full ba cku p Differenti al backup Increme ntal ba ckup Storage spa ce Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.
24 Copyright © Ac ronis, Inc., 20 00 - 2010 Plan's credentials and task credentials Any task run ning on a machin e runs on behalf of a u ser. When crea ting a plan or a task, you have the option to exp licitly specify an account u nder which th e plan or th e task will ru n.
Copyright © Ac ronis, Inc., 20 00 - 2010 25 GFS by Acroni s With Acronis Backup & Reco very 10, you can easily set up a backup p lan that will regularly bac k up data and clea n up the resu lting archive accordin g to th e GFS sch eme. Create the backup plan as usual.
26 Copyright © Ac ronis, Inc., 20 00 - 2010 Assume you select Friday for Weekly/Monthly backu p. Here is the real schedul e of the backup tasks that will be created. Backup tas ks crea ted accordi ng to t he GFS sche me by A cronis Back up & Rec overy 10.
Copyright © Ac ronis, Inc., 20 00 - 2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8: 00 PM Weekly/Monthly: Friday Keep daily bac kups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Starting from the third we ek, weekly backups will be r egularly deleted.
28 Copyright © Ac ronis, Inc., 20 00 - 2010 An archive cre ated accordi ng to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8: 00 PM Weekly/Monthly: Friday Keep daily bac kups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months 2.
Copyright © Ac ronis, Inc., 20 00 - 2010 29 F or example, if there are fi ve rings labeled A, B, C, D , and E in the puzzle, th e solution gives the following order of mov es: The Tower of Hanoi backup scheme is ba sed on the sa me patterns. It operates with Sess ions instead of Moves and with B ackup level s inste ad of Rings .
30 Copyright © Ac ronis, Inc., 20 00 - 2010 the scheme fo rces every backup level to keep only the mos t recent ba ckup, other ba ckups from the level have to be deleted; ho wever backup deletion.
Copyright © Ac ronis, Inc., 20 00 - 2010 31 to this interv al and delete s all backups created before tha t moment. None of the ba ckups created a fter this moment will be deleted. 2. Keep the archive size within This is the ma ximum size o f the archive .
32 Copyright © Ac ronis, Inc., 20 00 - 2010 Combination of r ules 1 and 2 You can limit both the bac kups’ lifetime a nd the archi ve size. The d iagram below ill ustrates the resulting rule.
Copyright © Ac ronis, Inc., 20 00 - 2010 33 Please be aware that cons olidation is just a method of deletion but no t an alternative to deletion. The resulting backup will n ot contain data that was pres ent in the delete d backup an d was absent from t he reta ined incremental or differential backup.
34 Copyright © Ac ronis, Inc., 20 00 - 2010 For detailed instructions o n how to recover logical v olumes, see Recovering MD d evices and logical volumes ( p. 155 ). You do not n eed to create the volume s tructure if it already exists on the machi ne (such is th e case when some d ata on the vo lume was lost, bu t no hard disks were rep laced).
Copyright © Ac ronis, Inc., 20 00 - 2010 35 2.9 Backing up RAID array s (Linux) Acronis Backup & Recovery 10 Agent for Linu x can back up and recover Linux Softwa re RAID devices (known as mu ltiple - disk devices or MD devices) and hardware RAID arrays.
36 Copyright © Ac ronis, Inc., 20 00 - 2010 Recovery Parameters of software RAID arrays are not backed up, so th ey can only be recovered over a basic volume, to unallocate d space, or to a previously configured ar ray. Recovery can be performed in Linux or a Linux - bas ed bootable med ia.
Copyright © Ac ronis, Inc., 20 00 - 2010 37 a locally attache d tap e device (t ape drive or tape library) by... ATIE 9.7 + + + + ABR10 + + + + Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.
38 Copyright © Ac ronis, Inc., 20 00 - 2010 5. Because the pr esence of an o perating sys tem cannot be d etected in a b ackup loca ted on a tape, Acronis Universal Restore ( p. 172 ) is proposed at ev ery disk or volume recovery , even when recovering a Linux or non - system Windows volume.
Copyright © Ac ronis, Inc., 20 00 - 2010 39 With the new Acronis Secu re Zone behavior, yo u obtain the ability to: list archives l ocated in the zone and ba ckups contain ed in each ar chive .
Copyright © Ac ronis, Inc., 20 00 - 2010 40 3 Options This section covers Acronis Backup & Recov ery 10 options that can be co nfigured usin g Graphical Use r Interfac e. The conten t of this secti on is applica ble to both s tand - alone and advanced editions of Acronis Backup & Recovery 10.
Copyright © Ac ronis, Inc., 20 00 - 2010 41 The preset is: Enabled fo r all results. To make a setting for each result ( successful completion, failure or success with warnings) individually, select or clear the respective check box .
42 Copyright © Ac ronis, Inc., 20 00 - 2010 The option d efines the fo nts to be use d in the Gr aphical User Inter face of Acr onis Ba ckup & Re covery 10. The Menu se tting aff ects the d rop - down a nd context menus. The Appl ication se tting aff ects the other GUI el ements.
Copyright © Ac ronis, Inc., 20 00 - 2010 43 1.3.6.1.4.1.24769.100.200.2.0 - string containing t he text descri ption of t he event (it loo ks identical to messages pub lished by Acronis Backup & Recovery 10 i n its log). The preset is: Disable d .
44 Copyright © Ac ronis, Inc., 20 00 - 2010 The preset is: Maximum log size: 1 GB . On cleanup , keep 95% of the maximu m log size . When the op tion is enable d, the progra m compares th e actual log size with the maximum siz e after every 100 log entries.
Copyright © Ac ronis, Inc., 20 00 - 2010 45 Compression level ( p. 51) + + + + Backup perfor mance: Backup prior ity ( p. 51 ) + + - - HDD wri ting speed ( p.
46 Copyright © Ac ronis, Inc., 20 00 - 2010 3.3.1.1 Archive protection This option is effective for Windows and Linux operati ng systems and bo otable media . This option is effective fo r both disk - level and file - level ba ckup. The preset is: Disable d.
Copyright © Ac ronis, Inc., 20 00 - 2010 47 Exclude files matching the foll owing criteria Select this check box to s kip files wh ose n ames match any o f the criteria — called file masks — in the list; use the Add , Edit , Rem ove and Remove All buttons to create the lis t of file masks.
48 Copyright © Ac ronis, Inc., 20 00 - 2010 Select the existing command or the batch file f rom the drop - down list 3. Click OK . Pre - backu p comma nd To specify a command/batch file to be executed before the backup process sta rts 1. In the Comm and field, typ e a command or browse to a b atch file.
Copyright © Ac ronis, Inc., 20 00 - 2010 49 The option ena bles you to defin e the comma nds to be auto matically exe cuted before a nd after data capture (that is, taking the data snapsho t) performed by Acronis Ba ckup & Recover y 10 at the beginning of the back up procedure.
50 Copyright © Ac ronis, Inc., 20 00 - 2010 Preset Perform the data capture o nly afte r the command is successful ly execute d. Fail the task if the command execution fails. Perform the data capture after the command is executed de spite execution failure or success.
Copyright © Ac ronis, Inc., 20 00 - 2010 51 Always creat e a snapshot The snapshot enables bac king up of all files incl uding files o pened for excl usive access.
52 Copyright © Ac ronis, Inc., 20 00 - 2010 operating sys tem to allocate more resour ces like the CPU to the ba ckup application. However, the resulting effect will depend o n the overall CPU usage a nd other factors like disk in/ out speed or network traffic.
Copyright © Ac ronis, Inc., 20 00 - 2010 53 Click Transfer ring speed stated as a per centage of the estimated m aximum speed of the ne twork co nnection , a nd then drag the slider or type a per.
54 Copyright © Ac ronis, Inc., 20 00 - 2010 User na me – enter the user name. Password – e nter the passwo rd. 6. Click Send test e - mail message to check if the s ettings are correct.
Copyright © Ac ronis, Inc., 20 00 - 2010 55 1.3.6.1.4.1.24769.100.200.2.0 - string containing t he text descri ption of t he event (it loo ks identical to messages pub lished by Acroni s Back up & Recov ery 10 in i ts log). The preset is: Use the setting set in the M achine options.
56 Copyright © Ac ronis, Inc., 20 00 - 2010 A single backup file wil l be created if the desti nation disk's file system allo ws the estimated fi le size. The backup will automati cally be split into severa l files if the destination dis k's file system does not allow the estimated f ile size.
Copyright © Ac ronis, Inc., 20 00 - 2010 57 Do not sho w messages and dialogs while processing (silent mode) The preset is: Disable d . With the sile nt mode ena bled, the progra m will auto matically handle si tuations requ iring user interaction (except for ha ndling bad sectors, which is defined as a s eparate option ).
58 Copyright © Ac ronis, Inc., 20 00 - 2010 Roaming user s can back up their portable co mputers to Acronis Secur e Zone while o n the road. When the po rtable computer i s connected to the corpo rate network, all c hanges made to the archive will be transferred to its stationary copy after the first backup oper ation.
Copyright © Ac ronis, Inc., 20 00 - 2010 59 Time diagram: W ait until conditi ons are met Skip the task execution Delaying a ba ckup might be u nacceptable, f or example, w hen you need to back up da ta strictly at the specified tim e.
60 Copyright © Ac ronis, Inc., 20 00 - 2010 The program w ill try to exe cute the failed ta sk again if y ou select the Res tart a failed task ch eck box and specify the number o f attempts an d the time in terval betwee n the attemp ts.
Copyright © Ac ronis, Inc., 20 00 - 2010 61 When the op tion is enable d, backing up to removable me dia may b e not possib le if the user i s away, because the program will wait for som eone to press OK in the pro mpt box. Hen ce, you should d isable the prompt when schedu ling a backup to removable media.
62 Copyright © Ac ronis, Inc., 20 00 - 2010 Save software RAID and LVM metadata along with backups This option is effective o nly for disk - level backups of machines runni ng Linux.
Copyright © Ac ronis, Inc., 20 00 - 2010 63 commands ( p. 63 ) Recovery priority ( p. 65 ) + + - - File - level security ( p. 65): Recover files with their security settings - + - + Error handling ( p. 68): Do not show messages and dialogs while proc essing (silent mode) + + + + Re - attempt if an error occurs + + + + Additional s ettings ( p.
64 Copyright © Ac ronis, Inc., 20 00 - 2010 To specify pre/post commands 1. Enable pre/po st commands execution by che cking the follo wing options : Execute befo re the recove ry Execute after the recovery 2.
Copyright © Ac ronis, Inc., 20 00 - 2010 65 When the ch eck box is no t selected, the command execut ion result does not affect the task execution fail ure or success . You can track the command e xecution resu lt by explo ring the log or the errors and warnin gs displayed o n the Dash board .
66 Copyright © Ac ronis, Inc., 20 00 - 2010 The preset is: Disable d . To configure e - mai l notification 1. Select the Send e - mail n otifications check bo x to activ ate notifi cations. 2. In the E- mail addr esses field, type the e - mail a ddress to whi ch notificatio ns will be s ent.
Copyright © Ac ronis, Inc., 20 00 - 2010 67 The Messenger service is not started by default in the Micro soft Windows Serve r 2003 family. Change the service Star tup mode to Automatic and start the se rvice. To configure WinPopup notifications: 1. Select the Send WinPop up notific ations che ck box.
68 Copyright © Ac ronis, Inc., 20 00 - 2010 Community – type the na me of SNMP co mmunity to whi ch both the h ost running S NMP management app lication and t he sending ma chine belong. T he typical co mmunity is "p ublic". Click Send tes t message t o check if the setti ngs are co rrect.
Copyright © Ac ronis, Inc., 20 00 - 2010 69 Check file system after recovery This option is effective o nly when recovering disks or volu mes. When operating under bootable media, this op tion is not effective for th e NTFS file system. The preset is Disabled .
C opyright © Acr onis, Inc., 20 00 - 2010 70 4 Vaults A vault is a location for storing b ackup archives. For ease of use and administration , a vault is associated with the archi ves' metadata. Referr ing to this metadata makes for fast and conveni ent operation s with ar chives and ba ckups stor ed in the vau lt.
Copyright © Ac ronis, Inc., 20 00 - 2010 71 4.1 Pers onal vaul ts A vault is called perso nal if it was created using dire ct connection of the cons ole to a managed machine. Personal vaults ar e specific for each managed m achine. Personal vaults are vi sible to any user that can log o n to th e system.
72 Copyright © Ac ronis, Inc., 20 00 - 2010 Vault content The Vault conte nt section contains the archives t able and toolbar. The archives t able displays archives and backups that are st ored in the vault. Use the archives toolbar to perf orm actions on the selected arch ives and back ups.
Copyright © Ac ronis, Inc., 20 00 - 2010 73 Explore a vault's content Click Explore . In the appe aring Expl orer wi ndow, exam ine the se lected vault's co ntent. Validate a vault Click Validate . You will be taken to the Validation ( p. 130 ) page, where this va ult is alre ady pre - selected as a source.
74 Copyright © Ac ronis, Inc., 20 00 - 2010 3. Edit the back up plans that use vault A : r edirect their destination to vault B . 4. In the vaults tree, select va ult B to check whether the archives are d isplayed. If no t, click Refresh . 5. Delete vault A .
Copyright © Ac ronis, Inc., 20 00 - 2010 75 All the operations described belo w are performed b y clicking the c orresponding buttons on t he toolbar. These operations can be also accessed fro m the '[Backup name]' actions bar (on the Acti ons and tools pa ne) and from the '[Backup name]' actio ns item of the ma in menu.
76 Copyright © Ac ronis, Inc., 20 00 - 2010 full backup w hich will be dated the incr emental backu p date. When y ou delete a n incremental or differential b ackup from t he middle of the chain, th e resulting ba ckup type wil l be incremen tal. Please be aware that cons olidation is just a method of deletion but no t an alternative to deletion.
Copyright © Ac ronis, Inc., 20 00 - 2010 77 5 Schedul ing Acronis scheduler helps the a dministrator a dapt backup plans to the company’s daily routine an d each employee’s work style. T he plans’ tasks will be l aunched systematically keeping the critical data safely protected.
78 Copyright © Ac ronis, Inc., 20 00 - 2010 5.1 Daily schedu le Daily schedul e is effective in Windows and Linux op erating systems . To specify a daily sch edul e In the Sched ule area, select the appropriate parameter as follows: Every: <...> day(s) Set up the certain n umber of days you w ant the ta sk to be run.
Copyright © Ac ronis, Inc., 20 00 - 2010 79 From: 12:00:00 AM (midnight ) Until: 09:00:00 PM - thus, the task will be perfo rmed 8 times a day with a 3 hour time i nterval. After the last daily r ecurrence at 9 PM, the ne xt day comes and the task starts over again f rom midnight.
80 Copyright © Ac ronis, Inc., 20 00 - 2010 To specify a weekly s chedule In the Sched ule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...> Specif y a certa in number of weeks and the da ys of the we ek you wa nt the task to be run.
Copyright © Ac ronis, Inc., 20 00 - 2010 81 1. Every: 1 week(s) on: < Workdays> - selecting the <Workdays> ch eck box auto matically select s the correspondin g check boxe s ( Mon , Tue , Wed , Thu , and Fri ), and lea ves the remai ning ones unchanged.
82 Copyright © Ac ronis, Inc., 20 00 - 2010 2. Once at: 09:0 0:00 PM . 3. Effective: From: not set . To: not set . 5.3 Monthly s chedule Monthly sche dule is effecti ve in Window s and Linux operating syst ems. To specify a m onthly schedule In the Sched ule area, select the appropriate parameter as follows: Months: <.
Copyright © Ac ronis, Inc., 20 00 - 2010 83 This schedule is widely use d when creati ng a custom backup sche me. The "Last da y of every mo nth" schedule is a dded to the fu ll backups, whi le the differen tial backups a re scheduled to be performed once a week and increm ental on workdays.
84 Copyright © Ac ronis, Inc., 20 00 - 2010 From: 11/01/2009 . To: not set . Third schedule 1. Months: June , July , August . 2. Days: 1 , 15 . 3. Once at: 10:0 0:00 PM .
Copyright © Ac ronis, Inc., 20 00 - 2010 85 (1) If 9:00 PM comes and the location's host is availabl e, the backup task starts right on time. (2) If 9:00 PM comes but the host is unavailabl e at the momen t, the backup tas k will start o n the next workday if the location 's host is available.
86 Copyright © Ac ronis, Inc., 20 00 - 2010 5.4.3 Time since las t backup Applies to: Windows, Linux Enables to pu t a backup task run on hol d until the specified time i nterva l since the las t successful backup completio n passes.
Copyright © Ac ronis, Inc., 20 00 - 2010 87 6 Direct mana gement This section covers operatio ns that can be performed d irectly on a managed machine by using t he direct cons ole - agent con nection. The content of this section is applicable to both stand - alon e and advanced edi tions of Acro nis Backup & Recovery 10.
88 Copyright © Acronis, Inc. , 2000 - 2010 Please make sure you have a valid license on Acronis License Server. working. Trial version of product expires in X day(s) Please make sure you have a valid license on Acronis License Serve r.
Copyright © Ac ronis, Inc., 20 00 - 2010 89 Warnings Highlight the date in yellow if no "Error" ent ries appeared and at least o ne "Warning" entry appeared in the log on t his date. Information Highlig ht the date in green if only "I nformation" log entries appeared on this date (nor mal activity.
90 Copyright © Acronis, Inc. , 2000 - 2010 Use the Informati on panel to review detailed i nformatio n on the select ed plan (tas k). The panel is collapsed by default. To expand the panel, click the chevron. The content of t he panel is also duplicated in t he Plan details ( p.
Copyright © Ac ronis, Inc., 20 00 - 2010 91 Otherwise, see 2 following: Remove the reason of the failure - > [optionally] Start the failed task manually Edit the local plan to prevent its .
92 Copyright © Acronis, Inc. , 2000 - 2010 The user can stop a runnin g task or a ta sk that needs interaction. The task chan ges to the Stopping sta te and th en to the Idle state. A waiting task can also be stopp ed. In this case, since the task is not running, "st op" means re moving it fro m the queue .
Copyright © Ac ronis, Inc., 20 00 - 2010 93 6.1.2.2 Working with backup plan s and tasks Actions on backup plans and tasks The following i s a guideline for you to pe rform operati ons with ba ckup plans and tasks. To Do Create a new backup plan, or a task Click New , then s elect one of the f ollowing: Backup plan ( p.
94 Copyright © Acronis, Inc. , 2000 - 2010 Stop a plan/task Backup plan Click Stop . Stopping the running backup plan stops al l its tas ks. Thus , all the tas k oper ations will be aborted.
Copyright © Ac ronis, Inc., 20 00 - 2010 95 Edit a plan/ task Backup plan Click Edit . Backup plan editing is perfor med in the s ame way as creation ( p. 102 ), except for the following limitations : It is not always possible to use all sch eme opt ions, w hen editi ng a backu p plan if the create d archive is not em pty (i.
96 Copyright © Acronis, Inc. , 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will hap pen if I delete the backup pl an ? The plan's deletion delet es all its tasks.
Copyright © Ac ronis, Inc., 20 00 - 2010 97 Configuring backup plans and the tasks table By default, th e table has si x columns tha t are displayed, others are hid den. If required, you can hid e the displayed co lumns and s how hidden on es. To show or hide columns 1.
98 Copyright © Acronis, Inc. , 2000 - 2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fr om a disk backu p Recovery (MBR) Master boot record recovery Recovery (dis.
Copyright © Ac ronis, Inc., 20 00 - 2010 99 Backup plan details The Backup pl an details wi ndow (also du plicated on the I nforma tion panel) aggregates in f our tabs all the inform ation on the selected backup pla n. The respective message will appear a t the top of t he tabs, if one of the plan 's tasks requires user interaction.
100 Copyright © Acronis, Inc. , 2000 - 2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or a ctions a user takes on the machine usin g the program. F or instance, when a user edits a task, the resp ective entry is added to the lo g.
Copyright © Ac ronis, Inc., 20 00 - 2010 101 Save the selected log entries to a file 1. Select a single log entry or multip le log entries. 2. Click Save Selected to File . 3. In the opened window, s pecify a path and a name fo r the fil e. Save all the log entries to a file 1.
102 Copyright © Acronis, Inc. , 2000 - 2010 6.1.3.3 Log entry details Displays deta iled informati on on the log entry you ha ve selected and le ts you co py the details to the clip board.
Copyright © Ac ronis, Inc., 20 00 - 2010 103 [Optional] Typ e a descripti on of the bac kup plan. To access this o ption, select the Advance d view check b ox. What to backup Source type ( p. 104 ) Select the type o f data to ba ck up. The type o f data depends on the a gents installed o n the machine.
1 04 Copyright © Acronis, Inc. , 2000 - 2010 Afte r any of the s ettings is cha nged against t he default va lue, a new li ne that disp lays the newly set val ue appears. T he setting sta tus changes fro m Default to Custom . Sh ould you modify the setting again, t he line will display the new value unless the new val ue is the default one.
Copyright © Ac ronis, Inc., 20 00 - 2010 105 If you are no t concerned a bout recovery of the opera ting system a long with all the settings a nd applications, but plan to k eep safe only cer tain data (the c urrent proj ect, for ex ample), cho ose file backup.
106 Copyright © Acronis, Inc. , 2000 - 2010 Linux A volume backup stores a ll files and folders of the selected volume indepen dent of their attributes, a boot record and the file sys tem super bl ock. A disk ba ckup s tores all disk volumes as well as the zero track with the master boot record.
Copyright © Ac ronis, Inc., 20 00 - 2010 107 Exclude all system files and folders Select this check box to s kip files and folders with the System attribute. If a folder is System, all of its contents — includi ng files that are not Syste m — will be exclud ed.
108 Copyright © Acronis, Inc. , 2000 - 2010 After entering acce ss credentials, the folders o n the server become av ailable. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access.
Copyright © Ac ronis, Inc., 20 00 - 2010 109 Use the plan's c redentials The program w ill access the so urce data using the credentia ls of the bac kup plan ac count specified in the General s ection. Use the following credentials The program will access th e source data using the cr edentials you specify.
110 Copyright © Acronis, Inc. , 2000 - 2010 6.2.9.2 Back up later scheme With the B ac k up later scheme, the ba ckup will be p erformed onl y once, at the date and tim e you specify. Specify the appropriate se ttings as follows Backup ty pe Select the type of b ackup: ful l, increm ental, or differe ntial.
Copyright © Ac ronis, Inc., 20 00 - 2010 111 Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly back ups run every fourth Friday , and weekly ba ckups run o n all other Fr idays.
112 Copyright © Acronis, Inc. , 2000 - 2010 Daily: 1 week Weekly: 1 month Monthly: ind efinitely As a result, an archive of d aily, weekly, and monthly backups will be created. D aily backups will be ava ilable for seven days since creation .
Copyright © Ac ronis, Inc., 20 00 - 2010 113 Weekly/monthly: Friday Keep backups: Daily: 6 months Weekly: 6 months Monthly: 5 y ears Here, daily in cremental backups will be created on Tuesday s and Thursday s, with weekly and monthly back ups performed on Fridays.
114 Copyright © Acronis, Inc. , 2000 - 2010 Roll- back period The guarante ed number of ses sions that on e can go ba ck in the archive at any time. Calculated a utomati cally, depe nding on t he schedul e param eters and t he number s of levels you select.
Copyright © Ac ronis, Inc., 20 00 - 2010 115 Here are the backups we h ave on day 12 (n umbers in gra y denote dele ted backups) . 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential b ackup has not yet been created, so the backup of da y five is still sto red.
116 Copyright © Acronis, Inc. , 2000 - 2010 This setting is recommend ed for backup destinations such as shared folders or centralized vaults. When there is insufficien t space while back ing up The archive wi ll be cleaned up only d uring backu p and only if there is not enou gh space to create a new backup.
Copyright © Ac ronis, Inc., 20 00 - 2010 117 Also, let all backups ol der than one year be dele ted from the archive, a nd let the cleanup be performed upo n creating a new backu p.
118 Copyright © Acronis, Inc. , 2000 - 2010 You can manu ally run any backup task or clea nup task at a ny time, r egardless of whether it has a schedule.
Copyright © Ac ronis, Inc., 20 00 - 2010 119 [Optional] Enter a un ique name for the reco very task. A cons cious name lets you quickly identify the t ask among th e others. Task cred entials ( p. 120 ) [Optional] Th e task will ru n on behalf o f the user wh o is creating the task.
120 Copyright © Acronis, Inc. , 2000 - 2010 After you complete all the required steps, click OK to create the commit creating of the rec overy task. 6.3.1 T ask crede ntials Provide credentials for th e account under which the task will run. To specify credentials 1.
Copyright © Ac ronis, Inc., 20 00 - 2010 121 If the port nu mber is not s pecified, port 21 is used fo r FTP and po rt 22 is used for SFTP. After entering access credentials, t he folders on the s erver become available. Click the appropriate folder on the server.
122 Copyright © Acronis, Inc. , 2000 - 2010 When recover ing the MBR o f one disk to another Acro nis Backup & Recovery 10 r e covers Track 0, which does n ot affect the t arget disk’s p artition table and partition layout.
Copyright © Ac ronis, Inc., 20 00 - 2010 123 Recover to: Physical m achine The selected disks will be r ecovered to the physical di sks of the machi ne the con sole is connected to. On selecti ng this, you p roceed to the regular disk ma pping procedur e described below.
124 Copyright © Acronis, Inc. , 2000 - 2010 6.3.6.2 Volumes Available volu me destinatio ns depend on the agents o perating on the machine. Recover to: Physical m achine The sele cted volumes will be recovered to the phys ical disks of the machine the console is connected to .
Copyright © Ac ronis, Inc., 20 00 - 2010 125 Volume properties Resizing and relocating When recover ing a volume to a basic M BR disk, you ca n resize and r elocate the vo lume by dragging it or its borders with a mous e or by enter ing correspo nding values in the appropri ate fields.
126 Copyright © Acronis, Inc. , 2000 - 2010 6.3.6.3 File destination To specify a d estination: 1. Select a location to re cover the backed up files to: Original location - files and folders will be recovered t o the same path(s) as they are in the backup.
Copyright © Ac ronis, Inc., 20 00 - 2010 127 Do not overwrite existing file - this will give the file on the hard disk prio rity over the file i n the backup. If you allow files to be overwritten, you still hav e an option to prev ent overwriting of specific files by excluding ( p.
128 Copyright © Acronis, Inc. , 2000 - 2010 hexadecimal co de of this partition typ e is 0xFD. This will guaran tee that the device will be automatically a ssembled fo llowing the rebo ot. To view or c hange the par tition type, use a disk partitioning utility such as f disk .
Copyright © Ac ronis, Inc., 20 00 - 2010 129 The system uses Linu x Loader ( LILO) an d was rec overed from a normal (not from a raw, that is, sector - by - sec tor) bac kup LILO contains numerou.
130 Copyright © Acronis, Inc. , 2000 - 2010 title Red Hat E nterprise L inux Server ( 2.6.24.4) root (hd0 ,0) kerne l /vmlinuz - 2.6. 24.4 ro roo t=/dev/sda2 r hgb quiet initr d /initrd - 2.6.2 4.4.img The lines starting with ti tle , root , kernel , and initrd res pecti vely determine: The title of t he menu ite m.
Copyright © Ac ronis, Inc., 20 00 - 2010 131 While successful validatio n means high probability of successful recovery, it does not check all fa ctors that influenc e the recovery pr ocess. If yo u back up th e operating s ystem, only a test recovery in bootable envi ronment to a spare hard drive can guarantee success of the recovery.
132 Copyright © Acronis, Inc. , 2000 - 2010 Run under the curren t user The task will run under th e credentials with which th e user who st arts the tasks is logged on . If the task ha s to run on s chedule, you will be asked for the curren t user's passwo rd on completing the task creatio n.
Copyright © Ac ronis, Inc., 20 00 - 2010 133 If the archive is stored on a locally attac hed tape devi ce, expand the Ta pe drives gro up, then click the required device. 2. In the table t o the right o f the tree, sele ct the archive . The table di splays the na mes of the archives contained in ea ch vault/folder you select.
134 Copyright © Acronis, Inc. , 2000 - 2010 The program will access th e location using the cred entials of the tas k account specified in th e General section. Use the f ollowi ng crede ntials The program w ill access the lo cation using t he credentia ls you specify.
Copyright © Ac ronis, Inc., 20 00 - 2010 135 "Band aid" dat abase recov ery solution : moun t up an image t hat contains a n SQL data base from a recently failed machine. This will give access to the database until the failed machine is recovered.
136 Copyright © Acronis, Inc. , 2000 - 2010 After entering access credentials, t he folders on the s erver become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access.
Copyright © Ac ronis, Inc., 20 00 - 2010 137 6.5.4 V olume se lection Select the volumes to mou nt and configure the mo unting parameters for each o f the selected volumes as follows: 1. Select the c heck box for each volum e you need to mount. 2. Click on the selected volu me to set its mounting pa rameters.
138 Copyright © Acronis, Inc. , 2000 - 2010 a single back up - an archive co nsisting o f a single full backup will be created. Th e export of a n incremental or a diff erential backup is perform.
Copyright © Ac ronis, Inc., 20 00 - 2010 139 export from a n unmanaged ce ntralized vault . The export is performed b y the agent ins talled on the managed machin e you specify. The destination can be any location accessible to th e agent, including a m anaged vault.
140 Copyright © Acronis, Inc. , 2000 - 2010 Enter the pat h to the locatio n where the new archive will be created. Be sure to pr ovide a disti nct name and comment for the new archi ve. Access crede ntials ( p. 143 ) [Optional] Provide creden tials for the destination if the task cred entials do no t have enough privileges to access it.
Copyright © Ac ronis, Inc., 20 00 - 2010 141 Note for L inux users: To speci fy a Common Internet File Sys tem (CIFS) network sh a re which is mount ed on a mount poi nt such as /mnt/sha re, selec t this m ount point i nstead of the ne twork share itself.
142 Copyright © Acronis, Inc. , 2000 - 2010 User na me . When entering the name of an A ctive Directory u ser account, b e sure to also specify the d omain name (D OMAIN Us ername o r Username@ domain) Password . Th e password f or the accou nt.
Copyright © Ac ronis, Inc., 20 00 - 2010 143 3. Naming the new archive By default, the exported ar chive inherits the name of the original archive. Becaus e having multiple archives of the same name .
144 Copyright © Acronis, Inc. , 2000 - 2010 To create Acronis Secure Zone, perform the following steps. Space Disk ( p. 144 ) Choose a hard disk (if several) on which to create the zone. Acronis Sec ure Zone is created using unallocated spa ce, if available, or at the e xpense of the volume's free s pace.
Copyright © Ac ronis, Inc., 20 00 - 2010 145 6.8.1.3 Password for Acronis Secure Zone Setting up a passw or d protects th e Acronis Secur e Zone from u nauthorize d access.
146 Copyright © Acronis, Inc. , 2000 - 2010 Use backup s chemes with a utomatic clean up to back up to the zone, o r delete outdate d archives manually usin g the vault ma nagement functio nality.
Copyright © Ac ronis, Inc., 20 00 - 2010 147 If you select several volum es, the space will be distributed prop ortionally to each partition. If you do not select any volume, the freed spac e becomes u nallocated. After you click OK , Acronis Backup & Recovery 10 will star t deletin g the zone.
148 Copyright © Acronis, Inc. , 2000 - 2010 deploy an op erating system o n bare metal create basic o r dynamic vo lumes on bare me tal back up s ector - by - sector a disk with an unsupp.
Copyright © Ac ronis, Inc., 20 00 - 2010 149 If not configured, the A cronis loader waits for s omeone to select whether to b oot the operating sys tem (if present) or the Acr onis compone n t. If you set, say, 10 sec. for the bootable agent, the ag ent will launc h 10 seconds after th e menu is displ ayed.
150 Copyright © Acronis, Inc. , 2000 - 2010 Specifies the video mode t o be used by the bootable media's graphi cal user int erface. The mo de number is giv en by mode_number in the hexadecim al.
Copyright © Ac ronis, Inc., 20 00 - 2010 151 6.10.1.2 Netw ork set tings While creati ng Acronis bootabl e media, you have an op tion to pre - configure network conn ections that will be u sed by the bo otable agent. Th e followin g parameters can be pre - co nfigured: IP address Subnet mask Gateway DNS server WINS server.
152 Copyright © Acronis, Inc. , 2000 - 2010 If the port ha s not been pr e - configured, the agent us es the default po rt number (98 76.) This po rt is also used as default by th e Acronis Backup & Recovery 1 0 Management C onsole.
Copyright © Ac ronis, Inc., 20 00 - 2010 153 1. In the boot m enu, press F11 . 2. Add to the command prom pt the following co mmand: vga=ask , and then pro ceed with bo oting. 3. From the list of suppo rted vid eo modes , choose the a ppropriate o ne by typing its number (for example, 318 ), and th en press ENT ER.
154 Copyright © Acronis, Inc. , 2000 - 2010 Acronis command line utilities acronis asamb a lash restoreraids trueimagecmd trueimagemnt Linux commands and utilities busybox ifc.
Copyright © Ac ronis, Inc., 20 00 - 2010 155 hexdump readcd hotplug reboot 6.10.5 R eco v ering MD devi ces an d logi cal v olu mes To recover Linux Software RA ID devices, known as MD device s, and/.
156 Copyright © Acronis, Inc. , 2000 - 2010 6. Click Recover , then specify the path to the a rchive and a ny other requi red parameters , and then click OK . If Acronis Bac kup & Recover y 10 could no t create the v o lume structure (or if it is no t present in the archive), create the structur e manually.
Copyright © Ac ronis, Inc., 20 00 - 2010 157 The following picture illust rates this configuration. Do the following to recov er data from this archive. Step 1: Creati ng the volume s tructure 1. Boot the mach ine from a Li nux - based bo otable media.
158 Copyright © Acronis, Inc. , 2000 - 2010 3. In Backup , click Chang e and then sel ect the backup fr om which yo u want to re cover data. 4. In Data type , select Volumes . 5. In Items to recover , s elect the check bo x next to m y_volgrou p - my_logvol .
Copyright © Ac ronis, Inc., 20 00 - 2010 159 To collect system information 1. In the manag ement console, s elect from the to p menu Hel p > Collec t system in formation fr om 'machine na me'. 2. Speci fy where to save the file with system informa tion.
Copyright © Acronis, In c., 2000 - 2010 160 7 Glossary A Acronis A ctive Rest ore The Acronis p roprietary tech nology that br ings a system on line immediate ly after the s ystem recovery is st arted. The sys tem boots from th e b ackup ( p. 166 ) and the machi ne becomes operational and ready to provide necessary s ervices.
Copyright © Ac ronis, Inc., 20 00 - 2010 161 Agent (Acronis Backup & R ecovery 10 Age nt) An applicatio n that perfor ms data backup a nd recovery a nd enables o ther managemen t operations o n the machi ne ( p. 169 ), such as task managemen t and operatio ns with hard disks.
162 Copyright © Ac ronis, Inc., 20 00 - 2010 Backup options Configuration parameter s of a backup o peration ( p. 1 61 ), such as pre/post bac kup commands, maximum netw ork bandwidth allotted fo r the backup s tream or data compression l evel. Backup options are a part of a backup plan ( p.
Copyright © Ac ronis, Inc., 20 00 - 2010 163 5. On each machi ne, the agent i nstalled on th e machine crea tes a backup pla n ( p. 162 ) usi ng other rules specifi ed by the policy. Su ch backup pl an is calle d a central ized plan ( p. 164 ). 6. On each machi ne, the agent i nstalled on th e machine crea tes a set of c entralize d tasks ( p.
164 Copyright © Ac ronis, Inc., 20 00 - 2010 built - in group except for deleting the m achine from the managem ent server. Virtual machines a re deleted as a result of their host server deletion. A backup poli cy ( p. 162 ) can be a pplied to a built - in gr oup.
Copyright © Ac ronis, Inc., 20 00 - 2010 165 Cleanup consists in applyin g to an archive the reten tion rules set by the ba ckup plan ( p. 162 ) that produces the archive. This operation ch ecks if the archive has exceeded its maximu m size and/o r for expired back ups.
166 Copyright © Ac ronis, Inc., 20 00 - 2010 operations ar e configured on the managemen t server ( p. 170 ) and propagated by the server to the managed machin es). The direct m anagement opera tions inc lu de: creating and managing loc al backup pla ns ( p.
Copyright © Ac ronis, Inc., 20 00 - 2010 167 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for bett er fault tolerance, better perfor mance or larger vo lume size.
168 Copyright © Ac ronis, Inc., 20 00 - 2010 Dynamic volume Any volume l ocated on dy namic disks ( p. 166 ), or more precisely, on a d isk group ( p.
Copyright © Ac ronis, Inc., 20 00 - 2010 169 G GFS (Grandfather - Fat her - Son) A popular ba ckup scheme ( p. 163 ) aimed to maintain the o ptimal bal ance between a backup archiv e ( p. 161 ) size and t he number o f recovery points ( p. 1 70 ) available from the archive.
170 Copyright © Ac ronis, Inc., 20 00 - 2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node o r on a tape l ibrary locally attached to t he storage node. The storage nod e performs storage node - side cleanup ( p.
Copyright © Ac ronis, Inc., 20 00 - 2010 171 R Recovery point Date and time to which th e backed up data can be reverted to. Registered machine A machine ( p. 169 ) ma naged by a ma nagement server ( p. 170 ). A machin e can be regis tered on only one management server at a time.
172 Copyright © Ac ronis, Inc., 20 00 - 2010 Since the clea nup schedule exists on the machine ( p. 169 ) t he agent ( p. 160 ) resides on, and therefore use s the machin e’s time and ev ents, the agent has to initia te the stora ge node -side cleanup every tim e the schedul ed time or even t comes.
Copyright © Ac ronis, Inc., 20 00 - 2010 173 the image b eing re covered is located in Acronis Secur e Zone ( p. 160 ) o r when using Acro nis Active Restore ( p. 160 ), because these features are primar ily meant for instant d a ta recovery on t he same machi ne.
174 Copyright © Ac ronis, Inc., 20 00 - 2010 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1). WinPE is com monly used by OE Ms and co rporations fo r deployment, tes t, diagnostic an d system repair purpo ses.
8 Index A Access credentials • 135, 136 Access credentials for archive location • 103, 108 Access credentials for destination • 119, 127, 140, 143 Access credentials for location • 119, 122 Ac.
176 Copyright © Ac ronis, Inc., 20 00 - 2010 C Centralized backup plan • 38, 162, 163, 164 Centralized management • 164, 165 Centralized task • 163, 164, 166 Centralized vault • 164, 169, 170.
Copyright © Ac ronis, Inc., 20 00 - 2010 177 Fits time interval • 85 Fonts • 41 Full backup • 161, 163, 165, 168 Full, incremental and differential backups • 17, 21, 109 G Getting started •.
178 Copyright © Ac ronis, Inc., 20 00 - 2010 Owners and credentials • 23, 71, 120, 132, 140 P Password for Acronis Secure Zone • 144, 145 Personal vault • 160, 166, 170 Personal vaults • 39, .
Copyright © Ac ronis, Inc., 20 00 - 2010 179 Tower of Hanoi scheme • 113 U Understanding Acronis Backup & Recovery 10 • 17 Understanding states and statuses • 90 Universal Restore (Acronis .
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Acronis Backup & Recovery 10 Server (Linux) c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Acronis Backup & Recovery 10 Server (Linux) - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Acronis Backup & Recovery 10 Server (Linux), vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Acronis Backup & Recovery 10 Server (Linux) va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Acronis Backup & Recovery 10 Server (Linux), mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Acronis Backup & Recovery 10 Server (Linux).
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Acronis Backup & Recovery 10 Server (Linux). Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Acronis Backup & Recovery 10 Server (Linux) ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.