Skip to main content

Temporal Tables in SQL Server 2016

Temporal, or system-versioned tables which was introduced in SQL Server 2016, allow us to go back in time and see what the data in table looked like at that point in time. We can say a system-versioned temporal table is a type of user table designed to keep a full history of data changes and allow easy point in time analysis. This type of temporal table is referred to as a system-versioned temporal table because the period of validity for each row is managed by the system.

What are the usage of Temporal Tables ?

The most common business uses for temporal tables are:

  1. Slowly changing dimensions. The temporal tables provide a simpler way to querying data that is current for a specified period of time, such as time slicing data, that well-known problem on Data Warehousing databases.
  2. Data Auditing. The temporal tables provide an audit trail to determine when data was modified in the “parent” table.
  3. Temporal tables allow you to query data as it was at a particular point in time to examine the state of the data as it was then.
  4. Analyzing trends by understanding how the data changes over time with the ongoing business activity, and to calculate trends in the way that data changes over time.
  5. Repairing or recovering record level corruptions.


How does Temporal Tables works ?


  1. When we create temporal table, it uses two tables – one for live data, the other for historical versions – to store current and prior row versions. 
  2. Temporal tables are created on a table-by-table basis, which means can choose only the tables you want to include in this versioning architecture without impacting conventional (non-versioned) tables.
  3. When designing a table that will be used as a temporal table, three things are required: 
  • A primary key.
  • A non-nullable DATETIME2 column to store the starting effective date.
  • A non-nullable DATETIME2 column to store the ending effective date.
  • When creating the temporal table, it is recommended to create the effective date columns as hidden. 


What are the limitations of Temporal tables ?

There are some requirements and limitations of temporal tables as below :

  • Every table should have a Primary Key is required .
  • A History table must be created in the same database as the current table.
  • Linked servers are not supported.
  • INSERT and UPDATE statements cannot reference SYSTEM_TIME period columns.
  • The Truncate table operation is not supported on temporal tables.
  • A System-Versioned table does not allowed any constraints.
  • We can’t modify the data in history table.


Thanks for reading
Plz dont forget to like Facebook Page..
facebook page

Comments

  1. It is truly a well researched content patio furniture and excellent wording. I got so engaged in this material that I could not wait to read. I am impressed with you work and skill. Thanks.

    ReplyDelete

Post a Comment

Plz dont forget to like Facebook Page..
https://www.facebook.com/pages/Sql-DBAcoin/523110684456757

Popular posts from this blog

History of MySQL from AB Corp to Cloud Database

MySQL was created by a Swedish company, MySQL AB, founded by David Axmark, Allan Larsson and Michael "Monty" Widenius. Original development of MySQL by Widenius and Axmark began in 1994. The first version of MySQL appeared on 23 May 1995. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter,and "SQL", the abbreviation for Structured Query Language. ·          23 May 1995 - First internal release ·          Year 1996 - Version 3 o     Simple CRUD operations o     January 1997 Windows version was released on 8 January 1998 for Windows 95 and NT o     production release 1998, from www.mysql.com ·          Year 2002 - Version 4 o     MyISAM o     unions o     Tracking o     B-trees o     s...

Configure Impersonation Authentication in IIS8 for MVC Application

Impersonation is when ASP.NET executes code in the context of an authenticated and authorized client. By default, ASP.NET does not use impersonation and instead executes all code using the same user account as the ASP.NET process, which is typically the ASPNET account. There are 5 below steps by which we can establish Impersonation configuration in our secured application environment. 1.)    Creation of Application/Proxy user where Application is hosted. 2.)    Give appropriate access to the user. 3.)    Create Database Login user on database. 4.)    Authenticate User and provide credential on IIS. 5.)    Then Configure web.config on Application.

How to add an article in Transactional Replication

If we have a set-up of Transactional Replication for Data Distribution running and wanting to add new object to replication on other server we can follow below process. To add an article In Transaction replication with PUSH Subscription