FileSearch
The filesearch
command lets you search for a specific file among the recovery points in a repository, which helps you determine which recovery point you need to mount for a restore.
Usage
The usage for the command is as follows:
/filesearch -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -startdate [start date] -enddate [end date] -filemasks [file masks] -paths [paths] -subdiroff -ntfsfastoff -limitsearch [limit search]
Command Options
The following table describes the options available for the filesearch
command:
Table 26: FileSearch command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Use this option to specify the protected machine for which you want to enable the Oracle archive log mode. |
-startdate |
The earliest date of a period within you want to conduct your search. Use the date pattern "MM/DD/YYYY HH:mm:ss AM." |
-enddate |
The latest date of a period within you want to conduct your search. Use the date pattern "MM/DD/YYYY HH:mm:ss AM." |
-filemasks |
A combination of fixed and wildcard characters to search for the file. It can be one string or an array of strings. All masks should be separated by a space; for example: -filemasks "first" "second ." |
-paths |
Optional. If there are specific directories in which you want to search, use this option to list the paths. It can be one string or an array of strings. All directories should be separated by a space; for example: -paths "E:\" "C:\Program Files." |
-subdiroff |
Optional. By default, the file search is performed in subdirectories. Use this option if you want to turn this feature off and not search in subdirectories. |
-ntfsfastoff |
Optional. By default, the file search is performed using the NTFS fast algorithm. If you want to perform the search without this feature, specify this option. |
-limitsearch |
Optional. Use this option to limit the number of search results. The default value is 1000. |
Examples:
Perform a file search with one file mask:
>cmdutil /filesearch -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.10 -filemasks "sample"
Perform a file search with multiple file masks in specified directories and without the NTFS fast algorithm:
>cmdutil /filesearch -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.10 -filemasks "sample" "second" -paths "C:\dir" -ntfsfastoff
Force
The force
command forces a snapshot of a specified protected server. Forcing a snapshot lets you force a data transfer for the current protected machine. When you force a snapshot, the transfer will start immediately or will be added to the queue. Only the data that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all data on the protected volumes will be transferred.
Usage
The usage for the command is as follows:
/force [snapshot | base] -core [host name] -user [login] -password [password] -all | -protectedserver [name | IP address]
Command Options
The following table describes the options available for the force
command:
Table 27: Force command options
-? |
Display this help message. |
-force |
Optional. Type of snapshot to create. Available values: 'snapshot' (incremental snapshot) and 'base' (base image snapshot). By default, an incremental snapshot is performed. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-all |
Force snapshots for all machines on the core. |
-protectedserver |
Force a snapshot for a specific protected machine. |
-synthetic |
Force a synthetic snapshot. |
Example:
Force a snapshot for all machines on the Core:
>cmdutil /force snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd -all
ForceAttach
The forceattach
command lets you force a SQL database files attachability check. When you force an attachability check, the check begins immediately.
Usage
The usage for the command is as follows:
/forceattach -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -rpn [number | numbers] | -time [time string]
Command Options
The following table describes the options available for the forceattach
command:
Table 28: ForceAttach command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Protected machine against which to perform the attachability check. |
-rpn |
The sequential number of a recovery point against which to perform checks (run command /list rps to obtain the numbers). To perform checks against multiple recovery points with a single command, you can specify several numbers separated by spaces. |
-time |
Select a recovery point by its creation time. You must specify the exact time in the format “mm/dd/yyyy hh:mm tt” (for example, “2/24/2012 09:00 AM”). Keep in mind to specify the date and time values of the time zone set on your PC. |
Example:
Perform attachability checks for recovery points with numbers 5 and 7:
>cmdutil /forceattach -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -rpn 5 7
ForceChecksum
The forcechecksum
command lets you force an integrity check of any Exchange Message Databases (MDBs) present on the specified recovery point or points. When you force a checksum check, the command begins immediately.
Usage
The usage for the command is as follows:
/forcechecksum -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -rpn [number | numbers] -time [time string]
Command Options
The following table describes the options available for the forcechecksum
command:
Table 29: ForceChecksum command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Protected machine against which to perform the checksum check. |
-rpn |
The sequential number of a recovery point against which to perform checks (run command /list rps to obtain the numbers). To perform checks against multiple recovery points with a single command, you can specify several numbers separated by spaces. |
-time |
Select a recovery point by its creation time. You must specify the exact time in the format “mm/dd/yyyy hh:mm tt” (for example, “2/24/2012 09:00 AM”). Keep in mind to specify the date and time values of the time zone set on your PC. |
Example:
Perform a checksum check for recovery points with numbers 5 and 7:
>cmdutil /forcechecksum -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -rpn 5 7