Symantec 10490452 Administration Guide - Page 199
Backing up the Spam and Virus Quarantine databases
UPC - 037648265683
View all Symantec 10490452 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 199 highlights
Administering the system 199 Periodic system maintenance limited utility, especially if you need assistance from Symantec Support personnel. It is best to view and save current logs as needed on the Logs page and set the appropriate retention period for logging data. Backing up the Spam and Virus Quarantine databases The messages in Spam and Virus Quarantines are stored in MySQL databases. You can back up the Spam and Virus Quarantine databases together, using MySQL. Or you can backup each database separately. If you have a large number of messages in Spam Quarantine, backing up may take some time. Backups can be done while the Symantec software is running. MySQL must be running when you perform backups. For complete instructions on performing backups of MySQL data, see MySQL documentation. The following MySQL commands are suggested for your use. Note: In the instructions in this section, replace the value PASSWORD with the following text on Solaris or Linux: 'cat /opt/Symantec/SMSSMTP/.brightmailuser' On Windows, open the following file in a text editing application and use the file contents as the value of PASSWORD: C:\Program Files\Symantec\SMSSMTP\.brightmailuser Back up and restore Quarantine database information Use the following procedures for backing up or restoring quarantine databases. To save Spam Quarantine and Suspect Virus Quarantine tables ◆ mysqldump --user=brightmailuser --password=PASSWORD --opt brightmail user user_spam_message spam_message spam_message_summary spam_message_release_audit settings_quarantine day_zero_message settings_ldap --host=127.0.0.1 > quarantine.sql To restore Spam Quarantine and Suspect Virus Quarantine tables from backup ◆ mysql --user=brightmailuser --password=PASSWORD --host=127.0.0.1 brightmail < quarantine.sql To save Spam Quarantine tables ◆ mysqldump --user=brightmailuser --password=PASSWORD --opt brightmail user user_spam_message spam_message spam_message_summary spam_message_release_audit