background image

27 

Copyright © Acronis, Inc., 2000-2010 

 

 

1.1.4.11

 

Acronis Secure Zone: managing backups by file names 

 

The following command will list the Acronis Secure Zone size, free space and contents using 
generated filenames: 

trueimagecmd /asz_files /password:aszpw 

Assume that the contents of Acronis Secure Zone are as follows: 

C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files 
/password: aaa 
ASZ size: 5.387 GB 
ASZ free space: 4.363 GB 
FILE name: AAA2.TIB; size: 56414317 byte 
     type: image, base; creation time: 2/16/2009 3:43:34 PM 
     type: image, incremental; creation time: 4/25/2009 11:44:47 AM 
FILE name: FAAA.TIB; size: 3125550 byte 
     type: file, base; creation time: 8/22/2009 12:28:40 PM 
FILE name: FAAB2.TIB; size: 5147 byte 
     type: file, base; creation time: 8/14/2009 2:17:45 PM 
     type: file, incremental; creation time: 8/15/2009 2:19:43 AM 

In our example, the Acronis Secure Zone contains three archives. 

Archive AAA2 (2 stands for the number of backups in the archive) consists of: 

 

full (base) image backup created on 

2/16/2009 at 3:43

 

 

incremental backup created on 

4/25/2009 at 11:44

.   

Archive FAAA (F means that this is a file-level archive) contains one base file-level backup. 

Archive FAAB2 (B means that this is the second file-level archive in the zone) consists of: 

 

full (base) file-level backup created on 

8/14/2009 at 2:17

 

 

incremental backup created on 

8/15/2009 at 2:19

trueimagecmd /filerestore /filename:asz://FAAA /target_folder:e: 

/password:aszpw 

This will restore files and folders with their original paths from the sole base backup FAAA to the root 
of partition E. 

C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /filerestore 
/filename:asz://FAAA /target_folder:e: /password:aaa 
[########################################] 100% 
 
Operation has succeeded. 

 

1.1.4.12

 

Acronis Secure Zone: deleting backups 

 

The following command will delete the most recent backup in the FAAB archive: 

trueimagecmd /asz_delete_files /password:aszpw /filename:FAAB.tib 

Assume, the contents of Acronis Secure Zone are as follows: 

Summary of Contents for BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - COMMAND LINE REFERENCE UPDATE 3

Page 1: ...Update 3 Acronis Backup Recovery 10 Advanced Server SBS Edition Command Line Reference ...

Page 2: ... options 8 1 1 3 Specific options 12 1 1 4 trueimagecmd exe usage examples 23 1 2 Storage node command line utility 28 1 2 1 Supported commands 28 1 2 2 Options 29 1 2 3 Examples 31 1 2 4 Exporting vaults and importing multiple archives 33 1 3 Scripting 33 1 3 1 Script execution parameters 33 1 3 2 Script structure 34 1 3 3 Script usage examples 35 ...

Page 3: ...y is somewhat more limited than the GUI mode You will not be able to perform recovery of a system volume operations that require a user interaction such as inserting removable media CD DVD or tape The operation fails if there is no media in the drive or the inserted media is full These operations only can be done through the GUI Scripting is intended only for backup 1 1 Agent for Windows command l...

Page 4: ...ault path arc archive name arc_id archive id filename file name password password crypt AES128 AES192 AES256 asz number of archive net_user username net_password password ftp_user username ftp_password password incremental differential compression 0 9 split size in MB reboot log file name log_net_user remote user log_net_password password silent include names exclude_names names exclude_masks mask...

Page 5: ...mber target_harddisk disk number filerestore Restores files and folders from a file archive vault path arc archive name arc_id archive id filename file name password password asz number of archive index N net_user username net_password password ftp_user username ftp_password password reboot later log file name log_net_user remote user log_net_password password silent target_folder target folder ov...

Page 6: ...ssword password progress on off log file name log_net_user remote user log_net_password password silent net_src_user username net_src_password password ftp_src_user username ftp_src_password password target_vault target path target_arc target archive name net_user username net_password password convert Converts an image to virtual disk format for using with a virtual machine filename file name pas...

Page 7: ...ted as a virtual drive letter X letter all asz_create Creates the Acronis Secure Zone on the selected drive password password oss_numbers reboot later log file name log_net_user remote user log_net_password password silent harddisk X partition partition number size ASZ size in sectors unallocated asz_content Displays the Acronis Secure Zone size free space and contents password password asz_files ...

Page 8: ...hows usage ls_check Checks if there are licenses for the local machine on the license server 1 1 2 Common options 1 1 2 1 Access to archives vault path Specifies a path to the location that contains the archive Used in combination with the arc or the arc_id option The following locations are supported Local folders e g vault C Test or vault C Test 1 Network folders e g vault ServerA Share Managed ...

Page 9: ... ASZ b Archive name when restoring or deleting files from ASZ Can be obtained with asz_files If the vault option is specified the filename option is ignored password password a Password for the archive if the archive location is other than ASZ b Password for the ASZ if archive location is ASZ asz number of archive Addresses to the ASZ and selects the archive a full backup with or without increment...

Page 10: ...up type to differential If not specified or there is no basic full backup a full backup will be created compression 0 9 Specify the data compression level It ranges from 0 to 9 and is set to 3 by default crypt AES128 AES192 AES256 Specifies the key size for the AES algorithm encryption of the password protected archive The option is used together with the password p 9 option For example password Q...

Page 11: ...ine will be rebooted automatically To postpone the operation until a user reboots the system manually add the later option With this option the operation will be performed after the user initiates a reboot The reboot option can be used with operations that do not necessarily require a reboot Examples of such operations are recovery under bootable media recovering files that are not locked by the o...

Page 12: ...the hard disks to include into the image file The list of available hard disks is provided by the list command An image may contain data of more than one hard disk In that case separate disk numbers by commas e g harddisk 1 3 By specifying harddisk DYN you will back up all dynamic volumes present in the system partition partition number Specifies the partitions to include into the image file The l...

Page 13: ... hides the progress information percent completed It is shown by default exclude_names names Files and folders to be excluded from the backup comma separated For example exclude_names E MyProject 111 doc E MyProject Old exclude_masks masks Applies masks to select files to be excluded from the backup Use the common Windows masking rules For example to exclude all files with extension exe add exe My...

Page 14: ...s to select files to be excluded from the backup Use the common Windows masking rules For example to exclude all files with extension exe add exe My exe will exclude all exe files with names consisting of five symbols and starting with my exclude_system Excludes all system files from the backup exclude_hidden Excludes all hidden files from the backup before pre data capture command Enables to defi...

Page 15: ...ies the basic hard disks to restore partition partition number Specifies the partitions to restore Dynamic volumes are specified with the prefix DYN e g partition DYN1 target_harddisk disk number Specifies the hard disk number where the image will be restored By specifying target_harddisk DYN you will select unallocated space on all dynamic disks that are present in the system target_partition par...

Page 16: ... it has no other primary partitions the restored partition will be set active if the target disk is the 1st according to BIOS and there are other primary partitions on it the restored partition will be set logical if the target disk is not the 1st the restored partition will be set logical preserve_mbr When restoring a partition over an existing one the target partition is deleted from the disk al...

Page 17: ... specified the original path is re created from the archive overwrite older never always This option allows you to keep useful data changes made since the backup being restored was done Choose what to do if the target folder contains a file with the same name as in the archive older this will give priority to the most recent file modification whether it be in the archive or on the disk never this ...

Page 18: ...th the folder_name p 18 option Prohibits verification of archives stored in the subfolders of the specified folder For example folder_name D MyBackups no_subdir If the option not specified all archives stored in the parent folder and its subfolders will be verified 1 1 3 7 consolidate target_filename file name Specifies the path to and name of the archive copy to be created If there are two or mor...

Page 19: ...s are supported Local folders e g target_vault C Test or vault C Test 1 Network folders e g target_vault ServerA Share Managed vaults for advanced product editions only e g target_vault bsp StorageNode VaultName FTP and SFTP e g target_vault ftp ServerA Folder1 CD DVD with the path specified as a local path e g target_vault F Acronis Secure Zone e g target_vault atis asz Tapes e g target_vault ati...

Page 20: ...resulting virtual disk is supposed to be bootable With this key the program will add drivers necessary for the virtual machine type selected with the vm_type key to the resulting virtual disk If the image was taken from a virtual machine of the same type normally the key is not needed Drivers for the virtual machine reside in the storage defined by the registry key HKEY_LOCAL_MACHINE SOFTWARE Acro...

Page 21: ...e path specified as a local path e g vault F Acronis Secure Zone e g vault atis asz Tapes e g vault atis tape 0 Unmanaged vaults are specified by their path For example if a vault is located in a folder specify the path to that folder If the vault option is specified the filename option is ignored arc archive name Used in combination with the vault option Lists all backups contained in the archive...

Page 22: ... free space on all partitions selected with the partition option and minimal about 35MB values Either way the program will first use the unallocated space If there is not enough unallocated space the selected partitions will be decreased Resizing of locked partitions requires a reboot With unallocated the zone will use all unallocated space on the disk Partitions will be moved if necessary but not...

Page 23: ...d with password qwerty split into 640 MB parts and contain all cluster data Image compression level is 5 The server will be rebooted after the operation is completed The following command will create an image of partition 2 1 named arc tib in the shared folder server1 folder trueimagecmd create partition 2 1 filename server1 folder arc tib net_user user1 net_password pw1 log server2 dir log1 log l...

Page 24: ...1 asz 2 index 3 password pswd The following command will restore the MBR from the image of hard disk 1 to hard disk 2 The image is contained in the arc tib file located on the FTP server trueimagecmd deploy_mbr harddisk 1 target_harddisk 2 filename ftp server folder arc tib ftp_user fuser ftp_password fpswd 1 1 4 3 Back up files The following command will back up files from the MyProject folder re...

Page 25: ...ted in D Backups to the new archive Archive 2 on the FTP server Server22 Vault3 trueimagecmd export vault D Backups arc Archive 1 include_pits 2 4 5 target_vault ftp Server22 Vault3 target_arc Archive 2 ftp_user user ftp_password password progress on The following command will export 2 backups pits from the archive Archive 1 located in managed vault Vault1 to the new archive Archive 2 on the netwo...

Page 26: ...e and contents trueimagecmd asz_content Assume that the contents of Acronis Secure Zone are as follows C Program Files Acronis BackupAndRecovery trueimagecmd asz_content ASZ size 34 439 GB ASZ free space 34 409 GB ARCHIVE number 1 index 1 type file base creation time 4 2 2009 3 52 PM ARCHIVE number 2 index 1 type file base creation time 4 2 2009 4 04 PM index 2 type file incremental creation time ...

Page 27: ...three archives Archive AAA2 2 stands for the number of backups in the archive consists of full base image backup created on 2 16 2009 at 3 43 incremental backup created on 4 25 2009 at 11 44 Archive FAAA F means that this is a file level archive contains one base file level backup Archive FAAB2 B means that this is the second file level archive in the zone consists of full base file level backup c...

Page 28: ... Clone The following command will clone hard disk 2 to hard disk 3 trueimagecmd clone harddisk 2 target_harddisk 3 1 1 4 14 Explore image The following command will connect all images stored in file mybackup tib on the network drive as virtual drives trueimagecmd explore filename myserver backup mybackup tib net_user john net_password qwerty 1 2 Storage node command line utility The StorageNodeCmd...

Page 29: ...ralized managed vault vault Folder_Name Either arc Archive_Name or arc id Archive_UUID target_vault Managed_Vault password Password credentials User_Name Password target_credentials User_Name Password progress on off log Log_File_Name log_net_user User_Name log_net_password Password help Shows usage information None None 1 2 2 Options This section lists the options used by the StorageNodeCmd comma...

Page 30: ...t bsp My Node My Vault Without this option the utility exports the entire archive For details on how backups are exported see the Exporting archives and backups section in the User s Guide 1 2 2 4 log Specifies the name of the file where to save the log of the current operation for example log Server Share Exporting Log txt If you want to create the file on a network share use the log_net_user and...

Page 31: ...ult where you want to place the imported archive The vault has to be managed by the local storage node The vault name is given as a Uniform Resource Identifier URI for example target_vault bsp My Storage Node MyVault 1 2 2 12 vault When used with the list command specifies the centralized managed vault whose archives or the contents of an individual archive you want to list When used with the expo...

Page 32: ...chive is specified here by its Universally Unique Identifier UUID instead of its name see the output in the previous example StorageNodeCmd list vault bsp My Node My Vault arc_id 183DE307 BC97 45CE 9AF7 60945A568BE8 The output will look similar to this Pit number 1 type image kind full date 6 27 2009 11 39 10 AM Pit number 2 type image kind incremental date 6 27 2009 11 43 13 AM Pit number 5 type ...

Page 33: ... and the local or network folder where to export them to cscript exe VaultExport js source_vault bsp My Node My Vault target_vault C Archives To import all archives from a folder to a managed vault 1 Go to the folder containing the scripts 2 Run the VaultImport js script as follows specifying the local or network folder from which you want to import the archives and the managed vault where to impo...

Page 34: ... and switch TrueImageTerminal to a background operation You can terminate the backup operation executed by TrueImageTerminal by pressing Ctrl B 1 3 2 Script structure Scripts are written in the XML language and you can use the following tags Source p 34 Target p 34 Options p 34 1 3 2 1 Source Specifies the partitions or disks to be imaged Letters assigned to partitions must be used without a colon...

Page 35: ...ided in bytes kilobytes megabytes etc Password adds password protection to an image file 1 3 3 Script usage examples The following example illustrates the usage of a script to back up two partitions logical drives C and F mybackup2 tib is specified as an incremental image file High compression level is selected and the image will be split into 650 MB parts for recording to CD R RW media Password p...

Reviews: