Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the AD database types and its flow?

Answer Posted / siddhartha rath

The Active Directory creates and stores four types of log
files on the maintenance and management of transactions.
These files are stored in %system/NTDS and include

•Transaction log files. The current transaction file is
Edb.log, which by default contains information about recent
transactions and is limited to 10MB. When this limit is
reached, transaction files are automatically created with
the name edbxxxxx.log (where x is a sequential number).
They are retained until the transactions are committed to
the Active Directory. Once every 12 hours, old previous
transaction files are purged during a process known as
garbage collection. If you do not want previous transaction
files created, it is possible to set circular logging, in
which the current file is overridden when it is filled.
This action is not recommended because it could limit your
ability to recover recent transactions.

•Checkpoint files. The checkpoint is Edb.chk, and it is
used to list transactions that have been committed to the
Active Directory and those that remain uncommitted. Each
time a transaction is committed, it advances to the next
entry. If all transactions are not committed at the time of
shutdown, the checkpoint file is read when the system is
rebooted, and all remaining transactions are then committed
to the Active Directory.

•Reserved log files. The reserved log file can be a number
sequence of logs, with a maximum size of 10MB, named
res1.log, res2.log, and so on. These logs are used in place
of the transaction log when the creation of a new log file
is attempted, but insufficient disk space is available.
When this occurs, the system will automatically shut down.

•Patch files. Patch files (with a .pat suffix) are used
during the backup-and-restore process of the Active
Directory. Database entries are sometimes divided during
backup into what is known as split transactions. The patch
files are used to record these splits, and "patch" the
transaction back together during restoration.

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What does winword exe mean?

809


How do I get windows 10 on my computer?

784


What does windows 7 system restore do?

861


How do I navigate in windows explorer using keyboard?

842


How do I find my windows operating system version?

827


Is windows 10 free to upgrade?

848


Is the windows 10 iso free?

832


How do you update windows 7?

821


What is the relation between x-application and x-server (x-window)

938


What services can I stop in windows 10?

899


What happens when windows 7 ends?

898


Does chkdsk mark bad sectors?

874


What are examples of accessories?

774


What are the windows operating systems in order?

932


What is windows10upgrade folder?

894