To display information about the transaction log, select Database View Transaction Log. This shows the pathname of the log file, its size in bytes, and the times when it was last modified or accessed.
To display the names and times of the checkpoint files, select Database View Checkpoint Files.
If the transaction log has become corrupted, and the server will not start, select Database Delete Transaction Log, and click on OK when asked to confirm. Select Server Start Server to restart the server. See the warning below.
If the server will not start from the most recent checkpoint file, select Database Delete Checkpoint File, select the most recent entry, and then click on OK. Click on OK when asked to confirm. Select Server Start Server to restart the server. See the warning below.
If an address is shown as unused, expired, or released, but you know that it is currently allocated, disable it and then release and re-enable it when the client has finished with the address.
If necessary, you can delete the transaction log and all checkpoint files by selecting Database Delete All.