Solved

How do I retrieve past queries that caused blocking

Posted on 2010-09-15
2
544 Views
Last Modified: 2012-06-21
Today, our main SQL 2008 production server experienced major blocking that eventually resulted in serious timeouts for our application. We have Idera installed to monitor the server, but are not running the query monitor because of the excess load it would put on the server. Idera did track that there were about 120 blocked sessions that occurred at one point this morning. Unfortunately, by the time I ran my queries to view the blocked sessions, it finally cleared up. I am trying to find out what those queries were so we can find out what the root of the problem was.

One thing we do is we have transaction log backups that occur every 10 minutes. Is there any way we can capture what was in that transaction log and output it to a file that we can review? I just want to make sure this situation does not occur again.

Any assistance in this matter is greatly appreciated.

0
Comment
Question by:richecker
2 Comments
 
LVL 3

Expert Comment

by:mnachu
ID: 33683474
You could look at the cached plans to see what queries were recently executed or updated. There is some DMV for it in SQL 2008.

-Nachi
0
 

Accepted Solution

by:
richecker earned 0 total points
ID: 33684467
Nevermind, I was able to find what I was looking for in Idera. In Idera, there is blocking history tracking and I was able to find the process that was blocking everything else. I just had to point back to a previous snapshot, and find the data.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SQL Server engine let you use a Windows account or a SQL Server account to connect to a SQL Server instance. This can be configured immediatly during the SQL Server installation or after in the Server Authentication section in the Server properties …
In this article I will describe the Detach & Attach method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question