Solved

Log Backup

Posted on 2016-11-24
2
25 Views
Last Modified: 2016-11-24
hi experts

i am reading about Transaction Log Backup Strategies:
what's the mean?
.Enables point-in-time recovery
0
Comment
Question by:enrique_aeo
2 Comments
 
LVL 19

Assisted Solution

by:Kim Ryan
Kim Ryan earned 250 total points
ID: 41900984
It means you can restore the database to it's status at a certain time you specify (the point in time). For example, if you know you system was stable at 7:00 am but some corruption occurred after that but you don't know exactly when, then restore it to how it was at 7 am.
0
 
LVL 28

Accepted Solution

by:
Pawan Kumar earned 250 total points
ID: 41901070
For T-log backup I suggest you read this- <<Kimberley & Brent's Advice>>
 
http://www.sqlskills.com/blogs/kimberly/database-maintenance-best-practices-part-iii-transaction-log-maintenance/
https://www.brentozar.com/archive/2014/02/back-transaction-logs-every-minute-yes-really/

Enables point-in-time recovery
It means you can recover the data up to certain point, now that point can be up to the failure or the user can also specify the time.

1. Restore to the Point of Failure  
2. Restore to a Point in Time

1 . Restore to the Point of Failure

RESTORE LOG PawanDB FROM <backup_device_name> 
WITH NORECOVERY;

Open in new window


Ref more at - https://technet.microsoft.com/en-us/library/ms179451(v=sql.105).aspx

2. Restore to a Point in Time

RESTORE LOG PawanDB
FROM PawanBackups
WITH FILE=4, NORECOVERY, STOPAT = 'Mar 15, 2025 11:00 AM';

Open in new window


Ref more at - https://technet.microsoft.com/en-us/library/ms175093(v=sql.105).aspx

Hope it helps !!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Long way back, we had to take help from third party tools in order to encrypt and decrypt data.  Gradually Microsoft understood the need for this feature and started to implement it by building functionality into SQL Server. Finally, with SQL 2008, …
Occasionally there is a need to clean table columns, especially if you have inherited legacy data. There are obviously many ways to accomplish that, including elaborate UPDATE queries with anywhere from one to numerous REPLACE functions (even within…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

806 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question