当前位置:网站首页>Retention policy of RMAN backup
Retention policy of RMAN backup
2022-07-06 09:54:00 【wx5caecf2ed0645】
What is the retention policy for backup (retention policy)
Retention policy refers to whether a backup should be retained and for how long . have access to configure retention policy Command to create a consistent 、 Automatic backup retention policy . When a backup strategy takes effect ,rman Think of data files 、 The backup of control files is obsolete Of , That is to say, according to user configuration , These backups are no longer needed for recovery . Users can use report obsolete Order to find out obsolete And use delete obsolete Delete them .
As the number of backups increases , Old backup files will become obsolete.rman Can identify obsolete The file of , But they will not be deleted automatically . You need to manually execute delete obsolete Delete them .
If the database is configured with a fast flashback area , The database will flash back the disk according to the fast quota Rules automatically delete files in the flashback area . Flashback zone quota Rule with rman Backup policy rules are different , But the flashback area will not delete backup files that do not exceed the backup policy .
obsolete and expired It's two different concepts
Whether the backup obsolete, It is determined by the backup strategy , It refers to exceeding the limit of the backup policy , Files that are no longer needed during recovery ;expired Refer to rman In execution crosscheck During the inspection , These files could not be found . In a word ,obsolete Refer to " No longer need ",expired Refer to " Can't find ".
Retention policies are for data files and control files full Back up or level 0 Backup ( Whether it's datafile image copy, a proxy copy, or part of a backup set). about datafile copies and proxy copies, If rman You can delete it if you think it is no longer needed . For backup set datafile Backup , Only the entire backup set becomes obsolete Before it can be deleted .
The backup strategy is not only for data files and control files full and level 0 The backup is valid , It also affects archived logs and level 1 Incremental backup . First rman Detect those data files 、 The control file backup is obsolete Of , then rman Archive logs that are no longer needed during recovery 、level 1 Incremental backup is considered obsolete Of .
report obsolete and delete obsolete How commands work :
It is mainly divided into two steps
(1) First , about full backup、datafile copy and level 0 Incremental backup of ,rman Will be based on retention policy Identify which are obsolete Of .
(2) then , For archive logs and level 1 Incremental backup of , If it corresponds to full backup、datafile copy and level 0 Incremental backup of has been obsolete Of , It would also be considered obsolete Of , Because they are no longer needed for data recovery .
NOTE: A 'delete obsolete' does not check that the archivelog files have been backed up before it deletes them.
Types of retention backup policies :( There are two types of backup )
(1)redundancy( redundancy ): Redundancy by default
1 | |
(2)recovery window( Restore window )
1 | |
When configuring the recovery window , The time should not be greater than the parameter control_file_record_keep_time Value .
Cancel the backup policy :( Never set backup to obsolete)
1 | |
How to make backup unaffected by backup strategy :
Users may need to keep data backup for a long time ( beyond rman Retention policy settings ). This backup information should be recorded in rman repository in , But it should exceed rman Limitations of backup retention policies , Otherwise it will be marked as obsolete Of .
Can be used during backup keep keyword 、 Or use after backup change...keep To achieve .
For archive logs, you can use logs keyword , This will not be identified as obsolete Of
Example :
1 2 3 4 5 6 7 8 | |
边栏推荐
- Canoe cannot automatically identify serial port number? Then encapsulate a DLL so that it must work
- Cap theory
- Keep these four requirements in mind when learning single chip microcomputer with zero foundation and avoid detours
- [one click] it only takes 30s to build a blog with one click - QT graphical tool
- Contest3145 - the 37th game of 2021 freshman individual training match_ C: Tour guide
- Why data Tiering
- Safety notes
- Day 5 of MySQL learning
- 六月刷题02——字符串
- Take you back to spark ecosystem!
猜你喜欢
How can I take a shortcut to learn C language in college
发生OOM了,你知道是什么原因吗,又该怎么解决呢?
Release of the sample chapter of "uncover the secrets of asp.net core 6 framework" [200 pages /5 chapters]
CAPL脚本中关于相对路径/绝对路径操作的几个傻傻分不清的内置函数
Several silly built-in functions about relative path / absolute path operation in CAPL script
单片机实现模块化编程:思维+实例+系统教程(实用程度令人发指)
What are the models of data modeling
Nc29 search in two-dimensional array
[deep learning] semantic segmentation: paper reading: (CVPR 2022) mpvit (cnn+transformer): multipath visual transformer for dense prediction
[CV] target detection: derivation of common terms and map evaluation indicators
随机推荐
为什么大学单片机课上51+汇编,为什么不直接来STM32
Some thoughts on the study of 51 single chip microcomputer
硬件工程师的真实前途我说出来可能你们不信
Upload vulnerability
单片机实现模块化编程:思维+实例+系统教程(实用程度令人发指)
Some thoughts on the study of 51 single chip microcomputer
五月刷题03——排序
C杂讲 动态链表操作 再讲
Combined search /dfs solution - leetcode daily question - number of 1020 enclaves
大学想要选择学习自动化专业,可以看什么书去提前了解?
机械工程师和电气工程师方向哪个前景比较好?
Why data Tiering
MapReduce instance (VIII): Map end join
Several ways of MySQL database optimization (pen interview must ask)
If a university wants to choose to study automation, what books can it read in advance?
嵌入式开发中的防御性C语言编程
Cap theory
Compress decompress
Several silly built-in functions about relative path / absolute path operation in CAPL script
MapReduce instance (VI): inverted index