User’s Guide Acronis® True Image Echo Server for Linux
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis”, "Acronis Compute with Confidence" and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Table of Contents Chapter 1. Introduction..................................................................................... 6 1.1 1.2 1.3 1.4 Acronis® True Image Echo Server – a complete solution for corporate users .......................... 6 Acronis True Image Echo Server key features ....................................................................... 7 New in Acronis True Image Echo Server ...............................................................................
6.1.1 Restore under OS or boot from CD? ............................................................................. 34 6.1.2 Network settings in rescue mode ................................................................................. 34 6.2 Restoring files and folders from file archives ....................................................................... 35 6.3 Restoring disks/partitions or files from images .................................................................... 38 6.3.
12.2 Automatic image creation using cron service ..................................................................... 75 12.3 Restoring files with trueimagemnt .................................................................................... 76 12.3.1 Supported commands ............................................................................................... 76 12.3.2 Trueimagemnt usage examples ................................................................................. 77 Chapter 13.
Chapter 1. Introduction 1.1 Acronis® True Image Echo Server – a complete solution for corporate users You have come to rely on your servers to run your business and retain key enterprise data. Acronis True Image Echo Server provides comprehensive, reliable, and costeffective system protection and recovery for corporate servers, running Linux. With Acronis True Image Echo Server you have peace of mind knowing you are protected and can recover from any situation.
Leverages Existing Technology Investments The product can leverage your current storage infrastructure by supporting a wide variety of storage media, so you can avoid costly hardware purchases to implement the solution.
Backup Archive Store Places A wide variety of IDE, SCSI, USB, FireWire, and PC Card (formerly PCMCIA) storage media.
CLI features MBR restore Backup to FTP server Allow logs on net share 1.4 Supported file systems and storage media 1.4.1 Supported file systems • Ext2/Ext3 • ReiserFS • Reiser4 • Linux SWAP • XFS • JFS If a file system is not supported or is corrupted, Acronis True Image Echo Server can copy data using a sector-by-sector approach. For XFS and Reiser4 file systems the partition resizing feature is not supported. 1.4.
Support shall consist of supplying telephone or other electronic support to you in order to help you locate and, on its own, correct problems with the Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support.
Chapter 2. Acronis True Image Echo Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis True Image Echo Server requires the following hardware: • Pentium processor or higher • 512MB RAM • CD-RW drive for bootable media creation • Mouse (recommended). 2.1.2 Supported operating systems • Operating systems based on Linux 2.4.9 or later kernel including 2.6.x.
2.4 Removing Acronis True Image Echo Server To remove Acronis True Image Echo Server, do the following: 1. Execute the following commands: # cd /usr/lib/Acronis/TrueImageServer/uninstall/ # ./uninstall 2. Remove the sources of the SnapAPI module: # rm -rf /usr/src/snapapi* Copyright © Acronis, Inc.
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone full backup may be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Alternatively, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
In case you remove Acronis True Image Echo Server from the system, there is an option to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone. The Acronis Secure Zone should not be the only location where a backup is stored. Should the disk have a physical failure, the Acronis Secure Zone could be lost.
Physical drives that are part of hardware disk arrays are listed alongside other available drives as if they had a bad partition table or no partition table at all. There’s no sense in creating images of such drives, as it won’t be possible to restore them. 3.7 Support for LVM volumes When running in Linux environment with 2.6.x kernel, Acronis True Image Echo Server supports disks, managed by Logical Volume Manager (LVM).
3.8 Backing up to tape drive Acronis True Image Echo Server supports SCSI tape drives. It can store backups on the tape and restore data from the tape, store large backups to multiple tapes, and append incremental/differential changes to a tape with the existing archives. If a SCSI tape drive is connected to the server, the list of devices available for storing backups will be extended with a name corresponding to the drive type.
Chapter 4. The program interface under X Window System Acronis True Image Echo Server features both the console mode and a user-friendly interface under X Window System. The GUI mode, described in this chapter, provides the widest functionality. For console commands please see Chapter 12. Console mode. 4.1 The main window and available operations The main program window contains the menu, the toolbar, the sidebar and the main area. The sidebar features the Tools pane.
• Add New Disk – add a new disk for data storage leaving the OS and applications on the old one. 4.1.2 The menu The menu bar features the Operations, View, Tools and Help menus.
4.2 Viewing disk and partition information You can change the way of data representation in all schemes you see in various wizards. To the right are three icons: Arrange Icons by, Choose Details and i (Display the properties of the selected item), the last duplicated in the context menu invoked by right-clicking objects. To sort messages by a particular column, click the header (another click will switch the messages to the opposite order) or Arrange Icons by button and select the column.
Chapter 5. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
You can also apply custom filters, using the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib files with names consisting of five symbols and starting with “my”. All of these settings will take effect for the current task. For information on how to set the default filters that will be called each time you create a file backup task, see 5.3.2 Source files exclusion. 5. Select the name and location of the archive.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged. Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. In addition to NFS, Acronis True Image Echo Server supports the SMBFS network file system.
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 5.3 Setting backup options for more information. 8. Provide a comment for the archive.
11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar. If you burn an archive to several removable media, be sure to number them, since you will have to insert them in order during the restoration. 5.2 Backing up disks and partitions (image backup) 1. Start the Create Backup Wizard by clicking the backup operation icon in the main program window. 2. Select My Computer. 3.
If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing full backup, it will be overwritten. Including [date] in the backup file name will add to the name the time and date of the backup creation formatted as . Example: C:\MyBackup[date].tib. If you are going to create an incremental backup (see 3.
You can also close the progress window by clicking Hide. The backup creation will continue, but you will be able to start another operation or close the main program window. In the latter case, the program will continue working in the background and will automatically close once the backup archive is ready. If you prepare some more backup operations, they will be queued after the current. 10. You may want to see the log when the task is completed.
Encryption The preset is 128 bit. Once the password has been set, you can choose to encrypt the backup for advanced security with industry-standard AES cryptographic algorithm. The password is used to generate a key which may differ in length. There are 4 choices: no encryption, 128, 192 and 256-bit encryption. The more the key size, the longer time to cipher and the greater is your data security. 5.3.2 Source files exclusion By default, all files from the selected folders will be included in the archive.
you can browse folders to find the respective scripts. A single command can be specified in the same window along with its arguments and working directory. It is critical to note that these commands, as opposed to Pre/post commands above, will be executed before and after data capture process, which takes seconds, while the entire backup procedure may take quite long time. Therefore, the database idle time will be minimal.
If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Echo Server. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second. This setting is also applied to FTP connection, if an FTP server is selected as backup destination device. 5.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup.
If you do not have enough space to store the backup on your hard disk, the program will warn you and wait for your decision as to how you plan to fix the problem. You can try to free some additional space and continue or click Back and select another disk. When backing up to a diskette, CD-R/RW or DVD+R/RW: Acronis True Image Echo Server will ask you to insert a new disk when the previous one is full.
Corporate administrators need an option to continue back up on all errors, despite what that errors may be, without waiting for human decision, because this needs to be automated. Details of operation, including errors, if any, could be found in the operation log. With the silent mode enabled, the program will automatically handle situations requiring user intervention such as running off disk space (except for handling bad sectors, which is defined as a separate option.
A full backup, when created on a tape drive, overwrites all data stored on the tape (see 3.8 Backing up to tape drive for more information). In this situation, Acronis True Image Echo Server will warn that you are about to lose data on the tape. To disable this warning, check the middle box. 3. Ask for first media while creating backup archives on removable media The preset is enabled. You can choose whether to display the Insert First Media prompt when backing up to removable media.
Chapter 6. Restoring the backup data under X Window system This chapter describes data recovery using Acronis True Image Echo Server GUI under X Window System. See Chapter 12. Console mode for using console. 6.1 Considerations before recovery 6.1.1 Restore under OS or boot from CD? As mentioned above (2.3 Running Acronis True Image Echo Server), Acronis True Image Echo Server can be run in several ways.
6.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the desired files/folders from a disk/partition image as well. To do so, mount the image (see 10.2.1 Mounting an image or 12.3 Restoring files with trueimagemnt) or start the image restoration and select Restore specified files or folders (see 6.3 Restoring disks/partitions or files from images).
To restore data from an incremental backup, you must have all previous incremental backups and the initial full backup. If any of successive backups is missing, restoration is not possible. To restore data from a differential backup, you must have the initial full backup as well. 4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 5.
All of these settings will take effect for the current task. How to set the default filters that will be called each time you restore data, see 6.5.1 Files to exclude from restoration. 8. The next selection allows you to keep useful data changes made since the selected backup was created. Choose what to do if the program finds in the target folder a file with the same name as in the archive. Overwrite existing file – this will give the archived file unconditional priority over the file on the hard disk.
9. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. Clicking Proceed will launch the task execution. 10. The task progress will be shown in a special window. You can stop the procedure by clicking Cancel. Please keep in mind that the aborted procedure still may cause changes in the destination folder. 6.
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. Data recovery directly from an FTP server requires the archive to be split into files no more than 2GB in size. If you suspect that some of the files may be larger, first copy the entire archive (along with the initial full backup) to a local hard disk or network share disk. See notes and recommendations for supporting FTP server in 1.4.
Restore disks or partitions Having selected a usual way of disks/partitions recovery, you will have to make all settings described below. 6.3.4 Selecting a disk/partition to restore The selected backup can contain images of several partitions or even disks. Select which disk/partition to restore. Disks and partitions images contain a copy of track 0 along with MBR (Master Boot Record). It appears in this window in a separate line.
All the data stored on the target partition will be replaced by the image data, so be careful and watch for non-backed-up data that you might need. 2. When restoring an entire disk, the program will analyze the target disk structure to see if the disk is free. If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data.
If you restore a system partition to another hard disk with its own partitions and OS, most probably you will need only the data. In this case, you can restore the partition as Logical to access the data only. By default, the original partition type is selected. Selecting Active for a partition without an installed operating system could prevent your server from booting. 6.3.
6.3.10 Setting restore options Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current restore task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as default. See 6.5 Setting restore options for more information. 6.3.
#/sbin/lilo GRUB: #/sbin/grub-install /device_name (/device_name is hd: hda, hdal, hda2, sdal, sda2 etc) 6.4 Restoring data with a rescue CD To restore data from an archive, using a rescue CD of Acronis True Image Echo Server, you initially have to create such disk as described in Chapter 9. Creating bootable media. Insert the rescue CD and reboot (you might have to enable the CD bootup option in BIOS). You will see a standard Acronis True Image Echo Server main window.
6.5.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are not to be restored. Use the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib files with names, consisting of five symbols and starting with “my”. This option is effective only when restoring files from file/folders archives.
Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the restore procedure to run concurrently with your commands execution. 6.5.4 Restoration priority The default setting – Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process. Decreasing the restoration priority will free more resources for other CPU tasks.
6.5.7 Error handling 1. Do not show messages and dialogs while processing (“silent” mode) The preset is disabled. With the silent mode enabled, the program will not display interactive windows. Instead, it will automatically handle situations requiring user intervention. No prompts will be displayed, including those for inserting removable media or the next tape. If an operation cannot continue without user action, it will fail.
Chapter 7. Scheduling tasks Acronis True Image Echo Server allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Scheduled Tasks window, where you can start, stop, edit, delete and rename them.
• Manually later – the task will be saved, but not launched automatically.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
7.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.2 Managing scheduled tasks The task Status, Schedule, Last Run Time and Last Result are shown in the Scheduled Tasks window. To view the other task details, right-click on its name. There are two ways of changing the task parameters. Editing allows you to change any task parameters.
Chapter 8. Managing Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. For more information about it, see 3.3 Acronis Secure Zone. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives. If a zone is found, the wizard will offer to manage it (resize or change the password) or delete. If there is no zone, you’ll be prompted to create it.
The minimum size is about 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased. Partition resizing may require a reboot.
3. Select partitions from which free space will be used to increase Acronis Secure Zone or that will receive free space after the zone is reduced. 4. Enter the new size of the zone or drag the slider to select the size. When increasing the Acronis Secure Zone, the program will first use unallocated space. If there is not enough unallocated space, the selected partitions will be decreased. Resizing of the partitions may require a reboot.
Zone deletion might take several minutes or more. Please wait until the whole procedure is finished. Copyright © Acronis, Inc.
Chapter 9. Creating bootable media You can run Acronis True Image Echo Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Linux computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Echo Server version. Because Acronis True Image Echo Server is available only as a download, you must create bootable media using the Bootable Media Builder.
When using 3.5” diskettes, you will be able to write on a diskette (or a set of the diskettes) only one component at a time (for example, Acronis True Image Echo Server). To write another component, start Bootable Media Builder once again. 4. If you are creating removable media other than CD, insert the blank disk so the program can determine its capacity. If you chose to create a bootable disk ISO image, specify the ISO file name and the folder in which to place it. 5.
Chapter 10. Operations with archives 10.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. Here’s how to run a one-time validation task. For how to schedule regular archive validation, see 7.1 Creating scheduled tasks. 1. To start the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools menu. 2. Select the archive to validate.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 3. If you selected an archive containing incremental images, Acronis True Image Echo Server will suggest that you select one of the successive incremental images by its creation date/time.
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the comment to this file. 7. The program displays a summary containing a single operation. Click Proceed to mount the selected partition image. 8.
3. The program displays a list of backups belonging to the selected archive with the backups creation date and time. The list is very much alike to that in restore wizard. The upper backup is full, the rest are incremental ones. Tick off the backups you want to LEAVE. Editing images, mounted in R/W mode, results in creating incremental backups, that are a kind of offshoots of the incremental chain. Therefore, they cannot be consolidated and always will be excluded from the archive copy.
5. The program displays the summary window. Click Proceed to start consolidation. In our example, when consolidation is completed, the folder Backups will contain two archives MyBackup and MyBackup(1). The first is the source archive, the second is the copy consisting of MyBackup(1) and MyBackup(1)2. MyBackup(1) is a full backup containing data as of Tuesday, July 17, 2007, 5:35:09 PM. MyBackup(1)2 is an incremental backup containing data as of Tuesday, July 17, 2007, 6:54:40 PM.
Chapter 11. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Server can notify you when it is finished using the WinPopup service (if you address the notification to a computer, running Windows) or via e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion. By default all notifications are disabled. 11.
11.2 WinPopup notification To set up WinPopup notification, select Tools -> Options -> Notifications -> WinPopup: Provide the name of the Windows computer to which notifications will be sent. Below in this window you can choose whether you want to get notifications: - when the operation is completed successfully - when the operation failed - during the operation when user interaction is required. 11.3 Viewing logs Acronis True Image Echo Server allows users to view its working logs.
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows. To delete a log, select it and click Delete. If any step was terminated by an error, the corresponding log will be marked with a red circle with a white cross inside. The right window features the list of steps contained in the selected log.
Chapter 12. Console mode Console is a natural part of Linux OS. Acronis True Image Echo Server supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and recovery operations. Trueimagecmd also enables you to automate backup with ‘cron’ service. The trueimagecmd functionality is somewhat limited as compared to the GUI mode. trueimagecmd does not support operations that require reboot of the system, such as restore a system partition or clone system drive.
deploy_mbr Restores MBR from a disk or partition image verify Verifies the archive data integrity pit_info Displays the numbered list of backups, contained in the specified archive consolidate Creates a consistent copy of the archive, which will contain only specified backups list Lists available drives and partitions.
12.1.2 Common options (options common for most trueimagecmd commands) Option Description Archive location filename:[filename]* Archive name Other than ASZ password:[password] Specify the password for the archive (if required) Other than ASZ Specify the password for the ASZ (if required) ASZ Addresses to Acronis Secure Zone and selects the archive (a full backup with or without increments).
follows: --partition:1-1,1-2,1-3 or --oss_numbers --partition:1-1,15,1-6 log:[filename]* Create a log file of the current operation with the specified file name Any * To get Samba network access, specify the backup file name and the log file name as follows: --filename:smb://username:password@hostname/sharename/filename --log:smb://username:password@hostname/sharename/logfilename or: --filename:smb://hostname/sharename/filename –-net_user:username \ -–net_password:password --log:smb://hostname/sharename
filebackup include:[names] Files and folders to be included in the backup (comma separated). For example: --include:'/home/bot/ATIESsafe.iso,/home/bot/ATIW.iso' exclude_names:[names] exclude_masks:[masks] Files and folders to be excluded from the backup (comma separated). See the above example. Applies masks to select files to be excluded from the backup. Use the common masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .
other primary partitions, the restored partition will be set active - if the target disk is the 1st according to BIOS and there are other primary partitions on it, the restored partition will be set logical - if the target disk is not the 1st, the restored partition will be set logical. preserve_mbr When restoring a partition over an existing one, the target partition is deleted from the disk along with its entry in the target disk MBR.
list filename:[filename] With this option, the image contents is displayed. When listing image contents, partition numbers may not coincide with those in the drives/partitions list, if the image does not contain all the disk partitions. For example, if the image contains partitions 2-3 and 2-5, they will be listed as 2-1 and 2-2.
trueimagecmd --list --filename:backup.tib • This will create an image named backup.tib of partition 1-1: trueimagecmd --partition:1-1 --filename:backup.tib \ --create • This will create an incremental image of the partition above: trueimagecmd --partition:1-1 --filename:backup.tib \ --create --incremental • This will create an image of partition 1-1 in the Acronis Secure Zone: trueimagecmd --partition:1-1 --asz --create • This will restore a partition from backup.
trueimagecmd --deploy_mbr --filename:/usr/backups/D1.tib \ --harddisk:1 12.2 Automatic image creation using cron service As a rule, disk/partition images are created regularly, often daily. To automate this operation, you can use the cron service familiar to many UNIX users. As an example, let’s consider a situation where you (the system administrator) need to back up one or more disk partitions regularly. Use --list to obtain the necessary partition number: Disk 1: 1-1 hda1 Pri,Act 31.35 MB 26.
12.3 Restoring files with trueimagemnt The trueimagemnt tool is designed to restore files from partition/disk images. It mounts Acronis True Image archives as if they were kernel space block devices. The program implements the user level part of the Acronis True Image Echo Server user mode block device service. The large part of functionality is handled by the snumbd kernel module.
trueimagemnt -m /mnt/md1 -f nfs://dhcp6223.acronis.com/sdb3/nfs_root:/mike/md1.tib -i 2 mounts /mike/md1.tib archive, located on dhcp6-223.acronis.com node in /sdb3/nfs_root directory exported by NFS. To get Samba network access, specify the image file name as follows: smb://hostname/share name/remote filename Hostname may be specified username:password@hostname with username and password as: For example: trueimagemnt -m /mnt/md1 -f smb://dhcp6223.acronis.com/sdb3/mike/md1.tib -i 2 mounts /mike/md1.
Chapter 13. Transferring the system to a new disk 13.1 General information Sooner or later any computer user finds out that the hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete. To protect yourself from unforeseen consequences, it would be better to leave the old disk data intact, as you will be able to delete it later. 14.3.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 13.3.
Having completed the required steps, you will add a new partition. To create another one, simply repeat those steps. If you make a mistake, click Back to redo. After you create the necessary partitions, uncheck the Create new partition in unallocated space box and click Next. 13.3.10 Old and new disk partition layouts In the next window, you will see rectangles indicating the source hard disk, including its partitions and unallocated space, as well as the new disk layout.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition’s size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there's unallocated space near it). Having provided the new location and size, click Next. You will be taken two steps back to the partition layout.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the server has space for another disk, it would be easier to add a data disk drive than to clone a system one.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there is unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process.