Solved

TEMPDB got deleted SQL 2012

Posted on 2014-10-06
7
125 Views
Last Modified: 2014-10-08
I just got a frantic call from IT. It appears that someone had gone into a backup program(Backup Exec) and had clicked on what was the 'F' drive, got a prompt about formatting the drive and clicked 'Yes'. The problem was the drive he wanted to format was the 'G' drive, the 'F' drive had all the SQL data including the tempdb. Equally disturbing was the fact that all backups go to the drive he just formatted so there are no backups to restore since they did no cloud backup or even external drive backups. So now they expect me to be a miracle worker and restore the data. My question here is how can I at least recreate the tempdb database so I can get SQL 2012 back up and running?
0
Comment
Question by:rwheeler23
  • 4
  • 2
7 Comments
 
LVL 69

Assisted Solution

by:ScottPletcher
ScottPletcher earned 300 total points
ID: 40364748
You can never recreate tempdb, as it's just a "scratchpad" area.  It's always recreated as an empty db when SQL Server starts up.

*Immediately* quarantine the drive and attempt to run some software on it to recover the files.  If he did a "quick format", most of the data is still actually there, just the directory is overwritten.
0
 

Author Comment

by:rwheeler23
ID: 40364948
They were using something called EasyUS to try to recover the data. If the data can be recovered, someone keeps their job. If not, the most recent updates are a week old and I have a long day ahead of me tomorrow.
0
 
LVL 45

Accepted Solution

by:
Vitor Montalvão earned 200 total points
ID: 40365399
Apart of some software that can recover files if you don't feel comfortable there's also some companies that will do the recovery work but the wise thing to do now it's not touch more in the F: drive.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:rwheeler23
ID: 40365661
They are running EasyUS to try to recover. It has been running for the past 12 hours.
0
 

Author Closing Comment

by:rwheeler23
ID: 40369229
Thanks for offering the advice. The IT staff lives to see another day.
0
 
LVL 69

Expert Comment

by:ScottPletcher
ID: 40369242
Woohoo!  P.S.: You really should strongly consider adding daily backups of all dbs, including system ones, to your processes.
0
 

Author Comment

by:rwheeler23
ID: 40369277
That was my advice to these folks. I told them to at least get an external drive for now but then to look into cloud backup.  I almost passed out when they told me they had no backups! In today's day and age that is unforgivable.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Stored procedure with a parameter 6 21
SQl query 19 14
Troubleshooting Methodology - steps 3 22
Update in Sql 7 12
Hi all, It is important and often overlooked to understand “Database properties”. Often we see questions about "log files" or "where is the database" and one of the easiest ways to get general information about your database is to use “Database p…
In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now