Revealing the secrets – Truncating a Transaction Log File

In my earlier blog post on Shrinking the Transaction Log files in SQL Server, I had mentioned that a VLF can be truncated only when all transactions, that have at least one command written into the specified VLF have either been committed or rolled back. While this is true, I understand that it might create…

10

Database Corruption Part 5 :: Dealing with Log File Corruption

Hi Friends, I am back again after a long time. Last month was the end of yet another financial year, and all of us were very busy with the processes involved with each year-end. Now that all those are completed, I could find some time for my next blog post on database corruption. Here, I…

5

Registry check-pointing on a Windows Cluster

Over the last few years that I have been in Microsoft, I have come across multiple issues where database administrators have mistakenly made inappropriate changes to the clustered SQL Server registry hives. Later, when SQL Server restarts (either due to manual intervention or during a failover), SQL Server can no longer come online on the…

5

Lock pages in memory now available for 64 bit Standard Edition of SQL Server

Great news!!! Due to over-whelming customer demand for the "Lock pages in memory" support for the Standard Edition of SQL Server 2005 and 2008, Microsoft has released Cumulative Updates that will help SQL Server 64 bit Standard Edition to "lock pages". This feature was already available on the Enterprise and Developer Edition. Enabling "Lock pages…

5

Database Corruption Part 4 :: Recovering from a failed disk

It was a nice day a few days back – nice sunny day, with moderate temperatures. I got up early and after spending some time reading my favorite articles, made my way to office. In office, I realized I hadn’t much work lying ahead; so sat down wondering how to account for my day. Suddenly…

3

Server Side Encryption in SQL Server

Hi Friends, After 3 posts on Database Corruption, I hope you would not mind if I divert my attention a bit and post some blogs related to some other topics. This topic that I going to write about is a very interesting topic; so I thought of taking some time out to write a few…

3

Database Corruption Part 3 :: Differences between CHECKTABLE and CHECKDB

In this post, we would have a look at the differences between DBCC CHECKTABLE and DBCC CHECKDB. We would not go deep into how each works – that has already been very beautifully documented by the SQL Server Storage Engine Team in their blog posts; we would rather have a quick look at the differences…

1

Database Corruption Part 2 :: How to attach a database using the Create-Replace method

Ok, so, as promised, here’s my next post on Database Corruption. In this post, we will have a look at how to attach a database that you have detached and can now no longer attach back to SQL Server. This may happen if the database was already corrupt before it was detached; or if the…

1