Implementing Transparent Data Encryption (TDE), Backup Encryption, Always Encrypted, Symmetric key and Asymmetric keys all require that a final secret is stored at some point which protects the encryption key(s) used to secure the data. The main difference between a symmetric and asymmetric key..
As someone who has worked with many clients across many industries one of the common problems I see is companies who are finding it hard to juggle all the adhoc requests that come in to their data team. Report requests, data modifications, minor deployments, fixes or query performance tuning; no..
Anyone that's worked with SQL for any length of time will undoubtedly have seen and heard the following
On a new installation of a SQL Server instance, by default, SQL Agent will automatically manage the job history retention, however this may not work the way you expect it to. This post explains why, and how you should set this up for best results.
When DBAs are troubleshooting issues, solutions are sometimes applied in the heat of a critical incident which solve the problem, which are then walked away from because the issue has been “fixed”. With experience and a better understanding of the broader issue of long-term solutions, you..
In this blog post I will explore the difference between the ‘SELECT … INTO’ and ‘INSERT … SELECT’ statements. I recently moved some data for a customer to a brand-new table due to the bad design of the source table. First, I created the destination table and then I ran the ‘INSERT … SELECT’..
When you have a database which has just been created and is in the FULL recovery model, or you have an existing database you are changing from SIMPLE to FULL, you need to take a full backup before you are able to take log backups, as there needs to be a starting point for the log chain. There is a..
The TempDB database is special in many ways, but an interesting aspect is that when its files automatically grow when they become full, this growth is not persisted and will be undone on the next restart of the SQL Server service. We can see how this works by looking at two system tables:..
A whole series of “speculative execution side-channel attacks” were disclosed in the first week of 2018, as detailed in this Microsoft article: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Major security events like this highlight the severe risk companies are..
Automating SQL Server with PowerShell
If you perform the same task more than once, you're probably asking yourself "how can I automate this?" PowerShell provides the tooling to automate monotonous tasks that require manual effort.