The Start-LogTruncation command forces log truncation for the specified protected SQL Server or Microsoft Exchange server. 
Usage
The usage for the command is as follows:
Start-LogTruncation -core [host name] -user [user name] -password [password] -protectedserver [[machine name] or [IP address]] -target [sql | exchange]
Command Options
The following table describes the options available for the Start-LogTruncation command: 
| Option | Description | 
|---|---|
| -? | Display this help message. | 
| -core | Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. | 
| -user | Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used. | 
| -password | Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used. | 
| -protectedserver | Archive of recovery points for the specified machine. | 
| -target | Specify the type of log truncation (either ‘sql’ or ‘exchange’). If not specified, logs are truncated on all databases. | 
Example:
Truncate SQL logs:
>Start-LogTruncation -protectedserver SQL1 -target sql
Truncate Exchange server logs: all recovery points for all machines on the Core:
> start-LogTruncation -protectedserver ExServer2 -target exchange
