Key analysis and repair

Various options are available when performing a manual database diagnosis. We have already discussed option Erweiterte Diagnose. Today’s article focuses on option Schlüsselanalyse und -reparatur</em and is intended to show when it should be used and what needs to be considered.


When should an analysis be carried out

Key analysis should be selected if problems repeatedly occur in a database relating to keys that cannot be solved by reorganizing the key(s) in question. Key errors are expressed in messages such as “Key without data set“, “Key not available” or the diagnosis detects deviations in key trees.

How the key analysis works

With Key analysis and repair, all data records in the database are read sequentially. An integrity check of the key values is carried out for each data record. The system also checks whether a corresponding data record exists for each key. Key errors are automatically corrected during the analysis. In addition, incomplete data records are automatically removed from the database.

What must be considered

Due to the fact that the entire database is run through, the duration of the analysis depends on the following factors:

  • Number of data records in the database
  • Size of the database buffer used
  • Performance of the storage system

Depending on the environment, the analysis can take several hours or even days.

Recommendations

As the duration of an analysis can only be estimated very roughly and it is not possible to work in the database during the process, the measure should first be carried out on a copy of the database.

Ideally, the database should be located on a different storage system than the production database, as a high I/O load is generated during the execution. To ensure that the analysis can be carried out within a reasonable period of time, the use of a high-performance storage system is a prerequisite. From a database size of more than 10 GB, the database should be located on an SSD storage system. In addition, a sufficiently large database buffer should be selected. This should be at least ?? % of the database size.

The further procedure depends on the result of the analysis. If differences occur in only a few keys, a correction by reorganizing the relevant keys may be faster than an analysis on the productive database. It is also possible to work in the database during the reorganization. A sufficiently large database buffer must also be ensured for this measure.

Klicken Sie hier, um die Nutzungsbedingungen für unseren Blog zu lesen.

Leave a Reply

Your email address will not be published. Required fields are marked *

Leave the field below empty!

Requests, questions or feedback are welcome:

Terms of use of the comment function in the blog

1. General information

Vectorsoft AG (‘Provider’) provides a public blog for Internet users (‘Users’) on the vectorsoft.de website. The public blog is intended for the exchange of information and ideas. Users who participate with contributions and comments undertake to comply with the blog terms of use and are responsible for the accuracy, appropriateness and freedom from legal infringements of their contributions. By using the comment function in our blog, you accept these terms of use.

2. Netiquette

We ask you to refrain from personal attacks and provocations based on other opinions. Please argue objectively and maintain a constructive discussion culture. Your comment should always be related to the topic in question in order to avoid digressions into other topics. Posting the same comment or several similar comments more than once is not permitted.

3. Prohibition of illegal content

By submitting your comment, you confirm that you are not violating any copyrights or other rights of third parties. Inciting, racist statements, instructions for criminal offences and their glorification, depictions of violence, pornographic content and statements that violate personal rights are prohibited.

4. No advertising

The use of the comment function is not permitted for commercial or party-political purposes. Advertising contributions of any kind will be deleted immediately.

5. Details of the name

When entering your name, pay attention to the principles mentioned above.

6. Source references

If you intend to publish quotes or contributions from third parties, please indicate the respective sources and explain how they relate to the blog post.

7. Violation of the terms of use

Posts that violate this policy will be deleted immediately. If you notice any violations yourself, please send us the link to the comment in question by e-mail to . We expressly point out that we will exclude individual users in the event of repeated or serious violations of these terms of use.

As of: Sept. 2024

Get your Trial Version now!

Test yeet free of charge

IHRE EVALUIERUNGSLIZENZ - JETZT ANFORDERN!

TESTEN SIE DIE CONZEPT 16 VOLLVERSION - UNVERBINDLICH und KOSTENFREI

Subscribe to our newsletter

[cleverreach_signup]
WordPress Cookie Notice by Real Cookie Banner