Posted on 2006-06-21
Last Modified: 2008-01-09
Is there any way that we can find out that what cause chekpoint to triggere like because of log switch or to reach thresholds set for LOG_CHCEKPOINT_TIMEOUT AND LOG_CHECKPOINT_INTERVAL parameters?

Any help would be appreciated to resolve this.

Thanks in advance.
Question by:Smruti1

Expert Comment

ID: 16952885
Hi Smruti,
  I don't think that this is possible. If at all this information can be found, it should be the alert log file.
LVL 34

Accepted Solution

johnsone earned 168 total points
ID: 16954199
To get the checkpoints in the alert log, you need to set log_checkpoints_to_alert to true.  I believe the default is false.  Then you would have to go through the alert log and see if the checkpoint corresponds to a log switch.

Off the top of my head, I cannot think of another way.

Expert Comment

ID: 16958958
Hi Smruti,
  What johnsone says sounds good. You can make the log_checkpoints_to_alert to true and then check the alert.log file. If you find a log swith statement and checkpoint completed messages together, you can say that that check point is caused by log swith otherwise, it's because of other thresholds.
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

LVL 19

Assisted Solution

actonwang earned 166 total points
ID: 16962068
to Badri:
LOG_CHECKPOINTS_TO_ALERT lets you log your checkpoints to the alert file. Doing so is ONLY useful for determining whether checkpoints are occurring at the desired frequency.
Therefore, this is NOT the answer to the original question.

checkpoint can be caused by a lot of factors and as far as I know there is no way to tell which one caused checkpoint to happen.
LVL 19

Expert Comment

ID: 16962088
BUT since you know that the following events will cause checkpoints to happen as:
     1. online redo log switch
     2. "alter system checkpoint" command
     3. alter tablespace .. begin backup;
     4. ..

If you can manage to log those events plus when they happen, you can indirectly know which one causes specific checkpoint.

LVL 47

Assisted Solution

schwertner earned 166 total points
ID: 16966855
As I recall checkpoints happened internally in order to keep the DB good for crash recovery:
1. every 3 seconds
2. when the online redo cash is 33% full and the contents is written in the online redo log
3. by online redo log switch
4. explicitelly issued "checkpoint" command

Expert Comment

ID: 20294457
Forced accept.

EE Admin

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
querying by the sum of a column in decimal 7 56
VB.Net - CSV to Oracle table 4 52
VB.Net - Oracle BulkCopy from CSV Date Format 7 45
join 2 views with 5 conditions 3 44
Note: this article covers simple compression. Oracle introduced in version 11g release 2 a new feature called Advanced Compression which is not covered here. General principle of Oracle compression Oracle compression is a way of reducing the d…
How to Create User-Defined Aggregates in Oracle Before we begin creating these things, what are user-defined aggregates?  They are a feature introduced in Oracle 9i that allows a developer to create his or her own functions like "SUM", "AVG", and…
This video shows information on the Oracle Data Dictionary, starting with the Oracle documentation, explaining the different types of Data Dictionary views available by group and permissions as well as giving examples on how to retrieve data from th…
This video explains what a user managed backup is and shows how to take one, providing a couple of simple example scripts.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now