Hi Zoltan, Yes, there is a difference. Don't confuse old-style DOS wildcard matching with TSM wildcard matching.
'*' matches zero more more characters. Thus: *.* will match file names that have a '.' in them, e.g.: charts.xls myfile. .profile It will NOT match files that do not contain a dot, e..g: myfile profile Best regards, - Andy ____________________________________________________________________________ Andrew Raibeck | Tivoli Storage Manager Level 3 Technical Lead | [email protected] IBM Tivoli Storage Manager links: Product support: http://www.ibm.com/support/entry/portal/Overview/Software/Tivoli/Tivoli_Storage_Manager Online documentation: https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/Tivoli Documentation Central/page/Tivoli Storage Manager Product Wiki: https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/Tivoli +Storage+Manager/page/Home "ADSM: Dist Stor Manager" <[email protected]> wrote on 2013-04-18 10:34:30: > From: Zoltan Forray <[email protected]> > To: [email protected], > Date: 2013-04-18 10:39 > Subject: include/exclude pattern matching *.* vs * > Sent by: "ADSM: Dist Stor Manager" <[email protected]> > > Is there a real difference in an INCLUDE statement using \*.* vs \* ? > > We are troubleshooting a backup problem (nothing is being backed up) and > the OBJECTS option on the schedule says INCLUDE \\server\folder\*.* > > Is there a really good definitive document that picks through all these > kinds of wildcard patters to show what would be includes/excluded? All of > the examples I could root out show using 1-asterisk/* but none showed 2 *.* > > -- > *Zoltan Forray* > TSM Software & Hardware Administrator > Virginia Commonwealth University > UCC/Office of Technology Services > [email protected] - 804-828-4807 > Don't be a phishing victim - VCU and other reputable organizations will > never use email to request that you reply with your password, social > security number or confidential personal information. For more details > visit http://infosecurity.vcu.edu/phishing.html >
