Solved

sql server: View lock information using Activity Monitor

Posted on 2011-02-12
1
796 Views
Last Modified: 2012-05-11
Hi experts, can give me a hand on lab or something to do this:
View lock information using Activity Monitor
0
Comment
Question by:enrique_aeo
1 Comment
 
LVL 17

Accepted Solution

by:
dbaSQL earned 250 total points
ID: 34880482
Have you seen this?
http://www.mssqltips.com/tip.asp?tip=1917

I think you need to take a look at the 'Resource Waits' section.
http://www.networkworld.com/community/node/32224


§    Resource Waits -  This section displays resource waits  vertically that are based on the following wait categories CPU, SQLCLR, Network I/O Latch, Lock, Logging, Memory, Buffer I/O, Buffer Latch and Compilation.  From a horizontal perspective, the Wait Time, Recent Wait Time, Average Waiter Counter and Cumulative Wait Time metrics are published for each Wait Category.  Similar to the Processes section, data can be filtered based on items within a column.

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you have heard of RFC822 date formats, they can be quite a challenge in SQL Server. RFC822 is an Internet standard format for email message headers, including all dates within those headers. The RFC822 protocols are available in detail at:   ht…
In this article I will describe the Detach & Attach method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question