4199
All KB patches take effect for the query analyzer behavior modification. This command is dangerous and may be called as performance degradation. For details, see:
http://support.microsoft.com/kb/974006
Trace flag should not be enabled in the production environment
Trace Flag 806 Check the logical consistency of pages during reading. The following information is displayed in the error log:11:29:04. 11 spid51 error: 823, severity: 24-day status: 211:29:04. 11 spid51 I/O error (
query analyzer behavior modification. This command is dangerous and may be called as performance degradation. For details, see:
http://support.microsoft.com/kb/974006Trace flag should not be enabled in the production environment
Trace Flag 806 Check the logical consistency of pages during reading. The following information is displayed in the error log:11:29:04. 11 spid51 error: 823, severity: 24-day status: 211:29:04. 11 spid51 I/O error (Audit Fail
From:http://www.cnblogs.com/kissdodog/p/3173421.htmlTriggers can do a lot of things, but it also brings a lot of problems. The trick to using it is to use it at the right time, rather than using it at an inappropriate time.Some common uses for triggers are as follows:
Elastic referential integrity: Implements operations that many DRI cannot implement (for example, referential integrity across databases or servers, and many complex relationship types).
Create a divine trace: This mea
generated. enabling this trace mark will make log backup no longer recorded in error logs.
Trace Flag 4199
All KB patches take effect for the query analyzer behavior modification. This command is dangerous and may be called as performance degradation. for details, see:
http://support.microsoft.com/kb/974006Trace flag should not be enabled in the production environment
Trace Flag 806 Check the logical consistency of pages during reading. the following information is displayed in the error log:
Tags: blog http io using ar strong for data spTriggers can do a lot of things, but it also brings a lot of problems. The trick to using it is to use it at the right time, rather than using it at an inappropriate time.Some common uses for triggers are as follows:
Elastic referential integrity: Implements operations that many DRI cannot implement (for example, referential integrity across databases or servers, and many complex relationship types).
Create a divine trace: This means tha
Tags: blog http io using AR java Strong for dataTriggers can do a lot of things, but it also brings a lot of problems. The trick to using it is to use it at the right time, rather than using it at an inappropriate time.Some common uses for triggers are as follows:
Elastic referential integrity: Implements operations that many DRI cannot implement (for example, referential integrity across databases or servers, and many complex relationship types).
Create a divine trace: This means t
Background: Customer asset management projects are divided into desktop applications and PDA handheld applications, handheld applications that read information about electronic labels on assets, and are stored locally in SQL Server CE, but for statistical reports and related audit queries, SQL
Background: Customer asset management projects are divided into desktop applicationsProgramAnd PDA handheld applications, handheld applications read information about electronic tags on assets, and save it in the local SQL Server ce, but in order to carry out statistical reports and related audit queries, data in SQL
Windows authentication whenever possible. Windows has reliable authentication options, including password policies, but Windows authentication is not always feasible in real applications. SQL Server Authentication can embed some of the features of Windows authentication, but it is less secure.
Windows authentication
If you configure your SQL
established index involves the fields that are infrequently updated, and frequent reads and writes do not affect the efficiency of the update.
8, the above is the idea of optimization, and finally some optimization process or system design needs attention to the problem.
A, try to avoid using the SELECT * from XXX where ABC like '%XXX ' type of fuzzy query, because% in front of the words is unable to use the index, will inevitably cause a full scan operation. You should find a workaround or us
does not want the operating system administrator to log on to the database through the operating system, he or she can delete the system account "BUILTINAdministrators" in account management. However, the result is that once the sa account forgets the password, there is no way to restore it. Many hosts use database applications for simple functions such as query and modification. Please assign accounts as needed and grant only the permissions that meet the application requirements and needs. Fo
SQL Server Performance Tuning entry (graphic version)
Step 1: capture sample data during business peaks(About 2 hours ). The tool used is the profiler that comes with sqlserver, also known as the event probe. For example, after entering, click the button on the leftmost side to create a new trail: DBO permission is required for logon, therefore, you can log on wi
returned.User Logon account ID number uid suser_idUser Username: User suser_nameUser Database ID number uid user_idUser Database Name User user_nameCurrent user CURRENT_USERUser Environment (audit trail) userenv N/Level N/A in the connect by clause
Aggregate functions
Functions: Oracle Microsoft SQL ServerAverage AVGCount countMaximum MaxMinimum minStandard De
Step 1: capture sample data during business peaks(About 2 hours ). The tool used is the profiler that comes with sqlserver, also known as the event probe, such:
After entering, click the left button to create a new trail:
DBO permission is required for logon, so you can log on with SA or use Windows integrated authentication (if you are currently logged on to sqlserver)
Create a trail. A total of four t
has only one T-SQL statement. In this case, the complete set of statements is fairly small. Now it is assumed that there are multiple statements in the procedure, and some of these procedures use other statements to invoke other procedures. Collecting all this extra data now becomes a very powerful load on the system. In the production machine must be used with caution. Now go back to the event selection panel and only the events that have been selec
set of statements is fairly small. Now it is assumed that there are multiple statements in the procedure, and some of these procedures use other statements to invoke other procedures. Collecting all this extra data now becomes a very powerful load on the system. In the production machine must be used with caution.Now go back to the event selection panel and only the events that have been selected will be displayed. If you want to display all the events available for selection, simply select the
SQL Server Profiler is a performance monitoring tool for MS SQL. You can use this tool to find the SQL statements to be optimized, and then use the database engine optimization advisor tool to help optimize the database.
SQL Server
specified instance: program FilesMicrosoft SQL Server mssql$ Sqlstp.log, Sqlsp.log and Setup.iss in the install directory.
If the current system was upgraded from a SQL Server 7.0 installation, you should also check the following files: The Setup.iss in the%Windir% directory and the Sqlsp.log in the Windows system te
applications, data validation addresses, and database lock Publishing.
This article is intended for the following professionals: 1. network application developers dealing with databases 2. Security experts with audit responsibilities for network applications.
[Introduction]
Structured Query Language (SQL) is a structured language used in combination with related databases. there are many types of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.