Solved

checkpoint

Posted on 2006-06-21
8
805 Views
Last Modified: 2008-01-09
Hi
Is there any way that we can find out that what cause chekpoint to triggere like because of log switch or to reach thresholds set for LOG_CHCEKPOINT_TIMEOUT AND LOG_CHECKPOINT_INTERVAL parameters?

Any help would be appreciated to resolve this.

Thanks in advance.
0
Comment
Question by:Smruti1
8 Comments
 
LVL 8

Expert Comment

by:gvsbnarayana
ID: 16952885
Hi Smruti,
  I don't think that this is possible. If at all this information can be found, it should be the alert log file.
HTH.
Regards,
Badri.
0
 
LVL 34

Accepted Solution

by:
johnsone earned 168 total points
ID: 16954199
To get the checkpoints in the alert log, you need to set log_checkpoints_to_alert to true.  I believe the default is false.  Then you would have to go through the alert log and see if the checkpoint corresponds to a log switch.

Off the top of my head, I cannot think of another way.
0
 
LVL 8

Expert Comment

by:gvsbnarayana
ID: 16958958
Hi Smruti,
  What johnsone says sounds good. You can make the log_checkpoints_to_alert to true and then check the alert.log file. If you find a log swith statement and checkpoint completed messages together, you can say that that check point is caused by log swith otherwise, it's because of other thresholds.
HTH.
Regards,
Badri.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 19

Assisted Solution

by:actonwang
actonwang earned 166 total points
ID: 16962068
to Badri:
LOG_CHECKPOINTS_TO_ALERT lets you log your checkpoints to the alert file. Doing so is ONLY useful for determining whether checkpoints are occurring at the desired frequency.
Therefore, this is NOT the answer to the original question.


checkpoint can be caused by a lot of factors and as far as I know there is no way to tell which one caused checkpoint to happen.
0
 
LVL 19

Expert Comment

by:actonwang
ID: 16962088
BUT since you know that the following events will cause checkpoints to happen as:
 
     1. online redo log switch
     2. "alter system checkpoint" command
     3. alter tablespace .. begin backup;
     4. ..

If you can manage to log those events plus when they happen, you can indirectly know which one causes specific checkpoint.


acton
   
0
 
LVL 48

Assisted Solution

by:schwertner
schwertner earned 166 total points
ID: 16966855
As I recall checkpoints happened internally in order to keep the DB good for crash recovery:
1. every 3 seconds
2. when the online redo cash is 33% full and the contents is written in the online redo log
3. by online redo log switch
4. explicitelly issued "checkpoint" command
....
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20294457
Forced accept.

Computer101
EE Admin
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Cursors in Oracle: A cursor is used to process individual rows returned by database system for a query. In oracle every SQL statement executed by the oracle server has a private area. This area contains information about the SQL statement and the…
I remember the day when someone asked me to create a user for an application developement. The user should be able to create views and materialized views and, so, I used the following syntax: (CODE) This way, I guessed, I would ensure that use…
This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question