Solved

Database to database copy

Posted on 2014-02-19
1
184 Views
Last Modified: 2014-02-19
I'm doing a db-to-db copy of a MS SQL SErver 2008R2 database. Which is the better approach to use:

1. Create database and tables without foreign keys.
2. Transfer the data
3. Create foreign keys

OR

1. Create database and tables without foreign keys.
2. Create foreign keys
3. Transfer the data using the foreign key hierarchy.

Thanks.
0
Comment
Question by:zeekay22
1 Comment
 
LVL 35

Accepted Solution

by:
David Todd earned 500 total points
ID: 39869909
Hi,

Generally create all the indexes and keys after the big inserts.

HTH
  David
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Addition to SQL for dynamic fields 6 56
Present Absent from working date rage 11 48
Why I am having this error in my query? 2 32
Job - date manual 1 41
Audit has been really one of the more interesting, most useful, yet difficult to maintain topics in the history of SQL Server. In earlier versions of SQL people had very few options for auditing in SQL Server. It typically meant using SQL Trace …
This is basically a blog post I wrote recently. I've found that SARGability is poorly understood, and since many people don't read blogs, I figured I'd post it here as an article. SARGable is an adjective in SQL that means that an item can be fou…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question