Acronis Backup & Recovery 11

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Server for Linux Update 0 User Guide Copyright © Acronis, Inc., 2000-2011. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Third party code may be provided with the Software and/or Service. The license terms for such third-parties are detailed in the license.txt file located in the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the Software and/or Service at http://kb.acronis.com/content/7696 2 Copyright © Acronis, Inc., 2000-2011 Table of contents 1 Introducing Acronis Backup & Recovery 11 ................................................................................ 7 1.1 What's new in Acronis Backup & Recovery 11 ....................................................................... 7 1.2 Acronis Backup & Recovery 11 components .......................................................................... 8 1.2.1 Agent for Linux.......................................................................................................................................... 8 1.2.2 Management Console .............................................................................................................................. 9 1.2.3 Bootable Media Builder ............................................................................................................................ 9 1.3 Supported file systems .......................................................................................................... 9 1.4 Technical Support ............................................................................................................... 10 2 Getting started ......................................................................................................................... 11 2.1 Using the management console .......................................................................................... 12 2.1.1 "Navigation" pane................................................................................................................................... 13 2.1.2 Main area, views and action pages......................................................................................................... 14 2.1.3 Console options ...................................................................................................................................... 17 3 Understanding Acronis Backup & Recovery 11 ......................................................................... 20 3.1 Owners and credentials ...................................................................................................... 20 3.2 User privileges on a managed machine ............................................................................... 21 3.3 Full, incremental and differential backups ........................................................................... 21 3.4 What does a disk or volume backup store? ......................................................................... 23 3.5 Backup and recovery of logical volumes and MD devices (Linux) ......................................... 23 3.5.1 Backing up logical volumes ..................................................................................................................... 23 3.5.2 Backing up MD devices ........................................................................................................................... 24 3.5.3 Backing up hardware RAID arrays (Linux) ............................................................................................... 25 3.5.4 Assembling MD devices for recovery (Linux) .......................................................................................... 25 3.5.5 Recovering MD devices and logical volumes .......................................................................................... 25 3.6 Support for SNMP ............................................................................................................... 29 4 Backup ...................................................................................................................................... 31 4.1 Back up now ....................................................................................................................... 31 4.2 Creating a backup plan........................................................................................................ 31 4.2.1 Selecting data to back up ........................................................................................................................ 33 4.2.2 Access credentials for source ................................................................................................................. 34 4.2.3 Source files exclusion .............................................................................................................................. 34 4.2.4 Access credentials for archive location ................................................................................................... 36 4.2.5 Backup schemes ..................................................................................................................................... 36 4.2.6 Backup location selection ....................................................................................................................... 46 4.2.7 Archive validation ................................................................................................................................... 48 4.2.8 Backup plan's credentials ....................................................................................................................... 48 4.2.9 Label (Preserving machine properties in a backup) ................................................................................ 49 4.2.10 Why is the program asking for the password? ....................................................................................... 50 4.3 Simplified naming of backup files ........................................................................................ 50 4.3.1 Usage examples ...................................................................................................................................... 51 4.3.2 The [DATE] variable ................................................................................................................................ 54 4.3.3 Backup splitting and simplified file naming ............................................................................................ 54 4.4 Scheduling .......................................................................................................................... 55 3 Copyright © Acronis, Inc., 2000-2011 4.4.1 Daily schedule ......................................................................................................................................... 56 4.4.2 Weekly schedule ..................................................................................................................................... 58 4.4.3 Monthly schedule ................................................................................................................................... 60 4.4.4 Conditions ............................................................................................................................................... 62 4.5 Replication and retention of backups .................................................................................. 64 4.5.1 Supported locations ................................................................................................................................ 66 4.5.2 Setting up replication of backups ........................................................................................................... 66 4.5.3 Setting up retention of backups ............................................................................................................. 66 4.5.4 Retention rules for the Custom scheme ................................................................................................. 67 4.5.5 Replication/cleanup inactivity time ........................................................................................................ 69 4.5.6 Usage examples .....................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    179 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us