Direct Migration to Azure SQL Database using SQLPackage.exe
The native and the traditional database backup of SQL Server works flawlessly almost everywhere, but when it comes to “Azure SQL Database”, the traditional backup method is absolutely useless. Well the...
View ArticleAzure Automation, RunBooks and T-SQL Query output directly to Azure Blob Storage
We often perform tasks to export data using custom T-SQL queries against a SQL Server (either in cloud or on-premises) and store it on a local/network shared drive/Cloud Storage for the data analytics...
View ArticleVMXNET3 Configuration and High ASYNC_NETWORK_IO Waittype on a SQL Server
It is not uncommon to see network performance degradation on a ESX guest when a high number of connections occur, or the workload is increased. One might observe high network latency, network packet...
View ArticlePublic Endpoint for Azure Managed Instance and SSMS connectivity
VPN throughput or intermittent connection disruption could be an issue while connecting to an Azure Managed Instance. To avoid VPN connection related disruption to an Azure Managed Instance, Microsoft...
View ArticleAzure SQL logical Server and creating/migrating database – non-interactively...
This tutorial is about creating an Azure logical database server along with its associated resources, and then creating/migrating database non-interactively. The provided script can be run manually or...
View ArticleSQL Server Always Encrypted at a glance - using PowerShell
Following are some criteria we need to consider while implementing the Always Encrypted feature in SQL Server 2016 or above. We’ll create a test database and a sample certificate, and then encrypt one...
View ArticleAzure Key Vault, Certificates and SQL Server Encryption: A Hands-On Approach
This is a complete example using a hands-on approach of how to use Azure Key Vault to store certificates and using those certificates to create Always Encrypted columns in Azure SQL.I am assuming that...
View ArticleSQL Server Audit could not write to the Security Log
Description: The error occurs when the SQL Server Audit redirects to Windows Event Security log. The obvious reason is that the SQL Service Account for the Audit Log Event may not have the appropriate...
View ArticlePowerShell: Calculating folder size, file/folder count and size of each...
We often need to find the total number of files, folders or subfolders along with the total size for a given folder or drive. The PowerShell cmdlet “Get-ChildItem” can help us accomplish. The custom...
View Article“Login Failed” and using PowerShell to collect events from multiple SQL...
There is a common phenomenon of the requirement to capture failed login attempts to a database server. When a login attempt fails, it simply means that the login to a database server was unsuccessful....
View ArticleSQL Server Errorlog Processing and Visualization
Reviewing the SQL Server Errorlog is a common and important task that SQL Server Database Professionals perform on a regular basis to identify and troubleshoot database server related issues. The...
View ArticleOpenEye – seeing what others cannot see
It is a daunting task to remotely collect performance metrics without impacting the servers being monitored, accurately process and store the streaming data and then visualize it. My next generation...
View ArticleOpenEye - Seeing what others cannot see
It is a daunting task to remotely collect performance metrics without impacting the servers being monitored, accurately process and store the streaming data and then visualize it. My next generation...
View ArticleOpenEye - Time-shifting to compare metrics over time (side by side last 7 days)
Comparing metrics over time and plotting each series on the same time interval and then understand the recent trend is important for all IT professional. The time shifting comparison is critical for...
View ArticleUsing Managed Service Account with SQL Server Service
MSA is a Managed Active Directory Account which is automatically managed by the Active Directory (AD). A MSA (domain\account$) is assigned to a Windows Server and the password management is handled by...
View ArticleAccessing Linux Desktop/Server from Windows remotely: using RDP and xRDP
The graphical Remote Desktop Connection is one of the most common methods of working on a Remote Windows based Server or Desktop for Windows users. All Microsoft Windows editions have built-in support...
View ArticleParavirtualized Network Adaptor: Changing E1000e to VMXNET3:
A very common and misleading practice made by many is to accept the default value during installation or configuration. This practice may be acceptable or even suitable in some scenarios, but it may...
View ArticleNUMA and soft-NUMA in SQL Server: To get additional I/O threads
Performance can be improved significantly if the SQL Server engine detects physical NUMA nodes on the Windows system. Along with Hardware NUMA, Microsoft also introduced soft-NUMA (software-based NUMA)...
View ArticleI/O bottleneck on a VMWare VM for SQL Server: The mission impossible
When there is a performance problem on a SQL Server, we normally rush to treat the symptoms that are impacting the performance. However, when the underlying infrastructure is suboptimal or if it has...
View ArticleOpenEye - effcient way monitoring Windows and SQL Server performance
The upgraded version of OpenEye, the most efficient real-time monitoring, visualization and performance analytical solution for on-premise Windows and SQL Server built-on timescaledb, Grafana, Raw WMI,...
View ArticleHands-on - Kubernetes Cluster: stateless and stateful application deployment...
Part #1: Setting up a four nodes Kubernetes cluster using Ubuntu Server:Setting up a production-grade Kubernetes multi-node cluster on a bare-metal server may be slightly tedious and daunting, however...
View ArticleHands-on - Dynamic volume provisioning in Kubernetes: using NFS CSI for...
A stateful application such as a database application requires persistent storage to preserve all changes to the storage layer. It also requires that the Kubernetes pod be able to bind to the same...
View ArticleHands-on – MetalLB Load Balancer: External Traffic into Kubernetes
To connect an application running inside the Kubernetes Cluster, a traffic routing mechanism is required. This mechanism is generally known as the Proxy Service. In this hands-on tutorial, we will be...
View ArticleOpenEye - Lighting fast data collection process and real-time dashboard for...
CLI of OpenEye has now several command line parameters and options. These parameters can be used using “/” or “-“followed by a switch name.Older post for more information:OpenEye - Seeing what others...
View Articlesplit_part(): Extracting the nth Delimited Substring
In many RDBMS there is a split_part() function which is used to split a string into multiple parts based on a delimiter and return a specific part of the split result. Generally, it takes three...
View Article