User's GuideAcronis®True Image Echo Server for LinuxCompute with confidencewww.acronis.com
MBR restore Backup to FTP server Allow logs on net share 1.4 Supported file systems and storage media 1.4.1 Supported file systems • Ext2/Ext3 •
Chapter 2. Acronis True Image Echo Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis True Image
2.3 Running Acronis True Image Echo Server To run the program under the X Window System interface, use the trueimage command or select Acronis True
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc
A standalone full backup may be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, t
In case you remove Acronis True Image Echo Server from the system, there is an option to keep Acronis Secure Zone along with its contents (which will
3.6 Working from a remote terminal You can control the image creation or restoration process remotely from any computer in the local network or Inte
- to be able to recover data in rescue mode, you must keep its backup on a basic, network, or removable disk. A system, restored from an LVM volume
Backup and restore using tape drive proceed in the same way as with other devices, with the following exceptions. 1. A full backup can be stored on a
Chapter 4. The program interface under X Window System Acronis True Image Echo Server features both the console mode and a user-friendly interface u
Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”
• Manage Acronis Secure Zone – create, delete and resize a special hidden partition for storing archives (Acronis Secure Zone) • Clone Disk – trans
4.1.3 Status bar At the bottom of the main window, there is a status bar indicating the Acronis True Image Echo Server operation progress and result
Chapter 5. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a
You can also apply custom filters, using the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib m
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use de
11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar. If you burn an ar
If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line
You can also close the progress window by clicking Hide. The backup creation will continue, but you will be able to start another operation or close
The preset is 128 bit. Once the password has been set, you can choose to encrypt the backup for advanced security with industry-standard AES cryptogr
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT U
It is critical to note that these commands, as opposed to Pre/post commands above, will be executed before and after data capture process, which take
If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Echo Server. To set the desired data
If you do not have enough space to store the backup on your hard disk, the program will warn you and wait for your decision as to how you plan to fix
2. Do not show messages and dialogs while processing (silent mode) The preset is disabled. Corporate administrators need an option to continue back u
Chapter 6. Restoring the backup data under X Window system This chapter describes data recovery using Acronis True Image Echo Server GUI under X Win
6.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the des
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locati
All of these settings will take effect for the current task. How to set the default filters that will be called each time you restore data, see 6.5.
9. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. Clicking Procee
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard pro
Table of Contents Chapter 1. Introduction ...7 1.1 Acronis® True
Restore disks or partitions Having selected a usual way of disks/partitions recovery, you will have to make all settings described below. 6.3.4 Sele
All the data stored on the target partition will be replaced by the image data, so be careful and watch for non-backed-up data that you might need.
If you restore a system partition to another hard disk with its own partitions and OS, most probably you will need only the data. In this case, you c
6.3.10 Setting restore options Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority
#/sbin/lilo GRUB: #/sbin/grub-install /device_name (/device_name is hd: hda, hdal, hda2, sdal, sda2 etc) 6.4 Restoring data with a rescue CD To res
6.5.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are n
Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the restore procedure to run c
Chapter 7. Scheduling tasks Acronis True Image Echo Server allows you to schedule periodic backup and archive validation tasks. Doing so will give y
• Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tas
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to
6.1.1 Restore under OS or boot from CD?...34 6.1.2 Network settings in res
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st
There are two ways of changing the task parameters. Editing allows you to change any task parameters. This is performed in the same way as creation,
Chapter 8. Managing Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is nece
The minimum size is about 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total
For example, if you use grub loader, add to /boot/grub/grub.conf or /boot/grub/menu.lst the following lines: title Acronis //or any desired title roo
5. Next you will see a list of briefly described operations to be performed on partitions (disks). After you click Proceed, Acronis True Image Echo S
Chapter 9. Creating bootable media You can run Acronis True Image Echo Server on a bare metal or on a crashed computer that cannot boot. You can als
When using 3.5” diskettes, you will be able to write on a diskette (or a set of the diskettes) only one component at a time (for example, Acronis Tr
Chapter 10. Operations with archives 10.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrit
12.2 Automatic image creation using cron service...75 12.3 Restoring files with tr
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected i
3. The program displays a list of backups belonging to the selected archive with the backups creation date and time. The list is very much alike to t
5. The program displays the summary window. Click Proceed to start consolidation. In our example, when consolidation is completed, the folder Backups
Chapter 11. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Server
11.2 WinPopup notification To set up WinPopup notification, select Tools -> Options -> Notifications -> WinPopup: Provide the name of the
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.
Chapter 12. Console mode Console is a natural part of Linux OS. Acronis True Image Echo Server supports it through the trueimagecmd command line too
deploy_mbr Restores MBR from a disk or partition image /filename:[file name] /password:[password] /asz /index:N /oss_numbers /log:[file name] /harddi
12.1.2 Common options (options common for most trueimagecmd commands) Option Description Archive location Access to archives filename:[filename]* Ar
Chapter 1. Introduction 1.1 Acronis® True Image Echo Server – a complete solution for corporate users You have come to rely on your servers to run
follows: --partition:1-1,1-2,1-3 or --oss_numbers --partition:1-1,1-5,1-6 log:[filename]* Create a log file of the current operation with the specifi
filebackup include:[names] Files and folders to be included in the backup (comma separated). For example: --include:'/home/bot/ATIESsafe.iso,/h
other primary partitions, the restored partition will be set active - if the target disk is the 1st according to BIOS and there are other primary par
list filename:[filename] With this option, the image contents is displayed. When listing image contents, partition numbers may not coincide with th
12.1.4 Trueimagecmd usage examples • This will list available partitions: trueimagecmd --list • This will list the partitions (and their indices)
trueimagecmd --consolidate \ --filename:/usr/backups/backups.tib --include_pits:2,3 \ --target_filename:/usr/back
If needed, users can make their own backup schedule. For more information, see Help on the cron service. 12.3 Restoring files with trueimagemnt The
nfs://hostname/share name:/remote filename For example: trueimagemnt -m /mnt/md1 -f nfs://dhcp6-223.acronis.com/sdb3/nfs_root:/mike/md1.tib -i 2 mou
Chapter 13. Transferring the system to a new disk 13.1 General information Sooner or later any computer user finds out that the hard disk is too sm
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete
Leverages Existing Technology Investments The product can leverage your current storage infrastructure by supporting a wide variety of storage media,
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No
• Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroy
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,
Having completed the required steps, you will add a new partition. To create another one, simply repeat those steps. If you make a mistake, click Bac
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce
A wide variety of IDE, SCSI, USB, FireWire, and PC Card (formerly PCMCIA) storage media. CD-R/RW and tape drives are supported as well (except for co
Commentaires sur ces manuels