Getting information about backups and restores
410
If you are using a third-party backup product, the vendor information string
needs to convey any information needed for the backup, such as the
specification of devices, size of files, and stacker drives. See your vendor’s
documentation for details.
Note
Adaptive Server IQ does not permit unattended restore.
Getting information about backups and restores
Adaptive Server IQ provides a backup log, .backup.syb, to help you manage
your backup media. This log is not used to create the backup or to restore the
database; however, information describing the backup or restore is recorded in
this file during both Backup and Restore.
Note
To display only the information about a particular backup, you can run
RESTORE
with the
CATALOG ONLY
option. This option displays the header
file for a backup from the media rather than from the file, so that the DBA can
identify what is on the tape or file. See “Displaying header information”.
Locating the backup log
The.backup.syb file is in ASCII text format. Its location depends on the setting
of environment variables at the time the server is started:
•
On UNIX, the server tries to place it in the following locations, in this
order:
•
The directory specified by the ASLOGDIR environment variable.
•
The directory specified by the HOME environment variable.
•
The home directory as obtained from account information.
•
The current directory (where the server was started).
If the file is placed in the "home" directory, it is prefixed with a "." in order
to make it a hidden file.
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...