Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the AD database types and its flow?

Answer Posted / siddhartha rath

The Active Directory creates and stores four types of log
files on the maintenance and management of transactions.
These files are stored in %system/NTDS and include

•Transaction log files. The current transaction file is
Edb.log, which by default contains information about recent
transactions and is limited to 10MB. When this limit is
reached, transaction files are automatically created with
the name edbxxxxx.log (where x is a sequential number).
They are retained until the transactions are committed to
the Active Directory. Once every 12 hours, old previous
transaction files are purged during a process known as
garbage collection. If you do not want previous transaction
files created, it is possible to set circular logging, in
which the current file is overridden when it is filled.
This action is not recommended because it could limit your
ability to recover recent transactions.

•Checkpoint files. The checkpoint is Edb.chk, and it is
used to list transactions that have been committed to the
Active Directory and those that remain uncommitted. Each
time a transaction is committed, it advances to the next
entry. If all transactions are not committed at the time of
shutdown, the checkpoint file is read when the system is
rebooted, and all remaining transactions are then committed
to the Active Directory.

•Reserved log files. The reserved log file can be a number
sequence of logs, with a maximum size of 10MB, named
res1.log, res2.log, and so on. These logs are used in place
of the transaction log when the creation of a new log file
is attempted, but insufficient disk space is available.
When this occurs, the system will automatically shut down.

•Patch files. Patch files (with a .pat suffix) are used
during the backup-and-restore process of the Active
Directory. Database entries are sometimes divided during
backup into what is known as split transactions. The patch
files are used to record these splits, and "patch" the
transaction back together during restoration.

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What version of windows do I have 32 or 64 bit?

799


What will chkdsk fix?

799


How can I fix windows defender is turned off?

796


What operating system can I use instead of windows?

791


How do I register a dll in windows 10?

784


How do I get rid of system queued windows error reporting?

797


Does chkdsk require reboot?

722


What is a registry key?

814


How do you know if windows is corrupted?

813


What are types of windows operating system?

772


How do I merge two folders in windows 7?

831


Can I still upgrade my windows 7 to windows 10 for free?

789


Where are emails stored in windows live mail?

829


Is linux a windows 10?

836


What is pathping command?

945