Our database is growing-should I be concerned?

Our database is growing about 500 meg per day. I have provided graphicals of our production database and our test database which is a clone of production but was loaded some time ago. 
The top chart is production: Our index is double the size of data-does that make sense and is it a design flaw?
The second is Test. It gets a tiny percentage of the use of production:
The index is considerably smaller.

Its hard to guess.
You can rely on sp_spaceused and see the difference.
The following query can tell you what data is scattered across different files. If you are running short of space why don't you add space as per the estimation.
https://technet.microsoft.com/en-us/library/ms189051%28v=sql.105%29.aspx
select
OBJECT_NAME(p.object_id) as my_table_name,
u.type_desc,
f.file_id,
f.name,
f.physical_name,
f.size,
f.max_size,
f.growth,
u.total_pages,
u.used_pages,
u.data_pages,
p.partition_id,
p.rows
from sys.allocation_units u
join sys.database_files f on u.data_space_id = f.data_space_id
join sys.partitions p on u.container_id = p.hobt_id
where
u.type in (1, 3)
--Prashanth

Similar Messages

  • Strange Mobile device tried to connect to my iMac via Bluetooth! Should I be concerned?

    I woke up this morning with a pop-up message saying that a mobile device tried to pair with my system but was rejected most likely from an incorrect password. I've always had "bluetooth" enabled. Never used it though, I have a wired mouse and keyboard. I never thought about possible threats occuring from this until now. I originally had all default settings turned on for bluetooth but no sharing enabled. I clicked off "discoverable" and turned bluetooth off altogether. My concern is that I am seeing a "T-Mobile myTouch Q" Smartphone in the list. I don't own this type of phone. I've never had a t-mobile phone or know anybody who does. I tried to "browse" the device but I get an error. I am unable to remove the device from my list.
    It doesn't appear to be connect or ever have been connected to my knownledge but I would like it taken off.
    Is there any way somebody can hack your iMac via a mobile device? I went on a researching rampage this morning but am unsure of what to think at this point. If bluetooth only operates up to 30 feet of range, who could possibly have wanted to connect at 4-5 am in the morning? Also, if they were paired, exacly what information can they gain from being paired via bluetooth to a mobile device?
    Should I be concerned about this? I have Mac firewall enabled in stealth mode. Have Sophos installed and up to date and running. All sharing is turned off. What else can I do and how can I remove this device from the list so I can use bluetooth in the near future without any worries?
    Thanks for any help!

    WZZZ wrote:
    Csound1 wrote:
    Bluetooth is very limited, in range (20 to 40ft on a good day)....
    The Bluetooth on my wife's iPad, before I turned it off, put out a signal much further than that. Out of curiosity, I took it down to the lobby of our building, easily a hundred feet or more--just guessing--through one floor and a number of walls. It was still getting a healthy signal there. Maybe the Mac's Bluetooth isn't so powerful. Probably depends on the device being used. I know if I move my mouse not far away from the Mac the connection is quickly lost.
    That is an extraordinary connection distance for BlueTooth, did you happen to investigate the data rate at that range?
    This really only applies to older Blutooth devices (so should exclude an iPad)
    Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation.[citation needed] Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do.[clarification needed]
    The spec for Bluetooth is a bit vague but here is some general info.
    But wireless is a bit like playing Roulette

  • Should we be concerned about this?

    We were reading about this virus that effects 10.5.6 here.
    Should we be concerned about it? How real is it? Thanks.

    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:
    http://www.clamxav.com/
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More information on Mac security can be found here:
    http://macscan.securemac.com/
    The MacScan application can be downloaded from here:
    http://macscan.securemac.com/buy/
    You can download a 30 day trail copy which enables you to do a full scan of your hard disk. After that it costs $29.95.
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    As to the current 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially *********** sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications.

  • Should I be concerned about these permisions?

    Hi,
    As I keep trying to avoid the kernel panics in my MBP, everytime I run repair permission I get the following:
    Repairing permissions for “Macintosh HD”
    Reading permissions database.
    Reading the permissions database can take several minutes.
    Permissions differ on "System/Library/Frameworks/CoreVideo.framework/Versions/A/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/Components/AudioCodecs.component/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/Components/CoreMediaAuthoringPrivateComponents.component/Conten ts/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PrivateFrameworks/CoreMediaAuthoringPrivate.framework/Versions/ A/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PrivateFrameworks/CoreMediaPrivate.framework/Versions/A/CodeRes ources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/QuickTime/AppleProResDecoder.component/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTMediaKeys.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTMime.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTTransport.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTPlugIn. prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTRegiste r.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTRegiste r.prefPane/Contents/Resources/QTAbout.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTStreami ng.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTUpdate. prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    No matter how many times I repair permissions, the same thing keeps popping up. Should I be concerned?
    Thanks..

    No, that's fine. Permissions Repair in Leopard is somewhat 'broken'.
    http://support.apple.com/kb/TS1448
    If you uncheck the Show Details box, those minor (unrepairable) errors won't show up, only major ones.

  • HT204053 We have apple computer and set up 1 apple id and for music on iPods.  Now we have 3 apple phones and want to share the music but keep our contacts separate. what should we do.

    We started with an apple computer and set up 1 apple id and for music on iPods.  Now we have 3 apple phones and want to share the music but keep our contacts separate. what should we do? Right now we have the same apple id on the PC, ipodtouch, ipod, and 3 phones.  They said make seperate clouds?

    Hello there MizzouTrojan,
    If I understand correctly you want all 6 devices to have access to a single calendar that each device gets notifications for and can edit. You can do that with an private iCloud shared calendar. First sign into www.icloud.com and use these steps from the following article to share a calendar:
    iCloud: Share a calendar with others
    Share a calendar privately
    Click the Share button to the right of the calendar name in the sidebar, then select Private Calendar.
    Note:    You can also share the same calendar publicly. For instructions, see the next task, “Share a calendar publicly.” 
    Type the invitee’s email address in the Add Person field and press Return.
    Click the pop-up menu with the invitee’s name and choose access privileges (View & Edit or View Only). 
    For each person you want to share the calendar with, repeat steps 2 and 3.
    When you’ve invited everyone and set their privileges, click OK.
    Invitation emails are sent from your iCloud email address to the participants you specified.
    Thank you for using Apple Support Communities.
    Cheers,
    Sterling

  • Third-party cookies: Should I be concerned that I am forced to accept in order to access a site, if I delete them after every Firefox session?

    Friday 16 August, 2012
    My internet service provider (https://my.gci.net/) blocks my entry to eMailGuard (a GCI spam and virus isolator) when I have third-party cookies disabled
    When I allow third-party cookies I am able to access eMailGuard. I have used GCI eMailGuard and Firefox together for years and have had no such difficulty in the past.
    This problem commenced 2-3 weeks ago.
    I have followed all directions at http://support.mozilla.org/en-US/kb/websites-say-cookies-are-blocked-unblock-them to clear all cookies and cache, with no change. Also, my default setting (see below) is to “Clear history when Firefox closes.” If I understand correctly, clearing history will also clear cookies and cache, so I do it every time I close Firefox.
    Has Firefox changed third-party cookies parameters recently? GCI of course claims this is a browser issue. Should I be concerned about third-party cookies if I delete them after every Firefox session? Any comments or thoughts are greatly appreciated.
    My current version is Firefox v.14.0.1
    My Privacy settings are:
    • Tools\Options\Privacy
    • Use custom settings for history
    My selected (checked) custom settings are as follows:
    • Remember my browsing history
    • Remember download history
    • Remember search and form history
    • Accept cookies from sites (third-party cookies not selected)
    • Keep until: I close Firefox
    • Clear history when Firefox closes
    Thanks,
    James Lavery
    Anchorage, Alaska
    ISP my.GCI.net

    ''Keep until: I close Firefox''
    That's what I use for all cookies. If you start a new session every time you start Firefox, i.e., you don't resume the same session over and over, websites cannot track you 'across sessions' using cookies; you are a new person to them during each session (unless/until you log in).
    Note that "Flash cookies" need to be managed separately.
    As for this particular site, if you want to spend some time research it, you could install an add-on such as Firebug or the external Fiddler2 proxy. Both will show you each request made by the browser when you load a page. Then you can see which third party sites are involved and if you like make a specific entry to allow them in the Exceptions dialog.
    * https://addons.mozilla.org/en-US/firefox/addon/firebug/
    * http://www.fiddler2.com/fiddler2/ (more difficult to use for HTTPS sessions)

  • Model Number you have entered is not listed in our database. windows 7 upgrade

    i have purchased a Compaq Presario cq61 on the 24/07/09 (uk date) it came with vista home premium and it is in the eligible list on the hp support site for the windows 7 upgrade, but when i enter my serial number and product number into the arvato site, it says "We are sorry, but the Model Number you have entered is not listed in our database. "  i cannot see how this is possible as i meet the specifications to be able to upgrade to windows 7, what do i do?

    Please see: http://www.hp.com/country/us/en/mda/windows7/upgrade/index_ww.html to select your correct country or region.
    Carey Frisch
    Microsoft MVP
    Windows Expert - Consumer

  • Into my download stack which appears to be a Facebook login page to someone who is not me but has my e/mail as the primary account,should I be concerned?

    I have clicked on a link received in my e/mai which has put a download  into my download stack which appears to be a Facebook login page to someone who is not me but has my e/mail as the primary account,should I be concerned?

    I would do the following just to be safe.
    Change your email password so anyone trying to use your email address won't be able to or delete that email address from where ever you got it after getting a new one.
    I would trash the download.

  • Offset printing- should I be concerned

    I'm printing a magazine and exporting it as press quality. When I do so, it says I have overset text on so and so pages. Now does this mean the printer from the place I am printing it on will not print the text that lies outside of the margins? Or what?
    Is there a way around this. For example, could I convert it to a jpeg and bring it in to indesign and place it in it's position. I guess I'm thinking a printer does graphics on the page and then it goes back over it and applies the text parts. I don't understand how it is capable of printing the graphics but not the text that lies outside of the margin, if in fact that is how it works. Any help is appreciated. Thanks

    For offset printing, you should be very concerned about fixing overset text.
    What you see on the page with Preview mode is how it will print. If you don't see the text (and you won't see the hidden overset text), and it will not be part of your publication!
    Use the Preflight panel to find and fix your overset text. If it's just a line not showing up, expand the text frame. Otherwise, you may have to change the size of the text or change your layout.

  • My desktop (27inch Mid 2011) is running very hot to the touch - should I be concerned?

    desktop (27inch Mid 2011) is running very hot to the touch - should I be concerned?

    Likely not but without specific information it's impossible to say. Please download a OS X temp monitoring app and reply with actual tempratures.

  • My ipad air charging plug is getting hot. Should I be concerned?

    My original iPad Air had to be replaced because of a hardware problem. Then my charging cord also had to be replaced. Now I am noticing that my charging plug is getting hot. Should I be concerned? Thanks. This is the plug on the end of the charging cord that came with my iPad, of course.

    Make sure you are using the 10W/12W charger.
    5W charger will get hot if you use it to charge the iPad.

  • CAM Event Log: SNMP trap is received from switch [ ip address ] which is NOT in our database.

    We keep getting thousands of entries in the CAM event log like this:
    SNMP trap is received from switch [<ip address>] which is NOT in our database.
    apparently, these aren't NAC'd switches. Why does the CAM see these and how can they be eliminated from the Event Log?
    Thanks,

    Matt,
    Do you switches have the CAM as a host where they are sending traps? Check the running-config of the servers and see if you spot the CAM IP address as one of the snmp-servers.
    HTH,
    Faisal

  • Is their,Query to find the which tempfile our Database currently using ?

    Hi All,
    Is their,Query to find the which tempfile our Database currently using ?
    Regards,
    DB

    select property_name,property_value from database_properties where property_name like '%TABLE%';
    John Watson
    Oracle Certified Master DBA
    http://skillbuilders.com
    Edited by: JohnWatson on May 14, 2013 12:27 PM
    (assuming that you mean temporary tablespace rarther thsn tempfile)

  • Should I be concerned with these temperatures?

    While gaming on my new 13" MBP, the fans take a few minutes to respond. After about 5 minutes, I've seen temps of over 100 C on the CPU before the fans kick in. Once the fans spin up, the CPU seems to stabilize around 84 C.
    It's not uncommon for me to play for 3 or 4 hours straight, should I be concerned about these temps?
    edit: temperatures according to istat nano v2.2, laptop on flat surface.
    Message was edited by: Zerohm
    Message was edited by: Zerohm

    to manually bump the fan speeds up when temps are getting hot, download and run this application:
    http://www.eidac.de/?cat=40
    It is called smcFanControl and many of the people on this forum use it. I use it on my MBPro 15" to bump my fans up just to be on the safe side.
    The current version allows you to select different fan speed profiles based on whether you Mac is charging, on battery power, or on AC power.
    Very usefull APP.

  • In finder under under shared "owner-vio" is listed.  What is this?  Should I be concerned?

    In finder under under shared "owner-vio" is listed.  What is this?  Should I be concerned?

    Mike, thanks for turning me onto that Apple Support article.  My aging MacBook has been a good computer.  Recently it has had a few problems which required me to erase and restore everything.  I suppose I'm trying to treat it gently by doing more frequent maintenance on the disk health.  I thought doing an occasional repair permissions was in keeping with a more active preventative maintenance attitude. This way of thinking may be completely wrong on my part. If you could suggest other ways to promote healthy MacBook aging I'm all ears. I think I know one way is to try to use only up to 75% of it's memory capacity, but currently I'm at about 90%.
    DH(geturdone)

Maybe you are looking for

  • Adding org.w3c.dom.Node

    Hi, can someone please tell me if it is posible do read a org.w3c.dom.Node from one XML file, and than add it to another? Or is there a way to copy one org.w3c.dom.Node to another XML? Thanx, Alan.

  • Understanding what HD i/o cards and converters are really for

    Hi, Just getting into the HD realm, I need some type of basic understanding of what 3rd party HD i/o and HD converters are use for. Sorry for the ignorance, but after viewing discussions and going to vendor websites such as Kona, BlackMagic, I am sti

  • How can I get my music on iTunes on my new computer?

    I just got a new computer because my old one totally died. All I want to do is get my iTunes on my new computer to have all my music on it, just like it was on my previous computer. I have an first generation iPod Touch, 16GB.

  • Reg: WebDynpro Adobe Interactive forms

    Hi Experts,       I am using an application where i have 2 screens, First screen I have a button Create, when i click on Create a new window with interactive form opens where I have an Adobe form in Editable mode, here i need to enter data and save w

  • List to address book

    Hi I have a new mac mini and I what to convert a list of names and emails and put them in my address book and the conversion is proving to be troublesome. Thank you Dan