Help Center
Choose product document...
Veeam Backup & Replication 9.5 [Archived]
Enterprise Manager User Guide

Application-aware Image Processing Settings

If you want to create a transactionally consistent backup or replication ensuring successful recovery of machine applications without any data loss, take the following steps:

  1. Select the Enable application-aware image processing check box.
  2. Click the Applications button.
  3. To define custom settings for a machine in the list, select it and click Edit. Consider the following:
  • To customize settings of a machine added to the job as part of a container, the machine should be included in the list as a standalone instance. For that, click Add Machine and select a machine whose settings you want to customize. Next, select the machine in the list and click Edit to define the necessary custom settings.
  • To discard custom settings of a machine, select the machine in the list and click Remove.
  1. Configure the necessary settings for the selected application server, as described in the paragraphs that follow.

Application-aware Image Processing Settings 

In This Section

General Settings

Applications Section

In this section, select the option that corresponds to a transactionally-consistent backup creation scenario of your choice:

Application-aware Image Processing Settings 

Transaction Logs Processing Section

In this section, specify whether this job should process transaction logs upon a successful backup:

  • Select Process transaction logs with this job (recommended) if you want Veeam Backup & Replication to handle transaction logs. With this option enabled (default setting), Veeam will support log pruning for Microsoft Exchange and Microsoft SQL servers, as well as for Oracle databases archived logs:
  • Truncation of transaction logs for Microsoft Exchange server will be performed after the job completes successfully: the Veeam runtime process will wait for machine backup to complete and then trigger truncation of transaction logs. If truncation of transaction logs is not possible for some reason, the logs will remain untouched in the machine guest OS until the next start of the Veeam runtime process.
  • Settings for SQL server transaction log handling can be configured separately on the SQL tab - it becomes available to you with this option selected.
  • Similarly, you can configure settings for Oracle database archived logs processing on the Oracle tab.
  • Select Perform copy-only (lets another application use logs) if you want to use native application means or a third-party tool to process transaction logs. Veeam Backup & Replication will create a copy-only backup for the selected machine. The copy-only backup preserves a chain of full/differential backup files and transaction logs, so Veeam Backup & Replication will not trigger transaction log truncation. This option is recommended if you are using another backup tool to perform machine guest-level backup, and this tool maintains consistency of the database state. To learn more, see Veeam Backup & Replication User Guide.
    With this option selected, the SQL and Oracle tabs will not be available.

SQL Server Processing Settings

To configure settings on the SQL tab, follow the instructions provided in the Backup and Restore of Microsoft SQL Server Databases.

Oracle Server Processing Settings

To configure settings on the Oracle tab, follow the instructions provided in the Backup and Restore of Oracle Databases.

File Exclusions

On the File Exclusions tab, specify whether to exclude or include specific files in the backup. Exclusions can help to decrease backup file size. However, remember that selective processing takes additional time that depends on the number of excluded files; also, it requires obtaining per-file metadata (stored in backups). Thus, it is recommended to use this option for excluding large files. By default, exclusions are disabled.

Click Add and specify what files and folders you want to include or exclude.

Application-aware Image Processing Settings 

To form the list of exclusions or inclusions, you can use full paths to files and folders, environmental variables and file masks with the asterisk (*) and question mark (?) characters. For more information, refer to the corresponding section of the Veeam Backup & Replication User Guide.

Veeam Large Logo

User Guide for VMware vSphere

User Guide for Microsoft Hyper-V

Enterprise Manager User Guide

Veeam Cloud Connect Guide

Veeam Agent Management Guide

Veeam Backup Explorers User Guide

Backup and Restore of SQL Server Databases

PowerShell Reference

RESTful API Reference

Veeam Backup FREE Edition User Guide