onis”, "Acronis Compute with Confidence" and the Acronis logo are trademarks of
Acronis, Inc.
Linux is a registered trademark of Linus Torvalds.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective
owners.
Distribution of substantively modified versions of this document is prohibited without t he
explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained fr om the copyright
holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE
LEGALLY INVALID.
BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE
DOWNLOADED OR IS CONTAINED ON THESE DISKS (“SOFTWARE”) YOU SHOULD CAREFULLY
READ THE FOLLOWING LICENSE AGREEMENT (“AGREEMENT”) THAT APPLIES TO THE
SOFTWARE. CLICK “ACCEPT” IF YOU FULLY ACCEPT AND AGREE TO ALL OF THE PROVISIONS OF
THIS AGREEMENT. OTHERWISE, CLICK “DO NOT ACCEPT.” CLICKING “ACCEPT” OR OTHERWISE
DOWNLOADING, INSTALLING AND OR USING THE SOFTWARE ESTABLISHES A BINDING
AGREEMENT BETWEEN YOU AS THE PERSON LICENSING THE SOFTWARE (THE "LICENSEE") AND
ACRONIS, INC. LOCATED AT: ACRONIS INTERNATIONAL GMBH VERWALTUNG EURO HAUS
RHEINWEG 5 SCHAFFHAUSEN, SWITZERLAND CH-8200, ("LICENSOR"). IF YOU DO NOT ACCEPT
ALL OF THE TERMS OF THIS AGREEMENT, YOU SHALL HAVE NOT RIGHT TO DOWNLOAD, INSTALL
AND/OR USE THE SOFTWARE AND MUST DELETE THE SOFTWARE AND ASSOCIATED FILES
IMMEDIATELY.
This Agreement applies to the Software, whether licensed under a Software License and/or an
Evaluation License, each as defined and described below:
purchase of a license to the Software, LICENSOR grants and LICENSEE accepts a nonexclusive, nontransferable,
Purchased License of Software
nonassignable license to use Software only for LICENSEE’s own internal use solely on the specific number of
Hardware (as defined below) licensed owned, leased or otherwise controlled by LICENSEE. LICENSEE may make
one copy of Software only for archival purposes, only in machine readable form, provided that such archival copy is
only used for archival purposes and never in a production environment and is marked with every notice on the
original Installation of Software is LICENSEE’s responsibility. The license described in this section shall be referred
to as a “Software License”).
. Subject to the terms and conditions of this Agreement, upon
Evaluation License of Software: The LICENSEE has the right to evaluate the Software for a period of
time not to exceed fifteen (15) days (the “Evaluation Period’) unless extended by LICENSOR. Software licensed
under this Evaluation License may not be used in a production environment. There will be no charge to the
LICENSEE for said evaluation of the Software under this Evaluation License. At the conclusion of the Evaluation
Period, unless a Software License to the Software is purchased, the LICENSEE will delete the Software from its
systems and have no further license or other rights with respect to the Software except as to the rights and
responsibilities in this Agreement. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT,
PUNITIVE, OR CONSEQUENTIAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER THE
EVALUATION LICENSE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY.
THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY
LIMITED REMEDY. The following sections of this Agreement also apply to Evaluation License(s) of the Software:
Limitations, Confidentiality
Miscellaneous. The license described in this section shall be referred to as an “Evaluation License”).
, Disclaimer of Warranties, LICENSEE Indemnity, Law, Export Restrictions, and
Use Rights:
Assigning the License
that license to one of your PCs or Servers (depending upon the license you have purchased or are evaluating and
such purchase or evaluation is based upon the operating system on which that hardware operates, such PCs or
Servers shall be referred to as the “Hardware”). That Hardware is the licensed Hardware for that particular
Software license. You may assign other Software Licenses to the same Hardware, but you may not assign the same
Software License to more than one Hardware except as identified herein.
You may reassign a Software License if you retire the licensed Hardware due to permanent Hardware failure. If you
reassign a Software License, the Hardware to which you reassign the license becomes the new licensed Hardware
for that particular Software License.
. Before you run any instance of the Software under a Software License, you must assign
Running Instances of the Hardware Software. You have the rights to run the Software on one piece of
Hardware as defined above. Every Hardware creating an image and every Hardware to which an image is either
deployed to or restored from must have a valid license. In the case of Universal Deploy or Universal Restore, every
time an image is deployed or restored (as appropriate to either Universal Restore or Universal Deploy), to Hardware
that is dissimilar to the Hardware from which the image was originally created, a valid license of the Universal
Deploy or Universal Restore is required.
You have the rights below for each Software License you assign:
Standard Software license. A standard Software License is the general license that is available to LICENSEE.
Unless the Virtual Edition Software is purchased, you have purchased the standard Software License and may run
on the licensed Hardware, at any one time as follows:
• One (1) instance of the Hardware installed Software in one physical operating system environment; and
• Up to four (4) instances of the Hardware installed Software in virtual operating system environments (only
one (1) instance per virtual operating system environment).
If you run all five (5) permitted instances at the same time, the instance of the Hardware installed Software
running in the physical operating system environment may be used only to run hardware virtualization software
and to manage and service operating system environments on the licensed Hardware.
Virtual Edition. Virtual Edition (as identified by the product name (for example, True Image Virtual Edition)) is
licensed by physical Hardware. You may run on the licensed Hardware, at any one time as follows:
• One instance of the Hardware software in one physical operating system environment; and
• As many instances of the Hardware software in virtual operating system environments.
Support. If LICENSEE is under a current support contract with LICENSOR with respect to the Software and is
current in paying all amounts due thereunder, LICENSOR shall make available to LICENSEE the support described
in this paragraph (the “Support”) on a twenty four (24) hours a day, seven (7) days per week basis. Support shall
consist of: (i) supplying telephone or other electronic support, as determined by LICENSOR in its sole discretion, to
LICENSEE in order to help LICENSEE locate and, on its own, correct problems with the Software and (ii) supplying
all extensions, enhancements and other changes that LICENSOR, at its sole discretion, makes or adds to the
Software and which LICENSOR makes generally available, without additional charge, to other licensees of the
Software that are enrolled in Support. Upon mutual written agreement by both parties, LICENSOR may, but shall not
be required to: (i) supply code corrections to LICENSEE to correct Software malfunctions in order to bring such
Software into substantial conformity with the published operating specifications for the most current version of the
Software unless LICENSEE’s unauthorized modifications prohibit or hamper such corrections or cause the
malfunction; or (ii) supply code corrections to correct insubstantial problems at the next general release of the
Software.
Limitations. Notwithstanding any references to “purchase” , the Software is licensed and not sold pursuant to this
Agreement. This Agreement confers a limited license to the Software and does not constitute a transfer of title to or
sale of all or a portion of the Software, and LICENSOR retains ownership of all copies of the Software. LICENSEE
acknowledges that the Software contain trade secrets of LICENSOR, its suppliers or licensors, including but not
limited to the specific internal design and structure of individual programs and associated interface information.
Accordingly, except as otherwise expressly provided under this Agreement, LICENSEE shall have no right, and
LICENSEE specifically agrees not to: (i) transfer, assign or sublicense its license rights to any other person or entity,
or use the Software on ay equipment other than the Hardware, and LICENSEE acknowledges that any attempted
transfer, assignment, sublicense or use shall be void; (ii) make error corrections to or otherwise modify or adapt the
Software or create derivative works based upon the Software, or permit third parties to do the same; (iii) reverse
engineer or decompile, decrypt, disassemble or otherwise reduce the Software to human-readable form, except to
the extent otherwise expressly permitted under applicable law notwithstanding this restriction; (iv) use or permit the
Software to be used to perform services for third parties, whether on a service bureau or time sharing basis or
otherwise, without the express written authorization of LICENSEE; or (v) disclose, provide, or otherwise make
available trade secrets contained within the Software in any form to any third party without the prior written consent
of LICENSOR.
Confidentiality. The Software is a trade secret of LICENSOR and is proprietary to LICENSOR. LICENSEE shall
maintain Software in confidence and prevent disclosure of Software using at least the same degree of care it uses
for its own similar proprietary information, but in no event less than a reasonable degree of care. LICENSEE shall
not disclose Software or any part thereof to anyone for any purpose, other than to employees for the purpose of
exercising the rights expressly granted under this Agreement. License shall not, and shall not allow any third party
to, decompile, disassemble or otherwise, reverse engineer or attempt to reconstruct or discover any source code or
underlying ideas, algorithms, file formats or programming or interoperability interfaces of Software or of any files
contained or generated using Software by any means whatsoever. The obligations under this paragraph shall
survive any termination of the Agreement.
Disclaimer of Warranties. THE SOFTWARE IS PROVIDED “AS IS” AND LICENSOR DISCLAIMS ALL
WARRANTIES, EXPRESSED OR IMPLIED WITH RESPECT TO SOFTWARE INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT OF THIRD PARTIES’ RIGHTS, AND
FITNESS FOR A PARTICULAR USE. WITHOUT LIMITING THE FOREGOING, LICENSOR DOES NOT
WARRANT THAT THE FUNCTIONS CONTAINED IN SOFTWARE WILL OPERATE IN THE COMBINATION
LICENSEE SELECTS, THAT OPERATION OF SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE
AND/OR THAT DEFECTS IN THE SOFTWARE WILL BE CORRECTED. THE ENTIRE RISK AS TO THE RESULTS
AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY LICENSEE. FURTHERMORE, LICENSOR DOES
NOT WARRANT OR MAKE ANY RE PRESENTATIONS REGARDING THE U SE OR THE RESULT S OF THE USE
OF THE SOFTWARE OR RELATED DOCUMENTATION IN TERMS OF THEIR CORRECTNESS, ACCURACY,
RELIABILITY, CURRENTNESS, OR OTHERWISE. NO ORAL OR WR ITTEN INFORMATION OR ADVICE GIVEN
BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY.
Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, INDIRECT, PUNITIVE, OR
CONSEQUENTIAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER ANY CONTRACT,
NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY. LICENSOR’S CUMULATIVE LIAB ILIT Y FOR DAMAGE S
HEREUNDER, WHETHER IN AN ACTION IN CONTRACT, WARRANTY, TORT, NEGLIGENCE, STRICT
LIABILITY, INDEMNITY, OR OTHERWISE, SHALL IN NO EVENT EXCEED THE AMOUNT OF LICENSE FEES
PAID BY THE LICENSEE FOR THE SOFTWARE LICENSED UNDER THIS AGREEMENT. THESE LIMITATIONS
SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
LICENSEE Indemnity. LICENSEE agrees to indemnify and defend LICENSOR, and hold it harmless from all
costs, including attorney’s fees, arising from any claim that may be made against LICENSOR by any third party as a
direct or indirect result of any use by LICENSEE of the Software,
Termination. This Agreement and the license may be terminated without fee reduction (i) by LICENSEE without
cause on thirty (30) days notice; (ii) by LICENSOR, in addition to other remedies, if LICENSEE is in default and fails
to cure within ten (10) days following notice; (iii) on notice by either party hereto if the other party ceases to do
business in the normal course, becomes insolvent, or becomes subject to any bankruptcy, insolvency, or equivalent
proceedings. Upon termination for any reason, LICENSEE shall immediately return Software and all copies to
LICENSOR and delete all Software and all copies from the Hardware.
Law. This Agreement shall be governed by the laws of the Commonwealth of Massachusetts, exclusive of its
conflicts of laws provisions and without regard to the United Nations Convention on Contracts for the International
Sale of Goods, and any suit under this Agreement shall exclusively be brought in a federal or state court in
Massachusetts. Any action against LICENSOR under this Agreement must be commenced within one year after
such cause of action accrues.
Government End Users. This provision applies to all Software acquired directly or indirectly by or on behalf of the
United States Government. The Software is a commercial product, licensed on the open market at market prices,
and was developed entirely at private expense and without the use of any U.S. Government funds. If the Software is
supplied to the Department of Defense, the U.S. Government acquires only the license rights customarily provided to
the public and specified in this Agreement. If the Software is supplied to any unit or agency of the U.S. Government
other than the Department of Defense, the license to the U.S. Government is granted only with restricted rights. Use,
duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c) of the
Commercial Computer Software Restricted Rights clause of FAR 52.227-19.
Export Restriction. LICENSEE will not remove or export from the United States or the country originally shipped
to by LICENSOR (or re-export from anywhere) any part of the Software or any direct product thereof except in
compliance with applicable export laws and regulations, including without limitation, those of the U.S. Department of
Commerce.
Miscellaneous. This Agreement contains the entire understanding of the parties and supersedes all other
agreements, oral or written, including purchase orders submitted by LICENSEE, with respect to the subject matter
covered in this Agreement The delay or failure of either party to exercise any right provided in the Agreement shall
not be deemed a waiver. All notices must be in writing and shall be delivered by hand (effective when received) or
mailed by registered or certified mail (effective on the third day following the date of mailing). The notices addressed
to LICENSOR shall be sent to its address set out above. If any provision is held invalid, all others shall remain in
force. LICENSEE may not assign, pledge, or otherwise transfer this agreement, nor any rights or obligations
hereunder in whole or in part to any entity. Paragraph headings are for convenience and shall have no effect on
interpretation. In the event that it is necessary to undertake legal action to collect any amounts payable or to protect
or to defend against the unauthorized use, disclosure, distribution, of the Software hereunder and/or other violation
of this Agreement, LICENSOR shall be entitled to recover its costs and expenses including, without limitation,
1.1 Acronis® True Image Echo Server – a complete solution for
corporate users
You have come to rely on your servers to run your business and retain key enterprise
data. Acronis True Image Echo Server provides comprehensive, reliable, and costeffective system protection and recovery for corporate servers, running Linux. With
Acronis True Image Echo Server you have peace of mind knowing you are protected and
can recover from any situation.
Minimizes downtime
Acronis True Image Echo Server for Linux enables you to restore systems in minutes, not
hours or days. An entire system can be restored from an image that includes eve rything
the system needs to run: the operating system, applications, databases, and
configurations. No reinstallation or reconfiguration is required. Moreover, complete system
restoration can be performed to an existing system or to a new system with different
hardware or to virtual machines. File-based backups provide you with the flexibility to
only backup selected critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be
implemented with minimal user training.
Automates Backup
With the scheduling capability in Acronis True Image Echo Server, you simply create
backup tasks, tailored by group, at certain times or at certain events, automating
backups.
To ensure that backups have occurred, or user intervention is required, you can request
notifications via email or pop-up. You can view events in Acronis own log.
The product also supports the creation of custom comman ds before and after backups.
For example, users can automatically run anti-virus products before an image is created
and verify the validity of backups after they have been created.
Ensures 24 X 7 Uptime
With the Acronis Drive Snapshot systems can be imaged while they are in use, supporting
24 by 7 availability. This technology enables the product to backup and image critical
operating system files, the master boot record and any partition-based boot records
without requiring a reboot. A CPU allocation feature allows you to limit the amount of CPU
usage for the application to maximize the CPUs available for mission critical applications.
Moreover, users can control hard disk drive writing speeds and control network bandwidth
used during backups, allowing you minimally disrupt business operations.
For correct backup of mission critical databases, Acronis True Image Echo Server will
execute your custom commands, that suspend and resume database processing, before
and after data capture.
Supports Cutting Edge Technology
Businesses today are moving to leverage the latest technologies, dual-core 64 bit
processors and 64 bit operating systems. With Acronis True Im age Echo Server, you can
protect these new machines, as well as legacy ones, running one solution.
Leverages Existing Technology Investments
The product can leverage your current storage infrastructure by suppor ting a wide variet y
of storage media, so you can avoid costly hardware pur chases to implement the solution .
The product supports key storage technologies such as: Direct Attached Storage ( DAS),
Network Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of
Independent Disks (RAID) devices, tapes, USB and IEEE-1394 (FireWire) compliant
storage devices, CDs, removable drives (Floppy, Zip, etc.) and shared storage. Mor eover,
the product ensures that you maximize the space on these reso urces with four levels of
compression.
Disk cloning and new disk deployment
Acronis True Image Echo Server can be used to clone an im age onto m ultiple serve rs. Fo r
example, a company purchased several servers and needs similar environments on each
of them. Traditionally, an IT manager should install the operating system and programs
on every server. With Acronis True Image Echo Server, the IT manager can creat e a disk
image of the first system deployed. That image can then be duplicated onto multiple
servers.
If you need to upgrade the server hard disk drive, Acronis True Image Echo Server
simplifies the task to few mouse clicks creating the exact copy of your old disk to a new
one and adjusting partitions size to fit a new hard disk.
1.2 Acronis True Image Echo Server key features
Backup
Creating a system image without system shutdown
Imaging only the sectors that contain data (for supported file systems)
File-level backup with exclude files feature
Full, incremental and differential backups
Restore
OS-independent operation of Acronis True Image Echo Server fr om bootable CD including
restore over NFS or Samba Network
Restore of individual files and directories from disk images
Backup and restore options
Data compression level
CPU/Network bandwidth/Disk write speed throttling
Splitting image
Password protection for backup archives
Hardware compatibility
x86_64-bit processors support
Backup and restore all hard disks, regardless of capacity
Backup and restore software RAIDs (md devices) both on running system and with
A wide variety of IDE, SCSI, USB, FireWire, and PC Card (formerly PCMCIA) storage
media. CD-R/RW and tape drives are supported as well (except for console mode)
Acronis Secure Zone
FTP servers
Placing backup archives on Bootable Acronis CD
Hard disk management
The ability to migrate data from one drive to another (disk cloning)
The ability to change a partition type, file system, size and location during recovery or
disk cloning
Ease of use
Transparent NFS and Samba network drives access (in X Window mode NFS and Samba
appear among available devices, in console mode a path to the network drive may be
specified)
Mounting images in X Window environment in Read-Only or R/W mode
Scheduling backups in X Window environment
Scheduled and periodical image creation using cron jobs utility
Notifications (e-mail, Winpopup)
Viewing logs
Comprehensive wizards in X Window environment simplify complex operations
Context Help
Control network bandwidth usage when backing up to FTP
Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all errors)
Generating time-based names for bac kup files
Scheduling
Schedule archive validation
Cloning a task
Notification via e-mail
Multiple e-mail addresses
From and Subject fields
Logon to incoming mail server
Operations with archives
Consolidate backup files (create a consistent copy of archive while deleting selected
backups)
CLI features
MBR restore
Backup to FTP server
Allow logs on net share
1.4 Supported file systems and storage media
1.4.1 Supported file systems
• Ext2/Ext3
• ReiserFS
• Reiser4
• Linux SWAP
• XFS
• JFS
If a file system is not supported or is corrupted, Acronis Tr ue Image Echo Server can copy
data using a sector-by-sector approach.
For XFS and Reiser4 file systems the partition resizing feature is not supported.
• USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices
• ZIP®, Jaz® and other removable media
* - an FTP-server must allow passive mode for file transfers. Data recovery directly from
FTP-server requires the archive to consist of files no more than 2GB in size. It is
recommended that you change the source computer firewall settings to open ports 20
and 21 for both TCP and UDP protocols.
** - Burned rewritable discs cannot be read in Linux without kernel patch.
1.5 Technical support
As part of a purchased annual Support charge you are entitled to Technical Support as
follows: to the extent that electronic services are available , you may electronically access
at no additional charge, Support services for the Software, which Acronis shall endeavor
to make available twenty four (24) hours a day, seven (7) days per week. Such electronic
services may include, but are not limited to: user forums; software-specifi c information;
hints and tips; bug fix retrieval via the internet; software maintenance and demonstration
code retrieval via a WAN-accessible FTP server; and access to a problem resolution
database via Acronis customer support system.
Support shall consist of supplying telephone or other electronic support to you in or der to
help you locate and, on its own, correct problems with the Software and supplying
patches, updates and other changes that Acronis, at its sole discretion, makes or adds to
the Software and which Acronis makes generally available, without additional charge, to
other licensees of the Software that are enrolled in Support.
Upon mutual agreement by both parties, Acronis shall:
(i) supply code corrections to you to correct Software malfunctions in order to bring such
Software into substantial conformity with the published operating specifications for the
most current version of the Software unless your unauthorized modifications prohibit or
hamper such corrections or cause the malfunction;
or (ii) supply code corrections to correct insubstantial problems at the next general
release of the Software.
More information about contacting Acronis Technical Support is available at the following
link: http://www.acronis.com/enterprise/support/
Chapter 2. Acronis True Image Echo Server
installation and startup
2.1 System requirements
2.1.1 Minimum hardware requirements
Acronis True Image Echo Server requires the following hardware:
• Pentium processor or higher
• 256MB RAM
• CD-RW drive for bootable media creation
• Mouse (recommended).
2.1.2 Supported operating systems
• Linux 2.4.18 or later kernel (including 2.6.x kernels).
Server 3.0, Advanced Server 4.0, Fedora Core 1, Fedora Core 2, Fedora Core 3,
Fedora Core 4, Enterprise Server 3.0, Mandrake 8.0, 9.2, 10.0, 10.1, Slackware 10,
Debian stable and unstable (sarge), ASPLinux 9.2, ASPLinux 10, ASPLinux 11,
ASPLinux Server II, ASPLinux Server IV, Virtuozzo 2.6.x, Gentoo, UnitedLinux 1.0,
Ubuntu 4.10, TurboLinux 8.0, TurboLinux 10.0
• x64 versions of the above Linux distributions and some others Linux distr ibutions are
also supported
To obtain the up-to-date information about distributions, supported by your copy of
Acronis True Image Echo Server, see the readme.txt file supplied with the program.
Acronis True Image Echo Server bootable version enables disk-level backup and recovery
on a computer running any PC-ba sed operating system.
2.2 Installing Acronis True Image Echo Server
To install Acronis True Image Echo Server for Linux:
• Assign to the setup file the attribute Executable
• Run the setup process
• Follow setup program instructions.
If the setup could not compile the necessary module for your Linux distribution, please
refer to the file HOWTO.INSTALL:
/usr/lib/Acronis/TrueImageServer/HOWTO.INSTALL
You can choose to install, besides Acronis True Image Echo Server, the Rescue Media
Builder tool. With Rescue Media Builder you can create bootable rescue disks or their ISO
images.
To run the program under the X Window System interf ace, use the trueimage com mand
or select Acronis True Image Echo Server from the system tools menu.
To work in the console mode, use trueimagecmd and trueimagemnt tools, described
Chapter 12. Conso le mode
in
If your disk data is totally corrupted, load the bootable Acronis True Image Echo Server
version from removable media (created by you using Rescue Media Builder). Then you
will be able to restore the disk from its previously created image.
. See also man trueimagecmd or man trueimagemnt.
2.4 Removing Acronis True Image Echo Server
To remove Acronis True Image Echo Server, do the following:
1. Execute the following commands:
# cd /usr/lib/Acronis/TrueImageServer/uninstall/
# ./uninstall
2. Remove the sources of the SnapAPI module:
# rm -rf /usr/src/snapapi*
Chapter 3. General information and
proprietary Acronis technologies
3.1 The difference between file archives and disk/partition images
A backup archive is a file or a group of files (also called in this guide “backups”), that
contains a copy of selected files/folders data or a copy of all information stored on
selected disks/partitions.
When you back up files and folders, only the data, along with the folder tree, is
compressed and stored.
Backing up disks and partitions is performed in a different way: Acronis True Image Echo
Server saves a sector-based snapshot of the disk, which includes th e operating system,
registry, drivers, software applications and data files, as well as system areas hidden from
the user. This procedure is called “creating a disk image,” and the resulting backup
archive is often called a disk/partition image.
Acronis True Image Echo Server stores only those hard disk parts that contain data (for
supported file systems). This reduces image size and speeds up image creation and
restoration.
A partition image includes all files and folders independent of their attributes (including
hidden and system files), a boot record and file system super block.
A disk image includes images of all disk partitions as well as the zero track with master
boot record (MBR).
By default, files in all Acronis True Image Echo Server archives have a “.tib” extension.
It is important to note that you can restore files and folders not only from file archives,
but from disk/partition images, too. To do so, mount the image (see
partition images
files or folders.
) or start the restore wizard, select image and select Restore specified
10.2 Mounting
3.2 Full, incremental and differential backups
Acronis True Image Echo Server can create full, incremental and differential backups.
A full backup contains all data at the moment of backup creation. It forms a base for
further incremental or differential backup or is used as a standalone archive. A full backup
has the shortest restore time as compared to incremental or differential ones.
An incremental backup only contains data changed since the last full or incremental
backup creation. Therefore, it is smaller and takes less time to create. But as it doesn’t
contain all data, all the previous incremental backups and the initial full backup are
required for restoration.
Unlike incremental backup, when every backup procedure creates the next file in a
“chain,” a differential backup creates an independent file, containing all changes
against the initial full archive. Generally, data from a differential backup will be restored
faster than an incremental one, as it does not have to process through a long chain of
previous backups.
A standalone full backup may be an optimal solution if you often roll back the system to
the initial state (like in a gaming club or Internet café, to undo changes made by the
guests). In this case, you need not re-create the initial full image, so the backup time is
not crucial, and the restore time will be minimal.
Alternatively, if you are interested in saving only the last data state to be able to restore it
in case of system failure, consider the differential backup . It is particularly effective if your
data changes tend to be little as compared to the full data volume.
The same is true for incremental backup. In addition, it is most useful when you need
frequent backups and possibility to roll back to any of stored states. Having created a full
backup once, if you then create an incremental backup each day of a month, you will get
the same result as if you created full backups every day. However, the cost in time and
disk space (or removable media usage) will be as little as one tenth as much.
It is important to note that the above arguments are nothing but examples for your
information. Feel free to make up your own backup policy in accordance with your specific
tasks and conditions. Acronis True Image Echo Server is flexible enough to meet any reallife demands.
An incremental or differential backup created after a disk is defragmented might be
considerably larger than usual. This is because the defragmentation program changes file
locations on disk and the backups reflect these changes. Therefore, it is recommended
that you re-create a full backup after disk defragmentation.
3.3 Acronis Secure Zone®
The Acronis Secure Zone is a special partition for storing archives on the computer system
itself. In the Acronis True Image Echo Server Wizards’ windows the zone is listed along
with all partitions available for storing archives.
Acronis Secure Zone is always available for archive creation as long as there is space for
the backup file. If there is not enough space, older archives will be deleted to create
space.
Acronis True Image Echo Server uses the following scheme to clean up Acronis Secure
Zone:
• If there is not enough free space in the zone t o create a backup, the pro gram deletes
the oldest full backup with all subsequent incremental/differential backups.
• If there is only one full backup (with subsequent incremental/differ ential backups) left
and a full backup is in progress, then the old full backup and incremental/differential
backups are deleted.
• Otherwise, (only one full backup left, and an incremental/differential backup is in
progress) you will get a message about space error. In that case you will have to
either re-create the full backup or increase Acronis Secure Zone.
Thus, you can back up data automatically on a schedule (see
), and not worry about the zone overflow issu es. How ever , if you keep long chains of
tasks
incremental backups, it will be a good practice to periodically check the zone free space,
indicated on the second page of the Manage Acronis Secure Zone wizard.
Chapter 7. Scheduling
For information on how to create, resize or delete Acronis Secure Zone using this wizard,
Chapter 8. Managing Acronis Secure Zone
see
.
In case you remove Acronis True Image Echo Server from the system, there is an option
to keep Acronis Secure Zone along with its contents (which will enable data recovery on
booting from bootable media) or remove Acronis Secure Zone.
The Acronis Secure Zone should not be the only location where a backup is stored.
Should the disk have a physical failure, the Acronis Secure Zone could be lost. This is
particularly critical for backups of servers; the Acronis Secure Zone should only be one
part of an overall backup strategy.
3.4 Working from a rescue CD
In some situations (e.g. if the operating system fails to boot, or when cloning a mounted
disk), you might have to work with Acronis True Image Echo Server without loading the
OS. In those cases, you can use the Acronis rescue CD. It is highly recommended that
you create it as described in
Chapter 9. Creating bootable media
.
3.5 Working from a remote terminal
You can control the image creation or restorati on process remotely from any computer in
the local network or Internet, operating under Windows, Mac OS or any UNIX clone.
To act as a remote terminal, this computer must have X Server software installed. Start
the X Server and log on to the server using SSH-enabled software. For example, Putty is
one of the most popular Windows programs of that type.
Then you can invoke Acronis True Image Echo Server GUI with the trueimage command
or use the trueimagecmd command line tool.
3.6 Backing up software and hardware RAID arrays
Acronis True Image Echo Server supports software and hardware RAID arrays as if these
were simple single hard drives. However, as such arrays have a structur e different from
typical hard disks, there are peculiarities affecting the way data is stored.
Software RAID arrays under Linux OS combine several hard disks partitions and mak e
solid block devices (/dev/md0, ... /dev/md31), information of which is stored in
/etc/raidtab or in dedicated areas of that partitions. Acronis True Image Echo Server
enables you to create images of active (mounted) software arrays similar to typical hard
disk images.
Partitions that are part of software arrays are listed alongside other available partitions as
if they had a corrupted file system or without a file system at all. There’s no sense in
creating images of such partitions when a software array is mounted, as it won’t be
possible to restore them.
Parameters of software disk arrays are not stored in images, so they can only be restored
to a normal partition, or unallocated space, or previously configured array.
Operating from a rescue CD, Acronis True Image Echo Server tries to access parameters
of a software disk array and configure it. However, if the necessary information is lost,
the array cannot be configured automatically. In this case, create a software array
manually and restart the restoration procedure.
Hardware RAID arrays under Linux combine several physical drives to cr eate a single
partitionable disk (block device). The special file related to a hardware disk array is
usually located in /dev/ataraid. Acronis True Image Echo Server enables you to create
images of hardware disk arrays similar to images of typical disks and partitions.
Physical drives that are part of hardware disk arrays are listed alongside other available
drives as if they had a bad partition table or no partition table at all. There’s no sense in
creating images of such drives, as it won’t be possible to restore them.
3.7 Support for LVM volumes
When running in Linux environment with 2.6.x kernel, Acronis True Image Echo Server
supports disks, managed by Logical Volume Manager (LVM). You can back up da ta of one
or more LVM volumes and restore it to a previously created LVM volume or MBR disk
(partition), likewise it is also possible to restore MBR volume data to an LVM volume. In
each case, the program stores and restores volume contents only. The type or other
properties of the target volume will not be changed.
A system, restored from an LVM volume image over an MBR disk, cannot boot because
its kernel tries to mount the root file system at the LVM volume. To boot the system,
change the loader configuration and /etc/fstab so that LVM is not used. Then reactivate
your boot manager as described in section 6.3.11.
When restoring an LVM volume over an MBR partition, resizing of the partition is possible.
LVM volumes appear at the end of the list of hard disks available for backup. Hard disk
partitions included in LVM volumes are also shown in the list with None in the Type
column. If you select to back up such partitions, the program will image it sector-bysector. Normally it is not needed. To back up all available disks, specify all dynamic
volumes plus partitions not belonging to them.
The following is an example of a list of drives obtained with the --list command (GUI
wizards display a similar table). The system has three physical disks (1, 2, 3). Two
dynamic volumes 4-1 and 4-2 are arranged across partitions 1-2 and 2-1. Hard drive 3
includes Acronis Secure Zone which is not normally imaged.
Disk 1:
1-1 hda1 (/boot) Pri,Act 63 208782 Ext3
1-2 hda2 Pri 208845 8177085 None
Disk 2:
2-1 hdb1 Pri,Act 63 8385867 None
Disk 3:
3-1 hdd1 Pri,Act 63 1219617 Ext3
3-2 Acronis Secure Zone Pri 1219680 2974608 FAT32
Dynamic Volumes:
4-1 VolGroup00-LogVol00 15269888 Ext3
4-2 VolGroup00-LogVol01 1048576 Linux Swap
To image dynamic volume 4-1, select partition 4-1.
To image all three physical drives, select partitions 1-1, 3-1, 4-1, 4-2.
If you select disk 2, partition 1-2 or 2-1, the program will create a sector-by-sector copy.
3.8 Backing up to tape drive
Acronis True Image Echo Server supports SCSI tape drives. It can store backups on the
tape and restore data from the tape, store large backups to multiple tapes, and append
incremental/differential changes to a tape with the existing archives.
If a SCSI tape drive is connected to the server, the list of devices available for storing
backups will be extended with a name corresponding to the drive type.
Backup and restore using tape drive proceed in the same way as wi th other devices, with
the following exceptions.
1. A full backup can be stored on an empty tape only. If the tape already contains data,
its contents will be overwritten on prompt. You have an option to disable prompts. See
details in
5.3.11 Additional settings
2. In case you want to keep more than one archive on the ta pe, for example, back up two
disks separately, choose
incremental
create an initial backup for the second disk. In other situations, incremental backup is
used for appending changes to the previously created archive.
3. You do not have to provide filenames for backups.
You might experience short pauses that are required to rewind the tape.
.
backup mode instead of a
full
backup when you
Low-quality or old tape, as well as dirt on the magnetic head, might lead to pauses that
can last up to several minutes.
Chapter 4. The program interface under X
Window System
Acronis True Image Echo Server features both the console mode and a user-friendly
interface under X Window System. The GUI m ode, described in this ch apter, provides the
widest functionality. For console commands please see
Chapter 12. Console mode
4.1 The main window and available operations
The main program window contains the menu, the toolbar, the sidebar and the main
area. The sidebar features the Tools pane. The main area displays operation icons
(default view), tasks (after clicking Tasks) or logs (after clicking Logs).
.
4.1.1 The main area
Operation icons are divided into three groups.
The Task group contains the following operations:
• Backup – create a backup archive
• Recovery – restore data from a previously created archive
The Manage Tasks group contains the following operations:
•Tasks – schedule backup or archive validation tasks on your computer and manage
them
•Logs – open the Log Viewer window
The Tools group contains the following items:
• Validate Backup Archives – run the archive integrity checking procedure
• Manage Acronis Secure Zone – create, delete and resize a special hi dden partition
for storing archives (Acronis Secure Zone)
• Clone Disk – transfer the OS, applications and data from the old disk to the new one
• Add New Disk – add a new disk for data storage leaving the OS and applications on
the old one.
4.1.2 The menu
The menu bar features the Operations, View, Tools and Help menus.
The Operations menu contains the following list of operations:
• Backup – create a backup archive
• Recovery – restore data from a previously created archive
• Mount image – mounts a partition image
• Unmount image – unmounts a partition image
• Clone Disk – transfer the OS, applications and data from the old disk to the new one
• Add New Disk – add a new disk for data storage leaving the OS and applications on
the old one
•Schedule task - schedule backup or archive validation tasks on your computer and
manage them
The View menu contains items for managing the program window appearance:
• Toolbars – contains commands that control toolbar icons
• Common Task Bar – enables/disables the sidebar
• Status Bar – enables/disables the status bar
The Tools menu contains the following items:
•Manage Acronis Secure Zone – create, delete and resize a special hi dden partition
for storing archives (Acronis Secure Zone)
• Validate Backup Archive – run the archive integrity checking procedure
• Consolidate archive – applicable for archives containing more than one backups.
This will create a consistent copy of the archive with an option to exclude backups
that are no more needed
• Create Bootable Rescue Media – run the bootable media creation procedure
• Show Log – open the Log Viewer window
• Options – open a window for editing default backup/restore options, setting text
appearance (fonts), configuring notifications etc.
The Help menu is used to view help and obtain information about Acronis True Image
Echo Server.
Most of the operations are represented two or even three times in different window areas,
providing several ways to select them for more convenience. For example, you can start
the necessary operation or tool by clicking its icon in the main area or by selecting the
same item from the Operations or Tools menu.
4.1.3 Status bar
At the bottom of the main window, there is a status bar indicating the Ac ronis True I mage
Echo Server operation progress and results. Double-clicking the operation results will
open the Log Viewer window.
You can change the way of data representation in all schemes you see in various wizards.
To the right are three icons: Arrange Icons by, Choose Details and i (Display the properties of the selected item), the last duplicated in the context menu invoked by
right-clicking objects.
To sort messages by a particular column, click the header (another click will switch the
messages to the opposite order) or Arrange Icons by button and select the column.
To select columns to view, right-click the headers line or left-cli ck the Choose Details
button. Then flag the columns you want to display.
If you click the i (Display the properties of the selected item) button, you will see
the selected partition or disk properties window.
This window contains two panels. The left panel contains the properties tree and the right
describes the selected property in detail. The disk information includes its physical
parameters (connection type, device type, size, etc.); partition information includes both
physical (sectors, location, etc.), and logical (file system, free space etc.) parameters.
You can change the width of a column by dragging its borders with the mouse.
Chapter 5. Creating backup archives
To be able to restore the lost data or roll back your system t o a predetermined state, you
should first create a data or entire-system backup file.
If you are not concerned about restoration of your operating system along with all
settings and applications, but plan to keep safe only certain data (the current project, for
example), choose file/folder backup. This will reduce the archive size, thus saving disk
space and possibly reducing removable media costs.
Backing up the entire system disk (creating a disk image) takes more disk space but
enables you to restore the system in minutes in case of severe data damage or hardware
failure. Moreover, the imaging procedure is much faster than copying files, and may
significantly speed the backup process when it comes to backing up large volumes of data
(see details in
This chapter describes creating backup archives using Acronis True Image Echo Server
GUI under X Window System. See
service.
3.1 The difference between file archives and disk/partition images
Chapter 12. Console mode
for using console or Cron
5.1 Backing up files and folders (file backup)
).
1. Start the Create Backup Wizard by clicking on the backup operation icon in the main
program window.
2. Select My Data.
3. From the tree pane, select files and folders to back up. You can select a random set of
files, folders, partitions, disks and even computers.
In order to restore your operating system, you must image the system disk or partition; a
file-based backup is not sufficient for the operating system restore.
4. Set filters for the specific types of files you do not wish to back up. For example, you
may want hidden and system files and folders not to be stored in the archive.
You can also apply custom filters, using the common masking rules. For example, to
exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib
files with names consisting of five symbols and starting with “my ”.
All of these settings will take effect for the current task. For information on how to set the
default filters that will be called each time you create a file backup task, see
files exclusion.
5.3.2 Source
5. Select the name and location of the archive.
If you are going to create a full backup, type the file name in the File Name line, or use
the file name generator (a button to the right of the line). If you select an existing full
backup, it will be overwritten.
Including [date] in the backup file name will add to the name the time and date of the
backup creation formatted as <DD-Month-YYYY HH:MM:SS>. Example:
C:\MyBackup[date].tib.
If you are going to create an incremental backup (see
differential backup
In fact, if all incremental backup files are stored together with the basic full backup, it
doesn't matter which one you select, as the program will recognize them as a single
archive. If you stored the files on several removable disks, you must provide the latest
archive file; otherwise, restoration problems might occur.
), select the latest full or incremental backup you have.
3.2 Full, incremental and
If you are going to create a differential backup, select the full backup which will be a
base, or any of the existing differential backups. Either way, the program will create a
new differential backup.
The “farther” you store the archive from the original folders, the safer it will be in case of
data damage. For example, saving the archive to another hard disk will protect your data
if the primary disk is damaged. Data saved to a network disk, ftp-server or removable
media will survive even if all your local hard disks are down. In addition to NFS, Acronis
True Image Echo Server supports the SMBFS network file system.
Please check, that the network backup node is accessible for Acronis True Image Echo
Server Rescue CD Network Browser, otherwise you cannot restore images stored on this
node.
See notes and recommendations for using the FTP server in
media.
1.4.2 Supported storage
6. Select whether you want to create a full, incremental or differential backup. If you have
not backed up the selected files/folders yet, or the full archive seems too old to append
incremental changes to it, choose full backup. Otherwise it is recommended that you
create an incremental or differential backup (see
7. Select the backup options (that is, backup file splitting, compression level, password
protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the
current backup task. Alternatively, you can edit the default options from the current
screen. Then your settings will be saved as the defaults. See
5.3 Setting backup options
for more information.
8. Provide a comment for the archive. This can help prevent you from restoring the wrong
files. However, you can choose not to make any notes. The backup file size and creation
date are automatically appended to the description, so you do not need to enter this
information.
9. At the final step, the backup task summary is displayed. Up to this point, you can click
Back to make changes in the created task. Clicking Proceed will launch the task
execution.
10. The task progress will be shown in a special window. You can stop the procedure by
clicking Cancel.
You can also close the progress window by clicking Hide. The backup creation will
continue, but you will be able to start another operation or close the main program
window. In the latter case, the program will continue working in the background and will
automatically close once the backup archive is ready. If you prepare some more backup
operations, they will be queued after the current one.
Loading...
+ 62 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.