Online Safety Community


SSIS includes two special tasks that enable you to query system information and monitor system events: the WMI Data Reader Task and the WMI Event Watcher Task. These tasks are especially useful for system management, as you will discover with examples later in External Management and WMI Task Implementation Topic. WMI uses a specialized query language known as WQL, which is similar to SQL, to obtain information about a Windows system. WMI has many features and capabilities, so we won’t be able to cover all of them, but here are a few common uses:

  • You can get information about files and directories, such as file size, or enumerate the files in a folder. You can also monitor the file system for events, such as whether a file has been modified recently. This could be required in a package if your package is importing data from a CSV or XML file. A change in the file could trigger tasks to fire in your package.
  • You can determine whether an application is currently running. In addition, you can find out how much memory that application is using or how much processor time it has used. This is useful if your package needs to know whether a companion process is running before creating some sort of output result.
  • You can obtain information about users in Active Directory, such as whether a user is active or has certain permissions to a resource. This is useful in a package if information about a user or machine on the network is required for your package’s execution.
  • You can control services that are running on a computer system and actually start and stop them as required. This is useful if your package needs to stop a service during a data transfer.

This is just a small sample of the information you can glean from a computer system. You can obtain information not only about the current system but also about remote systems. As you can see, this gives you access to a great deal of information that could be used in the execution of an SSIS package. For example, you could determine if enough disk space existed on a drive before copying a backup file from a remote system to the current system. You could also monitor a file for updates and automatically import the changes into a database table. Later in External Management and WMI Task Implementation Topic you will see how to actually implement these two examples. For more information on the WMI system, visit HTTP://MSDN.MICROSOFT.COM/ENUS/LIBRARY/WINDOWS/DESKTOP/AA394582(V=V....

Article Credits: Mindmajix

Views: 14

Reply to This

Take our poll!

Take our poll!

Latest Activity

Rachel Min posted a blog post
Profile IconJeff Pacheco, KATE KWAME, Rob Minjock and 2 more joined Online Safety Community
John Robinson posted a blog post

Learn any professional courses for $10 only

Want to enhance your regulatory compliance career by learning a new course? All that it costs is $10. Yes, GlobalCompliancePanel, a provider of professional trainings, is offering hundreds of high value regulatory compliance courses for a mere $10 each.…See More
Adam Fleaming posted a blog post

The GDPR differs Significantly from EC Data Protection Directive 95/ 46

The General Data Protection Regulation (GDPR), which has been codified as Regulation (EU) 2016/679, is a very powerful law regarding the protection of data of the half billion people who live in the European Union (EU). Having come into effect as a result of the European Commission having adapted the proposal for its creation on January 25, 2012; it will replace Directive…See More


Safety - A Prerequisite 11 Replies

Whether working at home or outside, to observe safety should be our pre-requisite. The employer before anything must be sure of the safety of its employees especially the ones working in mines or any…Continue

Tags: products, safety

Started by Enna Henry. Last reply by Tara safe on Wednesday.

Lean Six Sigma Black Belt Training in New York City

Welcome to MSys Training! We thank you for visiting MSys LSSBB training page. Attend our 4 days Lean Six Sigma Black Belt (LSSBB) training program with 100% pass rate, high quality course material,…Continue

Tags: sigma, six

Started by rodriguezcecelia Aug 11.

ITIL Certification Training - MSysTraining

The ITIL® Foundation is an entry level qualification in Information Technology industry. It gives participants information about the key elements, terminologies and concepts used in the ITIL Service…Continue

Tags: itil

Started by rodriguezcecelia Aug 8.

Snowflake and Star Schema in Qlikview

In big name schema all of the facts are stored in one important table and the usage of number one key and overseas key courting different measurement tables are related with the fact desk.SNOWFLAKE…Continue

Tags: processing, transactional, qlikview

Started by Soujanya Naganuri Jul 25.

What is Class Structure in Pega?

Class contains the rule by way of which objects behave. outline rules such as houses, sports, flows, html paperwork, etc. to be had to different subordinate classes. lessons are organized into a…Continue

Started by Soujanya Naganuri Jul 17.



© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service