Solved

monitor tempdb during major 2 hour operation

Posted on 2014-04-24
2
184 Views
Last Modified: 2016-02-10
when the operation team is going to run lot of transactions for 2  hours through ssis package, we want to realize what/how tempdb is being used.

is DMV the better route or profiler?
0
Comment
Question by:25112
2 Comments
 
LVL 69

Assisted Solution

by:Scott Pletcher
Scott Pletcher earned 250 total points
ID: 40021009
Most likely DMVs, since you'll want to review things that won't appear in Profiler.
0
 
LVL 8

Accepted Solution

by:
ProjectChampion earned 250 total points
ID: 40021900
If you expect an intensive operation running for 2 hours, the last thing you want is to slow it down and burden the server even further by profiling the whole operation.
You should be able to get most of the info you want by reviewing and analysing the SSIS package itself and the queries and procs that it will use, before even starting the package.

While it runs, I'd use a combination of DMV's, SQL Server Activity Monitor and perhaps some ad hoc queries to keep the tab on the metrics that matter to you most.

SQL profiler is a diagnostic tool not a monitoring tool; it can also add a significant overhead so should be used with care and only for the intended purpose.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In couple weeks ago, I encountered an extremely difficult problem while deploying 2008 SSIS packages to a new environment (SQL Server 2014 standard).  My scenario is: We have one C# application that is calling 2008R2 SSIS packages to load text fi…
SQL Server engine let you use a Windows account or a SQL Server account to connect to a SQL Server instance. This can be configured immediatly during the SQL Server installation or after in the Server Authentication section in the Server properties …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question