Solved

Running Copy Database from SQL Management Studio fails

Posted on 2008-10-22
6
732 Views
Last Modified: 2008-12-06
Hi experts,

Can someone let me know what the permissions should be for the login that's being used to carry-out a Copy Database command from a remote Management Studio?  

I keep getting a failure in the final stage of the process and the error in the event log that looks most important is:

"Message: Could not read metadata, possibly due to insufficient access rights."

Any clues or guidance would be most appreciated?
0
Comment
Question by:jammy-d0dger
6 Comments
 
LVL 37

Expert Comment

by:momi_sabag
ID: 22775242
are you using attach detach method or the other method?
0
 
LVL 7

Accepted Solution

by:
Cedric_D earned 500 total points
ID: 22778159
Make a backup and restore it to new db. Maybe you'll have enough access rights for that.
0
 

Author Comment

by:jammy-d0dger
ID: 22788038
to momi_sabag... I'm using the SQL object manager method as the attach/detach option is greyed-out for me.

0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article will provide a solution for an error that might occur installing a new SQL 2005 64-bit cluster. This article will assume that you are fully prepared to complete the installation and describes the error as it occurred durin…
Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question