|
by: ETL |
last post by:
Hi,
I think this question has an easy answer but I can't seem to find
anything online that lists best practices for my problem.
I have a C# app that uses an exception handling tree similar to the
following.
Try
{
blah blah blah....
|
by: Patrick |
last post by:
I have the following code, which regardless which works fine and logs to the
EventViewer regardless of whether
<processModel/> section of machine.config is set to username="SYSTEM" or
"machine"
---Start of test.aspx----
<%@ Page language="C#" AutoEventWireup="false" %>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<HTML>
<HEAD>
|
by: André |
last post by:
Hi, I’m using win server 2003 and IIS 6.0, C# 1.1
When I check in my Event View under system, I see this Information Log:
A worker process with process id of 'xxx' serving application pool ‘xxx’ has
requested a recycle because the worker process reached its allowed processing
time limit.
Source: W3SVC
Event: 1074
|
by: Tom Wingert |
last post by:
Hi,
I am having a problem with getting My.Log.WriteException to write to the
Event Log in ASP.Net 2.0 with a web service.
When an error occurs, My.Log.WriteException doesn't log anything to the
Event Log. Played around with it and ended up adding the following listeners
to catch and write to the event log by adding the following code in the
web.config:
<system.diagnostics>
|
by: Eniac |
last post by:
Hello,
I've started using Enterprise Library 2.0 recently and I've encountered
a problem that seems to be ... well... undocumented :)
Basically, when I set a Trace Listener (formatted event log to be
precise), if i specify the name of a custom event log, the listener
won't log in it.
I've checked in the registry, the log is there. In the event viewer, I
|
|
by: JeffDotNet |
last post by:
Writing to a registered source in the Application event log
I have an asp.net framework 2.0 app that I created on a winxp machine and
now I am deploying it to IIS6 on a win server2003 machine. This application
has to write to the application event log.
After deployment of the application I have verified that my source
“MySource” exists in the Application event log. I then wrote some text to
the event source in a forms app and...
|
by: =?Utf-8?B?YW5rMmdv?= |
last post by:
Hi,
Thanks in advance for reading this.
Not sure where to post this question, but I hope someone in here can help.
Trying to write to Event Log in VS 2005 (.NET 2.0) using Enterprise Library
2.0
on a XP Pro SP2 Machine
|
by: Andrew Robinson |
last post by:
In the past, I remember all kinds of security related issues when trying to
write to the event log but don't remember the specifics. Was there an issue
with creating a new source?
Can you write if you are using the ASP.NET account or Network Services
account? Did this change with .NET v2.0 and/or Win 2003 SP1?
thanks,
|
by: jaleel |
last post by:
Hi ,
i would like to reopen the issue in the post http://www.gamedev.net/community/forums/topic.asp?topic_id=418791.
My scenario is like this:
1. A web application is there (being created by some other company)
2. We develop the business layer and data access layer.
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing, and deploymentwithout human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupr who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|