Force
The force
command forces a snapshot of a specified protected server. Forcing a snapshot lets you force a data transfer for the current protected machine. When you force a snapshot, the transfer will start immediately or will be added to the queue. Only the data that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all data on the protected volumes will be transferred.
Usage
The usage for the command is as follows:
/force [snapshot | base] -core [host name] -user [login] -password [password] -all | -protectedserver [name | IP address]
Command Options
The following table describes the options available for the force
command:
Table 26: Force command options
-? |
Display this help message. |
-force |
Optional. Type of snapshot to create. Available values: 'snapshot' (incremental snapshot) and 'base' (base image snapshot). By default, an incremental snapshot is performed. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-all |
Force snapshots for all machines on the core. |
-protectedserver |
Force a snapshot for a specific protected machine. |
-synthetic |
Force a synthetic snapshot. |
Example:
Force a snapshot for all machines on the Core:
>cmdutil /force snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd -all
ForceAttach
The forceattach
command lets you force a SQL database files attachability check. When you force an attachability check, the check begins immediately.
Usage
The usage for the command is as follows:
/forceattach -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -rpn [number | numbers] | -time [time string]
Command Options
The following table describes the options available for the forceattach
command:
Table 27: ForceAttach command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Protected machine against which to perform the attachability check. |
-rpn |
The sequential number of a recovery point against which to perform checks (run command /list rps to obtain the numbers). To perform checks against multiple recovery points with a single command, you can specify several numbers separated by spaces. |
-time |
Select a recovery point by its creation time. You must specify the exact time in the format “mm/dd/yyyy hh:mm tt” (for example, “2/24/2012 09:00 AM”). Keep in mind to specify the date and time values of the time zone set on your PC. |
Example:
Perform attachability checks for recovery points with numbers 5 and 7:
>cmdutil /forceattach -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -rpn 5 7
ForceChecksum
The forcechecksum
command lets you force an integrity check of any Exchange Message Databases (MDBs) present on the specified recovery point or points. When you force a checksum check, the command begins immediately.
Usage
The usage for the command is as follows:
/forcechecksum -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -rpn [number | numbers] -time [time string]
Command Options
The following table describes the options available for the forcechecksum
command:
Table 28: ForceChecksum command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Protected machine against which to perform the checksum check. |
-rpn |
The sequential number of a recovery point against which to perform checks (run command /list rps to obtain the numbers). To perform checks against multiple recovery points with a single command, you can specify several numbers separated by spaces. |
-time |
Select a recovery point by its creation time. You must specify the exact time in the format “mm/dd/yyyy hh:mm tt” (for example, “2/24/2012 09:00 AM”). Keep in mind to specify the date and time values of the time zone set on your PC. |
Example:
Perform a checksum check for recovery points with numbers 5 and 7:
>cmdutil /forcechecksum -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -rpn 5 7
ForceLogTruncation
Forcing log truncation lets you perform this job one time, on-demand. It immediately truncates the logs for the specified SQL Server agent machine.
Usage
The usage for the command is as follows:
/[forcelogtruncation | flt] -core [host name] -user [user name] -password [password] -protectedserver [name | IP address]
Command Options
The following table describes the options available for the forcelogtruncation
command:
Table 29: ForceLogTruncation command options
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-protectedserver |
Protected machine against which to perform log file truncation. |
Example:
Force log truncation for a protected server:
>cmdutil /forcelogtruncation -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.20.20