Skip to Content
Berkeley DB
book

Berkeley DB

by Sleepycat™ Software, Inc.
June 2001
Intermediate to advanced content levelIntermediate to advanced
688 pages
19h 18m
English
Sams
Content preview from Berkeley DB

Performing Checkpoints

The second component of the infrastructure is performing checkpoints of the log files. As transactions commit, change records are written into the log files, but the actual changes to the database are not necessarily written to disk. When a checkpoint is performed, the changes to the database that are part of committed transactions are written into the backing database file.

Performing checkpoints is necessary for two reasons. First, you can remove the Berkeley DB log files from your system only after a checkpoint. Second, the frequency of your checkpoints is inversely proportional to the amount of time it takes to run database recovery after a system or application failure.

Once the database pages are written, log files ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Berkeley DB Book

The Berkeley DB Book

Himanshu Yadava
Linux Recipes for Oracle DBAs

Linux Recipes for Oracle DBAs

Darl Kuhn, Charles Kim, Bernard Lopuz
Fedora Linux

Fedora Linux

Chris Tyler

Publisher Resources

ISBN: 0735710643Purchase book