当前位置:网站首页>Retention policy of RMAN backup
Retention policy of RMAN backup
2022-07-06 09:54:00 【wx5caecf2ed0645】
What is the retention policy for backup (retention policy)
Retention policy refers to whether a backup should be retained and for how long . have access to configure retention policy Command to create a consistent 、 Automatic backup retention policy . When a backup strategy takes effect ,rman Think of data files 、 The backup of control files is obsolete Of , That is to say, according to user configuration , These backups are no longer needed for recovery . Users can use report obsolete Order to find out obsolete And use delete obsolete Delete them .
As the number of backups increases , Old backup files will become obsolete.rman Can identify obsolete The file of , But they will not be deleted automatically . You need to manually execute delete obsolete Delete them .
If the database is configured with a fast flashback area , The database will flash back the disk according to the fast quota Rules automatically delete files in the flashback area . Flashback zone quota Rule with rman Backup policy rules are different , But the flashback area will not delete backup files that do not exceed the backup policy .
obsolete and expired It's two different concepts
Whether the backup obsolete, It is determined by the backup strategy , It refers to exceeding the limit of the backup policy , Files that are no longer needed during recovery ;expired Refer to rman In execution crosscheck During the inspection , These files could not be found . In a word ,obsolete Refer to " No longer need ",expired Refer to " Can't find ".
Retention policies are for data files and control files full Back up or level 0 Backup ( Whether it's datafile image copy, a proxy copy, or part of a backup set). about datafile copies and proxy copies, If rman You can delete it if you think it is no longer needed . For backup set datafile Backup , Only the entire backup set becomes obsolete Before it can be deleted .
The backup strategy is not only for data files and control files full and level 0 The backup is valid , It also affects archived logs and level 1 Incremental backup . First rman Detect those data files 、 The control file backup is obsolete Of , then rman Archive logs that are no longer needed during recovery 、level 1 Incremental backup is considered obsolete Of .
report obsolete and delete obsolete How commands work :
It is mainly divided into two steps
(1) First , about full backup、datafile copy and level 0 Incremental backup of ,rman Will be based on retention policy Identify which are obsolete Of .
(2) then , For archive logs and level 1 Incremental backup of , If it corresponds to full backup、datafile copy and level 0 Incremental backup of has been obsolete Of , It would also be considered obsolete Of , Because they are no longer needed for data recovery .
NOTE: A 'delete obsolete' does not check that the archivelog files have been backed up before it deletes them.
Types of retention backup policies :( There are two types of backup )
(1)redundancy( redundancy ): Redundancy by default
1 | |
(2)recovery window( Restore window )
1 | |
When configuring the recovery window , The time should not be greater than the parameter control_file_record_keep_time Value .
Cancel the backup policy :( Never set backup to obsolete)
1 | |
How to make backup unaffected by backup strategy :
Users may need to keep data backup for a long time ( beyond rman Retention policy settings ). This backup information should be recorded in rman repository in , But it should exceed rman Limitations of backup retention policies , Otherwise it will be marked as obsolete Of .
Can be used during backup keep keyword 、 Or use after backup change...keep To achieve .
For archive logs, you can use logs keyword , This will not be identified as obsolete Of
Example :
1 2 3 4 5 6 7 8 | |
边栏推荐
- Why data Tiering
- 五月刷题02——字符串
- 112 pages of mathematical knowledge sorting! Machine learning - a review of fundamentals of mathematics pptx
- [NLP] bert4vec: a sentence vector generation tool based on pre training
- 发生OOM了,你知道是什么原因吗,又该怎么解决呢?
- 五月刷题01——数组
- Download address of canoe, download and activation of can demo 16, and appendix of all canoe software versions
- 嵌入式开发比单片机要难很多?谈谈单片机和嵌入式开发设计经历
- Vh6501 Learning Series
- Elk project monitoring platform deployment + deployment of detailed use (II)
猜你喜欢
Une grande vague d'attaques à la source ouverte
Take you back to spark ecosystem!
[deep learning] semantic segmentation: paper reading: (CVPR 2022) mpvit (cnn+transformer): multipath visual transformer for dense prediction
Selection of software load balancing and hardware load balancing
Some thoughts on the study of 51 single chip microcomputer
CANoe下载地址以及CAN Demo 16的下载与激活,并附录所有CANoe软件版本
Hugo blog graphical writing tool -- QT practice
[deep learning] semantic segmentation - source code summary
Single chip microcomputer realizes modular programming: Thinking + example + system tutorial (the degree of practicality is appalling)
Cap theory
随机推荐
tn-c为何不可用2p断路器?
一大波开源小抄来袭
机械工程师和电气工程师方向哪个前景比较好?
Processes of libuv
Cooperative development in embedded -- function pointer
CAPL脚本中关于相对路径/绝对路径操作的几个傻傻分不清的内置函数
Elk project monitoring platform deployment + deployment of detailed use (II)
一大波開源小抄來襲
CANoe下载地址以及CAN Demo 16的下载与激活,并附录所有CANoe软件版本
There are software load balancing and hardware load balancing. Which one to choose?
C杂讲 动态链表操作 再讲
018. Valid palindromes
Compilation of libwebsocket
Several ways of MySQL database optimization (pen interview must ask)
Delayed note learning
四川云教和双师模式
DCDC power ripple test
What you have to know about network IO model
华南技术栈CNN+Bilstm+Attention
Segmentation sémantique de l'apprentissage profond - résumé du code source