head 1.4; access; symbols RPM_4_2_1:1.1.1.1 RPM_4_2:1.1.1.1 RPM_4_1_1:1.1.1.1 RPM_4_0_5:1.1.1.1 RPM:1.1.1; locks; strict; comment @# @; 1.4 date 2008.01.02.09.55.06; author rse; state dead; branches; next 1.3; commitid z4cpSiAhOCXk5PLs; 1.3 date 2003.08.24.12.43.15; author rse; state Exp; branches; next 1.2; 1.2 date 2003.08.24.12.33.51; author rse; state dead; branches; next 1.1; 1.1 date 2002.09.19.20.33.59; author rse; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2002.09.19.20.33.59; author rse; state Exp; branches; next ; desc @@ 1.4 log @remove the ancient RPM 4.2.1 source tree copy @ text @
|
![]() ![]() ![]() |
Most of the configuration information that can be specified to DB_ENV methods can also be specified using a configuration file. If an environment home directory has been specified (either by the application specifying a non-NULL db_home argument to DB_ENV->open, or by the application setting the DB_USE_ENVIRON or DB_USE_ENVIRON_ROOT flags and the DB_HOME environment variable being set), any file named DB_CONFIG in the database home directory will be read for lines of the format NAME VALUE.
One or more whitespace characters are used to delimit the two parts of the line, and trailing whitespace characters are discarded. All empty lines or lines whose first character is a whitespace or hash (#) character will be ignored. Each line must specify both the NAME and the VALUE of the pair. The specific NAME VALUE pairs are documented in the manual for the corresponding methods (for example, the DB_ENV->set_data_dir documentation includes NAME VALUE pair information Berkeley DB administrators can use to configure locations for database files).
The DB_CONFIG configuration file is intended to allow database environment administrators to customize environments independent of applications using the environment. For example, a database administrator can move the database log and data files to a different location without application recompilation. In addition, because the DB_CONFIG file is read when the database environment is opened, it can be used to overrule application configuration done before that time. For example a database administrator could override the compiled-in application cache size to a size more appropriate for a specific machine.
![]() ![]() ![]() |
Copyright Sleepycat Software @ 1.3 log @Resolve: RPM 4.1 -> RPM 4.1.1 @ text @@ 1.2 log @Resolve: RPM 4.0.5 -> RPM 4.1 @ text @@ 1.1 log @Initial revision @ text @@ 1.1.1.1 log @Import: RPM 4.0.5 @ text @@