Solved

Proper way to do a robocopy delta copy

Posted on 2010-11-14
8
8,077 Views
Last Modified: 2012-05-10
I am in the middle of a file server migration and the amount of data is too large to fit into a single weekend. To make sure that all files and folders are up to date when I do the final cutover I know I am going to have to do a robocopy delta copy.
 
I am currently doing the first copy of the data which will probably run into the work week. So I need to know what is the proper robocopy syntax to run after the main copy has been made to capture only the changed files.

The command I ran to do the main copy was /mir /sec /copyall /zb
0
Comment
Question by:Joseph Daly
  • 4
  • 3
8 Comments
 
LVL 27

Expert Comment

by:KenMcF
ID: 34131887
by using /MIR you are already doing that. If the file changes or is deleted from the source it will either copy the newer file oe delete the destinatin file.
0
 
LVL 10

Expert Comment

by:George Khairallah
ID: 34131892
You got it. One thing I would mention, is that the /sec is redundant, as the /copyall parameter will encompass your security as well.

You can also add a /MON:10, or MOT:5,  (you can change the numbers). This would keep your robocopy running, and up to date.
The MON will monitor a number of changed files, and MOT, will just check for changes every x minutes.

Whatever you do, even without the MON, or MOT, the current parameters will still get you a differential anyway.

Hope this helps.
0
 
LVL 35

Author Comment

by:Joseph Daly
ID: 34135945
So if I run a second robocopy after this one completes using the /mir /sec options this should do the delta copy.
0
 
LVL 27

Expert Comment

by:KenMcF
ID: 34135998
I usually run it with the following switches.

/COPYALL  /MIR /ZB

/COPYALL :: COPY ALL file info (equivalent to /COPY:DATSOU).
/MIR :: MIRror a directory tree (equivalent to /E plus /PURGE).
/ZB :: use restartable mode; if access denied use Backup mode.

0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 35

Author Comment

by:Joseph Daly
ID: 34136241
That is how I am currently running the first copy. I used /mir /sec /copyall /zb.

I just want to make sure that if I ran that same command again it isnt going to re-copy everything all over again.
0
 
LVL 27

Accepted Solution

by:
KenMcF earned 500 total points
ID: 34136250
no it will not re-copy everything, just the files that were changed. If a file is not on the source and is on the destination then it will be deleted on the destination.
0
 
LVL 27

Expert Comment

by:KenMcF
ID: 34136267
To verfiy you could run from the command line or log to a text file

/LOG:C:\FileCopy.txt
0
 
LVL 35

Author Comment

by:Joseph Daly
ID: 34136288
I have logging enabled on the current copy and will do the same on the delta.

Prob be a few days until I can finish this so Im gonna keep this open till then.
0

Featured Post

[Webinar] Disaster Recovery and Cloud Management

Learn from Unigma and CloudBerry industry veterans which providers are best for certain use cases and how to lower cloud costs, how to grow your Managed Services practice in IaaS clouds, and how to utilize public cloud for Disaster Recovery

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now