Acronis Backup for Linux Server - User Guide Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Acronis Backup for Linux Server - User Guide. Acronis Backup for Linux Server - User Guide User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 210
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Version 11.5 Update 5

Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For Linux Server

Strany 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 1.7.1 Agent for Linux This agent enables disk-level and file-level data protection under Linux

Strany 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014  User name. When entering the name of an Active Directory user account, be sure to also spec

Strany 4

101 Copyright © Acronis International GmbH, 2002-2014 Select the destination disk for each of the source disks. NT signature (p. 101) Select the way

Strany 5

102 Copyright © Acronis International GmbH, 2002-2014 How the automatic mapping works Acronis Backup automatically maps the disks or volumes to the

Strany 6

103 Copyright © Acronis International GmbH, 2002-2014 Choose the disk to recover the Master Boot Record to. NT signature: (p. 101) Select the way th

Strany 7

104 Copyright © Acronis International GmbH, 2002-2014 Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes an

Strany 8 - OS support

105 Copyright © Acronis International GmbH, 2002-2014 When recovering basic MBR and GPT volumes, you can select the alignment method manually if the

Strany 9

106 Copyright © Acronis International GmbH, 2002-2014 Note: Exclusions override selection of data items to recover. For example, if you select to re

Strany 10 - 1.7.2 Management Console

107 Copyright © Acronis International GmbH, 2002-2014  User name. When entering the name of an Active Directory user account, be sure to also spec

Strany 11 - 1.10 Technical Support

108 Copyright © Acronis International GmbH, 2002-2014 One part of the GRUB loader resides either in the first several sectors of the disk or in the

Strany 12 - 2 Getting started

109 Copyright © Acronis International GmbH, 2002-2014 5. Edit the /mnt/system/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Linux distribut

Strany 13 - Step 6. Management

11 Copyright © Acronis International GmbH, 2002-2014 Upgrading to the full mode After the trial period expires, the product GUI displays a notificat

Strany 14 - Navigation tree

110 Copyright © Acronis International GmbH, 2002-2014 creating a recovery task, you can either use a default option, or override the default option

Strany 15 - 2.1.2.1 Views

111 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery File recovery (also f

Strany 16 - 2.1.2.2 Action pages

112 Copyright © Acronis International GmbH, 2002-2014 The preset is Disabled. This option enables booting the machine into the recovered operating s

Strany 17 - Action page - Controls

113 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr

Strany 18 - 2.1.3 Console options

114 Copyright © Acronis International GmbH, 2002-2014 For detailed information about using SNMP with Acronis Backup, please see "Support for SN

Strany 19 - 2.1.3.4 Pop-up messages

115 Copyright © Acronis International GmbH, 2002-2014 2. Do any of the following:  Click Edit to specify a new command or a batch file  Select

Strany 20

116 Copyright © Acronis International GmbH, 2002-2014 A post-recovery command will not be executed if the recovery proceeds with reboot. 5.3.7 Rec

Strany 21 - 3.1 Owners

117 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk

Strany 22 - Task credentials

118 Copyright © Acronis International GmbH, 2002-2014  During conversion which is part of a backup plan (p. 119), the software creates the virtual

Strany 23 - Incremental backup

119 Copyright © Acronis International GmbH, 2002-2014  Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo

Strany 24

12 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to

Strany 25 - Recovery

120 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac

Strany 26 - 3.6.2 Backing up MD devices

121 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker

Strany 27

122 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr

Strany 28

123 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso

Strany 29

124 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak

Strany 30 - Mounting backup volumes

125 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A

Strany 31 - By disk specification

126 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio

Strany 32 - 3.9 Support for SNMP

127 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F

Strany 33 - About the test message

128 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte

Strany 34 - 4 Backup

129 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created

Strany 35 - Plan parameters

13 Copyright © Acronis International GmbH, 2002-2014 Tip. Using the bootable media, you can do off-line ("cold") backups in the same way a

Strany 36

130 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut

Strany 37

131 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup

Strany 38 - Wildcard characters

132 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S

Strany 39 - 1. Selecting the destination

133 Copyright © Acronis International GmbH, 2002-2014  Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin

Strany 40

134 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro

Strany 41

135 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i

Strany 42 - 4.2.6 Backup schemes

136 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Strany 43 - Parameters

137 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 138) [Optional] Provide credentials for accessing the source if the task accou

Strany 44 - Examples

138 Copyright © Acronis International GmbH, 2002-2014  To select a network share, expand the Network folders group, select the required networked

Strany 45

139 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows:  Date and time - the date and time when to st

Strany 46

14 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name

Strany 47

140 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ

Strany 48

141 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select

Strany 49

142 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of

Strany 50 - Roll-back period

143 Copyright © Acronis International GmbH, 2002-2014  To export data to a network share, expand the Network folders group, select the required ne

Strany 51 - 4.2.7 Archive validation

144 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if

Strany 52

145 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or

Strany 53 - Parameters specification

146 Copyright © Acronis International GmbH, 2002-2014  User name. When entering the name of an Active Directory user account, be sure to also spec

Strany 54

147 Copyright © Acronis International GmbH, 2002-2014 8.4 Operations available in vaults By using vaults, you can easily access archives and backup

Strany 55 - 4.3.1 The [DATE] variable

148 Copyright © Acronis International GmbH, 2002-2014 8.4.2 Operations with backups To perform any operation with a backup 1. In the Navigation pa

Strany 56 - 4.3.3 Usage examples

149 Copyright © Acronis International GmbH, 2002-2014 During the conversion, the selected incremental or differential backup is replaced with a full

Strany 57

15 Copyright © Acronis International GmbH, 2002-2014  Alerts. Use this view to examine warning messages for the managed machine. The Full list a

Strany 58

150 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or

Strany 59 - 4.4 Scheduling

151 Copyright © Acronis International GmbH, 2002-2014 To use the media on different types of hardware, select both types of components. When booting

Strany 60 - 4.4.1 Daily schedule

152 Copyright © Acronis International GmbH, 2002-2014 Disables Advanced Configuration and Power Interface (ACPI). You may want to use this parameter

Strany 61 -  fifth at 7 PM

153 Copyright © Acronis International GmbH, 2002-2014 Forces the use of PCI BIOS instead of accessing the hardware device directly. You may want to

Strany 62 - 4.4.2 Weekly schedule

154 Copyright © Acronis International GmbH, 2002-2014 Example The bootable agent could use one of the network adapters for communication with the

Strany 63

155 Copyright © Acronis International GmbH, 2002-2014 9.3 Working under bootable media Operations on a machine booted with bootable media are very

Strany 64 - 4.4.3 Monthly schedule

156 Copyright © Acronis International GmbH, 2002-2014 These devices are connected to the machine through a network interface and appear as if they w

Strany 65

157 Copyright © Acronis International GmbH, 2002-2014 chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsc

Strany 66 - 4.4.4 Conditions

158 Copyright © Acronis International GmbH, 2002-2014 Activate Activation enables the boot time prompt "Press F11 for Acronis Startup Recovery

Strany 67 - Example:

159 Copyright © Acronis International GmbH, 2002-2014 10 Administering a managed machine This section describes the views that are available through

Strany 68 - What if

16 Copyright © Acronis International GmbH, 2002-2014 "Log" view Common way of working with views Generally, every view contains a table of

Strany 69 - Usage scenarios

160 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 168) or

Strany 70 - 4.5.1 Supported locations

161 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea

Strany 71 - Custom scheme

162 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At

Strany 72

163 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th

Strany 73 - 4.5.5 Usage examples

164 Copyright © Acronis International GmbH, 2002-2014  Deploying of a backup plan to multiple machines You want to use the same backup plan on mul

Strany 74

165 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr

Strany 75 - 4.7 Default backup options

166 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin

Strany 76

167 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi

Strany 77 - 4.7.1 Additional settings

168 Copyright © Acronis International GmbH, 2002-2014 10.1.5 Backup plan details The Backup plan details window (also duplicated on the Information

Strany 78 - 4.7.2 Archive protection

169 Copyright © Acronis International GmbH, 2002-2014  Name - name of the archive.  Location - name of the vault or path to the folder, where th

Strany 79 - 4.7.4 Backup performance

17 Copyright © Acronis International GmbH, 2002-2014 Action page - Create backup plan Using controls and specifying settings Use active controls to

Strany 80 - 4.7.5 Backup splitting

170 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries  non-contiguous: hold down CTRL and click the log entries one by

Strany 81 - 4.7.6 Compression level

171 Copyright © Acronis International GmbH, 2002-2014  Code - It can be blank or the program error code if the event type is error. Error code is

Strany 82

172 Copyright © Acronis International GmbH, 2002-2014 10.4 Changing a license By changing the license, you switch a product from trial mode to full

Strany 83 - 4.7.8 E-mail notifications

173 Copyright © Acronis International GmbH, 2002-2014 10.6 Adjusting machine options The machine options define the general behavior of all Acronis

Strany 84 - 4.7.9 Error handling

174 Copyright © Acronis International GmbH, 2002-2014 To configure e-mail notification 1. In the E-mail addresses field, type the destination e-mai

Strany 85 - 4.7.10 Event tracing

175 Copyright © Acronis International GmbH, 2002-2014 10.6.3 Event tracing It is possible to send log events generated by the agent(s), operating o

Strany 86 - 4.7.13 LVM snapshotting

176 Copyright © Acronis International GmbH, 2002-2014 10.6.3.2 Setting up SNMP services on the receiving machine Windows To install the SNMP servic

Strany 87 -  Logical volume manager

177 Copyright © Acronis International GmbH, 2002-2014 If you do not know the proxy server settings, contact your network administrator or Internet s

Strany 88 - 4.7.15 Pre/Post commands

178 Copyright © Acronis International GmbH, 2002-2014 11 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th

Strany 89 - 4.7.15.1 Pre-backup command

179 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c

Strany 90

18 Copyright © Acronis International GmbH, 2002-2014 Navigation buttons 2.1.3 Console options The console options define the way information is r

Strany 91

180 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win

Strany 92

181 Copyright © Acronis International GmbH, 2002-2014 11.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w

Strany 93

182 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t

Strany 94 - Skip the task execution

183 Copyright © Acronis International GmbH, 2002-2014 11.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac

Strany 95 - 5 Recovery

184 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Strany 96 - 5.1.1 What to recover

185 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa

Strany 97

186 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo

Strany 98 - 5.1.1.2 Data catalog

187 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis

Strany 99

188 Copyright © Acronis International GmbH, 2002-2014 11.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens

Strany 100 - 5.1.4 Where to recover

189 Copyright © Acronis International GmbH, 2002-2014 11.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud

Strany 101 - NT signature

19 Copyright © Acronis International GmbH, 2002-2014 2.1.3.4 Pop-up messages The “Activities Need Interaction” dialog This option defines whether t

Strany 102 - Disks/volumes

190 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli

Strany 103 - Size and location

191 Copyright © Acronis International GmbH, 2002-2014 11.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are

Strany 104 - Volume (partition) alignment

192 Copyright © Acronis International GmbH, 2002-2014  Install Acronis Backup on the machine you want to back up, start the product, click Back up

Strany 105 - Recovery exclusions

193 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac

Strany 106 - 5.1.6 Task credentials

194 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr

Strany 107

195 Copyright © Acronis International GmbH, 2002-2014 11.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back

Strany 108

196 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to

Strany 109

197 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor

Strany 110

198 Copyright © Acronis International GmbH, 2002-2014 12 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o

Strany 111 - 5.3.1 Additional settings

199 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b

Strany 112 - 5.3.2 E-mail notifications

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Strany 113 - 5.3.4 Event tracing

20 Copyright © Acronis International GmbH, 2002-2014 About the task execution results The option defines whether to display the pop-up messages abou

Strany 114 - 5.3.6 Pre/Post commands

200 Copyright © Acronis International GmbH, 2002-2014  the backup archive (p. 199) name and location  the backup scheme (p. 200). This includes

Strany 115

201 Copyright © Acronis International GmbH, 2002-2014  access and back up the data that has survived in a corrupted system  deploy an operating

Strany 116 - 5.3.7 Recovery priority

202 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 207) administrato

Strany 117 - 6.1 Conversion methods

203 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 207) contains all data stored o

Strany 118 - Custom loader reactivation

204 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 199) that contains a sector-based copy of a disk or a volume

Strany 119 - 6.2.2.1 Conversion settings

205 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di

Strany 120

206 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil

Strany 121 - Storage space

207 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli

Strany 122

208 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect

Strany 123 - 6.2.3.1 Steps to perform

209 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req

Strany 124

21 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding

Strany 125 - Choosing the disk interface

210 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 200) aimed to maintain the optimal balance between

Strany 126 - 6.3.2 Steps to perform

22 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I

Strany 127 - 7.1 Vaults

23 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Linux, the user has o

Strany 128 - 7.1.2 Personal vaults

24 Copyright © Acronis International GmbH, 2002-2014  you need the possibility to roll back to any one of multiple saved states  the data change

Strany 129 - Metadata

25 Copyright © Acronis International GmbH, 2002-2014  The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes i

Strany 130 - Creating a personal vault

26 Copyright © Acronis International GmbH, 2002-2014 This option is useful in the following cases:  When some data on the volume was lost, but no

Strany 131 - 7.2 Acronis Secure Zone

27 Copyright © Acronis International GmbH, 2002-2014 3.6.4 Assembling MD devices for recovery (Linux) In Linux, when performing recovery from a dis

Strany 132 - 7.2.1.4 Result confirmation

28 Copyright © Acronis International GmbH, 2002-2014 3.6.5.1 Creating the volume structure automatically Use the following procedure to automatical

Strany 133

29 Copyright © Acronis International GmbH, 2002-2014 Note: This procedure will not work if you connect to Acronis Backup Bootable Agent remotely, be

Strany 134 - 7.3 Removable devices

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...

Strany 135

30 Copyright © Acronis International GmbH, 2002-2014 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable .

Strany 136 - What to validate

31 Copyright © Acronis International GmbH, 2002-2014 type: disk Num Partition Flags Size Type GUID ------

Strany 137 - 8.1.3 Vault selection

32 Copyright © Acronis International GmbH, 2002-2014  4K native (4Kn) disks have 4-KB logical sector size. Modern operating systems can store data

Strany 138 - 8.1.5 When to validate

33 Copyright © Acronis International GmbH, 2002-2014 Supported operations Acronis Backup supports only TRAP operations. It is not possible to manage

Strany 139 - 8.1.6 Task credentials

34 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i

Strany 140

35 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 134) If the specified location is an R

Strany 141 - 8.2.1 Archive selection

36 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan

Strany 142 - 8.2.4 Destination selection

37 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup

Strany 143 - 3. Naming the new archive

38 Copyright © Acronis International GmbH, 2002-2014 The option defines which files and folders to skip during the backup process and thus exclude f

Strany 144 - 8.3 Mounting an image

39 Copyright © Acronis International GmbH, 2002-2014 Exclusion examples Criterion Example Description Windows and Linux By name F.log F Excludes all

Strany 145 - 8.3.3 Access credentials

4 Copyright © Acronis International GmbH, 2002-2014 4.2.5 Access credentials for archive location ...

Strany 146 - 8.3.4 Volume selection

40 Copyright © Acronis International GmbH, 2002-2014 Backing up to an existing archive You can configure the backup plan to back up to an existing a

Strany 147

41 Copyright © Acronis International GmbH, 2002-2014 Destination Details Network folders To back up data to a network folder, expand the Network f

Strany 148

42 Copyright © Acronis International GmbH, 2002-2014 Warning: According to the original FTP specification, credentials required for access to FTP se

Strany 149 - Limitations

43 Copyright © Acronis International GmbH, 2002-2014 Note: When the Incremental backup type is selected along with retention rules, the archive will

Strany 150 - 9 Bootable media

44 Copyright © Acronis International GmbH, 2002-2014 Keep backups Specifies how long you want the backups to be stored in the archive. A term can be

Strany 151 - 9.1.1 Kernel parameters

45 Copyright © Acronis International GmbH, 2002-2014 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, y

Strany 152

46 Copyright © Acronis International GmbH, 2002-2014 Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and mont

Strany 153 - 9.1.2 Network settings

47 Copyright © Acronis International GmbH, 2002-2014 Clean up archive Specifies how to get rid of old backups: either to apply retention rules (p. 7

Strany 154 - 9.1.3 Network port

48 Copyright © Acronis International GmbH, 2002-2014 Here, all parameters except Schedule in Full backup are left empty. All backups in the archive

Strany 155

49 Copyright © Acronis International GmbH, 2002-2014 By default, a backup is not deleted as long as it has dependent backups that must be kept. For

Strany 156 - Linux-based bootable media

5 Copyright © Acronis International GmbH, 2002-2014 5.2.1 How to reactivate GRUB and change its configuration ...

Strany 157

50 Copyright © Acronis International GmbH, 2002-2014 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have different types:  Last-level (in

Strany 158 - Do not activate

51 Copyright © Acronis International GmbH, 2002-2014 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back period shows how man

Strany 159 - 10.1 Backup plans and tasks

52 Copyright © Acronis International GmbH, 2002-2014 not corrupted and can be successfully recovered, think of starting the validation right after b

Strany 160

53 Copyright © Acronis International GmbH, 2002-2014 To add a text label to a backup: 1. On the Create backup plan (p. 34) page, click Show plan&ap

Strany 161

54 Copyright © Acronis International GmbH, 2002-2014 acronisTag.hostname = “superserver.corp.local” acronisTag.os.type = “windows7Server64Guest” acr

Strany 162 - 10.1.2.3 Task states

55 Copyright © Acronis International GmbH, 2002-2014 134) determines whether the standard or simplified naming scheme will be used. In Linux, the ch

Strany 163 - 10.1.2.4 Task statuses

56 Copyright © Acronis International GmbH, 2002-2014 The value of this variable is the current date surrounded by brackets ([]). The date format dep

Strany 164 - How to modify credentials

57 Copyright © Acronis International GmbH, 2002-2014 If you choose to back up to a locally attached RDX drive or USB flash drive, you will not see t

Strany 165

58 Copyright © Acronis International GmbH, 2002-2014  Specify MyMachine as the archive name.  Create a directory such as /mnt/backup and speci

Strany 166 - How it works

59 Copyright © Acronis International GmbH, 2002-2014 a) When creating the first backup plan, specify ServerFiles[DATE] as the archive name, select

Strany 167 - Editing the export file

6 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full ...

Strany 168 - 10.1.5 Backup plan details

60 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if Location's host is available The task run time is within t

Strany 169 - 10.2 Log

61 Copyright © Acronis International GmbH, 2002-2014 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. E

Strany 170 - 10.2.2 Log entry details

62 Copyright © Acronis International GmbH, 2002-2014 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2009. To:

Strany 171 - 10.3 Alerts

63 Copyright © Acronis International GmbH, 2002-2014 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 1

Strany 172 - 10.4 Changing a license

64 Copyright © Acronis International GmbH, 2002-2014 From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedul

Strany 173 - 10.6.2 E-mail settings

65 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da

Strany 174

66 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2

Strany 175 - 10.6.3 Event tracing

67 Copyright © Acronis International GmbH, 2002-2014 4.4.4.1 Location's host is available Applies to: Windows, Linux "Location's h

Strany 176 - 10.6.5 Cloud backup proxy

68 Copyright © Acronis International GmbH, 2002-2014 What if... What if a task is scheduled to be executed at a certain time and this time is outsid

Strany 177

69 Copyright © Acronis International GmbH, 2002-2014 Similarly, you can copy or move backups from a second location to a third location and so on. U

Strany 178 - 11 Cloud backup

7 Copyright © Acronis International GmbH, 2002-2014 11.4.2 Reassigning an activated subscription ...

Strany 179 - Server operating systems

70 Copyright © Acronis International GmbH, 2002-2014  With simplified naming of backup files (p. 54), neither replication nor use of retention rul

Strany 180

71 Copyright © Acronis International GmbH, 2002-2014 4.5.3 Setting up retention of backups You can set retention rules for backups when creating a

Strany 181 - 11.1.7 Initial Seeding FAQ

72 Copyright © Acronis International GmbH, 2002-2014 4.5.4 Retention rules for the Custom scheme In the Retention Rules window, you can select how

Strany 182

73 Copyright © Acronis International GmbH, 2002-2014 This mode is not available for Acronis Cloud Storage when you copy or move backups there. In th

Strany 183 - Creating subsequent backups

74 Copyright © Acronis International GmbH, 2002-2014 In this scenario, create a backup plan with the Custom scheme. When creating the backup plan, s

Strany 184 - Packaging

75 Copyright © Acronis International GmbH, 2002-2014 During the subsequent backups, only changes to the original data will be sent to the cloud stor

Strany 185

76 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk backup

Strany 186

77 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk backup

Strany 187

78 Copyright © Acronis International GmbH, 2002-2014 Restart the machine automatically after backup is finished This option is available only when o

Strany 188

79 Copyright © Acronis International GmbH, 2002-2014 4.7.3 Backup cataloging Cataloging a backup adds the contents of the backup to the data catalo

Strany 189

8 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5  The most recent operating syst

Strany 190 - Machine subscriptions

80 Copyright © Acronis International GmbH, 2002-2014  Low – to minimize resources taken by the backup process, leaving more resources to other pro

Strany 191 - 11.2 Where do I start?

81 Copyright © Acronis International GmbH, 2002-2014 This option is not effective when the backup destination is a managed vault or Acronis Cloud St

Strany 192

82 Copyright © Acronis International GmbH, 2002-2014 The preset is: Normal. The optimal data compression level depends on the type of data being bac

Strany 193 - Example

83 Copyright © Acronis International GmbH, 2002-2014 2. Enter the e-mail address in the E-mail Address field. You can enter several e-mail addresse

Strany 194

84 Copyright © Acronis International GmbH, 2002-2014 8. If the outgoing mail server requires authentication, enter User name and Password of the se

Strany 195 - 11.8 Terminology reference

85 Copyright © Acronis International GmbH, 2002-2014 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will displ

Strany 196

86 Copyright © Acronis International GmbH, 2002-2014 This option defines whether a file change is detected using the file size and time stamp or by

Strany 197 - Unassign a subscription

87 Copyright © Acronis International GmbH, 2002-2014  Logical volume manager Acronis Backup will use the snapshot taken by LVM. This snapshot is s

Strany 198 - 12 Glossary

88 Copyright © Acronis International GmbH, 2002-2014 4.7.14 Media components This option is effective for both Windows and Linux operating systems,

Strany 199 -  what data to back up

89 Copyright © Acronis International GmbH, 2002-2014  Execute after the backup 2. Do any of the following:  Click Edit to specify a new command

Strany 200 - Bootable media

9 Copyright © Acronis International GmbH, 2002-2014 Other  Support for Oracle Linux 5.x, 6.x – both Unbreakable Enterprise Kernel and Red Hat Comp

Strany 201 - Centralized task

90 Copyright © Acronis International GmbH, 2002-2014 When the check box is not selected, the command execution result does not affect the task execu

Strany 202 - Data catalog

91 Copyright © Acronis International GmbH, 2002-2014 Check box Selection Fail the backup task if the command execution fails* Selected Cleared Selec

Strany 203 - Disaster recovery plan (DRP)

92 Copyright © Acronis International GmbH, 2002-2014 4.7.17 Replication/cleanup inactivity time This option is effective only if you set up replic

Strany 204 - Dynamic disk

93 Copyright © Acronis International GmbH, 2002-2014 The program will try to execute the failed task again if you select the Restart a failed task c

Strany 205 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2014 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be

Strany 206

95 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect

Strany 207

96 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the recovery task. A conscious name lets you quickly identif

Strany 208

97 Copyright © Acronis International GmbH, 2002-2014 Selecting MBR When recovering a system volume, you will usually select the disk's MBR if:

Strany 209

98 Copyright © Acronis International GmbH, 2002-2014 Location Details FTP, SFTP If the archive is stored on an FTP or SFTP server, type the server

Strany 210

99 Copyright © Acronis International GmbH, 2002-2014 6. Having selected the required data, click Recover and configure the parameters of the recove

Komentáře k této Příručce

Žádné komentáře