recovery operations
play

RECOVERY OPERATIONS Performing recovery and related operations - PowerPoint PPT Presentation

RECOVERY OPERATIONS Performing recovery and related operations Acronis Training and Certification Authorized Use Only 1 Module Outline 1. Recovery Tasks 2. Planning for Recovery 3. Configuring Recovery Tasks 4. Acronis Bootable Media 5.


  1. RECOVERY OPERATIONS Performing recovery and related operations Acronis Training and Certification – Authorized Use Only 1

  2. Module Outline 1. Recovery Tasks 2. Planning for Recovery 3. Configuring Recovery Tasks 4. Acronis Bootable Media 5. Creating the Recovery Tasks 6. Recovery Options Acronis Training and Certification – Authorized Use Only 2

  3. Recovery Tasks What is a Recovery Task Acronis Training and Certification – Authorized Use Only 3

  4. 1. Recovery Tasks Start Recovery Acronis Training and Certification – Authorized Use Only 5

  5. 1. Recovery Tasks ‒ Recovery in Acronis Backup and Acronis Backup Cloud are performed via recovery tasks ‒ A recovery task is a set of rules that specify what and how data will be restored on a given computer ‒ When created from Backup Console, recovery task is registered on the Management Server and the recovery script is deployed to the Agent. After the script is deployed, Agent will execute it immediately ‒ When created from bootable media, recovery task is executed immediately by the bootable version of the Agent Acronis Training and Certification – Authorized Use Only 6

  6. Planning for Recovery How to plan for recovery Acronis Training and Certification – Authorized Use Only 7

  7. 2. Planning for Recovery ‒ Understand your outage and what needs to be recovered, e.g., RTOs and RPOs? Impact on productivity, revenues, normal operations? ▪ Entire machine/disks/volumes/VMs or individual files/folders/databases? ▪ Granular recovery of application items? ▪ Is Acronis Universal Restore required? ▪ Can Acronis Instant Restore be used? ‒ Determine the backups available and the most suitable location for recovery: ▪ From local, network or cloud storage? ▪ Recover to physical, virtual or cloud? ▪ Follow and if necessary adapt disaster recovery plan and business continuity plans to perform recovery Acronis Training and Certification – Authorized Use Only 8

  8. 2. What Can Be Recovered What to back up What can be recovered ‒ ‒ Entire machine 1 or more database to live application server ‒ ‒ Entire machine 1 or more disks and volumes 1 or more database as files ‒ ‒ 1 or more files and folders Granular recovery to live application server ‒ ‒ Disks/volumes 1 or more disks and volumes 1 or more files and folders ‒ Files/folders (physical machines only) 1 or more files and folders ‒ System state (Windows Vista & above) System state ‒ ESXi configurations (ESXi hosts only) ESXi configuration to bare metal ‒ ‒ Exchange mailboxes 1 or more mailbox to live Exchange server Granular recovery to live application ‒ ‒ Office 365 mailboxes Granular recovery to live application Granular recovery as files Acronis Training and Certification – Authorized Use Only 9

  9. 2. What Can Be Recovered What can be recovered Application From database backup From application-aware backup From disk-level backup ‒ ‒ ‒ Database to live Exchange Entire machine Entire machine ‒ ‒ Database as files Database to live Exchange Microsoft Exchange Server ‒ ‒ Granular recovery to live Exchange Database as files ‒ Granular recovery to live Exchange ‒ ‒ ‒ Database to live SQL instance Entire machine Entire machine Microsoft ‒ ‒ Database as files Database to live SQL instance SQL Server ‒ Database as files ‒ ‒ ‒ Database to live SQL instance Entire machine Entire machine ‒ ‒ Database as files Database to live SQL instance Microsoft SharePoint database servers ‒ ‒ Granular recovery using ASPE Database as files ‒ Granular recovery using ASPE ‒ Entire machine Active Directory Domain Services Acronis Training and Certification – Authorized Use Only 10

  10. 2. Recovering Applications ‒ For Microsoft Exchange : ▪ Exchange databases can recovered from database or application-aware backup ▪ Mailbox and mailbox items can be recovered from database, application-aware and mailbox backups for Microsoft Exchange 2010 SP1 and above ▪ Recovery can be performed to original or new Exchange sever of the same version and requires Agent for Exchange or Agent for VMware (for VMware ESXi VMs) ▪ Target Exchange Server and machine running the Agent must belong to the same AD forest and the following items can be recovered: • Database and database as file • Mailbox and mailbox contents such as Emails, Email folders, Calendar events, etc • When recovering an entire mailbox to existing mailbox, existing items with matching IDs are overwritten and when recovering individual items, they will appear in the Recovered items folder Acronis Training and Certification – Authorized Use Only 11

  11. 2. Recovering Applications ▪ Mailbox being recovered from backup must have an associated user account in Active Directory and the user account must be enabled ▪ Shared, room and equipment mailboxes can only be recovered if their associated user accounts are disabled ▪ Mailboxes that do not meet the conditions above are skipped during recovery and Warning status will be shown after recovery ▪ Exchange databases that have been recovered as files will be in a Dirty Shutdown state and additional steps have to be taken to bring it to a Clean Shutdown state before it can be mounted to an Exchange server Acronis Training and Certification – Authorized Use Only 12

  12. 2. Recovering Applications ‒ For Microsoft SQL : ▪ SQL databases can recovered from database or application-aware backup ▪ Requires Agent for SQL , Agent for VMware can only recover database as files ▪ Recover database as files can be used to recover to a machine where no Agent is installed and thereafter the database can be attached to the SQL instance ▪ User databases can be recovered to same or higher version of Microsoft SQL, System databases can only be recovered to the same version ▪ State of the database can be specified during recovery: • Ready to use [RESTORE WITH RECOVERY] (default): Database will be ready for use after recovery, users will have full access. All uncommitted transactions of the recovered database will be rolled back and additional transaction logs from native Microsoft SQL backups cannot be applied Acronis Training and Certification – Authorized Use Only 13

  13. 2. Recovering Applications • Non-operational [RESTORE WITH NORECOVERY] : Database will be non-operational, users will not have access. Uncommitted transactions will be kept. Additional transaction logs from native Microsoft SQL backups can be applied to reach desired recovery point • Read-only [RESTORE WITH STANDBY] : After recovery, users will have read-only access to the database. All uncommitted transactions will be rolled back. Undo actions will be saved in a temporary file so that recovery effects can be reverted. Mainly used to detect the point in time when an error occurred ▪ Recovering System databases: • All System databases of an instance are recovered at once and destination instance will be restarted in single-user mode when the recovery starts and after recover completes, will be restarted again in normal mode • System databases are always recovered in the Ready to use state • If Master database is recovered, database that are created after the backup (recovery point) will not appear in the target instance, these databases have to be manually attached to the instance in order for them to be operational again and databases that have been deleted after the backup will appear as offline in the instance and have to be deleted manually by using SQL Server Management Studio Acronis Training and Certification – Authorized Use Only 14

  14. 2. Recovering Applications ‒ Recovering DAG (Exchange cluster) or AAG (SQL cluster): ▪ Requires that the DAG or AAG is backed up (not individual databases or items) ▪ Select the clustered database for recovery from the Backup menu; target node for recovery is automatically selected by the Agent when creating the Recovery Task ▪ For DAG, after recovery is complete, manually configure or resume replication on the cluster ▪ For AAG, target database to be recovered (if live) must be excluded from the AAG prior to recovery as a database in an AAG cannot be overwritten Acronis Training and Certification – Authorized Use Only 15

  15. 2. Recovering Applications ‒ For Microsoft Office 365 : ▪ Granular recovery can be performed from Office 365 mailbox backups ▪ Mailboxes and mailbox items can be recovered to Office 365, downloaded as files or sent as email as a form of recovery ▪ When recovering an entire mailbox to existing mailbox, existing items with matching IDs are overwritten and when recovering mailbox item to original location, a copy is created ▪ To find items to recover easily, use search (wildcards not supported) • For email messages: By subject, sender, recipient and date • For events: By title and date • For tasks: By subject and date • For contacts: By name, email address and phone number Acronis Training and Certification – Authorized Use Only 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend