(Richard Corrihons) This document details a methodology you can use to identify the dynamic SQL statement that generated a lock escalation. It describes which traces to start, and which jobs to run to analyze the collected traces. It also explains how to analyze the trace report to find the culprit
Read More - Register for Free Membership
