You protect servers in groups, even if you have just one server in a group. Groups allow you to manage your servers in orchestration with each other.
This article explains how to create, edit, disable/enable and remove users from your E2 account.
Before you begin with Carbonite Recover, you have servers you want to protect to the cloud. These servers are called your source servers.
This article provides instructions on how to get started with Carbonite Recover.
This article outlines the Environment options for Carbonite Recover.
You can review your Carbonite Recover subscription usage at any time.
Once you have an environment created, you can add servers or target appliances to the environment manually or through discovery. Discovery is the process of scanning a host in an environment to identify the servers on that host. You can also create a target appliance in your target cloud environment.
After you have failed over to the cloud, you can restore from the replica server back to your original source or to another server. The restore process workflow is different if you are restoring at the group level or at an individual level.
In the event you need to failover one or more source servers, you can quickly fail them over in the cloud. The failover process workflow is different if you are failing over at the group level or at an individual level.
When you have your source servers in your servers list, you can protect those servers. You protect source servers in groups, even if you have just one source in a group. Groups allow you to manage your servers in orchestration with each other.
Use these instructions to add a server or a target appliance that has already been created to an environment.
User guide for Carbonite Recover
This is a comprehensive user guide for purchasing, setting up, and using E2.
This article outlines the available options within the Carbonite Recover interface.
A target appliance is a virtual server in the cloud created from a template provided by Carbonite. You must have at least one target appliance, and it can protect multiple source servers. However, you may need additional target appliances if you are protecting a larger number of disks or to help balance the load when protecting many servers.
On the Jobs page, click the name of a group to see job details. On the Details page, you will find group statistics as well as individual server details and statistics.
Your environment must meet the following requirements.
An environment is a collection of servers. An environment may also have workers or a hypervisor host. A source environment is used to discover and protect your source servers. A target environment is used for the cloud and to provision resources and failover servers in the cloud. You must add a source environment that you will then populate with the source servers you want to protect. You must also add a target environment that you will then populate with your target appliance.
This article outlines the steps to add Environments in Carbonite Recover.
When a new version of the Carbonite Recover agent is available, an information icon will appear next to the server on the servers page. Hovering over that icon shows a message ‘Upgrade Available. Use the Actions menu to upgrade.’ There are two ways to upgrade the agents running on the source (production) and target (cloud).
You may experience an error while automatically configuring a backup in Carbonite Server Backup. This error is most likely caused by entering the incorrect login credentials during the installation of the E2 Agent software on the computer to be backed up. E2 Agent software can only be installed using end user credentials, not Partner credentials. To fix this issue, run the E2 Agent software installation again in Repair mode.
The document embedded in this article is a comprehensive guide to granular restores of Microsoft Exchange and SQL data.
This article covers all the steps needed to back up a computer with E2.
After the restoration is complete, you need to complete failback. This finalizes the identity transfer from the replica server to the failback source.
Carbonite Recover protects any physical, virtual, or cloud server to the cloud. You identify the server you want to protect, and Carbonite Recover will replicate it to a virtual server stored in the cloud. The data is protected using Carbonite Availability real-time replication, also known as the Recover replication agent, which sends only file changes rather than copying an entire file, allowing you to more efficiently use server and network resources. In the event of a failure, you can failover to your replica server in the cloud with minimal downtime.
The E2 Portal is the online portal to control and monitor E2. Sign in with your E2 username and password to access those options. This article contains instructions for signing in.
Instructions for setting up two-factor verification for Carbonite Server Backup.
The E2 Appliance is exclusively available for purchase for Carbonite Partners. This article details the purchase process.
By default, you will receive email messages for the notifications generated by Carbonite Recover. Use the instructions within to change your email notification settings.
E2 is a hybrid backup and recovery solution for small businesses with diverse IT environments and critical data requirements. Combining the speed of local data protection with the reliability of the cloud, E2 brings the power and simplicity of Carbonite to small businesses.
This article lists the contents of the E2 Appliance package and a quick set of steps for setting up.
Solving Common E2 Setup Issues
This article contains some potential issues that may occur during a bare metal restore attempt and what can be done to resolve them.
If an E2 backup fails, it could potentially be caused by issues with Volume Shadow Copy Service (or "VSS"). VSS is a service in Windows that temporarily copies a static version of data for use by another program. E2 uses this service to clone live data in order to back it up. The checklist in this article can be helpful with preventing VSS issues when setting up new backups as well as investigating VSS problems with existing backups.