Tit Bits (2) on recent speculative execution side-channel vulnerabilities

Microsoft is constantly working to address the new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern OS and processors. Microsoft has developed the required patches both at the OS level and the SQL server level to help address this vulnerability which can be obtained in my previous blog : https://blogs.msdn.microsoft.com/shreyasgowda/2018/01/12/tit-bits-on-the-recent-speculative-execution-side-channel-vulnerabilities/…

0

Tit-Bits on the recent speculative execution side-channel vulnerabilities

Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern operating systems including Android, Chrome, iOS, and MacOS and processors, including those from Intel, AMD, and ARM. Microsoft has released several updates both at the SQL application level and the Windows OS level to…

0

SQL session blocked by a negative SPID (-2)

A couple of times now I have faced this issue with my clients where SQL Server session is blocked by another session that has a negative SPID value. When we ran sp_who2 the SPID value that was blocking was (-2). When we tried to KILL the session we got an error that this is not…

0

Unable to login to SQL server

A few days back one of my clients were facing a business down scenario, where in the DBA who was administering the SQL instance had quit the company and no other have the login access to that instance. When they try to login, we get the following error: Description: can’t log in to MS SQL…

0

Script to list the users of the databases

Yesterday, one of my clients came up with this requirement to develop a script where in we can list all the users of the databases for reporting purposes at his end. Scripted the following query to help his cause. DECLARE @DBuser_sql VARCHAR(4000) DECLARE @DBuser_table TABLE (DBName VARCHAR(200), UserName VARCHAR(250), LoginType VARCHAR(500), AssociatedRole VARCHAR(200)) SET @DBuser_sql=’SELECT…

0

SQL services failing to start

Here is a weird scenario which my client faced where the SQL services failed to start. Tried to start it from SQL server configuration manager and services but the request timed out. Later tried using the command prompt (admin privilege) by entering the executable path and here is the exception that was thrown, Tried to…

0

Encountered issues getting the SQL server and SQL agent cluster resources online

A couple of days back, when I was troubleshooting an issue related to SQL Fail-over cluster instance upgrade I encountered this strange issue of not able to get the newly added SQL server and SQL agent resources online. This scenario was observed on a SQL 2014 clustered over a Windows Server 2012 R2 operating system….

0

Public certificates vs Private certificates vs Self-signed certificates

Do review this information to give you a better understanding on the different types of certificates and also to determine which type of certificate best suits your business needs. The choices that you have for obtaining your certificates include: Public Certificates – Purchasing your certificates from a public Internet Certificate Authority (CA). Private Certificates – Operating…

0

Facing issues with applying SP2/SP3 for SQL 2008 R2 FCI

One of my clients happened to encounter an issue upgrading the SQL server 2008 R2 instance from SP2 to SP3. We were able to pass the major part of the wizard and at the final Installation Progress bar stage we faced issues and the upgrade failed for us with the below error recorded in the…

0

Troubleshooting SQL Server Upgrade Issues

Recently, one of my partners, were facing issues upgrading SQL server 2008 from Service Pack 2 to Service Pack 3.  On checking the summary.txt in the setup bootstrap logs found the following error information : —————— Final result: The patch installer has failed to update the shared features. To determine the reason for failure, review the log…

0