Solved

How to trace ssis packages with sql profiler in sql2005

Posted on 2008-06-24
6
1,723 Views
Last Modified: 2010-05-18
Hi,
Is that possible to trace ssis packages statement with sql2005 profiler, if yes than which event should I pick?
0
Comment
Question by:motioneye
  • 3
  • 3
6 Comments
 
LVL 14

Accepted Solution

by:
Jagdish Devaku earned 500 total points
ID: 21853619
0
 

Author Comment

by:motioneye
ID: 21853704
Hi,
I'm interested with these 2 option but how to create / configure them???

#
SSIS log provider for Text files - the most straightforward option, redirecting entries to a comma-separated value (CSV) text file. In order to review them, you might want to consider importing the content of the file into an Excel (or other application capable of dealing with structured text files).

# SSIS log provider for SQL Profiler - stores logged entries in the format (as a .TRC file) that can be viewed in the SQL Server 2005 Profiler. This gives you the ability to correlate entries generated in response to monitored events with other types of data available via Profiler (such as stored procedure activities, performance or locking-related traces, etc.)
0
 
LVL 14

Assisted Solution

by:Jagdish Devaku
Jagdish Devaku earned 500 total points
ID: 21853734
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 

Author Comment

by:motioneye
ID: 21862164
It return me as below when I see logging

#Fields: event,computer,operator,source,sourceid,executionid,starttime,endtime,datacode,databytes,message
0
 
LVL 14

Expert Comment

by:Jagdish Devaku
ID: 21862871
does it showing log information also...?
0
 

Author Comment

by:motioneye
ID: 21863013
Hi that what it written in log file, Just curious what is wrong then?
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

by Mark Wills Attending one of Rob Farley's seminars the other day, I heard the phrase "The Accidental DBA" and fell in love with it. It got me thinking about the plight of the newcomer to SQL Server...  So if you are the accidental DBA, or, simp…
So every once in a while at work I am asked to export data from one table and insert it into another on a different server.  I hate doing this.  There's so many different tables and data types.  Some column data needs quoted and some doesn't.  What …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question