Document directory
I. Three Components of log4j
Ii. Configuration File
In fact, the use of logs is very simple. 1. Import the log4j package, 2. Define the configuration file, and 3. Use it. General steps: Define the log object → read the configuration file → output to
first step, you will use the original mode of BCP to remit the login account to a file. In the second step, you must copy the login account to a file on the secondary server, so that you can resolve the login account when you change the role later. In step 5 you will use the Sp_resolve_logins stored procedure to resolve the SID of the login account on the secondary server. Once the work is established, it
Label:The SQL Server transaction log file is an important part of the database file, and the transaction log is used primarily to store the database's modification records. In order to achieve higher write efficiency and performance while maintaining the acid characteristics
from master.dbo.sysdatabases
Open Sysdbname
FETCH NEXT from Sysdbname into @dbname
While @ @fetch_status =0
Begin
if (@dbname not in (' xxx ')-database name that does not require log shrinkage
Begin
Set @sql =--Journal file ID
N ' Declare @logid int ' +
N ' use ' + @dbname +
N ' select @logid =fileid from Sysfiles where right (LTrim (RTrim (f
number used by the file and then reads the file content. If you want to write a file, the file system first finds the available sector for data appending. Update the file sector usage information at the same time. Different file
SQL Profiler is a very powerful tool. It is fine to read the analysis principles in order. However, if you want to analyze complicated situations, you need more things.
Here we will introduce a method to operate Profiler Trace like an SQL table, so that you can use select to view the information you are interested in.
To do this, you can use a built-in function
1: Binary logThe binary log records all DDL(data definition Language) statements and DML(Data Manipulation language) statements, but does not record statements that include data queries. Statements are saved as "events," which describe the process of changing the data, which plays an extremely important role in recovering data during a disaster.2: Location and format of the logWhen started with the -log-bin
The batch log recovery mode of the SQL Server recovery model.
Do you want to know why the transaction log file is getting bigger and bigger? Transaction logs are sometimes larger than your actual database files, especially in the case of application data warehouses. Why is this happening? How to control its size? How d
The 'Log file sync' wait event in the RAC database is more complex than the 'Log file sync' wait event in the Standalone Database, mainly because the RAC database needs to synchronize the SCN to all instances.
The 'Log file sync'
The solution is to delete other files on the hard disk to empty the hard disk space, change the size of the Database Log File to unlimited, and then separate the database to ensure that the separation is successful, and then delete the Database Log File (it is best to change the name first, just in case ). Attach the d
Create a log file in oracle
The syntax for creating a log file is as follows:
Alter database database_name add logfile [group group_number](File_name [, file_name [,...]) [SIZE number] [reuse];
The syntax is described as follows;
Group group_number is the ID of the specified group in the
)
B. do not enable too long transactions in tempdb (logs cannot be truncated, resulting in excessive logs. If the rollback fails, the server goes down)
C generally, the process of intermediate table matching is created in tempdb (fast creation speed depends on the actual situation .)
D The speed of using heap tables in tempdb is good (depending on the actual situation)
How to clear SQL Server tempdb data
Method for shrinking TempdbThis method requires
The Sqlserver2005 log file is too large to reduce it by the following methods:
Run the following three lines dbname for the database name:
Backup LOG Dbnamewith No_logBackup LOG Dbnamewith truncate_onlyDBCC Shrinkdatabase (dbname)
Log
Log file, which records every detail of the Windows system and its various services running, and plays a very important role in enhancing Windows stability and security.
But many users do not pay attention to it protection, some "uninvited" very easy to empty the log file, to the system to bring serious security risk
Next, let's take a look at the Log Type and file configuration details of my. cnf configuration in mysql. I hope the article will help you.
Mysql has the following types of logs:Error log: log-errQuery log: logSlow query log:
1, Description: Database server, Disk full, to a larger database file, moved to another disk, after the move, reattach the database appears "read-only" hint. (as pictured)
2, this thought, in the "Property-option-state" directly to the "database is read-only" option, set to False from True, you canBut how fucking it is! Reported as the wrong picture
3,
JFS provides an overview of how to shorten the restart time of a log file system-Linux Release Technology-Debian information. For more information, see the following. In the event of a system crash, JFS provides fast file system restart. By using the database log technology, JFS can restore the
recommended to truncate logs on the production database unless you have good reasons and are sure enough, or ......You are not responsible for this.
Since this method is not safe, I will introduce a security method below.As we all know, SQL Server will automatically cut off the inactive part of the transaction log when backing up the transaction log. These inac
Tags: style blog http io color OS SP for strongTo synchronize data from Oracle in real time to MS SQL Server, you need to read and write data directly to SQL Server in Oracle, and you can install the Oracle database for SQL Servers component on the Oracle about how to install this component, the Web can not find the de
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.