HP XP P9000 Replication Manager Software 7.6.0-00 Application Agent CLI Reference Guide

-transact_log_del
Specify this option to delete a committed transaction log file. By deleting the transaction log file, you
can increase the amount of unused drive capacity.
If you delete a transaction log file, you will no longer be able to use the -recovery option to restore
any previous backups. Specify this option when you want to restore data other than the most recent
backup data without specifying the -recovery option.
If you are using circular logging, this option is ignored. For details about circular logging, see the
Exchange Server documentation.
-noverify
Specify this option to skip consistency verification for a database that was backed up by using VSS.
-noverify_log_del
Specify this option to skip consistency verification for a database that was backed up by using VSS,
and then delete the transaction log file.
-c { offline | online }
Specify either of these options for a cluster environment. Specify -c offline to take a physical disk
cluster resource offline, and then back it up. Specify -c online to back up a physical disk cluster
resource while it is still online. The default -c option is -c offline. These options are ignored for
non-cluster environments.
-hostname virtual-server-name
Specify this option to designate an Exchange virtual server to back up. You can also use an operation
definition file to designate the server. If you use both an operation definition file and the -hostname
option, the server specified in the -hostname option will be given priority. Specify this option only
for cluster environments. This option is enabled only when you set SET_DRM_HOSTNAME to 1 in the
operation definition file; if you set SET_DRM_HOSTNAME to 0, this option is disabled.
-event_check
Specify this option to check whether an event indicating a corrupted database has been recorded.
The command executed with this option searches the Windows event log data that was recorded
since the last backup of an Exchange database. If no previous backup is available, all data recorded
in the Windows event log is searched.
The Windows event log is searched before the copy pair is resynchronized. If an event indicating a
corrupt database is detected, the command terminates in an error.
Application Agent determines that a database is corrupt by the following event details:
Event category: Application
Type: Error
Source: ESE
Event ID: No limitation
Character string being included: -1018, -1019, or -1022
-comment backup-comment
Specify this option to register a backup comment in the backup catalog. The conditions for specifying
a value in the backup-comment parameter are as follows:
The value must be 64 bytes or less.
The value can include alphanumeric, reserved, one-byte space, and multi-byte characters.
The value is case sensitive.
Extended commands66