Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Who is using the secondary Logs?

Posted on 2011-03-25
4
352 Views
Last Modified: 2012-08-13
Hi Experts
I want to know which application is using and generating the secondary Logs?
Exist any way to know this?
Thanks.
0
Comment
Question by:saulpilot439
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:momi_sabag
ID: 35218135
secondary logs are just like regular logs,
they are used when the primary logs are out of space,
so every databaase actiivity might generate data in the secondary logs
0
 

Author Comment

by:saulpilot439
ID: 35218178
Thanks for Your answer MOMI.

Exist any way to know who generated the secondary logs?
Which transaction? which applid?
Thanks
0
 
LVL 37

Accepted Solution

by:
momi_sabag earned 250 total points
ID: 35218399
you could try to parse them. That data is stored within the files but it won't be easy
you can search for online free tools that does it, but i'm not sure you will find those
0
 

Author Closing Comment

by:saulpilot439
ID: 35218437
Thanks Momi I was made a snapshot for the database and then I find the oldest transaction and check the log head whit this I can see the applid using the log.
thanks.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question