Solved

Migrating DB from Access 2000 to SQL Server 2000

Posted on 2002-06-21
5
349 Views
Last Modified: 2012-05-04
I used the import wizard on an empty d/b from the sql server, setting as source the Access2000 file and destination my empty d/b. All went ok, but I didn't get the database diagram, and all the primary/foreign/etc keys have also been reset...

Is there a way to migrate/upscale without losing the er diagram and the primary keys?

Thanks
0
Comment
Question by:gm395
  • 3
  • 2
5 Comments
 
LVL 6

Accepted Solution

by:
blakeh1 earned 100 total points
ID: 7104048
If you have access 2000 (not sure if it is available in 97, you'll have to check) you could try use the Upsizing wizard to migrate your database to SQL Server. This should bring over the keys and table relationships. From Access, use Tools, Database Utilities, Upsizing Wizard.

Here is a link to the White Paper for the wizard

The following file is available for download from the Microsoft Download Center:
 
   Download Upsize00.exe now
  (http://download.microsoft.com/download/access2000/whitep5/1/WIN98/EN-US/Upsize00.exe)
 
The Upsize00.exe file contains the following file:
 
   Upsize00.doc  A Microsoft Word document
  Readme.txt    The Readme file
 
0
 
LVL 6

Expert Comment

by:blakeh1
ID: 7104053
Another benefit to this wizard is if you are going to use Access as your front end it will create the linked SQL tables for you.
0
 
LVL 1

Author Comment

by:gm395
ID: 7107432
I found the wizard, but when I press next, after I choose the "create new database" and add the user with CREATE table priviledges and choose the name of the new d/b in SQL Server, it just shows a message "Overflow" and stops there. Any ideas?
0
 
LVL 1

Author Comment

by:gm395
ID: 7107459
I even tried through the "use existing database" and added an empty d/b in System DSN, but still nothing happened. Again I got the message "Overflow"
0
 
LVL 6

Expert Comment

by:blakeh1
ID: 7108817
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

When you hear the word proxy, you may become apprehensive. This article will help you to understand Proxy and when it is useful. Let's talk Proxy for SQL Server. (Not in terms of Internet access.) Typically, you'll run into this type of problem w…
Everyone has problem when going to load data into Data warehouse (EDW). They all need to confirm that data quality is good but they don't no how to proceed. Microsoft has provided new task within SSIS 2008 called "Data Profiler Task". It solve th…
Via a live example, show how to shrink a transaction log file down to a reasonable size.
Viewers will learn how to use the INSERT statement to insert data into their tables. It will also introduce the NULL statement, to show them what happens when no value is giving for any given column.

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now