Solved

Log size for SharePoint database

Posted on 2014-02-10
10
343 Views
Last Modified: 2014-02-16
I find that there are several big log files on SharePoint,  can I use the normal SQL backup procedure to backup the log with truncate, and then shrink the transaction log file.

In a long run, can I change the recovery mode for these SQL database to Recovery ? Will there be any concern on this ?  

Tks

SharePoint_Config
SharePoint_AdminContent_xxxx
WSS_Content
SSISDB
0
Comment
Question by:AXISHK
  • 5
  • 5
10 Comments
 
LVL 29

Expert Comment

by:QPR
Comment Utility
Yes, backup the logs (if not in simple mode) then backup with truncate.
The recovery mode you select depends on what data you can afford to lose in a disaster.
Full mode will give you the ability to restore from backup (DB backup) and then restore all transaction log backups taken since the DB backup.
Simple mode means you can only restore the DB backup as there are no log backups.

I would put the content databases in full and others in simple.
Have a nightly DB backup for all and an hourly log backup for the DBs in full recovery mode.

While in the area check that the autogrow value on the files are not too small. Larger values with cut down on (CPU intensive) auto growths and reduce VLFs (virtual log files) within the logs
0
 

Author Comment

by:AXISHK
Comment Utility
One more check,

Can I directly shrink the transaction log without doing the backup with truncate option, or just doing the backup without truncate option ? What's that option used for ?

Tks
0
 
LVL 29

Expert Comment

by:QPR
Comment Utility
Backup without truncate won't shrink, DBCC shrinkfile will, backup with truncate will
0
 

Author Comment

by:AXISHK
Comment Utility
Sorry,

Do u mean that I can issue DBCC shrinkfile on the transaction log and it will truncate the committed transaction and reduces the physical size of the log file ?
0
 
LVL 29

Expert Comment

by:QPR
Comment Utility
I would truncate follow by DBCC shrinkfile to be sure
0
Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

 

Author Comment

by:AXISHK
Comment Utility
We can only truncate the transaction log through the backup, correct ?

The truncate and shrinkfile works on transaction log only, no need to carry out on the database, correct ?

Tks
0
 
LVL 29

Expert Comment

by:QPR
Comment Utility
Shrinkfile also works on the DB file too.
0
 

Author Comment

by:AXISHK
Comment Utility
HOW TO Shrink database?
Can i truncate trx. log directly or it can only be truncate through backup?
0
 
LVL 29

Accepted Solution

by:
QPR earned 500 total points
Comment Utility
DBCC shrinkfile
http://msdn.microsoft.com/en-us/library/ms189493.aspx

All you need to know about shrinking the DB, the log and truncating
0
 

Author Closing Comment

by:AXISHK
Comment Utility
Tks
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Note:  There are two main ways to deploy InfoPath forms:  Server-side and directly through the SharePoint site.  Deploying a server-side InfoPath form means the form is approved by the Administrator, thus allowing greater functionality in the form. …
The vision: A MegaMenu for a SharePoint portal home page The mission: Make it easy to maintain. Allow rich content and sub headers as well as standard links. Factor in frequent changes without involving developers or a lengthy Dev/Test/Prod rel…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now