Solved

DPM 2007 - should mdf and ldf files be excluded

Posted on 2008-10-22
2
1,091 Views
Last Modified: 2012-05-05
I'm running DPM 2007 to backup our servers and applications.  I back up our application data including Exchange, Sharepoint, Virtual Server and SQL Server to tape and all server volumes and system state disk to disk.  My question is:  Should I exclude the SQL data files (.mdf and .ldf) from the server volume back ups?  Since the SQL Servers are being backed up as application data, it seems redundant to backup the data files as well.  

I could not find an answer to this in the MS documentation.
0
Comment
Question by:global-works
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
icky2000 earned 125 total points
ID: 22782999
Yes, you should exclude the mdf and ldf files. You should also exclude the Exchange databases and transaction logs. There's no advantage to backing those things up manually as individual files as long as you're doing application-aware backups with DPM. It isn't just redundant backing that stuff up - it's mostly worthless. You won't have much luck restoring from a file-based backup of transactional databases like SQL and Exchange.
0
 

Author Closing Comment

by:global-works
ID: 31508980
Thank you for confirming what I suspected.  We are transitioning from Backup Exec, which won't even allow you to backup those files (and in my opinion is a better product - albiet more expensive).  DPM documentation doesn't seem to mention this anywhere.
0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question