当前位置:网站首页>Retention policy of RMAN backup
Retention policy of RMAN backup
2022-07-06 09:54:00 【wx5caecf2ed0645】
What is the retention policy for backup (retention policy)
Retention policy refers to whether a backup should be retained and for how long . have access to configure retention policy Command to create a consistent 、 Automatic backup retention policy . When a backup strategy takes effect ,rman Think of data files 、 The backup of control files is obsolete Of , That is to say, according to user configuration , These backups are no longer needed for recovery . Users can use report obsolete Order to find out obsolete And use delete obsolete Delete them .
As the number of backups increases , Old backup files will become obsolete.rman Can identify obsolete The file of , But they will not be deleted automatically . You need to manually execute delete obsolete Delete them .
If the database is configured with a fast flashback area , The database will flash back the disk according to the fast quota Rules automatically delete files in the flashback area . Flashback zone quota Rule with rman Backup policy rules are different , But the flashback area will not delete backup files that do not exceed the backup policy .
obsolete and expired It's two different concepts
Whether the backup obsolete, It is determined by the backup strategy , It refers to exceeding the limit of the backup policy , Files that are no longer needed during recovery ;expired Refer to rman In execution crosscheck During the inspection , These files could not be found . In a word ,obsolete Refer to " No longer need ",expired Refer to " Can't find ".
Retention policies are for data files and control files full Back up or level 0 Backup ( Whether it's datafile image copy, a proxy copy, or part of a backup set). about datafile copies and proxy copies, If rman You can delete it if you think it is no longer needed . For backup set datafile Backup , Only the entire backup set becomes obsolete Before it can be deleted .
The backup strategy is not only for data files and control files full and level 0 The backup is valid , It also affects archived logs and level 1 Incremental backup . First rman Detect those data files 、 The control file backup is obsolete Of , then rman Archive logs that are no longer needed during recovery 、level 1 Incremental backup is considered obsolete Of .
report obsolete and delete obsolete How commands work :
It is mainly divided into two steps
(1) First , about full backup、datafile copy and level 0 Incremental backup of ,rman Will be based on retention policy Identify which are obsolete Of .
(2) then , For archive logs and level 1 Incremental backup of , If it corresponds to full backup、datafile copy and level 0 Incremental backup of has been obsolete Of , It would also be considered obsolete Of , Because they are no longer needed for data recovery .
NOTE: A 'delete obsolete' does not check that the archivelog files have been backed up before it deletes them.
Types of retention backup policies :( There are two types of backup )
(1)redundancy( redundancy ): Redundancy by default
1 | |
(2)recovery window( Restore window )
1 | |
When configuring the recovery window , The time should not be greater than the parameter control_file_record_keep_time Value .
Cancel the backup policy :( Never set backup to obsolete)
1 | |
How to make backup unaffected by backup strategy :
Users may need to keep data backup for a long time ( beyond rman Retention policy settings ). This backup information should be recorded in rman repository in , But it should exceed rman Limitations of backup retention policies , Otherwise it will be marked as obsolete Of .
Can be used during backup keep keyword 、 Or use after backup change...keep To achieve .
For archive logs, you can use logs keyword , This will not be identified as obsolete Of
Example :
1 2 3 4 5 6 7 8 | |
边栏推荐
- Counter attack of noodles: redis asked 52 questions in a series, with detailed pictures and pictures. Now the interview is stable
- May brush question 02 - string
- 112 pages of mathematical knowledge sorting! Machine learning - a review of fundamentals of mathematics pptx
- Inject common SQL statement collation
- MapReduce working mechanism
- 大学C语言入门到底怎么学才可以走捷径
- Why data Tiering
- Cap theory
- Yarn organizational structure
- MapReduce instance (IV): natural sorting
猜你喜欢

Some thoughts on the study of 51 single chip microcomputer

在CANoe中通過Panel面板控制Test Module 運行(初級)

MapReduce instance (VIII): Map end join

Contest3145 - the 37th game of 2021 freshman individual training match_ C: Tour guide
![[deep learning] semantic segmentation: thesis reading (neurips 2021) maskformer: per pixel classification is not all you need](/img/84/cfcd006d445fc54ea0eda3f92e7d9d.jpg)
[deep learning] semantic segmentation: thesis reading (neurips 2021) maskformer: per pixel classification is not all you need

Keep these four requirements in mind when learning single chip microcomputer with zero foundation and avoid detours

CANoe的数据回放(Replay Block),还是要结合CAPL脚本才能说的明白

Segmentation sémantique de l'apprentissage profond - résumé du code source

Target detection -- yolov2 paper intensive reading

CAPL 脚本对.ini 配置文件的高阶操作
随机推荐
五月刷题27——图
Nc17 longest palindrome substring
Upload vulnerability
【深度学习】语义分割:论文阅读:(2021-12)Mask2Former
The replay block of canoe still needs to be combined with CAPL script to make it clear
面试突击62:group by 有哪些注意事项?
May brush question 03 - sorting
[Chongqing Guangdong education] reference materials for nine lectures on the essence of Marxist Philosophy in Wuhan University
Selection of software load balancing and hardware load balancing
C杂讲 双向循环链表
Inject common SQL statement collation
PR 2021 quick start tutorial, first understanding the Premiere Pro working interface
MapReduce instance (VIII): Map end join
CANoe CAPL文件操作目录合集
大学C语言入门到底怎么学才可以走捷径
Hard core! One configuration center for 8 classes!
Contrôle de l'exécution du module d'essai par panneau dans Canoe (primaire)
CAPL 脚本打印函数 write ,writeEx ,writeLineEx ,writeToLog ,writeToLogEx ,writeDbgLevel 你真的分的清楚什么情况下用哪个吗?
June brush question 01 - array
Popularization of security knowledge - twelve moves to protect mobile phones from network attacks