Solved

SQL server showing restoring DBs in SQL Management after snapshot restore

Posted on 2014-01-19
7
209 Views
Last Modified: 2014-01-26
I have a SQL server version 10.0.5512/ DC that was restored to a system snapshot image from 1/10/14.  After being online for about 3 hours we started to see DBs showing 'restoring' in SQL management studio. We have not run any SQL restores.. This just started on it's own.. Any ideas?  I do see some 'recovery' items in the SQL logs..
0
Comment
Question by:gopher_49
  • 4
  • 3
7 Comments
 
LVL 38

Expert Comment

by:Jim P.
ID: 39793191
How big are the databases?

SQL brings up each DB sequentially by doing checks on it. They will show "restoring" because it essentially seeing the drives and disks  and everything else for the first time.
0
 

Author Comment

by:gopher_49
ID: 39793277
So.   We should just wait it out?
0
 
LVL 38

Expert Comment

by:Jim P.
ID: 39793324
Most likely that is the answer as long as you know the data and log files were restored as well.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:gopher_49
ID: 39793328
It's an entire snapshot of the server.   It was a Citrix VM snapshot.
0
 
LVL 38

Accepted Solution

by:
Jim P. earned 500 total points
ID: 39793338
Are the databases large (i.e. 25GB or larger)? Do you have the same amount of CPUs? RAM? Is it isolated from the production named server? Did you change the name of the server?

All these can affect the recovery process.
0
 

Author Comment

by:gopher_49
ID: 39793347
The name is the same..  Some DB's are huge...   I guess we'll let it run overnight.
0
 
LVL 38

Expert Comment

by:Jim P.
ID: 39793360
Best bet.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Performance is the key factor for any successful data integration project, knowing the type of transformation that you’re using is the first step on optimizing the SSIS flow performance, by utilizing the correct transformation or the design alternat…
Introduction In my previous article (http://www.experts-exchange.com/Microsoft/Development/MS-SQL-Server/SSIS/A_9150-Loading-XML-Using-SSIS.html) I showed you how the XML Source component can be used to load XML files into a SQL Server database, us…
Via a live example, show how to extract insert data into a SQL Server database table using the Import/Export option and Bulk Insert.
Viewers will learn how to use the INSERT statement to insert data into their tables. It will also introduce the NULL statement, to show them what happens when no value is giving for any given column.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now