This is Jack Vamvas's Typepad Profile.
Join Typepad and start following Jack Vamvas's activity
Join Now!
Already a member? Sign In
Jack Vamvas
Recent Activity
Ask the right questions about Apache Solr. Continue reading
Posted yesterday at dba-ninja.com
Use Powershell to Automate the Recycle Bin cleardown Continue reading
Posted 2 days ago at SQL Server DBA
Question : I'm trying to execute a CREATE VIEW statement on a MariaDB 10.5 database. The top part of statement is included here: CREATE OR REPLACE ALGORITHM = UNDEFINED VIEW `MY_VIEW` AS select col1,col2,isnumeric(col3) = 0 FROM myTable The isnumeric function referenced in the statement is a custom function and am including the definition and CREATE statement here. CREATE DEFINER=`MY_USR'@'%` FUNCTION `isnumeric`(val varchar(1024)) RETURNS tinyint(1) DETERMINISTIC return val regexp '^(-|\\+)?([0-9]+\\.[0-9]*|[0-9]*\\.[0-9]+|[0-9]+)$' but getting this error message: ERROR 1449 (HY000): The user specified as a definer ('MY_USR'@'%') does not exist As added information - I've been able to execute CREATE TABLE statements... Continue reading
Posted 6 days ago at dba-ninja.com
A common requirement when using Active Directory Groups and Linux is to check if the Active Directory Group is Unix enabled. In simple terms - Unix - enabling means to provide a group (or user) a Unix identity. Importantly - Unix logons are identified in the system by an identifier. Sometimes you make a request to Unix enable an AD group and need to check if the group has actually been Unix - enabled. When querying the Active Directory and to identify if an AD group has been Unix -enabled , the key is to resolve the AD group and... Continue reading
Posted Apr 6, 2021 at dba-ninja.com
pg_basebackup is a backup utility for ONLINE file system level backups. used to take base backups of a running PostgreSQL database cluster. pg_basebackup waits for the server checkpoint and then start the Postgres data directory copy These are taken without affecting other clients to the database, and can be used both for point-in-time recovery Example pg_basebackup -U mypostgresuser -p 6666 -v -P -F tar -x -D /mybackup_directory/ -l 11_05_2019 U = username p = port v = verbose P = Progress report F = Format of the output D = directory for output l = label For a list of... Continue reading
Posted Apr 1, 2021 at dba-ninja.com
Find out how to Secure Powershell to Avoid Ransomware attacks Continue reading
Posted Mar 30, 2021 at SQL Server DBA
Image
Use t-sql find SQL user securables Continue reading
Posted Mar 29, 2021 at SQL Server DBA
Dwarfs line the walls of the Everpeak, weapons ready. They fire bolt and lead at the incoming Orcs, but to the Giant lummoxing forward at the head of the green horde it may as well be a light smither of rain. The Giant crashes into the gates, stumbles back and... Continue reading
Posted Mar 27, 2021 at Theoretical
Once upon a time, enthusiasts designed a formal education system to meet the economic demands of the industrial revolution. Fast forward to today and, with the current global economic climate, it seems apparent that the now established education system is unable to meet the needs of our hyper-connected society –... Continue reading
Posted Mar 26, 2021 at Theoretical
Use this easy way to read Extended Events traces Continue reading
Posted Mar 26, 2021 at SQL Server DBA
Use these SQL Failover Clustering queries for troubleshooting Continue reading
Posted Mar 25, 2021 at SQL Server DBA
A keytab is a text file containing a table with user accounts - accompanied by an encrypted hash of the user account . Typically one account but can be more. A non - windows system, such as Linux, can't be configured to start up with a Windows service account, so if you require a process to logon to Active Directory than keytabs are very useful. This is a more secure option than retaining a clear text configuration file - & then possibly encrypt this file. Whereas with keytabs you're storing a hash password in the keytab file. More detailed -... Continue reading
Posted Mar 24, 2021 at dba-ninja.com
A Dance with Dragons, the fifth volume of the A Song of Ice and Fire, at the same time that it is one of the more concise novels of the series, containing virtually only three main plots – which helps to move the narrative forward –, it also suffers from... Continue reading
Posted Mar 24, 2021 at Theoretical
Find Loads of SQL Server Performance Tuning articles Continue reading
Posted Mar 23, 2021 at SQL Server DBA
Crows will fight over a dead man's flesh, and kill each other for his eyes. Bloodthirsty, treacherous and cunning, the Lannisters are in power on the Iron Throne in the name of the boy-king Tommen. The war in the Seven Kingdoms has burned itself out, but in its bitter aftermath... Continue reading
Posted Mar 23, 2021 at Theoretical
Posted Mar 22, 2021 at SQL Server DBA
"The Starks are scattered..." A Storm of Swords, Part Two: Blood and Gold is epic! Part One builds, and builds, and builds, but Part Two? It explodes! So much happens that it's liable to send you insane after all the adrenaline and heavy breathing. This entry just pounds the reader... Continue reading
Posted Mar 22, 2021 at Theoretical
Blood runs truer than oaths The Seven Kingdoms are divided by revolt and blood feud as winter approaches like an angry beast. In the northern wastes a horde of hungry, savage people steeped in the dark magic of the wilderness is poised to invade the Kingdom of the North where... Continue reading
Posted Mar 21, 2021 at Theoretical
SPOILERS! A Clash of Kings, book two of the A Song of Ice and Fire series, is the follow-up to George R. R. Martin’s A Game of Thrones. Robert Baratheon and Eddard Stark are dead; the crown rests with King Joffrey but Robb Stark, Stannis Baratheon and Renly Baratheon all... Continue reading
Posted Mar 20, 2021 at Theoretical
“George R.R. Martin’s new novel, A Game of Thrones, is the first in an epic series about a land in which the seasons shift between periods of seemingly endless summer and seemingly endless winter. The story begins with the kingdom of Winterfell facing both external and internal dangers. Beyond her... Continue reading
Posted Mar 19, 2021 at Theoretical
Steps to restore a database from a backup device that was part of an Always On Availability Group, and now needs to be restored Recovery Scenario : Requesting an older database copy previously backed up Name of Always on Availability Group = MyAG1 Name of Always On Availability Group db = MyAGDB1 Note: this is a workflow - and there may be some slight variations depending your Availability Group set up Steps to Restore database --Remove the database from the AG Group from the PRIMARY ALTER AVAILABILITY GROUP [MyAG1] REMOVE DATABASE [MyAGDB1]; --Restore the database to PRIMARY from the backup... Continue reading
Posted Mar 19, 2021 at SQL Server DBA
Question: How can I view SQL Server Logging on Linux ? Answer: SQL Server on Windows - logs details into SQL Server Error logs and Application Logs. Windows event viewer details are available in the Windows Event Logs via the event viewer or Powershell Get-EventLog 1) SQL Server logs details in the SQL Server error log file and the Linux log usually , /var/opt/mssql/log/ 2) Use the journalctl command --show all the log messages since last reboot journalctl -b --list by boot number, step 1 generate list of boot numbers. Use the index number (the first column) from command 1... Continue reading
Posted Mar 18, 2021 at SQL Server DBA
Steam is the Adobe Photoshop of video game distribution. Both apps are the leaders in their respective categories, both are massive in size and scope, and both may be intimidating to first-time users. Steam, however, is infinitely more fun to explore. Valve's PC gaming client offers a store, cloud saves,... Continue reading
Posted Mar 17, 2021 at Theoretical
Question: I'd like to document a procedure to logon with Mongo shell but to not display the password . The situation is I'm running a the mongo Shell and then storing the command in a text file . Clearly this causes a security threat problem. Is there an option to avoid this situation mongo --port 27017 -u "myUser" -p "myPw" --authenticationDatabase "admin" Answer: This is an interesting problem - it's not uncommon to end up with connection strings with hard coded passwords across the network , desktops , internal sharepoint sites and anywhere you can store a connection string. There... Continue reading
Posted Mar 16, 2021 at dba-ninja.com
Passing judgment on the most nostalgic and classic game of the 21st century is no easy task; it's difficult to set aside prejudices that would sway one's opinion either way. Let's face it: Starcraft comes with a great deal of anticipatory baggage, and it would be easy to say that... Continue reading
Posted Mar 15, 2021 at Theoretical