Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the AD database types and its flow?

Answer Posted / siddhartha rath

The Active Directory creates and stores four types of log
files on the maintenance and management of transactions.
These files are stored in %system/NTDS and include

•Transaction log files. The current transaction file is
Edb.log, which by default contains information about recent
transactions and is limited to 10MB. When this limit is
reached, transaction files are automatically created with
the name edbxxxxx.log (where x is a sequential number).
They are retained until the transactions are committed to
the Active Directory. Once every 12 hours, old previous
transaction files are purged during a process known as
garbage collection. If you do not want previous transaction
files created, it is possible to set circular logging, in
which the current file is overridden when it is filled.
This action is not recommended because it could limit your
ability to recover recent transactions.

•Checkpoint files. The checkpoint is Edb.chk, and it is
used to list transactions that have been committed to the
Active Directory and those that remain uncommitted. Each
time a transaction is committed, it advances to the next
entry. If all transactions are not committed at the time of
shutdown, the checkpoint file is read when the system is
rebooted, and all remaining transactions are then committed
to the Active Directory.

•Reserved log files. The reserved log file can be a number
sequence of logs, with a maximum size of 10MB, named
res1.log, res2.log, and so on. These logs are used in place
of the transaction log when the creation of a new log file
is attempted, but insufficient disk space is available.
When this occurs, the system will automatically shut down.

•Patch files. Patch files (with a .pat suffix) are used
during the backup-and-restore process of the Active
Directory. Database entries are sometimes divided during
backup into what is known as split transactions. The patch
files are used to record these splits, and "patch" the
transaction back together during restoration.

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the main advantage of using windows?

830


Do you get microsoft word with windows 10?

811


Can I update my computer to windows 10?

860


Is windows 10 the worst operating system ever?

751


Can I still upgrade to windows 10 for free 2019?

807


How do I create my own url protocol?

918


How many versions of windows have there been?

822


What version of windows do I have?

841


How many types of windows are there?

826


Can xp be upgraded to windows 7?

774


Can running chkdsk cause problems?

938


How do I lower my cpu usage windows 10?

857


Can I run exe files on windows tablet?

906


Is windows part of microsoft?

841


How do I change where windows 10 updates are downloaded?

765