Solved

Backups clean up

Posted on 2011-02-24
3
493 Views
Last Modified: 2012-05-11
I Have backup exec 12.5 and have tapes that are full.  Besides erasing the tapes, and not knowing what is lost, is there another way to delete old completed jobs?
0
Comment
Question by:abpExpert
  • 2
3 Comments
 
LVL 20

Assisted Solution

by:woolnoir
woolnoir earned 250 total points
ID: 34972306
You cant delete individual jobs from tapes, it writes , and writes and writes then it either expires and overwrites, or you erase the tapes. You can say delete a backup job at the start and re-use the first part.
0
 
LVL 20

Expert Comment

by:woolnoir
ID: 34972312
and i mean 'cant' in the last sentence :)
0
 
LVL 20

Accepted Solution

by:
SelfGovern earned 250 total points
ID: 34979104
When you set the job up, did you select any kind of retention policy?   Some backup applications let you create one of several retention strategies (Grandfather/Father/Son being the most common), and tapes from a backup no longer needed will be automatically reused.

The 'safe' way to do this if you don't have a retention policy set in the application, nor good records of what is on which tape, is to use the backup application GUI to see what's on a tape and mark things for expiration or rewrite there.

As woolnoir says, you can't delete just some of the things off a tape and re-use the 'holes' -- tape streams, and you start writing at the beginning, appending but not backfilling.   If you have a tape that has some expired data on it and you want to reclaim that space, you have to copy the still-valid objects to a new tape.  Unless you have a second tape drive, this can be a really time-consuming task (for the person supervising it, not so much for the tape drive).
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now