The rest of the commands and options are exactly the same. For this reason, the command line reference uses the terminology accepted in Acronis True Image Echo. The command line logs are saved in the old (Echo) format and cannot be converted to Acronis Backup & Recovery 10 logs.
Use this option when performing the following operations that require a reboot: recovering locked files, creating/deleting Acronis Secure Zone on a system disk, cloning a system disk. The machine will be rebooted automatically. To postpone the operation until a user reboots the system manually, add the /later option.
Page 16
MBR saved in the image. If the position is not empty, the existing entry will be moved to another position. Options specific for Universal Restore The following options are available when using the Universal Restore add-on to Acronis Backup & Recovery 10. ur_path:[path] Specifies using Acronis Universal Restore and the path to the drivers storage.
Page 17
(e.g. "Domain_name\User_name"). ur_password:[pwd] Specifies using Acronis Universal Restore and a password associated with the ur_username option value. ur_driver:[inf-filename] Specifies using Acronis Universal Restore and the mass-storage driver to be installed.
Page 19
FTP and SFTP, e.g.: /target_vault:ftp://ServerA/Folder1 CD, DVD – with the path specified as a local path, e.g.: /target_vault:F:\ Acronis Secure Zone, e.g.: /target_vault:atis:///asz Tapes, e.g.: /target_vault:atis:///tape?0 Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
Page 20
Drivers for the virtual machine reside in the storage, defined by the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\UniversalRestore\DriversPackPath. In case the storage has been moved, please change the key or use the command ur_path:[path].
Page 21
FTP and SFTP, e.g.: /vault:ftp://ServerA/Folder1 CD, DVD – with the path specified as a local path, e.g.: /vault:F:\ Acronis Secure Zone, e.g.: /vault:atis:///asz Tapes, e.g.: /vault:atis:///tape?0 Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
Page 22
1.1.3.14 asz_delete partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally based on each partition’s size. 1.1.3.15 clone harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk.
/create /filename:"C:\Test\1.tib" /partition:2-1,1-3 The image will be saved to the C:\Test\ folder. The following command will create an image of partitions 2-1 and 1-3 in the Acronis Secure Zone: trueimagecmd /create /asz /partition:2-1,1-3 The following command will create an image named 1.tib of partitions 2-1 and 1-3: trueimagecmd /create /filename:"\Test\1.tib"...
Page 24
The following command will restore the MBR from the image of hard disk 1 to the same hard disk 1. The image is contained in the 3rd backup created in archive number 2, located in Acronis Secure Zone that is protected with password ‘pswd’: trueimagecmd /deploy_mbr /harddisk:1 /asz:2 /index:3 /password:pswd ...
Page 27
1.1.4.11 Acronis Secure Zone: managing backups by file names The following command will list the Acronis Secure Zone size, free space and contents using generated filenames: trueimagecmd /asz_files /password:aszpw Assume that the contents of Acronis Secure Zone are as follows: C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files...
The above command will delete the incremental backup created on 8/15/2009 at 2:19. The next execution of the same command will delete the base FAAB backup. By continuing with the FAAA and AAA names, you can clear the Acronis Secure Zone except for the last remaining base backup that cannot be deleted.
To export all archives stored in a managed vault or to import all archives from a folder to a managed vault, you can use the scripts that are provided with Acronis Backup & Recovery 10 Storage Node. The scripts are located in the folder where the storage node is installed—by default, C:\Program Files\Acronis\StorageNode.
Arguments include the following: /help – outputs help information about TrueImageTerminal.exe parameters. /progress – outputs the progress of backup operations run either from Acronis Backup & Recovery 10 graphics user interface, or from the script. /execute: [script file name] – executes a script. If there are several scripts to be executed, they are queued.
2 Console mode in Linux Console is a natural part of Linux OS. Acronis Backup & Recovery 10 supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and recovery operations. trueimagecmd also enables you to automate backup with the ‘cron’ service.
Page 48
FTP and SFTP, e.g.: --vault:ftp://ServerA/Folder1 CD, DVD – with the path specified as a local path, e.g.: --vault:/mnt/cdrom Acronis Secure Zone, e.g.: --vault:atis:///asz Tapes, e.g.: --vault:atis:///tape?0 Unmanaged vaults are specified by their path. For example, if a vault is located in a folder, specify the path to that folder.
The following command will create an incremental image of the above partition: trueimagecmd --partition:1-1 --filename:backup.tib --create --incremental The following command will create an image of partition 1-1 in the Acronis Secure Zone: trueimagecmd --partition:1-1 --asz --create The following command will create an image of an MD device (which may reside on two or more partitions): trueimagecmd --partition:dyn1 --filename:backup.tib --create...
Backup & Recovery 10 archives as if they were kernel space block devices. The program implements the user level part of the user mode block device service of Acronis Backup & Recovery 10. The majority of the functionality is handled by the snumbd kernel module.
Page 53
A test command. Mounts a file, specified in the -f|--filename option, containing a valid Linux filesystem, as if it were an Acronis Backup & Recovery 10 archive. The command may be used, for example, to estimate an image compression level, by comparing the time, necessary for copying a file from the image, with the time for copying the mounted (non-compressed) file.