Creative Database Naming

Every now and again, we as DBAs need to get away from the daily grind of the hum drum tasks. We need to find a way to have a little fun and this article shows how!

Cannot Open Backup Device

When running into error 1326, it makes plenty of sense to try to create a backup dump device (only as a testing exercise) as well as test the connectivity to the UNC path from the local server instead of a remote server.

Negative Port Numbers

Validating your server setup is an integral component of your duties as a SQL Server DBA. When performing those validations, it is possible to run into an intriguing difference in reported port values.

Where is that Mask?

In this article, I share one easy script that could help eliminate one database feature as a culprit to an anomalous data masking suddenly getting enabled.

Easy Audit Index Changes

When looking for an easy method to audit Index changes, one of the first technologies to try really should be Extended Events (xevents).

Audit Index Changes

This article shows a method to audit for index changes. The weak link in a solution such as this really boils down to the requirement that the solution needs to be in place before the index change occurs.

Find Index Create Date

This article shows a quick script to help determine indexes that were created recently. This script will help you out of rough spot and help reduce the chance of rework.

Ad Hoc Queries Disabled

This article takes a look at an error that may occur depending on your use of linked servers and the use of openrowset.

Configuration Manager is Corrupt

So you come along one day to validate some service configurations for the SQL Server services and instead of the SQL Server Configuration Manager opening as expected, you are greeted with the following error message.

Cannot connect to WMI provider. You do not have permission or the server is unreachable.

When Too Much is Not a Good Thing

Explore how to avoid unwanted results that oft occur due to lack of attention to detail, use of internet examples, misunderstanding of the requirements; and always from granting way too much access.