SlideShare une entreprise Scribd logo
1  sur  7
SP 2010: Find error messages with a <br />Correlation ID token in SharePoint 2010<br />Author: Tobias Zimmergren http://www.zimmergren.net | http://www.tozit.com | @zimmergren<br />Introduction<br />In SharePoint 2010, you’ve got some new capabilities for error reporting and logs. One of the most noted features for me as a developer is that whenever you bump into an error message – you’ll be presented with a correlation ID token.<br />In this article I will try to explain how you can fetch that token from SharePoint, and also provide a small snippet of code to be able to build your own “Log Searcher Web Part” for your administrators.<br />Correlation ID, what’s that?<br />In SharePoint 2010, you get a Correlation ID (which is a GUID) attached to your logs/error messages when something happens. This ID can then be used to lookup that specific error from the logs.<br />This Correlation ID is used per request-session in SharePoint 2010, and if you are in the process of requesting some information from SharePoint and bump into some problems along the way – your Correlation ID will be the best starting point for searching for what went wrong along that request!<br />You might get an error message like this in SharePoint 2010 (don’t worry, if you haven’t seen one like this one yet – just hang in there, sooner or later you will.. )<br />Search for the log messages based on the Correlation ID token<br />So if you’ve gotten such an error message and want to find out more information about the actual error and don’t have the time to go around poking in the logs and searching – there’s a few methods you can do this rather easily, as described below. <br />Using PowerShell to lookup a log message based on Correlation ID token<br />One of the quick-n-awesome ways to do this is to simply hook up a PowerShell console (SharePoint 2010 Management Shell) and then just write the following command (replace the <GUID> with the Correlation Id):<br />get-splogevent | ?{$_Correlation -eq quot;
<GUID>quot;
 }<br />This will give you the details about your specific error like this in the console:<br />You might want to be more precise and get more specific details out of your query, then you can try something like this:<br />get-splogevent | ?{$_.Correlation -eq quot;
<GUID>quot;
} | select Area, Category, Level, EventID, Message | Format-List<br />This will give you the details about your specific error like this with some juicy details:<br />Finally if you would want these messages to be put into a text or log file instead, you could just add the classic “> C:wesome.log” after the command like this:<br />get-splogevent | ?{$_.Correlation -eq quot;
<GUID>quot;
} | select Area, Category, Level, EventID, Message | Format-List > C:wesome.log<br />On MSDN they have an overvoew of using SP-GetLogEvent which I would recommend!<br />Using SQL queries to find log message based on Correlation ID token<br />You can utilize the SQL logs database to fetch the specific error message based on Correlation id as well. In your logging DB (usually called WSS_Logging, but can be called something else if you’ve changed it) there is a view called ULSTraceLog which you can query with a simple SQL query and fetch the results.<br />I’ve created a query to fetch the items from the logging database like this: <br /> select [RowCreatedTime],  [ProcessName],  [Area],  <br /> [Category],  EventID,  [Message] <br /> from  [WSS_UsageApplication].[dbo].[ULSTraceLog] <br /> where  CorrelationId=< pre>'B4BBAC41-27C7-4B3A-AE33-4192B6C1E2C5'<br />This will render your results in the SQL Query window like this:<br />This can of course be implemented in a Web Part for your convenience as well (I’ve created a bunch of diag. and logging web parts that I’ve got deployed to Central Admin) that could look like this (this way you don’t need physical access to the ULS logs all the time, but can do a quick lookup from the web part):<br />Get the current Correlation ID by using code<br />I got this piece of code from my good friend Wictor’s blog post. Thanks Wictor – this made my Logging-project more satisfying!<br />With the following code you can fetch the current Correlation Id of a request.<br />Create a method (in my case called GetCurrentCorrelationToken()) to wrap up the functionality of returning the current token like this:<br /> public  class  CorrelationId <br /> {<br />     [DllImport (quot;
advapi32.dllquot;
)]<br />     public  static  extern  uint  EventActivityIdControl(uint  controlCode,ref  Guid  activityId);<br />     public  const  uint  EVENT_ACTIVITY_CTRL_GET_ID = 1;<br />     public  static  Guid  GetCurrentCorrelationToken()<br />     {<br />         Guid  g = Guid .Empty;<br />         EventActivityIdControl(EVENT_ACTIVITY_CTRL_GET_ID, ref  g);<br />         return  g;<br />     }<br /> }<br />Then from wherever in your code you can simply call it by using this approach:<br /> protected  void  Button1_Click(object  sender, EventArgs  e)<br /> {<br />     Label1.Text = CorrelationId .GetCurrentCorrelationToken().ToString();<br /> }<br />(Normally you might want this in a try/catch statement or something like that)<br />Summary<br />This article should give you (administrator and developer) an insight in how you easily can track the specific errors your users encounter in their/your application(s). If a user gets an error message in SharePoint 2010, they’ll also see the Correlation ID. <br />If you can train your users to write down that Correlation ID along with a few simple steps on how the error might have been occurring, you’re going to have a much easier way to find the details about that specific error than ever before.<br />
Correlation id token in share point 2010
Correlation id token in share point 2010
Correlation id token in share point 2010
Correlation id token in share point 2010
Correlation id token in share point 2010
Correlation id token in share point 2010

Contenu connexe

Tendances

Field Level Security - Spring 20
Field Level Security  -  Spring 20Field Level Security  -  Spring 20
Field Level Security - Spring 20Aslam Bari
 
Css eng r1
Css eng r1Css eng r1
Css eng r1sbe37
 
Building a YellowAnt Application with Ruby on Rails
Building a YellowAnt Application with Ruby on RailsBuilding a YellowAnt Application with Ruby on Rails
Building a YellowAnt Application with Ruby on RailsJaya Jain
 
Sql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSiddhesh Bhobe
 
Ivanti Cheat Sheet by Traversys Limited
Ivanti Cheat Sheet by Traversys LimitedIvanti Cheat Sheet by Traversys Limited
Ivanti Cheat Sheet by Traversys LimitedTim Read
 
Advanced Google Analytics
Advanced Google AnalyticsAdvanced Google Analytics
Advanced Google AnalyticsJeff Wisniewski
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity FrameworksRich Helton
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudDanny Jessee
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Danny Jessee
 
New Form Element in HTML5
New Form Element in HTML5New Form Element in HTML5
New Form Element in HTML5Zahra Rezwana
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCloudIDSummit
 
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...Ganesh Kumar
 
html 5 new form attribute
html 5 new form attributehtml 5 new form attribute
html 5 new form attributePriyanka Rasal
 
Advanced SQL Injection
Advanced SQL InjectionAdvanced SQL Injection
Advanced SQL Injectionamiable_indian
 
Simple ado program by visual studio
Simple ado program by visual studioSimple ado program by visual studio
Simple ado program by visual studioAravindharamanan S
 

Tendances (19)

Field Level Security - Spring 20
Field Level Security  -  Spring 20Field Level Security  -  Spring 20
Field Level Security - Spring 20
 
Css eng r1
Css eng r1Css eng r1
Css eng r1
 
Building a YellowAnt Application with Ruby on Rails
Building a YellowAnt Application with Ruby on RailsBuilding a YellowAnt Application with Ruby on Rails
Building a YellowAnt Application with Ruby on Rails
 
Sql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSql Injection Attacks Siddhesh
Sql Injection Attacks Siddhesh
 
Ivanti Cheat Sheet by Traversys Limited
Ivanti Cheat Sheet by Traversys LimitedIvanti Cheat Sheet by Traversys Limited
Ivanti Cheat Sheet by Traversys Limited
 
Advanced Google Analytics
Advanced Google AnalyticsAdvanced Google Analytics
Advanced Google Analytics
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
 
Code injection
Code injectionCode injection
Code injection
 
New Form Element in HTML5
New Form Element in HTML5New Form Element in HTML5
New Form Element in HTML5
 
Sql injection
Sql injectionSql injection
Sql injection
 
CIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in ActionCIS14: OAuth and OpenID Connect in Action
CIS14: OAuth and OpenID Connect in Action
 
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
 
html 5 new form attribute
html 5 new form attributehtml 5 new form attribute
html 5 new form attribute
 
Sql injection
Sql injectionSql injection
Sql injection
 
Advanced SQL Injection
Advanced SQL InjectionAdvanced SQL Injection
Advanced SQL Injection
 
Logging
LoggingLogging
Logging
 
Simple ado program by visual studio
Simple ado program by visual studioSimple ado program by visual studio
Simple ado program by visual studio
 

En vedette

Baltimore share point user group june 2015
Baltimore share point user group june 2015Baltimore share point user group june 2015
Baltimore share point user group june 2015Toby McGrail
 
Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview Sentri
 
SharePoint Performance at SPS Philly
SharePoint Performance at SPS PhillySharePoint Performance at SPS Philly
SharePoint Performance at SPS PhillySentri
 
SharePoint logging & debugging
SharePoint logging  & debugging SharePoint logging  & debugging
SharePoint logging & debugging Sentri
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12Sentri
 
SharePoint Administration with PowerShell
SharePoint Administration with PowerShellSharePoint Administration with PowerShell
SharePoint Administration with PowerShellEric Kraus
 
SEOmoz Pitch Deck July 2011
SEOmoz Pitch Deck July 2011SEOmoz Pitch Deck July 2011
SEOmoz Pitch Deck July 2011Rand Fishkin
 

En vedette (7)

Baltimore share point user group june 2015
Baltimore share point user group june 2015Baltimore share point user group june 2015
Baltimore share point user group june 2015
 
Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview
 
SharePoint Performance at SPS Philly
SharePoint Performance at SPS PhillySharePoint Performance at SPS Philly
SharePoint Performance at SPS Philly
 
SharePoint logging & debugging
SharePoint logging  & debugging SharePoint logging  & debugging
SharePoint logging & debugging
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12
 
SharePoint Administration with PowerShell
SharePoint Administration with PowerShellSharePoint Administration with PowerShell
SharePoint Administration with PowerShell
 
SEOmoz Pitch Deck July 2011
SEOmoz Pitch Deck July 2011SEOmoz Pitch Deck July 2011
SEOmoz Pitch Deck July 2011
 

Similaire à Correlation id token in share point 2010

Silverlight 2 for Developers - TechEd New Zealand 2008
Silverlight 2 for Developers - TechEd New Zealand 2008Silverlight 2 for Developers - TechEd New Zealand 2008
Silverlight 2 for Developers - TechEd New Zealand 2008Jonas Follesø
 
Access tips access and sql part 4 building select queries on-the-fly
Access tips  access and sql part 4  building select queries on-the-flyAccess tips  access and sql part 4  building select queries on-the-fly
Access tips access and sql part 4 building select queries on-the-flyquest2900
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and DebuggingRich Helton
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoMoldova ICT Summit
 
Intention Oriented Model Interaction
Intention Oriented Model InteractionIntention Oriented Model Interaction
Intention Oriented Model InteractionYasir Karam
 
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)Implementing Your Full Stack App with MongoDB Stitch (Tutorial)
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)MongoDB
 
How to implement sso using o auth in golang application
How to implement sso using o auth in golang applicationHow to implement sso using o auth in golang application
How to implement sso using o auth in golang applicationKaty Slemon
 
Advisor Jumpstart: JavaScript
Advisor Jumpstart: JavaScriptAdvisor Jumpstart: JavaScript
Advisor Jumpstart: JavaScriptdominion
 
How to Validate Form With Flutter BLoC.pptx
How to Validate Form With Flutter BLoC.pptxHow to Validate Form With Flutter BLoC.pptx
How to Validate Form With Flutter BLoC.pptxBOSC Tech Labs
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber SecurityChris Watts
 
Summer '16 Realease notes
Summer '16 Realease notesSummer '16 Realease notes
Summer '16 Realease notesaggopal1011
 
Better User Experience with .NET
Better User Experience with .NETBetter User Experience with .NET
Better User Experience with .NETPeter Gfader
 
Apex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsApex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsSalesforce Developers
 
TangoWithDjango - ch8
TangoWithDjango - ch8TangoWithDjango - ch8
TangoWithDjango - ch8Asika Kuo
 
How my team is applying JS framework for PHP projects.
How my team is applying JS framework for PHP projects.How my team is applying JS framework for PHP projects.
How my team is applying JS framework for PHP projects.Damon Hung Tran
 
How to implement golang jwt authentication and authorization
How to implement golang jwt authentication and authorizationHow to implement golang jwt authentication and authorization
How to implement golang jwt authentication and authorizationKaty Slemon
 
.NET Portfolio
.NET Portfolio.NET Portfolio
.NET Portfoliomwillmer
 

Similaire à Correlation id token in share point 2010 (20)

Silverlight 2 for Developers - TechEd New Zealand 2008
Silverlight 2 for Developers - TechEd New Zealand 2008Silverlight 2 for Developers - TechEd New Zealand 2008
Silverlight 2 for Developers - TechEd New Zealand 2008
 
Chat php
Chat phpChat php
Chat php
 
Access tips access and sql part 4 building select queries on-the-fly
Access tips  access and sql part 4  building select queries on-the-flyAccess tips  access and sql part 4  building select queries on-the-fly
Access tips access and sql part 4 building select queries on-the-fly
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and Debugging
 
Agile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai ShevchenkoAgile methodologies based on BDD and CI by Nikolai Shevchenko
Agile methodologies based on BDD and CI by Nikolai Shevchenko
 
Intention Oriented Model Interaction
Intention Oriented Model InteractionIntention Oriented Model Interaction
Intention Oriented Model Interaction
 
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)Implementing Your Full Stack App with MongoDB Stitch (Tutorial)
Implementing Your Full Stack App with MongoDB Stitch (Tutorial)
 
How to implement sso using o auth in golang application
How to implement sso using o auth in golang applicationHow to implement sso using o auth in golang application
How to implement sso using o auth in golang application
 
Advisor Jumpstart: JavaScript
Advisor Jumpstart: JavaScriptAdvisor Jumpstart: JavaScript
Advisor Jumpstart: JavaScript
 
How to Validate Form With Flutter BLoC.pptx
How to Validate Form With Flutter BLoC.pptxHow to Validate Form With Flutter BLoC.pptx
How to Validate Form With Flutter BLoC.pptx
 
ASP.NET MVC3 RAD
ASP.NET MVC3 RADASP.NET MVC3 RAD
ASP.NET MVC3 RAD
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
 
Summer '16 Realease notes
Summer '16 Realease notesSummer '16 Realease notes
Summer '16 Realease notes
 
Better User Experience with .NET
Better User Experience with .NETBetter User Experience with .NET
Better User Experience with .NET
 
Apex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsApex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong Foundations
 
TangoWithDjango - ch8
TangoWithDjango - ch8TangoWithDjango - ch8
TangoWithDjango - ch8
 
How my team is applying JS framework for PHP projects.
How my team is applying JS framework for PHP projects.How my team is applying JS framework for PHP projects.
How my team is applying JS framework for PHP projects.
 
Asp.Net MVC Intro
Asp.Net MVC IntroAsp.Net MVC Intro
Asp.Net MVC Intro
 
How to implement golang jwt authentication and authorization
How to implement golang jwt authentication and authorizationHow to implement golang jwt authentication and authorization
How to implement golang jwt authentication and authorization
 
.NET Portfolio
.NET Portfolio.NET Portfolio
.NET Portfolio
 

Plus de UGAIA

Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IA
Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IAMilo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IA
Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IAUGAIA
 
KIT GOV-1 · @peg500and's KIT-Governance Book
KIT GOV-1 · @peg500and's KIT-Governance BookKIT GOV-1 · @peg500and's KIT-Governance Book
KIT GOV-1 · @peg500and's KIT-Governance BookUGAIA
 
Smartphone et Copilot dans Windows 11 - Rendus sur PC.
Smartphone et Copilot dans Windows 11 - Rendus sur PC.Smartphone et Copilot dans Windows 11 - Rendus sur PC.
Smartphone et Copilot dans Windows 11 - Rendus sur PC.UGAIA
 
ConversationsAvecChatGPT-v5.pdf
ConversationsAvecChatGPT-v5.pdfConversationsAvecChatGPT-v5.pdf
ConversationsAvecChatGPT-v5.pdfUGAIA
 
Model-OpenAI-EROLw11-English.pdf
Model-OpenAI-EROLw11-English.pdfModel-OpenAI-EROLw11-English.pdf
Model-OpenAI-EROLw11-English.pdfUGAIA
 
Prompts-3languages en PDF v2
Prompts-3languages en PDF v2Prompts-3languages en PDF v2
Prompts-3languages en PDF v2UGAIA
 
Retirer les time code dialogue de film d'un document dans Word et le transfor...
Retirer les time code dialogue de film d'un document dans Word et le transfor...Retirer les time code dialogue de film d'un document dans Word et le transfor...
Retirer les time code dialogue de film d'un document dans Word et le transfor...UGAIA
 
Model-OpenAI-EROLw11-English.pptx
Model-OpenAI-EROLw11-English.pptxModel-OpenAI-EROLw11-English.pptx
Model-OpenAI-EROLw11-English.pptxUGAIA
 
Conversation avec ChatGPT-2.pdf --- v1 ---
Conversation avec ChatGPT-2.pdf --- v1 ---Conversation avec ChatGPT-2.pdf --- v1 ---
Conversation avec ChatGPT-2.pdf --- v1 ---UGAIA
 
Prompts in 3 Languages US-FR-CATv2
Prompts in 3 Languages US-FR-CATv2Prompts in 3 Languages US-FR-CATv2
Prompts in 3 Languages US-FR-CATv2UGAIA
 
Conversation pendant 24h avec une AI - ChatGPT
Conversation pendant 24h avec une AI - ChatGPTConversation pendant 24h avec une AI - ChatGPT
Conversation pendant 24h avec une AI - ChatGPTUGAIA
 
SPEAK with CHATGPT -US
SPEAK with CHATGPT -US SPEAK with CHATGPT -US
SPEAK with CHATGPT -US UGAIA
 
BOUCLES-DECOUVERTES NICE
BOUCLES-DECOUVERTES NICEBOUCLES-DECOUVERTES NICE
BOUCLES-DECOUVERTES NICEUGAIA
 
Les-OTTOMANS-NICE-T3
Les-OTTOMANS-NICE-T3Les-OTTOMANS-NICE-T3
Les-OTTOMANS-NICE-T3UGAIA
 
Bibliographie outils de Genealogie
Bibliographie outils de GenealogieBibliographie outils de Genealogie
Bibliographie outils de GenealogieUGAIA
 
Power automate desktop 2021
Power automate desktop 2021Power automate desktop 2021
Power automate desktop 2021UGAIA
 
Raci course b
Raci course bRaci course b
Raci course bUGAIA
 
Livre dunod
Livre dunodLivre dunod
Livre dunodUGAIA
 
Ugsf les url des présentations et des speakers pour la réunion du 11.12.13
Ugsf  les url des présentations et des speakers pour la réunion du 11.12.13Ugsf  les url des présentations et des speakers pour la réunion du 11.12.13
Ugsf les url des présentations et des speakers pour la réunion du 11.12.13UGAIA
 
4512 giraudy
4512 giraudy4512 giraudy
4512 giraudyUGAIA
 

Plus de UGAIA (20)

Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IA
Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IAMilo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IA
Milo-AI Milo AI Congress est conçu pour transformer votre compréhension de l'IA
 
KIT GOV-1 · @peg500and's KIT-Governance Book
KIT GOV-1 · @peg500and's KIT-Governance BookKIT GOV-1 · @peg500and's KIT-Governance Book
KIT GOV-1 · @peg500and's KIT-Governance Book
 
Smartphone et Copilot dans Windows 11 - Rendus sur PC.
Smartphone et Copilot dans Windows 11 - Rendus sur PC.Smartphone et Copilot dans Windows 11 - Rendus sur PC.
Smartphone et Copilot dans Windows 11 - Rendus sur PC.
 
ConversationsAvecChatGPT-v5.pdf
ConversationsAvecChatGPT-v5.pdfConversationsAvecChatGPT-v5.pdf
ConversationsAvecChatGPT-v5.pdf
 
Model-OpenAI-EROLw11-English.pdf
Model-OpenAI-EROLw11-English.pdfModel-OpenAI-EROLw11-English.pdf
Model-OpenAI-EROLw11-English.pdf
 
Prompts-3languages en PDF v2
Prompts-3languages en PDF v2Prompts-3languages en PDF v2
Prompts-3languages en PDF v2
 
Retirer les time code dialogue de film d'un document dans Word et le transfor...
Retirer les time code dialogue de film d'un document dans Word et le transfor...Retirer les time code dialogue de film d'un document dans Word et le transfor...
Retirer les time code dialogue de film d'un document dans Word et le transfor...
 
Model-OpenAI-EROLw11-English.pptx
Model-OpenAI-EROLw11-English.pptxModel-OpenAI-EROLw11-English.pptx
Model-OpenAI-EROLw11-English.pptx
 
Conversation avec ChatGPT-2.pdf --- v1 ---
Conversation avec ChatGPT-2.pdf --- v1 ---Conversation avec ChatGPT-2.pdf --- v1 ---
Conversation avec ChatGPT-2.pdf --- v1 ---
 
Prompts in 3 Languages US-FR-CATv2
Prompts in 3 Languages US-FR-CATv2Prompts in 3 Languages US-FR-CATv2
Prompts in 3 Languages US-FR-CATv2
 
Conversation pendant 24h avec une AI - ChatGPT
Conversation pendant 24h avec une AI - ChatGPTConversation pendant 24h avec une AI - ChatGPT
Conversation pendant 24h avec une AI - ChatGPT
 
SPEAK with CHATGPT -US
SPEAK with CHATGPT -US SPEAK with CHATGPT -US
SPEAK with CHATGPT -US
 
BOUCLES-DECOUVERTES NICE
BOUCLES-DECOUVERTES NICEBOUCLES-DECOUVERTES NICE
BOUCLES-DECOUVERTES NICE
 
Les-OTTOMANS-NICE-T3
Les-OTTOMANS-NICE-T3Les-OTTOMANS-NICE-T3
Les-OTTOMANS-NICE-T3
 
Bibliographie outils de Genealogie
Bibliographie outils de GenealogieBibliographie outils de Genealogie
Bibliographie outils de Genealogie
 
Power automate desktop 2021
Power automate desktop 2021Power automate desktop 2021
Power automate desktop 2021
 
Raci course b
Raci course bRaci course b
Raci course b
 
Livre dunod
Livre dunodLivre dunod
Livre dunod
 
Ugsf les url des présentations et des speakers pour la réunion du 11.12.13
Ugsf  les url des présentations et des speakers pour la réunion du 11.12.13Ugsf  les url des présentations et des speakers pour la réunion du 11.12.13
Ugsf les url des présentations et des speakers pour la réunion du 11.12.13
 
4512 giraudy
4512 giraudy4512 giraudy
4512 giraudy
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Correlation id token in share point 2010

  • 1. SP 2010: Find error messages with a <br />Correlation ID token in SharePoint 2010<br />Author: Tobias Zimmergren http://www.zimmergren.net | http://www.tozit.com | @zimmergren<br />Introduction<br />In SharePoint 2010, you’ve got some new capabilities for error reporting and logs. One of the most noted features for me as a developer is that whenever you bump into an error message – you’ll be presented with a correlation ID token.<br />In this article I will try to explain how you can fetch that token from SharePoint, and also provide a small snippet of code to be able to build your own “Log Searcher Web Part” for your administrators.<br />Correlation ID, what’s that?<br />In SharePoint 2010, you get a Correlation ID (which is a GUID) attached to your logs/error messages when something happens. This ID can then be used to lookup that specific error from the logs.<br />This Correlation ID is used per request-session in SharePoint 2010, and if you are in the process of requesting some information from SharePoint and bump into some problems along the way – your Correlation ID will be the best starting point for searching for what went wrong along that request!<br />You might get an error message like this in SharePoint 2010 (don’t worry, if you haven’t seen one like this one yet – just hang in there, sooner or later you will.. )<br />Search for the log messages based on the Correlation ID token<br />So if you’ve gotten such an error message and want to find out more information about the actual error and don’t have the time to go around poking in the logs and searching – there’s a few methods you can do this rather easily, as described below. <br />Using PowerShell to lookup a log message based on Correlation ID token<br />One of the quick-n-awesome ways to do this is to simply hook up a PowerShell console (SharePoint 2010 Management Shell) and then just write the following command (replace the <GUID> with the Correlation Id):<br />get-splogevent | ?{$_Correlation -eq quot; <GUID>quot; }<br />This will give you the details about your specific error like this in the console:<br />You might want to be more precise and get more specific details out of your query, then you can try something like this:<br />get-splogevent | ?{$_.Correlation -eq quot; <GUID>quot; } | select Area, Category, Level, EventID, Message | Format-List<br />This will give you the details about your specific error like this with some juicy details:<br />Finally if you would want these messages to be put into a text or log file instead, you could just add the classic “> C:wesome.log” after the command like this:<br />get-splogevent | ?{$_.Correlation -eq quot; <GUID>quot; } | select Area, Category, Level, EventID, Message | Format-List > C:wesome.log<br />On MSDN they have an overvoew of using SP-GetLogEvent which I would recommend!<br />Using SQL queries to find log message based on Correlation ID token<br />You can utilize the SQL logs database to fetch the specific error message based on Correlation id as well. In your logging DB (usually called WSS_Logging, but can be called something else if you’ve changed it) there is a view called ULSTraceLog which you can query with a simple SQL query and fetch the results.<br />I’ve created a query to fetch the items from the logging database like this: <br /> select [RowCreatedTime], [ProcessName], [Area], <br /> [Category], EventID, [Message] <br /> from [WSS_UsageApplication].[dbo].[ULSTraceLog] <br /> where CorrelationId=< pre>'B4BBAC41-27C7-4B3A-AE33-4192B6C1E2C5'<br />This will render your results in the SQL Query window like this:<br />This can of course be implemented in a Web Part for your convenience as well (I’ve created a bunch of diag. and logging web parts that I’ve got deployed to Central Admin) that could look like this (this way you don’t need physical access to the ULS logs all the time, but can do a quick lookup from the web part):<br />Get the current Correlation ID by using code<br />I got this piece of code from my good friend Wictor’s blog post. Thanks Wictor – this made my Logging-project more satisfying!<br />With the following code you can fetch the current Correlation Id of a request.<br />Create a method (in my case called GetCurrentCorrelationToken()) to wrap up the functionality of returning the current token like this:<br /> public class CorrelationId <br /> {<br /> [DllImport (quot; advapi32.dllquot; )]<br /> public static extern uint EventActivityIdControl(uint controlCode,ref Guid activityId);<br /> public const uint EVENT_ACTIVITY_CTRL_GET_ID = 1;<br /> public static Guid GetCurrentCorrelationToken()<br /> {<br /> Guid g = Guid .Empty;<br /> EventActivityIdControl(EVENT_ACTIVITY_CTRL_GET_ID, ref g);<br /> return g;<br /> }<br /> }<br />Then from wherever in your code you can simply call it by using this approach:<br /> protected void Button1_Click(object sender, EventArgs e)<br /> {<br /> Label1.Text = CorrelationId .GetCurrentCorrelationToken().ToString();<br /> }<br />(Normally you might want this in a try/catch statement or something like that)<br />Summary<br />This article should give you (administrator and developer) an insight in how you easily can track the specific errors your users encounter in their/your application(s). If a user gets an error message in SharePoint 2010, they’ll also see the Correlation ID. <br />If you can train your users to write down that Correlation ID along with a few simple steps on how the error might have been occurring, you’re going to have a much easier way to find the details about that specific error than ever before.<br />