Acronis Backup & Recovery 11.
Copyright Statement Copyright © Acronis International GmbH, 2002-2013. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore”, “Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
Table of contents 1 2 Command-line utility overview ..............................................................................................7 1.1 Installation .................................................................................................................................7 1.2 Backward compatibility and upgrade ........................................................................................8 1.3 Syntax......................................................................
2.10.3 2.10.4 3 Parameters .......................................................................................................................... 72 3.1 Access to a physical machine ...................................................................................................72 3.1.1 3.1.2 3.1.3 3.2 3.3 disk ................................................................................................................................................................. 83 nt_signature.........
3.7.5 3.7.6 3.7.7 3.7.8 3.7.9 3.7.10 3.7.11 3.7.12 3.7.13 3.7.14 3.7.15 3.7.16 3.7.17 3.7.18 3.7.19 3.7.20 3.7.21 3.7.22 3.7.23 3.7.24 3.8 Mounting parameters............................................................................................................108 3.8.1 3.8.2 3.8.3 3.9 destination_database ................................................................................................................................. 101 destination_instance........................................
3.12.7 3.12.8 3.12.9 3.12.10 3.12.11 3.12.12 3.12.13 3.12.14 3.12.15 3.12.16 4 log_format ................................................................................................................................................... 117 network_speed ........................................................................................................................................... 117 oss_numbers ..................................................................................................
1 Command-line utility overview Acronis Backup & Recovery 11.5 supports the command-line interface with the acrocmd utility. Unlike the trueimagecmd utility used in the older Acronis products, acrocmd does not contain any tools that physically execute the commands. It merely provides the command-line interface to Acronis Backup & Recovery 11.5 components—agents, storage nodes and the management server. Once installed on a Windows or Linux machine, the acrocmd utility can be run from any folder or directory.
Installation paths The default installation paths are: %ProgramFiles%\Acronis\CommandLineTool (in 32-bit Windows) %ProgramFiles(x86)%\Acronis\CommandLineTool (in 64-bit Windows) /usr/lib/Acronis/CommandLineTool (in Linux) 1.2 Backward compatibility and upgrade Upgrading the command-line utility from Acronis Backup & Recovery 10 When you upgrade a stand-alone edition of Acronis Backup & Recovery 10 to Acronis Backup & Recovery 11.
acrocmd --= … --= Typographic conventions Descriptions of commands and parameters use the following specific typographic conventions. Between angle brackets (<>) – information that the user must supply. Example: Between braces ({}); choices separated by pipe (|) – a set of choices from which the user must choose only one. Example: {on|off}. Parameter values For some parameters, you should specify only one value.
1.4 Local, remote and centralized management Advanced editions of Acronis Backup & Recovery 11.5 enable you to perform local, remote and centralized management of any machine where an Acronis Backup & Recovery 11.5 agent is installed. Local management For local management, you install the command-line utility on the same machine where the Acronis Backup & Recovery 11.5 agent is installed. The operations are performed under the user account you are logged on with.
The user whose credentials you specify must be a member of the Acronis Centralized Admins security group on the management server. If you are running the command-line utility on a different machine, the user must also be a member of the Acronis Remote Users security group on the management server. The operations on the machine are performed under the account of the agent service running on that machine (Acronis Agent User account).
1.5 Uninstallation Uninstallation in Linux In Linux, run the following commands to uninstall the command-line utility: # cd /usr/lib/Acronis/CommandLineTool/uninstall # ./uninstall To uninstall the command-line utility in the unattended mode, run the ./uninstall commands with the -a parameter. Uninstallation in Windows When you uninstall Acronis Backup & Recovery 11.5 by clicking Start -> All Programs -> Acronis -> Uninstall Acronis Backup & Recovery 11.
2 Commands This section lists the supported commands and compatible parameters. When using the command-line utility, you can view the information about the supported commands by means of the help (p. 17) command. 2.1 2.1.1 Commands by services Disk, file, virtual machine backup The following table summarizes the commands that can be executed by the Acronis services. For questions on how to connect to an Acronis service, please see the --service (p. 72) command description.
MMS Command AMS Agent for Windows Agent for Linux Agent for ESX(i) or Hyper-V Bootable media ASN validate backup (p. 45) + + + + + + catalog backup (p. 46) + + + export backup (p. 47) + + + + except Agent for ESX(i) (VA) + + + replicate backup (p. 48) + + + + + + convert full (p. 49) + + + + + + consolidate backup (p. 49) + + + + + delete backup (p. 50) + + + + + list mounts (p. 51) + + + mount (p. 51) + + + umount (p.
MMS AMS Agent for Windows Agent for Linux Agent for ESX(i) or Hyper-V list plans (p. 65) + + + + delete plan (p. 65) + + + + export plan (p. 66) + + + + import plan (p. 66) + + + + disable plan (p. 67) + + + + enable plan (p. 68) + + + + list tasks (p. 68) + + + + run task (p. 69) + + + + stop task (p. 69) + + + + delete task (p. 70) + + + + + + + Command list licenses (p.
MMS Command AMS Agent for Exchange recover exchange_database (p. 35) + recover exchange_mailbox (p. 36) + Agent for SQL (singlepass)* list mssql_instances (p. 37) + list mssql_databases (p. 37) + backup disk (p. 19) + recover mssql_database (p. 38) + Agent for Active Directory (single- pass)* Reserved ASN + + recover ad_database (p. 39) list archives (p. 40) Operations with archives and backups + + + + + export archive (p. 41) + + + + + validate archive (p.
MMS Agent for Exchange Agent for SQL (singlepass)* Agent for Active Directory (single- pass)* list tape_slots (p. 59) + + + + inventory tape (p. 60) + + + + + + + + Command AMS Operations with vaults + + Reserved ASN validate vault (p. 60) + catalog vault (p. 61) + get log (p. 63) + + + + + list activities (p. 63) + + + + + sysinfo (p. 64) + + + + + list plans (p. 65) + + + + delete plan (p. 65) + + + + export plan (p. 66) + + + + import plan (p.
Type acrocmd help to view the information about this command. For example, acrocmd help backup disk displays the information about the backup disk command. 2.3 2.3.1 Backup and recovery Disks and volumes The commands listed in this section can be executed on a machine where Agent for Windows or Agent for Linux is installed. 2.3.1.1 list disks Lists available disk groups, disks, volumes and unallocated space. Examples (p. 121) Parameters --oss_numbers={true|false} (p.
2.3.1.2 backup disk Creates a backup of the specified disks or volumes. If neither the --disk parameter nor the --volume parameter is specified, the command backs up the entire machine. Backing up the entire machine is highly recommended when you perform a single-pass disk and application backup (i.e. specify the --application_aware parameter). Otherwise, application data may be backed up incompletely. Examples (p. 121) Parameters What to back up --disk= (p.
--multi_volume_snapshot={true|false} (p. 96) --network_speed={kb|p} (p. 117) --post_cmd= (p. 96) --pre_cmd= (p. 96) --process_priority={low|normal|high} (p. 119) --reboot_after (p. 120) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --split= (p. 97) --use_registry_defaults (p. 120) --use_vss={none|auto|software_auto|software|hardware|acronis|native} (p. 98) --vss_full_backup (p.
--backup= (p. 80) --disk= (p. 83) --nt_signature={auto|new|backup|existing} (p. 83) --volume= (p. 84) --oss_numbers={true|false} (p. 118) --mbr_disk= (p. 86) Where to recover --target_disk= (p. 106) --target_volume= (p. 107) Recovering disks If the --target_disk parameter is specified, the software will recover each disk specified in the --disk parameter to the respective disk specified in the --target_disk parameter.
--force_yes (p. 116) --reboot (p. 120) --reboot_after (p. 120) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --use_registry_defaults (p. 120) Acronis Universal Restore parameters --ur_driver= Specifies using Acronis Universal Restore and the mass storage driver to be installed. --ur_path=
Specifies using Acronis Universal Restore and the path to the driver storage. General parameters --log= (p.Where to recover --target_disk= (p. 106) Recovery options --force_yes (p. 116) --reboot (p. 120) --reboot_after (p. 120) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p.
Recovery options --force_yes (p. 116) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) 2.3.
--cataloging={full|fast} (p. 92) --compression={none|normal|high|max} (p. 94) --encryption={none|aes128|aes192|aes256} (p. 94) --force_yes (p. 116) --hdd_speed={kb|p} (p. 94) --ignore_bad_sectors (p. 95) --multi_volume_snapshot={true|false} (p. 96) --network_speed={kb|p} (p. 117) --post_cmd= (p. 96) --pre_cmd= (p. 96) --process_priority={low|normal|high} (p. 119) --reboot_after (p. 120) --retry_count= (p. 116) --retry_delay= (p.
--loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) --backup= (p. 80) --file= (p. 103) --exclude= (p. 102) Where to recover --target= (p. 80) --credentials=,,encrypted (p. 115) How to recover --overwrite={always|older|never} (p. 104) --recover_absolute_path (p.
2.3.3 Virtual machines The commands listed in this section are available in the Acronis Backup & Recovery 11.5 Virtual Edition only if Agent for ESX(i) or Agent for Hyper-V is installed. (This does not apply to the recover vm (p. 29) command.) 2.3.3.1 list vmservers Lists virtualization servers and server clusters that are present on the specified management server or that are accessible to Agent for ESX(i). Examples (p. 125) Parameters --filter_guid= (p. 112) --filter_name= (p.
--log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.3.3.3 backup vm Creates a backup of specified disks and volumes of the specified virtual machines.
--backuptype={full|incremental|differential} (p. 87) --cleanup (p. 87) --raw (p. 92) Backup options --cataloging={full|fast} (p. 92) --cbt_mode={on_if_enabled|on|off} (p. 93) --compression={none|normal|high|max} (p. 94) --encryption={none|aes128|aes192|aes256} (p. 94) --fast (p. 94) --force_yes (p. 116) --hdd_speed={kb|p} (p. 94) --network_speed={kb|p} (p. 117) --process_priority={low|normal|high} (p. 119) --retry_count= (p. 116) --retry_delay= (p.
Agent for Windows and Agent for Linux recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Red Hat Enterprise Virtualization, or Citrix XenServer Open Virtual Appliance (OVA). Files of the fully configured and operational machine will be placed in the folder you select. You can start the machine using the respective virtualization software or prepare the machine files for further usage.
--force_yes (p. 116) --power_on (p. 105) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --use_registry_defaults (p. 120) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p.
2.3.4.2 list exchange_mailboxes Lists mailboxes and public folders in the specified Exchange database. Examples (p. 126) Parameters --mailbox_location= (p. 82) --filter_name= (p. 112) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) --exchange_credentials=,,encrypted (p. 75) Access to a remote machine --host= (p.
Backup options --cataloging={full|fast} (p. 92) --compression={none|normal|high|max} (p. 94) --encryption={none|aes128|aes192|aes256} (p. 94) --force_yes (p. 116) --metadata_level={{mailboxes_only|1}|{folders_and_mailboxes|2}|{all|3}} (p. 95) --post_cmd= (p. 96) --pre_cmd= (p. 96) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --split= (p. 97) --use_registry_defaults (p.
--exclude_size={kb|mb|gb} (p. 88) --exclude_types= (p. 88) Where to save the backup --loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) How to back up --archive_comment= (p. 87) --backup_comment= (p. 87) --backuptype={full|incremental} (p. 87) --cleanup (p. 87) Backup options --cataloging={full|fast} (p. 92) --compression={none|normal|high|max} (p.
2.3.4.5 recover exchange_database Recovers the specified storage groups (for Exchange 2003/2007) or databases (for Exchange 2010 or later). Examples (p. 126) Parameters What to recover --loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) --recovery_point={point_of_failure|latest_backup|point_in_time|selected_ba ckup} (p. 105) --pit= (p. 104) --backup= (p. 80) --items= (p.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine --service={mms|ams} (p. 72) 2.3.4.6 recover exchange_mailbox Recovers the specified mailboxes and public folders from a database-level or mailbox-level backup. Examples (p. 126) Parameters What to recover --loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine --service={mms|ams} (p. 72) 2.3.5 Microsoft SQL The commands listed in this section can be executed on a machine where Agent for SQL (single-pass) is installed. 2.3.5.1 list mssql_instances Lists Microsoft SQL Server instances. Examples (p. 128) Parameters --filter_edition= (p. 111) --filter_name= (p.
For information about specifying access credentials for Microsoft SQL Server, see "Access to SQL Server instance" (p. 78). General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p.
If the parameter is specified, the Acronis Active Restore technology is enabled. Recovery options --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --use_registry_defaults (p. 120) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine --host= (p.
--overwrite={always|older|never} (p. 104) --original_date (p. 103) Recovery options --force_yes (p. 116) --retry_count= (p. 116) --retry_delay= (p. 116) --silent_mode={on|off} (p. 120) --use_registry_defaults (p. 120) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine --host= (p.
--log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p.
Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) Exporting archives from a managed vault (--loc=bsp:///) is always executed by the storage node service. If you specify a different service, it will transmit the command to asn. 2.4.1.
Usage tip. To speed up backups, you can prohibit full cataloging by adding the --cataloging=fast parameter to the backup command. Use the catalog backup (p. 46), catalog archive (p. 42), or catalog vault (p. 61) command to perform the full cataloging at a later time. Examples (p. 130) Parameters --loc= (p. 78) The command does not support the following locations: Acronis Online Backup Storage, encrypted managed vaults, and removable media such as CD, DVD, BD, Iomega REV, RDX or USB devices.
--log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p.
In a managed vault (--loc=bsp:///), the operation is always executed by the storage node service. If you specify a different service, it will transmit the command to asn. 2.4.2.2 list content Lists the contents of a backup (backed-up disks, volumes, files, virtual machines, databases, etc.). Examples (p. 131) Parameters --loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p.
--network_speed={kb|p} (p. 117) --process_priority={low|normal|high} (p. 119) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p.
--progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) In a managed vault (--loc=bsp:///), the operation is always executed by the storage node service.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) Exporting backups from a managed vault (--loc=bsp:///) is always executed by the storage node service. If you specify a different service, it will transmit the command to asn. 2.4.2.
Replicating backups from a managed vault (--loc=bsp:///) is always executed by the storage node service. If you specify a different service, it will transmit the command to asn. 2.4.2.7 convert full Converts an incremental or differential backup into a full one. The backup time stamp remains unchanged. The dependent incremental and differential backups are also updated. However, the old backup versions are deleted only after the new ones have been created.
If the --backup parameter is not specified, only the latest backup of the archive is kept. As a result, the archive will contain only one backup. Examples (p. 131) Parameters --loc= (p. 78) The command does not support the following location: Acronis Backup & Recovery 11.5 Storage Node. --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) --backup= (p. 80) General parameters --log= (p.
--progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) In a managed vault (--loc=bsp:///), the operation is always executed by the storage node service.
Parameters What to mount --loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) --backup= (p. 80) --volume= (p. 84) How to mount (Agent for Windows only) --rw (p. 108) --letter= (p. 108) How to mount (Agent for Linux only) --rw (p. 108) --mount_point= (p. 109) General parameters --log= (p. 117) --log_format={structured|unstructured} (p.
--output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.4.
--loc= (p. 78) --credentials=,,encrypted (p. 115) --arc= (p. 79) --password=,encrypted (p. 119) --backup= (p. 80) --items= (p. 75) Where to mount --destination_instance= (p. 101) --credentials=,,encrypted For information about specifying access credentials for Microsoft SQL Server, see "Access to SQL Server instance" (p. 78). General parameters --log= (p.
--service={mms|ams} (p. 72) 2.5 Operations with Acronis Secure Zone Acronis Secure Zone is a secure volume for storing backup archives within a managed machine. 2.5.1 create asz Creates Acronis Secure Zone on the selected disk. The command first uses the unallocated space on that disk and then, if the unallocated space is insufficient, takes free space from the selected volumes. Examples (p. 134) Parameters --disk= (p. 83) --volume={|all} (p.
--oss_numbers={true|false} (p. 118) --size_measure={s|kb|mb|gb} Measure of the Acronis Secure Zone size and free space in the command output. If not specified, the value is mb. --reboot (p. 120) --later (p. 120) --silent_mode={on|off} (p. 120) --force_yes (p. 116) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p.
2.5.4 delete asz_files Deletes the latest backup of an archive located in Acronis Secure Zone. If the specified archive contains only one backup, such backup will not be deleted. Examples (p. 134) Parameters --credentials=,encrypted (p. 115) Password for Acronis Secure Zone. --arc= (p. 79) --password=,encrypted (p. 119) Password for the archive. --force_yes (p. 116) General parameters --log= (p. 117) --log_format={structured|unstructured} (p.
Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.6 Operations with Acronis Startup Recovery Manager Acronis Startup Recovery Manager is the bootable rescue utility that can be started at boot time by pressing F11. 2.6.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.7 2.7.1 Operations with tapes list tape_libraries Lists tape libraries and/or stand-alone tape drives attached to a machine where an Acronis Backup & Recovery 11.5 agent or Acronis Backup & Recovery 11.5 Storage Node is running. Examples (p.
--log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) 2.7.
Parameters --loc= (p. 78) --credentials=,,encrypted (p. 115) --network_speed={kb|p} (p. 117) --process_priority={low|normal|high} (p. 119) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p.
--log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) --progress (p. 119) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p.
Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.10 Administration operations 2.10.1 Collecting information 2.10.1.1 get log Exports the log of the activity with the specified GUID in the Acronis xml format. To learn GUIDs of activities, use the list activities (p. 63) command. Examples (p. 137) Parameters --id= (p. 117) --loc= (p. 78) The file to export the log to.
For Acronis Backup & Recovery 11.5 Management Server, only its own activities are listed. The activities of the Managed Machine Services that run on the registered machines are not included in the list. If a machine performs too slowly, you might want to use the command to find out the activity that has been running for an unexpectedly long time. Thus, you will be able to detect and end hung-up processes. Examples (p. 137) Parameters --filter_guid= (p. 112) --filter_state= (p.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams|asn} (p. 72) When getting the system information of a machine with several services, you can select any of these services. 2.10.2 Plans 2.10.2.1 list plans Lists the backup plans existing on a managed machine or on the management server.
--output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.10.2.3 export plan Exports the specified backup plan to an .xml file.
Centralized backup plans can be exported from a management server and imported to a management server only. Examples (p. 138) Parameters --loc= Full path to the file from which the backup plan will be imported. --credentials=,,encrypted (p. 115) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p.
2.10.2.6 enable plan Enables a previously disabled (p. 67) backup plan. As a result, the specified backup plan will run again according to its schedule. Examples (p. 138) Parameters --id= (p. 117) General parameters --log= (p. 117) --log_format={structured|unstructured} (p. 117) --output={formatted|raw} (p. 118) {-f|--file_params}= (p. 116) Access to a remote machine (advanced editions only) --host= (p.
Access to a remote machine (advanced editions only) --host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.10.3.2 run task Starts execution of the specified task. Examples (p. 138) Parameters --id= (p. 117) General parameters --log= (p. 117) --log_format={structured|unstructured} (p.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p. 72) 2.10.3.4 delete task Deletes the specified task. A task belonging to a backup plan cannot be deleted separately from the plan. Examples (p. 138) Parameters --id= (p. 117) General parameters --log= (p. 117) --log_format={structured|unstructured} (p.
--host= (p. 72) --credentials=,,encrypted (p. 115) --address= (p. 72) Access to a specific service within a machine (advanced editions only) --service={mms|ams} (p.
3 Parameters 3.1 Access to a physical machine 3.1.1 host --host= Specifies the machine running an Acronis service to connect to. If not specified, the command-line utility connects to the local host. Examples: --host=server1 --host=192.168.1.2 3.1.2 service --service={mms|ams|asn} Specifies the Acronis service to connect to. If not specified, the command-line utility connects to the agent service (Acronis Managed Machine Service, MMS).
on the specified machines one after another. The parameter for the above commands has been specified in the following way: --address=. The management server must also be specified when using this parameter. Credentials for the machine are not required. Only the management server credentials are needed.
Path to the virtual machine configuration file on the ESX(i) server (to the .vmx file). The parameter cannot be used for Hyper-V servers. The format is as follows: [] /…// Example --vmconfig="[Local_storage_2] Windows 2008 R2 Dev/Windows 2008 R2 Dev.vmx" With the backup vm (p. 28) command, you can specify several values of this parameter. 3.2.2 New virtual machine vmname --vmname= Name of a new virtual machine.
Example: C:\ProgramData\Microsoft\Windows\Hyper-V\Virtual Machines 3.3 Access to applications 3.3.1 exchange_credentials --exchange_credentials=,,encrypted Credentials to access an Exchange server. In this parameter, you must specify credentials of a domain user. The user name has the following format: \ or @. The user must be granted the permissions sufficient for the required operation.
If the --target (p. 80) parameter value is another_database or recovery_database, the --items parameter must contain only one database or storage group. If the --target parameter value is original or disk, you can specify several databases and storage groups in the --items parameter. If the parameter is not specified, the software will recover all the databases in a backup. To learn the names of the backed-up storage groups or databases, use the list content (p. 45) command.
Example: "Mailbox Database" Storage group (for Exchange 2003 and 2007) Example: "First Storage Group" Mailbox or public folder For Exchange 2013: / Example: "Mailbox database/John P. Smith" For Exchange 2010: / / Examples: "Mailbox database/John P.
If the backup contains databases of only one instance, you can specify only the database name. Examples: "My Instance" "My Instance/Accountants" Accountants 3.3.6 Access to SQL Server instance Acronis Backup & Recovery 11.5 can use either SQL Server Authentication or Windows Authentication to connect to a Microsoft SQL Server instance. By default, Windows Authentication is used.
* To establish an active mode FTP connection, use the following notation: aftp://// **Using this format, you can access a tape library or drive only if it is directly attached to the managed machine. You can determine the GUID of this library or drive by using the list tape_libraries (p. 59) command. For a tape library or drive attached to a storage node, a centralized vault should be created on that storage node.
This syntax is the only way to access an archive in command line if the archive's metadata has been lost. If the metadata is intact, the --arc parameter refers to the entire archive. If the metadata is lost, the --arc parameter refers to the backup chain that contains the specified backup. (A backup chain is a full backup and all of its dependent incremental and differential backups.) When using this syntax in a command operating with backups, you still need to specify the --backup (p. 80) parameter.
online:// which is not supported by the export archive and export backup commands. If the --target parameter is not specified, the command will fail. Command: recover exchange_database --target={original|disk|another_database|recovery_database} In the recover exchange_database (p. 35) command, available values of the parameter are as follows: original The software will recover the selected databases or storage groups to their original paths. The paths are taken from the backup.
If all of the selected mailboxes are skipped, the command will fail. pst The software will save the selected mailboxes, public folders or mailbox folders to a Personal Storage Table (.pst) file. If this value is used, you need to specify the --disk_location (p. 101) parameter. If necessary, add the --credentials (p. 115) and --outlookmachine (p. 103) parameters. If the parameter is not specified, the command will fail.
The path to the database whose mailboxes are to be displayed. The parameter is used with the list exchange_mailboxes (p. 32) command. For detailed information about the value format, see "Specifying Exchange data" (p. 76). If the parameter is not specified, the software will display all the mailboxes on an Exchange server. 3.5 3.5.1 Disks and volumes disk Commands: backup disk and backup vm --disk= The parameter is used with the backup disk (p. 19) and backup vm (p.
The software will keep the NT signature of the target disk if it is the same NT signature as the one stored in the backup. (In other words, if you recover the disk to the same disk that was backed up.) Otherwise, the software will generate a new NT signature for the target disk. new The software will generate a new NT signature for the target disk. backup The software will replace the NT signature of the target disk with the one from the backup.
recover disk (p. 20) recover vm (p. 29) The volume whose data is to be recovered from a backup. With the recover disk command, you can specify several volumes. mount (p. 51) The volume to be mounted from a backup. You can specify several volumes. If the --disk (p. 83) parameter is specified, this disk will be recovered. Otherwise, the command will recover all of the backed-up disks. The command will fail. Volume numbers are specified as -.
3.5.4 start --start={s|kb|mb|gb} This parameter specifies the start position of the volume being recovered. If no measurement unit is specified, the offset is measured in megabytes (mb). Use this parameter with the recover disk (p. 20) and recover vm (p. 29) commands when recovering a volume to unallocated space of a hard disk. The --start parameter and the --target_volume (p. 107) parameter are mutually exclusive. If you specify both, an error will occur. 3.5.
The --application_aware parameter and the --raw (p. 92) parameter are mutually exclusive. If you specify both, an error will occur. 3.6.2 backuptype The type of the backup. If not specified, the value is full. Commands: backup disk, backup file, backup vm If the parameter is used with the backup disk (p. 19), backup file (p. 24), and backup vm (p.
Comments on the archive that is specified in the --arc (p. 79) parameter. To view comments on archives, use the list archives (p. 40) command with the -a parameter. backup_comment --backup_comment= Comments on the backup that is specified in the --backup (p. 80) parameter. To view comments on backups, use the list backups (p. 40) command. 3.6.5 copy_only --copy_only The parameter is used with the backup exchange_database (p. 32) command only if the --backuptype (p.
Type this parameter to skip files and folders that have the Hidden attribute (for file systems that are supported by Windows) or that start with a period (.) (for file systems in Linux such as Ext2 and Ext3). If a folder is hidden, all of its contents (including files that are not hidden) will be excluded. Microsoft Exchange Server data backups The following four parameters are used with the backup exchange_mailbox (p. 33) command.
The parameter can be used only if all of the following conditions are met. The --backuptype (p. 87) parameter value is full. The "Deduplication for Microsoft Exchange Server" add-on is installed on the machine with Agent for Exchange that will perform the command. The --loc (p. 78) parameter value is bsp:/// and this vault is deduplicating. The --express and --copy_only (p. 88) parameters are mutually exclusive. 3.6.
The parameter is used with the backup disk (p. 19) command if the --application_aware (p. 86) parameter is specified. The parameter determines the software behavior when it fails to collect application metadata during a backup. For example, this happens if a database is corrupted or the application service is stopped. If the parameter is not specified, the backup will fail. If the parameter is specified, the backup will continue but the application metadata will be ignored.
Without this parameter, each backup will have a unique file name with the exact time stamp and the backup type; for example: MyData_2010_03_26_17_01_38_960D.tib. This standard file naming allows for a wider range of backup destinations and backup schemes. When you back up to a removable device (p. 90), the --plain_archive parameter is not needed. Instead, the --fixed_drive parameter determines whether the standard or simplified naming scheme will be used.
For an Exchange mailbox-level backup - mailboxes, folders, and e-mails. Fast cataloging You may want to set the parameter to fast if the full cataloging tends to affect the performance of the managed machine or if your backup window is too narrow. The following data will be displayed in the catalog: For a disk-level backup - only disks and volumes. For a file-level backup - nothing. For an Exchange database-level backup - only databases or storage groups and mailboxes.
If CBT is enabled for a virtual machine, Acronis Backup & Recovery 11.5 uses CBT according to the CBT settings of individual disks. Otherwise, CBT is not used. Use this value for all backups (including full ones) if you want to preserve your custom CBT settings for virtual machines. off Acronis Backup & Recovery 11.5 does not use CBT, regardless of the CBT settings for the virtual machines.
This parameter is used if the backup destination (the --loc (p. 78) parameter value) is an internal (fixed) hard disk of the machine being backed up. For other locations, the parameter is ignored. should be a positive number. If the measurement unit is kb, the speed is measured in kilobytes per second. If the measurement unit is p or is not specified, the speed is measured in the percentage of the maximum I/O speed of the destination hard disk.
The metadata will be the most detailed and the backup will take the longest time to complete. Individual e-mails and other items within mailboxes and public folders can be accessed without opening a database. 3.6.14.9 multi_volume_snapshot --multi_volume_snapshot={true|false} This parameter is effective only for Windows operating systems. This parameter is used with the backup disk (p. 19) command. This parameter is also used with the backup file (p. 24) command when the --snapshot (p.
where the contents of the batch file is "net start MSSQLSERVER" 3.6.14.11 snapshot --snapshot={always|possible|none} Defines whether to back up files (p. 24) directly (one by one) or by taking an instant data snapshot. Available values of the parameter are as follows: possible (by default) Create a snapshot if it is possible. Back up files directly if taking a snapshot is not possible. none Do not create a snapshot. Always back up files directly.
3.6.14.14 use_vss --use_vss={auto|software_auto|acronis|native|software|hardware|none} Volume Shadow Copy Service (VSS) notifies VSS-aware applications that the backup is about to start. This ensures the consistent state of all data being used by such applications. Then, VSS tells a snapshot provider to create the snapshot. You can select the snapshot provider that VSS will use for taking snapshots.
the next differential backup of the SQL Server data will fail. The backups will continue failing until the third-party software creates the next "own" full backup. If other VSS-aware applications are running on the machine and you need to keep their logs for any reason. Using this parameter does not result in the truncation of Microsoft SQL Server logs. To truncate the SQL Server log after a single-pass backup (p. 86), specify the --mssql_truncate_logs (p. 91) parameter. 3.7 3.7.
3.7.3 database_location --database_location= Command: recover exchange_database A folder on the Exchange server to which a database will be recovered. The parameter is used with the recover exchange_database (p. 35) command in the following cases: If the --target (p. 80) parameter value is another_database and the destination database or storage group does not exist. If the --target parameter value is recovery_database.
After the recovery completes, users will have read-only access to the database. The software will undo any uncommitted transactions. However, it will save the undo actions in a temporary standby file so that the recovery effects can be reverted. The standby value is primarily used to detect the point in time when a SQL Server error occurred. When recovering a system database, this parameter is ignored. System databases are always recovered in the recovery state. 3.7.
3.7.8 exclude --exclude= Files and folders to be excluded from the recovery. You can either specify files and folders explicitly or use wildcard characters. Note: Exclusions override selection of data items to recover. For example, if you select to recover file MyFile.tmp and to exclude all .tmp files, file MyFile.tmp will not be recovered. Specify the name of the file or folder, such as Document.txt. The names are not case-sensitive, both in Windows and Linux.
3.7.11 file --file= Files and folders to recover from the file-level backup. If not specified, all contents of the backup are recovered. You can disable recovery of certain files and folders by using the --exclude (p. 102) parameter. A file or folder specified in both the --file and --exclude parameters will be recovered. 3.7.12 log_location --log_location= A folder on the Exchange server where the transaction log files will be recovered.
3.7.15 overwrite Commands: recover file, recover ad_database --overwrite={always|older|never} In the recover file (p. 25) or recover ad_database (p. 39) command, the parameter specifies what to do if the program finds in the target folder a file that has the same name as in the backup. Available values of the parameter are as follows: always (by default) - this will give the file in the backup priority over the file on the hard disk.
log file creation. If there are no log files that include the specified time, the software will use the nearest point from the transaction log file backed up previously. If the point in time is not specified, the operation will fail. 3.7.17 power_on --power_on Power on the target virtual machine when the recovery is complete. 3.7.18 preserve_mbr --preserve_mbr When recovering a volume over an existing one, the target volume is deleted from the disk along with its entry in the target disk MBR.
point_of_failure (by default) The data will be recovered to the state of the most recent transaction log file existing in Exchange. If transaction logs are not available (lost, deleted or corrupted), the data will be recovered to the moment of backup creation. latest_backup The data will be recovered from the latest backup of an archive. point_in_time The data will be recovered to a certain date and time.
3.7.22 target_volume --target_volume= Volume where you will recover data which has been selected in the --volume (p. 84) parameter. The parameter is used with the recover disk (p. 20) and recover vm (p. 29) commands. With the recover disk (p. 20) command, you can specify several volumes. The number of volumes specified in the --target_volume parameter must be the same as the number of volumes specified in the --volume parameter.
3.7.24 use_all_space --use_all_space This parameter is used with the recover disk (p. 20) and recover vm (p. 29) commands if you recover a volume to unallocated space. If specified, the recovered volume will occupy all the unallocated space. Otherwise, the recovered volume size will be the same as in the backup. 3.8 3.8.1 Mounting parameters rw --rw If specified, the backed-up volume will be mounted in the read/write mode.
3.8.3 mount_point Command: mount --mount_point= Directories to mount the volumes to. The parameter is used with the mount (p. 51) command in Linux. If the parameter is not specified or if the number of mount points differs from the number of volumes, the operation will fail. Command: umount --mount_point= The directory to unmount the volume from. The parameter is used with the umount (p. 52) command in Linux. If the parameter is not specified, the operation will fail. 3.9 3.
3.10 Filtering The filtering parameters are used to filter the data retrieved by the listing commands (list activities (p. 63), list archives (p. 40) and others). 3.10.1 content_path The path to the contents inside the backup. The parameter is used with the list content (p. 45) command unless the --content_type (p. 110) parameter value is volume or ad_database. If not specified, the first 5000 root elements will be shown.
Microsoft Exchange Server data backups When viewing the contents of a database-level backup, the applicable values of the parameter are _exchange_database and exchange_mailbox. If the value is exchange_database or if the parameter is not specified, the command will list storage groups and databases contained in the backup. Otherwise, the list of backed up mailboxes and public folders will be shown.
The parameter is used with the list mssql_instances (p. 37) command. If specified, the software will list only instances of those Microsoft SQL Server editions that contain the values you have specified. Without this parameter, instances of any Microsoft SQL Server edition will be displayed.
If the parameter is used with the list tape_libraries (p. 59), list vms (p. 27) or list vmservers (p. 27) command, the software will display objects whose names coincide with the values you have specified. If the parameter is used with the list exchange_mailboxes (p. 32), list mssql_instances (p. 37), or list mssql_databases (p. 37) command, the software will display objects whose names contain the values you have specified. Without this parameter, objects with any name will be displayed. 3.10.
In the list vmservers (p. 27) command, you can specify one or more of the following types: standalone and cluster. 3.10.14 filter_user --filter_user= The parameter is used with the list tasks (p. 68) and list plans (p. 65) commands. If specified, the software will list only tasks that run (or only plans whose tasks run) under the specified user accounts. If not specified, tasks run under any user account will be displayed. 3.10.
Fast inventorying If the parameter value is fast or is not specified, Acronis Backup & Recovery 11.5 scans tapes for barcodes. Using barcodes, the software can quickly return a tape to the pool where it was before. Select this method to recognize tapes used by the same tape device attached to the same machine. Other tapes will be sent to the Unrecognized tapes pool. If your tape library contains no barcode reader, all tapes will be sent to the Unrecognized tapes pool.
acrocmd export archive --loc=bsp://ASN/my_vault --credentials="ASN user",pass1 --arc=my_archive --password=123 --target=\\bkpsrv\backups --credentials=netuser,pass2 This command exports a password-protected archive from a managed vault to a network share. The first credentials are required to access the vault my_vault managed by the storage node ASN. The --password parameter specifies the password for the archive my_archive. The second credentials enable writing to the shared folder \\bkpsrv\backups. 3.
If the parameter is not specified, the command allows interaction with the user. The parameter is mainly intended for the recover lvm_structure (p. 23) command. It automates the recovery of a Linux system, along with its software RAID/LVM structure, to a machine with different logical volume structure or without logical volumes. This command always prompts the user to confirm the replacement of the machine's logical volume structure.
The parameter defines the amount of the network connection bandwidth allocated for transferring the backup data. If the parameter is not specified, the software uses all the network bandwidth it can get when transferring the backup data. You can reserve a part of the network bandwidth for other network activities. should be a positive number. If the measurement unit is kb, the speed is measured in kilobytes per second.
This mode is intended for use as input for a third-party parser. Headers are not visible; column header separator lines are not visible; the column separator is "\t" (tab character). Also, this mode enables you to see the full length of a value that is longer than 20 characters (for example, the GUID of a backup plan). 3.12.11 password --password=,encrypted Password for the archive in the backup and recovery operations, archive and backup management operations.
3.12.14 reboot reboot and reboot later --reboot --reboot --later Reboot the machine before the operation (if required). Use the --reboot parameter when performing the following operations that require a reboot: recovering a volume that contains the currently active operating system, recovering locked files, creating/deleting Acronis Secure Zone on a system disk, cloning a system disk. The machine will be rebooted without a prompt. If neither the --reboot parameter nor the --silent_mode=on (p.
If the parameter is specified, the software will use the default values of backup and recovery options set in the graphical user interface of Acronis Backup & Recovery 11.5. These values are stored on the machine with the agent that performs the command. On a machine running Windows, the values are stored in the registry; on a machine running Linux, the values are stored in the Acronis Backup & Recovery 11.5 configuration files.
acrocmd backup disk --volume=DYN1 --loc=\\srv1\backups --credentials=netuser1,pass1 --arc=dyn1_arc For more information about selecting logical volumes in Linux, see Selecting logical volumes and MD devices for backup (p. 139) Backing up all dynamic volumes in Windows or all logical volumes in Linux. The backup will be saved to an FTP server. acrocmd backup disk --volume=DYN --loc=ftp://srv1/backups --credentials=ftpuser1,pass1 --arc=alldyn_arc Backing up a machine to a network shared folder.
acrocmd recover disk --loc=\\srv1\folder1 --credentials=user1,pass1 --arc=my_machine Recovering hard disks 1 and 2 from the latest backup of an archive to hard disks 3 and 4. acrocmd recover disk --loc=F:\backups --arc=my_archive --disk=1,2 --target_disk=3,4 Recovering hard disk 2 from a backup located in an NFS shared folder to hard disk 1.
acrocmd recover disk --loc=F:\ --arc=my_machine --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --volume=2-2,DYN4 --target_disk=3 Recovering a dynamic (logical) volume from a backup to a dynamic (logical) volume. acrocmd recover disk --loc=ftp://srv1/backups --credentials=ftpuser1,pass1 --arc=alldyn_arc --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --volume=DYN3 --target_volume=DYN4 Recovering a volume to the unallocated space of a disk group. The resulting volume will be dynamic.
acrocmd backup file --include=c:\work --password=123 --encryption=aes256 --loc=online:// --credentials="user@mail.com",pass --arc=my_archive Recovering files and folders (p. 25) Recovering a file from a backup stored in a local folder to the original folder. Since the --overwrite parameter is not specified, the existing file will be overwritten. acrocmd recover file --loc=E:\backups\my_thesis --arc=my_thesis --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --file=C:\documents\my_thesis.
acrocmd list vms --host=srv1 --credentials="srv1\AMS user",pass1 --service=ams --filter_status=error Backing up virtual machines (p. 28) Backing up a virtual machine. The incremental backup will be saved to a managed vault. Progress will be shown. If Changed Block Tracking (CBT) is enabled for the virtual machine, Acronis Backup & Recovery 11.5 will use CBT according to the CBT settings of individual disks.
acrocmd list exchange_databases --exchange_credentials=domain1\exch_user1,12345 Listing Exchange storage groups and databases on an Exchange server. The Exchange server is accessed via the management server. acrocmd list exchange_databases --host=srv1 --credentials=user,pass1 --service=ams --address=exch_srv --exchange_credentials=domain1\exch_user1,12345 Listing mailboxes and public folders (p. 32) Listing mailboxes and public folders of all the databases on the local Exchange server.
acrocmd recover exchange_database --host=exchange_srv --credentials=user123,pass123 --exchange_credentials=domain1\exch_user1,12345 --loc=bsp://storage_node1/my_vault --credentials=bkpuser,pass --arc=exchg_db_arc(1) --items=storage_group_1 --recovery_point=latest_backup --target=another_database --destination_database=new_sg --database=db1 --database_location=d:\ExchData\db1 --database=db2 --database_location=d:\ExchData\db2 --log_location=e:\new_sg_logs Recovering a database (Exchange 2010 or later) to
Listing instances of Microsoft SQL Server 2005 that are located on a remote machine and whose names contain the fragment "WEB". acrocmd list mssql_instances --host=192.168.1.2 --credentials=user1,pass1 --filter_edition=2005 --filter_name=WEB Listing Microsoft SQL databases (p. 37) Listing databases of a Microsoft SQL Server instance located on a remote machine.
If the user who runs the command is a member of the sysadmin role on the destination instance, the --credentials parameter is not needed after the --destination_instance parameter. Otherwise, you need to specify the sysadmin credentials. 4.1.6 Microsoft Active Directory Backing up a domain controller This operation is performed by using the backup disk (p. 19) command. See the examples in the "Disks and volumes" (p. 121) section under "Single-pass disk and application backup.
asn service. If you want to run the same command directly on the storage node (where no mms is running), specify the "ASN user" credentials after the storage node host: acrocmd export archive --host=storage_node --credentials="ASN user",pass --service=asn --loc=bsp://storage_node/my_vault --target=\\bkpsrv\backups --credentials=netuser,pass2 Importing an archive from a local folder of the storage node to a managed vault.
Listing backup content (p. 45) Listing the content of a backup from an archive residing in Acronis Secure Zone. acrocmd list content --loc=atis:///asz --credentials=aszpass --arc=my_archive --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Validating a backup (p. 45) Validating a backup. acrocmd validate backup --loc=E:\backups\ --arc=my_archive --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Cataloging a backup (p. 46) Cataloging the latest backup of an archive stored in a network folder.
acrocmd convert full --loc=C:\Backups --arc=my_archive --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Consolidating backups (p. 49) Deleting all backups from an archive except for the specified ones. acrocmd consolidate backup --loc=C:\Backups --arc=my_archive --password=123 --backup=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXX1,XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXX XX2 Deleting backups (p. 50) Deleting the specified backups from an archive.
Mounting SQL databases (p. 53) Mounting two databases from the latest backup of an archive. acrocmd mount mssql_database --loc=\\srv1\backups --credentials=netuser1,pass1 --arc=machine1_app --items=WEBSERVER/Accountants,NEWSERVER/Anna --destination_instance=SUPERVISION --credentials="SQL user",pass2 Unmounting SQL databases (p. 54) Unmounting all databases mounted to the "SUPERVISION" instance by using the mount mssql_database command. acrocmd umount mssql_database --items=SUPERVISION 4.
Deleting a backup from Acronis Secure Zone (p. 57) Deleting the latest backup of an archive stored in Acronis Secure Zone on the local machine. acrocmd delete asz_files --credentials=asz_pass --arc=my_archive --password=123 Deleting Acronis Secure Zone (p. 57) Deleting Acronis Secure Zone from the local machine. The freed space will be added to the 1st volume of disk 1. (This is the disk where Acronis Secure Zone is located.
Viewing the information about slots of a tape library attached to the local machine. The output will be displayed in the raw format (p. 118). Therefore, you will be able to see and use complete GUIDs of tape library slots. acrocmd list tape_slots --filter_library=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --output=raw Inventorying tapes (p. 60) Inventorying the tapes loaded into two tape devices. Since the --mode (p. 114) parameter is not specified, fast inventory will be performed.
Cataloging a vault (p. 61) Cataloging all the backups stored in a local folder (except for backups that are not supported by the data catalog, see the command description). acrocmd catalog vault --loc=E:\backups\ Cataloging all the backups stored in a managed vault (except for backups that are not supported by the data catalog, see the command description). This operation is always executed by the storage node service.
Getting system information (p. 64) Saving the system information of the local machine to a file. acrocmd sysinfo --loc=c:\logs\sysinfo.zip 4.8.2 Plans Listing plans (p. 65) Viewing all backup plans on the local machine. The output will be displayed in the raw format (p. 118). Therefore, you will be able to see and use complete GUIDs of plans. acrocmd list plans --output=raw Viewing all centralized backup plans existing on Acronis Backup & Recovery 11.5 Management Server.
Running a task (p. 69) Starting execution of a task on the local machine. acrocmd run task --id=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Stopping a task (p. 69) Stopping execution of a task on a remote machine. acrocmd stop task --host=srv1 --credentials="srv1\AMS user",pass1 --service=ams --address=192.168.1.2 --id=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Deleting a task (p. 70) Deleting a task on the local machine. acrocmd delete task --id=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX 4.8.
To back up the RAID-1 volume DYN2, run the following command: acrocmd backup disk --volume=DYN2 --loc=/home/user --arc=my_archive To back up all three hard disks with volumes, select the volumes 1-1, 1-2, 1-3, DYN1 and DYN2: acrocmd backup disk --volume=1-1,1-2,1-3,DYN1,DYN2 --loc=/home/user --arc=my_archive If you select Disk 3 or volumes 2-1, 2-2, 4-1 or 4-2, the program will create a raw (sector-by-sector) backup. 4.
asz_content list archives asz_create create asz asz_delete delete asz asz_delete_files delete asz_files asz_files — clone clone disk consolidate export backup convert recover vm create backup disk deploy recover disk deploy_mbr recover mbr explore mount export export archive export /include_pits:[pits numbers] export backup filebackup backup file filerestore recover file list list disks list /arc:[archive name] or list /arc_id:[archive id] list backups list /filename:[file