Solved

A lot of process id in awaiting command in SQL SERVER 2000

Posted on 2006-06-28
6
1,279 Views
Last Modified: 2012-06-27
We have an application using a lot of process id
40 and more for 1 user !

Is it normal ?
The process is sleeping !

When we have 3 users we have 100 or more process id sleeping.

Configuration : SQL SERVER 2000
Application is in Windev.

Do you think that the application don't close the connection and open  a new one for each query ?

Thanks
0
Comment
Question by:jff218
  • 3
  • 2
6 Comments
 
LVL 142

Accepted Solution

by:
Guy Hengel [angelIII / a3] earned 100 total points
ID: 16999817
If the user is in fact used by web applications, this could be normal, as in most cases, the connections are pooled, hence a certain amount of connections stay "available".
0
 

Author Comment

by:jff218
ID: 16999835
it's not a web application

The server is very slow when we have 3 or 5 users (in a local network).(Windows SBS 2003) but only sql server

How long is the life of a connection between client and sql Server 2000 ?

thanks
0
 
LVL 142

Expert Comment

by:Guy Hengel [angelIII / a3]
ID: 17000096
>How long is the life of a connection between client and sql Server 2000 ?
as long as the connection is not closed from the application, it remains open. there is no automatic connection closing mechanism.
0
 

Author Comment

by:jff218
ID: 17000178
a process id means a connection  ?

So if i have 50 process id for the same user,on the same database, i have 50 connections ?
Or only one connection ?

do you know if that use MEMORY or slow SQL SERVER ?

Thanks
0
 
LVL 142

Expert Comment

by:Guy Hengel [angelIII / a3]
ID: 17000205
>a process id means a connection  ?
yes.

>do you know if that use MEMORY or slow SQL SERVER ?
each connection uses of course a bit of memory, but should not necessarly slow down sql server as such.
however, if each connection has open transactions (ie holding locks), THAT will slow down sql server, as the locks need to be managed and respected for all the other transactions...
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Introduction SQL Server Integration Services can read XML files, that’s known by every BI developer.  (If you didn’t, don’t worry, I’m aiming this article at newcomers as well.) But how far can you go?  When does the XML Source component become …
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now