• Search
  • Results

You Searched for "E2 Troubleshooting Persistent Pending Reboot Message While Installing E2 Agent Software"

Troubleshooting Persistent "Pending Reboot" Message While Installing E2 Agent Software

You may be experiencing an issue where a computer repeatedly reports that a pending reboot is preventing the installation of the E2 Agent Software, and rebooting the machine does not resolve it. If this is occurring, it is very likely due to Windows registry keys that were not properly adjusted by Windows after the E2 Agent software installation.

FAQ: Where Do E2 Customers Get Software Updates?

As an E2 customer, you will only need to update the Agent software on the systems that you are backing up. The software on your E2 appliance will be automatically updated.

Solving Common E2 Setup Issues

Solving Common E2 Setup Issues

How To: Purchase an E2 Appliance

The E2 Appliance is exclusively available for purchase for Carbonite Partners. This article details the purchase process.

E2 User Guide

This is a comprehensive user guide for purchasing, setting up, and using E2.

Setting Up the E2 Appliance

This article lists the contents of the E2 Appliance package and a quick set of steps for setting up.

Signing Into the E2 Portal

The E2 Portal is the online portal to control and monitor E2. Sign in with your E2 username and password to access those options. This article contains instructions for signing in.

FAQ: What is the E2 Replication status based on the “Cloud Icon”?

E2 customers have a “Cloud Icon” on each backup in Carbonite Server Backup. This icon indicates the replication status of that job.

Introduction to E2

E2 is a hybrid backup and recovery solution for small businesses with diverse IT environments and critical data requirements. Combining the speed of local data protection with the reliability of the cloud, E2 brings the power and simplicity of Carbonite to small businesses.

Resetting Your E2 Password

This article contains instructions for resetting your E2 password.

Managing E2 Users

This article explains how to create, edit, disable/enable and remove users from your E2 account.

Recover a Data Volume Using E2

With E2, you can restore individual backed up volumes from 64-bit Windows computers. This article explains how.

E2 - Granular Restore of Exchange and SQL

The document embedded in this article is a comprehensive guide to granular restores of Microsoft Exchange and SQL data.

Using Removable Media to Seed a Cloud Backup for E2

There are some cases where performing a seed backup over the network is extremely slow. In these cases, we can perform a seed backup using removable media instead. This involves receiving a removable media device from Carbonite, creating a local seed backup on the device, and returning the device to Carbonite. Upon receipt, the data from the device is manually inserted into your cloud storage.

E2 - Using the Oracle Plug-in to Back Up and Restore Oracle Databases

The document embedded in this article is a comprehensive guide for installing and using the Oracle Plug-in to back up and restore Oracle databases.

How To: View Your E2 Appliance and Cloud Storage Usage

You can monitor the amount of storage space that is available on an E2 appliance and in the cloud using the online portal.

How to: Back Up a Computer or Server with E2

This article covers all the steps needed to back up a computer with E2.

Troubleshooting Automatic Backup Configuration

You may experience an error while automatically configuring a backup in Carbonite Server Backup. This error is most likely caused by entering the incorrect login credentials during the installation of the E2 Agent software on the computer to be backed up. E2 Agent software can only be installed using end user credentials, not Partner credentials. To fix this issue, run the E2 Agent software installation again in Repair mode.

Troubleshooting Problems with VSS

If an E2 backup fails, it could potentially be caused by issues with Volume Shadow Copy Service (or "VSS"). VSS is a service in Windows that temporarily copies a static version of data for use by another program. E2 uses this service to clone live data in order to back it up. The checklist in this article can be helpful with preventing VSS issues when setting up new backups as well as investigating VSS problems with existing backups.

Viewing Computer and Backup Information

You can view your computers, monitor your backups, and determine whether the last backup was sent to the cloud all from the E2 Portal.

What Happens if I Forget an Encryption Password for a Backup?

If you forget your encryption password for a backup, it is impossible to recover the files. E2 Support cannot help in that circumstance: there is no way to remove the password requirement or decrypt the files manually. Please take every precaution necessary to ensure you remember the encryption passwords you choose for your backups.

Recover Individual Files or Folders to a Different Computer Using E2

This article explains how to restore individual files in one computer backup to a different computer in your E2 protected footprint.

Investigating "Completed with Warnings" Message on Backups

While monitoring backups, you may see a message that a backup "completed with warnings." Follow this article to investigate those warnings.

Recover Individual Files or Folders to the Original Computer Using E2

With the E2 appliance, you can restore individual files stored within backup sets. During this process, one or more selected volumes will mount as virtual drives on the destination computer. The drive(s) will contain the files as they were backed up in the selected backup set.

Preparing the Recovery Media

This article covers preparing recovery media for your E2 appliance. We recommend creating this media as soon as possible so it's ready in case of an emergency.

How to Recover a Windows Computer Using Recovery Media (Bare Metal Restore)

You can recover a Windows computer from a Bare Metal Restore (BMR) backup. If you used automatic configuration, Portal automatically creates BMR backups for 64-bit Windows computers.

Bare Metal Restore Issues and Troubleshooting

This article contains some potential issues that may occur during a bare metal restore attempt and what can be done to resolve them.

Servers Overview

Once you have an environment created, you can add servers or target appliances to the environment manually or through discovery. Discovery is the process of scanning a host in an environment to identify the servers on that host. You can also create a target appliance in your target cloud environment.

HOW: Setting Up Two-Factor Verification

Instructions for setting up two-factor verification for Carbonite Server Backup.

HOW: Update server agents on Recover jobs

When a new version of the Carbonite Recover agent is available, an information icon will appear next to the server on the servers page. Hovering over that icon shows a message ‘Upgrade Available. Use the Actions menu to upgrade.’ There are two ways to upgrade the agents running on the source (production) and target (cloud).

Carbonite Recover Overview

Carbonite Recover protects any physical, virtual, or cloud server to the cloud. You identify the server you want to protect, and Carbonite Recover will replicate it to a virtual server stored in the cloud. The data is protected using Carbonite Availability real-time replication, also known as the Recover replication agent, which sends only file changes rather than copying an entire file, allowing you to more efficiently use server and network resources. In the event of a failure, you can failover to your replica server in the cloud with minimal downtime.

Creating a Target Appliance

A target appliance is a virtual server in the cloud created from a template provided by Carbonite. You must have at least one target appliance, and it can protect multiple source servers. However, you may need additional target appliances if you are protecting a larger number of disks or to help balance the load when protecting many servers.

Requirements

Your environment must meet the following requirements.

Viewing Environment Details

This article outlines the Environment options for Carbonite Recover.

Environments

An environment is a collection of servers. An environment may also have workers or a hypervisor host. A source environment is used to discover and protect your source servers. A target environment is used for the cloud and to provision resources and failover servers in the cloud. You must add a source environment that you will then populate with the source servers you want to protect. You must also add a target environment that you will then populate with your target appliance.

Protecting Servers

You protect servers in groups, even if you have just one server in a group. Groups allow you to manage your servers in orchestration with each other.

Viewing Job Details

On the Jobs page, click the name of a group to see job details. On the Details page, you will find group statistics as well as individual server details and statistics.

Restoring Servers

After you have failed over to the cloud, you can restore from the replica server back to your original source or to another server. The restore process workflow is different if you are restoring at the group level or at an individual level.

Jobs Overview

When you have your source servers in your servers list, you can protect those servers. You protect source servers in groups, even if you have just one source in a group. Groups allow you to manage your servers in orchestration with each other.

Failing Over Servers

In the event you need to failover one or more source servers, you can quickly fail them over in the cloud. The failover process workflow is different if you are failing over at the group level or at an individual level.

Failback

After the restoration is complete, you need to complete failback. This finalizes the identity transfer from the replica server to the failback source.

Carbonite Recover Interface

This article outlines the available options within the Carbonite Recover interface.