Solved

SQL Server log file full

Posted on 2009-05-17
16
1,158 Views
Last Modified: 2012-05-07
Hello,
I have a message that says  Database zbc log file is full. what should i do now.  help needed asap
0
Comment
Question by:aatishpatel
  • 8
  • 4
  • 3
  • +1
16 Comments
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
0
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
you can do a back or truncate your log...you'll probably need to truncate though, it sounds.  

first, do this

backup log yourdatabasename with truncate_only

now do this

dbcc shrinkfile('yourdatabasename_log', 0)

now, set your database recovery mode to simple so that you don't need to worry about this anymore...you're obviously not needing to recover to a point in time.
HTH,
Tim
0
 

Author Comment

by:aatishpatel
Comment Utility
but for safety purpose how do i backup the .lfd files. and if i shrink it the data will be loat right?
0
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
if you truncate the log w/o backing it up, it will be lost (inactive transctions).  You can modify your maintenance plan to include log backups, or just simply set your recovery model to simple...which is probably the best option for you.
0
 

Author Comment

by:aatishpatel
Comment Utility
that's the error message that the log is full please help


Step ID            13
Server            IHS-MAIN-DB-13
Job Name            P58 - Daily Maintenance
Step Name            poststep: ng_reconfigure to reset computer
Duration            00:00:00
Sql Severity            17
Sql Message ID            9002
Operator Emailed            
Operator Net sent            
Operator Paged            
Retries Attempted            0

Message
Executed as user: IHS\SqlAdmin. The transaction log for database 'P58' is full. To find out why space in the log cannot be reused, see the log_reuse_wait_desc column in sys.databases [SQLSTATE 42000] (Error 9002)Unable to open Step output file.  The step failed.


so now what exactly should i do.
0
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
I've already told you how to fix the problem.
0
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
You've already made several posts for the same problem...are you just not understanding what we're telling you to do?  

http://www.experts-exchange.com/Storage/Hard_Drives/Q_24414858.html#a24408796
0
 

Author Comment

by:aatishpatel
Comment Utility
sorry friend but i am a newbe and sometimes having a hard time to understand. But i am following to what you said. thanx anyways
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
sure...just follow the statements I showed above and you'll be all good.
0
 
LVL 31

Expert Comment

by:RiteshShah
Comment Utility
0
 
LVL 60

Expert Comment

by:chapmandew
Comment Utility
the article is wrong...no reason to shrink the file before you do a truncate on the backup.
0
 
LVL 31

Expert Comment

by:RiteshShah
Comment Utility
hi chapman,

Why one can't shrink the file when it gets full?
0
 
LVL 75

Expert Comment

by:Anthony Perkins
Comment Utility
>>Why one can't shrink the file when it gets full?<<
Because it will not shrink.  How is that for a reason?

In order for you to be able to shrink the transaction log you must first remove the active transactions.  This is done by using BACKUP LOG...
0
 
LVL 60

Accepted Solution

by:
chapmandew earned 500 total points
Comment Utility
Ritesh,
acperkins is right...there is nothing to shrink because the file is still full with inactive transactions.  If you could just shrink it, then you wouldn't need to perform a log truncation.  Read the first article I posted, I cover it.
0
 
LVL 31

Expert Comment

by:RiteshShah
Comment Utility
thanks.
0
 

Author Closing Comment

by:aatishpatel
Comment Utility
thanx
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Let's review the features of new SQL Server 2012 (Denali CTP3). It listed as below: PERCENT_RANK(): PERCENT_RANK() function will returns the percentage value of rank of the values among its group. PERCENT_RANK() function value always in be…
The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now