Solved

View tables opened in SQL 2005

Posted on 2008-09-30
3
160 Views
Last Modified: 2012-05-05
Is there a way to view the opened tables under SQL 2005 when a user access a ERP application ? Hence, I could find out the right tables to build the reports.
0
Comment
Question by:AXISHK
  • 2
3 Comments
 
LVL 142

Expert Comment

by:Guy Hengel [angelIII / a3]
ID: 22603284
you could run a SQL profiler trace, and there all the sql run against the database.
that's the way to go, you just have to set up to get all the sql:starting, and filter eventually by the user/database ...
0
 

Author Comment

by:AXISHK
ID: 22603377
For "sql-starting", is the the Events  TSQL --> SQL:StmtStarting and ignore the other events ?

For filter "user/database",  do you mean "Column Filters.." Button --> LoginName ?

I'm using SQL 2005.

Many thanks.
0
 
LVL 142

Accepted Solution

by:
Guy Hengel [angelIII / a3] earned 500 total points
ID: 22603390
>For "sql-starting", is the the Events  TSQL --> SQL:StmtStarting and ignore the other events ?

yes

>For filter "user/database",  do you mean "Column Filters.." Button --> LoginName ?

yes
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will describe one method to parse a delimited string into a table of data.   Why would I do that you ask?  Let's say that you need to pass multiple parameters into a stored procedure to search for.  For our sake, we'll say that we wa…
INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question