Following an incident at a customer’s production environment, Nathan Lifshes and I realized that we stumbled upon a yet-unknown bug in SQL Server, causing an access violation error, memory dumps, dropped connections, and even cluster fail-overs.
This month’s #tsql2sday came to us from Rob Volk, who asks us to explain databases using an analogy, as if explaining to a 5 year old. I’m actually a big fan of The Feynman Technique (aka ELI5), so I really wanted to participate. But to be honest, I nearly missed out this time because I couldn’t think of an idea this whole week.
But on the very last day the muse finally hit me. I kid you not, the time is literally 23:59 here in Israel as I hit the publish button!
In this blog post I’ll help you troubleshoot the rare but critical issues of Deadlocked Schedulers and high THREADPOOL waits.
Following my presentation of “How to HADR Your SQL Server Jobs” at the HA/DR PASS Virtual Group yesterday, David Klee (@kleegeek) and I continued chatting for a bit longer after the recording was concluded. During which, the MSX/TSX feature of SQL Server came up, and David suggested that I’d utilize my newly earned MVP status to push a feature request to expand these capabilities.
This month, Elizabeth Noble is hosting #tsql2sday with the topic of automation. This is very similar to previous couple of T-SQL Tuesdays hosted by Ken Fisher (127) and Jess Pomfret (123). I already wrote about the topic of automation extensively in those past posts. So, instead of repeating myself, I’m gonna write about this topic […]
My hard work and public contributions during these past few years continue to pay off in spades, and I’m excited to announce that I have finally received the Microsoft MVP award!
Assume you have some kind of process outside the SQL Server which is supposed to record some kind of database activity. There are many ways to do it, most of which require constant and/or stable connection to the database. But what if that’s not good enough? Let’s consider our options.
In this post, I hope to summarize the various methods that we have, in order to get rid of that annoying authentication prompt. Each method has its own advantages and disadvantages in terms of complexity of implementation, versatility, and the level of security that it provides. More specifically: the more secure and versatile a method is – the more complicated it is to implement.
On June 3rd, the InfosecMatter blog published a post titled “Top #10 Vulnerabilities: Internal Infrastructure Pentest“. This blog post detailed the top most common vulnerabilities in Windows servers and networks found during more than 60 internal infrastructure penetration tests around the world. After reading this article, I was prompted to actively look for similar resources […]
This month’s #tsql2sday is hosted by the @AirborneGeek who asks us to learn from others’ mistakes. Hey, that’s my job description! Read on for more juicy details.
Something went wrong. Please refresh the page and/or try again.
Follow My Blog
Get new content delivered directly to your inbox.
Other ways to find me:
- October 2020 (3)
- September 2020 (3)
- August 2020 (2)
- July 2020 (3)
- June 2020 (3)
- May 2020 (3)
- April 2020 (3)
- March 2020 (3)
- February 2020 (2)
- January 2020 (2)
- December 2019 (4)
- November 2019 (1)
- October 2019 (1)
- September 2019 (3)
- May 2019 (3)
- April 2019 (1)
- January 2019 (2)
- November 2018 (6)
- October 2018 (14)