CHAPTER 11 Backup and Data Recovery
405
Set B
Tapes B
1
and B
2
. These must be restored as a set, after Set A, and either
before or after Set C. They can be in either the second or third device.
Set C
Tapes C
1
, C
2
, and C
3
. These must be restored as a set, after Set A, and
either before or after Set B. They can be in either the second or third device.
The Restore program checks that tapes within each set are in the correct order
on a single device. If not, you get an error, and the restore does not proceed
until you supply the correct tape. Except for the set with the Catalog Store, it
does not matter which set you put on a given device.
Note
You must ensure that the Catalog Store tape set is restored first. The
Restore program does not check this.
Although these rules also apply to disk files, you are not likely to back up to
multiple files on a given disk device.
Renaming the transaction log after you restore
When you rename or move all other files in the database, you should also do
the same for the log file. To move or rename the log file, use the Transaction
Log utility (
DBLOG
). You should run this utility:
•
After using
RESTORE
with a new database name
•
After using
RESTORE
with the
RENAME
option
Note
The database server must not be running on that database when the
transaction log filename is changed. If you try to use this utility on a running
database, you get an error message.
You can access the Transaction Log utility from the system command line,
using the
DBLOG
command-line utility.
The DBLOG command-line utility
Syntax
dblog
[switches] database-file
Switches
Switch
Description
-m
mirror-name
Set transaction log mirror name.
-t
log-name
Set the transaction log name
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...