Server Backup generates warning alerts to inform users that the current course of action could be dangerous or detrimental in some way.
An application programming interface (API) is an interface implemented by a software program that enables the program to interact with other software. For more information about the Server Backup API, see Use the Server Backup API.
An archive point is a copy of the most recent recovery point, which is used for long-term data storage to provide further integrity and safe keeping of data. Archive points support all functionality of the recovery point. You can browse and restore your files as well as perform a bare-metal restore. For more information about archive points, see Manage archiving.
Server Backup includes advanced recovery point archiving rules. This process involves archiving the most recently available recovery point as configured on an hourly/daily/weekly/monthly/yearly basis for long-term storage. For more information about archiving, see Manage archiving.
The small application that runs on protected servers and communicates with the Server Backup Manager. The Backup agent is often referred to as the "cdp-agent" or "CDP Agent," which is the name of the startup script on Linux.
The Backup server is the system where backups are stored and processed for restorations.
A bare-metal system is a new computer system that does not contain an operating system or any software.
The Server Backup bare-metal restore is the process of instantly rebuilding a computer or server from scratch after a catastrophic failure. Server Backup application allows to restore servers directly from disk-based backup. There is no need to first partition your drive and install the operating system. For more information about bare-metal restores, see Perform a bare-metal restore.
The file system of every operating system divides the hard disk into groups of bytes called blocks. A block-based backup application reads the data from these blocks. Block-based backups are more efficient than backup applications that read every file using file system, which is a slow and time consuming process.
Compression is the reduction in size of data in order to save disk space or transmission time. Server Backup uses two types of compression: Zlib or QuickLZ.
control panel instance
A control panel instance is an occurrence of a hosting control panel or certain installation on the server where the Backup Agent resides. When working with policies, you must add the instance to the policy. For each instance, specify the control panel type, name, description, and Virtuozzo Container ID if it exists. For more information about control panels instances and hosting control panels, see Hosting control panels.
data protection policy
A delta is the data that changed since the last backup run. Various types of data are considered deltas depending on how the backup application computes deltas. You may consider a delta as a raw disk block, a variables-length portion of a file, or even a complete file depending on the method of calculation.
Server Backup uses the block deltas database to map the block deltas versions and recovery points. This database is a Disk Safe. Disk Safes contain the data needed to restore the devices on a server. Note that you can also create encrypted Disk Safes. For more information about Disk Safes, see Manage Disk Safes.
an export occurs when you move files from a recovery point in the Disk Safe to an off-site server or local hard disk. For more information about exporting a Disk Safe, see Copy or move Disk Safes.
File excludes are files and folders that a user wants to excluded from replications. The system allows you to define various exclude rules while customizing the settings of a replication. For more information about file excludes, see Exclude files and folders.
full block scan
A full block scan is a particular type of Server Backup replication of a device. This scan occurs under certain conditions and is required to get the asynchronous replication back in sync. Not that this is a time- and resource-consuming process that may reduce network throughput.
The system generates a globally unique identifier (GUID) as a unique reference number in computer software. The value of a GUID is represented as a 32-character string, such as 0f6b6a6e-d444-4c77-a026-f76be7723e16.
Hyper-V VHD Explorer
R1Soft offers Hyper-V VHD Explorer for you to mount and dismount your Hyper-V virtual hard disk (VHD) files. Explorer shell integration adds right-click attach and detach actions to .vhd files in Microsoft Windows Explorer. Use the Hyper-V VHD Explorer as a graphical user interface to manage all your mounted VHD files. For more information about Hyper-V VHD Explorer, see the product page on the R1Soft Website at www.r1soft.com.
The first recovery point that contains all used parts of the hard disk except for excludes. Subsequent synchronizations contain only deltas.
Limit disk space available to Server Backup
Limited disk space available to Server Backup is an option that defines how much free space is left available for use by Server Backup. This is an effective limit defined in percent of the device volume. When the system reaches the set limit, you cannot generate any new recovery points. As a result, any replication stops and fails.
locking recovery points
Server Backup allows you to lock recovery points and protect them from a merge or deletion. note that when a recovery point is locked, Server Backup cannot perform the Disk Safe verification task. For more information about this task, see Schedule Disk Safe verification.
A log file is a file that lists actions as they occur. Server Backup includes log files that contain messages from tasks performed by the Backup Agent (cdp.log), log files that contain messages from the Backup Manager (server.log), and log files that contain messages from the Web GUI and start up/shut down tasks (monitor.log). For more information about log files, see Access log files.
As a security precaution, Backup Agent allows connections only from specified Backup Managers. To specify a Backup Manager, add a manager public key to the Backup Agent by creating the appropriate text file on the server. For more information about encryption keys, see Add key to Linux Backup Agent and Add the key to Windows Backup Agent.
merge recovery points
When you delete a recovery point you are actually merging the unwanted recovery point and closest existing recovery point. You can discard deltas between the two recovery points and free the space the data consumes in the Disk Safe. For more information about recovery points, see Merge recovery points.
In Unix-like systems, a mount point is the location in the operating system directory structure where a mounted file system appears. In Microsoft Windows, mapping a drive is the equivalent to a mount point.
MySQL is database software that features a variety of tools and provides multi-user access to a number of databases. Server Backup allows to back up and restore MySQL databases. For more information about Server Backup and MySQL, see Protect MySQL.
Partition as an action means to divide memory or mass storage into isolated section within the hard disk. A partition table is a placeholder for the description of a partition on the hard disk.
policy (data protection policy)
A policy is a schedule of Disk Safe replication and is assigned to a Disk Safe. You can create one-time policies or schedule recurring policies. Policy properties allows you to start the policy at a set time and include the number of recovery points you want to keep in the Disk Safe. For more information about using policies, see Manage policies.
Policy frequency is the recurrence selected for running the policy. You can select the policy to run:
- On demand
- By the minute or hour
- Daily, weekly, monthly, or yearly
For more information about using policies, see Manage policies.
A recovery point is a set of many deltas that represent the state of a disk volume block at a particular point in time. Each delta is available for use by one or more recovery points. The Disk Safe maintains the relationship between deltas and recovery points. For more information about recovery points, see Manage recovery points.
recovery point limit or retention
Recovery point limit or retention defines how many recovery points you want to keep in the Disk Safe. Note that the system merges old recovery points. For more information about recovery points, see Manage recovery points.
Replication is the operation of copying block-level deltas from the server to Server Backup into a new recovery point. Each replication creates a point-in-time image or recovery point of the device. For more information about replication stages, see Understand the replication stages.
SBM (Server Backup Manager) is the abbreviation used to refer to both the SBM product and the management software running on the Backup server.
Servers are computers that are backed up or replicated. Server Backup allows you to manage backups for multiple servers. For more information about servers, see Manage servers.
snapshot the disk or volume
The first stage of replication is to create a snapshot of the disk or volume. The system creates a point-in-time snapshot of the server file system for a consistent, open file backup.
Synchronization is the process of creating the Disk Safe point-in-time snapshot and computing deltas based on the last completed synchronization. For more information about synchronization, see Manage policies.
vacuuming Disk Safes
Vacuuming a Disk Safe is the process of reducing the on-disk size by "vacuuming" or removing blocks that are no longer used by a file system. For more information about vacuuming, see Vacuum Disk Safes.
Virtual Hard Disk (VHD) is a file format used as a hard disk of a virtual machine. VHD allows you to deploy multiple operating systems on a single host machine. VHDs are available with software that enables you to evaluate different software solutions in your own environment without the need for dedicated servers or complex installations. The Hyper-V VHD Explorer allows you to manage all your mounted VHD files. For more information about Hyper-V VHD Explorer, see the product page on the R1Soft Website at www.r1soft.com.
Volume is the storage capacity of one or more Disk Safes. Volumes are containers in the replication system. For more information about volumes, see Manage volumes.
Warn when disk usage exceeds
Warn when disk usage exceeds is a warning level where users are informed that they are close to reaching their effective limit. The level is also defined in percent of the device volume. This limit is usually a lesser value to the Limit disk space available to Server Backup option.