The Start-LogTruncation
command forces log truncation for the specified protected SQL Server or Microsoft Exchange server.
Usage
The usage for the command is as follows:
Start-LogTruncation -core [host name] -user [user name] -password [password] -protectedserver [[machine name] or [IP address]] -target [sql | exchange]
Command Options
The following table describes the options available for the Start-LogTruncation
command:
Option | Description |
---|---|
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used. |
-protectedserver |
Archive of recovery points for the specified machine. |
-target |
Specify the type of log truncation (either ‘sql’ or ‘exchange’). If not specified, logs are truncated on all databases. |
Example:
Truncate SQL logs:
>Start-LogTruncation -protectedserver SQL1 -target sql
Truncate Exchange server logs: all recovery points for all machines on the Core:
> start-LogTruncation -protectedserver ExServer2 -target exchange