Blog Post

Tools to Monitor Performance of SQL Server

To gather statistical information on how a server is performing requires, you need to use operating system tools to gather a broad scope of information. System Monitor and Event Viewer are two operating system tools you can use to gather hardware information and information pertaining to the interaction between SQL Server and the operating system.

At the database engine and database level, you use the SQL Profiler by itself and in combination with other SQL Server specific tools. As you begin to do a more granular inspection, you need to use the Database Engine Tuning Advisor (DTA).

You can use a number of specialized techniques for gathering more specific information about the server and its processes. To better understand this information and provide an organized technique for gathering the information, we will begin with current information about what is happening on the server now and progress through the monitoring tools for more granular data.

Using Activity Monitor for the Here and Now

Activity Monitor enables you to determine, at a glance, the volume and general types of activity on the system that are related to current blocked and blocking transactions in the system, connected users, the last statement executed, and locks that are currently in effect. This tool should be familiar to those who have used the Current Activity tool in previous versions of SQL Server. Activity Monitor provides a display of process information; locks, broken down by process identification; and locks, broken down by object.

The process information in Activity Monitor provides information on all activity currently executing against the system. It also lists current connections that may not be active but are still using resources. Activity Monitor has the following process information columns:

  • Process ID this is the SQL Server process identifier (SPID).
  • System Process This column identifies whether a process belongs to the system.
  • User this column identifies the user who executed the command.
  • Database this column identifies the database currently being used by the process.
  • Status this is the status of the process.
  • Open Transactions this is the number of open transactions.
  • Command this column identifies the command currently being executed.
  • Application this column identifies the name of the application program being used.
  • Wait Time this is the current wait time, in milliseconds. When the process is not waiting, the wait time is zero.
  • Wait Type this is the name of the last or current wait type.
  • Wait Resources this is a textual representation of a locked resource.
  • CPU This column identifies the cumulative CPU time for the process.
  • Physical IO This column identifies the cumulative disk reads and writes.
  • Memory Usage this is the number of pages in the procedure cache that are currently allocated. A negative number indicates that the process is freeing memory allocated by another process.
  • Login Time this column identifies the time at which a client process logged in to the server.
  • Last Batch This column identifies the last time a client process executed a remote stored procedure call or an EXECUTE statement.
  • Host this is the name of the workstation.
  • Network Library this is the column in which the client’s network library is stored. Every client process comes in on a network connection. Each network connection has a network library associated with it that enables it to make the connection.
  • Network Address this is the assigned unique identifier for the network interface card on each user’s workstation.
  • Blocked by this is the SPID of a blocking process.
  • Blocking this is an indicator as to whether a process is blocking others.
  • Execution Context The execution context identifier is used to uniquely identify the sub threads operating on behalf of a process.

Activity Monitor is a good source for determining the current situations in the server. Filter settings are available to focus the display on a particular area of processing. With the filters set, you can view a specific application, database, user, or other element by simply providing the details to the filter. A limitation of the Activity Monitor is that it provides a current snapshot of the activity on the server and does not record information for future analysis.

Activity Monitor allows you to apply filters to the information shown. By using filters, you can isolate a single application, user, database, or type of process desired. Using filters can make problems easier to find and can identify processes that are being affected by locks and blocking. You can user filters to show processes that are being blocked, doing the blocking, or a combination.

You use the BlockedAndBlocking filter from the Blocking Type drop-down to assist in finding deadlocks showing processes that are blocking others as well as being blocked themselves. You use the BlockedOrBlocking setting to assist in finding all processes being affected by a lock or set of locks showing any process on either side of the blocking equation.

One of the best uses for the information you obtain from Activity Monitor is to provide a quick determination of the status of locking within the system. This can help isolate problems with processes that interfere with updates, such as locking, blocking, and deadlocks. For on-going and historical problem analysis, however, this information provides little value, and you need to perform a deeper analysis by using the SQL Server Profiler.

Management Studio: Log File Viewer

SQL Server stores a significant amount of information for future reference. You can find historical events occurring within the database engine and other events that affect the performance of the engine. One set of logs is maintained by the operating system for all applications, and the second is specific to SQL Server. In addition, SQL Server stores a lot of metadata-style information in its own system tables.

In SQL Server 2005, log information is centrally accessible from within Management Studio. The Log File Viewer is a tool that allows you to view the contents of SQL and Windows logs within a single interface. You can even select multiple logs to provide a view that overlay the information from more than one source, as illustrated in figure below:

You can find data from Windows Event Viewer in the SQL Server Log Viewer, under the Windows NT tree. There are three primary logs within the viewer: the Application log, Security log, and System log. The Application log maintains the information that is most pertinent to SQL Server. Events recorded in these logs, with the sources MSSQLSERVER, MSSQL$InstanceName, SQLSERVERAGENT, and SQLAgent$InstanceName.

Windows NT Logs

The information you see in the Log File Viewer is limited to what SQL Server shows for the view and does not provide all the information sometimes needed to resolve the problem. There is usually sufficient information in the error message itself. In some cases, you will find more information about a particular error on the Microsoft website. In that case, it is helpful to open the Application Log from the Windows menu instead of from within Management Studio.

To access further information about the error message online, you open the Application log from the Event Viewer within the Administrative Tools from the Control Panel. To view information for any particular event, you simply double-click the event or right-click the event and select properties from the context menu that appears. You can select the hyperlink to navigate to the Microsoft website, where you find the applicable error information. This link is not provided from within the SQL Server Log File Viewer.

From the Windows NT event logs, you can quickly spot problems and diagnose the steps that led up to any given situation. The Event Viewer and the Log File Viewer both have options available for you to filter events to specific categories and severity. You can also select other computers to view to find additional information about an event.

SQL Server Logs

SQL Server maintains other logs that contain information about the database engine, SQL Server Agent, and Database Mail. The server maintains a set of logs. The Current log contains the events that have occurred since the service was started. Every time you reboot the server or restart the service associated with the log, the logs are advanced.

A considerable amount of information is maintained in the logs. When the logs are cycled, the oldest log is removed, and each archive moves down a position, with the Current log becoming the first archive. In many environments, the log information is periodically exported and permanently stored so that no entries are permanently lost.

These log files are physically stored within the file system. By default, the error log is located at Program Files\Microsoft SQL Server\MSSQL.n\MSSQL\LOG\ERRORLOG and ERRORLOG.n files, where n is a sequential number. You can use the sp_cycle_errorlog stored procedure to force the error logs to cycle. This may be desired if the server has been running for a long time without a restart. The procedure cycles the error log files without having to restart the instance of SQL Server.

By default, SQL Server retains the previous six logs in the C:\Program Files\Microsoft SQL Server\MSSQL.n\MSSQL\LOG\ folder. The most recent log has the extension .1, the second .2, and so on. The current error log has no extension. The SQL Server Agent log is stored in C:\Program Files\Microsoft SQL Server\90\mssql90\Log\ as Sqlagent.out.

Both SQL Server logs and the Windows NT application log are useful in helping to identify problems and their causes. Of course, the information in these logs is historical in nature but can help isolate errors.

Server-Maintained Information

SQL Server stores in its many system tables metadata pertaining to objects maintained by the server. Metadata is information about the properties of data, such as the type of data in a column (numeric, text, and so on) or the length of a column. It can also be information about the structure of data or information that specifies the design of objects, such as cubes or dimensions.

You can view metadata via direct query from the system tables or through a number of views, functions, and stored procedures. It is recommended that you not query system tables directly but instead use associated views and procedures to gain the necessary information from these tables.

Dynamic Management Functions and Views

Dynamic management views and functions return server state information. You can use this information to monitor the server. These views and functions can assist in diagnosing problems and can provide information that may assist in performance tuning. They also return implementation-specific state information. The structure the views use to return data may change in future releases of SQL Server. Therefore, dynamic management views and functions may not be compatible with future versions of SQL Server and are not recommended for system process design use.

Dynamic management functions and views can be quite useful but are limited for the SQL Server version in which they are associated. You cannot use these functions and views for any process that must remain compatible from version to version.

All dynamic management views and functions exist in the sys schema. All of these objects follow the naming convention dm_*. When you use a dynamic management view or function, you must prefix the name of the view or function by using sys. All view and function names should therefore be similar to sys.dm_*.

Database Console Command (DBCC)

One of the most useful diagnostic/tuning tools available to SQL Server database developers and administrators is the DBCC command. Today, DBCC stands for database console command. In previous versions of SQL Server, it stood for Database Consistency Checker.

DBCC allows you to diagnose and repair some common situations on a server. You can use DBCC statements to check performance statistics and the logical and physical consistency of a database system. Many DBCC statements can fix detected problems.

Some DBCC operations provide useful information about the processes that have been performed most recently on the server. This type of information can be useful in pinpointing the source of SQL activities. Each of the options provides a small piece of a large puzzle, but collectively they can provide a useful picture of the current server activity. The following are some of the most commonly used DBCC options:

  • DBCC INPUTBUFFER Provides the last statement sent from a client to the server.
  • DBCC OPENTRAN Provides transaction information for the oldest active transaction, distributed transaction, and no distributed replicated transaction.
  • DBCC OUTPUTBUFFER Returns the current output buffer in hexadecimal and ASCII format for the specified SPID.
  • DBCC PROCCACHE Displays information about the procedure cache.
  • DBCC SHOWCONTIG Displays fragmentation information for the data and indexes. This is one of the most frequently used DBCC status operations. Because it can display information specific to data and index fragmentation, it is useful in determining when to carry out maintenance operations.

Many other DBCC options are available. To gain a complete understanding of everything DBCC can do, you need to work with it on a regular basis.

Trace Flags

Trace flags display information about specific activities within a server and are used to diagnose problems or performance issues. They are particularly useful in deadlock analysis. Trace flags temporarily set specific server characteristics or switch off particular behaviours. Trace flags are often used to diagnose and debug stored procedures and analyse complex system elements. Four trace flags are commonly used for troubleshooting different elements of SQL Server:

  • 260 Determines dynamic link library (DLL) version information. (To determine dynamic link library version information, see the support for GetXPVersion() in SQL Server Books Online, without the use of a flag.)
  • 1204 Finds the command affected by deadlock and finds the type of lock.
  • 2528 Disables or enables parallel checking of objects during DBCC use. (Parallel DBCC checking should not usually be disabled.)
  • 3205 Disables or enables tape drive compression support. (Tape dumps and backups should usually be compressed.)

SQL Server provides many flags to aid in server troubleshooting. The administrator is responsible for specific aspects of the use of the flags and should not put them in place without understanding the repercussions.

Simple Network Management Protocol (SNMP)

SNMP is an industry-standard protocol for monitoring computer systems and other related hardware. An SNMP Manager can query devices throughout the environment. It is possible to query a SQL server that has SNMP installed and enabled to obtain statistical and state information about the server.

By using SNMP, you can monitor SQL Server across different platforms (for example, UNIX and different versions of Microsoft Windows). You can use SNMP applications available from a number of vendors to monitor the status and performance of instances of SQL Server, explore defined databases, and view server and database configuration parameters.


You rated this post out of 5. Change rating




You rated this post out of 5. Change rating