User's Guide Acronis® True Image Echo Server for Linux Compute with confidence www.acronis.
Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Startup Recovery Manager” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis® True Image Echo Server for Linux (the Software) is Copyright © Acronis, Inc., 20002007. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1.
Table of Contents Chapter 1. Introduction ......................................................................................7 1.1 1.2 1.3 1.4 Acronis® True Image Echo Server – a complete solution for corporate users..........................7 Acronis True Image Echo Server key features ......................................................................8 New in Acronis True Image Echo Server ..............................................................................
6.1.1 Restore under OS or boot from CD?............................................................................34 6.1.2 Network settings in rescue mode................................................................................34 6.2 Restoring files and folders from file archives ......................................................................35 6.3 Restoring disks/partitions or files from images ...................................................................38 6.3.
12.2 Automatic image creation using cron service ....................................................................75 12.3 Restoring files with trueimagemnt ...................................................................................76 12.3.1 Supported commands ..............................................................................................76 12.3.2 Trueimagemnt usage examples ................................................................................77 Chapter 13.
Chapter 1. Introduction 1.1 Acronis® True Image Echo Server – a complete solution for corporate users You have come to rely on your servers to run your business and retain key enterprise data. Acronis True Image Echo Server provides comprehensive, reliable, and costeffective system protection and recovery for corporate servers, running Linux. With Acronis True Image Echo Server you have peace of mind knowing you are protected and can recover from any situation.
Leverages Existing Technology Investments The product can leverage your current storage infrastructure by supporting a wide variety of storage media, so you can avoid costly hardware purchases to implement the solution.
A wide variety of IDE, SCSI, USB, FireWire, and PC Card (formerly PCMCIA) storage media.
MBR restore Backup to FTP server Allow logs on net share 1.4 Supported file systems and storage media 1.4.1 Supported file systems • Ext2/Ext3 • ReiserFS • Reiser4 • Linux SWAP • XFS • JFS If a file system is not supported or is corrupted, Acronis True Image Echo Server can copy data using a sector-by-sector approach. For XFS and Reiser4 file systems the partition resizing feature is not supported. 1.4.
Chapter 2. Acronis True Image Echo Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis True Image Echo Server requires the following hardware: • Pentium processor or higher • 256MB RAM • CD-RW drive for bootable media creation • Mouse (recommended). 2.1.2 Supported operating systems • Linux 2.4.18 or later kernel (including 2.6.x kernels). • SuSE 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 9.3, RedHat 9.0, Advanced Server 2.1, Advanced Server 3.
2.3 Running Acronis True Image Echo Server To run the program under the X Window System interface, use the trueimage command or select Acronis True Image Echo Server from the system tools menu. To work in the console mode, use trueimagecmd and trueimagemnt tools, described in Chapter 12. Console mode. See also man trueimagecmd or man trueimagemnt. If your operating system fails to load, you can run Acronis Startup Recovery Manager. However, this must be activated prior to use; see 3.
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone full backup may be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Alternatively, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
In case you remove Acronis True Image Echo Server from the system, there is an option to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone. The Acronis Secure Zone should not be the only location where a backup is stored. Should the disk have a physical failure, the Acronis Secure Zone could be lost.
3.6 Working from a remote terminal You can control the image creation or restoration process remotely from any computer in the local network or Internet, operating under Windows, Mac OS or any UNIX clone. To act as a remote terminal, this computer must have X Server software installed. Start the X Server and log on to the server using SSH-enabled software. For example, Putty is one of the most popular Windows programs of that type.
- to be able to recover data in rescue mode, you must keep its backup on a basic, network, or removable disk. A system, restored from an LVM volume image over an MBR disk, cannot boot because its kernel tries to mount the root file system at the LVM volume. To boot the system, change the loader configuration and /etc/fstab so that LVM is not used. Then reactivate your boot manager as described in section 6.3.11. When restoring an LVM volume over an MBR partition, resizing of the partition is possible.
Backup and restore using tape drive proceed in the same way as with other devices, with the following exceptions. 1. A full backup can be stored on an empty tape only. If the tape already contains data, its contents will be overwritten on prompt. You have an option to disable prompts. See details in 5.3.11 Additional settings. 2.
Chapter 4. The program interface under X Window System Acronis True Image Echo Server features both the console mode and a user-friendly interface under X Window System. The GUI mode, described in this chapter, provides the widest functionality. For console commands please see Chapter 12. Console mode. 4.1 The main window and available operations The main program window contains the menu, the toolbar, the sidebar and the main area. The sidebar features the Tools pane.
• Manage Acronis Secure Zone – create, delete and resize a special hidden partition for storing archives (Acronis Secure Zone) • Clone Disk – transfer the OS, applications and data from the old disk to the new one • Add New Disk – add a new disk for data storage leaving the OS and applications on the old one. 4.1.2 The menu The menu bar features the Operations, View, Tools and Help menus.
4.1.3 Status bar At the bottom of the main window, there is a status bar indicating the Acronis True Image Echo Server operation progress and results. Double-clicking the operation results will open the Log Viewer window. 4.2 Viewing disk and partition information You can change the way of data representation in all schemes you see in various wizards.
Chapter 5. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
You can also apply custom filters, using the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib files with names consisting of five symbols and starting with “my”. All of these settings will take effect for the current task. For information on how to set the default filters that will be called each time you create a file backup task, see 5.3.2 Source files exclusion. 5. Select the name and location of the archive.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged. Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. In addition to NFS, Acronis True Image Echo Server supports the SMBFS network file system.
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 5.3 Setting backup options for more information. 8. Provide a comment for the archive.
11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar. If you burn an archive to several removable media, be sure to number them, since you will have to insert them in order during the restoration. 5.2 Backing up disks and partitions (image backup) 1. Start the Create Backup Wizard by clicking the backup operation icon in the main program window. 2. Select My Computer. 3.
If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing full backup, it will be overwritten. Including [date] in the backup file name will add to the name the time and date of the backup creation formatted as . Example: C:\MyBackup[date].tib. If you are going to create an incremental backup (see 3.
You can also close the progress window by clicking Hide. The backup creation will continue, but you will be able to start another operation or close the main program window. In the latter case, the program will continue working in the background and will automatically close once the backup archive is ready. If you prepare some more backup operations, they will be queued after the current. 10. You may want to see the log when the task is completed.
The preset is 128 bit. Once the password has been set, you can choose to encrypt the backup for advanced security with industry-standard AES cryptographic algorithm. The password is used to generate a key which may differ in length. There are 4 choices: no encryption, 128, 192 and 256-bit encryption. The more the key size, the longer time to cipher and the greater is your data security. 5.3.2 Source files exclusion By default, all files from the selected folders will be included in the archive.
It is critical to note that these commands, as opposed to Pre/post commands above, will be executed before and after data capture process, which takes seconds, while the entire backup procedure may take quite long time. Therefore, the database idle time will be minimal. Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the backup process to run concurrently with your commands execution. 5.3.5 Compression level The preset is Normal.
If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Echo Server. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second. This setting is also applied to FTP connection, if an FTP server is selected as backup destination device. 5.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup.
If you do not have enough space to store the backup on your hard disk, the program will warn you and wait for your decision as to how you plan to fix the problem. You can try to free some additional space and continue or click Back and select another disk. When backing up to a diskette, CD-R/RW or DVD+R/RW: Acronis True Image Echo Server will ask you to insert a new disk when the previous one is full.
2. Do not show messages and dialogs while processing (silent mode) The preset is disabled. Corporate administrators need an option to continue back up on all errors, despite what that errors may be, without waiting for human decision, because this needs to be automated. Details of operation, including errors, if any, could be found in the operation log.
Chapter 6. Restoring the backup data under X Window system This chapter describes data recovery using Acronis True Image Echo Server GUI under X Window System. See Chapter 12. Console mode for using console. 6.1 Considerations before recovery 6.1.1 Restore under OS or boot from CD? As mentioned above (2.3 Running Acronis True Image Echo Server), Acronis True Image Echo Server can be run in several ways.
6.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the desired files/folders from a disk/partition image as well. To do so, mount the image (see 10.2.1 Mounting an image or 12.3 Restoring files with trueimagemnt) or start the image restoration and select Restore specified files or folders (see 6.3 Restoring disks/partitions or files from images). 1.
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 5. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 6. Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority etc.).
All of these settings will take effect for the current task. How to set the default filters that will be called each time you restore data, see 6.5.1 Files to exclude from restoration. 8. The next selection allows you to keep useful data changes made since the selected backup was created. Choose what to do if the program finds in the target folder a file with the same name as in the archive. Overwrite existing file – this will give the archived file unconditional priority over the file on the hard disk.
9. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. Clicking Proceed will launch the task execution. 10. The task progress will be shown in a special window. You can stop the procedure by clicking Cancel. Please keep in mind that the aborted procedure still may cause changes in the destination folder. 6.
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. Data recovery directly from an FTP server requires the archive to be split into files no more than 2GB in size. If you suspect that some of the files may be larger, first copy the entire archive (along with the initial full backup) to a local hard disk or network share disk. See notes and recommendations for supporting FTP server in 1.4.
Restore disks or partitions Having selected a usual way of disks/partitions recovery, you will have to make all settings described below. 6.3.4 Selecting a disk/partition to restore The selected backup can contain images of several partitions or even disks. Select which disk/partition to restore. Disks and partitions images contain a copy of track 0 along with MBR (Master Boot Record). It appears in this window in a separate line.
All the data stored on the target partition will be replaced by the image data, so be careful and watch for non-backed-up data that you might need. 2. When restoring an entire disk, the program will analyze the target disk structure to see if the disk is free. If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data.
If you restore a system partition to another hard disk with its own partitions and OS, most probably you will need only the data. In this case, you can restore the partition as Logical to access the data only. By default, the original partition type is selected. Selecting Active for a partition without an installed operating system could prevent your server from booting. 6.3.
6.3.10 Setting restore options Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current restore task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as default. See 6.5 Setting restore options for more information. 6.3.
#/sbin/lilo GRUB: #/sbin/grub-install /device_name (/device_name is hd: hda, hdal, hda2, sdal, sda2 etc) 6.4 Restoring data with a rescue CD To restore data from an archive, using a rescue CD of Acronis True Image Echo Server, you initially have to create such disk as described in Chapter 9. Creating bootable media. Insert the rescue CD and reboot (you might have to enable the CD bootup option in BIOS). You will see a standard Acronis True Image Echo Server main window.
6.5.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are not to be restored. Use the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib files with names, consisting of five symbols and starting with “my”. This option is effective only when restoring files from file/folders archives.
Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the restore procedure to run concurrently with your commands execution. 6.5.4 Restoration priority The default setting – Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process. Decreasing the restoration priority will free more resources for other CPU tasks.
Chapter 7. Scheduling tasks Acronis True Image Echo Server allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Scheduled Tasks window, where you can start, stop, edit, delete and rename them.
• Manually later – the task will be saved, but not launched automatically.
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, all settings will be lost. Click Finish to save the task. 8. The task schedule and default name appear in the Scheduled Tasks window. You can rename the task, if need be. 7.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.
There are two ways of changing the task parameters. Editing allows you to change any task parameters. This is performed in the same way as creation, however, the earlier selected options will be set, so you have to enter only the changes. To edit a task, select it and click Edit on the toolbar. If you want to change only the task periodicity and/or start time, click Schedule on the toolbar. Then you will have to perform only scheduling steps, leaving other settings the same.
Chapter 8. Managing Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is necessary for using Acronis Startup Recovery Manager. For more information about these functions, see 3.3 Acronis Secure Zone and 3.4 Acronis Startup Recovery Manager. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives.
The minimum size is about 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased. Partition resizing may require a reboot.
For example, if you use grub loader, add to /boot/grub/grub.conf or /boot/grub/menu.lst the following lines: title Acronis //or any desired title root (hd0,3) //ASZ location (available on summary screen), here: disk 0, partition 3 makeactive chainloader +1 After that execute the following command: grub-install /dev/hda //the hard disk from which grub will be loaded When Acronis Startup Recovery Manager is activated, it overwrites the master boot record (MBR) with its own boot code.
5. Next you will see a list of briefly described operations to be performed on partitions (disks). After you click Proceed, Acronis True Image Echo Server will start resizing the zone. Progress will be reflected in a special window. If necessary, you can stop the procedure by clicking Cancel. However, the procedure will be canceled only after the current operation is finished. Zone resizing can take several minutes or longer. Please wait until the whole procedure is finished. 8.
Chapter 9. Creating bootable media You can run Acronis True Image Echo Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Linux computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Echo Server version. Because Acronis True Image Echo Server is available only as a download, you must create bootable media using the Bootable Media Builder.
When using 3.5” diskettes, you will be able to write on a diskette (or a set of the diskettes) only one component at a time (for example, Acronis True Image Echo Server). To write another component, start Bootable Media Builder once again. 4. If you are creating removable media other than CD, insert the blank disk so the program can determine its capacity. If you chose to create a bootable disk ISO image, specify the ISO file name and the folder in which to place it. 5.
Chapter 10. Operations with archives 10.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. Here’s how to run a one-time validation task. For how to schedule regular archive validation, see 7.1 Creating scheduled tasks. 1. To start the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools menu. 2. Select the archive to validate.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 3. If you selected an archive containing incremental images, Acronis True Image Echo Server will suggest that you select one of the successive incremental images by its creation date/time.
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the comment to this file. 7. The program displays a summary containing a single operation. Click Proceed to mount the selected partition image. 8.
3. The program displays a list of backups belonging to the selected archive with the backups creation date and time. The list is very much alike to that in restore wizard. The upper backup is full, the rest are incremental ones. Tick off the backups you want to LEAVE. Editing images, mounted in R/W mode, results in creating incremental backups, that are a kind of offshoots of the incremental chain. Therefore, they cannot be consolidated and always will be excluded from the archive copy.
5. The program displays the summary window. Click Proceed to start consolidation. In our example, when consolidation is completed, the folder Backups will contain two archives MyBackup and MyBackup(1). The first is the source archive, the second is the copy consisting of MyBackup(1) and MyBackup(1)2. MyBackup(1) is a full backup containing data as of Tuesday, July 17, 2007, 5:35:09 PM. MyBackup(1)2 is an incremental backup containing data as of Tuesday, July 17, 2007, 6:54:40 PM.
Chapter 11. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Server can notify you when it is finished using the WinPopup service (if you address the notification to a computer, running Windows) or via e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion. By default all notifications are disabled. 11.
11.2 WinPopup notification To set up WinPopup notification, select Tools -> Options -> Notifications -> WinPopup: Provide the name of the Windows computer to which notifications will be sent. Below in this window you can choose whether you want to get notifications: - when the operation is completed successfully - when the operation failed - during the operation when user interaction is required. 11.3 Viewing logs Acronis True Image Echo Server allows users to view its working logs.
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows. To delete a log, select it and click Delete. If any step was terminated by an error, the corresponding log will be marked with a red circle with a white cross inside. The right window features the list of steps contained in the selected log.
Chapter 12. Console mode Console is a natural part of Linux OS. Acronis True Image Echo Server supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and recovery operations. Trueimagecmd also enables you to automate backup with ‘cron’ service. The trueimagecmd functionality is somewhat limited as compared to the GUI mode. trueimagecmd does not support operations that require reboot of the system, such as restore a system partition or clone system drive.
deploy_mbr Restores MBR from a disk or partition image verify Verifies the archive data integrity pit_info Displays the numbered list of backups, contained in the specified archive consolidate Creates a consistent copy of the archive, which will contain only specified backups list Lists available drives and partitions.
12.1.2 Common options (options common for most trueimagecmd commands) Option Description Archive location filename:[filename]* Archive name Other than ASZ password:[password] Specify the password for the archive (if required) Other than ASZ Specify the password for the ASZ (if required) ASZ Addresses to Acronis Secure Zone and selects the archive (a full backup with or without increments).
follows: --partition:1-1,1-2,1-3 or --oss_numbers --partition:1-1,15,1-6 log:[filename]* Create a log file of the current operation with the specified file name Any * To get Samba network access, specify the backup file name and the log file name as follows: --filename:smb://username:password@hostname/sharename/filename --log:smb://username:password@hostname/sharename/logfilename or: --filename:smb://hostname/sharename/filename –-net_user:username \ -–net_password:password --log:smb://hostname/sharename
filebackup include:[names] Files and folders to be included in the backup (comma separated). For example: --include:'/home/bot/ATIESsafe.iso,/home/bot/ATIW.iso' exclude_names:[names] exclude_masks:[masks] Files and folders to be excluded from the backup (comma separated). See the above example. Applies masks to select files to be excluded from the backup. Use the common masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .
other primary partitions, the restored partition will be set active - if the target disk is the 1st according to BIOS and there are other primary partitions on it, the restored partition will be set logical - if the target disk is not the 1st, the restored partition will be set logical. preserve_mbr When restoring a partition over an existing one, the target partition is deleted from the disk along with its entry in the target disk MBR.
list filename:[filename] With this option, the image contents is displayed. When listing image contents, partition numbers may not coincide with those in the drives/partitions list, if the image does not contain all the disk partitions. For example, if the image contains partitions 2-3 and 2-5, they will be listed as 2-1 and 2-2.
12.1.4 Trueimagecmd usage examples • This will list available partitions: trueimagecmd --list • This will list the partitions (and their indices) saved in backup.tib: trueimagecmd --list --filename:backup.tib • This will create an image named backup.tib of partition 1-1: trueimagecmd --partition:1-1 --filename:backup.tib \ --create • This will create an incremental image of the partition above: trueimagecmd --partition:1-1 --filename:backup.
trueimagecmd --consolidate \ --filename:/usr/backups/backups.tib --include_pits:2,3 \ --target_filename:/usr/backups/kons.tib • This will restore MBR from partition image D1 to the hard disk 1: trueimagecmd --deploy_mbr --filename:/usr/backups/D1.tib \ --harddisk:1 12.2 Automatic image creation using cron service As a rule, disk/partition images are created regularly, often daily. To automate this operation, you can use the cron service familiar to many UNIX users.
If needed, users can make their own backup schedule. For more information, see Help on the cron service. 12.3 Restoring files with trueimagemnt The trueimagemnt tool is designed to restore files from partition/disk images. It mounts Acronis True Image archives as if they were kernel space block devices. The program implements the user level part of the Acronis True Image Echo Server user mode block device service. The large part of functionality is handled by the snumbd kernel module.
nfs://hostname/share name:/remote filename For example: trueimagemnt -m /mnt/md1 -f nfs://dhcp6223.acronis.com/sdb3/nfs_root:/mike/md1.tib -i 2 mounts /mike/md1.tib archive, located on dhcp6-223.acronis.com node in /sdb3/nfs_root directory exported by NFS.
Chapter 13. Transferring the system to a new disk 13.1 General information Sooner or later any computer user finds out that the hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete. To protect yourself from unforeseen consequences, it would be better to leave the old disk data intact, as you will be able to delete it later. 14.3.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 13.3.
Having completed the required steps, you will add a new partition. To create another one, simply repeat those steps. If you make a mistake, click Back to redo. After you create the necessary partitions, uncheck the Create new partition in unallocated space box and click Next. 13.3.10 Old and new disk partition layouts In the next window, you will see rectangles indicating the source hard disk, including its partitions and unallocated space, as well as the new disk layout.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition’s size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there's unallocated space near it). Having provided the new location and size, click Next. You will be taken two steps back to the partition layout.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the server has space for another disk, it would be easier to add a data disk drive than to clone a system one.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there is unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process.