Solved

Who is using the secondary Logs?

Posted on 2011-03-25
4
349 Views
Last Modified: 2012-08-13
Hi Experts
I want to know which application is using and generating the secondary Logs?
Exist any way to know this?
Thanks.
0
Comment
Question by:saulpilot439
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:momi_sabag
ID: 35218135
secondary logs are just like regular logs,
they are used when the primary logs are out of space,
so every databaase actiivity might generate data in the secondary logs
0
 

Author Comment

by:saulpilot439
ID: 35218178
Thanks for Your answer MOMI.

Exist any way to know who generated the secondary logs?
Which transaction? which applid?
Thanks
0
 
LVL 37

Accepted Solution

by:
momi_sabag earned 250 total points
ID: 35218399
you could try to parse them. That data is stored within the files but it won't be easy
you can search for online free tools that does it, but i'm not sure you will find those
0
 

Author Closing Comment

by:saulpilot439
ID: 35218437
Thanks Momi I was made a snapshot for the database and then I find the oldest transaction and check the log head whit this I can see the applid using the log.
thanks.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

November 2009 Recently, a question came up in the DB2 forum regarding the date format in DB2 UDB for AS/400.  Apparently in UDB LUW (Linux/Unix/Windows), the date format is a system-wide setting, and is not controlled at the session level.  I'm n…
Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now