ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - COMMAND LINE REFERENCE UPDATE 3 Cli Reference Manual

Advertisement

Quick Links

Acronis® Backup & Recovery ™ 10
Advanced Server Virtual Edition
Update 3
Command Line Reference

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - COMMAND LINE REFERENCE UPDATE 3

  • Page 1 Acronis® Backup & Recovery ™ 10 Advanced Server Virtual Edition Update 3 Command Line Reference...
  • Page 2: Table Of Contents

    Table of contents Command-line mode and scripting in Windows ................. 3 Agent for Windows command-line utility ................3 1.1.1 Supported commands ..........................3 1.1.2 Common options ............................8 1.1.3 Specific options ............................12 1.1.4 trueimagecmd.exe usage examples ....................... 23 Storage node command-line utility ..................28 1.2.1 Supported commands ..........................
  • Page 3: Command-Line Mode And Scripting In Windows

    The rest of the commands and options are exactly the same. For this reason, the command line reference uses the terminology accepted in Acronis True Image Echo. The command line logs are saved in the old (Echo) format and cannot be converted to Acronis Backup & Recovery 10 logs.
  • Page 4 /arc_id:[archive id] /partition:[partition number] partitions, except for /filename:[file name] /target_harddisk:[disk number] the MBR, from an /password:[password] /target_partition:[partition number] image /asz:[number of archive] /start:[start sector] /index:N /size:[partition size in sectors] /net_user:[username] /fat16_32 /net_password:[password] /type:[active|primary|logical] /ftp_user:[username] /preserve_mbr Copyright © Acronis, Inc., 2000-2010...
  • Page 5 /ftp_password:[password] When using the Acronis Universal Restore /oss_numbers option: /reboot /ur_path:[path] /log:[file name] /ur_username:[user] /log_net_user:[remote user] /ur_password:[pwd] /log_net_password:[password] /ur_driver:[inf-filename] /silent deploy_mbr /vault:[path] /harddisk:[disk number] /arc:[archive name] /target_harddisk:[disk number] Restores the MBR from /arc_id:[archive id] a disk or partition /filename:[file name]...
  • Page 6 /arc:[archive name] and partitions. When /net_user:[username] /arc_id:[archive id] used with the filename /net_password:[password] option, it lists the /ftp_user:[username] image contents. /ftp_password:[password] When used with the vault option, it lists archives located in the specified location. Copyright © Acronis, Inc., 2000-2010...
  • Page 7 Secure Zone size, free space and contents using the generated file names asz_delete_files /filename:[file name] /password:[password] Deletes the most /log:[file name] recent backup in the /log_net_user:[remote user] archive located in the /log_net_password:[password] Acronis Secure Zone /silent Copyright © Acronis, Inc., 2000-2010...
  • Page 8: Common Options

    Managed vaults (for advanced product editions only), e.g.: /vault:bsp://StorageNode/VaultName  FTP and SFTP, e.g.: /vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /vault:F:\  Acronis Secure Zone, e.g.: /vault:atis:///asz  Tapes, e.g.: /vault:atis:///tape?0 Copyright © Acronis, Inc., 2000-2010...
  • Page 9 To get a backup index from the ASZ, use asz_content. include_pits:[pits numbers] Specifies the backups (pits) to be included in the archive copy. To get the numbers of pits, use pit_info. Separate multiple values with a comma, for example: /include_pits:2,4,5 Copyright © Acronis, Inc., 2000-2010...
  • Page 10: Backup Options

    The password itself is not stored anywhere on the disk or in the backup file; the password hash is used for verification purposes. With this two-level security, the backup data is protected from any unauthorized access, but recovering a lost password is not possible. Copyright © Acronis, Inc., 2000-2010...
  • Page 11: General Options

    Use this option when performing the following operations that require a reboot: recovering locked files, creating/deleting Acronis Secure Zone on a system disk, cloning a system disk. The machine will be rebooted automatically. To postpone the operation until a user reboots the system manually, add the /later option.
  • Page 12: Specific Options

    /list. Partition numbers are specified as <disk number>-<partition number>, e.g.: /partition:1-1,1-2,3-1 Dynamic volumes are specified with the prefix DYN, e.g.: /partition:DYN1,DYN2 Both basic partitions and dynamic volumes can be specified by their letters, for example: /partition:"C" Mixed notation is also acceptable, for example: Copyright © Acronis, Inc., 2000-2010...
  • Page 13 For example: /before:"net stop MSSQLSERVER" after:[post-data capture command] Enables to define the command to be automatically executed after data capture at the beginning of the backup procedure. For example: /after:"net start MSSQLSERVER" Copyright © Acronis, Inc., 2000-2010...
  • Page 14 /after:"net start MSSQLSERVER" use_vss Notifies the VSS-aware applications that the backup is about to start. This ensures the consistent state of all data used by the applications, in particular, completion of all database transactions, at the Copyright © Acronis, Inc., 2000-2010...
  • Page 15 /partition option. Dynamic volumes are specified with the prefix DYN, e.g.: /target_partition:DYN1 start:[start sector] Sets the start sector for restoring a partition to the hard disk unallocated space. Copyright © Acronis, Inc., 2000-2010...
  • Page 16 MBR saved in the image. If the position is not empty, the existing entry will be moved to another position. Options specific for Universal Restore The following options are available when using the Universal Restore add-on to Acronis Backup & Recovery 10. ur_path:[path] Specifies using Acronis Universal Restore and the path to the drivers storage.
  • Page 17 (e.g. "Domain_name\User_name"). ur_password:[pwd] Specifies using Acronis Universal Restore and a password associated with the ur_username option value. ur_driver:[inf-filename] Specifies using Acronis Universal Restore and the mass-storage driver to be installed.
  • Page 18 Specifies the user name for logon to the network share to access the source archive. net_src_password:[password] Specifies the password for logon to the network share to access the source archive. net_user:[username] Specifies the user name for logon to the network share to save the resulting archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 19 FTP and SFTP, e.g.: /target_vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /target_vault:F:\  Acronis Secure Zone, e.g.: /target_vault:atis:///asz  Tapes, e.g.: /target_vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 20 Drivers for the virtual machine reside in the storage, defined by the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\UniversalRestore\DriversPackPath. In case the storage has been moved, please change the key or use the command ur_path:[path].
  • Page 21 FTP and SFTP, e.g.: /vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: /vault:F:\  Acronis Secure Zone, e.g.: /vault:atis:///asz  Tapes, e.g.: /vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 22 1.1.3.14 asz_delete partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally based on each partition’s size. 1.1.3.15 clone harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk.
  • Page 23: Trueimagecmd.exe Usage Examples

    /create /filename:"C:\Test\1.tib" /partition:2-1,1-3 The image will be saved to the C:\Test\ folder.  The following command will create an image of partitions 2-1 and 1-3 in the Acronis Secure Zone: trueimagecmd /create /asz /partition:2-1,1-3  The following command will create an image named 1.tib of partitions 2-1 and 1-3: trueimagecmd /create /filename:"\Test\1.tib"...
  • Page 24 The following command will restore the MBR from the image of hard disk 1 to the same hard disk 1. The image is contained in the 3rd backup created in archive number 2, located in Acronis Secure Zone that is protected with password ‘pswd’: trueimagecmd /deploy_mbr /harddisk:1 /asz:2 /index:3 /password:pswd ...
  • Page 25 /convert /filename:C:\MyBackup.tib /target_filename:C:\MyHDD.vmdk /vm_type:vmware /harddisk:1,3 1.1.4.8 List  The following command will list available partitions: trueimagecmd /list  The following command will list contents of the latest image located in Acronis Secure Zone: trueimagecmd /list /asz Copyright © Acronis, Inc., 2000-2010...
  • Page 26 /list /filename:asz://2 /index:3 /password:aszpw which is equal to: trueimagecmd /list /asz:2 /index:3 /password:aszpw This will list content of the 3rd backup created in archive number 2, located in Acronis Secure Zone that is protected with password ‘aszpw’. Copyright © Acronis, Inc., 2000-2010...
  • Page 27 1.1.4.11 Acronis Secure Zone: managing backups by file names  The following command will list the Acronis Secure Zone size, free space and contents using generated filenames: trueimagecmd /asz_files /password:aszpw Assume that the contents of Acronis Secure Zone are as follows: C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files...
  • Page 28: Storage Node Command-Line Utility

    The above command will delete the incremental backup created on 8/15/2009 at 2:19. The next execution of the same command will delete the base FAAB backup. By continuing with the FAAA and AAA names, you can clear the Acronis Secure Zone except for the last remaining base backup that cannot be deleted.
  • Page 29: Options

    The arc_id option specifies the Universally Unique Identifier (UUID) of the archive—for example: /arc_id:183DE307-BC97-45CE-9AF7-60945A568BE8 To view the UUIDs of the archives stored in a managed vault, use the list command—for example: Copyright © Acronis, Inc., 2000-2010...
  • Page 30 Specifies access credentials to the file whose name is given by log—for example: /log_net_user:"User A" 1.2.2.7 password Specifies the password for a password-protected archive whose name is given by arc or arc_id—for example: /password:"My PassWd123" This option is ignored if the archive is not password-protected. Copyright © Acronis, Inc., 2000-2010...
  • Page 31: Examples

    You are running the StorageNodeCmd utility on a machine where a storage node is installed.  The name of the storage node is My Node.  The storage node manages a centralized vault whose name is My Vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 32 The following command exports the newest backup of the My Archive archive. Such backup is identified by the pit number 0 in addition to its own pit number. The exported backup is saved in the C:\Archives folder in the Exported Archive archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 33: Exporting Vaults And Importing Multiple Archives

    To export all archives stored in a managed vault or to import all archives from a folder to a managed vault, you can use the scripts that are provided with Acronis Backup & Recovery 10 Storage Node. The scripts are located in the folder where the storage node is installed—by default, C:\Program Files\Acronis\StorageNode.
  • Page 34: Script Structure

    Arguments include the following: /help – outputs help information about TrueImageTerminal.exe parameters. /progress – outputs the progress of backup operations run either from Acronis Backup & Recovery 10 graphics user interface, or from the script. /execute: [script file name] – executes a script. If there are several scripts to be executed, they are queued.
  • Page 35: Script Usage Examples

    The script for backing up to tape (tapeN specifies the tape numbers): <? xml version="1.0" encoding="utf-8" ?> <backup> <source letter =”c” /> <source letter ="f" /> <target cdrw="\taperecorder\\\.\tape0|||” /> <target cdrw="\taperecorder\\\.\tape1|||” /> <options compression="high" incremental="true" description="this is my backup" /> </backup> Copyright © Acronis, Inc., 2000-2010...
  • Page 36: Console Mode In Linux

    2 Console mode in Linux Console is a natural part of Linux OS. Acronis Backup & Recovery 10 supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and recovery operations. trueimagecmd also enables you to automate backup with the ‘cron’ service.
  • Page 37 --original_date:[on|off] --password:[password] --include:[names] --asz:[number of archive] --index:N --log:[filename] --silent deploy_mbr --vault:[path] --harddisk:[disk number] --arc:[archive name] --target_harddisk:[disk number] Restores the MBR from a --arc_id:[archive id] disk or partition image --filename:[filename] --password:[password] --asz:[number of archive] --index:N --oss_numbers Copyright © Acronis, Inc., 2000-2010...
  • Page 38 When the arc, or the arc_id option is added, it lists all backups contained in the archive. asz_create --password:[password] --harddisk:X --oss_numbers --partition:[partition number] Creates the Acronis Secure --log:[filename] --size:[ASZ size in sectors] Zone on the selected drive --silent Copyright © Acronis, Inc., 2000-2010...
  • Page 39: Common Options

    Access to archives vault:[path] Specifies a path to the location that contains the archive. Used in combination with the arc, or the arc_id option. The following locations are supported:  Local folders, e.g.: --vault:/folder, or --vault:"/Folder 1" Copyright © Acronis, Inc., 2000-2010...
  • Page 40 For example: trueimagecmd --list --filename:nfs://dhcp6-223.acronis.com/sdb3/nfs_root:/mike/md1.tib shows contents of /mike/md1.tib archive. /mike/md1.tib is located on dhcp6-223.acronis.com node in /sdb3/nfs_root directory exported by NFS. If the vault option is specified the filename option is ignored. Copyright © Acronis, Inc., 2000-2010...
  • Page 41 Separate multiple values with a comma, for example: --include_pits:2,4,5 2.1.2.2 Backup options incremental Set the backup type to incremental. If not specified or there is no basic full backup, a full backup will be created. Copyright © Acronis, Inc., 2000-2010...
  • Page 42 1-3, 1-4 and logical partitions numbers start with 1-5. For example, if the disk has one primary and two logical partitions, their numbers can appear as follows: --partition:1-1,1-2,1-3 --oss_numbers --partition:1-1,1-5,1-6 log:[file name] Create a log file of the current operation with the specified file name. silent Suppresses the command's output. Copyright © Acronis, Inc., 2000-2010...
  • Page 43: Specific Options

    For example, to exclude all files with extension .sh, add *.sh. My???.sh will exclude all .sh files with names consisting of five symbols and starting with "my". exclude_hidden Excludes all hidden files from the backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 44 Enables to define the command to be automatically executed before data capture. after:[post-data capture command] Enables to define the command to be automatically executed after data capture. progress:[on | off] Shows/hides the progress information (percent completed). It is shown by default. Copyright © Acronis, Inc., 2000-2010...
  • Page 45 If the target partition is primary, and there are other primary partitions on the disk, one of them will be set active, while the restored partition becomes primary. If no other primary partitions remain on the disk, the restored partition is set active. Copyright © Acronis, Inc., 2000-2010...
  • Page 46 Specifies whether to restore files’ original date and time from the archive or whether to assign the current date and time to the restored files. If not specified, the current date is assigned. include:[names] Specifies the files and folders to restore from the file backup (comma separated). For example: Copyright © Acronis, Inc., 2000-2010...
  • Page 47 (pits) in the copy, numbers will be added to their names. 2.1.3.8 export target_vault:[target path] Specifies a path to the target location to export the archive to. The following target locations are supported:  Local folders and unmanaged vaults, e.g.: --vault:/folder, or --vault:"/Folder 1" Copyright © Acronis, Inc., 2000-2010...
  • Page 48 FTP and SFTP, e.g.: --vault:ftp://ServerA/Folder1  CD, DVD – with the path specified as a local path, e.g.: --vault:/mnt/cdrom  Acronis Secure Zone, e.g.: --vault:atis:///asz  Tapes, e.g.: --vault:atis:///tape?0  Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
  • Page 49 Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally based on each partition’s size. Copyright © Acronis, Inc., 2000-2010...
  • Page 50: Trueimagecmd Usage Examples

    The following command will create an incremental image of the above partition: trueimagecmd --partition:1-1 --filename:backup.tib --create --incremental  The following command will create an image of partition 1-1 in the Acronis Secure Zone: trueimagecmd --partition:1-1 --asz --create  The following command will create an image of an MD device (which may reside on two or more partitions): trueimagecmd --partition:dyn1 --filename:backup.tib --create...
  • Page 51: Automatic Image Creation Using Cron Service

    UNIX users. As an example, let’s consider a situation where you (the system administrator) need to back up one or more disk partitions regularly. Use the --list command to obtain the necessary partition number: Copyright © Acronis, Inc., 2000-2010...
  • Page 52: Restoring Files With Trueimagemnt

    Backup & Recovery 10 archives as if they were kernel space block devices. The program implements the user level part of the user mode block device service of Acronis Backup & Recovery 10. The majority of the functionality is handled by the snumbd kernel module.
  • Page 53 A test command. Mounts a file, specified in the -f|--filename option, containing a valid Linux filesystem, as if it were an Acronis Backup & Recovery 10 archive. The command may be used, for example, to estimate an image compression level, by comparing the time, necessary for copying a file from the image, with the time for copying the mounted (non-compressed) file.
  • Page 54: Trueimagemnt Usage Examples

    The following command will mount the archive backup.tib of the partition with index 2, to /mnt/backup: trueimagemnt --mount /mnt/backup --filename backup.tib --index 2  The following command will unmount a partition mounted at /mnt/backup: trueimagemnt --umount /mnt/backup Copyright © Acronis, Inc., 2000-2010...

This manual is also suitable for:

Backup & recovery 10 advanced server virtual edition

Table of Contents