Anteckning
Åtkomst till den här sidan kräver auktorisering. Du kan prova att logga in eller ändra kataloger.
Åtkomst till den här sidan kräver auktorisering. Du kan prova att ändra kataloger.
The topics in this section provide the basic architectural information required to understand how the transaction log is used to guarantee the data integrity of the database and how it is used for data recovery.
Understanding the information in this section can help improve your effectiveness in managing transaction logs.
In This Section
| Topic | Description | 
|---|---|
Describes the logical architecture of the transaction log.  | 
|
Describes the physical components of the transaction log file, including virtual log files.  | 
|
Describes the checkpoint operation and the effect of checkpoints on the transaction log.  | 
|
Describes the role of the write-ahead transaction log in recording data modifications to disk.  | 
See Also
Concepts
Working with Transaction Log Backups