Solved

checkpoint

Posted on 2006-06-21
8
812 Views
Last Modified: 2008-01-09
Hi
Is there any way that we can find out that what cause chekpoint to triggere like because of log switch or to reach thresholds set for LOG_CHCEKPOINT_TIMEOUT AND LOG_CHECKPOINT_INTERVAL parameters?

Any help would be appreciated to resolve this.

Thanks in advance.
0
Comment
Question by:Smruti1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 8

Expert Comment

by:gvsbnarayana
ID: 16952885
Hi Smruti,
  I don't think that this is possible. If at all this information can be found, it should be the alert log file.
HTH.
Regards,
Badri.
0
 
LVL 35

Accepted Solution

by:
johnsone earned 168 total points
ID: 16954199
To get the checkpoints in the alert log, you need to set log_checkpoints_to_alert to true.  I believe the default is false.  Then you would have to go through the alert log and see if the checkpoint corresponds to a log switch.

Off the top of my head, I cannot think of another way.
0
 
LVL 8

Expert Comment

by:gvsbnarayana
ID: 16958958
Hi Smruti,
  What johnsone says sounds good. You can make the log_checkpoints_to_alert to true and then check the alert.log file. If you find a log swith statement and checkpoint completed messages together, you can say that that check point is caused by log swith otherwise, it's because of other thresholds.
HTH.
Regards,
Badri.
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 19

Assisted Solution

by:actonwang
actonwang earned 166 total points
ID: 16962068
to Badri:
LOG_CHECKPOINTS_TO_ALERT lets you log your checkpoints to the alert file. Doing so is ONLY useful for determining whether checkpoints are occurring at the desired frequency.
Therefore, this is NOT the answer to the original question.


checkpoint can be caused by a lot of factors and as far as I know there is no way to tell which one caused checkpoint to happen.
0
 
LVL 19

Expert Comment

by:actonwang
ID: 16962088
BUT since you know that the following events will cause checkpoints to happen as:
 
     1. online redo log switch
     2. "alter system checkpoint" command
     3. alter tablespace .. begin backup;
     4. ..

If you can manage to log those events plus when they happen, you can indirectly know which one causes specific checkpoint.


acton
   
0
 
LVL 48

Assisted Solution

by:schwertner
schwertner earned 166 total points
ID: 16966855
As I recall checkpoints happened internally in order to keep the DB good for crash recovery:
1. every 3 seconds
2. when the online redo cash is 33% full and the contents is written in the online redo log
3. by online redo log switch
4. explicitelly issued "checkpoint" command
....
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20294457
Forced accept.

Computer101
EE Admin
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Truncate is a DDL Command where as Delete is a DML Command. Both will delete data from table, but what is the difference between these below statements truncate table <table_name> ?? delete from <table_name> ?? The first command cannot be …
Checking the Alert Log in AWS RDS Oracle can be a pain through their user interface.  I made a script to download the Alert Log, look for errors, and email me the trace files.  In this article I'll describe what I did and share my script.
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines
This video shows how to configure and send email from and Oracle database using both UTL_SMTP and UTL_MAIL, as well as comparing UTL_SMTP to a manual SMTP conversation with a mail server.
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question