Legal Information
PC Knowledge Base -Disaster Recovery for Microsoft Exchange 2000 Transaction Logs

Good Knowledge Is Good2Use

Exchange 2000 uses fault-tolerant, transaction-based databases to store messages. Exchange 2000 also uses write-ahead transaction log files to ensure that Exchange 2000 data is efficiently processed. Write-ahead is the process of writing transactions sequentially in transaction logs before writing them in bulk to the database files. Because copies of the transactions are stored in the log files, this process ensures that transactions are never lost before they are written to the databases in bulk.

In the Exchange 2000 transaction logging process, log files are created sequentially with file names beginning with E, followed by a 7-digit hexadecimal number, and ending with a .log file extension. Log files are exactly 5 megabytes in size; therefore these files should appear in Windows Explorer as 5,242,880 bytes. If a log file does not appear as this exact size, it is typically corrupt.

Log files form in the following way:

  1. Databases' transactions in a single storage group are sequentially recorded to the temporary log file for the transaction logs of that storage group.
  2. When this temporary log file (E00tmp.log) reaches 5 megabytes, the file is saved as the next transaction log file for that storage group. For example, if the last log file recorded was E000001A.log, the temporary log file is saved as E000001B.log.
  3. The temporary log file is filled again with new transactions until the log file reaches its full capacity and is copied to the next sequential log file.
Each storage group also maintains two log files (Res1.log and Res2.log) that function as placeholders for extra disk space on the hard disk containing the log files. If the drive containing the log files runs out of disk space, Res1.log and Res2.log allow the database files in the storage group to shut down in a consistent state.

If you have a backup of the database files and the corresponding log files for that database, you can recover your Exchange 2000 database information at any time. After a normal shutdown of the Exchange Information Store service, the Exchange database information is present in the .edb and .stm files. After an abnormal shutdown of the Exchange Information Store service, the database consists of the .edb and .stm files and any transactions in the log files that have not yet been written to those files (Figure 3).

A checkpoint file is used to indicate which transactions in the log files have been successfully written to the database files.

When the Exchange Information Store service is restarted, those transactions beyond the checkpoint are automatically written to the database files during soft recovery to bring the databases current to the time of the abnormal shutdown.

For more information about checkpoint files, see Checkpoint Files.

Elements of a current Exchange 2000 database

The information in this article applies to:



Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE