Identifying suspect queries

Daily, thousands of queries execute on a Teradata database. Some queries' execution is under milliseconds; these are quick and not visible in the monitoring portlet called viewpoint. Some queries have a tendency to execute over minutes, some execute over hours. Whatever the queries are, they need to consume resources on the system. Queries that consume resources such as CPU and IO in their threshold values are classified as good or optimal queries.

Queries that over consume the resources are called suspected queries. Analysis of these queries is necessary from time to time. If these are not inspected over time it can cause the system to under perform.

Definition of and classification of these suspect queries depends ...

Get Teradata Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.