Solved

Log shipping error

Posted on 2006-11-01
7
539 Views
Last Modified: 2008-02-01
Log shipping monitor is showing wrong information, though all the jobs are getting completed successfully. It shows otherwise, I know this info is coming from log_shipping_primaries and log_shipping_secondaries tables. These tables are updated with server names but backup fields (last_update,last_backup_file) are not updated.

Yes, SELECT and UPDATE privileges have been set up to public.

It is SQL 2000 SP4 both primary & Secondary(this itself is monitoring server) servers.

I see error, Error: 14420, Severity: 16, State: 1 in log file.

Thanks,
Prabhu
0
Comment
Question by:pboggavarapu
  • 3
  • 2
7 Comments
 
LVL 5

Expert Comment

by:Netstore
ID: 17857154
Theres an outside chance that Emanager is displaying the job status wrong. Try shutting it down and restarting it. Then check the View job history. Then we can see if these are definitely working and take it from there....
0
 

Author Comment

by:pboggavarapu
ID: 17860036

I did it already, same result. I remember there is fix to alter a proc or .dll. I don't remember exactly and I don't have that link with me anymore.

--Prabhu
0
 

Author Comment

by:pboggavarapu
ID: 17862913
I have fixed this problem.

I had to create log_shipping_monitor_probe account manually, give access to msdb and use it. When I selected SQL authentication y'day to use this account, it created an account in msdb but no login account was created. This looks absurd.

So, before setting up log shipping, we need to create this account manually and then set  up log shipping.

Thanks,
Prabhu
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 5

Expert Comment

by:Netstore
ID: 17865693
Fair enough mate !!
0
 

Author Comment

by:pboggavarapu
ID: 17868594
We can close this thread.
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18066321
PAQed with points refunded (250)

Computer101
EE Admin
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Entering a date in Microsoft Access can be tricky. A typo can cause month and day to be shuffled, entering the day only causes an error, as does entering, say, day 31 in June. This article shows how an inputmask supported by code can help the user a…
Creating and Managing Databases with phpMyAdmin in cPanel.
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now