Solved

Can I use server 2008 command line backup to run Exchange 2007 VSS backup?

Posted on 2010-08-16
4
818 Views
Last Modified: 2012-08-13
Hi All

With the release of the Exchange 2007 SP2 there is supposedly new support for the Exchange Aware backup by the built-in Server 2008 Windows Backup.

Does anyone know how to utilise this with the wbadmin.exe command line tool?

Also if you backup volume c: does this save the SysState date or must you use the -allcritical switch as well?

Thanks, C
0
Comment
Question by:Creodus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 22

Expert Comment

by:Syed Mutahir Ali
ID: 33452685
wbadmin start backup –include:c:,d: -backuptarget:g: -vssfull

http://technet.microsoft.com/en-us/library/cc742083(WS.10).aspx
0
 

Author Comment

by:Creodus
ID: 33452997
We are actually using this exact command, but it although both drives are backing up fine with it, the Exchange logs are not being cleared after the backup runs and the disk is now filling up.

Does the vssfull switch cover the System State as well?

C
0
 
LVL 22

Accepted Solution

by:
Syed Mutahir Ali earned 500 total points
ID: 33462241
yes VSSfull basically does the logs truncation,

try with the vssfull switch

wbadmin start backup –include:c:,d: -backuptarget:g: -systemstate  -vssfull

http://technet.microsoft.com/en-us/library/cc753201.aspx

On the above link it has more details on systemstate backup

http://thebackroomtech.com/2008/03/12/creating-backups-of-windows-2008-server-core-machines/
0
 

Author Comment

by:Creodus
ID: 33499790
Thanks - this is all working fine for the backups.

The logs are still not being truncated though, so I guess this is an issue for an Exchange question.

C
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Local admin account 3 43
controlling email signatures 3 25
exchange 2007, calendar 3 18
Changing email address in Exchange 2010 2 7
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
how to add IIS SMTP to handle application/Scanner relays into office 365.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question