Thinking about using your own hardware?
Because x360Recover is hardware agnostic, you can choose to use your own hardware, so long as it meets the minimum hardware requirements. BYOD is particularly convenient when you already have access to hardware that you want to reuse.
The BYOD option requires that you download and install the software onto your hardware. This means you'll need to pay special attention to hardware requirements.
Below are some things to be aware of as you get started with x360Recover as a Bring Your Own Device (BYOD) platform.
Before you get started: Requirements
Prepare for install
Note: The x360Recover appliance and vault use the same ISO image for installation. The procedures are exactly the same for installing any of x360Recover’s main components. You will assign the device to a particular role during the "Setup & Configuration" stage, which is performed after installing the base operating system.
- x360Recover automatically updates all of the software and agents so you do not have to worry about managing the underlying operating system. Additionally, the Axcient support team is available to assist you whenever necessary. Review the How to use the Linux shell article for instructions on accessing our simplified Linux command line environment.
- Prior to your first deployment of x360Recover , please review x360Recover Best Practices. This should answer many of the questions you may have during your installation process, and provide you with an understanding of best practices to use when deploying the product.
x360Recover does not require you to purchase proprietary hardware. You can choose your own hardware if it meets the minimum hardware requirements; however, the hardware you choose must be compatible with Ubuntu Linux 18.04 LTS (Bionic Beaver). Current versions of x360Recover ship an updated kernel, so please consult the following links to determine whether or not the hardware you want to use will support Linux.
NOTE: We are actively developing the upgrade to Focal (Ubuntu 20.04). Focal will be supported by Ubuntu LTS until April 2025. After we release Focal (20.04), we will set our sights on Jammy Jellyfish (22.04). Our goal is to have this done before the 20.04 EOL in 2025.
Bare metal install
We recommend that you install the x360Recover appliance software on bare metal for the best performance and to take advantage of automated backup verification booting.
Minimum hardware configuration |
OS: 8GB RAM, 4 Cores minimum recommended for 1-5 protected systems
Compatibility: Must be compatible with Ubuntu 18.04 LTS (Bionic) and must be 64-bit OS
If you are backing up more than five (5) servers:
- For every additional five protected systems (production servers being backed up), x360Recover requires four (4) more GB's of RAM and two (2) more cores.
Example: To backup 6-10 servers, x360Recover requires a minimum of 12 GB RAM and 6 cores.
Add the additional memory needed to support running the protected systems as virtual machines.
Example: Two protected systems that normally run with 4GB of RAM would need the standard 8GB of RAM plus 8GB of RAM for virtualization so a total of 16GB.
- We recommend using ECC RAM for data protection and performance.
Machine must have at least three hard drives:
Three physical hard drives are required as a minimum:
- One drive must be dedicated to the operating system. A minimum of 100 GBs is needed for the OS drive, but use of a 256 GB M.2 is recommended. NVMe is supported with x360Recover v8.2.3 and above.
- The remaining two or more drives must be used for storage in a RAID1, RAID5 or RAID6 set.
- x360Recover uses a software RAID. If your BDR has a hardware RAID controller it must be set to a RAID0 or JBOD configuration. Some RAID controllers may not be supported.
SMR-based hard drives are not suitable as x360Recover storage devices.
Shingled magnetic recording (SMR) is a hard drive storage technology that improves data density and storage capacity on disk, at the expense of write performance. SMR drives achieve high storage density by overlapping tracks of data slightly on top of neighboring tracks. The underlying storage mechanism writes entire tracks in a high density fashion that is not conducive to the random write patterns associated with the native copy-on-write functionality of ZFS. Severe performance limitations have been observed with x360Recover when employing SMR based hard drives, and these storage devices are not recommended for use with the product.
Please note: Nightly Boot VM Checks are enabled by default and require an additional 2 GB of RAM and 2 available CPU cores to perform.
If you intend to use virtualization for instant recovery:
1. Processor must support hardware assisted virtualization:
- Intel VT
- Intel processors significantly outperform AMD
Note: VMware ESXi 5.5+ supports only Intel processors for Nested Virtualization
2. You must include additional RAM and CPU cores for running virtual machines
3. The minimum total memory required to enable BootVM checks is 10GB
The software/hardware RAID controllers available onboard some motherboards are not supported by Linux and can be used only in IDE/SATA mode.
Unless you are using SAN storage, we recommend using the software RAID provided by the appliance rather than a hardware RAID controller. ZFS Software RAID is more robust than hardware RAID. Alerting for faulted disks, and failed disk replacement are not supported within the x360Recover GUI when using hardware RAID.
Hybrid Software/Hardware RAID controllers are not supported
- We highly recommend installing on bare metal
- Microsoft Volume Shadowcopy Service (VSS) requires sufficient free space on the disk to maintain changed data during backup operations. We recommend maintaining at least 10% free space on each drive volume to ensure sufficient free space is available to backup the system.
To ensure that the installation can complete successfully, the system should be connected to a network with DHCP and open Internet access.
After installation of the basic operating system, provisioning and configuring the x360Recover device requires Internet access to perform any necessary software updates and register the device to the License Portal.
When booting from a USB device, it may be necessary to change the default boot order of the system.
- Power on the system and press the appropriate key (Typically <Del>, <F1> or <F2> on most white-box systems, or <F9> on HP servers) to enter the BIOS setup menu.
- Locate the boot order management page within the BIOS and configure the system to enable booting from USB Flash drive.
- Ensure that the boot order places the USB device before internal Hard Drives. Alternatively, press the Boot Menu key (Typically <F9>, <F10>, or <F11> on most systems) and directly select the USB device to boot from.
Note: x360Recover and the Linux operating system do not support booting from motherboard (fake) RAID controllers (BIOS has an option to select RAID for the onboard SATA ports). This onboard ‘RAID’ functionality is really software-based RAID that requires Windows-only drivers that are not available on Linux. If your motherboard has such an option, ensure that the SATA ports are configured in SATA or AHCI mode for compatibility with Linux.
Consult your system motherboard documentation for instructions on selecting between RAID and SATA/AHCI boot modes.
Install the operating system
x360Recover runs on a custom Ubuntu 64-bit Linux operating system. The x360Recover installation ISO will deploy the basic operating system along with all x360Recover application components.
- Download the latest x360Recover installation ISO here.
Once you have downloaded the ISO, you can make a bootable image of the installer on a USB flash drive (the steps below reference the Linux Live USB Creator, or LiLi, software, but you can use your preferred USB-creation software).
Create a bootable USB drive
1. Navigate to the Downloads site and download the ISO file.
2. Navigate to the Linux Live USB Creator site (or your preferred USB-creator software site) and download and install the LiLi application.
3. When LiLi is installed, insert a USB drive into your computer.
4. In the Step 1 section of the LiLi application, click the blue Refresh button and select your USB drive from the drop-down menu.
5. In the Step 2 section, click the ISO/IMG/ZIP icon and select the ISO file previously downloaded from the Downloads site. When the ISO is verified, you might notice an error message. You can safely ignore this message.
6. In the Step 4 section, select the Format the Key checkbox.
7. In the Step 5 section, click the lightning icon to create the bootable flash drive.
The following steps describe the installation of the underlying x360Recover operating system.
Prepare to install
Once the BIOS configuration has been completed:
- Ensure that the DVD or USB flash drive is inserted into the system.
- Exit from the BIOS after saving any settings changes.
- Reboot the machine.
The x360Recover installer should now load on the system.
STEP 1. Boot the x360Recover OS.
The initial Boot Menu defaults to booting to the local hard drive.
Use the cursor keys to scroll up and down in order to select one of the available installation options
Standard eFolder Replibit Installation is the recommended option in most cases. This installs x360Recover using the standard Ubuntu 18.04 Linux Kernel.
HWE Kernel eFolder Replibit Installation is recommended for systems that fail to install using the standard Linux kernel due to missing hardware driver support for very new systems. This option installs x360Recover using the Ubuntu 18.04 Hardware Enablement kernel. This kernel has driver support for newer hardware but has undergone less testing.
eFolder Nano Installation is intended only for eFolder Nano devices. This special installation mode has support for installing x360Recover onto systems that have only a single hard drive that will be shared for both the operating system and data storage. x360Recover typically installs the operating system on a dedicated volume and then stores data on a separate set of multiple disks. This is intended to provide redundancy for your backup data in the event of a disk failure. IMPORTANT NOTE: We highly recommend using the standard installation method when building your own x360Recover BDR hardware! The eFolder Nano Installation is password protected. If you require installation onto a single-disk BDR environment, contact Axcient Support for assistance.
Once you select an option, the installer will boot to the Installation Wizard.
The x360Recover splash screen will be displayed while the installer loads.
STEP 2. Select installation type.
The Axcient x360Recover installer menu appears.
Select Erase Disk and Install Replibit.
Note: Do not select encryption and do not select LVM partitioning.
IMPORTANT NOTE: If any other operating system is installed on the system, it will be destroyed, and replaced with the x360Recover operating system.
STEP 3. Select the drive to be used
Select the drive where you wish to install the x360Recover operating system.
Typically, this choice will be (sda):
After you have selected the preferred drive, click Install Now.
Note: This disk will be formatted and erased during the installation.
STEP 4. Complete the installation
Installation will now proceed. Please wait for this step to fully complete. Loading the operating system may take several minutes, depending on the hardware and type of USB installation media being used.
When the installation is complete, remove the DVD or USB flash drive from the system.
Then, click Restart Now.
Note: Depending on your system BIOS, it may be necessary to press the <Space> bar once to continue (if the reboot appears to be stalled.)
Once the system has finished rebooting, the login screen will be presented.
Note the IP address presented and continue with provisioning the setup and first-time login to the appliance.
Configure the device as a appliance
When your appliance has the operating system software installed, you can begin the provisioning and configuration process. The appliance must have Internet access to complete this process.
1. Power on the appliance.
2. Record the IP address listed on the screen. If you do not see an IP address, wait a few minutes and them press the Enter key on your keyboard to refresh the screen.
3. When you have recorded the correct IP address, open a browser on a different machine within the same network. Make sure your appliance is turned on, because you will not be able to access this location when the appliance is turned off.
4. Click the Proceed button to continue.
5. In the Setup Wizard, read the End User License Agreement (EULA) and select the I Accept the terms in the license agreement radio button.
6. Click the I Agree button to continue.
7. In the next screen, click the First machine in Cluster radio button.
8. Click the Next button to continue.
9. In the next screen, configure each appliance password, including:
- The Linux RootUser password, which is the operating system super-user; this user requires a highly secure password,
- The User password, which is a limited access shell account, and
- The Admin (Web GUI) password, which is used to access the Web Interface and all features
10. Click the Next button to continue.
11. In the next screen, select the Appliance option to indicate this machine will serve as the appliance.
12. Click the Next button.
13. In the next screen, enter your reseller username and password and then click the Get Customers button. The screen expands, prompting you to select the Customer and Location where this appliance will be deployed.
14. In the Customer Username drop-down menu, select the appropriate Customer Username.
15. In the Customer Location drop-down menu, select the appropriate Location. If the drop-down menu does not display a list of customers and locations, then you do not have customers with unused locations configured within the License Portal.
16. Click the Next button when you are finished.
17. In the next screen, use the Select Time Zone drop-down menu to select the time zone for the selected Location.
18. Click the Setup button when you are finished. The appliance will complete the configuration process and reboot.
Log in and set up the storage pool
When the appliance is configured and ready to be used, you will be able to access the appliance web interface from any browser in the network. If you ordered a preconfigured Axcient BDR appliance, you will be able to access the appliance web interface as soon as you turn on your appliance. You will need to use the password you defined during the ordering process.
1. With the appliance turned on, type the IP address of your appliance into the address bar.
2. When prompted, type your Username (admin) and your Password and then click the Login button.
3. In the appliance web interface, you can now manage settings and add a storage pool.
Auto-enable Remote Assist
When you first log in, a pop-up window displays, prompting you to configure the Auto-Enable Remote Assist feature. We highly recommend selecting Yes.
When you enable this feature, Remote Assist is automatically enabled for 7 days following an upgrade of the software. Remote Assist allows Axcient Support to access your BDR devices without your intervention in order to perform troubleshooting tasks. Axcient monitors all BDR devices through Telemetry and attempts to proactively correct issues that might occur during updates.
Add a Storage Pool
Unless you ordered a preconfigured BDR appliance, you will be prompted to create the storage pool when you first log in to the device.
1. In the left-hand navigation menu, click Manage Storage.
2. In the Storage Pool page, click to expand the Storage Pool heading and then click to expand the Unused Disk(s) heading.
3. Select the following settings:
- RAID level
- Compression level
4. Click the Create Storage button when you are finished.
Best practice: Storage pool settings
When setting up the Storage Pool, you will need to consider RAID level, compression level, and disk selection. All of these settings are discussed below.
Consider the following best practices when setting up RAID level for the storage pool:
RAID-0 should never be used for production, as this option provides no redundancy. The loss of any disk in the Storage Pool will corrupt its data integrity.
For RAID-1, RAID-5 and RAID-6, one or more disks are reserved to store parity or redundancy information.
RAID-1 requires a minimum of 2 disks. All disks in a RAID-1 set are mirror copies of the data, and the total usable data size is equivalent to the size of 1 disk. Note that it is possible to allocate more than 2 disks in a RAID-1 set, but not common practice.
A maximum of 1 disk can be lost within a RAID-1 set without losing Storage Pool data integrity.
RAID-5 requires a minimum of 3 disks. In RAID-5, data is written across each disk in the set sequentially, with every 4th block being parity data. This distributes the data and parity information evenly across all disks in the set. The total usable space with RAID-5 is the total of all disks in the set, minus 1 disk of parity. For example, 3 disks that are each 2TB in RAID-5 yields 4TB.
A maximum of 1 disk can be lost within a RAID-5 set without losing Storage Pool data integrity.
RAID-6 requires a minimum of 4 disks. In RAID-6, data is written across each disk in the set sequentially and parity data is stored using an advanced data guarding algorithm. This distributes the data and parity information evenly across all disks in the set. The total usable space with RAID-6 is the total of all disks in the set, minus 2 disks of parity. For example, 4 disks that are each 2TB in RAID-6 yields 4TB.
A maximum of 2 disks can be lost within a RAID-6 set without losing Storage Pool data integrity.
Expand the storage pool
- While you can expand the storage pool after initial configuration, the storage pool must be expanded by the same number of disks chosen during the initial setup, using the same RAID level.
- Expansion of the storage pool is performed through spanning. With spanning, multiple RAID-1, RAID-5, or RAID-6 disk sets are expanded together by creating a RAID-0 set of RAID sets. This is sometimes referred to as RAID-10, RAID-50 or RAID-60.
Consider the following best practices when setting up the compression level for the storage pool:
Consider the following best practices when selecting disks for the storage pool:
- We recommend never selecting more than 10 disks in a single RAID set.
- The more total disks you have within your storage pool, the better the overall disk performance will be.
- Adding many disks to a single RAID set increases the risk of data loss, as you can only lose 1 (RAID-5) or 2 (RAID-6) disks in the set before losing data integrity.
- Spanning together multiple smaller RAID sets increase performance with less risk, as there are more total parity drives, and you are less likely to lose data integrity.
Create the storage pool
Once you have selected the correct RAID level, the required compression level, and the desired storage disks, click Create Storage to create the storage pool.
The Storage Status section at the top of the page will list the availability status and pool configuration once the pool has successfully been created.
640 | 874
Migrate an existing appliance
There are situations when you may decide to relocate a protected system in x360Recover from one device to another. For instance, you might want to migrate to a new appliance or create a better balance of storage consumption between vaults.
In order to facilitate this process, x360Recover has the ability to perform a full migration of protected systems, including all recovery points, job histories, and metadata from one device to another.
Steps to migrate an existing appliance
STEP 1. Before beginning migration, prepare a new appliance for the customer by doing the following:
STEP 2. Verify that no backup or replication jobs are active for the protected system by checking the, Backup and Replication pages on the Jobs menu.
STEP 3. Stop and Disable the x360Recover Agent Service on the protected system.
STEP 4. On the appliance, set the retention policy. See Snapshot retention settings for details.
STEP 5. On the appliance, go to the Protected System Details page of the system you are migrating, and select the Migrate button.
If replication is configured for the protected system, replication settings (including remote connectivity settings defined on the Vault Settings menu of the appliance) will be copied, and migrated to the new appliance.
STEP 6. Choose a migration method by clicking on the corresponding radio button from the following settings:
Note: If migrating via USB, an encryption password is required.
IMPORTANT NOTE: Please do not lose this password as it cannot be recovered!
STEP 7. When you have selected your desired migration setting, and entered your encryption password, click the Migrate button to begin the migration process.
Note: You can monitor the progress from the System tab on the Jobs menu pane.
---7a. If migrating via network , the migration process will automatically complete in two steps:
(a) Migration Export on the source appliance, and then (b) Migration Import on the target appliance. Once the Export job is completed successfully on the source appliance, the Import job will automatically start on the target appliance. Then:
- Verify that the migration job completes successfully on the source appliance.
- Verify that the migration job completes successfully on the target appliance.
---7b. If migrating via USB, once the export process completes on the source appliance, connect the USB drive to the destination appliance.
From the Protected Systems page, click the Import button, and then select the protected system being migrated.
You will be prompted for the Password.
STEP 8. Monitor the migration import process from the System page on the Jobs menu.
Verify that the job completes successfully.
STEP 9. Once the migration has successfully completed, reconfigure the agent for the new appliance, or change the IP address of the new appliance to match the old appliance:
- To update the agent on the protected system: Edit Aristos.cfg on the protected system, and change the IP address to that of the new appliance being migrated to.
- If migrating within a cluster, once the job is successfully received on the destination appliance you must reconfigure the Agent to point to the new Appliance IP address.
STEP 10. Once migration of all protected systems has been completed (from the original appliance to the new appliance) , delete the location associated with the original appliance. For details, review Manage client accounts in x360Recover Manager
This will revoke assigned licenses and remove the protected system data from Recover Manager.
Note: Verify that you are deleting the correct location.
On the original appliance, navigate to System Settings -> License Details and note the location.
Have you considered ordering a non-configured appliance from Axcient?
That's a scenario where you buy or lease an Axcient-branded BDR appliance, pre-installed with the operating system, but not yet configured for a particular environment. This option saves you the time and money of installing the software on your own hardware and simplifies the ordering process. When you select this option, you will be responsible for setting up customer-specific settings, such as network options and authentication credentials during the provisioning process.
What to Consider: Ordering a non-configured appliance from Axcient tends to be the least expensive way to order a BDR appliance. Each Axcient BDR appliance comes pre-installed with the needed software and ships instructions.
SUPPORT | 720-204-4500 | 800-352-0248
- To learn more about any of our Axcient products, sign up for free one-on-one training.
- Please contact your Partner Success Manager or Support if you have specific technical questions.
- Subscribe to the Axcient Status page for a list of status updates and scheduled maintenance.
1377 | 1544 | 1648