Acronis Cyber Files (formerly Files Advanced) has a command line tool which collects information about your configuration. This tool provides an easy way to give our support team all the necessary information about your setup in case you are experiencing issues. When running the tool on a machine with a single Gateway Server or a single Cyber Files Server installed, only the information about the installed component will be collected.
You must be a local or domain administrator on the machine you will be running the tool on. The Configuration Collection Tool will not collect information unless manually run by an administrator. The tool only works on 64-bit operating systems.
Running the Configuration Collection Tool
- Open Windows PowerShell with administrative rights (the title bar will contain "Administrator") (located in Control Panel => Administrative Tools) and enter Set-ExecutionPolicy Unrestricted. When prompted, enter Y and press Enter. This command needs to be executed in order to allow our script to run. You will need to do this only once (unless you change the Execution Policy at a later time).
- Now you have to run the script. You can do this in two ways:
- With PowerShell still open, enter the following command (we are using the default path for this example): cd "C:\Program Files (x86)\Acronis\Acronis Cyber Files\Common\Configuration Collection Tool" and press Enter. Now enter .\aa_info.ps1 and press Enter. If you upgraded from an earlier version, your path may be "C:\Program Files (x86)\Acronis\Access\Common\Configuration Collection Tool" or "C:\Program Files (x86)\Common\Configuration Collection Tool".
- Navigate to where the Configuration tool is installed (default is C:\Program Files (x86)\Acronis\Acronis Cyber Files\Common\Configuration Collection Tool), right-click on the file aa_info and select Run with PowerShell.
If you upgraded from an earlier version, your path may be "C:\Program Files (x86)\Acronis\Files Advanced\Common\Configuration Collection Tool" or "C:\Program Files (x86)\Common\Configuration Collection Tool".
By default, as a security measure, PowerShell is configured to not run scripts. By using the Set-ExecutionPolicy Unrestricted command during Step 1 you have allowed PowerShell to run scripts. If you want to revert this, after you have gathered a configuration information export and sent it to our support team, open PowerShell and enter Set-ExecutionPolicy Restricted to prevent PowerShell from running scripts.
Using the Configuration Collection Tool
Once you have succesfully run the script, you will be prompted to select one of the following actions:
- collectAll - Collects the system configuration summary, logs for the last 7 days, and databases using all the default settings and puts them in a .zip archive in the Configuration Collection Tool folder.
- interactive - Lets you choose which logs to collect, where to save the .zip file and how old the logs should be.
- installationDetails - Displays a list with the installation paths of all Acronis Cyber Files components.
- accessSettings - Displays a list with all of your Acronis Cyber Files settings (LDAP, SMTP, Gateways, etc.).
- help - Displays information on the syntax of the tool, the available commands and what they do and the supported parameters.
We recommend using the collectAll option unless instructed otherwise by our support team or you wish to provide logs from an event more than 7 days in the past.
Using the interactive option
- Enter interactive and press Enter.
- Enter the number of days (going back) you want to collect logs for.
- Enter the desired location where the .zip archive will be created (e.g. C:\Exports). The folder must already exist.
- If you've filed a support case, enter the support case number. Otherwise, simply press Enter to skip this step.
- Enter your Acronis Cyber Files username and press Enter (e.g. Administrator). The account must have administrative privileges.
- Enter the password for that account and press Enter.
- Select whether you want to include the Tomcat logs. These are the logs for the Apache Tomcat server hosting the Acronis Access management server. The default is yes.
- Select whether you want to include the Acronis Cyber Files configuration file. The default is yes.
- Select whether you want to include an export of the PostgreSQL database. This will make an export of your whole PostgreSQL database. The default is yes.
- Select whether you want to include the Acronis Access PostgreSQL configuration file. The default is yes.
- Select whether you want to include the Gateway server logs. These are the logs of the local Gateway server. If you have remote gateways, you'll need to run the tool on each remote server. The default is yes.
- Select whether you want to include an export of the local Gateway server's settings database. The default is yes.
- Select whether you want to include a Microsoft System Information (MSINFO) report. The default is yes.
- Select whether you want to include Windows System and Application event logs. The default is yes.
- Select whether you want to include Single Sign On (SSO) files. The default is yes.
- The exported file will be named as follows and will be placed in the folder selected during Step 3:
- If you have entered a support case number - Case#number_AccessConfiguration_date and time.zip (e.g. Case#22_AccessConfiguration_20140507T012448.zip).
- If you have not entered a support case number - AccessConfiguration_date and time.zip (e.g AccessConfiguration_20140507T012448.zip).