Deploy Security Changes with Copy-SqlLogin
Moving security changes between server instances can be a cumbersome process, but it doesn't need to be with the PowerShell cmdlet, Copy-SqlLogin.
2016-11-01
2,287 reads
Moving security changes between server instances can be a cumbersome process, but it doesn't need to be with the PowerShell cmdlet, Copy-SqlLogin.
2016-11-01
2,287 reads
A major difficulty for a System Administrator who wishes to provide access for auditors, Helpdesk staff, developers and other IT people is that adminstrator roles give users more access than they need. It is too easy to make mistakes, or to make more changes than those that were signed-off. With JEA, it is possible to create role-based access control (RBAC) endpoints that define precisely what actions you’ll let your users carry out without needing a elevated, privileged administrator credentials, and which log and report all operations.
2016-10-19
3,276 reads
Desired State Configuration (DSC) allows you to automate the way that you manage configuration data for software services as well as the environment in which these services run. DSC uses a set of built-in and custom 'resources' as the building blocks for a configuration. If you have specific requirements you may need to create the relevant resource to make the configuration happen. Nicolas Prigent provides a practical guide to DSC resources.
2016-09-27
3,764 reads
Use Powershell to troubleshoot SQL connectivity issues. A way to monitor up-time and connectivity of a SQL server database with some simple Powershell commands.
2016-09-22
2,932 reads
To demonstrate that dynamic modules in PowerShell can be used to easily create objects with methods and properties, Phil Factor implements an expression analyser written in PowerShell, using a variation of Dijstra's Shunting Algorithm.
2016-09-16
5,804 reads
Learn how to use the login commands included with SSMS2016 from PowerShell.
2016-09-01
3,399 reads
Tim Smith shows how you can use PowerShell to automate a simple comparison of objects such as stored procedures, views, and fucntions.
2016-08-17
3,933 reads
The Pull mode of Desired State Configuration (DSC) is more complicated to implement because you need to meticulously manage the MOF files and their naming conventions so as to ensure that you deploy your DSC configurations correctly. In this first article of a two-part series, Nicolas Prigent describes how you can best automate this, and then in a second part on monitoring DSC he describes techniques to help you to use the pull mode as a regular part of your admin work.
2016-07-22
3,368 reads
Capture Linux Drive Space data with Powershell using Posh-SSH module
2016-07-19 (first published: 2016-07-06)
1,245 reads
A number of new SQL Server PowerShell cmdlets have been released and the Microsoft is asking for feedback on what else you'd like to see.
2016-07-01
1,210 reads
By Steve Jones
AI is a big deal in 2026, and at Redgate, we’re experimenting with how...
By Steve Jones
Another of our values: The facing page has this quote: “We admire people who...
By Ed Elliott
Running tSQLt unit tests is great from Visual Studio but my development workflow...
Comments posted to this topic are about the item No Defaults Passwords Ever
Hi, We have low latency high volume system. I have a table having 3...
Comments posted to this topic are about the item The Long Name
I run this code to create a table:
When I check the length, I get these results:
A table name is limited to 128 characters. How does this work?