The standby system does not write the log until it hears from the primary that that the same log is on disk there.
而备用服务器直到从主服务器收到消息,得知它磁盘上具有相同的日志,才写入该日志。
The size of each log file extent is specified on queue manager creation and cannot be changed subsequently so it is important to get this right when first defining the queue manager.
每个日志文件扩展的大小在队列管理器创建时指定,以后不能更改,因此务必在首次定义队列管理器时就正确设置此参数。
If it is necessary to determine a complete timeline of events server-wide, the logs can be merged based on the timestamps associated with each entry in each log.
如果有必要确定服务器范围内事件的完整时间线,则可以根据每个日志中与各项关联的时间戳将日志合并在一起。
It is easier to fall off the log than to stay on it.
从圆木上掉下来比站在上面要容易得多。
For OLTP applications, it is very important to place the log files on a separate physical device where their high activity will not negatively impact other work on the same hard disk drive.
对于OLTP应用程序,将日志文件放置在单独的物理设备上是极其重要的,因为这样它们的频繁活动就不会给在同一硬盘驱动器上的其他工作带来不良影响。
It is also recommended that you locate the queue manager log on its own disk.
另外,建议您把队列管理器日志定位于它自己的磁盘上。
Log Buffer - Memory used to store all changes to database before it is flushed to the logs on disk.
日志缓冲区——在将所有对数据库的更改刷新到磁盘上的日志之前,用来存储这些更改的内存。
Now it is very convenient to log on the Intemet.
现在上网很方便了。
A typical audit log file on my system is shown in Listing 1; it shows the trail record, as well.
关于系统上典型的审计日志文件,参见清单1;它还显示了记录的追踪部分。
Once the container is started, it will run getty on tty8, allowing users to log in to the container.
一旦容器被启动,它将在tty8上运行getty,以允许用户登录到容器中。
In this mode, a commit succeeds when the log data is on disk at the primary and it has been received by the standby server.
该模式下,当日志数据存在于主服务器的磁盘上,且备用服务器已经收到了日志数据时,提交(commit)就成功了。
Information on how to contact the coordinator is in the state saved on its recovery log; with web services it will be an end point reference (EPR — defined in WS-Addressing).
有关联系协调器方法的信息保存在恢复日志中;使用Web服务,会有一个结束点参考(epr——在WS - Addressing中定义)。
The audit log file (db2audit.log) can grow very quickly. It is a good idea to prune it on a regular basis.
审计日志文件(db2audit . log)可能增长很快,所以定期对该文件进行修剪是一种好做法。
You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user's To-Do list.
您可以使用另一个未经授权处理任务的用户身份登录,以确保不管是否应该在To -do列表中显示任务,非授权访问都可以正常运行。
Similarly, on server systems running the Apache Web server, it is useful to monitor both the standard Apache log files: /var/log/apache2/access.log and /var/log/apache2/error.log.
同样,在运行ApacheWeb服务器的服务器系统上,需要同时监视标准 Apache日志文件:/var/log/apache2/access.log和 /var/log/apache2/error.log。
Once you've started heartbeat, take a peek at your log file (default is /var/log/ha-log) on the primary and make sure that it is doing the IP takeover and then starting LoadLeveler.
启动了 heartbeat 后,去看一下主节点上的日志文件(默认是 /var/log/ha-log),并确保它正在接管IP 并 启动了LoadLeveler。
It is therefore necessary to wait for some time after the restart before doing any processing on the log files.
因些在重启之后,对日志文件做任何处理之前等待一些时间是必须的。
If the dual-induction log is combined with a shallow laterolog or microresistivity log, it is possible to correct for the effect on invasion on the deep log, assuming a step profile.
把双感应测井和浅电阻率测井或者微电阻率测井组合,假定为台阶状电性剖面条件下,可以校正侵入对深感应的影响。
Before using the Remote database, it is necessary to create a database Link, and to make local users log on the Remote database to use its data.
在使用远程数据库之前,必须为该远程数据库创建一个数据库链接,使本地用户通过这个数据库链接登录到远程数据库上以使用它的数据。
The only times when I log on is when I'm not intending to do any work. Otherwise it gets very distracting.
只有在我不打算工作时我才登录到聊天工具上,否则的话会让人分心。
It is completely transparent to the database client. Its purpose is to log all actions that the database client executes on the database.
它对于数据库客户端是完全透明的,其目的是记录数据库客户端在数据库上执行的所有操作信息。
On the other hand, if your job is to trace the file and if it is present then log the data, in this scenario, raising an exception is a bad coding practice.
另一方面,如果你的任务是跟踪文件,如果存在,然后登录的数据,在这种情况下,引发一个异常是不好的编码习惯。
The running management system of mobile official portal is an import security system. Log management takes on import function in the whole portal, it logs visiting behaviors.
移动办公门户运行管理系统是一个安全性因素很重要的系统,日志管理在整个系统中担任着重要功能,用于记录访问行为。
A smart card based on remote access password authentication scheme is given, which can verify a log-in password without verification table. It utilizes the signature property of public key systems.
给出了一个基于智能卡的远程访问口令认证方案,它能够对登录口令进行检验而不需要检索口令表。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
The problem is, the more servers and applications you have, the more log files and event systems there are and the harder it becomes to keep your finger on the "pulse."
但问题是,您拥有的伺服器和应用程序越多,存在的日志档和事件系统就越多,了解其最新情况也就变得越发困难。
The problem is, the more servers and applications you have, the more log files and event systems there are and the harder it becomes to keep your finger on the "pulse."
但问题是,您拥有的伺服器和应用程序越多,存在的日志档和事件系统就越多,了解其最新情况也就变得越发困难。
应用推荐