Solved

Exchange 2010 Transaction Logs

Posted on 2011-02-18
2
804 Views
Last Modified: 2012-06-27
http://msdn.microsoft.com/en-us/library/aa579166(v=exchg.140).aspx
I am trying to understand Exchange 2010 transaction logs as explained On the link above.
I can't understand some terminology such as:
write-ahead transaction logs
checkpoint files
the in-memory database  Versus the on-disk database
write-ahead logging.
page-based writes and checkpoints.

I also want to confirm whether it s true that neither the incremental nor the differential back up of exchange clears up the log files and checkpoint files except for the Full back.

Thanks
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Accepted Solution

by:
mass2612 earned 500 total points
ID: 34924664
Hi,

Ok the transaction log can be complicated however some consider it more important than the database file so its good to have a good understanding of it. Write ahead transaction logs and write ahead logging are pretty much the same thing.

One of the first things to remember with databases including Exchange is that data is not modified on the disk. The data is written to memory and modified and then the modified data needs to be committed (written back to the disk). Many databases including Exchange write the modified data to a transaction log first for resiliency and recoverability. Therefore when Exchange updates data and the data needs to then be written back to the database the entry is first written to the transaction log before then being written finally to the database. When you look inside a transaction log you see a list of entries such as begin transaction, insert, update, delete, end transaction.

The checkpoint file keeps track of the relation between the log files and the database.

In memory database or the DB cache is basically pages from the database that are currently being stored in memory. If the data in the in memory page is different to the data in the database on the disk then the page is considered dirty. This just means that the data has been changed and is different than what's on the disk. If the page in memory has not been changed then the page is clean. When an application needs to modify data in a database it must read the data into memory and then change the data in memory. Finally that changed data must be written to disk. The on disk database is the data in the EDB files on the disk.

A page is the smallest unit of data in Exchange and in Exchange 2010 its 32kb.

A full and an incremental backup purges the transaction logs however a differential backup does not purge the transaction logs.

Incremental backups
http://msdn.microsoft.com/en-us/library/dd877022%28v=exchg.140%29.aspx

Differential backups
http://msdn.microsoft.com/en-us/library/aa579399%28v=exchg.140%29.aspx


0
 

Author Closing Comment

by:jskfan
ID: 34950149
Thanks for your explanation
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
If you troubleshoot Outlook for clients, you may want to know a bit more about the OST file before doing your next job. IMAP can cause a lot of drama if removed in the accounts without backing up.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question