Following my presentation of “How to HADR Your SQL Server Jobs” at the HA/DR PASS Virtual Group yesterday, David Klee (@kleegeek) and I continued chatting for a bit longer after the recording was concluded. During which, the MSX/TSX feature of SQL Server came up, and David suggested that I’d utilize my newly earned MVP status to push a feature request to expand these capabilities.Read More »Feature Request – Expand MSX/TSX Capabilities for HADR
This month, Elizabeth Noble is hosting #tsql2sday with the topic of automation. This is very similar to previous couple of T-SQL Tuesdays hosted by Ken Fisher (127) and Jess Pomfret (123). I already wrote about the topic of automation extensively in those past posts. So, instead of repeating myself, I’m gonna write about this topic a bit differently.Read More »T-SQL Tuesday #130 – Eitan’s Laws of Automation
Assume you have some kind of process outside the SQL Server which is supposed to record some kind of database activity. There are many ways to do it, most of which require constant and/or stable connection to the database. But what if that’s not good enough? Let’s consider our options.Read More »Using Extended Events as a Buffer
In this post, I hope to summarize the various methods that we have, in order to get rid of that annoying authentication prompt. Each method has its own advantages and disadvantages in terms of complexity of implementation, versatility, and the level of security that it provides. More specifically: the more secure and versatile a method is – the more complicated it is to implement.Read More »Overriding the Authentication in SSRS for External Access
On June 3rd, the InfosecMatter blog published a post titled “Top #10 Vulnerabilities: Internal Infrastructure Pentest“. This blog post detailed the top most common vulnerabilities in Windows servers and networks found during more than 60 internal infrastructure penetration tests around the world. After reading this article, I was prompted to actively look for similar resources on SQL Server penetration testing, and I got some interesting findings. Check out my blog post at the Madeira Data Solutions website for the details.Read More »How to Protect SQL Server from Hackers and Penetration Tests
This month’s #tsql2sday is hosted by the @AirborneGeek (t|b), who asks us to take a lesson from something frequently done by pilots – learning from accidents and mistakes done by others. As a long-time SQL Server Consultant DBA, I have learned from quite a lot of mistakes done (mostly) by others, seeing as a significant part of my job description is to come over and fix such mistakes. So, today I’ll use this opportunity to talk about one such interesting incident.Read More »T-SQL Tuesday #128 – Learn from Others
This month’s #tsql2sday is hosted by Ken Fisher (b|t) who asks us to share tips unrelated to database systems. I will take this opportunity to talk about what you can do to easily automate a lot of your daily tasks, and never miss a thing.Read More »T-SQL Tuesday #127 – Tips and Tricks to Automate Your Life
Considering the whole COVID-19 mess that is happening this year, events being cancelled and re-launched in a virtual form… Is it any wonder that the PASS Summit is joining the trend as well? I’d be quite disappointed if it hadn’t. So, great news!Read More »PASS Summit 2020 has gone virtual – register now for a discount!