SlideShare a Scribd company logo
1 of 5
Download to read offline
======================================
RMAN Reporting Operations
List Command
======================================
LIST: List will display info about backups and datafile copies listed in repository.
1. By Backup
Command: List backup of database by backup;
List of backup sets and data files in backup sets.
2. By File
Command: List backup by file;
List of datafile backups, archived log backups, control file backups, spfile backups
3. Summary
Command: List backup summary
It will display all backups summary
(or)
Command: List backup of database summary;
It will display only database level 0 and level 1 backups summary
4. Expired
Command: List expired backup
It will display all the archived logs in backup sets.
5. Recoverable
Command: List backup recoverable;
It displays the datafile backups or copies which are in "Available" state that can be restore and
recoverable.
Please find below for other LIST commands:
======================================================================
1. LIST INCARNATION;
2. LIST INCARNATION OF DATABASE;
3. LIST INCARNATION OF DATABASE vis;
4. LIST DB_UNIQUE_NAME ALL;
5. LIST DB_UNIQUE_NAME OF DATABASE;
6. LIST BACKUP;
7. LIST BACKUP SUMMARY;
8. LIST BACKUP BY FILE;
9. LIST BACKUP OF DATABASE;
10. LIST BACKUP OF DATABASE BY BACKUP;
11. LIST BACKUP OF TABLESPACE test SUMMARY;
12. LIST BACKUP OF DATAFILE 65;
13. LIST BACKUP OF DATAFILE 11 SUMMARY;
14. LIST BACKUP OF CONTROLFILE;
15. LIST BACKUP OF ARCHIVELOG FROM SEQUENCE 2222;
16. LIST BACKUP OF ARCHIVELOG FROM TIME ‘sysdate-1’;
17. LIST BACKUP OF ARCHIVELOG ALL COMPLETED BEFORE ‘sysdate-2’;
18. LIST BACKUP RECOVERABLE;
19. LIST EXPIRED BACKUP;
20. LIST EXPIRED BACKUP OF ARCHIVELOG ALL SUMMARY;
21. LIST COPY;
22. LIST COPY OF DATABASE ARCHIVELOG ALL;
23. LIST COPY OF TABLESPACE appl_idx;
24. LIST COPY OF DATAFILE 11, 60, 98;
25. LIST COPY OF CONTROLFILE;
26. LIST EXPIRED COPY;
27. LIST BACKUPSET SUMMARY;
28 .LIST BACKUPSET 109;
29. LIST BACKUPSET OF DATAFILE 1;
30. LIST ARCHIVELOG;
31. LIST ARCHIVELOG ALL LIKE ‘%5515%’;
32. LIST CONTROLFILECOPY “/tmp/cntrlfile.copy”;
33. LIST SCRIPT NAMES;
34. LIST ALL SCRIPT NAMES;
35. LIST GLOBAL SCRIPT NAMES;
36. LIST FAILURE; — 11g R1
37. LIST FAILURE 420 DETAIL; — 11g R1
38. LIST FAILURE ALL; — 11g R1
39. LIST RESTORE POINT ALL;
List Command Examples:
Command: LIST BACKUP OF DATABASE;
This command list the backups of database
Command: LIST COPY OF DATAFILE 1, 2, 3;
Command list the data files copy
Command: LIST BACKUP OF ARCHIVELOG FROM SEQUENCE 1437;
This will list the archivelogs from the sequence no:1437
Command: LIST CONTROLFILECOPY “/tmp/cf.cpy”;
This command will list the controlfile copy
Command: LIST BACKUPSET OF DATAFILE 1;
This will list the backupset of datafile 1
Command: LIST BACKUP OF DATABASE BY BACKUP;
Organizes the output by backup set. This is the default mode of presentation.
Command: LIST BACKUP BY FILE;
Lists the backups according to which file was backed up
Command: LIST BACKUP SUMMARY;
Displays reduced output. By default, the output is VERBOSE.
Command: LIST EXPIRED COPY;
Displays files inaccessible based on the CROSSCHECK command.
Command: LIST BACKUP RECOVERABLE;
Specifies datafile backups or copies that are available and that can be restored and recovered in
the current database incarnation. LIST BACKUP,LIST COPY,LIST COPY OF
CONTROLFILE,LIST COPY OF DATAFILE 1
======================================
Report Command
======================================
The REPORT command performs more complex analysis than LIST
1. Need Backup
Command: report need backup database
Here which files need to be taken backup under the current retention policy
2. Obsolete
Command: report obsolete
Here it will report the list of backups that are obsolete under the current retention policy
3. Schema
Command: report schema
Here it will display the current/diffent time of tablespaces and datafile information of the
database
4. Unrecoverable
Command: report unrecoverable
======================================================================
List Command Examples:
Command: REPORT NEED BACKUP DATABASE;
Shows which files need backing up under current retention policy. Use optional
REDUNDANCY and RECOVERY WINDOW parameters to specify different criteria.
Command: REPORT OBSOLETE;
Lists backups that are obsolete under the configured retention policy. Use optional
REDUNDANCY and RECOVERY WINDOW parameters to specify criteria.
Command: REPORT UNRECOVERABLE;
Lists all datafiles for which an unrecoverable operation has been performed against an object in
the datafile since the last backup of the datafile.
Command: REPORT SCHEMA;
Reports the tablespaces and datafiles in the database at the current time (default) or a different
time.
Command: REPORT NEED BACKUP;
The following command use to report the file need to be backup
Command: REPORT NEED BACKUP DAYS=5;
This command report the files need backup for the given days
Command: REPORT NEED BACKUP REDUNDANCY=3;
This command report the backup need files based on redundancy
Command: REPORT NEED BACKUP RECOVERY WINDOW OF 7 DAYS;
This command report the backup need based on given retention policy
Command: REPORT NEED BACKUP INCREMENTAL 1;
This will report which files needs incremental level 1 backup
Command: REPORT SCHEMA AT TIME ‘sysdate-20/1440’;
This will report which files needs backup as per given time
================================================
THANK YOU
======================================
Written by:
Syed Sadath Ullah
M.Tech;Ocp
Oracle Database Administrator
Email: oraclecloud777@gmail.com
======================================

More Related Content

What's hot

11 Things About 11gr2
11 Things About 11gr211 Things About 11gr2
11 Things About 11gr2afa reg
 
Less02 Installation
Less02 InstallationLess02 Installation
Less02 Installationvivaankumar
 
Clase 09 03-2013
Clase 09 03-2013Clase 09 03-2013
Clase 09 03-2013sayajeff
 
Oracle database hot backup and recovery
Oracle database hot backup and recoveryOracle database hot backup and recovery
Oracle database hot backup and recoveryArun Sharma
 
Oracle optach update
Oracle optach updateOracle optach update
Oracle optach updateRakesh rao
 
Data Migration in Database
Data Migration in DatabaseData Migration in Database
Data Migration in DatabaseJingun Jung
 
Introduction to Command Line & Batch files
Introduction to Command Line& Batch filesIntroduction to Command Line& Batch files
Introduction to Command Line & Batch filesHayder F. Shamary
 
The Ring programming language version 1.3 book - Part 60 of 88
The Ring programming language version 1.3 book - Part 60 of 88The Ring programming language version 1.3 book - Part 60 of 88
The Ring programming language version 1.3 book - Part 60 of 88Mahmoud Samir Fayed
 

What's hot (12)

11 Things About 11gr2
11 Things About 11gr211 Things About 11gr2
11 Things About 11gr2
 
Less02 Installation
Less02 InstallationLess02 Installation
Less02 Installation
 
Clase 09 03-2013
Clase 09 03-2013Clase 09 03-2013
Clase 09 03-2013
 
Createclone
CreatecloneCreateclone
Createclone
 
Oracle database hot backup and recovery
Oracle database hot backup and recoveryOracle database hot backup and recovery
Oracle database hot backup and recovery
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Oracle optach update
Oracle optach updateOracle optach update
Oracle optach update
 
12 yum
12  yum12  yum
12 yum
 
Data Migration in Database
Data Migration in DatabaseData Migration in Database
Data Migration in Database
 
Introduction to Command Line & Batch files
Introduction to Command Line& Batch filesIntroduction to Command Line& Batch files
Introduction to Command Line & Batch files
 
The Ring programming language version 1.3 book - Part 60 of 88
The Ring programming language version 1.3 book - Part 60 of 88The Ring programming language version 1.3 book - Part 60 of 88
The Ring programming language version 1.3 book - Part 60 of 88
 
Yum (Linux)
Yum (Linux) Yum (Linux)
Yum (Linux)
 

Similar to Rman Reporting Opertions - LIST & REPORT

Rman cloning when both directory and db name are same.
Rman cloning when both directory and db name are same.Rman cloning when both directory and db name are same.
Rman cloning when both directory and db name are same.subhani shaik
 
Rman in dataguard configuration
Rman in dataguard configurationRman in dataguard configuration
Rman in dataguard configurationArun Sharma
 
Step by Step Restore rman to different host
Step by Step Restore rman to different hostStep by Step Restore rman to different host
Step by Step Restore rman to different hostOsama Mustafa
 
Controlfilemanagement
ControlfilemanagementControlfilemanagement
ControlfilemanagementVinay Thota
 
br_test_lossof-datafile_10g.doc
br_test_lossof-datafile_10g.docbr_test_lossof-datafile_10g.doc
br_test_lossof-datafile_10g.docLucky Ally
 
DBAII_R1_1_Les17_E_075812.pptx
DBAII_R1_1_Les17_E_075812.pptxDBAII_R1_1_Les17_E_075812.pptx
DBAII_R1_1_Les17_E_075812.pptxsingbling
 
Mid term & final- preparation- student-review(Oracle)
Mid term & final- preparation- student-review(Oracle)Mid term & final- preparation- student-review(Oracle)
Mid term & final- preparation- student-review(Oracle)than sare
 
2011 384 hackworth_ppt
2011 384 hackworth_ppt2011 384 hackworth_ppt
2011 384 hackworth_pptmaclean liu
 
Les 05 Create Bu
Les 05 Create BuLes 05 Create Bu
Les 05 Create Buvivaankumar
 
Data Guard New Features
Data Guard New FeaturesData Guard New Features
Data Guard New Featuresxiangrong
 
Collaborate 2012 - RMAN eliminate the mystery
Collaborate 2012 - RMAN eliminate the mysteryCollaborate 2012 - RMAN eliminate the mystery
Collaborate 2012 - RMAN eliminate the mysteryNelson Calero
 
Creating a physical standby database 11g on windows
Creating a physical standby database 11g on windowsCreating a physical standby database 11g on windows
Creating a physical standby database 11g on windowsRoo Wall
 
Rman workshop short
Rman workshop shortRman workshop short
Rman workshop shortNabi Abdul
 
Collaborate 2012 - RMAN Eliminate the mystery
Collaborate 2012 - RMAN Eliminate the mysteryCollaborate 2012 - RMAN Eliminate the mystery
Collaborate 2012 - RMAN Eliminate the mysteryNelson Calero
 

Similar to Rman Reporting Opertions - LIST & REPORT (20)

Rman cloning when both directory and db name are same.
Rman cloning when both directory and db name are same.Rman cloning when both directory and db name are same.
Rman cloning when both directory and db name are same.
 
Ioug tip book11_gunukula
Ioug tip book11_gunukulaIoug tip book11_gunukula
Ioug tip book11_gunukula
 
Les 08 Dupe Db
Les 08 Dupe DbLes 08 Dupe Db
Les 08 Dupe Db
 
Rman in dataguard configuration
Rman in dataguard configurationRman in dataguard configuration
Rman in dataguard configuration
 
Step by Step Restore rman to different host
Step by Step Restore rman to different hostStep by Step Restore rman to different host
Step by Step Restore rman to different host
 
Les 03 catalog
Les 03 catalogLes 03 catalog
Les 03 catalog
 
Controlfilemanagement
ControlfilemanagementControlfilemanagement
Controlfilemanagement
 
br_test_lossof-datafile_10g.doc
br_test_lossof-datafile_10g.docbr_test_lossof-datafile_10g.doc
br_test_lossof-datafile_10g.doc
 
Les 03 Catalog
Les 03 CatalogLes 03 Catalog
Les 03 Catalog
 
DBAII_R1_1_Les17_E_075812.pptx
DBAII_R1_1_Les17_E_075812.pptxDBAII_R1_1_Les17_E_075812.pptx
DBAII_R1_1_Les17_E_075812.pptx
 
Mid term & final- preparation- student-review(Oracle)
Mid term & final- preparation- student-review(Oracle)Mid term & final- preparation- student-review(Oracle)
Mid term & final- preparation- student-review(Oracle)
 
2011 384 hackworth_ppt
2011 384 hackworth_ppt2011 384 hackworth_ppt
2011 384 hackworth_ppt
 
Les 05 Create Bu
Les 05 Create BuLes 05 Create Bu
Les 05 Create Bu
 
Data Guard New Features
Data Guard New FeaturesData Guard New Features
Data Guard New Features
 
Collaborate 2012 - RMAN eliminate the mystery
Collaborate 2012 - RMAN eliminate the mysteryCollaborate 2012 - RMAN eliminate the mystery
Collaborate 2012 - RMAN eliminate the mystery
 
Creating a physical standby database 11g on windows
Creating a physical standby database 11g on windowsCreating a physical standby database 11g on windows
Creating a physical standby database 11g on windows
 
Rman workshop short
Rman workshop shortRman workshop short
Rman workshop short
 
Collaborate 2012 - RMAN Eliminate the mystery
Collaborate 2012 - RMAN Eliminate the mysteryCollaborate 2012 - RMAN Eliminate the mystery
Collaborate 2012 - RMAN Eliminate the mystery
 
Les 20 dup_db
Les 20 dup_dbLes 20 dup_db
Les 20 dup_db
 
15362590.ppt
15362590.ppt15362590.ppt
15362590.ppt
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Rman Reporting Opertions - LIST & REPORT

  • 1. ====================================== RMAN Reporting Operations List Command ====================================== LIST: List will display info about backups and datafile copies listed in repository. 1. By Backup Command: List backup of database by backup; List of backup sets and data files in backup sets. 2. By File Command: List backup by file; List of datafile backups, archived log backups, control file backups, spfile backups 3. Summary Command: List backup summary It will display all backups summary (or) Command: List backup of database summary; It will display only database level 0 and level 1 backups summary 4. Expired Command: List expired backup It will display all the archived logs in backup sets. 5. Recoverable Command: List backup recoverable; It displays the datafile backups or copies which are in "Available" state that can be restore and recoverable.
  • 2. Please find below for other LIST commands: ====================================================================== 1. LIST INCARNATION; 2. LIST INCARNATION OF DATABASE; 3. LIST INCARNATION OF DATABASE vis; 4. LIST DB_UNIQUE_NAME ALL; 5. LIST DB_UNIQUE_NAME OF DATABASE; 6. LIST BACKUP; 7. LIST BACKUP SUMMARY; 8. LIST BACKUP BY FILE; 9. LIST BACKUP OF DATABASE; 10. LIST BACKUP OF DATABASE BY BACKUP; 11. LIST BACKUP OF TABLESPACE test SUMMARY; 12. LIST BACKUP OF DATAFILE 65; 13. LIST BACKUP OF DATAFILE 11 SUMMARY; 14. LIST BACKUP OF CONTROLFILE; 15. LIST BACKUP OF ARCHIVELOG FROM SEQUENCE 2222; 16. LIST BACKUP OF ARCHIVELOG FROM TIME ‘sysdate-1’; 17. LIST BACKUP OF ARCHIVELOG ALL COMPLETED BEFORE ‘sysdate-2’; 18. LIST BACKUP RECOVERABLE; 19. LIST EXPIRED BACKUP; 20. LIST EXPIRED BACKUP OF ARCHIVELOG ALL SUMMARY; 21. LIST COPY; 22. LIST COPY OF DATABASE ARCHIVELOG ALL; 23. LIST COPY OF TABLESPACE appl_idx; 24. LIST COPY OF DATAFILE 11, 60, 98; 25. LIST COPY OF CONTROLFILE; 26. LIST EXPIRED COPY; 27. LIST BACKUPSET SUMMARY; 28 .LIST BACKUPSET 109; 29. LIST BACKUPSET OF DATAFILE 1; 30. LIST ARCHIVELOG; 31. LIST ARCHIVELOG ALL LIKE ‘%5515%’; 32. LIST CONTROLFILECOPY “/tmp/cntrlfile.copy”; 33. LIST SCRIPT NAMES; 34. LIST ALL SCRIPT NAMES; 35. LIST GLOBAL SCRIPT NAMES; 36. LIST FAILURE; — 11g R1 37. LIST FAILURE 420 DETAIL; — 11g R1 38. LIST FAILURE ALL; — 11g R1 39. LIST RESTORE POINT ALL;
  • 3. List Command Examples: Command: LIST BACKUP OF DATABASE; This command list the backups of database Command: LIST COPY OF DATAFILE 1, 2, 3; Command list the data files copy Command: LIST BACKUP OF ARCHIVELOG FROM SEQUENCE 1437; This will list the archivelogs from the sequence no:1437 Command: LIST CONTROLFILECOPY “/tmp/cf.cpy”; This command will list the controlfile copy Command: LIST BACKUPSET OF DATAFILE 1; This will list the backupset of datafile 1 Command: LIST BACKUP OF DATABASE BY BACKUP; Organizes the output by backup set. This is the default mode of presentation. Command: LIST BACKUP BY FILE; Lists the backups according to which file was backed up Command: LIST BACKUP SUMMARY; Displays reduced output. By default, the output is VERBOSE. Command: LIST EXPIRED COPY; Displays files inaccessible based on the CROSSCHECK command. Command: LIST BACKUP RECOVERABLE; Specifies datafile backups or copies that are available and that can be restored and recovered in the current database incarnation. LIST BACKUP,LIST COPY,LIST COPY OF CONTROLFILE,LIST COPY OF DATAFILE 1
  • 4. ====================================== Report Command ====================================== The REPORT command performs more complex analysis than LIST 1. Need Backup Command: report need backup database Here which files need to be taken backup under the current retention policy 2. Obsolete Command: report obsolete Here it will report the list of backups that are obsolete under the current retention policy 3. Schema Command: report schema Here it will display the current/diffent time of tablespaces and datafile information of the database 4. Unrecoverable Command: report unrecoverable ====================================================================== List Command Examples: Command: REPORT NEED BACKUP DATABASE; Shows which files need backing up under current retention policy. Use optional REDUNDANCY and RECOVERY WINDOW parameters to specify different criteria. Command: REPORT OBSOLETE; Lists backups that are obsolete under the configured retention policy. Use optional REDUNDANCY and RECOVERY WINDOW parameters to specify criteria. Command: REPORT UNRECOVERABLE; Lists all datafiles for which an unrecoverable operation has been performed against an object in the datafile since the last backup of the datafile.
  • 5. Command: REPORT SCHEMA; Reports the tablespaces and datafiles in the database at the current time (default) or a different time. Command: REPORT NEED BACKUP; The following command use to report the file need to be backup Command: REPORT NEED BACKUP DAYS=5; This command report the files need backup for the given days Command: REPORT NEED BACKUP REDUNDANCY=3; This command report the backup need files based on redundancy Command: REPORT NEED BACKUP RECOVERY WINDOW OF 7 DAYS; This command report the backup need based on given retention policy Command: REPORT NEED BACKUP INCREMENTAL 1; This will report which files needs incremental level 1 backup Command: REPORT SCHEMA AT TIME ‘sysdate-20/1440’; This will report which files needs backup as per given time ================================================ THANK YOU ====================================== Written by: Syed Sadath Ullah M.Tech;Ocp Oracle Database Administrator Email: oraclecloud777@gmail.com ======================================