database applications for simple functions such as query and modification. Please assign accounts as needed and grant only the permissions that meet the application requirements and needs. For example, as long as the query function is available, a simple public account can be used to select.
3. Strengthen database log records
Review "failed and successful" of database logon events, select "security" in instance properties, and select all audit levels
Developer-Dev dba-testers are hard to collaborate: SVN and other version tools are file-based and difficult to version control at the database level
Database changes are difficult to track: existing technologies cannot track who, when, what has been modified on the database, and when errors or performance degradation occurs due to a database, it is difficult to troubleshoot
Process assets for database changes cannot be logged: History of database changes only database operators unde
query analyzer behavior modification. This command is dangerous and may be called as performance degradation. For details, see:
http://support.microsoft.com/kb/974006Trace flag should not be enabled in the production environment
Trace Flag 806 Check the logical consistency of pages during reading. The following information is displayed in the error log:11:29:04. 11 spid51 error: 823, severity: 24-day status: 211:29:04. 11 spid51 I/O error (Audit Fail
From:http://www.cnblogs.com/kissdodog/p/3173421.htmlTriggers can do a lot of things, but it also brings a lot of problems. The trick to using it is to use it at the right time, rather than using it at an inappropriate time.Some common uses for triggers are as follows:
Elastic referential integrity: Implements operations that many DRI cannot implement (for example, referential integrity across databases or servers, and many complex relationship types).
Create a divine trace: This mea
extensible Document number generator-snf.coderule SNF Rapid Development Platform 3.1--Audit flow (3) Low-key luxury, simple and uncommon, example demo-snf.workflow SNF Rapid Development Platform 3.1--Audit flow (2) process design-snf.workflow function instruction SNF Rapid Development Platform 3.1--Audit flow (1) SNF. Introduction to Workflow
and has only one T-SQL statement. In this case, the complete set of statements is fairly small. Now it is assumed that there are multiple statements in the procedure, and some of these procedures use other statements to invoke other procedures. Collecting all this extra data now becomes a very powerful load on the system. In the production machine must be used with caution.Now go back to the event selection panel and only the events that have been se
DB driverThe following drivers are common:
Odbc
ODBC, open Database Connectivity, is an integral part of the database in the Microsoft Open Service Architecture (Wosa,windows Open Services Architecture), which establishes a set of specifications and provides a set of standard APIs (application programming interfaces) for database access. These APIs use SQL to accomplish most of their tasks. ODBC itself also provides support for the
performance.
SQL Server ProfilerYou can use SQL Serverprofiler to capture the activities of the SSAS instance based on selected events, and SQL Server Profiler captures the activity in a tracked manner and contains a predefined set of templates that meet the most common tra
SQL Server 2016 improves the Query Optimizer
The first two versions of SQL Server mainly improve performance by providing new features, while SQL Server 2016 mainly improves its existing functions.
Base Estimator
The base estimato
the table to reduce the table size (sp_spaceuse)3. upgrade hardware4. Create an index based on the query conditions, optimize the index, optimize the access mode, and limit the data volume of the result set. Note that the fill factor should be appropriate (preferably the default value 0 ). The index should be as small as possible. Use a column with a small number of bytes to create an index (refer to the index creation). Do not create a single index for fields with a limited number of values, s
Label:When we read and write database files, these process activities trigger some run-time events when a file is read, written, or an error occurs. From a user's point of view, some of the time will be concerned about these events, especially our debugging, audit, service maintenance. For example, when database errors occur, column data is updated, CPU usage is high, and so on, tracking these states is very useful.This section covers key areas of the
Label:Isolation level for SQL Server transactionsDatabase is to be shared by the vast number of customers to access, then in the database operation process is likely to occur in the following kinds of uncertainty.Update missing (Lost update)Two transactions update a row of data at the same time, but the second transaction fails to exit, resulting in two modifications to the data that are invalidated. This i
Mu class net
Home
Actual combat
Path
Ape asked
Notes
PythonNotebooks \ SQL Server 2012 database notes SQL Server 2012 database notes2016-10-25 16:29:33 123 views 0 Reviews Chapter One initial knowledge of SQL Serve
Currently, we have received a task in which the company's system must comply with FDA compliance. The boss does not want to put this part inProgramAfter the development is completed, the task is pushed to the database.
There is no way to accept it.
Most compliance software on the market uses trigger or agent on the server to track data changes. The main commercial software is as follows:
ID
Offering
Data changes
Code change
used to access the database.ApplicationProgramAssign. In this environment, assume thatApplicationProgramThe access is safe, and is assignedApplicationProgramRoleIs possible.
There are several options for managementApplicationProgramRolePassword without hard CodingApplicationProgram. For example, you can use the encryption key stored in the registry (or SQL Server database), onlyApplicationProgramThe decryp
generated, enabling the trace flag to make log backups no longer logged to the error log. Trace Flag 4199 All KB patches are valid for changes to the query parser behavior, which is dangerous and may degrade performance, see: http://support.microsoft.com/kb/974006 trace flags that should not be enabled in a production environment Trace Flag 806 Checking the logical consistency of the page during the read process, you can see information similar to the following in the error log: 2004-06
Tags: image syntax According to the purpose BST text editor condition plan same The source of this article: http://www.cnblogs.com/wy123/p/7190785.html (It is not the original works right to retain the source, I my book still far to reach, just to link to the original text, because the following may exist some errors to amend or supplement, without him) A performance issue was first thrown, and a few days ago, a stored procedure with a very low production environment was encountered, and the de
, enabling the trace flag to allow log backups to be no longer logged to the error log.
Trace Flag 4199
All KB patches are in effect for the Query Analyzer behavior, this command is more dangerous, may be scanning performance degradation, please refer to:
http://support.microsoft.com/kb/974006Trace flags that should not be enabled in a production environment
The logical consistency of the page checks during the read process can be seen in the error log, similar to the following:2004-06-25 11:29:
generated. enabling this trace mark will make log backup no longer recorded in error logs.
Trace Flag 4199
All KB patches take effect for the query analyzer behavior modification. This command is dangerous and may be called as performance degradation. for details, see:
http://support.microsoft.com/kb/974006Trace flag should not be enabled in the production environment
Trace Flag 806 Check the logical consistency of pages during reading. the following information is displayed in the error log:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.