Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the AD database types and its flow?

Answer Posted / siddhartha rath

The Active Directory creates and stores four types of log
files on the maintenance and management of transactions.
These files are stored in %system/NTDS and include

•Transaction log files. The current transaction file is
Edb.log, which by default contains information about recent
transactions and is limited to 10MB. When this limit is
reached, transaction files are automatically created with
the name edbxxxxx.log (where x is a sequential number).
They are retained until the transactions are committed to
the Active Directory. Once every 12 hours, old previous
transaction files are purged during a process known as
garbage collection. If you do not want previous transaction
files created, it is possible to set circular logging, in
which the current file is overridden when it is filled.
This action is not recommended because it could limit your
ability to recover recent transactions.

•Checkpoint files. The checkpoint is Edb.chk, and it is
used to list transactions that have been committed to the
Active Directory and those that remain uncommitted. Each
time a transaction is committed, it advances to the next
entry. If all transactions are not committed at the time of
shutdown, the checkpoint file is read when the system is
rebooted, and all remaining transactions are then committed
to the Active Directory.

•Reserved log files. The reserved log file can be a number
sequence of logs, with a maximum size of 10MB, named
res1.log, res2.log, and so on. These logs are used in place
of the transaction log when the creation of a new log file
is attempted, but insufficient disk space is available.
When this occurs, the system will automatically shut down.

•Patch files. Patch files (with a .pat suffix) are used
during the backup-and-restore process of the Active
Directory. Database entries are sometimes divided during
backup into what is known as split transactions. The patch
files are used to record these splits, and "patch" the
transaction back together during restoration.

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do I find my path in windows?

845


How do I bypass scanning and repairing drive in windows 10?

756


Where are the contacts stored in windows live mail?

830


What is the concept of Reentrancy in windows operating system?

875


Explain what applications does not use vss?

742


What is the definition of windows operating system?

731


How can I fix windows defender is turned off?

775


How many items should be on a wedding registry?

774


How do I open programs and features in windows 10?

777


What are my options if I want to turn on security with a non-administrator account in a Windows® environment?

765


How do I know if I have windows defender?

748


Can I still use windows live mail?

786


Why you should not upgrade to windows 10?

753


How do I know if my windows is corrupted?

780


How do I remove windows 10 and install windows 7?

742