Query: db_checkpoint
OS: osf1
Section: 8
Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar
db_checkpoint(8) System Manager's Manual db_checkpoint(8)NAMEdb_checkpoint - Periodically checkpoint the security database log (Enhanced Security)SYNOPSIS/usr/tcb/bin/db_checkpoint [-1v] [-h home] [-k bytes] [-L file] [-p min]FLAGSCheckpoint the log once, and then exit. Specify a home directory for the database. The correct directory for enhanced security is /var/tcb/files. Checkpoint the database at least as often as every kbytes of log file written. Log the execution of the db_checkpoint utility to the specified file in the following format, where ### is the process ID, and the date is the time the utility starting running. db_checkpoint: ### Wed Jun 15 01:23:45 EDT 1995 This file is removed if the db_checkpoint utility exits gracefully. Checkpoint the database at least every min minutes. Write the time of each checkpoint to the standard output. At least one of the -1, -k and -p options must be specified.DESCRIPTIONA customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup- port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check- pointing to record changes. The db_checkpoint utility is a daemon process that monitors the database log and periodically checkpoints it. Since other database func- tions also cause checkpoint records to be written to the log, db_checkpoint is normally used as a one-time function to guarantee a check- point before archiving the database. The db_checkpoint utility utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption, it should always be given the chance to detach and exit gracefully. To cause db_checkpoint to clean up after itself and exit, send it an interrupt signal (SIGINT). The db_checkpoint utility does not attempt to create the Berkeley DB shared memory regions if they do not already exist. The application which creates the region should be started first, and then, once the region is created, the db_checkpoint utility should be started.RETURN VALUESThe db_checkpoint utility exits 0 on success, and >0 if an error occurs.ENVIRONMENT VARIABLESIf the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home directory for security is /var/tcb/files.FILES/var/tcb/files/auth.db /var/tcb/files/dblogs/*RELATED INFORMATIONCommands: db_archive(8), db_printlog(8), db_recover(8), db_stat(8), secconfig(8) delim off db_checkpoint(8)
Related Man Pages |
---|
db_checkpoint(1) - mojave |
db_dump(8) - osf1 |
db_dump185(8) - osf1 |
db_printlog(1) - osx |
db5.1_checkpoint(1) - debian |
Similar Topics in the Unix Linux Community |
---|
UNIX error log |
SCO Unix - Disk Space |
how to distinguish standard system mode or trust system mode |
database takes long time to process |
Bash script to check the files based up on UST time. |