Solved

Can I read the transaction log?

Posted on 2003-11-18
10
531 Views
Last Modified: 2008-03-10
I want to know what changes makes a program to a database.
I don't know what tables may be affected, or if it's updating, deleting or inserting records in one or more tables.
So I can do 2 things:
Compare the whole database "before" and "now"
Read the transactions that where inserted in the transaction log

I think the second solution might be easier, because the database is quite big...

So, how can I do it (step by step)?
0
Comment
Question by:Chofo
  • 5
  • 5
10 Comments
 
LVL 34

Accepted Solution

by:
arbert earned 500 total points
ID: 9774580
Nope, you really can't read the transaction log in a meaningful manner.  HOWEVER, there are a couple of third party products that will read the log for you.  LogExplorer http://www.lumigent.com   and NetIQ also has a product http://www.netiq.com.

If you really need to capture "audit track" type information, you'll almost have to add triggers to the table and insert the before and after changes into another table.

Brett
0
 

Author Comment

by:Chofo
ID: 9779409
Brett: thank you for your answer, it's good to know which are all the different approaches to the subject

I've just downloaded a free trial, and I'm also developing some triggers to find out which tables change...
but I don't know how to learn what changed in the table without having to compare the whole table "before" and "after".
For instance, if the "delete" triggers, how do I know which record was deleted?
Is there a shortcut?
0
 
LVL 34

Expert Comment

by:arbert
ID: 9779868
Basically, if you have good primary keys on your table, you will know what record was updated, deleted, or inserted.


Here are a couple of useful links on auditing:

http://www.sql-server-performance.com/auto_audit_2_spotlight.asp
http://www.nigelrivett.net/AuditTrailTrigger.html


Brett
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:Chofo
ID: 9781598
Brett:
I don't quite agree with your statement about primary keys, updates will tend to be next to the bottom, but that's not necessary...

Thanks for the links...

Chofo
0
 
LVL 34

Expert Comment

by:arbert
ID: 9782261
"next to the bottom"  what do you mean?  If the table has a primary key on it, you know EXACTLY what record was affected by an operation..........
0
 

Author Comment

by:Chofo
ID: 9782588
But... how do you know the ID of the record updated?
I can get if it was an update, delete or insert;  but how do I know the ID of the primary key?
0
 
LVL 34

Expert Comment

by:arbert
ID: 9782816
What do you mean the "ID of the primary key"?  If you know the primary key, that is the exact key that is needed to find a record in the database.....
0
 

Author Comment

by:Chofo
ID: 9783123
OK, ID, primary key, it's the same to me.   How do you know which was the record affected by the table update, delete or insert?   Is it there an SQL variable containing the primary key of the last record updated, deleted or inserted?  What's its name?   How do I get the value?
Or else, can I get the "SQL string" executed over the table?
0
 
LVL 34

Expert Comment

by:arbert
ID: 9783251
Nope, you have to know the primary key.  If you're coding the trigger or stored proc, I would hope that you know what it is.

As far as getting the SQL string that executed, the only way to do that (right now anyway) is with profiler.  When you try and get the sql from within a trigger (fn_get_sql) it returns the actual code of the trigger (thanks microsoft)....
0
 

Author Comment

by:Chofo
ID: 9783580
OK, thank you very much!
You've been really helpful...

Chofo
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Why is this different from all of the other step by step guides?  Because I make a living as a DBA and not as a writer and I lived through this experience. Defining the name: When I talk to people they say different names on this subject stuff l…
This article shows gives you an overview on SQL Server 2016 row level security. You will also get to know the usages of row-level-security and how it works
This video shows, step by step, how to configure Oracle Heterogeneous Services via the Generic Gateway Agent in order to make a connection from an Oracle session and access a remote SQL Server database table.
Viewers will learn how the fundamental information of how to create a table.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question