Invoking a Database Validation Using the Services API
Go Up to Invoking Database Maintenance Using the Services API
You can request a database validation with the cluster identifier isc_action_svc_repair. Database validation scans internal data structures for specific types of corruption. In some cases, the validation operation can repair corruption.
- Important: The validation operation cannot guarantee to repair all cases of corruption. Do not rely on database validation as a disaster recovery policy in lieu of making regular backups of your database.
The following table lists arguments to isc_action_svc_repair to validate a database:
| Argument | Purpose | Argument length | Argument value |
|---|---|---|---|
|
|
Path of the primary file of the database, from the server’s point of view |
2 bytes + string |
String |
|
|
The following value is a bitmask of |
4 bytes |
Bitmask |
|
|
Request read-only validation of the database, without correcting any problems; corresponds to |
— |
Bit |
|
|
Ignore all checksum errors; corresponds to |
— |
Bit |
|
|
Remove references to unavailable shadow files; corresponds to |
— |
Bit |
|
|
Mark corrupted records as unavailable, so subsequent operations skip them; corresponds to |
— |
Bit |
|
|
Locate and release pages that are allocated but unassigned to any data structures; corresponds to |
— |
Bit |
|
|
Check record and page structures, releasing unassigned record fragments; use with |
— |
Bit |