?
Solved

Who is using the secondary Logs?

Posted on 2011-03-25
4
Medium Priority
?
356 Views
Last Modified: 2012-08-13
Hi Experts
I want to know which application is using and generating the secondary Logs?
Exist any way to know this?
Thanks.
0
Comment
Question by:saulpilot439
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:momi_sabag
ID: 35218135
secondary logs are just like regular logs,
they are used when the primary logs are out of space,
so every databaase actiivity might generate data in the secondary logs
0
 

Author Comment

by:saulpilot439
ID: 35218178
Thanks for Your answer MOMI.

Exist any way to know who generated the secondary logs?
Which transaction? which applid?
Thanks
0
 
LVL 37

Accepted Solution

by:
momi_sabag earned 1000 total points
ID: 35218399
you could try to parse them. That data is stored within the files but it won't be easy
you can search for online free tools that does it, but i'm not sure you will find those
0
 

Author Closing Comment

by:saulpilot439
ID: 35218437
Thanks Momi I was made a snapshot for the database and then I find the oldest transaction and check the log head whit this I can see the applid using the log.
thanks.
0

Featured Post

Give Your Engineering Team a Productivity Boost

Learn why container technology is so powerful and how it can provide your team with productivity gains and other benefits.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question