- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Bulletin 78 - EXCHANGE SOFT AND HARD RECOVERY.doc
This Bulletin goes into more details about rules for hard and soft recovery and how they work. Seeing that we depend on soft and hard recovery in many disaster recovery situations, it is good to get more familiar with the subject.
?
EXCHANGE SOFT AND HARD RECOVERY
?
This is broken down as follows:
?
1. Introduction
2. Soft recovery
??? - Some of the fundamental rules of transaction log file replay
??? - Advanced Soft Recovery Scenarios
3. Hard Recovery
4. Additional reading
?
Here it is:
?
1. Introduction
?
As used in Microsoft Exchange Server 2003, the word recovery must be distinguished from the word restore. Restore is the act of putting database and log files back into place on a server, and recovery is the act of replaying transaction logs into the restored database.
There are two forms of recovery:
??? -?Soft recovery?- A transaction log replay process that occurs when a database is re-mounted after an unexpected stop, or when transaction logs are replayed into an offline file copy backup of a database.
??? -?Hard recovery?- A transaction log replay process that occurs after restoring a database from an online backup.
2. Soft recovery
?
In the default soft recovery scenario, an external event unexpectedly stops an Exchange database, but the database and log files remain intact and in place. When the database is mounted again, Exchange reads the checkpoint file and begins to replay the transaction log that is listed as the checkpoint log. If no checkpoint file exists, replay begins with the oldest log file available in the transaction log folder for the storage group.
Exchange writes to the database files completed transactions found in the log file that have not already been written and reverses any incomplete transactions. Exchange never begins writing a transaction into the database files until all the operations composing it have been secured to the log files. You do not need to physically undo or back out a transaction in the database if all uncommitte
您可能关注的文档
- Articulate_Video_Encoder_'09_功能简介.doc
- artificial cervical disc arthroplasty.pdf
- as3教程_flash_ActionScrip_3.pdf
- ASH Determination - A Useful Standard or a Flash in the Pan.doc
- ASHRAE Laboratory Design Guide review.pdf
- ASHRAE-DC waterside economizer.pdf
- Asia begins to set global beauty trends.pdf
- Asia-Connect-Comparative Employment Risks in the BRIC Countries-Part2.pdf
- ASIC逻辑综合及Synopsys DC.pdf
- ASME B16.21-Nonmetallic Flat gaskets for pipe flanges-2016.pdf
- 北师大版小学数学三年级上册《寄书》教学设计.docx
- 统编版(部编版)语文二年级上册《雪孩子》教学设计.docx
- 统编版(部编版)语文二年级上册《八角楼上》教学设计.docx
- 北师大版小学数学三年级上册《长方形周长》教学设计.docx
- 北师大版小学数学三年级上册《丰收了》教学设计.docx
- 统编版(部编版)语文二年级上册《夜宿山寺》教学设计.docx
- 统编版(部编版)语文二年级上册《风娃娃》教学设计.docx
- 统编版(部编版)语文二年级上册《朱德的扁担》教学设计.docx
- 统编版(部编版)语文二年级上册《难忘的泼水节》教学设计.docx
- 统编版(部编版)语文二年级上册《纸船和风筝》教学设计.docx
文档评论(0)