An Uncommon Error and Solution for SQL Server Full Backup

An Uncommon Error and Solution for SQL Server Full Backup

1. Error details

Once when manually performing a full database backup, I encountered the following error:

This error message appears when executing multiple times.

A checkpoint cannot be generated because of insufficient system resources (such as disk or memory space) or sometimes because of database corruption.

We check the database resources to rule out insufficient disk resources.

2. Checkpoint related knowledge

The relationship between transaction logs, data files, and checkpoints.

In SQL Server, when inserting, updating, or deleting, the data is not directly written into the mdf file corresponding to the database, but is written into the cache. At this time, we need to mention a very important mechanism: CheckPoint, which is mainly used to write the data in the cache into the mdf file.

This can be illustrated by the following classic diagram:

3. Events that trigger CheckPoint

1. Before a database is backed up, the database engine automatically performs a checkpoint so that all changes to the database pages are included in the backup.

2. The active portion of the log exceeds the size that the server can recover within the time specified in the recovery interval server configuration option.

3. The log is 70% full and the database is in log truncation mode.

4. Stopping the server also issues a checkpoint command in each database on the server.

4. Manually perform checkpoints

Therefore, this error is most likely caused by a checkpoint problem during backup, so we manually perform a checkpoint.

Normally, we rarely need to execute the checkpoint command manually. The syntax of checkpoint is: CHECKPOINT[checkpoint_duration], where checkpoint_duration is the number of seconds required to complete the checkpoint. Normally, we do not specify the checkpoint_duration value, but use the checkpoint duration automatically adjusted by the database to reduce the performance impact on the database. When the database executes a checkpoint, the number of dirty pages, active transactions that modify data, and the specified actual duration checkpoint_duration will affect the allocation of resources. Suppose the checkpoint_duration value is 50s, and it normally takes 150s to complete this operation. In order to meet the specified checkpoint_duration of 50s, the database will allocate more resources to the instruction than normal, which will affect the resource utilization of other operations under normal circumstances. 5. Effect verification

Run the checkpoint.

whee

Summarize

The above is an uncommon error and solution encountered in SQL Server full backup introduced by the editor. I hope it will be helpful to everyone. If you have any questions, please leave me a message and the editor will reply to you in time!

You may also be interested in:
  • sql server 2008 compressed backup database (20g)
  • Three strategies and statements for SQL SERVER database backup
  • SQL Server database backup details and precautions
  • Back up and restore SqlServer data from a higher version to a lower version
  • The database backup in the sql server 2012 backup set is different from the existing xxx database
  • SQL Server 2008 and later versions database recovery method log tail backup
  • Quickly restore and backup SQL Server database

<<:  Solution to the problem that the audio component of WeChat applet cannot be played on iOS

>>:  Basic steps to use Mysql SSH tunnel connection

Recommend

React diff algorithm source code analysis

Table of contents Single Node Diff reconcileSingl...

In-depth explanation of the locking mechanism in MySQL

Preface In order to ensure the consistency and in...

VMware kali virtual machine environment configuration method

1|0 Compile the kernel (1) Run the uname -r comma...

How to use webSocket to update real-time weather in Vue

Table of contents Preface About webSocket operati...

Solve the problem of MySQL using not in to include null values

Notice! ! ! select * from user where uid not in (...

MySQL advanced learning index advantages and disadvantages and rules of use

1. Advantages and Disadvantages of Indexes Advant...

A brief discussion on read-only and disabled attributes in forms

Read-only and disabled attributes in forms 1. Rea...

How to control the proportion of Flex child elements on the main axis

background Flex layout achieves alignment and spa...

Alibaba Cloud Server Linux System Builds Tomcat to Deploy Web Project

I divide the whole process into four steps: Downl...

Install JDK8 in rpm mode on CentOS7

After CentOS 7 is successfully installed, OpenJDK...

Solve the cross-domain problem of get and post requests of vue $http

Vue $http get and post request cross-domain probl...

How to automatically start RabbitMq software when centos starts

1. Create a new rabbitmq in the /etc/init.d direc...

11 common CSS tips and experience collection

1. How do I remove the blank space of a few pixels...