Deploy Security Changes with Copy-SqlLogin
Moving security changes between server instances can be a cumbersome process, but it doesn't need to be with the PowerShell cmdlet, Copy-SqlLogin.
2016-11-01
2,281 reads
Moving security changes between server instances can be a cumbersome process, but it doesn't need to be with the PowerShell cmdlet, Copy-SqlLogin.
2016-11-01
2,281 reads
A major difficulty for a System Administrator who wishes to provide access for auditors, Helpdesk staff, developers and other IT people is that adminstrator roles give users more access than they need. It is too easy to make mistakes, or to make more changes than those that were signed-off. With JEA, it is possible to create role-based access control (RBAC) endpoints that define precisely what actions you’ll let your users carry out without needing a elevated, privileged administrator credentials, and which log and report all operations.
2016-10-19
3,276 reads
Desired State Configuration (DSC) allows you to automate the way that you manage configuration data for software services as well as the environment in which these services run. DSC uses a set of built-in and custom 'resources' as the building blocks for a configuration. If you have specific requirements you may need to create the relevant resource to make the configuration happen. Nicolas Prigent provides a practical guide to DSC resources.
2016-09-27
3,764 reads
Use Powershell to troubleshoot SQL connectivity issues. A way to monitor up-time and connectivity of a SQL server database with some simple Powershell commands.
2016-09-22
2,874 reads
To demonstrate that dynamic modules in PowerShell can be used to easily create objects with methods and properties, Phil Factor implements an expression analyser written in PowerShell, using a variation of Dijstra's Shunting Algorithm.
2016-09-16
5,804 reads
Learn how to use the login commands included with SSMS2016 from PowerShell.
2016-09-01
3,387 reads
Tim Smith shows how you can use PowerShell to automate a simple comparison of objects such as stored procedures, views, and fucntions.
2016-08-17
3,933 reads
The Pull mode of Desired State Configuration (DSC) is more complicated to implement because you need to meticulously manage the MOF files and their naming conventions so as to ensure that you deploy your DSC configurations correctly. In this first article of a two-part series, Nicolas Prigent describes how you can best automate this, and then in a second part on monitoring DSC he describes techniques to help you to use the pull mode as a regular part of your admin work.
2016-07-22
3,368 reads
Capture Linux Drive Space data with Powershell using Posh-SSH module
2016-07-19 (first published: 2016-07-06)
1,230 reads
A number of new SQL Server PowerShell cmdlets have been released and the Microsoft is asking for feedback on what else you'd like to see.
2016-07-01
1,208 reads
By Steve Jones
I needed to test a striped backup, so I decided to ask the AI’s...
By gbargsley
In SQL Server environments where transactional replication runs alongside Always On Availability Groups (AGs),...
Disable the sa login in SQL Server (and sleep better)If you run SQL Server...
Comments posted to this topic are about the item Create an HTML Report on...
Comments posted to this topic are about the item Be Wary of Data
Comments posted to this topic are about the item Locking Hierarchies
You have a table [dbo].[orders] without a Clustered Index (Heap). The table does not have any other nonclustered indexes! You rund the following command in Read Committed Isolation Level:
SELECTo_orderdate, o_orderkey, o_custkey, o_storekey FROMdbo.orders WHEREo_orderkey = 3877;