Restore particular tables from RMAN backup

Posted on 2013-01-22
Last Modified: 2013-01-22
Experts -

Is there a better/easy way of restoring particular tables from RMAN backup. The DB size is over a TB.

Question by:sventhan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
LVL 18

Author Comment

ID: 38806931
I mean restore/recovering particular tables.
LVL 77

Accepted Solution

slightwv (䄆 Netminder) earned 500 total points
ID: 38806951
I don't know a way to recover a specific table from an RMAN backup.  RMAN is sort of an all or nothing recovery tool.

Now from a theoretical exercise, to recover a dropped/truncated table, you might be aboe to use FLASHBACK to recover it.

Short of that, I believe you will need to recover your database to a different server, grab the tables and move them over to the original.
LVL 18

Author Comment

ID: 38806974
<< Short of that, I believe you will need to recover your database to a different server, grab the tables and move them over to the original.

Thanks Slightwv.  I wanted to find out is there an easy way to do this. If not I've to restore the whole DB.
PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

LVL 77

Expert Comment

by:slightwv (䄆 Netminder)
ID: 38806989
Maybe another Expert knows some trick.

I assume these are old tables that has been around for a while?

If not, you might be able to just use the backed up archived redo files and use log miner to re-create them.
LVL 18

Author Comment

ID: 38806993
In metalink they're talking about RMAN tablespace point in time recovery. I'm looking into this now.
LVL 18

Author Closing Comment

ID: 38807134

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Truncate is a DDL Command where as Delete is a DML Command. Both will delete data from table, but what is the difference between these below statements truncate table <table_name> ?? delete from <table_name> ?? The first command cannot be …
I remember the day when someone asked me to create a user for an application developement. The user should be able to create views and materialized views and, so, I used the following syntax: (CODE) This way, I guessed, I would ensure that use…
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines
This video shows how to configure and send email from and Oracle database using both UTL_SMTP and UTL_MAIL, as well as comparing UTL_SMTP to a manual SMTP conversation with a mail server.
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question