Configuration and log management: The configuration management feature in 9.7 enables users to configure notification and system logging services.
配置和日志管理:9.7中的配置管理功能使用户能够配置通知和系统日志服务。
This content could be in a single, very large log file, or there could be multiple log files that are the input to the system.
这些内容可能在一个非常大的日志文件中,也可能在为系统输入的多个日志文件中。
System users can log in to user nodes (or login nodes) in order to run their workloads on the cluster.
系统用户可以登录到用户节点(或登录节点),在集群上运行他们的工作。
Due to the large amount of data in the audit log table, a single INSERT statement will usually fail because the data per transaction exceeds the log file size of the database system.
因为审核日志表格里有大量的数据,单独的insert语句通常会失败,这是因为每个事务的数据超过了数据库系统里的日志文件的容量。
This is useful in the integration with existing legacy system monitoring tools that offer continuous scanning of log files in order to raise alerts and detect incidents.
这在集成已有遗留系统监测工具时很有用处,这些工具提供了对日志文件的连续扫描功能以产生警告并监测事故。
Users first must log in to access the system; they can then view the client list and details about each client.
用户首先必须登录以访问系统;然后他们能浏览客户列表和每个客户的详细信息。
Depending on your requirements, you have to balance the benefit of faster audit log queries with a potential penalty in overall system performance.
根据您的需求条件,可能需要平衡使用整个系统性能的损失与更快的审核日志查询。
After the log records pertaining to older schema no longer exist in the system, the shadow replicate is automatically deleted and system only has new master replicates.
当系统中不再存在属于旧模式的日志记录时,影子复制将被自动删除,系统中就只有新的主复制。
When the boot process finishes, you can log in as root in the system and create normal user accounts.
引导过程结束时,您可作为系统的根用户登录,创建普通用户账户。
When the database is initialized, the system allocates a certain number of primary log files of a specified size in the active log directory.
当初始化数据库时,系统会在活动日志目录中分配一定数量、指定大小的主日志文件。
Boot / Start-Up: For fiveminutes the power consumption was polled on each system as it performed a coldboot followed by idling at the desktop (automatic log-in) for the remainder ofthe time.
启动:在每台系统上我们将会查询从开始冷启动到闲置在桌面(自动登录)的五分钟内的功耗。
Another new appearance in this quadrant, but in the Trial zone, is Splunk, a log file analyzer useful to system administrators.
该象限中的另一个新兵是Splunk(但它位于试用分组当中),这是一个日志文件分析器,对于系统管理员很有帮助。
Once you have the base operating system installed and it has successfully booted, log in and configure Apache, PHP, and MySQL using the techniques discussed in Part 4.
安装基本操作系统并成功地启动它之后,使用第4部分中讨论的技术登录并配置Apache、PHP和MySQL。
After the system has started up for the first time, log in as root and create a directory called SRC for the installation files used in the next section.
首次启动系统后,以根用户登录,并且为在下一节用到的安装文件创建名为src的目录。
The first log-structured file system was proposed by John Ousterhout and Fred Douglis in 1988 and subsequently implemented in the Sprite operating system in 1992.
第一个日志结构文件系统由John Ousterhout和Fred Douglis在 1988 年提出,随后由Sprite操作系统在 1992 年实现。
Cannot log in to the system with LDAP user after successful Directory Server configuration.
在成功配置DirectoryServer后,无法使用LDAP用户登录系统。
The data in this log contains information about the devices connected to the system and any faults and problems recorded by the system during the boot and operational process.
此日志中的数据包含关于连接到系统的设备的信息,以及在启动和操作过程中系统记录的任何错误和问题的信息。
Your log should at least track all upgrades and software fixes applied in every software component in the system, including both infrastructure products and application code.
您的日志至少应该跟踪所有的升级和软件修复(应用于系统中的每个软件组件),包括基础结构产品和应用程序代码。
Users can filter the system log file contents and view them, or users can view the entire log content in a browser.
用户可以过滤系统日志文件内容并查看它们,或者可以在浏览器中查看整个日志内容。
Cleaning up log files so that system or user information is not available in the logs.
清除日志文件,以便系统或用户信息不会出现在日志中。
The target service received each invocation and logged the contents of the business object to the system log as shown in Listing 5.
目标服务接收每次调用,并将业务对象的内容记录到系统日志中,如清单5 中所示。
Still, this has the system allowing users to log in under their own names, which is enough to let them post notes.
尽管如此,这使得系统允许用户使用他们自己的用户名登录,对于让用户添加记录来说就足够了。
If the system fails, the first thing it does upon restart is to reapply the effects of any committed transactions that are present in the log but whose data blocks have not yet been updated.
如果系统出现故障,重新启动时要做的第一件事就是重新应用所有已提交事务的作用,所有这些已提交的事务都位于日志中,但是它们的数据块尚未更新。
Create the database and move the logs to the log file system using the commands in Listing 8.
使用清单8所列的命令创建数据库,并将日志移动到日志文件系统。
Registered users can log in to the system using a login page.
已注册用户可以使用登录页面登录到系统。
A successful invocation simply outputs the attributes to the system log in the Console view (Figure 6).
成功调用后,会将属性直接输出到控制台视图中的系统日志(图6)。
In case the primary system fails, the continuous log restore feature makes a secondary system available to replace the primary system.
当主系统出故障时,连续日志恢复特性使一个辅助系统可用,以替代主系统。
In the event of a system failure, transaction log recovery can apply or undo only those transactions not written to disk at the time of the failure.
在系统失败时,事务日志可以应用或取消失败时没有写入磁盘的那些事务。
Check the system log for the status messages of our service implementations as shown in Figure 15.
核查系统日志,获得服务实现的状态消息,如图15所示。
When executing the connect statement, no user and password were given so that the connection was established with the username that was used to log in to the operating system.
在执行connect语句时,没有提供用户名和密码,因此使用登录操作系统所用的用户名建立连接。
应用推荐