Stairway to Transaction Log Management in SQL Server, Level 7: Dealing with Excessive Log Growth
This level will examine the most common problems and forms of mismanagement that lead to excessive growth of the transaction log.
This level will examine the most common problems and forms of mismanagement that lead to excessive growth of the transaction log.
A customer has a database that is already set up in a SQL Server Availability Group. Since this database hosts sensitive data, there is a need to encrypt the primary and all secondary replicas of the data. In this article, we will walk through how this can be done.
Swiping through LinkedIn feels like watching a campsite suddenly flooded with s’mores. Every other ad, i.e. post, promises the next miracle AI service, platform, or “AI-powered” widget. It’s a frenzy that says: “If buzzwords paid the bills, we’d all be billionaires already.” I can’t fault the reasoning, there’s a lot of buzz out there telling […]
Most evenings I spend some time soaking in the tub and reading articles/watching videos on InfoSec, Data Protection and AI. It may sound like a terrible way to spend some time, but I always find it educational and I’m in shock by the lack of concern around data security, and yet….I’m not. For decades, the […]
Agentic AI is often hailed as a game-changer by organizations, bringing autonomous decision-making, intelligent automation, and powerful predictive capabilities. However, as organizations rush to leverage these technologies, those dealing with critical data in relational databases, documents and datasets, especially personally identifiable information (PII) face a harsh reality: moving AI projects from proof-of-concept to production is […]
Every few weeks, headlines scream about how artificial intelligence is coming for our jobs. The narrative is often the same: white-collar professions are at risk, automation is taking over, and we’re all doomed to obsolescence.
Now, let's be really clear up front, I don't mean getting a surgically implanted chip in your head, done on your kitchen table. Brain hacks are generally either, forming habits that are good for learning and concentration, changing how you do things to help enhance your brains function, eating differently in support of brain health, […]
I grew up in a pretty rural environment, in the southern US, in what's considered the Old West (Jesse James, reportedly, had a hideout a few miles from my current home, the Daltons, Belle Star, I can keep going, all came through this part of Oklahoma). Here, we call our daily tasks, like taking out […]
I'd like to take a moment and simply voice my appreciation for Steve Jones. Steve's still on sabbatical, so I've been doing some of the work, along with my co-worker, Kellyn Gorman (who I also appreciate, very much). I'm sure you've noticed. Oh, not simply that the editorials are different. That's to be expected. Nah, […]
Summary: SQL Server administrators frequently enco...
By Steve Jones
Recently I was working in VS Code and I saw a walkthrough for the...
By alevyinroc
In the blink of an eye, summer has passed. I don’t know about you,...
By Chris Yates
In today’s digital landscape, data is both a strategic asset and a potential liability....
Comments posted to this topic are about the item Change Tracking Data Retention Options
Comments posted to this topic are about the item Requiring Technical Debt Payments
Comments posted to this topic are about the item Using the FP-Growth Algorithm to...
If I am running this code:
ALTER DATABASE AdventureWorks2017 SET CHANGE_TRACKING = ON (CHANGE_RETENTION=4 xxx);What are the possible choices for xxx? See possible answers