SQL Data Catalog

The Data Catalog comes of Age

Nowadays, it isn’t just banks and multinational corporations who have to be rigorous about data. Even modest organisations who would previously been unable to afford the storage, tooling and processing power required, now have sophisticated data processing capabilities within their reach. Like the superhero of the comics, with such power comes responsibility; companies soon reach Read more

SQL Prompt

SQL Prompt Code Analysis: Table does not have clustered index (BP021)

With a few exceptions, every table should have a clustered index. However, they are not always essential for performance. The value of a clustered index depends on the way a table is used, the typical pattern of queries, and how it the table is updated. More important for a table is that it should have Read more

SQL Clone

SQL Provision offers users an easier way to manage, organize and make available masked copies of databases

Over the past year Redgate has released some major improvements to SQL Provision, including the ability to modify images with Data Masker and SQL scripts, and create templates for clones, allowing users to specify SQL scripts to run after creation. Now we’re delighted to announce the latest major release of SQL Clone 3.0, the virtualization Read more

Data Masker

A Basic Technique for Masking Address Data using Data Masker

In my previous article, I showed how to use Data Masker to obfuscate credit card data, while ensuring that the masked data retained the characteristics and distribution of real credit card information. This 2-part article series is going to do the same for address data (country, province, city, zip, address lines and so on). Our Read more

SQL Monitor

Monitoring Changes in Permissions, Users, Roles and Logins

Compliance means keeping a close grip on any changes to the permissions and access control of a database. Sadly, the law has had to acknowledge, from bitter experience, that it is not just external intruders who want to do this, but it could also be attempts at fraud or data theft from within the organisation. Read more

SQL Clone

How to reset your development database in seconds using SQL Clone

Let’s say you’re making experimental changes to your development database and, to explore a hypothesis, you’ve just dropped a table. How long does it take you to restore the database to its previous state, so you’re ready to continue testing? If it’s long enough to go fetch a coffee, then it’s too long. When developing Read more

SQL Prompt

SQL Prompt as a Layout Tool: A Survival Guide

Here is some SQL code to reveal the highest-performing salespeople at AdventureWorks and listing their managers. It produces the following result… So, the code works, but it is ugly. If I need to understand and improve the code, I’ll first need to get it into a readable form. I have SQL Prompt, so I can Read more

SQL Monitor

Checking for Database Drift using Extended Events and SQL Monitor

You need to make sure that nobody makes unauthorized changes to the metadata of your production databases. Governance and testing processes during the deployment pipeline are there to ensure that any proposed database changes aren’t going to open any legal or security issues, and that they won’t introduce any bugs as a side effect. Once Read more

SQL Monitor

Managing the SQL Server Estate

Back in 2012, I was transitioning into the role of ‘Director of Data Services’, at the Fortune 500 insurance organization where I worked. It wasn’t that easy. Previously, as a DBA, I’d spent time developing my own database monitoring and documentation solutions. Now, I needed to alter my perspective to take in the broad landscape Read more

SQL Monitor

Spotting Unauthorized Configuration Settings in SQL Server

An attacker of SQL Server likes to be able to change the SQL Server configuration settings. In an ideal world, you will have left everything open for the intruder, but generally, every DBA reduces the surface of attack as much as possible. Why would the attacker want to change these settings? You might think there’s Read more