Skip to main content

Data Recovery


Data Recovery Types: 

 File Restore:- This option allows you to mount the selected recovery point as a LAN accessible windows samba share and as a web-accessible share. File permission is not preserved. All users with access to the share will have access to its entire file structure. If you need to retrieve data, this option is quicker and easier than the other options. 

 

Volume Restore:- Use a Volume restore if you would like to restore files with their NTFS intact. When you select this option, the contents of the chosen recovery point will share over your network as an ISCSI target. 

 

Local Virtualization:- The Local Virtualization option allows you to create a virtualization of a selected recovery point and host it locally on your Datto appliance. This option is available for Windows and Linux protected machines. 

 

Virtualize in the Cloud/Hybrid Virtualization:-  

 Note:- This option is unavailable for SIRIS Private replicated snapshots. 

 This virtualization option allows you to host virtualization in the Datto cloud and bridge it to your local network through your Datto appliance. 

 This option is available for Windows and Linux protected machines. 

 

Virtualize via Hypervisor:- This option allows you to offload local virtualization to your hypervisor to take advantage of its superior system resources. 

This option is available for Windows and Linux protected machines. 

 

ESX Upload:- This option uploads a restore point to a connected ESX host via VMware converter. Use this option if you want to use the ESX host for computing power and as a datastore. 

This option is available for Windows and Linux protected machines. 

 

Rapid Rollback:- This option does not appear in the Datto appliance GUI, but it is available for all SIRIS and ALTO appliances via the Datto utility environment. Rapid Rollback allows you to restore only the files which changed on a production machine since the last backup. Use this option to undo widespread file changes, such as those caused by a ransomware infection or to restore deleted data to the original state and location on a protected system. 

 

Bare Metal Restore:- The Bare metal restores option allows you to use the Datto utility environment to reimage a protected system from a selected snapshot completely. 

 

Diskless Restore:-  

Note:- This option is unavailable for SIRIS private replicated snapshots. 

 Instead of virtualizing a recovery point directly from the Datto appliance, you can offload the virtualization to any target hardware capable of booting from a USB stick. The imaged USB stick used iPXE on the network card of the local machine to boot and then virtualizes the recovery point from the Datto appliance.  

 

Consider diskless restore as an alternative to the local virtualization if: 

  • The number of resources needed by the virtualization would be prohibitive to allocate on the Datto appliance. 

  • You need a higher level of performance than what the virtualization can deliver on the Datto appliance. 

  • You have spare hardware that is available to image as a production machine temporarily. 

  • Virtualization via hypervisor is not an option. 

 

Export Image:- This option allow you to export a selected restore point to vSphere Hypervisor(via VMDK or VMDK-linked) or Microsoft Hyper-V(via VHD or VHDX). You can export to an attached USB drive or a network share (CIFS/Samba or NFS). 

Consider an image export if you need to re-create a virtual machine from a previous backup 

completely or if a protected machine's physical hardware has failed and you will be returning it to production as a virtual host. 

 

iSCSI Restore:- Use this option if you want to restore an iSCSI file share as an iSCSI target. Consider an iSCSI restore if you want to attach a file restore to a production machine as a logical volume with all file permissions intact. 

 

iSCSI Rollback:- The iSCSI Rollback feature allows you to roll back an iSCSI share hosted on your Datto appliance to a previous recovery point. All data added after the chosen recovery point will be destroyed. You should consider an iSCSI rollback if irreparable damage has occurred to the NAS share, such as widespread file deletions or ransomware infections. 

 

File Restore(External NAS):- The file restores option for external NAS share allows you to mount a selected recovery point as a LAN accessible Windows Samba share and as a web-accessible share. File permission is not preserved. All users with access to the share will have access to its entire file structure. Use this feature if you want to restore the contents of a protected externally hosted NAS share without their original ACL attributes. 

 

File Restore with NTFS Permission(External NAS):- This content of the selected recovery point will share over your network as a recovery point will restore with the ACL attributes they had at the time of the snapshot use this recovery option if you want to restore an externally hosted NAS share with its file permission intact 

 

Granular Restore:- Used for Exchange and SQL backup. 

Comments

Popular posts from this blog

Datto Backup Process

                                                    Backup Process Local Backup The protected machine generates data that needs to be backed up.   The Datto appliance sends a backup request to the agent software installed on the protected machine.   The agent software opens the network transfer protocol and initiates the VSS snapshot on the protected machine.   The backup data is transferred over the network to the Datto and written to the live dataset.   On the Datto appliance, ZFS takes a point-in-time snapshot of the live dataset and integrates it into the backup chain.         Roundtrip:-                Roundtrip drives are external hard drives provided b y Datto to expedite the transfer of large data sets to the Datt...

Beyond the Basics: Understanding the 3-2-1 Backup Rule

In our increasingly digital world, data is king. From cherished family photos and important financial documents to critical business records, our lives and livelihoods depend on the availability and integrity of our digital information. But what happens when disaster strikes? A hard drive crashes, a laptop is stolen, a ransomware attack locks down your files, or a natural disaster renders your primary systems unusable? ​That's where the 3-2-1 backup rule comes in. It's a simple, elegant, and incredibly effective strategy for data protection that every individual and organization should adopt. Forget complex jargon – let's break down this fundamental principle of digital resilience. ​What is the 3-2-1 Backup Rule? ​The 3-2-1 rule is a widely recommended guideline for ensuring your data is safe and recoverable in almost any scenario. It's built on three core tenets: ​ 1. 3 Copies of Your Data: This is your foundational layer of protection. You should al...

Windows Stuck on "Preparing to configure Windows"

           Preparing to configure Windows. Do not turn off your computer.   When server got stuck from long time on “Preparing to configure Windows Do not turn off your computer” . Don’t powering it off because it may be bad effect on your OS. Here have fix to get rid out of this.                                                                                                   Steps to Fix: Logged into another server on the same domain. Open Services console Right Click on Service (Local), then click on “Connect to...