Difference between ETL vs. ELT Basics ETL ELT Process Data is transferred to the ETL server and moved back to DB. High network bandwidth required. Data remains in the DB except for cross Database loads (e.g. source to object). Transformation Transformations are performed in ETL Server. Transformations are performed (in the source or) in the target. Code Usage Typically used for Source to target transfer Compute-intensive Transformations Small amount of data Typically used for High amounts of data Time-Maintenance It needs highs maintenance as you need to select data to load and transform. Low maintenance as data is always available. Calculations Overwrites existing column or Need to append the dataset and push to the target platform. Easily add the calculated column to the existing table. Analysis
Below are the lists of various types of enumerators provided by SSIS Foreach Loop Container: Foreach File Enumerator : It enumerates files in a folder. The plus point here is it can traverse through subfolders also. Foreach Item Enumerator : It enumerates items in a collection. Like enumerating rows and columns in an Excel sheet. Foreach ADO Enumerator : Useful for enumerating rows in tables. Foreach ADO.NET Schema Rowset Enumerator : To enumerate through schema information about a data source. For example, to get list of tables in a database. Foreach From Variable Enumerator : Used to enumerate through the object contained in a variable. (if the object is enumerable) Foreach NodeList Enumerator : Used to enumerate the result set of an XML Path Language (XPath) expression. Foreach SMO Enumerator : It enumerates through SQL Server Management Objects (SMO) objects.
There are 6 different types of protection levels. Do not save sensitive – (When exporting using DTUTIL specify for protection- 0) Encrypt sensitive with user key – 1 Encrypt sensitive with password – 2 Encrypt all with password -3 Encrypt all with user key – 4 Rely on server storage Do not save sensitive: makes the sensitive data unavailable to other users. If a different user opens the package, the sensitive information is replaced with blanks and the user must provide the sensitive information. Encrypt sensitive with user key: Uses a key that is based on the current user profile to encrypt only the values of sensitive properties in the package. Only the same user who uses the same profile can load the package. If a different user opens the package, the sensitive information is replaced with blanks and the current user must provide new values for the sensitive data. If the user attempts to execute the package, package execution fails. Encrypt sensitive with password:...
Comments
Post a Comment