Solved

AppDomain 2 (mssqlsystemresource.dbo[ddl].1) unloaded in SQL Server Log

Posted on 2014-01-10
1
1,900 Views
Last Modified: 2014-01-12
Periodically we see the following messages in one of our SQL Servers:

AppDomain 7 (mssqlsystemresource.dbo[ddl].6) unloaded.

Unsafe assembly 'microsoft.sqlserver.mpusqlclrwrapper, version=10.0.0.0, culture=neutral, publickeytoken=89845dcd8080cc91, processorarchitecture=msil' loaded into appdomain 4 (mssqlsystemresource.dbo[runtime].3).

AppDomain 4 (mssqlsystemresource.dbo[runtime].3) created.
AppDomain 3 (mssqlsystemresource.dbo[ddl].2) unloaded.
AppDomain 2 (mssqlsystemresource.dbo[ddl].1) unloaded.

Common language runtime (CLR) functionality initialized using CLR version v2.0.50727 from C:\Windows\Microsoft.NET\Framework64\v2.0.50727\


Is this anything to be concernened about?

Thank you
0
Comment
Question by:aiopsit
1 Comment
 
LVL 28

Accepted Solution

by:
Ryan McCauley earned 500 total points
Comment Utility
I wouldn't be concerned as long as you're not seeing any connection drops or other negative behavior associated with the message.

SQL Server (starting with 2005) allows .NET code to be called from T-SQL (with proper configuration and precautions). The term "UNSAFE" (in the .NET assembly sense) isn't a term to be concerned about - it just denotes an assembly that may access components of the system that are protected. Specifically (from TechNet):

UNSAFE  code permission is for those situations in which an assembly is not verifiably safe or requires additional access to restricted resources, such as the Microsoft Win32 API.

Though I've never seen this message specifically, it just means that SQL Server has unloaded the assembly to free up memory or because it's not currently being used.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
ms sql stored procedure 22 76
Link SQL table to Webpage 9 35
t-sql splitting name column 5 22
Scheduling Jobs for Execution: 4 13
Occasionally there is a need to clean table columns, especially if you have inherited legacy data. There are obviously many ways to accomplish that, including elaborate UPDATE queries with anywhere from one to numerous REPLACE functions (even within…
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Using examples as well as descriptions, and references to Books Online, show the different Recovery Models available in SQL Server and explain, as well as show how full, differential and transaction log backups are performed

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now