eventlogexplorer不支持此接口支持查sql吗

sql2000报错Successfully re-opened the local eventlog解决方法
报错1:Unable to read local eventlog (reason: 事件日志文件已在读取间更改。
报错2:Successfully re-opened the local eventlog - NOTE: Some events may have been missed.
微软解释:
/default.aspx?scid=en-811484
解决办法:
如果要防止错误日志, 中出现这些消息可以使用跟踪标志 2505 作为启动参数
要将跟踪标志 2505 作为 SQLServer 启动参数, 使用以下步骤:
1. 企业管理器, 右键单击服务器名称, 依次 属性 。
2. 在 常规 选项卡, 单击 启动参数 。
3. 添加以下作为新参数:
4. 重新启动服务器对新参数才能生效
顶一下(0) 踩一下(0)
热门标签:Eventlog Key (Windows)
Eventlog Key
Expand the table of content
Eventlog Key
The event log contains the following standard logs as well as custom logs:
LogDescription
ApplicationContains events logged by applications. For example, a database application might record a file error. The application developer decides which events to record.
SecurityContains events such as valid and invalid logon attempts, as well as events related to resource use such as creating, opening, or deleting files or other objects. An administrator can start auditing to record events in the security log.
SystemContains events logged by
system components, such as the failure of a driver or other system component to load during startup.
CustomLogContains events logged by applications that create a custom log. Using a custom log enables an application to control the size of the log or attach ACLs for security purposes without affecting other applications.
The event logging service uses the information stored in the Eventlog registry key. The Eventlog key
contains several subkeys, called logs. Each log contains information that the event logging service uses to locate resources
when an application writes to and reads from the event log.
The structure of the Eventlog key is as follows:HKEY_LOCAL_MACHINE
CurrentControlSet
Application
Note that domain controllers record events in the Directory service and File Replication service logs and DNS servers record events in the DNS server.
Each log can contain the following registry values.
Registry valueDescription
CustomSDRestricts access to the event log. This value is of type REG_SZ. The format used is
(SDDL). Construct an ACL that grants one or more of the following rights:
Clear (0x0004)
Read (0x0001)
Write (0x0002)
To be a syntactically valid SDDL, the CustomSD value must specify an owner and a group owner (for example, O:BAG:SY), but the owner and group owner are not used.
If CustomSD is set to a wrong value, an event is fired in the System event log when the event log service starts, and the event log gets a default security descriptor which is identical to the original CustomSD value for the Application log. SACLs are not supported.
For more information, see .
Windows Server 2003:
SACLs are supported.
Windows XP/2000:
This value is not supported.
DisplayNameFileThis value is not used. Windows Server 2003 and Windows XP/2000:
Name of the file that stores the localized name of the event log. The name stored in this file
appears as the log name in Event Viewer. If this entry does not appear in the registry for an event log, Event Viewer displays the name of the registry subkey as the log name. This value is of type REG_EXPAND_SZ. The default value is %SystemRoot%\system32\els.dll.
DisplayNameIDThis value is not used. Windows Server 2003 and Windows XP/2000:
Message identification number of the log name string. This number indicates the message in which the localized display name appears. The message is stored in the file specified by the DisplayNameFile value. This value is of type REG_DWORD.
FileFully qualified path to the file where each event log is stored. This enables Event Viewer and other applications to find the log files. This value is of type REG_SZ or REG_EXPAND_SZ. This value is optional. If the value is not specified, it defaults to %SystemRoot%\system32\winevt\logs\ followed by a file name that is based on the event log registry key name.The specific event log file path should be set using the command line utility wevtutil.exe or by using the
function with EvtChannelLoggingConfigLogFilePath passed into the
PropertyId parameter.
If a specific file is set, make sure that the event log service has full permissions on the file.
This value needs to be a valid file name for
a file that is located on a local directory (not a remote computer, not a DOS device, not a floppy, and not a pipe). If the file setting is wrong, an event is fired in the System event log when the event log service starts.
Do not use environment variables, in the path to the file, that cannot be expanded in the context of the event log service.
Windows Server 2003 and Windows XP/2000:
This value defaults to %SystemRoot%\system32\config\ followed by a file name that is based on the event log registry key name. If the File setting is set to an invalid value, the log will either not be initialized properly, or all requests will silently go to the default log (Application).
MaxSizeMaximum size, in bytes, of the log file. This value is of type REG_DWORD. The value must be set to a multiple of 64K for a System, Application, or Security log. The default value is 1MB.Windows Server 2003 and Windows XP/2000:
The value is limited to 0xFFFFFFFF, and the default value is 512K.
PrimaryModuleThis value is not used.Windows Server 2003 and Windows XP/2000:
This value is the name of the subkey that contains the default values for the entries in the subkey for the event source. This value is of type REG_SZ.
This value is of type REG_DWORD. The default value is 0. If this value is 0, the records of events are always overwritten. If this value is 0xFFFFFFFF or any nonzero value, records are never overwritten. When the log file reaches its maximum size, you must cl otherwise, new events are discarded. You must also clear the log before you can change its size.Windows Server 2003 and Windows XP/2000:
This value is the time interval, in seconds, that records of events are protected from being overwritten. When the age of an event reaches or exceeds this value, it can be overwritten.
SourcesThis value is not used. Windows Server 2003 and Windows XP/2000:
Names of the applications, services, or groups of applications that write events to this log. This value should only be read and not altered. The event log service maintains the list based on each program listed in a subkey under the log. This value is of type REG_MULTI_SZ.
AutoBackupLogFilesThis value is of type REG_DWORD, and is used by the event log service to determine whether an event log should be automatically saved. The default
value is 0, which disables auto-backup. The service will back up the log file only if the retention value is -1 (0xFFFFFFFF). Other values will be ignored.Windows Server 2003:
Retention can be set
to -1 (0xFFFFFFFF) or 1 (0x) for AutoBackupLogFiles to work. Other values will be ignored.
RestrictGuestAccessThis value is not used. Windows XP/2000:
This value is of type REG_DWORD, and the default value is 1. When the value is set to 1, it restricts the Guest and Anonymous account access to the event log, and when this value is 0, it allows Guest account access to the event log.
Defines the default access permissions for the log. This value is of type REG_SZ. You can specify one of the following values:
Application
The default isolation is Application. The default permissions for Application are (shown using SDDL):
L"O:BAG:SYD:"
L"(A;;0xf0007;;;SY)"
// local system
(read, write, clear)
L"(A;;0x7;;;BA)"
// built-in admins
(read, write, clear)
L"(A;;0x7;;;SO)"
// server operators
(read, write, clear)
L"(A;;0x3;;;IU)"
// INTERACTIVE LOGON
(read, write)
L"(A;;0x3;;;SU)"
// SERVICES LOGON
(read, write)
L"(A;;0x3;;;S-1-5-3)"
// BATCH LOGON
(read, write)
L"(A;;0x3;;;S-1-5-33)"
// write restricted service
(read, write)
L"(A;;0x1;;;S-1-5-32-573)";
// event log readers
The default permissions for System are (shown using SDDL):
L"O:BAG:SYD:"
L"(A;;0xf0007;;;SY)"
// local system
(read, write, clear)
L"(A;;0x7;;;BA)"
// built-in admins
(read, write, clear)
L"(A;;0x3;;;BO)"
// backup operators
(read, write)
L"(A;;0x5;;;SO)"
// server operators
(read, clear)
L"(A;;0x1;;;IU)"
// INTERACTIVE LOGON
L"(A;;0x3;;;SU)"
// SERVICES LOGON
(read, write)
L"(A;;0x1;;;S-1-5-3)"
// BATCH LOGON
L"(A;;0x2;;;S-1-5-33)"
// write restricted service (write)
L"(A;;0x1;;;S-1-5-32-573)";
// event log readers
The default permissions for Custom isolation is the same as Application.
Windows Server 2003 and Windows XP/2000:
This value is not available.
Each log also contains event sources. For more information, see .
IN THIS ARTICLE
Is this page helpful?
Additional feedback?
1500 characters remaining
Thank you!
We appreciate your feedback.

我要回帖

更多关于 explorer不支持此接口 的文章

 

随机推荐