Viewing 15 posts - 136 through 150 (of 368 total)
Never used that arc tool. For point-in-time restore (full recovery model) you need full backup + unbroken chain of all transaction log backups starting with the one that contains the...
January 15, 2013 at 6:43 pm
From BOL: "Not supported. Future compatibility is not guaranteed."
http://msdn.microsoft.com/en-us/library/ms187348.aspx
Why don't you just create and/or refresh statistics to get realistic data ?
You could update system tables using dedicated admin connection (put...
January 15, 2013 at 6:35 pm
Contact CSS with that result. All 80 cpu's should not spike because of a single, simple query.
January 14, 2013 at 8:45 am
You can limit long-running queries with several methods.
With time limit:
http://sqltimes.wordpress.com/2011/09/20/use-query-governor-to-prevent-long-running-queries/%5B/url%5D
It is cost-based, estimates time before the query is even executed.
You can set it at instance level and connection level:
SET query_governor_cost_limit...
January 14, 2013 at 3:53 am
a checkpoint after a log backup will not mark additional log records as reusable and hence will not allow a shrink to reclaim more space than it would if the...
January 13, 2013 at 11:00 am
I tried to setup excercise in full recovery model that shows in log truncation that occured no VLF's are marked inactive because the lack of the CHECKPOINT.
But, it turns out...
January 13, 2013 at 7:22 am
I'm well aware what triggers log truncation in simple vs full/bulk recovery model (checkpoint vs log backup). I'm also aware of the conditions that determine what VLFs will actually be...
January 13, 2013 at 7:18 am
This should not spike your CPU:
SELECT count(*) FROM sys.dm_tran_locks WITH(NOLOCK)
Run it on both machines and compare the numbers. Almost idle system is a very different situation than a busy server.
SQL...
January 12, 2013 at 6:58 pm
There's no implicit (or explicit) checkpoint that happens within the transaction log backup
I know for sure (tested and double-checked) that checkpoint is implicitly executed at the beginning of full or...
January 12, 2013 at 6:20 pm
Checkpoint will not flush pages from memory. Just writes dirty pages and they stay in memory, now in clean state. No danger there. Unlike lazy writer that responds to memory...
January 12, 2013 at 9:17 am
Make sure both 1 and 19978 exist in parent table, insert if not.
Update the child table, it will now pass without error.
Delete the old parent row.
I hope it is not...
January 11, 2013 at 8:29 pm
-- load file into xml variable
DECLARE @x xml
SELECT @x = CAST(c1 as xml)
FROM OPENROWSET(BULK 'D:\temp\sampledata.xml', SINGLE_CLOB) t1(c1)
--turn xml into table with nodes() function:
declare @xml as xml = '
<ArrayOfCustomers
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
>
<Customer id="1">
<CustomerName>Mr Smith</CustomerName>
<Children>
<Child...
January 11, 2013 at 8:23 pm
If that are windows logins, why granting them individually? You could create windows (AD) groups, and sql login for that group.
Managing rights will be much easier on the group level,...
January 11, 2013 at 8:15 pm
Full/diff backup does not clear transaction log ("clear" is sometimes referred as "truncate" and actually means "mark parts of tran log as free for reuse". Clearing tran log DOES NOT...
January 11, 2013 at 7:52 pm
How many of this 12 000 connections is active (actually executing something, not just sitting there opened)?
How many NUMA nodes that machine have? Did you messed with CPU affinity mask...
January 11, 2013 at 2:10 pm
Viewing 15 posts - 136 through 150 (of 368 total)