Home Database Mysql Tutorial RMAN下CROSSCHECK命令详解

RMAN下CROSSCHECK命令详解

Jun 07, 2016 pm 04:48 PM

CROSSCHECK命令用户核对备份文件,以确保RMAN资料库与备份文件保持同步。当执行该命令时,如果RMAN资料库记录的状态与实际备份文

在用DELETE OBSOLETE 命令删除废弃的备份文件,如果出现如下错误(RMAN-06207 & RMAN-06208),那么需要用CROSSCHECK命令来解决:

RMAN-06207: WARNING: 2 objects could not be deleted for DISK channel(s) due

RMAN-06208: to mismatched status. Use CROSSCHECK command to fix status

 

CROSSCHECK命令用户核对备份文件,以确保RMAN资料库与备份文件保持同步。当执行该命令时,如果RMAN资料库记录的状态与实际备份文件不匹配,则会更新资料库里的状态使其与实际备份文件状态一致;若备份文件处于expired状态,那么说明该备份已失效,可以删除之;

 

推荐阅读:

RMAN 配置归档日志删除策略

Oracle基础教程之通过RMAN复制数据库

RMAN备份策略制定参考内容

RMAN备份学习笔记

Oracle数据库备份加密 RMAN加密

 

常用命令介绍:

1.CROSSCHECK BACKUP

用于核对数据库、表空间、数据文件、控制文件、归档日志、SPFILE的备份集。

CROSSCHECK BACKUP ; --核对所有备份(包括有效和失效的备份)

CROSSCHECK BACKUP of database; --核对除控制文件、归档文件外的备份文件

CROSSCHECK BACKUP of tablespace system;

CROSSCHECK BACKUP of datafile 1;

CROSSCHECK BACKUP of controlfile;

CROSSCHECK BACKUP of archivelog all;

CROSSCHECK BACKUP of archivelog sequence 3;

CROSSCHECK BACKUP of spfile;

2.CROSSCHECK BACKUPPIECE

用于 核对特定备份片,该命令需要制定备份片的BP值或备份片名称;

CROSSCHECK BACKUPPIECE 24;

CROSSCHECK BACKUPPIECE '/u01/app/oracle/rman_backup/OCPYJG_28';

3.CROSSCHECK BACKUPSET

用于核对特定的备份集,,该命令需要制定备份集的BP值;

CROSSCHECK BACKUPSET 24;

4.CROSSCHECK COPY

用于核对数据库、表空间、数据文件、控制文件、归档文件的映像副本(即备份是用COPY DATAFILE ...... 或BACKUP AS COPY ......DATAFILE......命令备份数据文件的映像)

CROSSCHECK COPY;

CROSSCHECK COPY of database;

CROSSCHECK COPY of tablespace system;

CROSSCHECK COPY of datafile 1;

CROSSCHECK COPY of controlfile;

CROSSCHECK COPY of archivelog all;

CROSSCHECK COPY of archivelog from sequence 24 until sequence 32;

5.CROSSCHECK DTAFILECOPY

用于核对特定的数据文件映像副本,该命令需要指定映像副本的文件名或KEY值;

CROSSCHECK DATAFILECOPY 2;

CROSSCHECK DATAFILECOPY '/u01/app/oracle/rman_backup/tp9.dbf';

6.CROSSCHECK CONTROLFILECOPY

用于核对特定的控制文件映像副本,该命令需要指定控制文件映像副本的文件名或KEY值;

CROSSCHECK CONTROLFILECOPY 3;

CROSSCHECK CONTROLFILECOPY '/u01/app/oracle/rman_backup/controlfile01.ctl;

7.CROSSCHECK ARCHIVELOG

用于核对特定的归档日志,该命令需要指定归档日志的文件名或KEY值或SEQUENCE值;

CROSSCHECK ARCHIVELOG 36;

CROSSCHECK ARCHIVELOG 'crosscheck archivelog '/u01/app/oracle/product/11g/dbs/arch1_6_813161833.dbf';

CROSSCHECK ARCHIVELOG sequence 7;

 

 

本文永久更新链接地址:

linux

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do you alter a table in MySQL using the ALTER TABLE statement? How do you alter a table in MySQL using the ALTER TABLE statement? Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections? How do I configure SSL/TLS encryption for MySQL connections? Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL? How do you handle large datasets in MySQL? Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement? How do you drop a table in MySQL using the DROP TABLE statement? Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you represent relationships using foreign keys? How do you represent relationships using foreign keys? Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do you create indexes on JSON columns? How do you create indexes on JSON columns? Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles