log

Want to know log? we have a huge selection of log information on alibabacloud.com

Teach you how to shrink SQL Server log files

A few days ago also encountered a large log file problem, the actual size of the database is 600M, the actual size of the log file is 33M, but the log files occupy a space of 2.8G!!! Try a variety of ways, Shirnk DATABASE, TRUNCATE LOG file, there

How do i modify the MySQL log file location?

MySQL log files believe that we all have a lot of understanding, MySQL log files in general:/var/log/mysqld.log, the following teach you to modify the MySQL log file location method for your reference. Today need to change the location of the MySQL

keepalived Build High Availability Mysql-ha

With regard to mysql-ha, there are many solutions, such as heartbeat, DRBD, MMM, shared storage, but each has its pros and cons. Heartbeat, DRBD configuration is more complex, need to write their own script to achieve MySQL automatic switching, for

Detailed paging, memory, and I/O latency in the database

A few years ago I wrote an article on Aix tuning, and now that Aix 7 appears, it is necessary to re-examine the basic tuning that needs to be done on AIX systems. Many technical levels (TL) and some recommendations that have been released may change.

Configuring the MySQL cluster detailed tutorial on ubuntu9.0

Home can be found on the Internet are Redhat systems and so on, the Ubuntu system MySQL cluster does not introduce articles, I now write to write Ubuntu this MySQL cluster method. Novice don't scold me, hehe. Introducing the network environment:

Simple to solve the problem of MySQL resource too large

In Linux, often the case is the use of VBB this forum system, the emergence of slow, MySQL suspended animation state, the sleep process is too much and so is like. Led to dozens of users, the system is done.In fact, this is a MySQL configuration

MySQL Application skills access rights

MySQL uses the user name for the authentication purpose, regardless of the UNIX user name (login name) or the Windows user name. By default, most MySQL clients try to log on using the current UNIX username as the MySQL username, but this is only for

MySQL Log management analysis Debugging instance

The following article mainly describes the MySQL operation log to see the actual operation steps and the actual operation steps of the specific description, if you encounter similar situation in the actual operation, but you do not know how to solve

Mysql Master-Slave database synchronization

Environment:Master server: CentOS 5.2 mysql 5.1.35 source ip:192.168.1.22From server: CentOS 5.2 mysql 5.1.35 source ip:192.168.1.33Configuration:First, the main server1.1, create a replication user, with replication slave permissions.Mysql>grant

Backup and disaster Recovery for database backup SQL Server

The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware or software). A well known RAID disk array (redundant array of independent disks) is a good way to protect data. In the case of SQL Server , a detailed

SQL Server database commonly used T

1. View the version of the database SELECT @ @version 2. View the machine operating system parameters of the database EXEC master.. xp_msver 3. View Database Startup Parameters sp_configure 4. View Database Startup time Select CONVERT

Upgrade and deployment issues with SQL Server 2008

This article is a question-and-answer form to introduce SQL Server2008 upgrade and deployment, hope that through this article can give you some improvement and help. Q: Now that my company is using this version of SQL 2005, what is the best way to

How to compress the size of the MSSQL database log

Data | database | Log |mssql| compression The database in the cumulative operation process, not only its own volume will slowly grow, its log capacity size as well as the database entity file growth and will occupy a lot of space. the size of the

Improve the security performance of FTP server comprehensively

The Windows2000 system provides the FTP service function, because it is simple and easy to use, and the Windows system itself combines tightly, deeply favored by the majority of users. But is it really safe to use IIS5.0 to set up an FTP server? Its

A brief explanation of four intrusion levels on Linux servers

With the expansion of Linux enterprise applications, there are a large number of network servers using the Linux operating system. Linux server security can be more and more attention, here according to the depth of the attack on the Linux server in

Building an efficient FTP server with Linux

In many network applications, FTP (File Transfer Protocol) has a very important position. A very important resource in the Internet is software resources, and most of the various software resources are placed in the FTP server. Like most Internet

Tiered defense attacks on Linux servers

With the expansion of Linux enterprise applications, there are a large number of network servers using the Linux operating system. Linux server security can be more and more attention, here according to the depth of the attack on the Linux server in

Several tips for managing servers efficiently

Efficient Management Server has been inseparable from effective server management skills, the author summed up work experience, refining 3 tips, and readers to share. Deny server reboot    Typically, after you install a patch on a Windows 2003

Linux Intrusion Common Command assembly

CAT/ETC/PASSWD View Linux User Cat/etc/shadow View user password requires root permission CAT/ETC/PASSWD View Linux Users Cat/etc/shadow View user password requires root permission Cat/etc/sysconfig/network-scripts/ifcfg-ethn N represents the

FTP server configuration under Linux system

In order to achieve the Linux environment FTP server configuration, the vast majority of Linux distribution suite is the use of Washington University FTP (WU-FTPD), which is a good performance of the server software, because it has a number of

Total Pages: 55 1 .... 7 8 9 10 11 .... 55 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.