Viewing 15 posts - 3,931 through 3,945 (of 6,105 total)
Unless you know you're going to have X number of concurrent users, you're probably better off buying per processor.
The licensing is legal jargon, but it basically amounts to this: however...
October 27, 2003 at 3:24 pm
Custom extended stored procedure probably won't collect this information... is there a reason you aren't using Windows authentication?
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start to Finish Guide to SQL Server Performance Monitoring
October 27, 2003 at 10:04 am
That's because Named Pipes is a communication process which is requiring authentication. You're getting the benefit of that in SQL Server as a result. TCP/IP, on the other hand, doesn't...
October 27, 2003 at 9:38 am
Weighing in from a security perspective, a lot of what is being said here is disconcerting. I'll offer a few brief comments:
All of these cases make use of BULK INSERT....
October 24, 2003 at 3:03 pm
Yes, Virtual name and IP address of the virtual sqlA would be owned by nodeB. Easy way to think about it:
Cluster Name: Cluster1
Physical Nodes: Physical1, Physical2
Virtual Nodes: Virtual1, Virtual2
Looking at...
October 24, 2003 at 2:49 pm
True, but this uses sp_OA and that's generally frowned upon... because if you give access to a non-admin user, that user could potentially instantiate any COM+ object on the server.
K....
October 23, 2003 at 3:04 pm
Piggy-backing on what Richard has already said, the concept of a server farm in the Windows environment is typically applied to either web or an application tier, not SQL Server....
October 23, 2003 at 3:02 pm
When you look at the network trace, do you the certificate go across at all?
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start to Finish Guide to SQL Server Performance Monitoring
October 23, 2003 at 2:56 pm
Setting a max size probably isn't feasible, but perhaps you could cycle the logs on a regular basis? Brian Knight wrote about some undocumented tricks for logs:
http://www.sqlservercentral.com/columnists/bknight/readpurgelog.asp
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start...
October 22, 2003 at 3:04 pm
Yup, Profiler is your best bet here. One thing I'd add is to have Performance Monitor counter logging going at the same time watching memory, processors, disk usage, paging, etc....
October 22, 2003 at 2:59 pm
Okay, based on what you've said, there are a number of ways in that are worrisome. Here are 3 that come to mind.
1) Since SQL Server and IIS are on...
October 22, 2003 at 2:56 pm
An idea, don't know how feasible, since I don't work with MSMQ a lot.
What about writing extended stored procedures that would drop in a message queue (MSMQ) or buy a...
October 22, 2003 at 12:55 pm
It's going to be very hard to track down who did, then, since there is no audit trail. Probably the best thing to do is verify only that handful of...
October 22, 2003 at 12:50 pm
First, remove him as a domain admin. Second, take him out of the system admin role. He doesn't need those rights.
1) Create a user account on the SQL Server box...
October 22, 2003 at 12:48 pm
Was the user id in global.asa sa or an account with membership in the sysadmin server role? If so, does your application protect against SQL Injection?
Is the SQL Server on...
October 22, 2003 at 12:43 pm
Viewing 15 posts - 3,931 through 3,945 (of 6,105 total)