ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER - COMMAND LINE Cli Reference Manual

Advertisement

Quick Links

Acronis® Backup & Recovery™ 10
Advanced Server
Command Line Reference

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER - COMMAND LINE

  • Page 1 Acronis® Backup & Recovery™ 10 Advanced Server Command Line Reference...
  • Page 2: Table Of Contents

    Table of contents Command-line mode and scripting in Windows ............... 3 Agent for Windows command-line utility ................. 3 1.1.1 Supported commands ..........................3 1.1.2 Common options ............................8 1.1.3 Specific options ............................11 1.1.4 trueimagecmd.exe usage examples ......................21 Storage node command-line utility ..................26 1.2.1 Supported commands ..........................26 1.2.2...
  • Page 3: Command-Line Mode And Scripting In Windows

    The rest of the commands and options are exactly the same. For this reason, the command line reference uses the terminology accepted in Acronis True Image Echo. The command line logs are saved in the old (Echo) format and cannot be converted to Acronis Backup & Recovery 10 logs.
  • Page 4 /asz:[number of archive] /start:[start sector] /index:N /size:[partition size in sectors] /net_user:[username] /fat16_32 /net_password:[password] /type:[active|primary|logical] /ftp_user:[username] /preserve_mbr /ftp_password:[password] When using the Acronis Universal Restore /oss_numbers option: /reboot /log:[file name] /ur_path:[path] /ur_username:[user] /log_net_user:[remote user] /log_net_password:[password] /ur_password:[pwd] /ur_driver:[inf-filename] Copyright © Acronis, Inc., 2000-2010...
  • Page 5 /asz:[number of archive] /net_user:[username] /net_password:[password] /ftp_user:[username] /ftp_password:[password] /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] pit_info /filename:[file name] /password:[password] Displays the numbered /asz:[number of archive] list of backups, /net_user:[username] contained in the /net_password:[password] specified archive /ftp_user:[username] /ftp_password:[password] Copyright © Acronis, Inc., 2000-2010...
  • Page 6 /vault:[path] /partition:[partition number] /arc:[archive name] /letter:X Connects an image as a /arc_id:[archive id] virtual drive /filename:[file name]* /password:[password] /asz:[number of archive] /index:N Copyright © Acronis, Inc., 2000-2010...
  • Page 7 /log_net_password:[password] Acronis Secure Zone asz_delete /password:[password] /partition:[partition number] /oss_numbers Deletes the Acronis /reboot Secure Zone /log:[file name] /log_net_user:[remote user] /log_net_password:[password] asrm_activate Activates the Acronis Startup Recovery Manager asrm_deactivate Deactivates the Acronis Startup Recovery Manager Copyright © Acronis, Inc., 2000-2010...
  • Page 8: Common Options

    FTP and SFTP, e.g.: /vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /vault:F:\  Acronis Secure Zone, e.g.: /vault:atis:///asz  Tapes, e.g.: /vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 9 Specify a user name for network drive access. net_password:[password] Specify a password for network drive access. ftp_user:[username] Specify a user name for access to an FTP server. ftp_password:[password] Specify a password for access to an FTP server. Copyright © Acronis, Inc., 2000-2010...
  • Page 10: Backup Options

    If the log file is created on a network share, include the user name for logon to the share. log_net_password:[password] If the log file is created on a network share, include the password for logon to the share. Copyright © Acronis, Inc., 2000-2010...
  • Page 11: Specific Options

    Use this option to create an image of a disk (partition) with an unrecognized or unsupported file system. This will copy all disk/partition contents sector-by-sector. Without this option only the sectors containing useful system and user data are imaged (for the supported file systems). Copyright © Acronis, Inc., 2000-2010...
  • Page 12 1.1.3.2 filebackup include:[names] Files and folders to be included in the backup (comma separated). For example: /include:E:\Workarea\MyProject exclude_names:[names] Files and folders to be excluded from the backup (comma separated). For example: /exclude_names:E:\MyProject\111.doc,E:\MyProject\Old Copyright © Acronis, Inc., 2000-2010...
  • Page 13 In that case the file name must be specified without a drive letter or root folder. For example: /file_partition:D /filename:”\1.tib” Dynamic volumes are specified with the prefix DYN, e.g.: /file_partition:DYN1 /filename:”\1.tib” harddisk:[disk number] Specifies the basic hard disks to restore. Copyright © Acronis, Inc., 2000-2010...
  • Page 14 If no other primary partitions remain on the disk, the restored partition is set active. When restoring a partition on unallocated space, the program extracts the partition type from the image. For the primary partition, the type will be set as follows: Copyright © Acronis, Inc., 2000-2010...
  • Page 15 MBR saved in the image. If the position is not empty, the existing entry will be moved to another position. Options specific for Universal Restore The following options are available when using the Universal Restore add-on to Acronis Backup & Recovery 10. ur_path:[path] Specifies using Acronis Universal Restore and the path to the drivers storage.
  • Page 16 Specifies the password for logon to the network share to access the source archive. net_user:[username] Specifies the user name for logon to the network share to save the resulting archive. net_password:[password] Specifies the password for logon to the network share to save the resulting archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 17 FTP and SFTP, e.g.: /target_vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /target_vault:F:\  Acronis Secure Zone, e.g.: /target_vault:atis:///asz  Tapes, e.g.: /target_vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 18 Drivers for the virtual machine reside in the storage, defined by the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\UniversalRestore\DriversPackPath. In case the storage has been moved, please change the key or use the command ur_path:[path].
  • Page 19 FTP and SFTP, e.g.: /vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /vault:F:\  Acronis Secure Zone, e.g.: /vault:atis:///asz  Tapes, e.g.: /vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 20 1.1.3.13 asz_delete partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally based on each partition’s size. 1.1.3.14 clone harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk.
  • Page 21: Trueimagecmd.exe Usage Examples

    /create /filename:"C:\Test\1.tib" /partition:2-1,1-3 The image will be saved to the C:\Test\ folder.  The following command will create an image of partitions 2-1 and 1-3 in the Acronis Secure Zone: trueimagecmd /create /asz /partition:2-1,1-3  The following command will create an image named 1.tib of partitions 2-1 and 1-3: trueimagecmd /create /filename:"\Test\1.tib"...
  • Page 22 The following command will restore the MBR from the image of hard disk 1 to the same hard disk 1. The image is contained in the 3rd backup created in archive number 2, located in Acronis Secure Zone that is protected with password ‘pswd’: trueimagecmd /deploy_mbr /harddisk:1 /asz:2 /index:3 /password:pswd ...
  • Page 23 /convert /filename:C:\MyBackup.tib /target_filename:C:\MyHDD.vmdk /vm_type:vmware /harddisk:1,3 1.1.4.8 List  The following command will list available partitions: trueimagecmd /list  The following command will list contents of the latest image located in Acronis Secure Zone: trueimagecmd /list /asz Copyright © Acronis, Inc., 2000-2010...
  • Page 24 /list /filename:asz://2 /index:3 /password:aszpw which is equal to: trueimagecmd /list /asz:2 /index:3 /password:aszpw This will list content of the 3rd backup created in archive number 2, located in Acronis Secure Zone that is protected with password ‘aszpw’. Copyright © Acronis, Inc., 2000-2010...
  • Page 25 1.1.4.11 Acronis Secure Zone: managing backups by file names  The following command will list the Acronis Secure Zone size, free space and contents using generated filenames: trueimagecmd /asz_files /password:aszpw Assume that the contents of Acronis Secure Zone are as follows: C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files...
  • Page 26: Storage Node Command-Line Utility

    The above command will delete the incremental backup created on 8/15/2009 at 2:19. The next execution of the same command will delete the base FAAB backup. By continuing with the FAAA and AAA names, you can clear the Acronis Secure Zone except for the last remaining base backup that cannot be deleted.
  • Page 27: Options

    To view the UUIDs of the archives stored in a managed vault, use the list command—for example: StorageNodeCmd /list /vault:"bsp://My Storage Node/MyVault" Specify only one of these options. If both are specified, the arc_id option is used. Copyright © Acronis, Inc., 2000-2010...
  • Page 28 This option is ignored if the archive is not password-protected. 1.2.2.8 progress Specifies whether to show (/progress:on) or hide (/progress:off) the progress of an exporting or importing operation. Without this option, the progress is shown. Copyright © Acronis, Inc., 2000-2010...
  • Page 29: Examples

    The storage node manages a centralized vault whose name is My Vault. Listing the vault's archives The following command shows the list of archives that are stored in the vault. StorageNodeCmd /list /vault:"bsp://My Node/My Vault" The output will look similar to this: Archive name: My Archive Copyright © Acronis, Inc., 2000-2010...
  • Page 30 StorageNodeCmd /export /vault:"bsp://My Node/My Vault" /arc:"My Archive" /include_pits:0 /target_vault:"C:\Archives" /target_arc:"Exported Archive" Importing an archive The following command imports the Archive 1 archive from the C:\Archives folder to the vault. StorageNodeCmd /import /vault:"C:\Archives" /arc:"Archive 1" /target_vault:"bsp://My Node/My Vault" Copyright © Acronis, Inc., 2000-2010...
  • Page 31: Exporting Vaults And Importing Multiple Archives

    To export all archives stored in a managed vault or to import all archives from a folder to a managed vault, you can use the scripts that are provided with Acronis Backup & Recovery 10 Storage Node. The scripts are located in the folder where the storage node is installed—by default, C:\Program Files\Acronis\StorageNode.
  • Page 32: Script Structure

    If equal to “true” (or “1”) and there is already a file with the specified name, an incremental image will be created. Otherwise the program will create a complete image file. The default value for this parameter is “true”. Copyright © Acronis, Inc., 2000-2010...
  • Page 33: Script Usage Examples

    The script for backing up to tape (tapeN specifies the tape numbers): <? xml version="1.0" encoding="utf-8" ?> <backup> <source letter =”c” /> <source letter ="f" /> <target cdrw="\taperecorder\\\.\tape0|||” /> <target cdrw="\taperecorder\\\.\tape1|||” /> <options compression="high" incremental="true" description="this is my backup" /> </backup> Copyright © Acronis, Inc., 2000-2010...
  • Page 34: Console Mode In Linux

    2 Console mode in Linux Console is a natural part of Linux OS. Acronis Backup & Recovery 10 supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and recovery operations. trueimagecmd also enables you to automate backup with the ‘cron’ service.
  • Page 35 --vault:[path] --target_vault:[target path] --arc:[archive name] --target_arc:[target archive name] Creates a copy of an archive --arc_id:[archive id] or a self-sufficient part copy --include_pits:[pits numbers] of an archive in the location --password:[password] Copyright © Acronis, Inc., 2000-2010...
  • Page 36 Activates the Acronis Startup Recovery Manager asrm_deactivate Deactivates the Acronis Startup Recovery Manager clone --harddisk:[disk number] --target_harddisk:[disk number] Clones a hard disk help Shows usage ls_check Checks if there are licenses for the local machine on the Copyright © Acronis, Inc., 2000-2010...
  • Page 37: Common Options

    FTP and SFTP, e.g.: --vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: --vault:/mnt/cdrom  Acronis Secure Zone, e.g.: --vault:atis:///asz  Tapes, e.g.: --vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 38 For example: trueimagecmd --list --filename:nfs://dhcp6- 223.acronis.com/sdb3/nfs_root:/mike/md1.tib shows contents of /mike/md1.tib archive. /mike/md1.tib is located on dhcp6-223.acronis.com node in /sdb3/nfs_root directory exported by NFS. If the vault option is specified the filename option is ignored. password:[password] a) Password for the archive, if the archive location is other than ASZ.
  • Page 39 1-3, 1-4 and logical partitions numbers start with 1-5. For example, if the disk has one primary and two logical partitions, their numbers can appear as follows: --partition:1-1,1-2,1-3 --oss_numbers --partition:1-1,1-5,1-6 log:[file name] Create a log file of the current operation with the specified file name. Copyright © Acronis, Inc., 2000-2010...
  • Page 40: Specific Options

    Excludes all hidden files from the backup. In Linux, a file is considered hidden if the first symbol in the file name is a dot. before:[pre-data capture command] Enables to define the command to be automatically executed before data capture. Copyright © Acronis, Inc., 2000-2010...
  • Page 41 Enables to define the command to be automatically executed after data capture. progress:[on | off] Shows/hides the progress information (percent completed). It is shown by default. 2.1.3.3 restore harddisk:[disk number] Specifies the hard disks to restore by numbers. Copyright © Acronis, Inc., 2000-2010...
  • Page 42 MBR. Then, with the preserve_mbr option, the restored partition's entry will occupy the upper empty position in the target disk MBR. Thus, the target disk MBR is preserved. If not specified, the restored partition's entry will occupy the same position as in the Copyright © Acronis, Inc., 2000-2010...
  • Page 43 2.1.3.6 consolidate target_filename:[file name] Specifies the path to and name of the archive copy to be created. If there are two or more backups (pits) in the copy, numbers will be added to their names. Copyright © Acronis, Inc., 2000-2010...
  • Page 44 FTP and SFTP, e.g.: --vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: --vault:/mnt/cdrom  Acronis Secure Zone, e.g.: --vault:atis:///asz  Tapes, e.g.: --vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 45 Password for the archive, if the archive location is other than ASZ. b) Password for the ASZ, if archive location is ASZ. harddisk:X Specifies the hard disk number where the Acronis Secure Zone will be created. partition:[partition number] Specifies partitions from which free space will be taken for Acronis Secure Zone.
  • Page 46: Trueimagecmd Usage Examples

    2.1.3.10 asz_delete partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally based on each partition’s size. 2.1.3.11 clone harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk.
  • Page 47: Automatic Image Creation Using Cron Service

    UNIX users. As an example, let’s consider a situation where you (the system administrator) need to back up one or more disk partitions regularly. Use the --list command to obtain the necessary partition number: Copyright © Acronis, Inc., 2000-2010...
  • Page 48: Restoring Files With Trueimagemnt

    Backup & Recovery 10 archives as if they were kernel space block devices. The program implements the user level part of the user mode block device service of Acronis Backup & Recovery 10. The majority of the functionality is handled by the snumbd kernel module.
  • Page 49 A test command. Mounts a file, specified in the -f|--filename option, containing a valid Linux filesystem, as if it were an Acronis Backup & Recovery 10 archive. The command may be used, for example, to estimate an image compression level, by comparing the time, necessary for copying a file from the image, with the time for copying the mounted (non-compressed) file.
  • Page 50: Trueimagemnt Usage Examples

    The following command will mount the archive backup.tib of the partition with index 2, to /mnt/backup: trueimagemnt --mount /mnt/backup --filename backup.tib --index 2  The following command will unmount a partition mounted at /mnt/backup: trueimagemnt --umount /mnt/backup Copyright © Acronis, Inc., 2000-2010...
  • Page 51: Index

    Common options • 8, 37 compression [0…9] • 10, 39 Access to archives • 8, 37 Console mode in Linux • 34 Acronis Secure Zone consolidate • 16, 43 deleting backups • 25 Consolidate backups • 22 managing backups by archive numbers convert •...
  • Page 52 X • 19, 20 list • 18, 44 raw • 11, 40 List • 23 reboot • 10 log • 28 restore • 41 [file name] • 10, 39 Restore disks and partitions • 21 Copyright © Acronis, Inc., 2000-2010...
  • Page 53 [target folder] • 16, 43 target_harddisk [disk number] • 14, 15, 20, 42, 43, 46 target_partition [partition number] • 14, 42 target_vault • 29 [target path] • 17, 44 trueimagecmd usage examples • 46 Copyright © Acronis, Inc., 2000-2010...

This manual is also suitable for:

Backup & recovery 10 advanced server

Table of Contents