473,395 Members | 1,442 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Message: data protection sqlpghck

Hello,
yesterday we have upgraded the DB2 v8.1 to FP-level 4. Now we got some
messages in the db2diag.log (see snippet at the end). On our
filesystem, where the log-files are located we have sufficent space
available (>50GB). We have already reduced the LOGFILSIZ Parameter,
this hadn't any affect.
Did anyone have any idea?
Thanks

Stefan

----------------------------------------------------------------
2003-12-11-07.36.03.944225 Instance:db2inst1 Node:000
PID:4078(db2agent (BTLDB)) TID:16384
Appid:*LOCAL.db2inst1.008BA1063603
data protection sqlpgint Probe:1870

Frequent database deactivation is detected with large log file size.
Consider reduce LOGFILSIZ configuration or use ACTIVATE DATABASE
command
to
start up database.

2003-12-11-07.41.39.673391 Instance:db2inst1 Node:000
PID:4283(db2loggr (BTLDB)) TID:16384 Appid:none
data protection sqlpghck Probe:1390

ExtNum 12262, state 401, baselsn 0000000BCDF90000 nextlsn
0000000BCE1C4166

2003-12-11-08.55.04.432700 Instance:db2inst1 Node:000
PID:8109(db2loggr (BTLDB)) TID:16384 Appid:none
data protection sqlpghck Probe:1390

ExtNum 12263, state 401, baselsn 0000000BCE378000 nextlsn
0000000BCE378205
--------------------------
Nov 12 '05 #1
1 4156
I would have tried ACTIVATE DATABASE avenue. (see also Deactivate db...)
Basically, db2 is telling you that it thinks it has to incur the startup
cost too often ...
allocating logs, bufferpools, other-memory, ressources, ...

Unless you Activate a DB, db2 will deallocate some resources if it detects
no user is connected to a db. It will need to reallocate those resources
when
another user connects, ...

PM

"Stefan S." <st**************@cimt-ag.de> a écrit dans le message de
news:de**************************@posting.google.c om...
Hello,
yesterday we have upgraded the DB2 v8.1 to FP-level 4. Now we got some
messages in the db2diag.log (see snippet at the end). On our
filesystem, where the log-files are located we have sufficent space
available (>50GB). We have already reduced the LOGFILSIZ Parameter,
this hadn't any affect.
Did anyone have any idea?
Thanks

Stefan

----------------------------------------------------------------
2003-12-11-07.36.03.944225 Instance:db2inst1 Node:000
PID:4078(db2agent (BTLDB)) TID:16384
Appid:*LOCAL.db2inst1.008BA1063603
data protection sqlpgint Probe:1870

Frequent database deactivation is detected with large log file size.
Consider reduce LOGFILSIZ configuration or use ACTIVATE DATABASE
command
to
start up database.

2003-12-11-07.41.39.673391 Instance:db2inst1 Node:000
PID:4283(db2loggr (BTLDB)) TID:16384 Appid:none
data protection sqlpghck Probe:1390

ExtNum 12262, state 401, baselsn 0000000BCDF90000 nextlsn
0000000BCE1C4166

2003-12-11-08.55.04.432700 Instance:db2inst1 Node:000
PID:8109(db2loggr (BTLDB)) TID:16384 Appid:none
data protection sqlpghck Probe:1390

ExtNum 12263, state 401, baselsn 0000000BCE378000 nextlsn
0000000BCE378205
--------------------------

Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
3
by: nathanvi | last post by:
Hi, i've a mdb access file and i launched Tools->Protection->SettingAutomaticProtection (sorry if translation isn't fine but the language in my PC is not english :-( ) two weeks ago .. In other...
12
by: Michael B Allen | last post by:
Is it legit to modify static data like the following code? #include <stdlib.h> #include <stdio.h> struct tbl { int i; char *s; };
9
by: John | last post by:
Hi, I would like to protect my software from copying. What are best tools for it (hardware protection is not an option), do you have some reccomendation for protection or third party software...
3
by: Tom the Canuck | last post by:
I am writing code for a friend of mine. We may want to sell it. The demo version will have a few data files in sub folders with a TXT extension. If the prospective buyers want to, they can add...
63
by: time.swift | last post by:
Coming from a C++ / C# background, the lack of emphasis on private data seems weird to me. I've often found wrapping private data useful to prevent bugs and enforce error checking.. It appears...
0
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized...
6
by: satheesh | last post by:
c language can protect the data in scopes private,protected and public(may be) in structure and union?
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.