SQL Server skills: how to monitor and optimize OLAP Databases
It is very important to optimize the performance of online analysis and processing. Fortunately, some tools can help monitor and improve the operation of OLAP databases.
The Microsoft SQL Server Analysis Service (SSAS) provides a powerful engine used to cr
), the default domain of the server, the audit level, as well as some internal separator information.
Exec xp_loginconfig
Xp_makecab
Back in SQL Server 2000, Microsoft gave us the ability to compress OS files directly from T-SQL without having to shell out to DOS via xp_{she
when debugging and running can you access the server from your computer to be tracked.The tracking result is as follows:After selecting a record, the executed SQL statement is displayed. As for the stored procedure, we can clearly see the input parameters and copy them for debugging.If there are too many records, you can select the menu below Edit> Find... to search.Seeing this, I suddenly felt very simple
on a Web server, such as an ASP page or a CGI script; then the Web server is responsible for validating the user, The application uses its own login account (either the System Administrator sa account or, for convenience, uses the login account in the sysadmin server role) to access data for the user. This arrangement has several drawbacks, the most important of
application uses its own login account (either the System Administrator sa account or, for convenience, uses the login account in the sysadmin server role) to access data for the user.
This arrangement has several drawbacks, the most important of which is that it does not have the ability to audit the user's activities on the server, relies entirely on the Web a
! If we look at the customer worksheet again, we will find that although Customer 2 is created, the ID value returned by our program is 3! What is the problem? Recall that, as mentioned earlier, the @ identity function will return any stored procedure called by the main program or touch the final id value generated by any trigger, it depends on which id value is generated before the function is called. In our example, the initial range is p_insertcustomer, and then the trigger is used to record
important. As long as you have the opportunity to attack the Server, you will find a method to attack the Server.
10. In the system, many people do not have the habit of setting passwords. Users who use a blank password in the audit must use a secure password.
Use the following statements to obtain accounts that do not use a password from an existing user:
Selec
number of dedicated administrator connections for this instance is ' 1 '2016-05-15 09:44:32.78 Server This instance of SQL Server last reported using a process ID of 15236 at 2016/5/15 9:44 : (local) 2016/5/15 1:44:23 (UTC). This is a informational message only; No user action is required.2016-05-15 09:44:32.78 Server
xp_getfiledetails ' c:\filetoload.csv '
Xp_getnetname
The procedure Xp_getnetname returns the name of the physical machine where Microsoft SQL Server is installed. You can have the machine name returned as a record set or as a variable.
Without the parameter.
EXEC xp_getnetname
Using the parameter.
DECLARE @machinename sysnameEXEC xp_getnetname @machinename OUTPUTSelect @machinename
Xp_loginconfig
) goto error -- set the trail event declare @ on bit set @ on = 1 -- 148 in the following statement indicates the locks: deadlock graph event (see sys. trace_events), 12 indicates the spid column (see sys. trace_columns) exec sp_trace_setevent @ traceid, 148, 12, @ on exec sp_trace_setevent @ traceid, 148, 11, @ on exec sp_trace_setevent @ traceid, 148, 4, @ on exec sp_trace_setevent @ traceid, 148, 14, @ on exec sp_trace_setevent @ traceid, 148, 26,
: \ filetoload.csv'
Xp_getnetname
The procedure xp_getnetname returns the name of the physical machine where Microsoft SQL Server is installed. You can have the machine name returned as a record set or as a variable.
Without the parameter.
Exec xp_getnetname
Using the parameter.
DECLARE @ machinename sysnameExec xp_getnetname @ machinename OUTPUTSelect @ machinename
Xp_loginconfig
This
procedure that was last available in SQL Server 2000. This stored procedure returns information about the size, date, and attribute of the specified file, including the date and times of creation, access, and modification.
Exec xp_getfiledetails 'C:/filetoload.csv'
Xp_getnetname
The stored procedure xp_getnetname returns the name of the physical machine on which Microsoft
current commands.1222 return the resources and types of the locks involved in the deadlock, and the affected current commands using XML formats that do not conform to any XSD architecture (more advanced than 1204, SQL 2005 and above are available ).-1 open the specified trace tag globally.
The scope of the above trace flag is global, that is, it will always play a role during SQL
database administrator create a new superuser with the same permissions as SA to manage the database. The security account policy also includes not allowing administrator privileges to overflow the account.
SQL Server Authentication mode has both Windows identity authentication and mixed identity authentication. If the database administrator does not want the operating system administrator to access the da
modification.
Exec xp_getfiledetails 'C: \ filetoload.csv'
Xp_getnetname
The stored procedure xp_getnetname returns the name of the physical machine on which Microsoft SQL Server is installed. You can make the machine name returned as a dataset or as a variable.
This parameter is not available
Exec xp_getnetname
Use this parameter
Declare @ machinename sysname
Exec xp_getnetname @ machinename output
Sele
encryption options. The 1th one is called transparent data encryption. In SQL Server 2008, the entire database can be encrypted by the SQL engine. This method encrypts the data of all databases and the log files of the database. By using this all-encompassing approach, all indexes and tables are encrypted. You do not have to change your application.A 2nd encrypt
layer to ensure that no one has been granted more than required permissions.
22. Regular inspection teams or all members of the role are determined to assign permissions to the group, so that your audit work can be simplified. Make sure that when you are there, the public group cannot select from the system table.
23. Take some time to audit requests logging in with a blank password. Use the following code
troubleshoot performance issues, audit database activity, collect sample data for test environments, debug Transact-SQL statements and stored procedures, and collect data for profiling tools. SQL Trace runs can be accessed through SQL Server Profiler(a graphical user interf
61 69 6c 65 64 2e (Login failed .)
0a 00 00 00 fd 02 00 00 00 00 00 00 00 ()
The four bytes followed by the string "SQL server" are version numbers -- 0 × 0c = 12, 0 × 05 = 5, so the host version number is 12.5.0.0. Using this method to get the version number is not all of the story-you need to verify and select @ version to get the information-at least get some hint. The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.