Solved

SQL Server 2008 Deadlock

Posted on 2014-01-15
5
765 Views
Last Modified: 2014-01-19
How to identify dead lock in SQL 2008 ? How do I know whether a dead lock occur in production environment ? Will the SQL server slow down the performance ?
0
Comment
Question by:AXISHK
  • 2
  • 2
5 Comments
 
LVL 13

Assisted Solution

by:Koen Van Wielink
Koen Van Wielink earned 200 total points
ID: 39784639
Try running the SP_WHO and SP_WHO2 stored procedures. They will show you blocked and blocked by columns that correspond with a session ID. Look up the session ID to see who is locking the database.
0
 
LVL 1

Expert Comment

by:mike706
ID: 39784704
You can also use the activity monitor to see this information.

You can find more information about deadlocks here http://technet.microsoft.com/en-us/library/ms177433%28v=sql.105%29.aspx

Deadlocks are a performance problem because they can prevent 2 or more processes from being able to process data.  A deadlock chain can occur and impact hundreds of spids based on the data access patterns, number of users, object dependencies, etc.
0
 

Author Comment

by:AXISHK
ID: 39791879
Run 'sp_who" and 'sp_who2' but I can't find the 'blocked" or 'blocked  by" column.  Do I make something wrong ?

Tks
0
 
LVL 1

Accepted Solution

by:
mike706 earned 300 total points
ID: 39792001
It should look something like this.
sp_who2
sp-who2.jpg
0
 

Author Closing Comment

by:AXISHK
ID: 39793194
Tks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There have been several questions about Large Transaction Log Files in SQL Server 2008, and how to get rid of them when disk space has become critical. This article will explain how to disable full recovery and implement simple recovery that carries…
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question