Migrating from SUPER to Dynamic Privileges
When performing health checks on a database, I look at how many users are granted SUPER privileges. If you’re reading this, you know why. SUPER privileges pose a potential security risk and should be...
View ArticlePrepping for MySQL 5.7 Upgrade
MySQL 5.6 reached its end-of-life (EOL) in February 2021. If you haven’t upgraded to MySQL 5.7, you are not the only one. It can be an intimidating endeavor. There are configuration, system table,...
View ArticleInvestigating Locking in Db2
The purpose of this article is to provide guidance on the various ways available for getting basic information about locking events in a Db2 database. Where possible the information gathered allows for...
View ArticleThe Difference Between Blocking and Deadlocks
When I was learning about Microsoft SQL Server issues a DBA needs to understand, I was reading about deadlocks. At first, I was confused because it sounded like the definition of blocking, which I was...
View ArticleValidating Db2 Software Download Integrity
With the release of Db2 11.5.7.0, IBM has finally started providing cryptographically signed installation image files. This is important because it provides a means to verify that the installation...
View ArticleEncrypted Replication for MySQL
Encrypted connections for MySQL replication are the default as of 8.0. The following simple example shows a basic setup for encrypted replication using Ubuntu 20.04 and MySQL Community 8.0.27. The...
View ArticleMariaDB Galera Cluster WSREP_SST_METHOD Explained
This blog article will explain what the SST method choices are and what you need to consider when choosing one over another. To start with, the wsrep_sst_method is a configuration parameter used with...
View ArticlePercona XtraBackup Example
For this example, the following software versions were in use: Ubuntu v20.04.3 MySQL server v5.7.35 Percona XtraBackup v2.4.24 It is important to note that Percona XtraBackup 8.0 is not compatible with...
View ArticleResolving SQLCODE -551 on View Creation
I recently faced an interesting challenge. I was working to replace (rebuild) a view with updated DDL, but when executing the CREATE OR REPLACE VIEW statement, Db2 returned error code SQL0551N. This...
View ArticleMigrating from SUPER to Dynamic Privileges
When performing health checks on a database, I look at how many users are granted SUPER privileges. If you’re reading this, you know why. SUPER privileges pose a potential security risk and should be...
View ArticlePrepping for MySQL 5.7 Upgrade
MySQL 5.6 reached its end-of-life (EOL) in February 2021. If you haven’t upgraded to MySQL 5.7, you are not the only one. It can be an intimidating endeavor. There are configuration, system table,...
View ArticleInvestigating Locking in Db2
The purpose of this article is to provide guidance on the various ways available for getting basic information about locking events in a Db2 database. Where possible the information gathered allows for...
View ArticleThe Difference Between Blocking and Deadlocks
When I was learning about Microsoft SQL Server issues a DBA needs to understand, I was reading about deadlocks. At first, I was confused because it sounded like the definition of blocking, which I was...
View ArticleBest Practices for Migrating Servers and Applications to Microsoft Azure
In this article, you will learn best practices on migrating on-premise servers and applications to Azure. The push to the cloud is expediting, and it is essential to understand best practices and how...
View ArticleAzure Monitor
There are quite a few monitoring tools out there that can benefit you in your environment, but if you want to capitalize on robust alerting and monitoring within the Azure space, then Azure Monitor is...
View ArticleTroubleshooting Transient AlwaysOn and Windows Failover Cluster Service Timeouts
You may see events in your error logs reporting transient connection failures between cluster nodes or AlwayOn. You may observe high Asynch_Network_IO in [sys].[dm_os_wait_stats]. And you may have even...
View ArticleStart Using Binlogs: A Quick Guide
Binary logs play an important role in replication and data recovery. In replication, source databases communicate data changes recorded in its binary logs to the replica’s relay logs. They can also be...
View ArticleBenefits of Using Azure Virtual Desktop (AVD)
This article is the first of a series of blogs which I will discuss the benefits of using Azure Virtual Desktop (AVD) and what it can do to help safely secure your remote workforce. I will first...
View ArticleSimple Steps for Rotating the Error Log
The error log is an important tool for troubleshooting. The size of the error log file can get quite large if left unattended. For starters, there are not many parameters that can be adjusted to impact...
View ArticleBest Practices for Deploying SQL Server Using vSphere
A properly designed virtualized SQL Server instance running in a VM with Windows Server (or Linux), using vSphere is crucial to the successful implementation of enterprise applications. One main...
View Article