ASA Database Administration Guide
The Database Server
The database server
Database options
Truncate the transaction log when a checkpoint is done.
{ dbsrv9 | dbeng9 } [
server-options ]
database-file -m ...
All operating systems and servers.
Truncate (delete) the transaction log when a checkpoint is done, either at shutdown or as a result of a checkpoint scheduled by the server. This provides a way to automatically limit the growth of the transaction log. Checkpoint frequency is still controlled by the CHECKPOINT_TIME and RECOVERY_TIME options (which you can also define on the command line).
The -m
option is useful where high volume transactions requiring fast response times are being processed, and the contents of the transaction log are not being relied upon for recovery or replication. When this option is selected, there is no protection against media failure on the device that contains the database files.
To avoid database file fragmentation, it is recommended that where this option is used, the transaction log be placed on a separate device or partition from the database itself.
This option is the same as the -m
server option, but applies only to the current database or the database identified by the database-file variable.
Replicated databasesDo not use the-m option with databases that are being replicated. Replication inherently relies on transaction log information. |
The following example starts a database server named silver and loads the sample database. When a checkpoint is done, the transaction log is truncated.
dbsrv9 -n silver "c:\Program Files\Sybase\SQL Anywhere 9\asademo.db" -m