Skip to main content

Ingres resource limiting : Part5 (Screenshots/Log table)

Actual screenshots from operation in action :











Trapped Form
Exception caught
(Admittedly scary message for the user!Not exactly what I was taught once upon a time in the HCI class!!)
Action cancelled


The log table structure :
help qep_abf_log


Name: qep_abf_log
Owner: psnouser
Created: 24/06/2008 09:05:56
Type: user table
Version: II2.5

Column Information:
Column Name Type Length Nulls Defaults Seq
application char 10 no no
dbuser char 10 no no
terminal char 60 no no
entrydate date no no
querytext char 200 no no
errortext char 200 no no

An entry in the table (executing an insert into table (values) select from table1 where...) :
|grk |psuser |/dev/ttyp3 |12/10/2008 12:09:00 |insert into esk300devttyp3 (am_asq, d_kin, c_eid, c_grn) select kin.am_asq, kin.d_kin, kin.c_eid,c_grn=kin.c_grn_pr from kin, mas where mas.am_asq=kin ... |E_QE0203 The estimated number of IO requests to run this query (3982)\n exceeds the IO limit (1000) established for this session. \n The query is aborted with a fatal l error.\n (Wed Jun 25 12:08:44|

Another entry in the table (executing a simple select) :
|grk |psnouser |/dev/ttyp0 |14/10/2008 06:37:00 |select table_name as h_table from iicolumns where (table_owner='psuser' and table_name='esk2520devttyp0' ) |E_QE0203 The estimated number of IO requests to run this query (12)\n exceeds the IO l imit (10) established for this session. \n The query is aborted with a fatal error.\n (Tue Oct 14 06:36:56 |

Comments

Popular posts from this blog

Book Review : How To Create Pragmatic, Lightweight Languages

At last, a guide that makes creating a language with its associated baggage of lexers, parsers and compilers, accessible to mere mortals, rather to a group of a few hardcore eclectics as it stood until now.

The first thing that catches the eye, is the subtitle:

The unix philosophy applied to language design, for GPLs and DSLs"
What is meant by "unix philosophy" ?. It's taking simple, high quality components and combining them together in smart ways to obtain a complex result; the exact approach the book adopts.
I'm getting ahead here, but a first sample of this philosophy becomes apparent at the beginnings of Chapter 5 where the Parser treats and calls the Lexer like  unix's pipes as in lexer|parser. Until the end of the book, this pipeline is going to become larger, like a chain, due to the amount of components that end up interacting together.

The book opens by putting things into perspective in Chapter 1: Motivation: why do you want to build lan…

Deep Angel-The AI of Future Media Manipulation

Undeniably, we live in the era of media manipulation. Such powerful and accessible tools exist today that nearly everyone can do it. Now add to this collection Deep Angel, an artificial intelligence that can erase objects from photographs and videos.

I was notified of Deep Angel around the time I was watching Kill Switch, a futuristic and dystopic movie about our Earth getting cloned in order to suck the resources of the cloned planet, something that would sustain our world's energy needs for at least another millennium. To cut a long story short... full article on i-programmer.info

SAP's Creating Trustworthy and Ethical Artificial Intelligence

With the ink hardly dry on the pages of the EU Ethical AI Guidelines manifest, a free online course exploring the issues they raise is already in prospect on the openSAP platform. Run by members of the very same group, the European Union’s High-Level Expert Group on Artificial Intelligence, who wrote the guidelines and in cooperation with SAP's online education platform, a course with the titleCreating Trustworthy and Ethical Artificial Intelligence has been made accessible to anyone with an interest on AI or ML:
full article on i-programmer.info