Solved

sql server 2005 - kill log

Posted on 2014-03-31
1
524 Views
Last Modified: 2014-03-31
The transaction log for database 'tempdb' is full. To find out why space in the log cannot be reused, see the log_reuse_wait_desc column in sys.databases

How do I truncate the tempdb log?

Don't send me a link
0
Comment
Question by:JElster
1 Comment
 
LVL 25

Accepted Solution

by:
Mohammed Khawaja earned 500 total points
ID: 39968183
Failsafe way is to start SQL server in single user mode and then shrink the database log file:

1. Stop SQL Server service
2. Go to the folder containing sqlservr.exe and run sqlservr.exe -c -f
3. Run the following command:

ALTER DATABASE tempdb MODIFY FILE
   (NAME = 'tempdev', SIZE = target_size_in_MB)
   --Desired target size for the data file

   ALTER DATABASE tempdb MODIFY FILE
   (NAME = 'templog', SIZE = target_size_in_MB)
   --Desired target size for the log file

For more explaination, go to http://support.microsoft.com/kb/307487 for two other methods and a better explaination
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data architecture is an important aspect in Software as a Service (SaaS) delivery model. This article is a study on the database of a single-tenant application that could be extended to support multiple tenants. The application is web-based develope…
Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question