Solved

find goldmine deleted contact

Posted on 2006-11-29
1
491 Views
Last Modified: 2013-11-24
It seems some how one of our contacts has been delted and no one knows how. As far as I can tell only 3 people have the rights to delete a contact, but I don't know where in the logs to look to see who , when, and how it was done. Is there a way to get that information?
0
Comment
Question by:kevlause
1 Comment
 
LVL 13

Accepted Solution

by:
TommyTupa earned 500 total points
ID: 18042989
This can be accomplished by querying the conttlog table.

The following query will give you all deletes sorted by user:
select * from conttlog where fieldname='zzzdel' order by userid

If you want to search a particular table use this query:
select * from conttlog where fieldname='zzzdel' and tableid = '&' order by userid.

Table names:
& - Contact1
' - Contact2
* - ContGrps
) - ContHist
( - ContSupp
% - Conttlog
0 - ContUDef

The FRECID column in conttlog refers to the recid of the corresponding table.

The syncstamp and logstamp refer to the date\time of the change.  You can convert syncstamp and logstamp to actual values by entering the Goldsync Administration Center, Right-Clicking on 'Servers', and selecting 'Date\Time Stamp Conversion'.


HTH,
TT

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
These days socially coordinated efforts have turned into a critical requirement for enterprises.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now