Wednesday, December 23, 2009
ReverseDOS - spam filter for ASP.NET sites
Monday, December 21, 2009
Microsoft Hyper-V Networking and Configuration - Part 1
Upgrade Exchange 2003 to Exchange 2010
Thursday, October 15, 2009
Finding Data Corruption
Friday, September 25, 2009
The 10 Things to Do First for Windows 7
- Getting to know Windows 7
- Dealing with the latest volume-activation requirements
- Developing a roadmap
- Handling new distributed-security features
- Virtualizing desktops and infrastructures
- Removing users' local-admin rights
Saturday, August 29, 2009
Hyper-V Server 2008 R2: Bare Metal to Live Migration (In about an hour!)
All in about an hour!!
Monday, August 3, 2009
Getting Real - the smarter, faster, easier way to build a succesful web application
Getting Real is the business, design, programming, and marketing philosophies of 37signals — a developer of web-based software used by over 1 million people and businesses in 70 countries.
37signals used the unconventional Getting Real process to launch five successful web-based applications (Basecamp, Campfire, Backpack, Writeboard, Ta-da List), and Ruby on Rails, an open-source web application framework, in just two years with no funding, no debt, and only 7 people.
Anyone working on a web app — including entrepreneurs, designers, programmers, executives, or marketers — will find value, fresh perspectives, and inspiration in this practical book.
Troubleshooting Performance Problems in SQL Server 2008
It’s not uncommon to experience the occasional slowdown of a database running the Microsoft SQL Server database software. The reasons can range from a poorly designed database to a system that is improperly configured for the workload. As an administrator, you want to proactively prevent or minimize problems; if they occur, you want to diagnose the cause and take corrective actions to fix the problem whenever possible. This white paper provides step-by-step guidelines for diagnosing and troubleshooting common performance problems by using publicly available tools such as:
- SQL Server Profiler
- System Monitor (in the Windows Server 2003 operating system) or Performance Monitor (in the Windows Vista operating system and Windows Server 2008), also known as Perfmon
- Dynamic management views (sometimes referred to as DMVs)
- SQL Server Extended Events (Extended Events) and the data collector, which are new in SQL Server 2008.
We have limited the scope of this white paper to the problems commonly seen by Microsoft Customer Service and Support (CSS), because an exhaustive analysis of all possible problems is not feasible.
Because this paper is very long (102 pages), reading it in an online format such as the Library becomes impractical, so we offer it as a downloadable Microsoft Word document.
Friday, July 24, 2009
A Google-like Full Text Search
Thanks to Internet search engines like Google and Yahoo!, your search application users are more sophisticated and demanding than ever. Your application users have a wealth of search application knowledge that they're probably not even aware of. Ask one of them to find a website dedicated to their favorite band or movie and odds are they'll have their browser pointed to that page in a matter of seconds.
You can tap into the self-education that comes from countless hours spent at home trying to locate information on the Web and turn it to your advantage in your own SQL Server-based search applications. With just a little bit of code you can help reduce your training costs and give your users an easy to use interface that will make them want to use your search applications. In this article I'll explain how to convert Google-style queries to SQL Server's full-text search CONTAINS predicate syntax.
Tuesday, July 21, 2009
Saving Time with Proactive DBA Monitoring
A typical day for the DBA usually starts with an overall health check of the database servers in the network. No matter how big or small the environment, the database administrator usually finds himself doing more or less the same type of checks every day.
If the DBA is responsible for ten production SQL Server instances, each hosting three databases on average - it would be thirty production databases to look after. Each morning the DBA would want to know if the instances are all up and running and accepting user connections. Next, he would probably want to see if overnight backups were all successful. When that is ascertained, perhaps the attention would turn to scheduled jobs. There may be regular processes that are critical to the business – like an SSIS package or a reporting job. If nothing has failed in that front, it would be time to check the Windows Event Log and the SQL Error Log for any suspicious looking error messages. Finally, it will be prudent to see if replication has failed or mirroring has frozen or log shipping has broken.
These are only part of the day-to-day health checks and yet when done manually, can take a significant amount of time.
There are a number of tasks that you as the DBA can automate to make life easier and save time. Smart DBAs would always try to proactively check database and server health without waiting for something to happen or someone else reporting about them.
In this article I will try to present some ideas about how some of the daily database health checks can be automated and turned into proactive monitoring. Although database monitoring is not a new idea and there are quite a few third party tools in the market, it may be cost prohibitive for some organisations. The alternative is to build a custom monitoring solution.
Thursday, July 9, 2009
Map IP Address to a Geographical Location
Wednesday, July 8, 2009
Automating Performance Monitor Statistics Collection for SQL Server and Windows
Problem
You have about 100 SQL Servers installed in your production environment. You have performance problems on few of the servers, but they happen during the time when you are not watching the servers. So, how can you automate performance statistics collection on all the servers around the clock so we have the statistics for 24/7/365.
Solution
You can use the built-in windows utility "logman" that comes free.
Logman is the command line utility for Perfmon. Thru logman, it is easy to automate perfmon data collection which I will show you below.
Monday, June 22, 2009
A Beginner’s Guide to Virtualizing Exchange Server, Part 2
It isn't easy to measure the consumption of physical resources by servers in virtual machines, since each partition has its' own virtualised view of system resources. Not only that, but there is a subtle difference between virtual processors and physical processors. Brien Posey explains the special performance counters that can be used to get an accurate assessment, and goes on to describe how to test your physical servers to see if they are good candidates for virtualization.
If you read my first article in this series, then you got something of a crash course in Hyper-V’s architecture. Of everything that I covered in that article though, there are two main points that you need to keep in mind:
- When it comes to virtualizing Exchange Server, it is critical that you monitor resource consumption so that you can ensure that there are sufficient hardware resources available to effectively service Exchange and any other virtual machines that may be running on the server.
- Each of the various resource monitoring mechanisms that I showed you tells a completely different story regarding how much of the server’s physical resources are actually being consumed.
Thursday, June 18, 2009
Use Backup/Restore to Minimize Upgrade Downtimes
As a SQL Server professional, at some point in your career, you will need to upgrade between versions of SQL Server, or move a database from an older server onto a newer one. There are quite a few different ways to go about doing this, the most common being; Detach/Copy/Attach and Backup/Restore. When downtime is acceptable, either of these methods can get the job done, the only caveat being that if you are performing a upgrade to a newer version of SQL Server and you decide to use Detach/Copy/Attach to upgrade the databases that you still should take a backup of the database before moving it so that you have a point to fall back top. Once you attach the database files to the newer version they will be upgraded internally and will no longer be able to be used on the older version.
If time is of the essence during the migration, and downtime must be minimized, the best approach will depend on the size of the database being upgraded. For a database that is under 4GB in size, it may be acceptable to still do a Detach/Copy/Attach move of the database, but for a database that is 40GB in size, the time it takes to copy the files to the newer server could exceed the allowable downtime for the system. If the database is 400GB, it will most certainly take to long to move the database by Detach/Copy/Attach. In this case the best path to migration/upgrade is to work with Backup/Restore.
Thursday, June 4, 2009
Calling a Web Service from within SQL Server
Backup Monitoring and Reporting
Wednesday, May 20, 2009
Creating a recycle bin for SQL Server 2005\2008
Recently while being shown around Oracle 10G (yes I said the 'O' word) I noticed that this product has a recycle bin. This recycle bin which stores only dropped tables falls under the Oracle flashback technology umbrella.
I was pretty sure I could do the same in SQL server using DDL triggers and schemas and prevent accidental drops of other objects as well. This article is the result of that challenge.
In a nutshell the SQL Server recycle bin is a combination of two schemas which act as bins (recycle bin and trash can) and a DDL trigger which determines which bin to place the dropped object (which is not dropped but renamed). A stored procedure (sp_undrop) is used to revert the object to its original name and schema.
Monday, May 4, 2009
SQL Server 2008 - Response Time Analysis using Extended Events
Response time = service time + wait time
This tool allows you to drill down on the time spent in serving the user requests and the time spent in waiting for resources.
Download the application and documentation from http://sqlcat.codeplex.com/Wiki/View.aspx?title=ExtendedEventsWaitstats. Follow the User Guide to install and use the tool. The download also contains the source code for the project.
Tuesday, April 28, 2009
Comparison of Dates in SQL
Tuesday, April 14, 2009
Auto generate change scripts in SQL Server Management Studio (SSMS) for tables
Monday, April 13, 2009
Creating a merged (slipstreamed) drop containing SQL Server 2008 RTM + Service Pack 1
Microsoft SQL Server 2008 Resource Governor primer
Managing workloads and consumption with Resource Governor
Resource Governor is a new feature and one of the most anticipated management features in SQL Server 2008. It bolsters SQL Server performance by allowing DBAs to establish resource limits and priorities on processor and memory-related workloads and resource pools. By defining resource limits on resource consumption, it is possible to prioritize multiple workloads in order to ensure consistent performance and maximize the experience of the end users and the efficiency of the applications without degradation.
It is important to realize from the start that Resource Governor will only throttle processes if SQL Server is experiencing CPU or memory pressure, and it will only throttle incoming requests. For example, a process that consumes high CPU will not be throttled, but the next process may be throttled. Resource Governor is unable to throttle high I/O consumers (processes that read and write excessively from disk) in the SQL Server 2008 release, but this is planned for a future release.
Thursday, April 9, 2009
Collecting performance counters and using SQL Server to analyze the data
Wednesday, April 8, 2009
Database level permissions for SQL Server 2005 and 2008
SQL Server 2005 introduced a new concept to SQL Server security and permissions: securables. Securables are anything within SQL Server that can have a permission assigned. One such securable is the database.
Tuesday, April 7, 2009
Exploring SQL Server 2008’s Filtered Indexes
One of the most interesting features in SQL Server 2008 is filtered indexes. Let’s start with a quick explanation and then dig into the details and results.
A filtered index is simply an index with a WHERE clause. For example, if you have a table where a date is NULL in 90% of the records but you need to be able to find only records with a non-NULL date, a filtered index will have only the 10% that are not NULL.
It can be very useful for saving space, saving index maintenance costs, and making queries run faster. However, it is important to understand under whatcircumstances it will make your query faster.
Handling workloads on SQL Server 2008 with Resource Governor
To handle this scenario, in earlier version of SQL Server there was one option to create multiple instances for these application (segregating by running one application on each instance) and setting CPU affinity mask for these instances appropriately. But the problems with this approach are, first it works for CPU only and second the dedicated CPUs cannot be shared by other SQL Server instances. For example, if there are two SQL Server instances and instance one has been assigned CPU 1 and 2 and instance two has been assigned CPU 3 and 4 on a four processor machine, even if instance one is idle and instance two is in need of additional resources, it can only use CPU 3 and 4. So what does SQL 2008 offer to solve this issue?
Monday, April 6, 2009
Deleting duplicate Records using SQLCMD
Tuesday, March 31, 2009
SQLFury - An SQL injection scanner, using blind SQL injection techniques to extract information from a target database
Monday, March 30, 2009
How to back up Hyper-V virtual machines from the parent partition on a Windows Server 2008-based computer by using Windows Server Backup
Friday, March 20, 2009
EventTracker PULSE
- No limit on collection and archival of log data
- Real-time collection from Windows (servers and workstations), Unix/Linux, Cisco devices, applications and any syslog source
- Compressed, secure (SHA1) storage of data
- Easy to use Google-like interface with options for free-form searching using keywords, exact phrases, operators, wildcard characters or a combination of all for complex queries
- Endless refine to extract precise matches from large volumes
- Hundreds of preconfigured knowledge categories
- One-click access to the Prism KnowledgeBase for helpful descriptions on over 20,000 events
- Agent-optional architecture; centralized agent configuration
Wednesday, March 18, 2009
Dealing with Windows 64bit "I want SIGNED drivers!"
- Unsigned drivers cause the vast majority of Windows bluescreens.
- Unknowing users don't know that, and so blame Microsoft for blue screens
- This really irritates people at Microsoft and in particular Dave Cutler, Windows' Architectus Maximus
- Dave wants to make it easy to finger the culprit of any given blue screen
- Signing a driver carries with it something of a statement of personal confidence in that driver (and here, I feel, is where the whole thing falls down a bit: signing a driver says you wrote it, not that it lacks bugs), so...
- 64-bit Windows requires that all drivers and kernel executables be signed.
Tuesday, March 10, 2009
Installing SQL Server 2008 on a Windows Server 2008 Cluster
Effective PowerShell: The Free eBook
Monday, March 9, 2009
Blocking Users by IP
Friday, March 6, 2009
SQL Server Reporting Services Fast Guide
Row Level Versioning
The first time I heard the term Row Level Versioning in SQL Server 2005, I had mixed feelings about it. I was a bit confused and I had a pre conceived notion of what it was. When I read more about it I found out I was totally wrong. But I am a type of person who does not take the word of anyone when I can actually try to find out if it is true or not. We will first look at what is Row Level versioning. How it works and what are the advantages. After that, we will try to see if Row Level Version actually works like Microsoft claims.
Thursday, March 5, 2009
Introduction to SQL Server 2008 Report Builder 2.0
Problem
I have heard that there is a new version of Report Builder in SQL Server 2008. Can you provide some details and examples? What is new with Report Builder 2.0? How does the new interface look? What is the learning curve with this tool?
Solution
SQL Server 2008 includes a brand new version of the Report Builder which was first introduced in SQL Server 2005. The key new features in Report Builder 2.0 are:
- A completely new user interface that conforms to the Office 2007 look and feel
- A local client install rather than a click-once application that you download and install from Report manager
- Supports running reports locally or on the server
- A Report Model is not required; you can create your own queries using a query designer, import queries from existing reports, or manually type in your queries
- A Tablix report type which is a combination of the matrix and table reports
In this tip we will review installing Report Builder 2.0, the new user interface, developing a sample report, and deploying the report to a SQL Server 2008 report server. I'll cover the new Tablix report in a future tip.
Wednesday, March 4, 2009
Importing and exporting bulk data with SQL Server's bcp utility
This tip discusses several examples of bcp commands to bulk-copy data in and out of SQL Server tables. The examples have been tested on SQL Server 2005 and SQL Server 2008, and for all examples I used the AdventureWorks sample database.
Perils of adding fields to database tables
Tuesday, March 3, 2009
New Infrastructure Planning and Design Guide: Microsoft SQL Server 2008
iSCSI configuration in Hyper-V Server 2008 R2
iSCSIcli in Hyper-V Server 2008
In Hyper-V Server 2008 and Server Core Installations of Windows Server 2008 to connect to SAN storage you would use the iscsicli.exe tool. This is the command line equivalent of the iSCSI client configuration tool. This command line tool requires you to utilize your asterisk button a lot. (to accept default values)
iSCSIcpl in Hyper-V Server 2008 R2
To make this crucial step in your cluster setup progress a bit easier, Microsoft has included the graphical version of the iSCSI client configuration tool in Hyper-V Server 2008 R2 and Server Core installations of Windows Server 2008 R2. You no longer have to workiscsicli.exe magic to connect to your SAN; you can click your way through now! Of course, for die hard command line freaks and scripters of all sorts the iscsicli.exe command is still available!
Virtual Machine Disk Options
In order to make virtual machine storage portable while also delivering performance, Microsoft developed the Virtual Hard Disk (VHD) Image Format Specification which includes details of how to read and modify data contained in a VHD file. Microsoft provides the VHD file format specification to third-party developers under a royalty-free license, and many vendors, including Citrix, have adopted and use the format for their virtualization products. If you are interested in obtaining more details on the VHD file format, you can download the specification file from the Microsoft website.
Microsoft Windows Server 2008 Hyper-V uses the VHD format to encapsulate virtual machine data (operating system, application, and data files) into one or more files that are equivalent to physical drives associated with a traditional server. Therefore, if you browse the virtual machine folders on a Hyper-V server, a virtual hard disk is simply stored as a file with a .vhd extension on an attached physical disk. Virtual machines connect to a virtual hard disk through a virtualized IDE or SCSI adapter, and Hyper-V provides the mapping between the virtual hard disk and the .vhd file on the physical disk. A VHD can be stored on any IDE, SCSI, iSCSI, SAN, or NAS storage system supported by the Windows Server 2008 operating system.
You can use the Hyper-V Manager MMC or the WMI API to create new virtual hard disks. A virtual machine running on Hyper-V can support a maximum of 260 virtual hard disks through a combination of 4 IDE and 256 SCSI-connected VHDs. The bus type (IDE or SCSI) used to attach a VHD to a virtual machine imposes a size limitation on virtual hard disks. Specifically, IDE-attached VHDs cannot exceed 127 GB, while SCSI-attached VHDs cannot exceed 2 TB.
HYPER-V CERTIFICATE EXPIRATION AND RESOLUTION
- Windows Server 2008, Standard (Hyper-V role enabled)
- Windows Server 2008, Enterprise (Hyper-V role enabled)
- Windows Server 2008, Datacenter (Hyper-V role enabled)
- Microsoft Hyper-V Server 2008
- You may be unable to start or connect to virtual machines running on Windows Server 2008 or Microsoft Hyper-V Server 2008. This occurs when connecting using vmconnect. Connections made using remote desktop won't be affected.
- KB Article 967902 has been created that details the symptoms and resolution. This KB article provides a direct link to download the quickfix to resolve this error.
Monday, February 16, 2009
Help, my database is corrupt. Now what?
A corrupt database is probably one of most DBA's worst nightmares. It results in downtime, managers shouting and all other sorts of unpleasant things
Thursday, February 12, 2009
Microsoft Hyper-V Server 2008 Configuration Guide
Planning for Hyper-V Security
Once you have updated the Windows Server® 2008 operating system with the Hyper-V™ technology release bits and enabled the Hyper-V role, you are ready to run virtual machines (VMs) on your server, now called a virtualization server (also called a “host”).
How does this change your security? Not much. Hyper-V is designed to be fairly transparent. You secure your VMs the same way that you secure physical machines. For example, if you run antivirus software on the physical machine, run it on the VM (not the host). If you segment the physical server to a particular network, do the same to the VM.
Achieving High Availability for Hyper-V
An Introduction to Hyper-V in Windows Server 2008
Tuesday, February 10, 2009
Installing and Configuring Openfiler with DRBD and Heartbeat (HA Cluster Setup)
Right click to mount/unmount VHD in Windows 7 or Windows Server 2008 R2
Windows Image to Virtual Hard Disk Converter (WIM2VHD)
Powering Server Core - Configuring UPS Devices
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 R2 came with built-in support for serial and USB connected Uninterruptible Power Supply (UPS) devices. From within the Power Options you could manage your UPS and the shutdown behavior of the box.
About UPS Devices
UPS devices help prevent loss of data from power loss (“black-outs) by shutting down the server properly instead of abruptly. The device also helps protect the server hardware from power surges, brown outs, drop outs and voltage fluctuations, extending the life of the hardware.
Monday, February 9, 2009
HOWTO Configure iSCSI CHAP authentication on Microsoft iSCSI Initiator
So, here goes:
HOW TO CONFIGURE iSCSI CHAP AUTHENTICATION TO WORK WITH MICROSOFT'S iSCSI INITIATOR
First off, I am not going to detail how to install OpenFiler or how to set up a basic disk and turn on iSCSI. Information on installing OpenFiler can be found in the documentation and David Davis posted a nice article here about how to set up a basic volume for iSCSI use. I am also not going to discuss how to instal the Microsoft iSCSI intiator, although it is very easy to do and can be downloaded here.
Once you have set up Open Filer for basic iSCSI access and have installed the MS iSCSI Initiator, perform the following steps:
Friday, February 6, 2009
Windows Server 2008 Hyper-V Security Guide – beta now available
For organizations that seek cost-effective operations, the benefits of virtualization are more evident than ever. Microsoft® Hyper-V technology allows consolidation of workloads that are currently spread across multiple underutilized servers onto a smaller number of servers. This capability provides you with a way to reduce costs through lower hardware, energy, and management overhead while creating a more dynamic IT infrastructure.
Virtualization technologies are causing enterprise organizations to shift their thinking about IT. The Hyper-V Security Guide can help you elevate the security of virtualized Windows Server® environments to meet your business-critical needs. This accelerator provides IT professionals like you with recommendations to address your key security concerns around server virtualization. The guide provides authoritative guidance that relates to the following strategies for securing virtualized environments.
Installing Windows Hyper-V Server 2008
Microsoft Hyper-V Server (HVS) 2008 is a hypervisor solution that is based on Windows Server 2008 and Hyper-V. Unlike Windows Server 2008 which supports the installation of many different roles, Microsoft Hyper-V Server 2008 is standalone virtualization software that does not support any additional roles.
The installation of Microsoft Hyper-V Server 2008 will be very familiar to those of you who have installed a Windows Server 2008 edition because it uses a similar wizard-driven installation. Here are the steps you must follow to install Microsoft Hyper-V Server 2008.
A closer look at the Windows 7 SKUs
Today, I wanted to take a closer look at the Windows 7 SKUs since there has been some discussion about them for the last couple of days. By the end of this post, I want you to know exactly which edition of Windows 7 is right for you and help you understand how we approached addressing the large amount of feedback we received.
Our SKU line-up is based on listening to feedback from customers and partners and here is what they have told us and how we are addressing their feedback in Windows 7:
Customers wanted clarity on which version of Windows is the right version for them. So…Windows 7 will be offered primarily in 2 editions: Windows 7 Home Premium and Windows 7 Professional.
Tuesday, February 3, 2009
Disk Subsystem Performance Analysis for Windows
This paper considers performance from both the hardware and software perspectives. In addition, it discusses tools for storage subsystem analysis and design and provides rules of thumb and guidelines for system design and to solve the performance bottlenecks in specific configurations.
Exchange - How to Calculate Your Disk I/O Requirements
Your goal is to provide enough disk I/O performance (measured by the number of I/O operations per second [IOPS] that can be performed) with acceptable latency that allows for efficient Exchange functionality.
Calculating the IOPS per mailbox is a convenient way to measure the profile for a given server based on random database read/write I/O (transaction log I/O is not factored into this equation). The higher the IOPS per mailbox, the more aggressive the mailbox profile is in terms of disk usage.
SQL Server CLR function to improve performance of validating email addresses
Is it true that Hyper-V Server 2008 R2 will support clustering and live migration?
There are still advantages to using Windows Server 2008 R2 Enterprise Edition over Hyper-V Server 2008 R2 instances, including:
- Four virtual machine licenses are included with Enterprise edition. Hyper-V doesn't come with any.
- You can only use the command line and PowerShell to manage Hyper-V Server locally, though you can use the full cluster GUI to remotely manage a Hyper-V Server cluster.
- Clustering in Hyper-V Server 2008 R2 only supports Hyper-V high availability. You can't make any other applications or services highly available on Hyper-V Server 2008 R2.
Native VHD booting on Windows 7 or Windows Server 2008 R2
Monday, February 2, 2009
Friday, January 30, 2009
Predeployment I/O Best Practices: SQL Server Best Practices Article
CoreConfigurator - use a graphic interface to configure Windows Server 2008 Core edition!
CoreConfigurator is free for personal use and free for non commercial use.
Active Directory on separate volumes?
Transitioning your Active Directory to Windows Server 2008
This post intends to help you with this transition in a structured, balanced and thorough way.
Virtualizing Exchange 2007 and Exchange 2003 with Hyper-V
Running SQL Server 2008 in a Hyper-V Environment - Best Practices and Performance Considerations
Exchange Servers in Hardware Virtualization Environments
This Technet page provides the Microsoft support policies for running currently supported versions of Microsoft Exchange Server in production in a hardware virtualization environment.
Thursday, January 29, 2009
WinBubble - tweaking tool for Vista
Wednesday, January 28, 2009
Using CROSS JOIN queries to find records out of sequence
Hierarchies in SQL
Creating OS VHDs from Windows Server 2008 R2 OS media
http://www.ravichaganti.com/blog/?p=314
And the follow up, Enabling a captured VHD to boot in a Hyper-V Virtual Machine.
Tuesday, January 27, 2009
How do Cluster Shared Volumes work in Windows Server 2008 R2?
http://windowsitpro.com/article/articleid/100867/q-how-do-cluster-shared-volumes-work-in-windows-server-2008-r2.html
You need to register/login to see the answer.
Hyper-V 2.0 Feature overview
- Live Migration
- enhanced Logical Processor Support
- Hot add remove storage
- Second Level Translation (SLAT)
- Dynamic Memory
- Boot (host) from VHD
- improved speed of iSCSI storage communication
- support for multiple network channels (NIC teaming support)
- Virtualized I/O
http://hypervoria.com/hyper-v/hyper-v-2-0-feature-overview.aspx
Update: Sander Berkouwer in his blog "The things that are better left unspoken" is talking about his experience with Hyper-V 2.0 beta and what surprise him.
Monday, January 26, 2009
Auto notification for failover of a server and restart of SQL Server services
http://www.mssqltips.com/tip.asp?tip=1663
Friday, January 23, 2009
Hyper-V Remote Management Configuration Utility
HVRemote project site is at this address: http://code.msdn.microsoft.com/HVRemote
and author's blog can be found here.
Hyper-V Server 2008 Local Management scripts / UI
http://www.codeplex.com/HVS2008UI
Is developed by Ravikanth Chaganti's and his blog can be found here.
IIS 7.0 Configuration Reference - online library
This vast library comprehensively details all IIS 7.0 configuration settings in Windows Server 2008, including configuration collections, elements, and attributes. You can sort the configuration settings alphabetically to easily find what you are looking for or by browsing the schema structure. Each configuration topic provides sections such as an overview, examples of how to configure the configuration, setup instructions, configuration details, and code and script samples – including AppCmd.exe, C# .NET, Visual Basic .NET, JavaScript, and VBScript.
This is the only online reference you’ll need for IIS configuration, so check out the comprehensive documentation at http://www.iis.net/ConfigReference today!
Free eBook: Mastering SQL Server 2005 Profiler, by Brad McGehee, 2009
Free eBook: Understanding Microsoft Virtualization Solutions - From the Desktop to the Datacenter, 2009
Highlights: Hyper-V, System Center Virtual Machine Manager (SCVMM) , App-V, Terminal Services, MED-V, VDI, Roaming User Profiles, ...
Here's the download link (PDF, 15MB).
Wednesday, January 21, 2009
Hyper-V 2.0: Live Migration setup on Windows Server 2008 R2 (beta 1)
http://blog.baeke.info/blog/_archives/2009/1/14/4057251.html
Tuesday, January 20, 2009
Planning virtualization of servers with Hyper-V, part 2
Step 2: Create the List of Applications
Before designing and implementing the infrastructure, determine which applications the infrastructure needs to support. This information will be used in later steps to determine resource requirements and, ultimately, to design the physical host infrastructure.
Determine Application Compatibility
The first step in deciding which applications to virtualize is to consider the specific technical requirements for the application or operating system and map that against any constraints in the virtualization technology. Factors include:
- Processor architecture requirements.
- The number of required processors.
- Memory requirements.
- Graphics adapter requirements.
- Special hardware requirements.
- Is available with Windows Server 2008.
- Requires specialized hardware chipset (Intel VT or AMD-V).
- No access to USB devices or hardware such as Host Bus Adapters (HBAs).
Document the List of Applications
Most organizations run multiple operating systems, applications, and services that IT may consider moving to a virtual environment. To ensure that no important considerations are overlooked, a spreadsheet or table should be created that lists the applications, whether they are compatible with virtualization, and whether it is appropriate to virtualize them. Such a job aid could also include additional notes, requirements, and concerns. Filling out such a table can provide a very helpful structure to the process of planning for virtualization.
In the next article, i will cover the step 3, Determine Resource Requirements.
How to boot a VM in Hyper-V from iSCSI
In order to do this you would need to:
- Attach the iSCSI LUN to the parent partition.
- Create a new virtual machine and opt to configure the hard disk later.
- Open the settings for the new virtual machine and select the first IDE controller.
- Select to add a disk drive.
- On the disk drive configuration page select to use a physical hard disk, and select the iSCSI LUN.
- Apply changes and close the virtual machine settings.
Now you can boot the virtual machine directly off the iSCSI LUN by just starting it up...
Reference: http://blogs.msdn.com/virtual_pc_guy/archive/2008/02/19/booting-hyper-v-vms-off-of-iscsi.aspx
Hyper-V Quirks That Take Some Getting Used To
http://www.petri.co.il/hyper-v-quirks-that-take-some-getting-used-to.htm
Planning virtualization of servers with Hyper-V, part 1
- Determine the Virtualization Scope
- Create the List of Applications
- Determine Resource Requirements
- Select the Backup Approach for Each Application
- Applying Fault Tolerance
- Summarize and Analyze the Application Requirements
- Select a Form Factor for the Hosts
- Map Guests to Hosts
- Determine the Host Backup Approach
- Design Fault Tolerance
- Design the Storage Infrastructure
- Design the Network Infrastructure
Starting with step 1, determining the virtualization scope, you have a few options:
- Enterprise Deployment - this option involves deployment of virtualization technology to the entire organization, including corporate data centers.
- Hub Deployment - this option involves deployment of virtualization technology to one or more hub locations. Hubs are physical locations where there are concentrations of users, computers, and/or network connectivity. Resources within the hub may be provided to additional satellite locations.
- Satellite Deployment - this option involves deployment of virtualization technology to one or more satellite locations. Satellite locations are smaller than enterprise or hub environments and often have limited network connectivity to the rest of the environment because of bandwidth constraints.
In part 2, i will examine the next step, creating the list of applications that need to be virtualized.
Managing connections to remote servers
http://sqlblogcasts.com/blogs/simons/archive/2009/01/15/Managing-connections-to-remote-servers.aspx
Adding a column to every table in a database
http://weblogs.sqlteam.com/joew/archive/2009/01/15/60824.aspx
Analyzing the SQL Server Plan Cache
http://www.mssqltips.com/tip.asp?tip=1661
Spring Clean Your Database Schema
http://www.sqlservercentral.com/articles/Admin/65138/
Log Management, the easy way
Splunk website - http://www.splunk.com/
Splunk documentation - http://www.splunk.com/base/Documentation
What Splunk can do for you:
Index
With a variety of flexible input methods you can index logs, configurations, traps and alerts, messages, scripts, and code and performance data from all your applications, servers and network devices. Monitor file systems for scripts and configuration changes, capture archive files, find and tail live application logs, connect to network ports to receive syslog, SNMP and other network-based instrumentation. And this is just where it starts.
Search
Fast, free form search on anything, not just a few predetermined fields. Boolean, nested, quoted string and wildcard searches. No knowledge of specific data formats required. Combine time and term searches. Find errors across every tier of your infrastructure and configuration changes in the seconds before a system failure occurred. Fields are identified from your results as you search -- providing much more flexibility than a rigid set of field mapping rules imposed ahead of time.
Alert
Any search can be run on a schedule and trigger notifications or actions based on the search results. And because it works across different components and technologies, Splunk is the most flexible monitoring tool in your arsenal. Notifications can be sent via email, RSS or SNMP to other management consoles. Actions trigger scripts performing user described activities like restarting an application, server or network device.
Report
Splunk marries powerful reporting capabilities with the speed, flexibility and scale of IT Search. Search results can be easily summarized as reports with interactive charts, graphs and tables. The simplicity of analyzing massive amounts of data will amaze you (and your boss). And remember, because fields are identified as you search you can specify new fields without re-indexing your data.
Share
Everyone knows IT data is generally poorly documented by vendors, developers and operations staff. With Splunk everyone can add their own knowledge as they go. As you’re saving searches, identifying different types of fields, events and transactions you make the whole system smarter for everyone else. And that knowledge doesn’t walk out the door when someone leaves.
Scale
Scale your installation from a single application and just a few data sources to your whole datacenter and thousands of sources. You’ll find a wide range of options to access data, store it, search it and route it to other systems.
Secure
Of course you'll need to keep your IT data secure. Especially as you realize what a valuable information asset you have. Splunk gives you secure data handling, fine grain access controls, auditability, assurance of data integrity and integration with existing authentication systems.
When i will be done with the installation and configuration with my new servers i will give it a try, and share my experience with it.