Last week we saw the release of SQL Server 2019 CTP 2.5, with enhancements for Big data clusterrs and a Java language SDK for SQL Server. This is the 6th public release of the next version, and one that’s coming at an increasing rate. If you look at the cadence, there was a release in […] … Continue reading SQL Serve 2019 CTP 2.5
Shadabs-MacBook-Pro-2:~ shadab:~$ sudo docker pull mcr.microsoft.com/mssql/server:2019-CTP2.1-ubuntu 2019-CTP2.1-ubuntu: Pulling from mssql/server Status: Downloaded newer image for mcr.microsoft.com/mssql/server:2019-CTP2.1-ubuntu Check the new image: Shadabs-MacBook-Pro-2:~ shadab:~$ sudo docker images REPOSITORY TAG IMAGE ID CREATED SIZE mcr.microsoft.com/mssql/server 2019-CTP2.1-ubuntu 25b86ffb3a95 3 weeks ago 1.71GB Docker container: Shadabs-MacBook-Pro-2:~ shadab:~$ sudo docker run -e 'ACCEPT_EULA=Y' -e 'SA_PASSWORD=P@ssw0rd123$#' \ > -p 1433:1433 --name sqlserver19 … Continue reading Install SQL Server 2019 on Docker
A very good list of SQL Server Advanced Interview Questions on Clustering SQL interview questions & answers on SQL Server Failover Clusters - I https://www.sqlshack.com/sql-interview-questions-answers-on-sql-server-failover-clusters-i/ SQL interview questions & answers on SQL Server Failover Clusters – II https://www.sqlshack.com/sql-interview-questions-answers-on-sql-server-failover-clusters-ii/
Transparent Data Encryption is a encryption method for encrypting database files at rest. This method is native to the DB engine and is one of the most best methods to encrypt your data files to ensure performance doesn't take a hit. SQL Server and Oracle both support TDE natively on its database engine. Now let … Continue reading Enable TDE (Transparent Data Encryption) for SQL Server 2016
To prevent unauthorized access to your REST modules, APEX provides an easy, declarative way of adding basic authentication. This method utilizes APEX user accounts and RESTful Service Privileges. In order not to expose passwords, you should make sure to enable SSL/HTTPS!
First edit an existing APEX user account, and add the RESTful Services group to that user. In our example we’ll edit the APEX user SCOTT. To do this, navigate to Manage Users and Groups in the workspace where your REST modules are, edit a user, and assign the group in the Group Assignments region:
Next create the RESTful Service Privilege by navigating to RESTful Services in the SQL Workshop. In the Tasks sidebar on the right, click the RESTful Service Privilege link.
Fill out the form and select the modules you want to protect, by shuttling them to the right in Protected Modules.
That’s it! Everything under the…
View original post 50 more words
PowerUpSQL is an amazing tool to audit your SQL Server instances. Not only does it do discovery of SQL Server on your AD but can also help identify common SQL Server vulnerabilities. It can be download from below 2 links https://github.com/NetSPI/PowerUpSQL https://www.powershellgallery.com/packages/PowerUpSQL/ For More information on how to user PowerUpSQL goto below link: https://blog.netspi.com/powerupsql-powershell-toolkit-attacking-sql-server/
For those that have never worked with arrays here’s a great way to understand them: If a variable is a piece of paper then the stack of papers is an array. It’s a list of variables or objects, and every programming/scripting language has ways to store these variables or objects linearly so you can access them later via a number of different methods.
So let’s look at how we can create an array of string objects in powershell:
$array = @("test1", "test2", "test3")$array
You can also add an element to the end of an array:
$array = @("test1", "test2", "test3")$array += "test4"$array
You can also add arrays together:
$array = @("test1", "test2", "test3") $array2 = @("test4", "test5") $array = $array + $array2 $array
You can access an element of an array if you know the index number of the element you want. Arrays are indexed by…
View original post 642 more words
Any stored procedure or view or function can be encrypted when stored in the sql server , so a user can not see the code inside even if the user has SYSADMIN role and it is also not recommended to use this encryption option to hide the code because once you use the encryption option Microsoft sql server does not provide the option or the feature to reverse the setting or decrypt the object , so when you use the encryption option , save your code in a separate instance
TITLE: Microsoft SQL Server Management Studio
Script failed for StoredProcedure ‘dbo.test_encrp’. (Microsoft.SqlServer.Smo)
For help, click: http://go.microsoft.com/fwlink?ProdName=Microsoft+SQL+Server&ProdVer=10.50.1750.9+((dac_inplace_upgrade).101209-1051+)&EvtSrc=Microsoft.SqlServer.Management.Smo.ExceptionTemplates.FailedOperationExceptionText&EvtID=Script+StoredProcedure&LinkId=20476
Property TextHeader is not available for StoredProcedure ‘[dbo].[test_encrp]’. This property may not exist for this object, or may not be retrievable due to insufficient access rights. The text is encrypted. (Microsoft.SqlServer.Smo)
For help, click: http://go.microsoft.com/fwlink?ProdName=Microsoft+SQL+Server&ProdVer=10.50.1750.9+((dac_inplace_upgrade).101209-1051+)&EvtSrc=Microsoft.SqlServer.Management.Smo.ExceptionTemplates.PropertyCannotBeRetrievedExceptionText&EvtID=TextHeader&LinkId=20476
First we will see how…
View original post 988 more words
USE AdventureWorks; GO EXEC sp_configure 'show advanced options', 1; GO RECONFIGURE WITH OVERRIDE; GO EXEC sp_configure 'max degree of parallelism', 12; GO RECONFIGURE WITH OVERRIDE; GO
##################################################################### Run PowerShell To run PowerShell from SQL Server Management Studio Open Object Explorer. Navigate to the node for the object to be worked on. Right-click the object and select Start PowerShell.