zoukankan      html  css  js  c++  java
  • 死锁分析

    --死锁文件查询
    DECLARE @SessionName SysName 
     
    SELECT @SessionName = 'system_health'
     
     
    IF OBJECT_ID('tempdb..#Events') IS NOT NULL BEGIN
        DROP TABLE #Events
    END
     
    DECLARE @Target_File NVarChar(1000)
        , @Target_Dir NVarChar(1000)
        , @Target_File_WildCard NVarChar(1000)
     
    SELECT @Target_File = CAST(t.target_data as XML).value('EventFileTarget[1]/File[1]/@name', 'NVARCHAR(256)')
    FROM sys.dm_xe_session_targets t
        INNER JOIN sys.dm_xe_sessions s ON s.address = t.event_session_address
    WHERE s.name = @SessionName
        AND t.target_name = 'event_file'
     
    SELECT @Target_Dir = LEFT(@Target_File, Len(@Target_File) - CHARINDEX('', REVERSE(@Target_File))) 
     
    SELECT @Target_File_WildCard = @Target_Dir + ''  + @SessionName + '_*.xel'
     
    --Keep this as a separate table because it's called twice in the next query.  You don't want this running twice.
    SELECT DeadlockGraph = CAST(event_data AS XML)
        , DeadlockID = Row_Number() OVER(ORDER BY file_name, file_offset)
    INTO #Events
    FROM sys.fn_xe_file_target_read_file(@Target_File_WildCard, null, null, null) AS F
    WHERE event_data like '<event name="xml_deadlock_report%'
     
    ;WITH Victims AS
    (
        SELECT VictimID = Deadlock.Victims.value('@id', 'varchar(50)')
            , e.DeadlockID 
        FROM #Events e
            CROSS APPLY e.DeadlockGraph.nodes('/event/data/value/deadlock/victim-list/victimProcess') as Deadlock(Victims)
    )
    , DeadlockObjects AS
    (
        SELECT DISTINCT e.DeadlockID
            , ObjectName = Deadlock.Resources.value('@objectname', 'nvarchar(256)')
        FROM #Events e
            CROSS APPLY e.DeadlockGraph.nodes('/event/data/value/deadlock/resource-list/*') as Deadlock(Resources)
    )
    SELECT *
    FROM
    (
        SELECT e.DeadlockID
            , TransactionTime = Deadlock.Process.value('@lasttranstarted', 'datetime')
            , DeadlockGraph
            , DeadlockObjects = substring((SELECT (', ' + o.ObjectName)
                                FROM DeadlockObjects o
                                WHERE o.DeadlockID = e.DeadlockID
                                ORDER BY o.ObjectName
                                FOR XML PATH ('')
                                ), 3, 4000)
            , Victim = CASE WHEN v.VictimID IS NOT NULL 
                                THEN 1 
                            ELSE 0 
                            END
            , SPID = Deadlock.Process.value('@spid', 'int')
            , ProcedureName = Deadlock.Process.value('executionStack[1]/frame[1]/@procname[1]', 'varchar(200)')
            , LockMode = Deadlock.Process.value('@lockMode', 'char(1)')
            , Code = Deadlock.Process.value('executionStack[1]/frame[1]', 'varchar(1000)')
            , ClientApp = CASE LEFT(Deadlock.Process.value('@clientapp', 'varchar(100)'), 29)
                            WHEN 'SQLAgent - TSQL JobStep (Job '
                                THEN 'SQLAgent Job: ' + (SELECT name FROM msdb..sysjobs sj WHERE substring(Deadlock.Process.value('@clientapp', 'varchar(100)'),32,32)=(substring(sys.fn_varbintohexstr(sj.job_id),3,100))) + ' - ' + SUBSTRING(Deadlock.Process.value('@clientapp', 'varchar(100)'), 67, len(Deadlock.Process.value('@clientapp', 'varchar(100)'))-67)
                            ELSE Deadlock.Process.value('@clientapp', 'varchar(100)')
                            END 
            , HostName = Deadlock.Process.value('@hostname', 'varchar(20)')
            , LoginName = Deadlock.Process.value('@loginname', 'varchar(20)')
            , InputBuffer = Deadlock.Process.value('inputbuf[1]', 'varchar(1000)')
        FROM #Events e
            CROSS APPLY e.DeadlockGraph.nodes('/event/data/value/deadlock/process-list/process') as Deadlock(Process)
            LEFT JOIN Victims v ON v.DeadlockID = e.DeadlockID AND v.VictimID = Deadlock.Process.value('@id', 'varchar(50)')
    ) X
    ORDER BY DeadlockID DESC

    分析查询对应资源

     waitresource="KEY: 5:72057594046054400 (cec373351f8e)"

     waitresource="KEY: 5:72057594046054400 (6ac445c1c322)"

    数据库标识:5

    索引:72057594046054400

    资源标识:"(676a346e86c4)","(36d806131fd9)"

    上面可以得出的信息:db_id=5;hobt_id=72057594046054400;keyhashvalue=(cec373351f8e)

    上面可以得出的信息:db_id=5;hobt_id=72057594046054400;keyhashvalue=(676a346e86c4)

    --查询表对应死锁资源
    SELECT * FROM [DB].[dbo].[Table1] where %%lockres%% = '(676a346e86c4)'
    SELECT * FROM [DB].[dbo].[Table1] where %%lockres%% = '(36d806131fd9)'

    参考资料:https://blog.csdn.net/kk185800961/article/details/41687209

    额外辅助信息

    --查询当前数据库执行SQL语句或阻塞SQL语句
    SELECT TOP 100
    [cpu_time],
    [session_id],
    [request_id],
    [start_time] AS '开始时间',
    [status] AS '状态',
    [command] AS '命令',
    dest.[text] AS 'sql语句', 
    DB_NAME([database_id]) AS '数据库名',
    [blocking_session_id] AS '正在阻塞其他会话的会话ID',
    der.[wait_type] AS '等待资源类型',
    [wait_time] AS '等待时间',
    [wait_resource] AS '等待的资源',
    [dows].[waiting_tasks_count] AS '当前正在进行等待的任务数',
    [reads] AS '物理读次数',
    [writes] AS '写次数',
    [logical_reads] AS '逻辑读次数',
    [row_count] AS '返回结果行数'
    FROM sys.[dm_exec_requests] AS der 
    INNER JOIN [sys].[dm_os_wait_stats] AS dows 
    ON der.[wait_type]=[dows].[wait_type]
    CROSS APPLY 
    sys.[dm_exec_sql_text](der.[sql_handle]) AS dest 
    WHERE [session_id]>50  
    ORDER BY [cpu_time] DESC
    --查看AlwaysON同步延迟时间
    SELECT Datediff(s, last_redone_time, Getdate()) DelayTimeS
    FROM   ( ( sys.availability_groups AS ag
               JOIN sys.availability_replicas AS ar
                 ON ag.group_id = ar.group_id )
             JOIN sys.dm_hadr_availability_replica_states AS ar_state
               ON ar.replica_id = ar_state.replica_id )
           JOIN sys.dm_hadr_database_replica_states dr_state
             ON ag.group_id = dr_state.group_id
                AND dr_state.replica_id = ar_state.replica_id
  • 相关阅读:
    开始准备AWS SysOps Administrator associate 认证考试,接下来的Blog都是准备过程中的知识点
    什么是 AWS Data Pipeline
    AWS WAF 的工作原理
    CloudTrail 的工作原理
    AngularJS尝鲜——快递运费计算
    IE UAF 漏洞(CVE-2012-4969)漏洞分析与利用
    学着分析CVE-2017-7269 -- IIS 6.0 WebDAV远程代码执行漏洞
    数据结构:实验六(单循环链表实现链式队列)
    EPS2.2 整数溢出漏洞分析到利用pwntools进行漏洞利用
    serialVersionUID作用
  • 原文地址:https://www.cnblogs.com/ChenRihe/p/12197973.html
Copyright © 2011-2022 走看看