Table entries got deleted  ,how can we find who has deleted these entries

Hi Team,
We are using ECC6 /Oracle,few days back 2000 entries got deleted from one table.
How can we get the log for deleted entries with all the details like User ID ,Date and time of Deletion.
I have already checked STAD and DBACOCKPIT for SQL queries of deletion of records but could not find any log .
Kindly help me to resolve this issue.

Yes, under controlled situation, you can find some information(at least date and time with what was deleted) even if deleted from SQL level.
You can use ORACLE's log miner - Using LogMiner to Analyze Redo Log Files
Or have a look at this note: 1128990 - Using Oracle Logminer with Oracle >= 10g
Regards,
Divyanshu

Similar Messages

  • How to find who has deleted the query in Production system

    I Experts,
    I have an issue. Someone has deleted one query in Production system.
    How can i find who has deleted the query??
    I searched the ans for the same i the below threads :-
    Query deleted in production
    How to find out who has deleted the production Query
    But it didn't help me as i couldn't understand how to use the transaction SLG1.. Can Someone please explain me how can i find out who has deleted the Query..
    Regards,
    Pavan Raj

    Hello,
    Please, remember the date on which date the query has seen last time  in the production server. You can use the last date in the From date and To date would be current  date and execute the SLG1 tcode. It would list you all the logs in the Object text you can search for BEX Query designer and sub object text column you can check for delete logs options.
    Double click on the object will list you the query and name. From the user column you can find who has deleted the query.
    Might be this can help you for analysis.
    Thanks
    Geeta Sharma

  • How can I find who deleted my files?

    Hello all.
    In my local network, A user see my share partitions and files then removed them, How can I find who did it?
    THanks.

    This question is duplicated (and answered) in:
    how can track who deleted file/folder from Windows Server 2008
    regards

  • I think my computer was hacked, how can I tell who has been using my account?

    I think my computer was hacked, how can I tell who has been using my account?

    Hi sandys98368807,
    Do you see any unusual activity on your system?
    If you are worried about your Adobe account, i would recommend you to change your Adobe password as soon as possible.
    Please let me know if you have any other query or need any further assistance.
    Regards,
    Rahul

  • How can we find the some deleted record..

    Hi
    In my server one of the source system is deleted. i want to findout who was deleted that source system.
    Thanks
    Regards

    Hi,
    run transaction slg1, use object RSAR and subobject METADATA. Specify a date and time range and run the program.
    regards
    Siggi

  • How to find who has deleted pograms .

    Hi experts.
    Suppose U have created  a program and after certain time you found that, the program is deleted by some one and now it does not exits.
    In this case, how can one found that who has deleted the program by using the program name.
    I mean there must be a table which keeps the record of all deleted objects or there must be a transaction from which we can know this.
    Waiting for reply.

    Hi all .
    The serveron which I work, I think versio history is not maintained or I might have not created any version.
    And the table VRSD keep the record of changes only and of the deleted entires.
    please let me know some other solutions

  • How to find who has deleted program

    Hi,
    Some one has delete a report from the system.How can I find the user who has deleted?
    thanks

    Hi ,
    Please refer the threads,
    How to find who deleted my program?
    How to find deleted program
    Best Regards.
    Reward points if it is helpful.

  • How can you tell who has FaceTime?

    My brother called me on FaceTime a couple of weeks ago. He said that he'd "opened FaceTime, saw you were on and figured I'd say hi." How could I tell who has FaceTime and who doesn't, and how someone who has it is "on"?
    I have Mac OS X Lion 10.7.5, as well as iPod Touch 6.1.5

    Suddenly there are people sharing my library,
    How do you know?
    but they do not show up under "Shared" on my side bar.
    That shows libraries that others are sharing. It does not show who is connected to yours.
    There's an AppleScript I saw somewhere to show who is connected to your shared iTunes library.
    Try www.dougscripts.com

  • How can I find and save deleted messages on my Mac?

    i am searching for ddeleted messages on my Mac and I can't find them.  If they are attainable, how do I save them?

    Hi,
    Presuming the Post is about the Messages app and iMessages.
    If you delete them they are gone or the Mac.
    An iMessages arrives  and is displayed in the App.
    there is a setting in the Preferences > General section about Saving on Close.
    The iMessages are also stored in the chat.db items (unless deleted) and this provides the "history" when you reconnect to a contact who is not currently on display in the main window.
    In Mavericks Saved Chats and the chat.db items (there are three in total) are held in different places.
    The app does not work like Mail where the emails can be left on the Server and "read" by other devices.
    The iMessages are pushed to the devices that then accepts them.
    After that the "sync" function ends (What you do with the iMessages on one device is not seen or changed on another)
    9:54 pm      Friday; October 31, 2014
    ​  iMac 2.5Ghz i5 2011 (Mavericks 10.9)
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb (Snow Leopard 10.6.8)
     Mac OS X (10.6.8),
     Couple of iPhones and an iPad

  • How can I find and permanently delete an address card?

    Bought a new MacBook for my wife. Our server informed her that it could not send an email out with this address <tomjones-comcast.net>. Obviously a error. She corrected it but because she was unfamiliar with the process, she created a new address card as well. Now, however, when she addresses an email, the old one still shows up in scroll. She deleted the card but the old address still showed up.
    I used the find command under the File menu with the old email address and discovered where it was located: Home/Library/Caches/com.apple.AddressBook/MetaData
    where it was identified: 11C34DF1-16DA….etc etc.
    I found it in MetaData and dragged it to trash. (later I emptied the trash)
    It still shows up, however, but neither Spotlight or Find can locate it.
    How I can find it and delete it?

    Since the address was incorrect, the email was never sent. The name doesn't appear in the recipient file.
    Since I entered my question at the group, my wife lost all - mail program and alll addresses. I've rebuilt it all with the correct address this time and all is well.
    Thank you.
    By the way I found all the addresses in the Trash in 5 "recovered" folders. Quite neat.

  • How can I find who deleted a request from an ODS?

    Hello
    Can you please help me in finding who deleted a request from an ODS? I whould like to find the user ID of the person who deleted the request form the ODS.
    Thank you
    Ramona

    Hi Ramona,
    Goto Tcode: STAD or SM21 and u can find the necessary thing what u want.
    In SM21, give the appropriate dates or the user id and execute.
    In STAD, give the appropriate dates or the user id and execute.
    Both the transactions are similar.
    Assign points if this helps u...
    regards,
    KK.

  • My ipod got stollen, how can i find it?

    I GOT MY IPOD TOUCH STOLLEN, HOW DO I FIND IT?

    hope this helps
    What To Do If Your iDevice or Computer Is Lost Or Stolen
    If your Mac, iPhone, iPod, iPod Touch, or iPad is lost or stolen what do you do? There are things you should do in advance - before you lose it or it's stolen - and some things to do after the fact. Here are some suggestions:
    Reporting a lost or stolen Apple product
    What-To-Do-When-Iphone-Is-Stolen
    Lost or Stolen iPhone? Here’s What to do.
    6 Ways to Track and Recover Your Lost/Stolen iPhone
    It pays to be proactive by following the advice on using Find My Phone before you lose your device:
    Find My iPhone
    Setup your iDevice on MobileMe
    OS X Lion- About Find My Mac
    How To Set Up Free Find Your iPhone (Even on Unsupported Devices)

  • How to find who has deleted the objects in 10g

    All,
    On 10th feb i have created a sequence (M_KEY_SEQ) as per my user request.
    But i could not find the sequence in the database now, Could any one please tell me
    how to find out ..who has dropped the sequence, (looks like some drop actions has been carried out from my user side, we suspect those drop jobs might dropped this sequence but we dont have correct information about who has dropped it..so we cant tell them that you have dropped).
    Any suggestions please...
    No auditing enabled in our database.

    If you dont mind ..could you please explain me how to use DBMS_LOGMINER to find out the deleted sequences

  • How can i find who change transaction mode in system

    hi Experts,
    here i need some guide lines from you
    in my production some one changed my sap-mm  transaction status from display mode to change mode now i need to trace out who changes that status .
    please reply me how can i trace which user changes that status
    Regards

    Hi,
    If you are asking in regards to change of transaction values in particular role, you can get the details from SUIM t-code.
    Go to SUIM--> expand change documents and click on role and provide the details (select overvie of change documents under change document header in that screen)and execute.
    you get the details when ever the role was changed and on what dates and by whom.
    Hope that helps you, if not please provide more details on what exactly you require.

  • How can I trace who has hacked iPad

    I have just bought a new iPhone and used facetime for the first time with a friend using their ipad (supplied by work).
    A few days later I received a strange facetime call,  supposedly from my friend, showing just a black screen and no one talking. A few minutes later I  received (malicious) imessages on my iPhone. The senders name appears on the message as the same friend I facetimed. My friend is NOT the person sending the messages!!! 
    I have subsequently facetimed my friend again a couple of days later, and during the call further malicious messages came through (it's a bit scary!). How can that happen when in the middle of a facetime call to a friend, and someone else using the same email address to send nasty messages?!
    My friend is listed on my contacts showing his phone number (non-apple), and the email address designated to his ipod by his workplace.
    My friend's only apple device is the iPad supplied by his place of work. The ipad is connected to all their other work ipads (maybe by some cloud connection?), so the messages have appeared on all their ipads. I am now given to understand all the workplace ipads use the same email address (or rather I presume, the same Apple ID). The hacking can only be connected to that email address and/or facetime connection.
    My friend is now under investigation by his workplace, and we are tasked with having to prove my friend's innocence!
    The workplace IT department have taken my friend's ipad and are making their own investigations. I don't know what protocols they may have in place or tracebility there might be. Are there specific questions we can ask the IT department to ensure they check all they should be doing?  I don't know how the facetime/messaging works regarding traceability - should IT be able to trace anything by packet recordings, IP adresses or some other methods?
    What can we do from our side? Are there any suggestions?

    If all of the iPads at your friend's workplace are using the same AppleID, anyone who had it could have used it maliciously or given the information to an unauthorized person.
    You were tasked by whom to prove your friend's innocence? What is your standing in this matter? The IT department will do its investigation. Your friend should consult their employee handbook for their options regarding privacy, use of company devices, and recourse if accusations are made.
    Best of luck.

Maybe you are looking for