473,770 Members | 1,778 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

database suspect

I have two questions:
(1) How can we diagnose the reason of database suspect? The error log
doesn't tell me much.
(2) After restart the server, the suspect is gone, but how can I
ensure everthing is fine? DBCC check?
Thanks!
Saiyou
Jul 20 '05 #1
2 14501
1. Most common causes for suspect status are missing devices, invalid
datafiles/drives, insufficient disk space, interruption during restore etc.
Sorry, I do not have a to-the-point answer, if you cannot find any
information in the error log.
2. http://support.microsoft.com/default...b;en-us;255599

--
- Anith
( Please reply to newsgroups only )
Jul 20 '05 #2
To add to Anith's response, there should be some indication in the error
log. If there is no self-explanatory message text but a Win32 error
code is listed, you can get the message text from the command prompt
using NET HELPMSG. For example:

NET HELPMSG 32

Yeilds:

The process cannot access the file because it is being used by
another process.

A common cause this transient suspect database problems is anti-virus or
backup software that is using a database file when SQL Server tries to
open it.

--
Hope this helps.

Dan Guzman
SQL Server MVP

-----------------------
SQL FAQ links (courtesy Neil Pike):

http://www.ntfaq.com/Articles/Index....partmentID=800
http://www.sqlserverfaq.com
http://www.mssqlserver.com/faq
-----------------------

"Saiyou Anh" <wa***@alexian. net> wrote in message
news:a5******** *************** **@posting.goog le.com...
I have two questions:
(1) How can we diagnose the reason of database suspect? The error log
doesn't tell me much.
(2) After restart the server, the suspect is gone, but how can I
ensure everthing is fine? DBCC check?
Thanks!
Saiyou

Jul 20 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
6475
by: Hallgeir | last post by:
My msdb database is marked as suspect. This means that my maintenance plan doesn't work. I'm a novice when it comes to sql server so now I'm wondering if anyone could give a hint on how to fix the suspect msdb database? Does this database contain any vital information? What could be the reason that this database become suspect? Appreciate any suggestions in this matter. Thanks! --
4
1986
by: Riley DeWiley | last post by:
I am using Jet 4.0 through OLEDB and C++. My travails with compaction are well known to regular readers of this NG. Many of my problems were solved by disabling record locking. I am now confronted with two remaining mysteries, which I suspect are related: ------------------------------------------------------------- The Mystery of the Zombie Session (a horror story)
1
2533
by: William Oliveri | last post by:
Hi all, I'm writing some code for disaster recovery. I need to have an application which accesses Sql Server to determine if the local database is up or not and then if not go to the secondary server. So like this: 1. Determine if Sql Server A is up, if so is the database active. 2. If no on either count, go to Sql Server B/database.
3
4166
by: jason | last post by:
I've been playing around with new (for 2.0) membershp functionality. I was able to build a simple login form that secures a directory on a project I built locally on my development desktop. However, when I attempt to follow the same steps on the remote test server (a website I access via filesystem security accross my lan ).. I get the following when I attempt to select the security tab from the administer selection of the login...
0
3451
by: Fausto Guerini | last post by:
On my Microsoft sql server 2000 i have a database named Lp marked suspect, the last backup il long time ago so i'm trying to recover the current database. The start up log of sql is: An error occurred while processing the log for database 'Lp' I've also tried dbcc CHECKDB ('lp') and got the answer: Server: Msg 945, Level 14, State 2, Line 1 Database 'Lp' cannot be opened due to inaccessible files or insufficient memory or disk space. ...
5
2337
by: war_wheelan | last post by:
I created the db with the attached script and I am able to access it until I reboot the server. I've tried enabling flag 1807 via the SQL server service and the startup parameters of the instance. In all cases the database always come up suspect after a reboot. There was one instance where I was able to recover, but I am not sure how that happened. Does anyone have an idea of how I can reboot the server without the database becomming...
0
2410
by: drawing in aspnet | last post by:
Question about putting the data layer in a separate class library. I keep reading that the data layer should be separated from the presentation layer and put in its own class library. I am trying to do this but running into a problem. I'm hoping someone can point me in the right direction. I first create a class library (all code in C#) and within this class library create a very simple Sql Server Express database (.mdb) file. It's...
3
4719
by: Jaros³aw Kozik | last post by:
my database status is suspect - what can I do to rebuilt it ( using enterprise manager or something else ) ? regards IJKK
3
14703
by: rdraider | last post by:
Everything I read about sp_resetstatus says you must restart SQL after. Is there a way around that (don't want to shut down production). The suspect db is just an empty db that is not needed. I need to create another db with the same name. Thanks.
0
9454
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10257
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
10037
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9904
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7456
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5354
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5482
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3609
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2849
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.