Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The transaction log for database "<database name>" is full. To find out why space in the log cannot be reused, see the log_reuse_wait_desc column in sys.databases.
|English: Request a translation of the event description in plain English.|
We had the transaction logs on the C drive and they were eating up space and caused this error, which was a "Disk Full " error. We moved the logs over to our DB/ data volume and everything is fine now.
See ME317375 for information on why a transaction log grows unexpectedly or becomes full on a computer that is running SQL Server.
See the link to "Microsoft Event ID 9002 from source MSSQLServer" for information about this event.
|Private comment: Subscribers only. See example of private comment|
|Links: ME317375, Microsoft Event ID 9002 from source MSSQLServer|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated