KQL Series – some DevOps things: Provisioning using bicep
So in my last post I wrote about how to provision Azure Data Explorer using terraform . In this post I will use bicep to provision Azure Data Explorer....
2023-03-20
30 reads
So in my last post I wrote about how to provision Azure Data Explorer using terraform . In this post I will use bicep to provision Azure Data Explorer....
2023-03-20
30 reads
If you’ve read my blogs before or seen me speak you’ll know that I love the DevOps. Provisioning Azure Data Explorer can be a complex task, involving multiple steps...
2023-03-20
27 reads
I was talking to an ex-client earlier this week and he saw the drafts of my blog posts around DevOps infra-as-code spinning up Azure Data Explorer and he said...
2023-03-20
30 reads
Hello Dear Reader! What an incredible week we had. I started off traveling on Monday of last week. At the airport I ran into my friend David Pless (...
2023-03-20
13 reads
As many of you are aware, I have been dealing with a progressive version of ALS which is affecting my hands and arms and thus my ability to type....
2023-03-20 (first published: 2023-03-09)
115 reads
Thanks to everyone that came to my talk at SQL Bits. Powerpoint here for download. If you have questions, reach out.
2023-03-19 (first published: 2023-03-18)
16 reads
In this blog post let us stop for a second and see where we are in this whole create an Azure Data Explorer cluster and ingest data.High level summary...
2023-03-19
28 reads
This blog post is rare because I am dedicating it to my good mate Bryn Lewis who spoke recently at a community event I ran (the first free community...
2023-03-19
73 reads
In my previous blog post KQL Series – ingesting data using Azure Stream Analytics I talked about one of the more easier ways to ingest data – which is via...
2023-03-19
163 reads
This blog post is about another method of ingesting data into Azure Data Explorer. Azure Stream Analytics is a cloud-based stream processing service that allows us to ingest and...
2023-03-19
29 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers