Search Results

Search found 11904 results on 477 pages for 'non umemoto'.

Page 148/477 | < Previous Page | 144 145 146 147 148 149 150 151 152 153 154 155  | Next Page >

  • How can I force a merge of all WAL files in pg_xlog back into my base "data" directory?

    - by Zac B
    Question: Is there a way to tell Postgres (9.2) to "merge all WAL files in pg_xlog back into the non-WAL data files, and then delete all WAL files successfully merged?" I would like to be able to "force" this operation; i.e. checkpoint_segments or archiving settings should be ignored. The filesystem WAL buffer (pg_xlog) directory should be emptied, or nearly emptied. It's fine if some or all of the space consumed by the pg_xlog directory is then consumed by the data directory; our DBA has asked for WAL database backups without any backlogged WALs, but space consumption is not a concern. Having near-zero WAL activity during this operation is a fine constraint. I can ensure that the database server is either shut down or not connectible (zero user-generated transaction load) during this process. Essentially, I'd like Postgres to ignore archiving/checkpoint retention policies temporarily, and flush all WAL activity to the core database files, leaving pg_xlog in the same state as if the database were recently created--with very few WAL files. What I've Tried: I know that the pg_basebackup utility performs something like this (it generates an almost-all-WALs-merged copy of a Postgres instance's data directory), but we aren't ready to use it on all our systems yet, as we are still testing replication settings; I'm hoping for a more short-term solution. I've tried issuing CHECKPOINT commands, but they just recycle one WAL file and replace it with another (that is, if they do anything at all; if I issue them during database idle time, they do nothing). pg_switch_xlog() similarly just forces a switch to the next log segment; it doesn't flush all queued/buffered segments. I've also played with the pg_resetxlog utility. That utility sort of does what I want, but all of its usage docs seem to indicate that it destroys (rather than flushing out of the transaction log and into the main data files) some or all of the WAL data. Is that impression accurate? If not, can I use pg_resetxlog during a zero-WAL-activity period to force a flush of all queued WAL data to non-WAL data? If the answer to that is negative, how can I achieve this goal? Thanks!

    Read the article

  • Can I set a default domain for a Windows Authenticated website in IIS7?

    - by Michael Haren
    I have an intranet site using Windows Authentication. When users are prompted for credentials, they enter: User: domain\username Pass: SomePassword It'd be nice if they could leave off the domain\ part which would be filled in with a default domain. I'm willing to give up the ability to login with a server/machine account (non-domain) because we don't use that anyway. This seems to be possible with BasicAuth but I can't seem to find a reference for how to do it with WindowsAuth.

    Read the article

  • Excel 2007: what happened to the Auto Expand Selection tool?

    - by Erik Olson
    Older versions of Excel had a icon that would expand the selection to include any non-empty cells in all directions. It was an X shape with four arrowheads. You can still write VBA code to do this, but I really miss this tool. Did they just drop it from Excel 2007? In older versions you had to go get it from the Customize menu because it wasn't on any toolbar by default.

    Read the article

  • How is a VM isolated from the physical host?

    - by dotnetdev
    Hi, I was thinking about virtualisation and how to explain it to a non-technical person and one of the things that I was wondering was how to explain the way that a VM is isolated and seperate from the phyiscal machine (so I can have a virus on a VM but this would never effect my physical host, right?). How does this technology work exactly? As I am a programmer, when I think of isolating processes, I think of using appdomains (I work with C# primarily). Thanks

    Read the article

  • Tomcat - additional classpath

    - by s5804
    We have set up Tomcat 6 with [TOMCAT_HOME]/lib - here is the standard tomcat release [TOMCAT_BASE]/lib - here we like to add non standard additional jar file However somehow I don't manage to get [TOMCAT_BASE]/lib jar files to be picked up by Tomcat. It appears that all my jar files out side tomcat are ignored. Before starting Tomcat I set the CLASSPATH=[TOMCAT_BASE]\lib -------- Edit JAVA_ENDORSED_DIRS can be used for adding an additional folder with jar files to be loaded by Tomcat

    Read the article

  • Finegrain Performance Reporting on svchost.exe

    - by Randolpho
    This is something that's always bothered me, so I'll ask the serverfault community. I love me some Process Explorer for keeping track of more than just the high-level tasks you get in the Task Manager. But I constantly want to know which of those dozen services hosted in a single process under svchost is making my processor spike. So... is there any non-intrusive way to find this information out?

    Read the article

  • HP DX5150, MS-7050 v. 1.3 Motherboard front panel pin connectors

    - by Daniel
    I recently purchased and installed a MS-7050 v. 1.3 motherboard into a regular non-HP case and thus the front panel connectors are different than the original OEM connectors which are all bundled together. The HP support website does not have this information available and someone from HP indicated in response to a support forum question that this information is not available. What is the motherboard pin schematic for the front panel i/o connectors (power, reset, hdd led, and power led)?

    Read the article

  • TOR hidden service - PHP or CGI - what is safely?

    - by Tai Chi Girl
    I want to setup TOR Onion hidden service with non-static pages. What should I use: Php or CGI? What is more safely? I don't want to reveal IP of machine - I live in China and I afraid goverment. I use linux, thttpd as webserver (thttpd, because someone told me, that Apache generate many IP informations in for example 404 sites).

    Read the article

  • Media file segmenter like tool for linux

    - by Raja
    Hello everyone I'm looking for a tool for linux which can segment a video file into multiple small .ts files. I know one for Mac OS X called media file segmenter which is a simple command line tool. I really appreciate if anyone can point me to an equivalent linux tool. I don't know if these types of non-programming questions are allowed on this site. my apologies for that.

    Read the article

  • Writing ~ 630 MBs of MP3 to a Regular Audio CD

    - by Maxim Z.
    I have around 630 MBs of an MP3 podcast that I want to burn to a CD so that a friend can listen to it while driving. I understand that MP3 is very different from the normal audio CD format, but would it be possible to fit this amount onto a typical 700mb CD in the correct (non-MP3) format? I don't really care if some quality is lost. Thanks in advance!

    Read the article

  • Why Can't SSMS Access The Documents Folder in Windows 7?

    - by AaronSieb
    I have a database backup located in my Windows 7 Documents folder (c:\Users\Aaron\Documents...), and I'm trying to restore it using SQL Server Management Studio. However, the program is unable to access anything within the Users\Aaron directory using its non-standard file selection dialog, even when run as an Administrator. I'm brand new to Windows 7... Is there some sort of security setting that I need to trigger to give programs access to these files?

    Read the article

  • Problem with ping/DNS

    - by bublegumm
    When I am pinging non-existing host like 'zzz' or 'qwerty' I am getting the following result Pinging zzz.kanisa.com [209.62.20.200] with 32 bytes of data: Reply from 209.62.20.200: bytes=32 time=60ms TTL=46 Reply from 209.62.20.200: bytes=32 time=66ms TTL=46 It looks like a virus to me. But I was unable to find a solution on web. Any ideas how to fix it?

    Read the article

  • How does Kerberos work with SSH?

    - by Phil
    Suppose I have four computers, Laptop, Server1, Server2, Kerberos server: I log in using PuTTY or SSH from L to S1, giving my username / password From S1 I then SSH to S2. No password is needed as Kerberos authenticates me Describe all the important SSH and KRB5 protocol exchanges: "L sends username to S1", "K sends ... to S1" etc. (This question is intended to be community-edited; please improve it for the non-expert reader.)

    Read the article

  • where is the best place to store portable apps in Windows 7

    - by CoreyH
    I have a number of small portable apps and utilities. Where does Microsoft recommend we keep these? Lots of installed apps install themselves into \users{username}\appdata\local but it doesn't make much sense for me to put stuff there myself. \program files\ doesn't seem right either because non admin users don't have write access there. Is it recommended to create a \users{username}\applications directory?

    Read the article

  • Windows battery meter utility suggestions

    - by Ashwin
    Can you suggest a good battery meter utility for Windows? Battery status being graphically displayed in the taskbar is the (obvious) minimum requirement. Anything else the utility can inform or do is a plus. (If the battery meter taskbar icon is turned off by an admin it does not appear for non-admin users. That could be another reason to look for a battery meter utility apart from the one which comes with Windows.)

    Read the article

  • Used SQL Svr 2008 Config Manager to Set Service Account to Local System: What Did It Change?

    - by Frank Ramage
    Direct shot to foot moment... While setting-up individual non-admin accts for MSSQLSERVER services, I temporarily set Server service login to Local System account. I remembered later that: SQL Server Configuration Manager performs additional configuration such as setting permissions in the Windows Registry so that the new account can read the SQL Server settings. I want my Local System back . (Actually just restored to its original security profile) Any advice? Thanks!

    Read the article

  • Windows 7 Ultimate Restore From Another Machine

    - by Guy Thomas
    The situation I have an old machine running Windows Server 2008. I make a backup of selected directories. New Machine: I install Windows 7 Ultimate (and Windows Server 2008 [dual boot]) I cannot restore those files that I backed-up on the old machine. On the New machine neither the Windows 7 or Windows Server 2008 Restore (Recovery) can 'see' the backup files even though they are on the local machine. Is this behaviour (non-behaviour) 'by design' or am I missing something?

    Read the article

  • Stoping EXIM on ubuntu

    - by justintime
    I have EXIM running on a server taht I am trying to decommision (but I still have stuff I need to move off). $ sudo /etc/init.d/exim4 stop * Stopping MTA [ OK ] * ALERT: exim paniclog /var/log/exim4/paniclog has non-zero size, mail system possibly broken 2011-02-01 19:18:37 string too large in smtp_notquit_exit() How can I stop exim from running, and accepting mail on port 25.

    Read the article

  • Arp tries on various *nix based systems.

    - by salparadise
    Does anyone know what determines the amount of arp tries a router will make? I have different behaviors with two devices, if I try to traceroute to a non-existent host on a subnet that belongs to an interface on the router, a Linux box will try to arp 3 times and then return a host un-reacheable icmp message. Junos will continuosly try to arp and not return anything. Is there a sysctl value that determines this or anything at all.

    Read the article

< Previous Page | 144 145 146 147 148 149 150 151 152 153 154 155  | Next Page >