Using more than one program to backup SQL data

Posted on 2011-10-02
Last Modified: 2013-01-10

What woudl happen if you had more than one backup software doing differential backups of a SQL server? Are both sets of backups going to be fully functional or would they need to be combined to fully restore the data?

Question by:BobBrink
    LVL 2

    Assisted Solution

    Differential backups should be OK, as a differential backup backs up everything since the last full backup.  To restore from a differential backup you need just the differential backup and the last full backup.

    Incremental backups are different, as they backup only what has changed since the last full OR incremental backup.  To restore from incremental backups you need the latest full backup and every subsequent incremental backup.

    I would still recommend against running differential backups with two different backup products, though.  In theory you should be able to get away with it, but I suspect in practice you may have problems crop up.
    LVL 21

    Assisted Solution

    To add some comments to what Joelgaskell I would use only one product.
    I ran into a situation where the last full was on tape and I was u able to restore a database successfully.
    What I ended up changing was using SQL internal backup and then backed up the baks and trns files to tape using symantec. So if I need to restore I need to restore the files first then run a restore sequence using SQL.

    Author Comment


    thank you for the comments. -So to be perfectly clear, my original assumption was that the SQL database keeps track of what was backed up via a flag put into the data and this is not the job of the backup software. Example:

    Do full backup with software product A.
    6 hours later do differential with software product B, product B finds te difference by looking into the SQL datat to determine when the last FULL backup was done.

    Is this example correct?

    Thanks again,

    LVL 21

    Accepted Solution

    That is correct. It is fine is you do not need the full, but from my experience it Would be best to use one or the other.

    IMO I found that the way I am doing it currently works quite well.

    To add to my procedure. I keep the Bak files for 7 days until I have another set.  

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Suggested Solutions

    I have written a PowerShell script to "walk" the security structure of each SQL instance to find:         Each Login (Windows or SQL)             * Its Server Roles             * Every database to which the login is mapped             * The associated "Database User" for this …
    In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now