Tip

Have You Wanted To Know Why Transaction Logging Is So Vital?

When transaction logging is enabled,the Domino R5 Server captures all the changes that users make to databases and writes them to a transaction log, rather than immediately writing them directly to the various databases. This allows Domino to defer write operations to databases during times of high server activity. When resources are available, or at periodic intervals, logged transactions are written to disk in a batch. Should a failure occur in the interim, the transaction log is used to recover the affected databases.

The great advantage of transaction logging is that it allows Domino to automatically recover data lost through system failures simply by replaying the deferred database changes from the transaction log. The principal benefits of this highly efficient data recovery capability are:

Simplified backup procedures. On a daily basis, most sites will need to back up only the transaction logs for that day.

Improved data integrity, because the recovery process detects any missing changes and replays them, while "undoing" any changes that were incomplete at the time of the failure. Thus, Domino can start with "clean" databases.

Much faster server restart times, which means enhanced system availability.

No more long Fixup sessions! With transaction logging, you will rarely need to run Fixup on a logged database, except in the very rare event that Domino detects errors following recovery.

Another benefit of transaction logging is a measurable increase in overall system performance. The logging process creates more total overhead. But Domino more than makes up for it, by writing to the log sequentially, rather than to the databases randomly. This means faster writes!

Transaction logging will:

Save you considerable time, trouble and tape over the long run.

Enable you to deliver a higher level of service.

Save your organization substantial amounts of money through increased up-time, reduced backup costs and better server performance.

Potentially prevent the catastrophic costs associated with losing mission-critical data.

So all you admins out there, look into getting this implemented on your systems and watch the improvements!

This was first published in January 2001

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.